Ir para a página of
Manuais similares
-
Server
Origin Storage N8800+
168 páginas -
Server
Origin Storage Thecus N8810U-G
215 páginas -
Server
Origin Storage N12000
214 páginas -
Server
Origin Storage Thecus N2560
135 páginas -
Server
Origin Storage N7700+
149 páginas -
Server
Origin Storage Thecus N7510
155 páginas -
Server
Origin Storage Thecus N4560
135 páginas -
Server
Origin Storage N2200-2000
98 páginas
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Origin Storage Thecus N2560. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoOrigin Storage Thecus N2560 vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Origin Storage Thecus N2560 você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual Origin Storage Thecus N2560, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual Origin Storage Thecus N2560 deve conte:
- dados técnicos do dispositivo Origin Storage Thecus N2560
- nome do fabricante e ano de fabricação do dispositivo Origin Storage Thecus N2560
- instruções de utilização, regulação e manutenção do dispositivo Origin Storage Thecus N2560
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Origin Storage Thecus N2560 não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Origin Storage Thecus N2560 e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Origin Storage na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Origin Storage Thecus N2560, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Origin Storage Thecus N2560, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Origin Storage Thecus N2560. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
U ser ’ s Manual N2520/N2560/N4 520/N4560 Series[...]
-
Página 2
ii Copyright and T r ademark No tice C opyright and T r ademark Notice Thecus and other name s of Thecus produc ts are registered trademar ks o f Thecus T echnolog y Corp. Microsof t, Windows, and the Windows lo go are registered trademarks o f Microso ft Cor poration. Apple, i T unes and Apple OS X are registered trademar ks of A pple Computer[...]
-
Página 3
iii Safet y Warnings Safety W arnings F or your sa fety, please read and follow the following safet y w arnings: Read this manual thoroughly before attempting to set up your Thecus IP stora ge . ¾ Y our Thecus IP storage is a complicated elec tronic device. DO NOT at tempt to re - Thecus IP storage is a complicated elec tronic device. DO NOT a[...]
-
Página 4
iv T able of Contents T able of C ontents C opyright and T rademark Notice . ............................................... ii About This Manual. ...................................................................... i i Limited W arran t y . ........................................................................ i i Sa fet y W arnings. .....[...]
-
Página 5
v T able of Contents 3.3.13 F actor y De fault. .......................................................................................................... 2 7 3.3.14 Po wer Management. ................................................................................................ 28 3.3.15 F ile System Check . .....................................[...]
-
Página 6
vi T able of Contents 3.6.13 Auto Thumbnail. ........................................................................................................ 82 3.6.14 ThecusID. ...................................................................................................................... 83 3.7 Application Ser ver . ................................[...]
-
Página 7
vii Chapter 1: I ntroduction Chapter 1: Intr oduc tion § Over view 1 .1 Thank you for choosing the Thecus IP Storage Ser ver . The Thecus IP storage is an easy-to -use storage ser ver that allows a dedica ted approach to stor ing and distr ibuting data on a net work . Data reliabil - it y is ensured with RAID features tha t provide data securit y [...]
-
Página 8
viii Chapter 1: I ntroduction F ront Panel 1 .3 N2520/N2560: • The Thecus N2520/N2560 ’ s front panel shows the de vice’ s indicators and hard disk inst all slots: Fr ont P anel Item Description 1. HDD1 LED Blinking white: HD D activity Red: HDD failu re 2. HDD2 LED Blinking white: HD D activity Red: HDD failu re 3. LAN LED Solid white: LAN C[...]
-
Página 9
ix Chapter 1: I ntroduction N4520/N4560: • The Thecus N4520 /N4560 front p anel show s the de vice’ s indicator s, s ystem informa tion and hard disk tray s: Fr ont P anel Item Description 1. Power LED Solid blue: Power on 2. System statu s Blinking orange: Diagnostic mode k ick-in Solid orange: Diagnostic c ompleted 3. LAN LED Gr een : Net wor[...]
-
Página 10
x Chapter 1: I ntroduction Rear Panel 1 .4 N2520/N2560: • The N252 0/N2560 rear pan el features por ts and connectors . Back Panel Item Description 1. System F an System fan that exhausts heat from the unit. 2. HD MI F or Video/ Audio out 3. SPDIF For Audio out 4. LAN Po r t LAN por t for conne cting to an Etherne t net work through a switch or a[...]
-
Página 11
xi Chapter 1: I ntroduction N4520/N4560: • The N4520/N4 560 rear pane l features por ts and connectors . Back Panel Item Des cription 1. System F an Sy stem fan that exhausts heat from the unit. 2. USB Por ts USB 2.0 por t for compatible USB de vices, such as digital cameras, USB disks, and USB pr inters. 3. LAN P or t L AN por t for connec ting [...]
-
Página 12
12 Chapter 2: Hardware I nstallation Chapter 2: Har dware Installation § O ver v iew 2. 1 Yo u r Thecus IP s torage is designed for easy installation. T o help you ge t st ar ted, the following chapter will help you quick ly ge t your Thecus IP stor age up and running. Please read it c arefully to pre vent damaging your unit during inst allation. [...]
-
Página 13
13 Chapter 2: Hardware I nstallation P ress the power button on the F ront P anel to boot up the Thecus IP storage . 3. N2520/N2560 pow er button S N4520/N4560 power button S[...]
-
Página 14
14 Chapter 3: Sy stem Administration Chapter 3: S yst em Administr ation § Over view 3 .1 The Thecus IP storage provides an easily acce ssible Web Administration I nter face. With it, you can configure and moni tor the Thecus IP s torage any where on the net work . W eb Admin istration Inter f ace 3. 2 Mak e sure your net work is connec ted to th[...]
-
Página 15
15 Chapter 3: Sy stem Administration Add Shor tcut 3. 2.1 The user inter face wi th “ Add Shor tcut ” shor tcut allows the user to designate o ften use d items and have them display on the main screen area. The figure below displays sy stem add shor tcut funct ions. Administr ator s c an add or remove add shor tcut func tion s to M y F avorite[...]
