User’s Manual N2520/N2560/N4520/N4560 Series
Copyright and Trademark Notice Thecus and other names of Thecus products are registered trademarks of Thecus Technology Corp. Microsoft, Windows, and the Windows logo are registered trademarks of Microsoft Corporation. Apple, iTunes and Apple OS X are registered trademarks of Apple Computers, Inc. All other trademarks and brand names are the property of their respective owners. Specifications are subject to change without notice. Copyright © 2014 Thecus Technology Corporation. All rights reserved.
Safety Warnings For your safety, please read and follow the following safety warnings: ¾¾ Read this manual thoroughly before attempting to set up your Thecus IP storage. Thecus IP storage���������������������������������������������������������� is a complicated electronic device. DO NOT attempt to re� ¾¾ Your ��������������������������������������������������������������������������� pair it under any circ umstances.
Table of Contents Copyright and Trademark Notice.................................................ii About This Manual........................................................................ii Limited Warranty..........................................................................ii Safety Warnings............................................................................iii §Chapter 1: Introduction..............................................................vii 1.1 Overview...........................
3.3.13 Factory Default............................................................................................................ 27 3.3.14 Power Management.................................................................................................. 28 3.3.15 File System Check...................................................................................................... 28 3.3.16 Wake-Up On LAN (WOL).......................................................................................... 30 3.
3.6.13 Auto Thumbnail.......................................................................................................... 82 3.6.14 ThecusID........................................................................................................................ 83 3.7 Application Server...........................................................................85 3.7.1 iTunes® Server (Built in)............................................................................................... 85 3.7.
§Chapter 1: Introduction 1111 Overview Thank you for choosing the Thecus IP Storage Server. The Thecus IP storage is an easy-to-use storage server that allows a dedicated approach to storing and distributing data on a network. Data reliability is ensured with RAID features that provide data security and recovery—over multiple Terabyte of storage are available using RAID 5 and RAID 6.
1111 Front Panel •• N2520/N2560: The Thecus N2520/N2560’s front panel shows the device’s indicators and hard disk install slots: Front Panel Item 1. HDD1 LED 2. HDD2 LED 3. LAN LED 4. USB LED 5. USB Copy Button 6. Power Button/LED 7. USB Port 8.
•• N4520/N4560: The Thecus N4520/N4560 front panel shows the device’s indicators, system information and hard disk trays: Front Panel Item 1. Power LED 2. System status 3. LAN LED 4. System Failure 5. USB Port 6. Power Button 7. Up Button 8. Down Button 9. Enter 10. Escape 11. LCD Display 12. HDD Tray Description Solid blue: Power on Blinking orange: Diagnostic mode kick-in Solid orange: Diagnostic completed Green : Network activity Red on while diagnostic test failed. USB 3.
1111 Rear Panel •• N2520/N2560: The N2520/N2560 rear panel features ports and connectors. Back Panel Item 1. System Fan 2. HDMI 3. SPDIF 4. LAN Port 5. USB Port 6. Power Connector 7. Reset Button x Description System fan that exhausts heat from the unit. For Video/Audio out For Audio out LAN port for connecting to an Ethernet network through a switch or a router. USB 2.0 port for compatible USB devices, such as digital cameras, USB disks, and USB printers.
•• N4520/N4560: The N4520/N4560 rear panel features ports and connectors. Back Panel Item 1. System Fan 2. USB Ports 3. LAN Port 4. Reset Button 5. HDMI 6. SPDIF 7. Power Connector Description System fan that exhausts heat from the unit. USB 2.0 port for compatible USB devices, such as digital cameras, USB disks, and USB printers. LAN port for connecting to an Ethernet network through a switch or router Resets the N4520/N4560.
§Chapter 2: Hardware Installation 2222 Overview Your Thecus IP storage is designed for easy installation. To help you get started, the following chapter will help you quickly get your Thecus IP storage up and running. Please read it carefully to prevent damaging your unit during installation. 2222 Before You Begin Before you begin, be sure to take the following precautions: 111 Read and understand the Safety Warnings outlined in the beginning of the manual.
333 Press the power button on the Front Panel to boot up the Thecus IP storage.
§Chapter 3: System Administration 3333 Overview The Thecus IP storage provides an easily accessible Web Administration Interface. With it, you can configure and monitor the Thecus IP storage anywhere on the network. 3333 Web Administration Interface Make sure your network is connected to the Internet. To access ��������������������������������� Thecus IP storage���������������� Web Administration Interface: 111 Type the Thecus IP storage IP address into your browser.
333333 Add Shortcut The user interface with “Add Shortcut” shortcut allows the user to designate often used items and have them display on the main screen area. The figure below displays system add shortcut functions. Administrators can add or remove add shortcut functions to My Favorites by right clicking the mouse on the item.. 333333 Control Panel The Control Panel is where you will find all of the information screens and system settings of Thecus IP storage.
333333 Message Bar You can get quick information about your system status by moving your mouse over these icons. Message Bar Item Status Description RAID Management Display the status of created RAID volume. Click to go to RAID Management page as short cut. Disks Information Display the status of disks installed in the system. Click to go to Disk information page as short cut. Network Green: Connection to the network is normal.
333333 Language Selection The Thecus IP storage supports multiple Languages, including: English Japanese Traditional Chinese Simplified Chinese French German Italian Korean Spanish Russian Polish Portuguese On the menu bar, click Language and the ������������������ selection��������� �������� list ��� appears. This user interface will switch to the selected language for Thecus IP storage.
