User’s Manual N2520/N2560/N4520/N4560 Series v6.
Copyright and Trademark Notice Thecus and other names of Thecus products are registered trademarks of Thecus Technology Corp. Microsoft, Windows, and the Windows logo are registered trademarks of Microsoft Corporation. Apple, iTunes and Apple OS X are registered trademarks of Apple Computers, Inc. All other trademarks and brand names are the property of their respective owners. Specifications are subject to change without notice. Copyright © 2013 Thecus Technology Corporation. All rights reserved.
Safety Warnings For your safety, please read and follow the following safety warnings: ¾¾ Read this manual thoroughly before attempting to set up your Thecus IP storage. Thecus IP storage���������������������������������������������������������� is a complicated electronic device. DO NOT attempt to re� ¾¾ Your ��������������������������������������������������������������������������� pair it under any circ umstances.
Table of Contents Copyright and Trademark Notice.................................................ii About This Manual........................................................................ii Limited Warranty..........................................................................ii Safety Warnings............................................................................iii §Chapter 1: Introduction..............................................................1 1.1 Overview.............................
3.3.13 Reboot & Shutdown.................................................................................................. 20 3.3.14 File System Check...................................................................................................... 20 3.3.15 Wake-Up On LAN (WOL).......................................................................................... 22 3.3.16 SNMP Support (N4520/N4560 Only)................................................................... 22 3.3.17 UI Login Function..
3.7.3 Module Installation...................................................................................................... 75 3.7.4 NAS Application............................................................................................................ 76 3.8 Backup..............................................................................................76 3.8.1 Rsync Target Server...................................................................................................... 76 3.8.
§Chapter 1: Introduction 1111 Overview Thank you for choosing the Thecus IP Storage Server. The Thecus IP storage is an easy-to-use storage server that allows a dedicated approach to storing and distributing data on a network. Data reliability is ensured with RAID features that provide data security and recovery—over multiple Terabyte of storage are available using RAID 5 and RAID 6.
1111 Front Panel •• N2520/N2560: The Thecus N2520/N2560’s front panel shows the device’s indicators and hard disk install slots: Front Panel Item 1. System status 2. HDD1 LED 3. HDD2 LED 4. LAN LED 5. USB LED 6. USB Copy Button 7. Power Button/LED 8. USB Port 9.
•• N4520/N4560: The Thecus N4520/N4560 front panel shows the device’s indicators, system information and hard disk trays: Front Panel Item 1. Power LED 2. System status 3. LAN LED 4. System Failure 5. USB Port 6. Power Button 7. Up Button 8. Down Button 9. Enter 10. Escape 11. LCD Display 12. HDD Tray Description Solid blue: Power on Blinking orange: Diagnostic mode kick-in Solid orange: Diagnostic completed Green : Network activity Red on while diagnostic test failed. USB 3.
1111 Rear Panel •• N2520/N2560: The N2520/N2560 rear panel features ports and connectors. Back Panel Item 1. System Fan 2. HDMI 3. SPDIF 4. LAN Port 5. USB Port 6. Power Connector 7. Reset Button 4 Description System fan that exhausts heat from the unit. For Video/Audio out For Audio out LAN port for connecting to an Ethernet network through a switch or a router. USB 2.0 port for compatible USB devices, such as digital cameras, USB disks, and USB printers.
•• N4520/N4560: The N4520/N4560 rear panel features ports and connectors. Back Panel Item 1. System Fan 2. USB Ports 3. LAN Port 4. Reset Button 5. HDMI 6. SPDIF 7. Power Connector Description System fan that exhausts heat from the unit. USB 2.0 port for compatible USB devices, such as digital cameras, USB disks, and USB printers. LAN port for connecting to an Ethernet network through a switch or router Resets the N4520/N4560.
§Chapter 2: Hardware Installation 2222 Overview Your Thecus IP storage is designed for easy installation. To help you get started, the following chapter will help you quickly get your Thecus IP storage up and running. Please read it carefully to prevent damaging your unit during installation. 2222 Before You Begin Before you begin, be sure to take the following precautions: 111 Read and understand the Safety Warnings outlined in the beginning of the manual.
333 Press the power button on the Front Panel to boot up the Thecus IP storage.
§Chapter 3: System Administration 3333 Overview The Thecus IP storage provides an easily accessible Web Administration Interface. With it, you can configure and monitor the Thecus IP storage anywhere on the network. 3333 Web Administration Interface Make sure your network is connected to the Internet. To access ��������������������������������� Thecus IP storage���������������� Web Administration Interface: 111 Type the Thecus IP storage IP address into your browser.
333333 My Favorite The user interface with “My Favorite” shortcut allows the user to designate often used items and have them display on the main screen area. The figure below displays system favorite functions. Administrators can add or remove favorite functions to My Favorites by right clicking the mouse on the menu tree. 333333 Control Panel The Control Panel is where you will find all of the information screens and system settings of Thecus IP storage.