-
Página 16
16 Chapter 3: Sy stem Administration Message Bar 3. 2.3 Y ou can ge t quick information about your sys tem status by moving your mouse over these icons. Me ssage Bar Item Status Description RAID M anagement Display the s tatus of created RAID volume. Click to go to RAID Management page a s shor t cut. Disks I nformation Display the status of disks [...]
-
Página 17
17 Chapter 3: Sy stem Administration Language S elec tion 3 .2.6 The Thecus IP stora ge suppor ts multiple Languages, including: English Japanes e T radi tional Chinese Simplified Chinese F rench German I talian K orean Spanish Russian Po li s h P or t uguese On the menu bar , click L anguage and t h[...]
-
Página 18
18 Chapter 3: Sy stem Administration Sy stem/ Ser vice Status 3.3 .2 F rom the System Management categor y,, choose the Status item, S ystem S er vice Status and HW S ta- tatus ite m, System Ser vice Status and HW Sta- item, System Ser vice Status an d HW Sta- Ser vice Status and HW Sta- and HW Sta- HW Sta- Sta - tus sc reens appear . These screens[...]
-
Página 19
19 Chapter 3: Sy stem Administration Expor t log option This can be set to A uto Export or Aut o Delete . Log Type The def ault logs displayed are for system e vents. Fr om the dropdown list, administrators can choose from various forms o f user access, such as AFP , Samba, e tc. Note: Users need to enable the “User Access Log ” ser vice to vie[...]
-
Página 20
20 Chapter 3: Sy stem Administration Use r A ccess Log 3.3 .5 The Us er Acc ess Log Suppor t sec tion allows administra tors to selec t the desired protoc ols to record user activ ity for . User Access Log User Access Log Item Description User access log Enable or disable the User Access Log service. Folder Select from the dropdown list where to st[...]
-
Página 21
21 Chapter 3: Sy stem Administration T o e xpor t det ails f rom the User Acc ess Log as a single f ile from target folder, administrator s mus t first selec t the desired number of rec ords f rom the dropdown list and also selec t the “ Auto expor t ” option. Please choose the number of logs e xpor t and click “ Apply ” to acti vate the s[...]
-
Página 22
22 Chapter 3: Sy stem Administration Congura tion with syslog client and target to s tore remotely : • See the following table for a detailed des cription of each item: Syslog Management Item Description Syslog D aemon Enable/Disable syslog daemon . Syslog ser vice If S er ver has been selected then ass ociated syslog folder will be used to st[...]
-
Página 23
23 Chapter 3: Sy stem Administration Sy stem Monitor 3. 3.7 The sy stem monitor i s capable to monitor s ystem st atus includ ing C PU/memor y utilization, networ k throughput and on-line user list in var ious proto cols. T o monitor sy stem s tatus, simply click on “ System M onitor ” f rom the tree menu and the screen will appear as below . I[...]
-
Página 24
24 Chapter 3: Sy stem Administration F or the on- line user s list, sy stem monitor will display the on-line users and the share folder they have visited . System Moni tor Item Description Save Layout Saving selecte d monitoring items. Layout will remain the same for fu ture visits. Reset Layout Set back to default monitoring se ttings and layout .[...]
-
Página 25
25 Chapter 3: Sy stem Administration Date an d T ime : S etting system t ime 3.3 .8 F rom the Sy stem M anagement categor y , choos e the Date and Time item and the Date and Time screen appears. S et the de sired Date, Time, and Time Zone. Y ou can also elec t to s ynchronize the sys - tem time on Thecus IP stor age wi th an NTP (Net work Time Prot[...]
-
Página 26
26 Chapter 3: Sy stem Administration Scheduled On/O 3.3 .1 0 Using the The cus IP stor age Sy stem Management, you c an save energy and money by sche duli ng the Thecus IP stora ge to tu rn itself on a nd off duri ng certain ti mes of the da y. F rom the System Management categor y, choose the S cheduled On/ O ff item and the Scheduled On/ O ?[...]
-
Página 27
27 Chapter 3: Sy stem Administration Admi nistrator Password 3.3 .1 1 F rom the Sy stem Management categor y , choose the Administra tor Password item and the C hange Administrator P assword screen appears. Enter a new pass word in the New Password box and con - firm your new password i n the Confi rm Passwo rd box. Pr ess Apply to confirm passw[...]
-
Página 28
28 Chapter 3: Sy stem Administration Resetting to factor y def aults will not erase the data s tored in the hard disks, but WILL rever t all the settings to the f actor y def ault values P ower Management 3.3 .1 4 F rom the Sys tem Management categor y , choose P ower Management item, and the Shutdown/R e - boot System screen appears . Pre ss R ebo[...]
-
Página 29
29 Chapter 3: Sy stem Administration Once you click Nex t, you will see the following screen: Click Star t to begin the file system check. Click Reboot to reboot the s ystem. When the file sy stem check is running, the sy stem w ill show 20 lines of infor mation until it is com - plete. Once complete, the results will be shown at the bo ttom.[...]
-
Página 30
30 Chapter 3: Sy stem Administration The system must be rebooted before Thecus IP storage can func tion normally af ter le system check completes. W ak e -Up On LAN ( WOL) 3.3 .1 6 The Thecus IP stora ge has the abilit y to be awok en f rom sleep mo de via LAN por t . F rom the System Management c ategor y, choose the W OL item, and the W ak e -[...]
-
Página 31
31 Chapter 3: Sy stem Administration UI Login F unc tion 3.3 .1 8 Adjusts UI Login Configurati on se ttings, you can enable/disable t he W eb Disk , Photo S er ver an d modules f unctions, according to your nee ds. Network ing 3.3. 19 F rom the System M anagement cate gor y , choo se Net work ing, and the Net work ing C onfigur ation screen appears[...]
-
Página 32
32 Chapter 3: Sy stem Administration Netmask/Prefix Length I nput net mask for IPv4 and Pr efix len gth for IPv6. Gate way Gate way for associate NIC . Def ault gate way It can be chose n from a d r o p d o w n l i s t o f d e f a u l t g a t e w a y tha t’ s been used for the The cus IP storage. Only use Jumbo Frame se ttings when operating in[...]