333333 System/Service Status From the System Management category,, choose the S��������������������������������������������� tatus���������������������������������������� item, System �������������������������� Service Status ����������� and�������� HW����� Status screens appear. These screens provide basic system and service status information.
Export log option Log Type Log Level This can be set to Auto Export or Auto Delete. The default logs displayed are for system events. From the dropdown list, administrators can choose from various forms of user access, such as AFP, Samba, etc. Note: Users need to enable the “User Access Log” service to view these details. ALL: Provides all log information including system, warning, and error messages. INFO: Shows information about system messages. WARN: Shows only warning messages.
333333 User Access Log The User Access Log Support section allows administrators to select the desired protocols to record user activity for. User Access Log User Access Log Item User access log Folder Service Apply Description Description Enable or disable the User Access Log service. Select from the dropdown list where to store the user access log. Select from the check box which access details to record. Click Apply to save changes.
To export details from the User Access Log as a single file from target folder, administrators must first select the desired number of records from the dropdown list and also select the “Auto export” option. Please choose the number of logs export and click “Apply” to activate these settings.
•• Configuration with syslog client and target to store remotely: See the following table for a detailed description of each item: Syslog Management Item Syslog Daemon Syslog service Target Syslog folder Log Level Remote IP Address 22 Description Enable/Disable syslog daemon. If Server has been selected then associated syslog folder will be used to store all system logs from other NAS devices which has assigned this system for syslog server as well as syslog of this server unit.
333333 System Monitor The system monitor is capable to monitor system status including CPU/memory utilization, network throughput and on-line user list in various protocols. To monitor system status, simply click on “System Monitor” from the tree menu and the screen will appear as below. It is divided into 4 sections. Each section can be modified to monitor specific items by using the drop down list from the “Monitors” tab, simply click on the items you would like to monitor.
For the on-line users list, system monitor will display the on-line users and the share folder they have visited. System Monitor Item Description Save Layout Saving selected monitoring items. Layout will remain the same for future visits. Reset Layout Set back to default monitoring settings and layout. History Click on this check box and system monitor will write the monitoring history to a designate path in the RAID volume. Lock Layout All of the monitoring items are fixed and cannot be changed.
333333 Date and Time: Setting system time From the System Management category, choose the Date and Time item and the Date and Time screen appears. Set the desired Date, Time, and Time Zone. You can also elect to synchronize the system time on Thecus IP storage with an NTP (Network Time Protocol) Server. See the following table for a detailed description of each item: Date and Time Item Date Time Time Zone NTP Service S ync with e x ter nal NTP Server Description Sets the system date.
3333333 Scheduled On/Off Using the Thecus IP storage System Management, you can save energy and money by scheduling the Thecus IP storage to turn itself on and off during certain times of the day. From the System Management category, choose the Scheduled On/Off item and the Scheduled On/ Off screen appears. To designate a schedule for the Thecus IP storage to turn on and off, first enable the feature by checking the Enable Scheduled On/Off checkbox.
3333333 Administrator Password From the System Management category, choose the Administrator Password item and the Change Administrator Password screen appears. Enter a new password in the New Password box and confirm your new password in the Confirm Password box. Press Apply to confirm password changes. See the following table for a detailed description of each item. Change Administrator Item New Password Confirm Password Apply Description Type in a new administrator password.
Resetting to factory defaults will not erase the data stored in the hard disks, but WILL revert all the settings to the factory default values 3333333 Power Management From the System Management category, choose Power Management item, and the Shutdown/Reboot System screen appears. Press Reboot to restart the system or Shutdown to turn the system off. 3333333 File System Check The File System Check allows you to perform a check on the integrity of your disks’ file system.
Once you click Next, you will see the following screen: Click Start to begin the file system check. Click Reboot to reboot the system. When the file system check is running, the system will show 20 lines of information until it is complete. Once complete, the results will be shown at the bottom.
The system must be rebooted before Thecus IP storage can function normally after file system check completes. 3333333 Wake-Up On LAN (WOL) The Thecus IP storage has the ability to be awoken from sleep mode via LAN port. From the System Management category, choose the WOL item, and the Wake-up On LAN screen appears. From here, you can Enable or Disable.
3333333 UI Login Function Adjusts UI Login Configuration settings, you can enable/disable the Web Disk, Photo Server and modules functions, according to your needs. 3333333 Networking From the System Management category, choose Networking, and the Networking Configuration screen appears. This screen displays the network parameters of the global setting and available network connection. You may change any of these items and press Apply to confirm your settings.
Netmask/Prefix Length Gateway Default gateway •• •• Input netmask for IPv4 and Prefix length for IPv6. Gateway for associate NIC. It can be chosen from a drop down list of default gateway that’s been used for the Thecus IP storage. Only use Jumbo Frame settings when operating in a Gigabit environment where all other clients have Jumbo Frame Setting enabled. Proper DNS setting is vital to networks services, such as SMTP and NTP.
Disks Information Item Disk No. Capacity Model Firmware Bad Block scan Description Indicates disk location. Shows the SATA hard disk capacity. Displays the SATA hard disk model name. Shows the SATA hard disk firmware version. Yes to start scan Bad Block. •• S.M.A.R.T. Information On the Disk Information screen, select a disk then click on “Smart” to list the S.M.A.R.T. info of the associated disk. You may also perform a disk SMART test; simply click “Test” to start the SMART test.