333333 Message Bar You can get quick information about your system status by moving your mouse over these icons. Message Bar Item Status Description RAID Information. Display the status of created RAID volume. Click to go to RAID information page as short cut. Disks Information. Display the status of disks installed in the system. Click to go to Disk information page as short cut. Network. Green: Connection to the network is normal.
333333 Language Selection The Thecus IP storage supports multiple Languages, including: English Japanese Traditional Chinese Simplified Chinese French German Italian Korean Spanish Russian Polish Portuguese On the menu bar, click Language and the ������������������ selection��������� �������� list ��� appears. This user interface will switch to the selected language for Thecus IP storage.
333333 System/Service Status From the System Management category,, choose the S��������������������������������������������� tatus���������������������������������������� item, System �������������������������� Service Status ����������� and�������� HW����� Status screens appear. These screens provide basic system and service status information.
WARN Shows only warning messages. ERROR Shows only error messages. Download All Log File Export all logs to an external file. Truncate All Log File Clear all log files. The number of lines per page Specify desired number of lines to display per page. Sort Ascending Shows logs by date in ascending order. Sort Descending Shows logs by date in descending order. |<< < > >>| Use the forward ( > >>| ) and backward ( |<< < ) buttons to browse the log pages. Re-loading logs.
Syslog service Target Syslog folder Log Level Remote IP Address If Server has been selected then associated syslog folder will be used to store all system logs from other NAS devices which has assigned this system for syslog server as well as syslog of this server unit. It can be seen from associated syslog folder with files “error”, “Information” and “warning”. If client has been selected then “Local” or “Remotely” can be choose.
For the on-line users list, system monitor will display the on-line users and the share folder they have visited. System Monitor Item Description Save Layout Saving selected monitoring items. Layout will remain the same for future visits. Reset Layout Set back to default monitoring settings and layout. History Click on this check box and system monitor will write the monitoring history to a designate path in the RAID volume. Lock Layout All of the monitoring items are fixed and cannot be changed.
16 Chapter 3: System Administration
333333 Time: Setting system time From the System Management category, choose the Time item and the Time screen appears. Set the desired Date, Time, and Time Zone. You can also elect to synchronize the system time on Thecus IP storage with an NTP (Network Time Protocol) Server. See the following table for a detailed description of each item: Time Item Date Time Time Zone NTP Service S ync with e x ter nal NTP Server Description Sets the system date. Sets the system time. Sets the system time zone.
333333 Schedule Power On/Off Using the Thecus IP storage System Management, you can save energy and money by scheduling the Thecus IP storage to turn itself on and off during certain times of the day. From the System Management category, choose the Schedule Power On/Off item and the Schedule Power On/Off screen appears. To designate a schedule for the Thecus IP storage to turn on and off, first enable the feature by checking the Enable Schedule Power On/Off checkbox.
3333333 Administrator Password From the System Management category, choose the Administrator Password item and the Change Administrator Password screen appears. Enter a new password in the New Password box and confirm your new password in the Confirm Password box. Press Apply to confirm password changes. See the following table for a detailed description of each item. Change Administrator Item New Password Confirm Password Apply Description Type in a new administrator password.
Resetting to factory defaults will not erase the data stored in the hard disks, but WILL revert all the settings to the factory default values 3333333 Reboot & Shutdown From the System Management category, choose Reboot & Shutdown item, and the Shutdown/Reboot System screen appears. Press Reboot to restart the system or Shutdown to turn the system off. 3333333 File System Check The File System Check allows you to perform a check on the integrity of your disks’ file system.
Once you click Next, you will see the following screen: Click Start to begin the file system check. Click Reboot to reboot the system. When the file system check is running, the system will show 20 lines of information until it is complete. Once complete, the results will be shown at the bottom. The system must be rebooted before Thecus IP storage can function normally after file system check completes.
3333333 Wake-Up On LAN (WOL) The Thecus IP storage has the ability to be awoken from sleep mode via LAN port. From the System Management category, choose the WOL item, and the Wake-up On LAN screen appears. From here, you can Enable or Disable. 3333333 SNMP Support (N4520/N4560 Only) From the System Management category, choose the SNMP������������������������������������� ����������������������������������������� item and the ����������������������� SNMP Support����������� screen appears.
3333333 Networking From the System Management category, choose Networking, and the Networking Configuration screen appears. This screen displays the network parameters of the global setting and available network connection. You may change any of these items and press Apply to confirm your settings.
Most faster Ethernet (10/100) Switches/Routers do not support Jumbo Frame and will not be able to connect to your Thecus NAS after Jumbo Frame is turned on. 3333 Storage Management The Storage menu displays the status of storage devices installed in the Thecus IP storage. It includes storage configuration options such as RAID and disk settings, iSCSI (N4520/N4560) and ISO Mount (N4520/N4560).