-
Página 33
33 Chapter 3: Sy stem Administration Disks Information Item Description Di sk N o. Indicates disk location. Capacity Shows the SA T A hard disk capacity. Model Displays the SA T A hard disk model name. Firmware Shows the SA T A hard disk firmware version. Bad Block scan Y es to star t scan Bad Block. S.M.A.R.T . In formation • On the Disk I nfor[...]
-
Página 34
34 Chapter 3: Sy stem Administration S.M.A.R.T . Information Item De scription T r ay Number T ray the hard disk is inst alled in. Model Model name of the installed hard disk . Power ON Hours Count of hours in power-on st ate. T he r aw value of this attribute show s total count of hours (or min - utes, or seconds, depending on manufac turer) in po[...]
-
Página 35
35 Chapter 3: Sy stem Administration The bad block scan can be termin ated by click ing on “ Stop Detec t Bad Block ” . RAID Management 3.4 .2 F rom the Storage categor y , c hoose the RAID M anagement item and the RAID Management screen appear s. This screen list s the RAID volumes currently residing in the Thecus IP storage. F rom this s cree[...]
-
Página 36
36 Chapter 3: Sy stem Administration Di sk N o. Number assig ned to the installed har d disks. Capacity (MB) Capacity of the instal led hard disks. Model M odel nu mber of the install ed hard disks. Status Status of the installed hard disks. Used If this is check ed, current hard disk is aalready par t of a RAID volume . Spare If this is check ed, [...]
-
Página 37
37 Chapter 3: Sy stem Administration In a multiple R AID conguration, one RA ID volume must be designated as th e Maste r RAID volume. The M aster R AID volum e will s tore all installed modules. I f the Master RAID is changed to another loc ation (i.e. assigning volume 2 to be the Master R AID volume after volume 1 had been previously assigned)[...]
-
Página 38
38 Chapter 3: Sy stem Administration Please keep your USB disk in a safe place and also backup the encr ypte d k e y. Th ere is no wa y to rescu e data back if th e key is lost. With R AID volume encr yption enabled, the system per formance will go down. RAID volumes with encr ypt ion enabled w ill be displayed with a k ey lock symbol ne xt to volu[...]
-
Página 39
39 Chapter 3: Sy stem Administration P ress “ Ye s ” for R AID volume creat ion preparation. Then click “ Finish ” to star t up with RAID 1 0. volume building. Building a RAID volume may be time consuming, depending on the size of hard drives and R AID mode. In general, if the R AID volume building process is up to “RAID Building ” , th[...]
-
Página 40
40 Chapter 3: Sy stem Administration Level Model JBOD RAID 0 RA ID 1 RAID 5 RAID 6 RA ID 10 N2520/ N2560 N4520/N4560 RAID configura tion is usually required only when you first se t up the de vice. A br ief des cription of each RAID setting fol lows: RA ID Le vels Level Description JBOD The st orage vol ume is [...]
-
Página 41
41 Chapter 3: Sy stem Administration[...]
-
Página 42
42 Chapter 3: Sy stem Administration Remove R AID • Click to remove the R AID volume . All user data and iSCSI crea ted in the selec ted RAID volume wil l be deleted. To remove a RAID volume, follow the steps b elow : On the RAID List screen, select the RAID volume by clic k ing on its radio button, and cli ck RAID 1 . Infor mation to open the RA[...]
-
Página 43
43 Chapter 3: Sy stem Administration Migrating a RA ID (Dose not apply to the N2520/N2560 ) • Once a RAID volume has been created, you may want to move it to other physical dri ves or change the R AID array a ll tog ether . T o m igrat e a RAID 1, RAI D 5 or RAI D 6 volume, follow the steps below : F rom the R AID Configuration screen, click M i[...]
-
Página 44
44 Chapter 3: Sy stem Administration Migrating a R AID volume could tak e several hours to complete. • The RAID migration feature is available only when it is congurable. • Here is a list of limitation with RAID leve l migration function : During RAI D le vel m igration, it is not permitted to reboo t or shutdown system. 1 . Fo r RAID migrat[...]
-
Página 45
45 Chapter 3: Sy stem Administration NAS Stacking (N4520/N 4560 Only) 3.4 .3 The Thecus IP storage ’ s cap acity can b e expande d even fur ther using the stack able func tion. With i t, users c an expand the capacit y of their net work storage s ystems up to 5 other s tack t arget volumes which are loc ated in different s ystems. These can b e [...]
-
Página 46
46 Chapter 3: Sy stem Administration Nex t, input the target IP address of the s tack able de vice and click the Discover y button. The system will list available target volume s fro m the input ted IP addr ess. Once the volume IP has b een set , you may nee d to input a valid user name and p assword to validate your access r ight s . I f there is [...]
-
Página 47
47 Chapter 3: Sy stem Administration F rom the figure above, the Stack ed T arget name i s “ pmmeeting” . The figures below show the result before and after via M icr osof t N et work A ccess w hen set ting s have been completed . The Browseable setting is the same me thod us ed for setting a sys tem share folder . I t desig nates whether or [...]
-
Página 48
48 Chapter 3: Sy stem Administration The Public setting will be set the same way as the set ting for the system share folder associated with the ACL per mission is . If Pu blic is set to Y es, all users will be able to access it, and ACL button will be gray ed out. I f Publ ic is set to No , the A CL button will be available in the Stack T arge t L[...]
-
Página 49
49 Chapter 3: Sy stem Administration With this new ly att ached stack t arget dev ice, you will see the infor mation displayed and also have access to s everal op tions to choose from . In general, if the at tached stack target device has been used by an other Thecus NAS as stack target volume , then the F ormat item will be display and system w il[...]
-
Página 50
50 Chapter 3: Sy stem Administration D . Stack T arget ACL If the stack target Public setting set to Ye s , then the ACL button will be grayed out. However , if P ublic setting is se t to No , then the ACL button wil l be av ailable for you to setup user acce ss per mission s for the stack tar get. The ACL setting s wi ll be ex actly the sa me as t[...]