S.M.A.R.T. Information Item Tray Number Model Power ON Hours Test Type Description Tray the hard disk is installed in. Model name of the installed hard disk. Count of hours in power-on state. The raw value of this attribute shows total count of hours (or minutes, or seconds, depending on manufacturer) in power-on state. The current temperature of the hard disk in degrees Celsius. Count of reallocated sectors.
The bad block scan can be terminated by clicking on “Stop Detect Bad Block”. 333333 RAID Management From the Storage category, choose the RAID Management item and the RAID Management screen appears. This screen lists the RAID volumes currently residing in the Thecus IP storage. From this screen, you can get information about the status of your RAID volumes, as well as the capacities allocated for data.
Disk No. Capacity (MB) Model Status Used Spare Master RAID Stripe Size Data Percentage Create Number assigned to the installed hard disks. Capacity of the installed hard disks. Model number of the installed hard disks. Status of the installed hard disks. If this is checked, current hard disk is aalready part of a RAID volume. If this is checked, current hard disk is designated as a spare for a RAID volume. Check a box to designate this as the Master RAID volume. See the NOTE below for more information.
In a multiple RAID configuration, one RAID volume must be designated as the Master RAID volume. The Master RAID volume will store all installed modules. If the Master RAID is changed to another location (i.e. assigning volume 2 to be the Master RAID volume after volume 1 had been previously assigned), then all modules must be reinstalled. In addition, all system folders that were contained on the Master RAID volume will be invisible.
Please keep your USB disk in a safe place and also backup the encrypted key. There is no way to rescue data back if the key is lost. With RAID volume encryption enabled, the system performance will go down. RAID volumes with encryption enabled will be displayed with a key lock symbol next to volume ID name. 666 Quick RAID — Enabled the quick RAID setting is going to enhance RAID creation time.
1111 Press “Yes” for RAID volume creation preparation. Then click “Finish” to start up with RAID volume building. Building a RAID volume may be time consuming, depending on the size of hard drives and RAID mode. In general, if the RAID volume building process is up to “RAID Building”, then the data volume is accessible. Creating RAID destroys all data in the current RAID volume. The data will be unrecoverable.
Level Model N2520/N2560 N4520/N4560 JBOD RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 RAID configuration is usually required only when you first set up the device. A brief description of each RAID setting follows: RAID Levels Level JBOD RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 Description The storage volume is a single HDD with no RAID support. JBOD requires a minimum of 1 disk. Provides data striping but no redundancy. Improves performance but not data safety.
Chapter 3: System Administration 41
•• Remove RAID Click to remove the RAID volume. All user data and iSCSI created in the selected RAID volume will be deleted. To remove a RAID volume, follow the steps below: 111 On the RAID List screen, select the RAID volume by clicking on its radio button, and click RAID Information to open the RAID Configuration screen. 222 On the RAID Configuration screen, click Remove RAID. 333 A confirmation screen will appear, you will have to click “Yes” to complete the “Remove RAID” operation.
•• Migrating a RAID(Dose not apply to the N2520/N2560) Once a RAID volume has been created, you may want to move it to other physical drives or change the RAID array all together. To migrate a RAID 1, RAID 5 or RAID 6 volume, follow the steps below: 111 From the RAID Configuration screen, click Migrate RAID. 222 A list of possible RAID migration configurations will be listed. Select the desired migration scheme and click Apply. 333 The system will begin migrating the RAID volume.
•• •• Migrating a RAID volume could take several hours to complete. The RAID migration feature is available only when it is configurable. Here is a list of limitation with RAID level migration function: 111 During RAID level migration, it is not permitted to reboot or shutdown system. 222 For RAID migration from R1 to R5 or R1 to R6, all services will restart and “iSCSI” volume will be in read only mode but read/write of the “user data” will be possible during the operation.
333333 NAS Stacking (N4520/N4560 Only) The Thecus IP storage’s capacity can be expanded even further using the stackable function. With it, users can expand the capacity of their network storage systems up to 5 other stack target volumes which are located in different systems. These can be stacked through single network access like SMB or AFP acting as a share folder type. From the Control Panel, the stackable feature is located under “Storage”. Please refer the figure below for reference. A.
Next, input the target IP address of the stackable device and click the Discovery button. The system will list available target volumes from the inputted IP address. Once the volume IP has been set, you may need to input a valid user name and password to validate your access rights. If there is no user name and password needed to access target volume, then leave it blank. The Stacked Target name will become the network share name and will be displayed through network access such as SMB.
From the figure above, the Stacked Target name is “pmmeeting”. The figures below show the result before and after via Microsoft Network Access when settings have been completed. The Browseable setting is the same method used for setting a system share folder. It designates whether or not this folder will be visible through web disk. You may refer to the figure below for reference when Yes and No are selected.
The Public setting will be set the same way as the setting for the system share folder associated with the ACL permission is. If Public is set to Yes, all users will be able to access it, and ACL button will be grayed out. If Public is set to No, the ACL button will be available in the Stack Target List window. Click Apply to save your changes. B. Activate a Stack Target After your settings have been applied, the system will bring you back to the Stack Target List window as shown below.
With this newly attached stack target device, you will see the information displayed and also have access to several options to choose from. In general, if the attached stack target device has been used by another Thecus NAS as stack target volume, then the Format item will be display and system will recognize it straight away and display its capacity. Otherwise, the Format item will be available and the Capacity and Status items will show as “N/A” and “Unknown file system” respectively.