•• S.M.A.R.T. Information On the Disk Information screen, select a disk then click on “Smart” to list the S.M.A.R.T. info of the associated disk. You may also perform a disk SMART test; simply click “Test” to start the SMART test. The result is only for reference and the system will not take any action from its results. S.M.A.R.T. Information Item Tray Number Model Power ON Hours Temperature Celsius Reallocated Sector Count Description Tray the hard disk is installed in.
Test Type Current count of unstable sectors (waiting for remapping). The raw value of this attribute indicates the total number of sectors waiting for remapping. Later, when some of these sectors are read successfully, the value is decreased. If errors still occur when reading sectors, the hard drive will try to restore the data, transfer it to the reserved disk area (spare area), and mark this sector as remapped.
RAID Level Status Disks Used Total Capacity Data Capacity Shows the current RAID configuration. Indicates status of the RAID. Can read either Healthy, Degraded, or Damaged. Hard disks used to form the current RAID volume. Total capacity of the current RAID. Indicates the used capacity and total capacity used by user data. •• Create a RAID On the RAID Information screen, press the Create button to go to the RAID Volume Creation screen.
333 Specify a RAID ID. 444 If this RAID volume is meant to be the Master RAID volume, tick the Master RAID checkbox. In a multiple RAID configuration, one RAID volume must be designated as the Master RAID volume. The Master RAID volume will store all installed modules. If the Master RAID is changed to another location (i.e. assigning volume 2 to be the Master RAID volume after volume 1 had been previously assigned), then all modules must be reinstalled.
Once the Create button has been pressed with the Encryption checkbox enabled, the following message pop-up will appear for confirmation. After the RAID volume has been created, you may remove the USB disk until the next time the system boots. The RAID volume cannot be mounted if the USB disk with the encryption key isn’t found in any system USB port when the volume is accessed. To activate the encrypted volume, plug the USB disk containing the encryption key and into any system USB port.
888 Selected the file system you would like to have for this RAID volume. . 999 Press Submit to build the RAID storage volume. 1111 Press “Yes” for RAID volume creation preparation. Then click “Finish” to start up with RAID volume building.
Building a RAID volume may be time consuming, depending on the size of hard drives and RAID mode. In general, if the RAID volume building process is up to “RAID Building”, then the data volume is accessible. Creating RAID destroys all data in the current RAID volume. The data will be unrecoverable. •• RAID Level You can set the storage volume as JBOD, RAID 0, RAID 1, RAID 5, RAID 6, or RAID 10 (depending on model).
Creating RAID destroys all data in the current RAID volume. The data will be unrecoverable. •• Edit RAID On the RAID Information screen, press the Edit button to go to the RAID Information screen. Using Edit RAID, you can select RAID ID and the Spare Disk.
•• Remove RAID Click to remove the RAID volume. All user data and iSCSI created in the selected RAID volume will be deleted. To remove a RAID volume, follow the steps below: 111 On the RAID List screen, select the RAID volume by clicking on its radio button, and click RAID Information to open the RAID Configuration screen. 222 On the RAID Configuration screen, click Remove RAID. 333 A confirmation screen will appear, you will have to click “Yes” to complete the “Remove RAID” operation.
•• Migrating a RAID(Dose not apply to the N2520/N2560) Once a RAID volume has been created, you may want to move it to other physical drives or change the RAID array all together. To migrate a RAID 1, RAID 5 or RAID 6 volume, follow the steps below: 111 From the RAID Configuration screen, click Migrate RAID. 222 A list of possible RAID migration configurations will be listed. Select the desired migration scheme and click Apply. 333 The system will begin migrating the RAID volume.
•• •• Migrating a RAID volume could take several hours to complete. The RAID migration feature is available only when it is configurable. Here is a list of limitation with RAID level migration function: 111 During RAID level migration, it is not permitted to reboot or shutdown system. 222 For RAID migration from R1 to R5 or R1 to R6, all services will restart and “iSCSI” volume will be in read only mode but read/write of the “user data” will be possible during the operation.
333333 NAS Stacking (N4520/N4560 Only) The Thecus IP storage’s capacity can be expanded even further using the stackable function. With it, users can expand the capacity of their network storage systems up to 5 other stack target volumes which are located in different systems. These can be stacked through single network access like SMB or AFP acting as a share folder type. From the main menu, the stackable feature is located under “Storage”. Please refer the figure below for reference. A.
Next, input the target IP address of the stackable device and click the Discovery button. The system will list available target volumes from the inputted IP address. Once the volume IP has been set, you may need to input a valid user name and password to validate your access rights. If there is no user name and password needed to access target volume, then leave it blank. The Stacked Target name will become the network share name and will be displayed through network access such as SMB.