-
Página 51
51 Chapter 3: Sy stem Administration ISO Image Mounting (N4520/N4560 Only) 3.4 .4 The ISO I mage M ounting feature is a ver y usef ul to ol f rom the Thecus product s. With it , users can mount an ISO file and hav e the expor t name display all the de tails f rom the mo unt ed I SO fil e. F rom the Control Panel , the IS O Image Mounting feature [...]
-
Página 52
52 Chapter 3: Sy stem Administration T o mount the ne w ISO file, selec t one file from the lis t of file s and inp ut the desired mounting name into the “ Mount as: ” field. Click “ ADD ” t o confir m the completion o f the mounting. I f nothin g i s inp ut in the “ Moun t as ” ISO file expor t name field , the system will autom[...]
-
Página 53
53 Chapter 3: Sy stem Administration iSCSI (N4520/N4560 Only) 3.4 .5 Y ou may spec ify the spa ce allocated for iSCSI. Se e the table below to the allowed iSCSI target num- See t he table below to the allowed iSCSI target num- S ee the table below to the allowed iSCSI target num- iSCSI t arget num- num - ber per system : Model N4520/N4560 Allow ed [...]
-
Página 54
54 Chapter 3: Sy stem Administration The Create iSCSI V olume scree n appears. Create i SCSI V olume Item Description iSCSI T arget Volume Enable or Disable the iSCSI T arget Volume . T arget Name Name o f the iSCSI T arget. This name will b e used by the S tack able NAS func tion to identif y this ex - por t share. iqn_ Ye a r Selec t the cur rent[...]
-
Página 55
55 Chapter 3: Sy stem Administration The iSCSI target volume creation will associate at least one L UN together . It can be assigned either “ Thin-Pro visioning” or “Inst ant Allocation ” . Enable the iSCSI T arget Vol ume by selec ting Enable. 2. Enter a T arget Name. This will be use d by the St ack able NAS func tion to identif y this ex[...]
-
Página 56
56 Chapter 3: Sy stem Administration Expand V olu me • The iSCSI vol ume is now able to expand it s capacity from unused space (Instant Allocation mode only). F rom the volume list , simply selec t the iSCSI volume you like to expand and click the Expand button: Y ou wil l then see the d ialog box displayed b elow . Drag the Expand Capa cit y bar[...]
-
Página 57
57 Chapter 3: Sy stem Administration Delete V olu me • To delete volume on the cur rent RAID volume, follow the steps below : Under the Volume Allocation List, click D elete . 1 . The Sp ace Alloc ation screen appears . P ress YES. All data in the volu me wil l be removed . 2. iSCSI Thin-Pr ovisioning • If i SCSI Thin-Provisioning is selec ted [...]
-
Página 58
58 Chapter 3: Sy stem Administration volume is available from the list. Please ref e r to the screensho t below. If creating an iSC SI t arget volume under “Instant A llocation ” , physic al memor y i s as sign to the target , being limited by the available memor y . F or the iSCSI target volume creat ed under “ thin-provision i n g ”, vir [...]
-
Página 59
59 Chapter 3: Sy stem Administration Nex t, input “ Initiator iqn ” and setup iSCSI target volume ac cess privilege s fro m the av ailable list . A pply by click ing the OK button. The ac cessible I nitiator will be listed as shown in the screen shot displaye d below . The listed “ Initiator iqn ” c an be modified or deleted by select ing [...]
-
Página 60
60 Chapter 3: Sy stem Administration iSCSI CRC /Checksum T o enable this option, the initiator c an connec t wi th “ Data digest ” and “ Header digest ” . Max Con nec tions The maximu m number of iSC SI connec tions . Error Recover y Level The Error R ecover y Level (ERL) is negot iated during a leading iSCSI connec tion login in t radition[...]
-
Página 61
61 Chapter 3: Sy stem Administration F ile Sharin g/Privilege 3.5 The Thecus IP storage has built-in user dat abase that allows administr ators to manage user ac cess using different gr oup policies. F rom the F ile Sharing/Privilege menu, you can crea te, modify, and de - F ile Shar ing/Privilege menu, you can create, modify, and de - menu, you c[...]
-
Página 62
62 Chapter 3: Sy stem Administration AD Domain Ex ample Item I nformation Work Group / D omain Name domain ADS Suppor t Enable ADS S er ver Name Computer1 ADS Realm D omain.local Administra tor ID Administrator Administra tor Password *********** The DNS server spe cified in the W AN/LAN1 configuration page • should be able to correc tly resolve [...]
-
Página 63
63 Chapter 3: Sy stem Administration All users are automatically assigned to the ‘ users’ gr oup. • Edit Users • Selec t an existing user f rom the Local User Configurat ion screen. 1 . Click on the Edit button, and the L ocal User Setting screen appea rs. 2. F rom here, you can enter a ne w pass word and re - enter to confirm, or use the[...]
-
Página 64
64 Chapter 3: Sy stem Administration Local Group C onguration 3. 5.3 F rom the File Sharing/Privilege c ategor y, choose the Group item, and the Local Group Configura tion screen appe ars. This sc reen allows you to Add, Edit, and R emove loc al groups. Local Group Conguratio n Item Description Add P ress the Add button to add a user to the [...]
-
Página 65
65 Chapter 3: Sy stem Administration Edit Group s • On the Local Group Configurati on screen, select a group name from the list. 1 . P ress the E dit but ton to modi fy the members in a gr oup. 2. T o add a user into a group, selec t the user from the Users Lis t, and press the << button to 3. move the user into the Members List. T o remov[...]
-
Página 66
66 Chapter 3: Sy stem Administration Shared F older 3.5 .5 F rom the Fi le Sharing /P r ivilege categor y , cho ose Shared Folder , and the Shared Folder screen ap - F ile Sharing/ P r ivilege categor y , choo se Shared Folder , and the Shared F older screen ap - ca tegor y , choos e Shared Folder , and the Shared F older screen ap - Shared Folder [...]