D. Stack Target ACL If the stack target Public setting set to Yes, then the ACL button will be grayed out. However, if Public setting is set to No, then the ACL button will be available for you to setup user access permissions for the stack target. The ACL settings will be exactly the same as the system folder that you may have setup previously. E.
333333 ISO Image Mounting (N4520/N4560 Only) The ISO Image Mounting feature is a very useful tool from the Thecus products. With it, users can mount an ISO file and have the export name display all the details from the mounted ISO file. From the Control Panel, the ISO Image Mounting feature is located under “Storage”. Please refer the figure below for reference. Select the ISO Image Mounting function and the ISO Image Mounting window will appear as shown here. A.
To mount the new ISO file, select one file from the list of files and input the desired mounting name into the “Mount as:” field. Click “ADD” to confirm the completion of the mounting. If nothing is input in the “Mount as” ISO file export name field, the system will automatically give an export name to the ISO file. The mounting name will then be defined by the ISO file name. After completion, the page will display all mounted ISO files. You can click “Unmount” to eliminate a mounted ISO file. B.
333333 iSCSI (N4520/N4560 Only) You may specify the space allocated for iSCSI.����������������������������������������������������� See ���������������������������������������������������� the table below to the allowed������������������ iSCSI target num���� ber per system: Model Allowed iSCSI volume N4520/N4560 15 •• iSCSI Target To add iSCSI target volume, click iSCSI with associated RAID volume from its drop down list and select the desired RAID volume.
The Create iSCSI Volume screen appears. Create iSCSI Volume Item iSCSI Target Volume Target Name iqn_Year Iqn_Month Authentication Username Password Password Confirm Mutual CHAP Username Password Password Confirm RAID ID LUN Allocation LUN Name Unused Allocation LUN ID iSCSI Block size Description Enable or Disable the iSCSI Target Volume. Name of the iSCSI Target. This name will be used by the Stackable NAS function to identify this export share. Select the current year from the dropdown.
The iSCSI target volume creation will associate at least one LUN together. It can be assigned either “Thin-Provisioning” or “Instant Allocation”. 222 Enable the iSCSI Target Volume by selecting Enable. 333 Enter a Target Name. This will be used by the Stackable NAS function to identify this export share. 444 Choose the current year from the Year dropdown. 555 Choose the current month from the Month dropdown. 666 Choose to enable CHAP authentication or choose None.
•• Expand Volume The iSCSI volume is now able to expand its capacity from unused space (Instant Allocation mode only). From the volume list, simply select the iSCSI volume you like to expand and click the Expand button: You will then see the dialog box displayed below. Drag the Expand Capacity bar to the size you want. Then press Expand to confirm the operation.
•• Delete Volume To delete volume on the current RAID volume, follow the steps below: 111 Under the Volume Allocation List, click Delete. The Space Allocation screen appears. 222 Press YES. All data in the volume will be removed.
volume is available from the list. Please refer to the screenshot below. If creating an iSCSI target volume under “Instant Allocation”, physical memory is assign to the target, being limited by the available memory. For the iSCSI target volume created under “thin-provisioning”, virtual memory is assigned to the volume, which can go up to 16384GB (16TB). •• LUN ACL After iSCSI target has been created, you are one step away from using the iSCSI volume.
Next, input “Initiator iqn” and setup iSCSI target volume access privileges from the available list. Apply by clicking the OK button. The accessible Initiator will be listed as shown in the screen shot displayed below. The listed “Initiator iqn” can be modified or deleted by selecting the desired iqn and pressing Modify or Delete. •• Advance Option There are 3 available options for the user to operate Thecus IP storage associated with iSCSI setting. The details are listed in the following screenshot.
iSCSI CRC/Checksum To enable this option, the initiator can connect with “Data digest” and “Header digest”. Max Connections The maximum number of iSCSI connections. Error Recovery Level The Error Recovery Level (ERL) is negotiated during a leading iSCSI connection login in traditional iSCSI (RFC 3720) and iSER (RFC 5046). ERL=0: Session Recovery ERL=0 (Session Recovery) is triggered when failures within a command, within a connection, and/or within TCP occur.
3333 File Sharing/Privilege The Thecus IP storage has built-in user database that allows administrators to manage user access using different group policies. From the File ������������������������������������������������������������ Sharing/Privilege�������������������������������������� menu, you can create, modify, and delete users, and assign them to groups that you designate.
AD Domain Example Item Work Group / Domain Name ADS Support ADS Server Name ADS Realm Administrator ID Administrator Password •• •• •• •• Information domain Enable Computer1 Domain.local Administrator *********** The DNS server specified in the WAN/LAN1 configuration page should be able to correctly resolve the ADS server name. The time zone setting between Thecus IP storage and ADS should be identical. The system time difference between Thecus IP storage and ADS should be less than five minutes.
•• All users are automatically assigned to the ‘users’ group. •• Edit Users 111 Select an existing user from the Local User Configuration screen. 222 Click on the Edit button, and the Local User Setting screen appears. 333 From here, you can enter a new password and re-enter to confirm, or use the << or >> buttons to have this user join or leave a group. Click the Apply button to save your changes. •• Remove Users 111 Select an existing user from the Local User Configuration screen.