From the figure above, the Stacked Target name is “pmmeeting”. The figures below show the result before and after via Microsoft Network Access when settings have been completed. The Browseable setting is the same method used for setting a system share folder. It designates whether or not this folder will be visible through web disk. You may refer to the figure below for reference when Yes and No are selected.
The Public setting will be set the same way as the setting for the system share folder associated with the ACL permission is. If Public is set to Yes, all users will be able to access it, and ACL button will be grayed out. If Public is set to No, the ACL button will be available in the Stack Target List window. Click Apply to save your changes. B. Activate a Stack Target After your settings have been applied, the system will bring you back to the Stack Target List window as shown below.
With this newly attached stack target device, you will see the information displayed and also have access to several options to choose from. In general, if the attached stack target device has been used by another Thecus NAS as stack target volume, then the Format item will be display and system will recognize it straight away and display its capacity. Otherwise, the Format item will be available and the Capacity and Status items will show as “N/A” and “Unknown file system” respectively.
D. Stack Target ACL If the stack target Public setting set to Yes, then the ACL button will be grayed out. However, if Public setting is set to No, then the ACL button will be available for you to setup user access permissions for the stack target. The ACL settings will be exactly the same as the system folder that you may have setup previously. E.
333333 ISO Mount (N4520/N4560 Only) The ISO Mount feature is a very useful tool from the Thecus products. With it, users can mount an ISO file and have the export name display all the details from the mounted ISO file. From the main menu, the ISO Mount feature is located under “Storage”. Please refer the figure below for reference. Select the ISO Image Mounting function and the ISO Image Mounting window will appear as shown here. A.
To mount the new ISO file, select one file from the list of files and input the desired mounting name into the “Mount as:” field. Click “ADD” to confirm the completion of the mounting. If nothing is input in the “Mount as” ISO file export name field, the system will automatically give an export name to the ISO file. The mounting name will then be defined by the ISO file name. After completion, the page will display all mounted ISO files. You can click “Unmount” to eliminate a mounted ISO file. B.
333333 iSCSI (N4520/N4560 Only) You may specify the space allocated for iSCSI.����������������������������������������������������� See ���������������������������������������������������� the table below to the allowed������������������ iSCSI target num���� ber per system: Model Allowed iSCSI volume N4520/N4560 15 •• iSCSI Target To add iSCSI target volume, click iSCSI with associated RAID volume from its drop down list and select the desired RAID volume.
To allocate space for an iSCSI target on the current RAID volume, follow the steps below: 111 Under the iSCSI Target List, select iSCSI Target then click Add. The Create iSCSI Volume screen appears. Create iSCSI Volume Item iSCSI Target Volume Target Name iqn_Year Iqn_Month Authentication Username Password Password Confirm Mutual CHAP Description Enable or Disable the iSCSI Target Volume. Name of the iSCSI Target. This name will be used by the Stackable NAS function to identify this export share.
Username Password Password Confirm RAID ID LUN Allocation LUN Name Unused Allocation LUN ID iSCSI Block size Enter a username. Enter a password. Reenter the chosen password ID of current RAID volume. Two modes can be choose from: Thin-provision: iSCSI thin-provisioning shares the available physical capacity to multiple iSCSI target volumes. It allows virtual capacity to be assigned to targets prior to adding physical space when it has run out.
222 Modify your settings. Press ok to change. •• Expand Volume The iSCSI volume is now able to expand its capacity from unused space (Instant Allocation mode only).
You will then see the dialog box displayed below. Drag the Expand Capacity bar to the size you want. Then press Expand to confirm the operation. •• Delete Volume To delete volume on the current RAID volume, follow the steps below: 111 Under the Volume Allocation List, click Delete. The Space Allocation screen appears.
222 Press YES. All data in the volume will be removed. •• iSCSI Thin-Provisioning If iSCSI Thin-Provisioning is selected when creating an������������������������������������������� iSCSI target volume,���������������������� virtual memory is assigned to the target, allowing the physical memory to reach maximum capacity and adding new disks only when needed. To setup iSCSI thin-provisioning, simply select “Thin-Provision” mode from the “Create LUN” setting screen.
From the LUN ACL setting screen click “Add”: Next, input “Initiator iqn” and setup iSCSI target volume access privileges from the available list. Apply by clicking the OK button. The accessible Initiator will be listed as shown in the screen shot displayed below.
The listed “Initiator iqn” can be modified or deleted by selecting the desired iqn and pressing Modify or Delete. •• Advance Option There are 3 available options for the user to operate Thecus IP storage associated with iSCSI setting. The details are listed in the following screenshot. If the options are modified, the system will need to reboot for the changes to take place. iSCSI CRC/Checksum To enable this option, the initiator can connect with “Data digest” and “Header digest”.
