Go to page of
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of D-Link DSN-6410, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of D-Link DSN-6410 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of D-Link DSN-6410. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of D-Link DSN-6410 should contain:
- informations concerning technical data of D-Link DSN-6410
- name of the manufacturer and a year of construction of the D-Link DSN-6410 item
- rules of operation, control and maintenance of the D-Link DSN-6410 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of D-Link DSN-6410 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of D-Link DSN-6410, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the D-Link service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of D-Link DSN-6410.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the D-Link DSN-6410 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
1 D-Link iSCSI IP SAN storage 10GbE iSCSI to SA T A II / SAS RAID IP SAN storage DSN-6410 & DSN-6420 User Manual Version 1.0[...]
-
Page 2
2 Preface Copyright Copyright@2011, D-Link Corporation. All rights reserved. No part of this manual m ay be reproduced or transmitted without written permission fr om D-Link corporation. Trademarks All products and trade names use d in this ma nual are trademarks or registered trademarks of their respective companies. About this manual This manual [...]
-
Page 3
3 Table of Contents Chapter 1 Overview .................................................................. 6 1.1 Features ......................................................................................... 6 1.1.1 Highlights ....................................................................................................[...]
-
Page 4
4 4.4.1 Physical disk ........................................................................................................... 54 4.4.2 RAID group ............................................................................................................ 57 4.4.3 Virtual disk .................................................[...]
-
Page 5
5 6.2 Event notifications ..................................................................... 125 Appendix 133 A. Certification list .......................................................................... 133 B. Microsoft iSCSI initiator .............................................................. 136 C. From Single c[...]
-
Page 6
6 Chapter 1 Overview 1.1 Features D-LINK DSN-6000 series IP SAN storage provides no n-stop service with a high degree of fault tolerance by usi ng D-LINK RAID technolog y and advanced array manageme nt features. DSN-6410/6420 IP SAN storage connects to the host system by iSCSI interface. It can be configured to numerous RAID level . The IP SAN stor[...]
-
Page 7
7 D-LINK DSN-6410/6420 feature highlights Host Interface 4 x 10GbE iSCSI ports (DSN-6420) 2 x 10GbE iSCSI ports (DSN-6410) Drive Interface 12 x SAS or SATA II RAID Controllers Dual-active RAID controllers (DSN-6420) Single controller, but ca n be upgradable to dual (DSN-6410) Scalability SAS JBOD expansion port Green Auto disk spin-down Advance[...]
-
Page 8
8 RAID is the abbreviation of “R edundant A rray of I ndependent D isks ” . The basic idea of RAID is to combine multiple dr ives together to form one la rge logical drive. This R AID drive obtains performance, capacity and relia bility than a single drive. The operating system detects the RAID drive as a single storage device. 1.2.1 Terminolog[...]
-
Page 9
9 in cache and actual writing to non-volatile media occurs at a later time. It speeds up system write perf ormance but needs to bear the risk where data may be i nconsistent between data cache and the physic al disks in one sh ort time interval. RO Set the volume to be R ead- O nly. DS D edicated S pare disks. The spare disk s are only us ed by one[...]
-
Page 10
10 MTU M aximum T ransmission U nit. CHAP C hallenge H andshake A uthentication P rotocol. An optional security mechanism to control access to an iSCSI storage system over the iSCSI data ports. iSNS I nternet S torage N ame S ervice. Part 3: Dual controller SBB S torage B ridge B ay. The objectiv e of the Storage Bridge Bay Working Group (SBB) [...]
-
Page 11
11 four hard drives. RAID 10 Striping over the member RAID 1 volumes. RAID 10 needs at least four hard drives. RAID 30 Striping over the member RAID 3 vo lumes. RAID 30 n eeds at least six hard drives. RAID 50 Striping over the member RAID 5 vo lumes. RAID 50 n eeds at least six hard drives. RAID 60 Striping over the member RAID 6 volumes. RAID 60 [...]
-
Page 12
12 1.3 iSCSI concepts iSCSI (Internet SCSI) is a pr otocol which encapsulates SCSI (S mall Computer System Interface) commands and data in TCP/IP packets for link ing storage devices with servers over common IP infrastructures. iSCSI provides high perfor mance SANs over standard IP networks like LAN, WAN or the Internet. IP SANs are true SANs (Stor[...]
-
Page 13
13 Hardware iSCSI HBA(s) provide its own initiator tool. Please refer to the vendors’ HBA user manual. Microsoft, Linux, Solaris and Mac provide iSCSI initia tor dr iver. Please contact D- LINK for the latest certification list . Below are the available links: 1. Link to download the Microsof t iSCSI software init iator: http://www.microsoft.com/[...]
-
Page 14
14 The management port can be transferred smoothly to the other controller with the same IP address 6. Online firmware upgrade, no system down ti me (only for DSN-6420) 7. Multiple target iSCSI no des per controller support Each LUN can be attached to one of 32 nodes from each controller 8. Front-end 2 x 10GbE iSCSI port s with high availab[...]
-
Page 15
15 5. Instant volume configuration restoration 6. Smart faulty sector relocation 7. Hot pluggable battery backup module suppo rt Enclosure monitoring 1. S.E.S. inband manage ment 2. UPS management via dedicated serial port 3. Fan speed monitors 4. Redundant power supply monitor s 5. Voltage monitors 6. Thermal sensors for both RA ID controller [...]
-
Page 16
16 Windows Linux Solaris Mac Drive support 1. SAS 2. SATA II (optional) 3. SCSI-3 compliant 4. Multiple IO transaction processing 5. Tagged command queuing 6. Disk au to spi n- down su ppor t 7. S.M.A.R.T. for SATA II drives 8. SAS JBODs expansion Power and Environment AC input: 100-240V ~ 7A-4A 500W with PFC (Auto Switc[...]
-
Page 17
17 (EN55022 / EN55024) UL statement FCC statement This device has been shown to be in compliance with an d was tested in accordance with the measurement procedures specified in th e Standards and Specifications listed below and as indicated in the me asurement report number: xxxxxxxx-F Technical Standard: FCC Part 15 Class A (Verification) IC ICES-[...]
-
Page 18
18 The ITE is not intended to be installed and used in a ho me, school or public area accessible to the general population, and the t humbscrews should be tightened with a tool after both initial installation an d subsequent access to the panel. Warning: Remove all power su pply cords before service This equipment intended for installa tion in rest[...]