333333 Local Group Configuration From the File Sharing/Privilege category, choose the Group item, and the Local Group Configuration screen appears. This screen allows you to Add, Edit, and Remove local groups. Local Group Configuration Item Add Edit Remove Description Press the Add button to add a user to the list of local groups. Press the Edit button to modify a selected group from the system. Press the Remove button to delete a selected group from the system.
•• Edit Groups 111 On the Local Group Configuration screen, select a group name from the list. 222 Press the Edit button to modify the members in a group. 333 To add a user into a group, select the user from the Users List, and press the << button to move the user into the Members List. 444 To remove a user from a group, select the user from Members List, and press the >> button. 555 Click the Apply button to save your changes.
333333 Shared Folder From the ��������������������������������������������������������������������������������������� File Sharing/Privilege����������������������������������������������������������������� category, choose ����������������������������������������������� Shared Folder, ���������������������������������������� and the Shared Folder screen appears. This screen allows you to create and configure folders on the Thecus IP storage volume.
you to change folder information. After entering the information, press Apply to save your changes. Modify Folder Item Folder Name Public Apply Description Enter the name of the folder. Admit or deny public access to this folder. Press Apply to create the folder. •• Remove Folders To remove a folder, press the Remove button from the specified folder row. The system will confirm folder deletion. Press Yes to delete the folder permanently or No to go back to the folder list.
•• NFS Share To allow NFS access to the share folder, enable the NFS Service, and then set up hosts with access rights by clicking Add. NFS Share Item Hostname Privilege OS Support ID Mapping Sync / Async Apply 68 Description Enter the name or IP address of the host Host has either read only or writeable access to the folder. There are two selections available: •• Unix / Linux System •• AIX (Allow source port > 1024) Choose the one which best fits your needs.
•• Samba Configuration On the Folder screen, press the Samba button and the Samba Configuration screen appears. This screen allows you to setup samba configuration for associated folder. After entering the information, press Apply to activate input settings. Samba Configuration Item RAID ID Folder Name Public Apply Description RAID volume where the new folder will reside. Enter the name of the folder. Admit or deny public access to this folder. Press Apply to create the folder.
ACL setting Item Deny Read Only Writable Recursive Description Denies access to users or groups who are displayed in this column. Provides Read Only access to users or groups who are displayed in this column. Provides Write access to users or groups who are displayed in this column. Enable to inherit the access right for all its sub-folders. To configure folder access, follow the steps below: 111 On the ACL screen, all network groups and users are listed in the left hand column.
The ACL can only be set for share and sub-folders level, not for files. The ACL screen also allows you to search for a particular user. To do this, follow the steps below: 111 In the blank, enter the name of the user you would like to find. 222 From the drop down select the group you would like to search for the user in. 333 Click Search. 333333 User Quota The Thecus IP storage support local or AD users with storage quota limitations in each RAID volume of the system.
333333 User and Group Backup The user and group backup feature allow system users and groups to be backed up to another location and be restored if needed. Please note, when restoring previous backup users and groups, the current users and groups list will be replaced from this restore file’s contents.
333333 LDAP Support (N4520/N4560 Only) The LDAP is another way to authenticate login users who have joined the LDAP server. You will need to fill in the LDAP server information to get LDAP authentication started. Please make sure that the LDAP server has a Samba sam and a POSIX ObjectClass account.
3333 Network Service Use the Network Service category to make network service support settings. 333333 Samba / CIFS There are options allow Admin to Enable/Disable to operate Thecus IP storage associated with Samba / CIFS protocol. With the option changed, it will need to reboot system to activate. •• Samba Service Used for letting the operating system of UNIX series and SMB/CIFS of Microsoft Windows operating system (Server Message Block / Common Internet File System).Do the link in network protocol.
The Thecus IP storage is supported recycle bin via SMB/CIFS protocol. Simply enable the “Recycle Bin” function and “Recycle Folder Display” then all of deleted files/folders will reside in the “_NAS_Recycle_(Associated RDID Volume)” share folder. For example, the system has created 2 RAID volumes with ID “RAIDpm” and ‘RAID”. Then it will have 2 recycle bin folder appear as “_NAS_Recycle_RAID” and “_NAS_Recycle_RAIDpm”.
333333 AFP (Apple Network Setup) From the Network Service category, choose the AFP item, and the AFP Support screen appears. This screen displays the configuration items for the Apple Filing Protocol. You can change any of these items and press Apply to confirm your settings.
333333 FTP The Thecus IP storage can act as an FTP server, enabling users to download and upload files with their favorite FTP programs. From the Network Service category, choose the FTP item, and the FTP screen appears. You can change any of these items and press Apply to confirm your settings.
A description of each item follows: TFTP Item TFTP NICs Port Share Folder Folder Permission Description Enables TFTP Service on the Thecus IP storage. Checked WAN/LAN1 or LAN2 to enable port use Specifies the port number of an incoming connection on a non-standard port. Select the file stored folder, it cannot be empty. Select the folder permission 333333 WebService From the Network Service category, choose the WebService item, and the WebService Support screen appears.
Disable HTTP support and Enable Secure HTTP support to guarantee secure access. 333333 UPnP Service This device supports UPnP Media server, which allows users to play media files with UPnP client (ex. DMA devices). Enable or disable Universal Plug and Play protocol. UPnP helps to find the IP address of Thecus IP storage. 333333 Bonjour Setting Bonjour, is Apple Inc.’s trade name for its implementation of Zeroconf, a service discovery protocol.