Error Recovery Level The Error Recovery Level (ERL) is negotiated during a leading iSCSI connection login in traditional iSCSI (RFC 3720) and iSER (RFC 5046). ERL=0: Session Recovery ERL=0 (Session Recovery) is triggered when failures within a command, within a connection, and/or within TCP occur. This causes all of the previous connections from the failed session to be restarted on a new session by sending a iSCSI Login Request with a zero TSIHRestart all iSCSI connections on any failure.
Item Work Group / Domain Name ADS Support ADS Server Name ADS Realm Administrator ID Administrator Password Apply Description Specifies the SMB/CIFS Work Group / ADS Domain Name (e.g. MYGROUP). Select Disable to disable authentication through Windows Active Directory Server. Specifies the ADS server name (e.g. adservername). Specifies the ADS realm (e.g. example.com). Enter the administrators ID of Windows Active Directory, which is required for Thecus IP storage to join domain.
Local User Configuration Item Description Press the Add button to add a user to the list of local users. Press the Edit button to modify a local user. Press the Remove button to delete a selected user from the system. Add Edit Remove •• Add Users 111 Click on the Add button on Local User Configuration screen, and Local User Setting screen appears. 222 On the Local User Setting screen, enter a name in the User Name box. 333 Enter a User ID number or leave blank to use the system default value.
•• Edit Users 111 Select an existing user from the Local User Configuration screen. 222 Click on the Edit button, and the Local User Setting screen appears. 333 From here, you can enter a new password and re-enter to confirm, or use the << or >> buttons to have this user join or leave a group. Click the Apply button to save your changes. •• Remove Users 111 Select an existing user from the Local User Configuration screen. 222 Click on Remove button and the user is deleted from the system.
Local Group Configuration Item Add Edit Remove Description Press the Add button to add a user to the list of local groups. Press the Edit button to modify a selected group from the system. Press the Remove button to delete a selected group from the system. •• Add Groups 111 On the Local Group Configuration screen, click on the Add button. 222 The Local Group Setting screen appears. 333 Enter a Group Name. 444 Enter a Group ID number. If left blank, the system will automatically assign one.
•• Remove Groups 111 On the Local Group Configuration screen, select a group name from the list. 222 Press Remove to delete the group from the system. 333333 Batch Users and Groups Creation The Thecus ���������������������������������������������������������������������������������������������� IP storage����������������������������������������������������������������������������� can also add users and groups in batch mode.
333333 Share Folder From the File Sharing/Privilege menu, choose Share Folders, and the Shared Folder screen appears. This screen allows you to create and configure folders on the Thecus IP storage volume. •• Adding Folders On the Folder screen, press the Add button and the Add Folder screen appears. This screen allows you to add a folder. After entering the information, press Apply to create new folder.
you to change folder information. After entering the information, press Apply to save your changes. Modify Folder Item Folder Name Public Apply Description Enter the name of the folder. Admit or deny public access to this folder. Press Apply to create the folder. •• Remove Folders To remove a folder, press the Remove button from the specified folder row. The system will confirm folder deletion. Press Yes to delete the folder permanently or No to go back to the folder list.
•• NFS Share (N4520/N4560 Only) To allow NFS access to the share folder, enable the NFS Service, and then set up hosts with access rights by clicking Add. NFS Share Item Hostname Privilege OS Support ID Mapping Sync / Async Apply 60 Description Enter the name or IP address of the host Host has either read only or writeable access to the folder. There are two selections available: •• Unix / Linux System •• AIX (Allow source port > 1024) Choose the one which best fits your needs.
•• Samba Configuration On the Folder screen, press the Samba button and the Samba Configuration screen appears. This screen allows you to setup samba configuration for associated folder. After entering the information, press Apply to activate input settings. Samba Configuration Item RAID ID Folder Name Public Apply Description RAID volume where the new folder will reside. Enter the name of the folder. Admit or deny public access to this folder. Press Apply to create the folder.
ACL setting Item Deny Read Only Writable Recursive Description Denies access to users or groups who are displayed in this column. Provides Read Only access to users or groups who are displayed in this column. Provides Write access to users or groups who are displayed in this column. Enable to inherit the access right for all its sub-folders. To configure folder access, follow the steps below: 111 On the ACL screen, all network groups and users are listed in the left hand column.
The ACL can only be set for share and sub-folders level, not for files. The ACL screen also allows you to search for a particular user. To do this, follow the steps below: 111 In the blank, enter the name of the user you would like to find. 222 From the drop down select the group you would like to search for the user in. 333 Click Search. 333333 User Quota The Thecus IP storage support local or AD users with storage quota limitations in each RAID volume of the system.