-
Page 19
19 Chapter 2 Installation 2.1 Package contents The package contains the following items: 1. DSN-6410/6420 IP SAN storage (x1) 2. HDD trays (x12) 3. Power cords (x4) 4. RS-232 cables (x2), one is for co nsole, the other is for UPS. 5. CD (x1) 6. Rail kit (x1 set) 7. Keys, screws for drives and rail kit (x1 packet) 8. SFP and 5 Meter cable 2.2 Before[...]
-
Page 20
20 The drives can b e installed into any slot in the enclosure. Slot numbering will be reflected in web UI. Tips It is advisable to install at least on e drive in slots 1 ~ 4. System event lo g s are saved to drives in these slots; If no drives are fitted the event lo g s will be lost in the event of a system reboot. 2.3.2 Front LED lights There ar[...]
-
Page 21
21 2.3.3 Install drives Note : Skip this section if you purcha sed a solution populated with drives. To install SAS or SATA drives with no Bri dge Board use t he front mounting holes: To install SATA drives with Bridge Bo ard (DSN-654), fit the Bridge Board first Then install the drive using the rear mounting holes:[...]
-
Page 22
22 Figure 2.3.3.3 HDD tray description: HDD power LED: Green HDD is inse rted and good. Off No HDD. HDD access LED: Blue blinking HDD is accessing. Off No HDD. HDD tray handhold. Latch for tray kit removal. 2.3.4 Rear view Figure 2.3.4.1 (DSN-6420 SFP+) PSU and Fan module description: [...]
-
Page 23
23 Controller 2. (only on DSN-6420 ) Controller 1. Power supply unit (PSU1). Fan module (FAN1 / FAN2). Power supply unit (PSU2). Fan module (FAN3 / FAN4).[...]
-
Page 24
24 Figure 2.3.4.3 (DSN-6410 SFP+) Connector, LED and button description: 10GbE ports (x2). Link LED: Orange A s s e r t e d w h e n a 1 G l i n k i s e s t a b l i s h e d a n d maintained. Blue Asserted when a 10G link is establish and maintained. Access LED: Yellow A s s e r t e d w h e n t h e l i n k i s e s t a [...]
-
Page 25
25 BBM Status Button: When the system power is off, press the BBM status butto n, if the BBM LED is Green, then the BBM still has power t o keep data on the ca che. If not, then the BBM power is ran out and cannot keep the data on the cache anymore. Management port. Console port. RS 232 port for UPS. SAS JBOD expansion port.[...]
-
Page 26
26 2.5 Deployment Please refer to the followi ng topology and have al l the connections ready. Figure 2.5.1 (DSN-6420) Figure 2.5.2 (DSN-6410) 1. Setup the hardware connection before powe r on servers. Connect console cable, management port cable, and iSCSI data port cables in advance.[...]
-
Page 27
27 2. In addition, installing an iSNS server is recommended for dual controller system. 3. Power on DSN-6420/6410 and DSN-6020 (optional) first, and then power on hosts and iSNS server. 4. Host server is suggested to logon the target twice (both co ntroller 1 and controller 2), and then MPIO should be setup automatically. (only for DSN-6420) Tips i[...]
-
Page 28
28 Figure 2.5.4 1. Using RS-232 cable for consol e (back color, phone jack to DB9 female) to connect from controller to management PC directly. 2. Using RS-232 cable for UPS (gray color, ph one jack to DB9 male ) to connect from controller to APC Smart UPS serial cable (DB9 female side), and then connect the serial cable to APC Smart UPS. Caution I[...]
-
Page 29
29 Chapter 3 Quick setup 3.1 Management interfaces There are three manageme nt methods to manage D-LINK IP SAN storage, describe in the following: 3.1.1 Serial console Use console cable (NULL modem cable) to connect from console port of D-LINK IP SAN storage to RS 232 port of management PC. Pl ease refer to figure 2.3.1. The console settings are on[...]
-
Page 30
30 3.1.3 Web UI D-LINK IP SAN storage supports graphic user i n terface (GUI) to oper a t e . B e s u r e t o connect the LAN cable. Th e default IP setting is DHCP ; open the browser and enter: http://192.168.0.32 And then it will pop up a dialog for authentication. Figure 3.1.4.1 User name: admin Default password: 123456 After login, choose the f[...]
-
Page 31
31 Indicator description: RAID light: Green RAID works well. Red RAID fails. Temperature light: Green Temperature is normal. Red Temperature is abnormal. Voltage light: Green voltage is normal. Red voltage is abnormal. UPS light: Green UPS works well. Red UPS fails. Fan light: [...]
-
Page 32
32 Mute alarm beeper. Tips I f t h e s t a t u s i n d i c a t o r s i n I n t e r n e t E x p l o r e r ( I E ) a r e d i s p l a y e d i n g ray, but not in blinking re d, please enable “Internet Options” “Advanced” “Play animations in webpages” option s in IE. The default value is enabled, but some applic ations will disable [...]
-
Page 33
33 Figure 3.2.1.2 Step2: Confirm the management port IP a ddress and DNS, and then click “Next” . Figure 3.2.1.3 Step 3: Set up the data port IP a nd click “Next” .[...]
-
Page 34
34 Figure 3.2.1.4 Step 4: Set up the RAID level and volume size and click “Next” . Figure 3.2.1.5 Step 5: Check all items, and clic k “Finish” .[...]
-
Page 35
35 Figure 3.2.1.6 Step 6: Done. 3.2.2 Volume creation wizard “Volume create wizard” has a smarter policy. When the system is inserted with some HDDs. “Volume create wizard” lists all possibilitie s and sizes in differen t RAID levels, it will use all available HDDs for RAID level depends on which user choose s. When system has different siz[...]
-
Page 36
36 Figure 3.2.2.1 Step 2: Please select the combination of the RG capacity, or “Use default algorithm” for maximum RG capacity. Afte r RG size is c hosen, click “Next” . Figure 3.2.2.2[...]