3333333 DDNS To set up a server on the Internet and enable the users to connect to it easily, a fixed and easy-to remember host name is often required. However, if the ISP provides only dynamic IP address, the IP address of the server will change from time to time and is difficult to recall. You can enable the DDNS service to solve the problem.
3333333 UPnP Port Management One of the most convent way to allow users to access required services such as FTP, SSH, web disk and http etc. from Internet environment is setting UPnP port management. To set up this UPnP port forwarding feature, please be sure that the router has “UPnP Service” Enabled. The following is an example from one of the router manufacture with UPnP Configuration page.
3333333 WebDAV The WebDAV is an extended protocol of http(s) which allows remote access to your NAS system. To begin using WebDAV and WebDAV SSL, simply click enable and provide the port number. The default port number is 9800, under normal circumstances this will not need to be changed. WebDAV Configuration Item Description WebDAV Service Press the Enable button to activate WebDAV service and specify the port number if it needs to change from the default value. P.S.
3333333 ThecusID Creating a Thecus ID will give you full access to all that Thecus has to offer. After creating a Thecus ID, you‘ll receive a free* DDNS (i.e“yourname.thecuslink.com”.) You can use your DDNS to easily access your NAS, make use of the mobile T-OnTheGo™ app, and share links to files with your friends. In the future, free cloud backup of your NAS configuration file will also be provided.
If you don’t have a Thecus ID, click “Register” and the screen below will appear. Please fill in the required information and click Apply. Register Thecus ID Item Description Thecus ID Input a valid email address. It will require confirmation to activate your Thecus ID. Password Input the password for your Thecus ID Confirm Password Re-input the password for your Thecus ID.
3333 Application Server The Thecus IP storage supports built-in application such as iTunes server as well as add-on official or third -party applications. 333333 iTunes® Server (Built in) With the built-in iTunes server capability, Thecus IP storage enables digital music to be shared and played anywhere on the network! From the Application Server category, choose the iTunes item, and then the iTunes Configuration screen appears. You may enable or disable the iTunes Service from here.
333333 Add-on Official Applications There are several default pre-loaded official applications such as WebDisk, Piczza (Photo server) and Transmission-Kit (BT download manager) that can be found from the Application Server category. 333333 3rd party App Installation From the Application Server Category, choose the Module Installation item and the Module Management screen appears. Here is the entry for all of third party user module could install from.
3333 Backup There are a number of ways to back up data with the Thecus IP storage. 333333 Rsync Target Server When it comes to backing up your data, it’s very important to have flexibility. Data guard provides you with many options, including full backup for all shares, custom backup for selected shares and iSCSI volume backup. Being based on the Linux operating system, it is also much more stable and experiences much less frequent data loss during transfer than other remote backup systems.
Remote Data backup Item Add Edit Remove Start Stop Restore Log Restore NAS Configuration Description Add new task. Edit select task. Remove select task If associated task has been setup in schedule and like to start at once, click on to start task right away. Stop the associated running task. The other scenario is if a task has been setup in real-time then clicking “Stop” can terminate the running process. Simple click ‘Start” to re-start the real-time operation.
Remote Data backup Item Full Backup Custom Backup iSCSI Backup Description The “Full backup” will have all shares from source backup to destination. It could also create shares automatically from destination if it is not existent. This only applies if the target server is the same model as the source. The “Custom backup” allows user to choose desired shares backup to destination. The “iSCSI backup” can backup iSCSI volume as single file to destination.
•• Full Backup Click on full backup and the setup screen appear as below. Fill in the remote target IP (Destination) and port (need to be changed only if this port is already in use). If encryption is required then enable it. Please make sure the associated target server also has encryption enabled. Carry on with inputting valid remote target server account name and password. After the settings are complete, please click on “Connection Test”.
-Fill out all the necessary details and choose your parameters Add Rsync Backup Task Item Task Name Backup Type Sync Type Compress Backup NAS Config Resume Partial File Handle Sparse File Keep ACL Setting Log Location Speed Limit Timeout Limit Enable Schedule Description This is how this task will appear in the task list. Real time: It will backup folders/files from source to target on the fly. On the other hand, any changes from the source will back up to the target right away.
From the task list, you can now see the newly added task “fullback01”. The backup is setup as “real time”. From the status field, “Processing” can be read as the back-up is performed on the fly. •• Custom Backup The custom backup setting is similar to the full backup. The only differences are explained below: 111 Inputs the share folder name of target sever where the source is going to backup. The subfolder can be left as blank.
333 Click “Next” and more setting appears. These are the as the settings for “Full backup” 444 Click “Finish” and the data guard task will appear in the list as shown below. From the task list, you can now see the newly added “customback01”. This backup is setup as “schedule”.
•• iSCSI Backup If the source unit contains iSCSI volume, it can be backed up to the target unit as a single file. The procedure is the same as for the previous “Full backup” and “Custom backup”, select “iSCSI backup” from data guard wizard. 111 Inputs the share folder name of the target sever where the source is going to backup. The sub-folder can be left as blank. 222 Select the iSCSI target volume which you wish to back up to the target server. 333 Click “Next” and more settings will appear.
4. Click “Finish” and the data guard task will appear in the list as shown below. From the task list, you can now see the newly added “iscsiback”. This backup is setup as “schedule”. The source folder name will use iSCSI_+target volume name. So here it is displayed as “iSCSI_pmtest”. pmtest is the iSCSI target name when the iSCSI target was created. The iSCSI backup can see the result as below. The task “iSCSI_pmtest” has backup to target 172.16.66.