-
Página 67
67 Chapter 3: Sy stem Administration you to change folder information. Af ter en tering the information, press Apply to save your changes. Modify Folder Item Description F older Name Enter the name of the folder . Public Admit or deny public access to this folder . Apply Pr ess Apply to create the folder . Remove F older s • To remove a folder , [...]
-
Página 68
68 Chapter 3: Sy stem Administration NFS Share • T o allow NFS acc ess to t he share folder , enable the NFS S er vice, and t hen se t up hosts wi th access rights b y click ing Add. NFS Sh are Item Description Hostname Enter the name or IP address of the host Privil ege Hos t has eit her read only or wr iteable access to the folder . OS Suppor t[...]
-
Página 69
69 Chapter 3: Sy stem Administration Samb a Congurati on • On the F older screen, press the Samba but ton and the S amba Configuration s creen appear s. This screen allows you to setup samba c onfiguration for assoc iated folder . Af ter entering the informa tion, press Apply to ac tivate input settings. Samba Conguration Item Description[...]
-
Página 70
70 Chapter 3: Sy stem Administration A CL setting Item Description Deny Denies ac cess to us ers or grou ps who are displayed in this c olumn. Read Only P rovides R ead Only access to users or groups who are displayed in this c olumn. Writable Provides Write access to users or groups who are displayed in this column. Recursive Enable to inherit the[...]
-
Página 71
71 Chapter 3: Sy stem Administration The ACL can only be se t for share and sub- folders level, not for les. The ACL screen also allows you to s earch for a par ticular user . T o do this, follow the steps below : In the b lan k , enter the name of the user you would lik e to find. 1 . F rom the drop down select the grou p you would like to sea[...]
-
Página 72
72 Chapter 3: Sy stem Administration User and Group Back up 3. 5.7 The user and group b ackup feature allow sy stem user s and groups to be back ed up to an other location and be res tore d if needed. Ple ase no te, when resto rin g previous b ackup users and groups, the cur rent users and groups lis t will be replaced from t his r esto re fi le ?[...]
-
Página 73
73 Chapter 3: Sy stem Administration LDAP Suppor t (N4520/ N4560 Only ) 3. 5.8 The LDAP is another way to authenticate login users w ho have joined the LDAP ser ver . Y ou will need to fill in the LDAP ser ver informa tion to get LDAP authentic ation st ar ted. Please mak e sure that the LDAP ser ver has a Samba sa m and a POSIX Ob jectClass accou[...]
-
Página 74
74 Chapter 3: Sy stem Administration Network S er vice 3. 6 Use t he Net work Ser vic e c ategor y to mak e net work ser vic e suppor t sett ings. Samba / CIFS 3.6 .1 There are op tions allow Admin to Enable/Disable to operate Thecus IP storage ass ociated with Samba / CIFS protocol . With the option changed , it will need to reboot system to activ[...]
-
Página 75
75 Chapter 3: Sy stem Administration The Thecus IP stora ge is supp or ted rec ycle bin via SMB /CIFS protoc ol. Simply enable the “Rec ycle Bin ” f unction and “Rec ycle F older Display ” then all of deleted files/ folders will reside in the “_N AS_Re cycle _(Associate d RDID V olume)” share folder . F or e xample, the sy stem has cre[...]
-
Página 76
76 Chapter 3: Sy stem Administration AFP (Apple Network Se tup) 3.6 .2 F rom the Networ k S er vice categor y, choose the A FP item, and the A FP Suppor t sc reen appe ars. This screen displays the c onfiguration items for the Apple Fi ling Protocol. Y ou can change any of these items and press Apply to confirm your set tings. A de scription of e[...]
-
Página 77
77 Chapter 3: Sy stem Administration FTP 3.6 .4 The Thecus IP storage can ac t as an FTP ser ver , enabling us ers to download and upload files wi th their f avorite FT P programs. F rom the Net work S er vice ca tegor y, choo se the FT P i tem, and the FTP screen appe ars. Y ou can change any of these items and press Apply to c onfirm your sett [...]
-
Página 78
78 Chapter 3: Sy stem Administration A de scription of each item follows: T FTP Item Description TFTP Enables T FT P Ser vice on t he Thecus IP storage . NICs Checked W AN/L AN1 or LAN2 to enable por t use Por t Specifies the por t number of an incoming connec tion on a non-standard por t. Share Folder Selec t the file stored folder, it cann ot b[...]
-
Página 79
79 Chapter 3: Sy stem Administration Disable HT TP suppor t and Enable Secure HT TP support to guarantee secure access . UPnP S er vice 3 .6.7 This device suppor ts UPnP Media ser ver, which allows us ers to play media files with UP nP client ( ex. DMA devic es). Enable or disable Universal Plug and Play protocol. UPn P helps to find the IP addre[...]
-
Página 80
80 Chapter 3: Sy stem Administration DDNS 3. 6.1 0 T o se t up a ser ver on the I nternet and enable the users to c onnect to it easily, a fixed and e asy-to remember hos t name is of ten requir ed. However, if the ISP provides only dynamic IP address, the IP address of the ser ver will change from time to t ime and is difficult to recall. Y ou ca[...]
-
Página 81
81 Chapter 3: Sy stem Administration UPnP P or t Management 3 .6.1 1 One o f the mos t conven t way to allow user s to acc ess required ser vices such as FTP , SSH, web disk and http etc. f rom Inter net environment is set ting UPn P por t management . T o se t up this UPnP por t forw arding feature, please be sure that the router has “ UPn P Ser[...]
-
Página 82
82 Chapter 3: Sy stem Administration We b D AV 3 .6. 12 The W ebDA V is an ex tended protoc ol of http( s) which allows remote access to your NAS s ystem. T o be gin using W ebDA V and WebD A V SSL , simply click enable and provide the por t number . The default por t num ber is 9800 , unde r normal ci rcumstances this wil l not need to be chan ged[...]