-
Page 37
37 Step 3: Decide VD size. User can enter a numbe r less or e qual to the default number . Then click “Next” . Figure 3.2.2.3 Step 4: Confirmation page . Click “Finish” if all setups are corr ect. Then a VD will be created. Step 5: Done. The system is available now. Figure 3.2.2.4 (Figure 3.2.2.4: A virtual disk of RAID 0 is created and is [...]
-
Page 38
38 Chapter 4 Configuration 4.1 Web UI management interface hierarchy The below table is the hierarchy of web GUI. System configuration System setting System name / Date and time / System i ndication Network setting MAC address / Address / DNS / Port Login setting Login configuration / Admin password / User password Mail setting Mail[...]
-
Page 39
39 Maintenance System information System information Event log Download / Mute / Clear Upgrade Browse the firmware to upgrade Firmware synchronization Synchronize the slave controller’s firmware version with the master’s Reset to factory default Sure to reset to factory default? Import and export Import/Export / Import file [...]
-
Page 40
40 Figure 4.2.1.1 Check “Change date an d time” to set up the cu rrent date, time, an d time zone before using or synchronize time from NTP (N etwork T ime Protocol) server. Click “Confirm” in System indication to turn on the system i ndication LED. Click a gain to turn off. 4.2.2 Network setting “Network setting” i s f o r c h a n g i [...]
-
Page 41
41 Figure 4.2.2.1 4.2.3 Login setting “Login setting” can set single admin, auto logou t time and ad min / user password. The single admin is to prevent multiple users access the same system in the same time. 1. Auto logout: The options are (1 ) Disabled; (2) 5 minutes; (3) 30 minutes; (4) 1 hour. The system will log out automatically when user[...]
-
Page 42
42 Figure 4.2.3.1 Check “Change admin password” or “Change user password” t o c h a n g e a d m i n o r user password. The maximum length of password is 12 characters. 4.2.4 Mail setting “Mail setting” can enter 3 mail addresses for receivi ng the event notifi cation. Some mail servers would check “Mail-from address” and need authen[...]
-
Page 43
43 Figure 4.2.4.1 4.2.5 Notification setting “Notification setting” can set up SNMP trap for alerti ng via SNMP, pop-up message via Windows messenger (not MSN), alert via syslog protocol, and event log filter for web UI and LCM notifications.[...]
-
Page 44
44 Figure 4.2.5.1 “SNMP” a l l o w s u p t o 3 S N M P t r a p a d d r e s s e s . D e fault community setting is “public”. User can choose the event log leve ls and default setting enab les ERROR and WARNING event log in SNMP. There are many SNMP tools. Th e following web sites are for your reference: SNMPc: http://www.snmpc.com/ Net-SNMP:[...]
-
Page 45
45 Most UNIX systems build in syslog daemon. “Event log filter” setting can enable even t log display on “Pop up events” and “LCM”. 4.3 iSCSI configuration “iSCSI configuration” is designed for setting up the “Entity Property” , “NIC” , “Node” , “Session” , and “CHAP account” . Figure 4.3.1 4.3.1 NIC “NIC” ca[...]
-
Page 46
46 Figure 4.3.1.2 Default gateway: Default gateway can be changed by checkin g the gray button of LAN port, click “Become default gateway” . There can be only one default gat eway. MTU / Jumbo frame: MTU ( M aximum T ransmission U nit) size can be enabled by checking the gray button of LAN port, click “Enable jumbo f rame” . Maximum[...]
-
Page 47
47 LACP packets to the peer. Th e advantages of LACP are (1 ) increases the bandwidth. (2) failover when link st atus fails on a port. Trunking / LACP setting can be change d by clicking the button “Aggregation” . Figure 4.3.1.3 (Figure 4.3.1.3: There are 2 iSCSI data ports on ea ch controller, select at least two NICs for link aggregation.) Fi[...]
-
Page 48
48 Figure 4.3.1.5 (Figure 4.3.1.5 shows a user can ping host from the target to make sure the data port connection is well.) 4.3.2 Entity property “Entity property” can view the entity name of the system, and setup “iSNS IP” for iSNS (Internet Storage Name Service). iS NS protocol allows automated discovery, management and conf iguration of[...]
-
Page 49
49 Figure 4.3.3.1 CHAP: CHAP is the abbreviation of C hallenge H andshake A uthentication P rotoc ol. CHAP is a strong authentication method used in point-to -point for user l ogin. It’s a type of authentication in which the au thentication server sends the client a key to be used for encrypting the username and password. CHAP enables the use[...]
-
Page 50
50 Figure 4.3.3.3 5. Go to “/ iSCSI configuration / CHAP account” page to create CHAP account. Please refer to next section for more detail. 6. Check the gray button of “OP.” column, click “User” . 7. Select CHAP user(s) which will be used. It’s a multi option ; it can be one or more. If choosing none, CHAP can not work. Figure 4.3.3.[...]
-
Page 51
51 Rename alias: User can create an alias to one device node. 1. Check the gray button of “OP.” column next to one device node. 2. Select “Rename alias” . 3. Create an alias for that device node. 4. Click “OK” to confirm. 5. An alias appears at the end of that device node. Figure 4.3.3.6 Figure 4.3.3.7 Tips After setting CHAP, the i[...]
-
Page 52
52 8. DataSeginOrder(Data Sequence in Order) 9. DataPDUInOrder(Dat a PDU in Order) 10. Detail of Authentication status and Source IP: port number. Figure 4.3.4.1 (Figure 4.3.4.1: iSCSI Session.) Check the gray button of session number, click “List connection” . It can list all connection(s) of the session. Figure 4.3.4.2 (Figure 4.3.4.2: iSCSI [...]
-
Page 53
53 Figure 4.3.5.1 3. Click “OK” . Figure 4.3.5.2 4. Click “Delete” to delete CHAP account. 4.4 Volume configuration “Volume configuration” is designed for setting up the volume configuratio n which includes “Physical disk” , “RAID group” , “Virtual disk” , “Snapshot” , “Logical unit” , and “Replication” . Figure [...]
-
Page 54
54 4.4.1 Physical disk “Physical disk” can view the status of hard drives in the sy stem. The followings are operational steps: 1. Check the gray button next to the number of slot, it will show the functions which can be executed. 2. Active function can be sel ected, and inactive functions show up in gray c olor and cannot be selected. For exam[...]