333333 User and Group Backup The user and group backup feature allow system users and groups to be backed up to another location and be restored if needed. Please note, when restoring previous backup users and groups, the current users and groups list will be replaced from this restore file’s contents. 333333 LDAP Support (N4520/N4560 Only) The LDAP is the other way to authenticate login users who has joined LDAP server, fill in the LDAP server information and get LDAP authentication started.
A description of each item follows: LDAP Support Item LDAP Service LDAP Server IP Base Domain Manager Password Apply Check ObjectClass Description Enable or Disable LDAP service. Input LDAP server IP address. Input base domain information ex. dc=tuned, dc=com, dc=tw Input manager’s name. Input manager’s password Click Apply to save your changes. Click this checkbox to ensure LDAP server has a Samba sam and a POSIX account or it may not work properly for LDAP client authentication.
3333 Network Service Use the Network Service menu to make network service support settings. 333333 Samba / CIFS There are options allow Admin to Enable/Disable to operate Thecus IP storage associated with Samba / CIFS protocol. With the option changed, it will need to reboot system to activate. •• Samba Service Used for letting the operating system of UNIX series and SMB/CIFS of Microsoft Windows operating system (Server Message Block / Common Internet File System).Do the link in network protocol.
Simply enable the “Recycle Bin” function and “Recycle Folder Display” then all of deleted files/folders will reside in the “_NAS_Recycle_(Associated RDID Volume)” share folder. For example, the system has created 2 RAID volumes with ID “RAIDpm” and ‘RAID”. Then it will have 2 recycle bin folder appear as “_NAS_Recycle_RAID” and “_NAS_Recycle_RAIDpm”. There are 2 more setting could help to manage the recycle bin for deleted folders/files.
333333 AFP (Apple Network Setup) From the System Network menu, choose the AFP item, and the AFP Support screen appears. This screen displays the configuration items for the Apple Filing Protocol. You can change any of these items and press Apply to confirm your settings.
333333 NFS Setup (N4520/N4560 Only) From the System Network menu, choose the NFS item, and the NFS Support screen appears. The Thecus IP storage can act as an NFS server, enabling users to download and upload files with their favorite NFS clients. Press Apply to confirm your settings. A description of each item follows: NFS Server Setting Item NFS Apply Description Enable or Disable NFS support. Click Apply to save your changes.
Allow Anonymous FTP Access Auto Rename Upload Bandwidth Download Bandwidth Upload/Download: Allow anonymous FTP users to upload or download files to/from public folders. Download: Allow anonymous FTP users to download files from public folders. No access: Block anonymous FTP user access. If checked, the system will automatically rename files that are uploaded with a duplicate file name. The renaming scheme is [filename].#, where # represents an integer.
A description of each item follows: Web Service Item HTTP (WebDisk) Support HTTPs (Secure WebDisk) Support Certificate Type Certificate File Certificate Key File CA Certificate File Restore All SSL Certificate Files Apply Description Enable or disable WebDisk support. Enter the port number if this option is enabled. The port number is default 80. Enable or disable secure WebDisk support. Enter the port if this option is enabled. Select “User” if there is available Certification ID ex. Apply from VeriSign.
333333 SSH The device is now SSH protocol supported. It allows user to use SSH and have console to manipulate as���������������������������������������������������������������������������������������������������� needed.
A description for each item as following: DDNS Item DDNS Service Register User name Password Domain name Apply Description Enable or disable DDNS service. Choose the service provider from the drop down list. Input user name with DDNS registry. Input password with DDNS registry. Input domain name with DDNS registry. Click “Apply” to confirm the changes. 3333333 UPnP Port Management One of the most convent way to allow users to access required services such as FTP, SSH, web disk and http etc.
And click “Add Rule” to add more port mapping from Internet to access desired services or press “Refresh” to get most updated list. A description for each item as following: UPnP Port Management Item Start port End port Protocol Description Apply Cancel Description Specific port number starts with. Specific port number ended Choose the protocol for port forwarding needed. Specific the port services if applicable. Click “Apply” to confirm the changes.
3333 Application Server The Thecus IP storage supports built-in application such as iTunes server as well as add-on official or third -party applications. 333333 iTunes® Server (Built in) With the built-in iTunes server capability, Thecus IP storage enables digital music to be shared and played anywhere on the network! From the Network menu, choose the iTunes item, and then the iTunes Configuration screen appears. You may enable or disable the iTunes Service from here.
333333 NAS Application Click on NAS Application from the Application Server category, it will list the current system software and official application status. 3333 Backup There are a number of ways to back up data with the Thecus IP storage. 333333 Rsync Target Server When it comes to backing up your data, it’s very important to have flexibility. Data guard provides you with many options, including full backup for all shares, custom backup for selected shares and iSCSI volume backup.