-
Página 83
83 Chapter 3: Sy stem Administration ThecusID 3.6 .1 4 Creating a Thecus ID w ill give you full access to all that Thecus has to offer . Af ter creating a Thecus ID , you‘ll receive a f ree* DDNS (i.e“ yourname.thecuslink .com ” .) Y ou can use your DDNS to easily ac cess your NAS, make use of the mobile T - On TheGo™ app, and share links [...]
-
Página 84
84 Chapter 3: Sy stem Administration If you don ’t have a Thecus ID, click “Register ” and the screen below will appe ar . Please fill in the required information and click Apply . Register Thecus ID Item Description Thecus ID Input a valid email address. It will require conrmation to activate your Thecus ID . Password Input the password f[...]
-
Página 85
85 Chapter 3: Sy stem Administration Application Ser ver 3. 7 The Thecus IP storage supp or ts built-in application such as iTunes ser ver as well as a dd-on official or third -p ar t y app lications. iT unes® S er ver (Built in) 3. 7.1 With the built-in iT unes ser ver capabilit y , Thecus IP stor age enables digital music to be shared and played[...]
-
Página 86
86 Chapter 3: Sy stem Administration Add-on O cial Applications 3. 7.2 There are sever al default pre -loade d official applications such as WebDisk, Piczz a (Photo ser ver ) and T ra nsm iss ion- Kit (BT d own load ma nag er) th at ca n be fou nd fr om t he Ap pli cati on Se r ve r cate gory . 3rd par ty App Installation 3. 7.3 F rom the Applic[...]
-
Página 87
87 Chapter 3: Sy stem Administration Backu p 3. 8 The re ar e a num ber of ways to ba ck up data w ith the Thecus IP s torage . Rsync T arget Ser ver 3 .8.1 When it come s to back ing up your da ta, it ’ s ver y impor tant to have flexibility. Data guard provides you with many options, including full back up for all shares, custom back up for se[...]
-
Página 88
88 Chapter 3: Sy stem Administration Remote Data backup Item Description Add Add new task . Edit Edit selec t t ask. Remove Remove selec t task Star t If associated task has been setup in schedule and like to star t at once, click on to star t task right aw a y. Stop Stop the asso ciated running task. The other scenar io is if a task has been setup[...]
-
Página 89
89 Chapter 3: Sy stem Administration Remote Data backup Item Des cription F ull Backup The “ F ull back up ” will have all shares from source backup to destination. I t could also create shares automatically f rom destination if it is not existent. This only appl ies if the target ser ver is the s ame model as the sour ce. Custom Backup The “[...]
-
Página 90
90 Chapter 3: Sy stem Administration F ull B ackup • Click on full back up and the se tup screen appear as below. F ill in the remote target IP (De stination) and port (need to be change d only if this por t is already in use). If encr yp tion is required then enable it. Please mak e sure the associated target ser ver also has encr ypt ion enable[...]
-
Página 91
91 Chapter 3: Sy stem Administration -F ill out all the necessar y details and choose your parameters Add Rsync B ackup T ask Item Description T ask Name This is how this task will appear in the task list . Backup T ype Real time: I t w ill backup folder s/files from source to target on the fl y . On the other hand, any changes f rom the s ource [...]
-
Página 92
92 Chapter 3: Sy stem Administration F rom the task lis t, you can now s ee the ne wly added task “ fullb ack01 ” . The back up is setup as “ real time ” . F rom the status field, “ P rocessing ” can be read as the back-up is per formed on the fly . Custom Backup • The custom b ackup se tting is similar to the full back up. The only[...]
-
Página 93
93 Chapter 3: Sy stem Administration Click “ Nex t ” and more setting app ear s . Th ese ar e the as t he set tings for “ F ull backup ” 3. Click “ F inish ” and the data guard task will ap pear in the list as show n below. 4. F rom the task list , you can now se e the newly added “ customback01 ” . This back up is setup as “ sche[...]
-
Página 94
94 Chapter 3: Sy stem Administration iSCSI Backup • If the source unit contain s iSCSI volume, it can be back ed up t o the t arget uni t as a single file. The proc edure is the same as for t he pre vious “ F ull b ackup ” and “ Custom back up ” , selec t “ iSCSI backup ” from data guar d wizard. Inputs the share folder name of the t[...]
-
Página 95
95 Chapter 3: Sy stem Administration 4. Click “ F inish ” and the data guard task will appea r in the list as sho wn below. F rom the task list , you can now see the newly added “ iscsiback ” . This backup is setup as “ schedule ” . The source folder name will use iSCSI_+target volume name. So here it is displayed as “ iSCSI_pmtest ?[...]
-
Página 96
96 Chapter 3: Sy stem Administration This is a useful feature if the sy stem configuration ne eds to be re store d to a brand new unit . L e t ’s g o thru the following ex ample to see how it works . The original source system has 3 RAID volume , “ R AID ” , ‘ R AI D10 ” and “ RAID 20 ”, and has back ed up the system configuration s[...]
-
Página 97
97 Chapter 3: Sy stem Administration Click “ Nex t ” and a screen wil l app ear as show n below . I t has the listed available sy stem 3. configuration backup file s . Select the one you want and click nex t. Y ou also have the option to downloa d the current s ystem c onfiguration before restor ing fr om the backup file. Af ter click ing ?[...]
-
Página 98
98 Chapter 3: Sy stem Administration T he backup configuration has different numbers of RAID volume than the curren t sy ste m (3 5. vs 1). I t can be k ept as the RAID volume mapping arranged by t he system , then car r y on to click “ F inish ” . This me ans that all 3 RA ID volumes configuration such as share folder etc. will all rest ore[...]
-
Página 99
99 Chapter 3: Sy stem Administration Data Guar d (Local Backup) 3.8 .3 The Thecus product provides c omplete backup solution bet ween Thecus NAS s ystems as well as bet ween folders of local s ystem s . Remote Data backup Item Description Add Add a new task. Edit Edit selec t ed task . Remove Remove selec t ed task . Star t C lick on star t to star[...]
-
Página 100
100 Chapter 3: Sy stem Administration Local Data backup Item Description Impor t This is associated with ex ternal device s which are added to the system such as USB disk. Yo u can sele ct a folder f rom an ex ternal de vice and impor t it to t he NAS as a share folder . Copy Copy folder to folder or NAS folder to ex ternal device or exter nal de v[...]