-
Page 55
55 Figure 4.4.1.3 (Figure 4.4.1.3: Physical disks in slot 1,2,3 are created for a RG named “RG-R5”. Slot 4 is set as dedicated spare disk of the RG named “RG-R5”. The others are free d isks.) Step 4: The unit of size can be chan ged from (GB) to (MB). It w ill display the capacity of hard drive in MB. Figure 4.4.1.4 PD column descriptio[...]
-
Page 56
56 “Failed” the hard drive is failed. “Error Alert” S.M.A.R.T. error alert. “Read Errors” the hard drive has unrecoverable read errors. Usage The usage of hard drive: “RAID disk” This hard drive has b een s et to a RAID group. “Free disk” This hard drive is free for use. “Dedicated s[...]
-
Page 57
57 Set Dedicated spares Set a hard drive to dedicate d spare of the selected RG. Upgrade Upgrade hard drive firmware. Disk Scrub Scrub the hard drive. Turn on/off the indication LED Turn on the indication LED of the har d drive. Click again to turn off. More information Show hard drive de tail information. 4.4.2 RAID group “RAID group” can view[...]
-
Page 58
58 Step 2: Confirm page. Click “OK” if all setups are correct. Figure 4.4.2.2 (Figure 4.4.2.2: There is a RAID 0 with 4 ph ysical disks, named “RG-R0”. The second RAID group is a RAID 5 with 3 physical disks, named “RG-R5”.) Step 3: Done. View “RAID group” page. RG column description: The button includes the func tions which can[...]
-
Page 59
59 Health The health of RAID gr oup: “Good” the RAID group is good. “Failed” the RAID group fa ils. “Degraded” the RAID gro up is not healthy and not completed. The reason could be l a c k o f d i s k ( s ) o r h a v e failed disk RAID The RAID level of the RAID group. Current owner The owner of the RAID group. T[...]
-
Page 60
60 property Write cache: “Enabled” Enable disk writ e cache. (Default) “Disabled” Disable disk write cache. Standby: “Disabled” Disable auto spin -down. (Default) “30 sec / 1 min / 5 min / 30 min” Enabl e hard drive auto spin-down to save power when no access after c ertain period of time. Read ahead:[...]
-
Page 61
61 Figure 4.4.3.1 Caution If shutdow n or reboot the system when creatin g VD, the erase process will stop. Step 2: Confirm page. Click “OK” if all setups are correct. Figure 4.4.3.2 (Figure 4.4.3.2: Create a VD named “VD-01”, from “RG-R0”. The second VD is n amed “VD-02”, it’s initializing.) Step 3: Done. View “Virtual disk” [...]
-
Page 62
62 VD column description: The button includes the func tions which can be executed. Name Virtual disk name. Size (GB) (MB) Total capacity of the virtual disk . The unit can be displayed in GB or MB. Write The right of virtual disk: “WT” W rite T hrough. “WB” W rite B ack. “RO” R ead O nly. Priority The priori[...]
-
Page 63
63 Clone The target name of virtual disk. Schedule The clone schedule of virtual disk: Health The health of virtual disk: “Optimal” the virtual disk is wo rking well and there is no failed disk in the RG. “Degraded” At le a st one di sk fr om th e R G o f t he Vi rtu al disk is failed or plugged out. “Failed” the[...]
-
Page 64
64 / … / 100. Delete Delete the virtual disk. Set property Change the VD name, right, prio rity, bg rate and read ahead. Right: “WT” W rite T hrough. “WB” W rite B ack. (Default) “RO” R ead O nly. Priority: “HI” HI gh priority. (Default ) “MD” M i D dle priority. “LO” LO w pr[...]
-
Page 65
65 Stop clone Stop clone function. Schedule clone Set clone function by schedule. Set snapshot space Set snapshot space for taking sn apshot. Please refer to next chapter for more detail. Cleanup snapshot Clean all snapshots of a VD an d release the sn apshot space. Take snapshot Take a snapshot on the virtual disk. Auto snapshot Set auto snapshot [...]
-
Page 66
66 Figure 4.4.4.2 (Figure 4.4.4.2: “VD-01” snapshot space has been created, snap shot space is 15GB, and us ed 1GB for saving snapshot index.) Step 3: Take a snapsh ot. In “/ Volume configuration / Snapshot” , click “Take snapshot” . It will link to next pa ge. Enter a snapshot name. Figure 4.4.4.3 Step 4: Expose the snapshot VD. Ch eck[...]
-
Page 67
67 Step 5: Attach a LUN t o a snapshot VD. Pl ease re fer to the next sect ion for attaching a LUN. Step 6: Done. Snapshot VD can be used . Snapshot column description: The button includes the func tions which can be executed. Name Snapshot VD name. Used (GB) (MB) The amount of snapshot space th at has been used. The unit can be displayed in GB[...]
-
Page 68
68 Delete Delete the snapshot VD. Attach Attach a LUN. Detach Detach a LUN. List LUN List attached LUN(s) . 4.4.5 Logical unit “Logical unit” can view, create, and modify the status of attached logical unit number(s) of each VD. User can attach LU N by clicking the “Attach” . “Host” must enter with an iSCSI node name for access control,[...]
-
Page 69
69 LUN operation description: Attach Attach a logical unit number to a virtual disk. Detach Detach a logical unit numb er from a virtual disk. The matching rules of access co ntrol are followed from the LU N’ created time; the earlier created LUN is prior to the matching rules. For example: there ar e 2 LUN rules for the same VD, one is “*?[...]
-
Page 70
70 Figure 4.4.6.1 1. Select “/ Volume configuration / RAID group” . 2. Click “Create“ . 3. Input a RG Name, choose a RAID level from the list, click “Select PD“ to choose the RAID physical disks, then click “OK“ . 4. Check the setting. Click “OK“ if all setups are correct. 5. Done. A RG has been created. Figure 4.4.6.2 (Figure 4[...]
-
Page 71
71 Figure 4.4.6.3 1. Select “/ Volume configuration / Virtual disk” . 2. Click “Create” . 3. Input a VD name, choose a RG Name and ente r a size for this VD; decide the stripe height, block size, read / write mode, bg rate, and set prio rity, finally click “OK” . 4. Done. A VD has been created. 5. Follow the above steps to create anothe[...]