111 Enable Rsync Target Server 222 Add a username and password (they can be different than your NAS’s username and password) 333 Select Apply You will need this user name and password while the data is going to remotely backup to this Rsync target server. Now Rsync is turned on your NAS, which means it can be used as a target for Rsync backup, in other words, only the backup NAS needs to be activated in this way.
Then 3 different selections appear and can be chosen from: Remote Data backup Item Full Backup Custom Backup iSCSI Backup 78 Description The “Full backup” will have all shares from source backup to destination. It could also create shares automatically from destination if it is not existent. This only applies if the target server is the same model as the source. The “Custom backup” allows user to choose desired shares backup to destination.
•• Full Backup Click on full backup and the setup screen appear as below. Fill in the remote target IP (Destination) and port (need to be changed only if this port is already in use). If encryption is required then enable it. Please make sure the associated target server also has encryption enabled. Carry on with inputting valid remote target server account name and password. After the settings are complete, please click on “Connection Test”.
-Fill out all the necessary details and choose your parameters Add Rsync Backup Task Item Task Name Backup Type Sync Type Compress Backup NAS Config Resume Partial File Handle Sparse File Keep ACL Setting Log Location Speed Limit Timeout Limit Enable Schedule Description This is how this task will appear in the task list. Real time: It will backup folders/files from source to target on the fly. On the other hand, any changes from the source will back up to the target right away.
From the task list, you can now see the newly added task “fullback01”. The backup is setup as “real time”. From the status field, “Processing” can be read as the back-up is performed on the fly. •• Custom Backup The custom backup setting is similar to the full backup. The only differences are explained below: 111 Inputs the share folder name of target sever where the source is going to backup. The subfolder can be left as blank.
333 Click “Next” and more setting appears. These are the as the settings for “Full backup” 444 Click “Finish” and the data guard task will appear in the list as shown below. From the task list, you can now see the newly added “customback01”. This backup is setup as “schedule”.
•• iSCSI Backup If the source unit contains iSCSI volume, it can be backed up to the target unit as a single file. The procedure is the same as for the previous “Full backup” and “Custom backup”, select “iSCSI backup” from data guard wizard. 111 Inputs the share folder name of the target sever where the source is going to backup. The sub-folder can be left as blank. 222 Select the iSCSI target volume which you wish to back up to the target server. 333 Click “Next” and more settings will appear.
4. Click “Finish” and the data guard task will appear in the list as shown below. From the task list, you can now see the newly added “iscsiback”. This backup is setup as “schedule”. The source folder name will use iSCSI_+target volume name. So here it is displayed as “iSCSI_pmtest”. pmtest is the iSCSI target name when the iSCSI target was created. The iSCSI backup can see the result as below. The task “iSCSI_pmtest” has backup to target 172.16.66.
•• Restore NAS Configuration This is a useful feature if the system configuration needs to be restored to a brand new unit. Let’s go thru the following example to see how it works. The original source system has 3 RAID volume, “RAID”, ‘RAID10” and “RAID20”, and has backed up the system configurations to the target server. The brand new source unit only has a 1 RAID volume ‘RAID”.
333 Click “Next” and a screen will appear as shown below. It has the listed available system configuration backup files. Select the one you want and click next. You also have the option to download the current system configuration before restoring from the backup file. 444 After clicking “Next”, a screen will appear as shown below. Listed on the left hand side, you will see the configuration backup details which contain the 3 RAID volumes.
555 The backup configuration has different numbers of RAID volume than the current system (3 vs 1). It can be kept as the RAID volume mapping arranged by the system, then carry on to click “Finish”. This means that all 3 RAID volumes configuration such as share folder etc. will all restore to the current unit in the RAID volume “RAID”.
333333 Data Guard (Local Backup) The Thecus product provides complete backup solution between Thecus NAS systems as well as between folders of local systems. Remote Data backup Item Add Edit Remove Start Stop Restore Log Restore NAS Configuration Description Add a new task. Edit selected task. Remove selected task. Click on start to start a scheduled scan task right away. Stop the associated running task.
Local Data backup Item Import Copy Realtime Backup Schedule Backup iSCSI Backup iSCSI Import Description This is associated with external devices which are added to the system such as USB disk. You can select a folder from an external device and import it to the NAS as a share folder. Copy folder to folder or NAS folder to external device or external device to NAS folder. This backup is within folder level. The task will be executed on the fly between the source and the target.
imported them to the NAS under the RAID60volume. Next, please select the path from the drop down list to save the log. Also, give the access permission whether these selected folders will be “Public” or not after the import.
Now, you will see in the data guard task list that you have created a task . And that the system has created 2 new share folders from the task just created. 222 Copy: click on “Copy” and this screen appears. 3 different options can be selected, folder to folder, folder to external device or external device to folder.