-
Página 101
101 Chapter 3: Sy stem Administration impor t ed them to the NAS under the RAID60volume. Nex t, please selec t the path from the drop down list to save the log. Also , give the access permission whether these selecte d folders will be “ Public ” or no t af ter the impor t. Read the no tes and check the “ Accept ” box for confi r mation. I [...]
-
Página 102
102 Chapter 3: Sy stem Administration N o w, you will see in the data guard task list that you have cr eated a t ask . And th at the sy stem ha s created 2 ne w share folders from the task jus t crea ted. Copy : click on “ Copy ” and this screen appea r s. 2. 3 di fferent op tions c an be s elected, folder to folder , folder to ex ternal dev i[...]
-
Página 103
103 Chapter 3: Sy stem Administration F older to F older • F ol der t o exter nal devic e • External device to Folder •[...]
-
Página 104
104 Chapter 3: Sy stem Administration Let ’ s tak e “ Folder to E xter nal de vice ” as an e xample. I n the s ource pan e , s elect the d esired R AID volume and its associated folder list will appe ar ; same method i n the t arget pa ne for the associated ex ternal de vice. Selec t a folder f rom the so urce pan e which is going to be c opy[...]
-
Página 105
105 Chapter 3: Sy stem Administration Read the note s and check the “ Accept ” box for con firmation. N o w, you will see in the data guard task list that you have cr eated a t ask . Realtime Back up: click on “ Realti me Backup ” and this scree n wil l ap pear . 3. 2 di fferent options can be selec ted fr om , folder to folder , folder t[...]
-
Página 106
106 Chapter 3: Sy stem Administration Nex t, fill in the task name and related settings.[...]
-
Página 107
107 Chapter 3: Sy stem Administration Realtime Backup Item Description T ask Name Input the task name, length limited to 4~ 12 charac ters . Sync T ype Selec t “ I ncremental ” or “ Synchronize ” . Back up Symb olic Link Choose to back up symbolic link which is included in the source. Fil t e r The filter can be set to be execut e d only i[...]
-
Página 108
108 Chapter 3: Sy stem Administration Schedule Back up: click on “ Schedule B ackup ” an d this screen w ill. 2 differen t choices can be 4. selec ted fro m , folder to folder , folder to ex ternal dev ice. Let ’ s use “ F older to Ex ternal device ” backup for our example. F rom the NAS volume RAID in the S ource pane select the folder [...]
-
Página 109
109 Chapter 3: Sy stem Administration Read the note s and check the “ Accept ” box for con firmation. N o w, you will see in the data guard task list that you have cr eated a t ask . iSCSI Back up: click on “ iSCSI Ba ck up ” and scr een appear as below . 5. It can be backup to t wo diffe rent storage pool, iSCSI to fold er , iSCSI to ex [...]
-
Página 110
110 Chapter 3: Sy stem Administration Let ’ s take exam ple to have “ iSCSI to F older ” backup, from existed iSCSI volume “ iSCSI_iscsiv502 ” to volume RAID folder “ andy_local ” . The source pane lis ted “ iSCSI_iscs iv502 ” and “ iSCSI_is csiv50 ” where are iscsi volume has e xisted in this system with name “ iSCSI_+iscsi[...]
-
Página 111
111 Chapter 3: Sy stem Administration task list will have created task listed. T o st ar t the iSCSI volume back up , selec t the task and click “ St ar t ” from task bar . Once “ Start ” click , the associated iSCSI volume will not allow to I/O during backup processing . And the t ask s tatus w ill change to ‘ P rocessin g ” . States c[...]
-
Página 112
112 Chapter 3: Sy stem Administration iSCSI Import: click on “ iSCS I I mport ” and screen appear as below . 6. It can be impor ted from t wo different storage pools , folder to iSC SI or ex ternal dev ice to iSCSI. I t is depend on where iSCSI volume has b ackup to . Let ’ s t ake e xample to impor t “ RAID folder to iSCSI ” which is th[...]
-
Página 113
113 Chapter 3: Sy stem Administration Nex t, provide where the task log will store. Reading the note and check on “ Accept ” for confirma tion. Now , from the data guard task list will ha ve created task listed . A CL Backup and R estore 3.8 .4 The ACL b ackup and restore feature enables the system ACL (Access Control List) to be back ed up on[...]
-
Página 114
114 Chapter 3: Sy stem Administration F or the ACL res tore , it can be restored in the same system or used in an other unit. F or e xample, l e t ’s rest ore th e ACL backu p file to an other unit. This unit has a RAID volume “ RAIDpm ” with share folder s as listed on right ha nd screen shot. Af ter input ting the ACL back up f ile and cli[...]
-
Página 115
115 Chapter 3: Sy stem Administration Data Bu rn 3.8 .5 The data burn is featured to suppor t 3 different modes o f data burning for files/folders to and from image file and physical optical disk . The 3 different modes are “ Write F iles/folder s to disc ” , “ Wr ite ima ge to disk ” and “ Write files/ folders to image ” . Write F[...]
-
Página 116
116 Chapter 3: Sy stem Administration Selec t f rom the installed USB bur ning devic es. Ple ase click t h e “ detec t disc ” button to c. check the s tatus onc e the disc is inser ted. Selec t the burnin g speed from the drop down li st. d. Selec t whe ther disc data verifica tion is required or not. e. Click “ Burn ” to star t disc burni[...]
-
Página 117
117 Chapter 3: Sy stem Administration Selec t the ISO file. b . Selec t f rom the installed USB bur ning devic es. Ple ase click t h e “ detec t disc ” button to c. check the s tatus onc e the disc is inser ted. Selec t the burning speed from the drop down l ist. d . Selec t whe ther disc data verifica tion is required or not. e. Click “ Bu[...]
-
Página 118
118 Chapter 3: Sy stem Administration Input the path where the ISO file is going to be store d , you can press the “ Brow se ” c. button to have the share list appear . Inpu t the ISO file name for burned image file. d . Click “ Burn ” to start the ISO file burning. e. The data burn does not suppor t rewr iteable media i f it has been b[...]