-
Page 72
72 Figure 4.4.6.5 1. Select a VD. 2. Input “Host” IQN, which is a n iSCSI node name fo r access control, or fill-in wildcard “*”, which means every host can access to th is volume. Choose LUN and permission, and then click “OK” . 3. Done. Figure 4.4.6.6 Tips The matching rules of access control are from the LUNs’ created time, the ear[...]
-
Page 73
73 Figure 4.4.6.7 (Figure 4.4.6.7: Slot 4 is set as a global spare disk.) Step 5: Done. Delete VDs, RG, please follow the below ste ps. Step 6: Detach a LUN from the VD. In “/ Volume configuration / Logical unit” , Figure 4.4.6.8 1. Check the gray button ne x t t o t h e L U N ; c l i c k “Detach” . There will pop up a confirmation page. 2.[...]
-
Page 74
74 To delete a RAID group, pl ease follow the procedures: 1. Select “/ Volume configuration / RAID group” . 2. Select a RG which all its VD are deleted, otherwise the this RG cannot be deleted. 3. Check the gray button next to the RG number click “Delete” . 4. There will pop up a confirmatio n page, click “OK” . 5. Done. The RG has been[...]
-
Page 75
75 4.5.1 Hardware mo nitor “Hardware monitor” can view the informat ion of current voltages and temperatures. Figure 4.5.1.1[...]
-
Page 76
76 If “Auto shutdown” is checked, the system will shutdo wn automatically when voltage or temperature is out of the no rmal range. For better data protection, please check “Auto Shutdown” . For better protection and avoiding single s hort period of high temper ature triggering auto shutdown, the system use multiple conditio n judgments to t[...]
-
Page 77
77 Figure 4.5.2.2 (Figure 4.5.2.2: With Smart-UPS.) UPS column description: UPS Type Select UPS Type. Choose Smart- UPS for APC, None for other vendors or no UPS. Shutdown Battery Level (%) When below the setting level, system will shutdown. Setting level to “0” will disabl e UPS. Shutdown Delay (s) If power failure occurs, and system power[...]
-
Page 78
78 Battery Level (%) Current power percentage of battery level. 4.5.3 SES SES represents S CSI E nclosure S ervices, one of the enclosur e management standards. “SES configuration” can enable or disable the management of SES. Figure 4.5.3.1 (Figure 4.5.1.1: Enable SES in LUN 0, and can be accessed from every host) The SES client software is ava[...]
-
Page 79
79 Figure 4.5.4.1 (SAS drives & SATA drives) 4.6 System maintenance “Maintenance” allows the operations of sy stem functions which includ e “System information” to show the system version and details, “Event lo g” to view system event logs to record critical events, “Upgrade” to the la test firmware, “Firmware synchronization?[...]
-
Page 80
80 Status description: Normal Dual controllers are in normal stage. Degraded One contro ller fails or has been plugged out. Lockdown The firmware of two controllers is different or the size of memory of two controllers is different. Single Single controller mode. 4.6.2 Event lo g “Event log” can view the event messa ges. Check the checkbox [...]
-
Page 81
81 The event log is displaye d in reverse order which means the latest event log is on the firs t / top page. The event lo gs are actually saved in the fi rst four hard drives; e ach hard drive has one copy of event log. For one system, there are four copi es of event logs to make sure users can check even t log any time when th ere are failed disk[...]
-
Page 82
82 4.6.3 Upgrade “Upgrade” can upgrade controller fi rmware, JBOD firmware, change operation mode, and activate Replication license. Figure 4.6.3.1 Please prepare new controll er firmware file named “xxxx.bin” in local hard drive, then click “Browse” to select the file. Click “Confirm” , it will pop up a wa rning message, click “O[...]
-
Page 83
83 master ones no matter what the firmware versio n of slave controller is newer or older than master. In normal status, the firmware versions in controller 1 and 2 are the same as below figure. Figure 4.6.4.1 4.6.5 Reset to factory default “Reset to factory default” allows user to reset IP SAN st orage to factory default setting. Figure 4.6.5.[...]
-
Page 84
84 1. Import: Import all system configurati ons excluding volume configurati on. 2. Export: Export all configurations to a file. Caution “Import” will import all system confi g urations excludin g volume configuration; the current configurations will be replaced. 4.6.7 Reboot and shutdown “Reboot and shutdown” can “Reboot” and “Shutdo[...]
-
Page 85
85 For security reason, please use “Logout” to exit the web UI. To re-login the system, please enter username and password again. 4.7.3 Mute Click “Mute” to stop the alarm when error occurs.[...]
-
Page 86
86 Chapter 5 Advanced operations 5.1 Volume rebuild If one physical disk of the RG whi ch is set as protected RAID level (e .g.: RAID 3, RAID 5, or RAID 6) is FAILE D or has been unplugged / remove d, then t h e s ta tu s of RG is ch an ge d to degraded mode, the system will search/detect spare disk to rebuild the degraded RG t o a complete one. It[...]
-
Page 87
87 Rebuild operation description: RAID 0 Disk striping. No protection for da t a . R G f a i l s i f a n y h a r d d r i v e fails or unplugs. RAID 1 D is k m i rr o r i n g ov e r 2 d is k s . R AI D 1 a l l ow s o n e ha r d d r iv e f a i ls o r unplugging. Need one new har d dr ive to insert to th e system and rebuild to be completed. N-way[...]
-
Page 88
88 5.2 RG migration To migrate the RAID l evel, pl ease follow below procedures. 1. Select “/ Volume configuration / RAID group” . 2. Check the gray button next to the RG number; click “Migrate” . 3. Change the RAID level by c licking the down arrow to “RAID 5” . There will be a pup- up which indicates that HDD is not enough to suppo rt[...]
-
Page 89
89 5.3 VD extension To extend VD size, plea se follow the procedures. 1. Select “/ Volume configuration / Virtual disk” . 2. Check the gray button next to the VD number; click “Extend” . 3. Change the size. The size must be larg er than the original, and then click “OK” to start extension. Figure 5.3.1 4. Extension starts. If VD needs i[...]
-
Page 90
90 any unfortunate reason it migh t be (e.g. virus attack, data corruption, huma n errors and so on). Snap VD is allocated within the sa m e R G i n w h i c h t h e s n a p s h o t i s t a k e n , w e suggest to reserve 20% of RG size or more for snapshot space. Please refer to the following figure for snapshot concept. Figure 5.4.1 5.4.1 Create sn[...]