This is a useful feature if the system configuration needs to be restored to a brand new unit. Let’s go thru the following example to see how it works. The original source system has 3 RAID volume, “RAID”, ‘RAID10” and “RAID20”, and has backed up the system configurations to the target server. The brand new source unit only has a 1 RAID volume ‘RAID”.
333 Click “Next” and a screen will appear as shown below. It has the listed available system configuration backup files. Select the one you want and click next. You also have the option to download the current system configuration before restoring from the backup file. 444 After clicking “Next”, a screen will appear as shown below. Listed on the left hand side, you will see the configuration backup details which contain the 3 RAID volumes.
555 The backup configuration has different numbers of RAID volume than the current system (3 vs 1). It can be kept as the RAID volume mapping arranged by the system, then carry on to click “Finish”. This means that all 3 RAID volumes configuration such as share folder etc. will all restore to the current unit in the RAID volume “RAID”.
333333 Data Guard (Local Backup) The Thecus product provides complete backup solution between Thecus NAS systems as well as between folders of local systems. Remote Data backup Item Add Edit Remove Start Stop Restore Log Restore NAS Configuration Description Add a new task. Edit selected task. Remove selected task. Click on start to start a scheduled scan task right away. Stop the associated running task.
Local Data backup Item Import Copy Realtime Backup Schedule Backup iSCSI Backup iSCSI Import Description This is associated with external devices which are added to the system such as USB disk. You can select a folder from an external device and import it to the NAS as a share folder. Copy folder to folder or NAS folder to external device or external device to NAS folder. This backup is within folder level. The task will be executed on the fly between the source and the target.
imported them to the NAS under the RAID60volume. Next, please select the path from the drop down list to save the log. Also, give the access permission whether these selected folders will be “Public” or not after the import.
Now, you will see in the data guard task list that you have created a task . And that the system has created 2 new share folders from the task just created. 222 Copy: click on “Copy” and this screen appears. 3 different options can be selected, folder to folder, folder to external device or external device to folder.
•• Folder to Folder •• Folder to external device •• External device to Folder Chapter 3: System Administration 103
Let’s take “Folder to External device” as an example. In the source pane, select the desired RAID volume and its associated folder list will appear; same method in the target pane for the associated external device. Select a folder from the source pane which is going to be copy over, then select in target pane it’s destination. Choosing the sync type, “Incremental” or ‘Sync”, and select the log path from the drop menu list.
Read the notes and check the “Accept” box for confirmation. Now, you will see in the data guard task list that you have created a task. 333 Realtime Backup: click on “Realtime Backup” and this screen will appear. 2 different options can be selected from, folder to folder, folder to external device. Let’s take “Folder to Folder” backup for example. Select from the source pane the folder “NAS_ Public”, then select its destination in the target panefolder “R6andy”.
Next, fill in the task name and related settings.
Realtime Backup Item Task Name Sync Type Backup Symbolic Link Filter Description Input the task name, length limited to 4~12 characters. Select “Incremental” or “Synchronize”. Choose to backup symbolic link which is included in the source. The filter can be set to be executed only in certain circumstances. If none of them has been selected, it will do the real time backup from the source to the destination in full.
444 Schedule Backup: click on “Schedule Backup” and this screen will. 2 different choices can be selected from, folder to folder, folder to external device. Let’s use “Folder to External device” backup for our example. From the NAS volume RAID in the Source pane select the folder “NAS_Public”, then in the target pane select the external USB disk folder “N10850”. Next, fill in the task name and related settings.
Read the notes and check the “Accept” box for confirmation. Now, you will see in the data guard task list that you have created a task. 555 iSCSI Backup: click on “iSCSI Backup” and screen appear as below. It can be backup to two different storage pool, iSCSI to folder, iSCSI to external device.
Let’s take example to have “iSCSI to Folder” backup, from existed iSCSI volume “iSCSI_iscsiv502” to volume RAID folder “andy_local”. The source pane listed “iSCSI_iscsiv502” and “iSCSI_iscsiv50” where are iscsi volume has existed in this system with name “iSCSI_+iscsi target volume name”. Next, provide the task name and where the task log will store. Reading the note and check on “Accept” for confirmation.
task list will have created task listed. To start the iSCSI volume backup, select the task and click “Start” from task bar. Once “Start” click, the associated iSCSI volume will not allow to I/O during backup processing. And the task status will change to ‘Processing”. States change to “Finish” after task complete. From the RAID volume folder ‘andy_local’, it has backup iSCSI volume file stored. This backup iSCSI volume file is needed while it required import to storage.
666 iSCSI Import: click on “iSCSI Import” and screen appear as below. It can be imported from two different storage pools, folder to iSCSI or external device to iSCSI. It is depend on where iSCSI volume has backup to. Let’s take example to import “RAID folder to iSCSI” which is the iSCSI volume we have backup earlier to RAID volume folder andy_local than import to volume RAID.
Next, provide where the task log will store. Reading the note and check on “Accept” for confirmation. Now, from the data guard task list will have created task listed. 333333 ACL Backup and Restore The ACL backup and restore feature enables the system ACL (Access Control List) to be backed up on the RAID volume based to other location and restored if needed. Let’s look at the example bellow to see how it works.