-
Página 119
119 Chapter 3: Sy stem Administration W indo ws XP SP2 • T o set up the P r inter S er ver in Windows XP SP2, follow the steps below : Connect the USB printer to one of the USB por ts (preferably the rear USB por ts ; f ront USB 1 . por ts can be used for ex ternal HDD enclosures). Go to Star t > P rinters and F ax es. 2. Click on F ile > A[...]
-
Página 120
120 Chapter 3: Sy stem Administration Selec t Add a net work , wireless or Bluetooth pr inter . 3. Selec t The printer that I want isn ’t listed. 4. Y ou can press The printer that I w ant isn ’t lis ted to go into ne xt p age without waiting for Searching for av ailable printers to finish. Click Selec t a shared printer by name. 5.[...]
-
Página 121
121 Chapter 3: Sy stem Administration T yp e ht tp:// <Thecus_NAS>: 631/printers/usb -printer in the box , where <Thecus_NA S_IP> is the IP address of Thec us IP stor age . Click Nex t. Selec t or install a printer and then press OK . 6. Windows w ill attempt to connec t to the printer . 7. Y o u can ch oose to set th is prin ter as th [...]
-
Página 122
122 Chapter 3: Sy stem Administration Done! Click F inish. 9.[...]
-
Página 123
123 Chapter 3: Sy stem Administration Uninterrupted P ower S ource 3.9 .2 F rom the Extern al Devices menu, choose the U ninterrup ted Power Source item and the UPS S etting screen appe ars. Mak e any changes you wish, and press Apply to confirm changes. See the following table for a detailed des cription of each item. UPS Setting Item Description[...]
-
Página 124
124 Appendix A: Customer Suppor t Appendix A: C ustomer Suppor t If you are still e xperiencing problems wi th your Thecus IP storage , o r require a R eturn M erchandise Authoriza tion (RMA), feel f ree to contac t te chnical suppor t via our T echnical Suppor t W ebsite: http: //w ww.thecus.com/sp _tech.ph p Customers in the US should send al[...]
-
Página 125
125 Appendix B: RAID Bas ics Appendix B: RAID Basics O ver v iew • A Redundant Ar ray of I ndependent Disks (R AID) is an ar ray of sever al hard disks tha t provide dat a securi ty and high per formance. A R AID s ystem acc esses se veral hard disks simultane ously , which improves I /O per for mance over a single hard disk . Data secur ity [...]
-
Página 126
126 Append ix B: RAID Basi cs RAID 5 RAID 5 offers data se curity and i t is best suited for net works that per form many small I /O tr ansactions at the same time, as well as applications that require data securi ty such as office automation and on - line custo mer ser vice. Use it also for application s with hig h read requ ests but low write re[...]
-
Página 127
127 Appendix B: RAID Bas ics listed bel ow : RA ID Leve l Per centage Used RAID 0 100% RAID 1 1/n x 100 % RAID 5 (n- 1)/ n x 10 0% RAID 6 (n-2)/n x 10 0% RA ID 10 50% JBOD 100 % n: HD D number[...]
-
Página 128
128 Appendix C: Active Director y Basics Appendix C: A c tive Dir ec tor y Basics O ver v iew • With Wind ows 2000, Microsof t introdu ced Active Director y (ADS), which is a large database/ information store. Prior to Ac tive Direc tor y t he Windows O S c ould not s tore a dditional infor mation in its domain database. Active Director y als[...]
-
Página 129
129 Appendix D: Licensing Informat ion Appendix D: Lic ensing I nf ormation O ver v iew • This product included c opyrighted third-par t y so ft ware licensed under the ter ms of GNU Gener al Pu blic Lic ense. Please see THE GNU Gener al Public License for ex tra ter ms and c onditions o f this license. Source Co de Av ailabilit y Thecus T ec[...]
-
Página 130
130 Appendix D: Licensing Informat ion C GIC L icense T erms • Basic License CG IC, copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004 by Thomas Boutell and Boutell . Com, I nc. P er mission is granted to use CGIC in any application, commercial or noncommercial, at no co st. HOWE VER, this copyr ight paragraph must appear on a “ cre[...]
-
Página 131
131 Appendix D: Licensing Informat ion the recipients all the r ights that you have. Y ou must make sure that they, too, receive or can get the so urc e code . An d yo u mu st s how t hem t hes e term s so t hey know thei r rig hts . We protect your rights with two steps: (1) copyr ight the sof t ware, and (2) offer you this license which gives yo[...]
-
Página 132
132 Appendix D: Licensing I nformation warr ant y pro tect ion in exchange for a fe e. 2. Y ou may modify your copy or copies of the P rogram or any por tion of it , thus forming a work based on the Program, and copy and distribute such modifications or wor k under the ter ms o f Sec - tion 1 above, provide d that you also meet all of these condit[...]
-
Página 133
133 Appendix D: Licensing Informat ion ware interchange; or , b) Accompa ny it with a written o ffer , valid for at least three years, to give any third part y , for a charge no more than your cos t of physically per forming source distr ibution, a complete machine - readable copy of the cor responding source code, to be dis tributed under t he te[...]
-
Página 134
134 Appendix D: Licensing Informat ion 7. If, as a cons equence of a cour t judgment or allegation of patent infr ingement or for any other reason (not limited to pa tent issues), c onditions are imposed on you (w hether by cour t order , agree - ment or other w ise) tha t contr adict the condi tions of this L icense, the y do not excuse you f rom [...]
-
Página 135
135 Appendix D: Licensing Informat ion riv atives o f our free sof t ware and o f promot ing the shar ing and reuse of sof tw are generally . NO W ARRANT Y 11. BEC A USE THE PRO GRAM IS LICENSED FREE OF CHAR GE, THERE IS NO W ARRANT Y FOR THE PROGRAM, TO THE EXTENT PERMIT TED BY APPLI CABLE LA W . EXCE PT WHEN O THER WISE ST A TED IN WRITING THE CO[...]