-
Page 91
91 Figure 5.4.1.1 7. Check the gray button next to the Snapshot VD number; click “Expose” . Enter a capacity for snapshot VD. If size is zero , the exposed snapshot VD is read only. Otherwise, the exposed snapsh o t V D c a n b e r e a d / w r i t t e n , a n d t h e s i z e i s t h e maximum capacity for writing. 8. Attach a LUN to the snapsho[...]
-
Page 92
92 Figure 5.4.2.1 (Figure 5.4.2.1: It will take snapshots every month, and keep the last 32 snapshot copies.) Tips Daily snapshot will be ta ken at every 00:00. Weekly snapshot will be taken every Sunday 00:00. Monthly snapshot will be take n every first day of month 00:00. 5.4.3 Rollback The data in snapshot VD ca n rollback to origina l VD. Pleas[...]
-
Page 93
93 5.4.4 Snapshot constr aint D-LINK snapshot function applie s Copy -on-Write technique on UDV/VD and provides a quick and efficient backup meth odology. When taking a snapshot, it does not copy a ny data at first time until a request of data mo dification comes in. Th e snapshot copies the original data to snapshot spa ce and then overwrites the [...]
-
Page 94
94 On Linux and UNIX platform, a command named sync can be used to make the operating system flush data from write caching into disk. For Windows platform, Microsoft a lso provides a tool – sync , which can do exactly the same thing as the sync command in Linux/UNIX. It will tell the OS to flush the data o n de mand. For more detail about sync to[...]
-
Page 95
95 When a snapshot has b een rollbacked, the othe r snapshots which are earlier than it will also be removed. But the rest snapshots will be kept after rollback . If a snapshot has been deleted, the other snapshots which are earlier than it will also be deleted. The s pace occupied by these snapshots wi ll be released after deleting. 5.5 Disk roami[...]
-
Page 96
96 Figure 5.6.1 2. Create two virtual disks (VD) “SourceVD_R5” and “TargetVD_R6”. The raid type of backup target needs to be set as “BACKUP” . Figure 5.6.2 3. Here are the objects, a Source VD and a Target VD. Before starting clone process, it needs to deploy the VD Clone rule first. Click “Configuration” . Figure 5.6.3 4. There are[...]
-
Page 97
97 Figure 5.6.4 Snapshot space: Figure 5.6.5 T h i s s e t t i n g i s t h e r a t i o o f s o u r c e V D a n d s n a p s h o t s p a c e . T h e d e f a u l t r a t i o i s 2 t o 1 . It means when the clone proc ess is starting, the system will automatically use the free RG space to create a snapshot space which capacity is do uble the source[...]
-
Page 98
98 Restart the task an hour later if faile d: (The setting will be effective after enabling schedule clone) Figure 5.6.7 When running out of snapshot s pace, the VD clone pro cess will be stopped because there is no more available snapshot space. If this option has been checked, system will clear the snapshots of cl one in order to release snap[...]
-
Page 99
99 Figure 5.6.9 7. Now, the clone target “Tar getVD_R6” has been set. Figure 5.6.10 8. Click “Start clone” , the clone process will start. Figure 5.6.11 9. The default setting will create a snapshot space automatically wh ich the capacity is double size of the VD space. Before starting clone, syst em will initiate the snapshot space.[...]
-
Page 100
100 Figure 5.6.12 10. After initiating the snapshot sp ace, it will start cloning. Figure 5.6.13 11. Click “Schedule clone” to set up the cl one by schedule. Figure 5.6.14 12. There are “Set Clone schedule” and “Clear Clone schedule” in this page. Please remember that “Threshold” and “Restart the task an hour later if failed” op[...]
-
Page 101
101 Figure 5.6.15 Run out of snapshot space while VD clone While the clone is processing, the increment data of this VD is over th e snapshot space. The clone will complete, but the clone snapshot will fail. Next time, when trying to start clone, it will get a w arning message “This is not enough of snapshot space for the operation”. At thi[...]
-
Page 102
102 Figure 5.6.16[...]
-
Page 103
103 5.7 SAS JBOD expansion 5.7.1 Connecting JBOD D-LINK controller suports SAS JBOD expansion to connect extra SAS dual JBOD controller. When connecting to a dual JB OD which can be detected, it will be displayed in “Show PD for:” of “/ Volume configuration / Physical disk” . For example, Local, JBOD 1 ( D- LINK DSN-6020 ), JBOD 2 ( D-LINK [...]
-
Page 104
104 Figure 5.7.1.2 Figure 5.7.1.3 “/ Enclosure management / S.M.A.R.T.” can display S.M.A. R.T. information of all PDs , including Local an d all SAS JBODs. Figure 5.7.1.4 (Figure 5.7.1.4: Disk S.M.A.R.T. information of JB OD 1, alt hough S.M.A.R.T. supports SATA disk only.)[...]
-
Page 105
105 SAS JBOD expansion has some constrai nts as described in the followings: 1 User could create RAID group among multiple chassis, max numb er of disks in a single RAID group is 32. 2 Global spare disk can support all RAID groups which locate d in the different chassis. 3 When support SATA drives for the redund ant JBOD model, the bridge boar d is[...]
-
Page 106
106 5.8 MPIO and MC/S These features come from iSCSi initiator. They ca n be setup from iSCSI initiator to establish redundant paths f or sending I/ O from the initiator to the target. 1. MPIO: In Microsoft Windows server base sy stem, Microsoft MPIO driver allows initiators to login multiple sessions to th e same tar get and ag gregate the duplica[...]
-
Page 107
107 Figure 5.8.2 Difference: MC/S is implemented on iSCSI level, while MPIO is implemented on the higher level. Hence, all MPIO infrastructures are shared among all SCSI tr ansports, including Fiber Channel, SAS, etc. MPIO is the most common usage across all OS vendor s. The primary difference between these two is which level the redundancy is main[...]
-
Page 108
108 5.9 Trunking and LACP Link aggregation is the techni que of taking several distinct Ethernet links to let them appear as a single link. It ha s a larger bandwidth and pro vid es the fault tolerance ability. Beside the advantage of wide bandwidt h, the I/O traffic remains op erating until all physical links fail. If any link is r estored, it wil[...]