For the ACL restore, it can be restored in the same system or used in another unit. For example, let’s restore the ACL backup file to another unit. This unit has a RAID volume “RAIDpm” with share folders as listed on right hand screen shot. After inputting the ACL backup file and clicking the “Next” button, the system will show another screen to list the matched folders in between the backup file and this RAID volume. Just select the desired folders for the ACL restore.
333333 Data Burn The data burn is featured to support 3 different modes of data burning for files/folders to and from image file and physical optical disk. The 3 different modes are “Write Files/folders to disc”, “Write image to disk” and “Write files/folders to image”. 111 Write Files/folders to disc aaa Click the Add button and the NAS share list appears. bbb Select files/folders which you would like to burn. All of the selected folders/files will be seen under the disc label name “New Disc”.
ccc Select from the installed USB burning devices. Please click the “detect disc” button to check the status once the disc is inserted. ddd Select the burning speed from the drop down list. eee Select whether disc data verification is required or not. fff Click “Burn” to start disc burning. 222 Write image file to disc. aaa Click “Browser” and the NAS share list will appear to locate the desired image file to burn.
bbb Select the ISO file. ccc Select from the installed USB burning devices. Please click the “detect disc” button to check the status once the disc is inserted. ddd Select the burning speed from the drop down list. eee Select whether disc data verification is required or not. fff Click “Burn” to start disc burning. 333 Create image file from files/folders aaa Click the Add button and the NAS share list will appear. bbb Select the files/folders which you would like to burn.
ccc Input the path where the ISO file is going to be stored, you can press the “Browse” button to have the share list appear. ddd Input the ISO file name for burned image file. eee Click “Burn” to start the ISO file burning. The data burn does not support rewriteable media if it has been burned with left space. On the other hand, the used rewriteable media will be erased first then carry on with burning. 3333 External Devices The Thecus IP storage supports printer server and UPS via USB interface.
•• Windows XP SP2 To set up the Printer Server in Windows XP SP2, follow the steps below: 111 Connect the USB printer to one of the USB ports (preferably the rear USB ports; front USB ports can be used for external HDD enclosures). 222 Go to Start > Printers and Faxes. 333 Click on File > Add Printer. 444 The Add Printer Wizard appears on your screen. Click Next. 555 Select the “A network printer, or a printer attached to another computer” option.
333 Select Add a network, wireless or Bluetooth printer. 444 Select The printer that I want isn’t listed. You can press The printer that I want isn’t listed to go into next page without waiting for Searching for available printers to finish. 555 Click Select a shared printer by name.
Type http://:631/printers/usb-printer in the box, where is the IP address of Thecus IP storage. Click Next. 666 Select or install a printer and then press OK. 777 Windows will attempt to connect to the printer. 888 You can choose to set this printer as the default printer by checking the Set as the default printer box. Click Next to continue.
999 Done! Click Finish.
333333 Uninterrupted Power Source From the External Devices menu, choose the Uninterrupted Power Source item and the UPS Setting screen appears. Make any changes you wish, and press Apply to confirm changes. See the following table for a detailed description of each item.
Appendix A: Customer Support If you are still experiencing problems with your Thecus IP storage, or require a Return Merchandise Authorization (RMA), feel free to contact technical support via our Technical Support Website: http://www.thecus.com/sp_tech.php Customers in the US should send all technical support enquiries to the US contact window included in the following web page: http://www.thecus.com/sp_tech.php For Sales Information you can e-mail us at: sales@thecus.
Appendix B: RAID Basics •• Overview A Redundant Array of Independent Disks (RAID) is an array of several hard disks that provide data security and high performance. A RAID system accesses several hard disks simultaneously, which improves I/O performance over a single hard disk. Data security is enhanced by a RAID, since data loss due to a hard disk failure is minimized by regenerating redundant data from the other RAID hard disks.
RAID 5 RAID 5 offers data security and it is best suited for networks that perform many small I/O transactions at the same time, as well as applications that require data security such as office automation and online customer service. Use it also for applications with high read requests but low write requests. RAID 5 includes disk striping at the byte level and parity information is written to several hard disk drives.
listed below: RAID Level Percentage Used RAID 0 100% 1/n x 100% (n-1)/n x 100% (n-2)/n x 100% 50% 100% RAID 1 RAID 5 RAID 6 RAID 10 JBOD n: HDD number Appendix B: RAID Basics 127
Appendix C: Active Directory Basics •• Overview With Windows 2000, Microsoft introduced Active Directory (ADS), which is a large database/ information store. Prior to Active Directory the Windows OS could not store additional information in its domain database. Active Directory also solved the problem of locating resources; which previously relied on Network Neighborhood, and was slow. Managing users and groups were among other issues Active Directory solved.
Appendix D: Licensing Information •• Overview This product included copyrighted third-party software licensed under the terms of GNU General Public License. Please see THE GNU General Public License for extra terms and conditions of this license. Source Code Availability Thecus Technology Corp. has exposed the full source code of the GPL licensed software. For more information on how you can obtain our source code, please visit our web site, http://www.thecus. com.
•• CGIC License Terms Basic License CGIC, copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004 by Thomas Boutell and Boutell. Com, Inc. Permission is granted to use CGIC in any application, commercial or noncommercial, at no cost. HOWEVER, this copyright paragraph must appear on a “credits” page accessible in the public online and offline documentation of the program.
the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software.
warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
ware interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machinereadable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
rivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.