-
Page 109
109 Figure 5.9.2 Caution Before usin g trunkin g or LACP, he g i g abit switch must support trunk in g or LACP and enabled. Otherwis e, host can not connect the li nk with stor a g e device. 5.10 Dual controllers (only for DSN-6420) 5.10.1 Perform I/O Please refer to the following topology and have all the conn ections ready. To perform I/O on dual[...]
-
Page 110
110 Figure 5.10.1.1 5.10.2 Ownership When creating RG, it will be assigned with a prefered owner, the default owner is controller 1. To change the RG owne rship, please fo llo w the procedures. 1 Select “/ Volume configuration / RAID group” . 2 Check the gray button next to the RG name; click “Set preferred owner” . 3 The ownership of the R[...]
-
Page 111
111 Figure 5.10.2.2 (Figure 5.10.2.2: The RG ownership is changed to the other controller.) 5.10.3 Controller status There are four statuses described on the following. It can be found in “/ System maintenance / System information” . 1. Normal: Dual controller mode. Both of controllers are functio nal. 2. Degraded: Dual controller mode. When on[...]
-
Page 112
112 5.11 Replication Replication function will help users to replicate data easily through LAN or WAN from one IP SAN storage to another. The procedures of Replicat ion are on the following: 1. Copy all data from source VD to t arg et VD at the begi nning (ful l copy). 2. Use Snapshot technology to perform the incremental copy afterwards. Please be[...]
-
Page 113
113 3. If you want the replication port to be on s pec ial V LAN s ect ion, you may assign VLAN ID to the replication port. The setting will auto matically duplicate to the other c ontroller. Create backup virtual disk on the target IP SAN storage 1. Before creating the replication job on the so urce IP SAN storage, user has to create a virtual[...]
-
Page 114
114 Figure 5.11.4 Create replication job on the source IP SAN storage 1. If the license key is activated on the IP SAN storag e correctly, a new Replication tab will be added on the Web UI. Click “Create” to create a new replication job. Figure 5.11.5 2. Select the source virtual disk which will be replicated to th e target IP SAN storage a[...]
-
Page 115
115 Figure 5.11.7 4. The Replication uses standard iSCSI protocol for data replication. User has to log o n the iSCSI node to create th e iSCSI connection for the da ta transmission. Enter the CHAP information if necessary and select the target node to log no. Click “Next” to continue. Figure 5.11.8 5. Choose the backup virtual disk and click ?[...]
-
Page 116
116 Figure 5.11.9 6. A new replication job is created and listed on the Replication page. Figure 5.11.10 Run the replication job 1. Click the “OP.” button on the replication jo b to open operation menu. Click “Start” to run the replication job. Figure 5.11.11 2. Click “Start” again to confirm the execution of th e replication job.[...]
-
Page 117
117 Figure 5.11.12 3. User can monitor the replication job from the “Status” information and the progress is expressed by percentage. Figure 5.11.13 Create multi-path on the replication job 1. Click the “Create multi-path” in the operation menu of t he replication job. Figure 5.11.14 2. Enter the IP of iSCSI port on contro ller 2 of the[...]
-
Page 118
118 Figure 5.11.15 3. Select the iSCSI node to log on and click “Next” . Figure 5.11.16 4. Choose the same target virtual disk and click “Next” .[...]
-
Page 119
119 Figure 5.11.17 5. A new target will be added in this re plication job as a redundancy path. Figure 5.11.18 Configure the replication job to run by schedule 1. Click “Schedule” in the operation menu of the replication job. Figure 5.11.19[...]
-
Page 120
120 2. The replication job can be scheduled to run by hour , by day, by week or by month. The execution time can be co nfigurable per user’s need. If the scheduled time of execution is arrived but the pervious repl ication job is stilling going, the scheduled execution will be ignored once. Figure 5.11.20 Configure the snapshot space The Repl[...]
-
Page 121
121 Figure 5.11.21 There are three settings in the Replication configuration menu, Figure 5.11.22 “Snapshot space” specifies the ratio of snapshot space allocate d to the source virtual disk automatically when the snap shot space is not configured in advance. The default ratio is 2 to 1. It means when the replicatio n job is c reating, the IP S[...]
-
Page 122
122 5.12 VLAN VLAN (Virtual Local Area Network) is a lo gical grouping mechanism implemented on switch device using software rather than a hardware solution. VLAN s are collections of switching ports that comp rise a single broadcast domain. It allows network traffic to flow more efficiently within these logical subgrou ps. Please consult your netw[...]
-
Page 123
123 Figure 5.12.2 4. VLAN ID 66 for LAN2 is set properly. Figure 5.12.3 Assign VLAN ID to LAG(Trunking or LACP) 1. After creating LAG, press “OP” button next to the LAG, and sel ect “Set VLAN ID”. Figure 5.12.4 2. Put in the VLAN ID and click ok. VL AN ID of LAG 0 is properly set.[...]
-
Page 124
124 Figure 5.12.5 3. If iSCSI ports are assigned with VLAN ID before creati ng aggregation takes place , aggregation will remove VLAN ID. You need to repeat step 1 and st ep 2 to set VLAN ID for the aggregation group. Assign VLAN ID to replication port Please consult figure 5.11.3 of 5. 11 Replication section for details. Always make sure c[...]
-
Page 125
125 Chapter 6 Troubleshooting 6.1 System buzzer The system buzzer features are listed below: 1. The system buzzer alarms 1 second when system boots up successfully. 2. The system buzzer alarms conti nuously wh en there is error o ccurred. The alarm will be stopped after error resolved or be muted. 3. The alarm will be muted automatically when the e[...]
-
Page 126
126 ERROR SATA PRD mem fail Failed to init SATA PRD memory manager ERROR SATA revision id fail Failed to get SATA revi sion id ERROR SATA set reg fail Failed to set SATA register ERROR SATA init fail Core failed to initialize the SATA adapter ERROR SATA diag fail SATA Adapter diagnostics failed ERROR Mode ID fail SATA Mode ID failed ERROR SATA chip[...]
-
Page 127
127 RMS events Level Type Description INFO Console Login <username> login from <IP or serial console> via Co nsole UI INFO Console Logout <username> logout from <IP or serial console> via Console UI INFO Web Login <username> login from <IP> via Web UI INFO Web Logout <username> logout from <IP> vi[...]
-
Page 128
128 ERROR VD move failed Failed to complete move of VD <name>. INFO RG activated RG <name> has been manually activated. INFO RG deactivated RG <name> ha s been manually deactivated. INFO VD rewrite started Rewrite at LBA <address> of VD <name> starts. INFO VD rewrite finished Rewrite at LBA <a ddress> of VD <n[...]
-
Page 129
129 INFO VD erase started VD <name> starts erasing process. Snapshot events Level Type Description WARNING Snap mem Failed to allocate sn apshot memory for VD <name>. WARNING Snap space overflow Failed to allocate snapshot space f or VD <name>. WARNING Snap threshold The snapshot space th resh old of VD <name> has been r[...]
-
Page 130
130 INFO PD upgrade started JBOD <name> PD [<string>] starts up grading firmware process. INFO PD upgrade finished JBOD <name> PD [<string>] finished upgrading firmware process. WARNING PD upgrade failed JBOD <name> PD [<string>] upgrade firmware failed. INFO PD freed JBOD <name> PD <slot> has been fr[...]
-
Page 131
131 System maintenance events Level Type Description INFO System shutdown System shutdown. INFO System reboot System reboot. INFO System console shutdown System shutdown from <string> via Console UI INFO System web shutdown System shutdown from <string> via Web UI INFO System button shutdown System shutdown via power button INFO Sys[...]
-
Page 132
132 Level Type Description INFO VD clone started VD <name> starts cloning process. INFO VD clone finished VD <name> finished cloning process. WARNING VD clone failed The cloning in VD <name> failed. INFO VD clone aborted The cloning in VD <name> was aborted. INFO VD clone set The clone of VD <name> has been designated.[...]
-
Page 133
133 Appendix A. Certification list iSCSI Initiator (Software) OS Software/Release Number Microsoft Windows Microsoft iSCSI Software Initiator Release v2.08 System Requirements: 1. Windows 2000 Server with SP4 2. Windows Server 2003 with SP2 3. Windows Server 2008 with SP2 Linux The iSCSI Initiators are different for different Linux Kernels. 1. [...]
-
Page 134
134 D-Link All D-Link Mana ged Gigabit Switches Avago AFBR-703SDZ (10 Gb/s SFP transceiver, 850nm) Finisar FTLX8571D3BCV (10 Gb/s SFP tran sceiver, 850nm) 10GbE Switch Vendor Model Dell PowerConnect 8024F (24x SFP+ 10Gb with 4x Combo Ports of 10GBASE-T) HP ProCurve 2910al-24G J9145A (4x 10GbE J9149A CX4 Ports, 24x 10/100/1000 Ports) BLADE RackS[...]
-
Page 135
135 Vendor Model Hitachi Deskstar 7K250, HDS722580VLSA80, 80GB, 7200RPM, SA TA , 8M Hitachi Deskstar E7K500, HDS725050K LA360, 500GB, 7200RPM, SATA II, 16M Hitachi Deskstar 7K80, HDS728040PLA320, 40GB, 7200RPM, SATA II, 2M Hitachi Deskstar T7K500, HDT725032V LA360, 320GB, 7200RPM, SA TA II, 16M Hitachi Deskstar P7K500, HDP725050GLA 360, 500GB, 7200[...]
-
Page 136
136 Vendor Model Seagate Constellation, ST9500530N S, 500GB, 7200RPM, SATA 3.0Gb/s, 32M (F/W: SN02) B. Microsoft iSCSI initiator H e r e i s t h e s t e p b y s t e p t o setup Microsoft iSCSI Initiator. Please visit Microsoft website for latest iSCSI initiator. This example is based on Microsoft Windows Server 2008 R2. Connect 1. Run Microsoft[...]
-
Page 137
137 Figure B.2 Fi gure B.3 4. It can connect to an iSCSI disk now. MPIO 5. If running MPIO, please continue. 6. Click “Discovery” tab to connect the second path. 7. Click “Discover Portal” . Input IP address or DNS name of the t arget.[...]
-
Page 138
138 Figure B.4 Fi gure B.5 8. Click “OK” . Figure B.6 Fi gure B.7[...]
-
Page 139
139 9. Click “Targets” tab, select the second path, and then cl ick “Connect” . 10. Enable “Enable multi-path” checkbox. Then click “OK” . 11. Done, it can connect to an iSCSI disk with MP IO. MC/S 12. If running MC/S, please continue. 13. Select one target name, click “Properties…” . 14. Click “MCS…” to add addition[...]
-
Page 140
140 Figure B.10 Fi gure B.11 17. Select Initiator IP and Target portal IP, a nd then click “OK” . 18. Click “Connect” . 19. Click “OK” . Figure B.12 Fi gure B.13 20. Done.[...]
-
Page 141
141 Disconnect 21. Select the target name, click “Disconnect” , and then click “Yes” . Figure B.14 22. Done, the iSCSI device disconne ct successfully.[...]
-
Page 142
142 C. From single controller to dual controllers This SOP applies to upgrad ing from DSN-6110 to DSN-6120 as well as from DSN-6410 to DSN-6420. Before you do this , please make sure that either DSN-6110 or DSN-6410 is properly installed according to the manual s, especially the H DD trays. If you are NOT using SAS hard drives , you need to use HDD[...]
-
Page 143
143 Please follow the steps below to upgrade to dual contr oller mode. Step 1 Go to “MaintenanceSystem”. Copy the IP SAN storage serial num ber. Step 2 Go to “MaintenanceUpgrade” and paste the serial number into “Controller Mode” section. Select “Dual” as operation mode.[...]
-
Page 144
144 Step 3 Click “confirm”. The system w ill ask you to shutdown. Please shut down IP SAN storage. Click Ok.[...]
-
Page 145
145 Go to “MaintenanceReboot an d shutdown”. Click “Shut down ” to shutdown the system. Click Ok.[...]
-
Page 146
146 Step 4 Power off DSN-6110 or DSN-6410. In sert the second controller to the IP SAN storage. And then power on the system. Th e IP SAN storage should now become in dual controller mode as either DSN-6120 or DSN-6420. You may go to “MaintenanceSy stem information” to check out. The IP SAN storage is running in dual controller mode now.[...]