•• Folder to Folder •• Folder to external device •• External device to Folder 92 Chapter 3: System Administration
Let’s take “Folder to External device” as an example. In the source pane, select the desired RAID volume and its associated folder list will appear; same method in the target pane for the associated external device. Select a folder from the source pane which is going to be copy over, then select in target pane it’s destination. Choosing the sync type, “Incremental” or ‘Sync”, and select the log path from the drop menu list.
Read the notes and check the “Accept” box for confirmation. Now, you will see in the data guard task list that you have created a task. 333 Realtime Backup: click on “Realtime Backup” and this screen will appear. 2 different options can be selected from, folder to folder, folder to external device. Let’s take “Folder to Folder” backup for example. Select from the source pane the folder “NAS_ Public”, then select its destination in the target panefolder “R6andy”.
Next, fill in the task name and related settings.
Realtime Backup Item Task Name Sync Type Backup Symbolic Link Filter Description Input the task name, length limited to 4~12 characters. Select “Incremental” or “Synchronize”. Choose to backup symbolic link which is included in the source. The filter can be set to be executed only in certain circumstances. If none of them has been selected, it will do the real time backup from the source to the destination in full.
444 Schedule Backup: click on “Schedule Backup” and this screen will. 2 different choices can be selected from, folder to folder, folder to external device. Let’s use “Folder to External device” backup for our example. From the NAS volume RAID in the Source pane select the folder “NAS_Public”, then in the target pane select the external USB disk folder “N10850”. Next, fill in the task name and related settings.
Read the notes and check the “Accept” box for confirmation. Now, you will see in the data guard task list that you have created a task. 555 iSCSI Backup: click on “iSCSI Backup” and screen appear as below. It can be backup to two different storage pool, iSCSI to folder, iSCSI to external device.
Let’s take example to have “iSCSI to Folder” backup, from existed iSCSI volume “iSCSI_iscsiv502” to volume RAID folder “andy_local”. The source pane listed “iSCSI_iscsiv502” and “iSCSI_iscsiv50” where are iscsi volume has existed in this system with name “iSCSI_+iscsi target volume name”. Next, provide the task name and where the task log will store. Reading the note and check on “Accept” for confirmation.
task list will have created task listed. To start the iSCSI volume backup, select the task and click “Start” from task bar. Once “Start” click, the associated iSCSI volume will not allow to I/O during backup processing. And the task status will change to ‘Processing”. States change to “Finish” after task complete. From the RAID volume folder ‘andy_local’, it has backup iSCSI volume file stored. This backup iSCSI volume file is needed while it required import to storage.
666 iSCSI Import: click on “iSCSI Import” and screen appear as below. It can be imported from two different storage pools, folder to iSCSI or external device to iSCSI. It is depend on where iSCSI volume has backup to. Let’s take example to import “RAID folder to iSCSI” which is the iSCSI volume we have backup earlier to RAID volume folder andy_local than import to volume RAID.
Next, provide where the task log will store. Reading the note and check on “Accept” for confirmation. Now, from the data guard task list will have created task listed. 333333 ACL Backup and Restore The ACL backup and restore feature enables the system ACL (Access Control List) to be backed up on the RAID volume based to other location and restored if needed. Let’s look at the example bellow to see how it works.
For the ACL restore, it can be restored in the same system or used in another unit. For example, let’s restore the ACL backup file to another unit. This unit has a RAID volume “RAIDpm” with share folders as listed on right hand screen shot. After inputting the ACL backup file and clicking the “Next” button, the system will show another screen to list the matched folders in between the backup file and this RAID volume. Just select the desired folders for the ACL restore.
333333 Data Burn The data burn is featured to support 3 different modes of data burning for files/folders to and from image file and physical optical disk. The 3 different modes are “Write Files/folders to disc”, “Write image to disk” and “Write files/folders to image”. 111 Write Files/folders to disc aaa Click the Add button and the NAS share list appears. bbb Select files/folders which you would like to burn. All of the selected folders/files will be seen under the disc label name “New Disc”.
ccc Select from the installed USB burning devices. Please click the “detect disc” button to check the status once the disc is inserted. ddd Select the burning speed from the drop down list. eee Select whether disc data verification is required or not. fff Click “Burn” to start disc burning. 222 Write image file to disc. aaa Click “Browser” and the NAS share list will appear to locate the desired image file to burn.
bbb Select the ISO file. ccc Select from the installed USB burning devices. Please click the “detect disc” button to check the status once the disc is inserted. ddd Select the burning speed from the drop down list. eee Select whether disc data verification is required or not. fff Click “Burn” to start disc burning. 333 Create image file from files/folders aaa Click the Add button and the NAS share list will appear. bbb Select the files/folders which you would like to burn.
ccc Input the path where the ISO file is going to be stored, you can press the “Browse” button to have the share list appear. ddd Input the ISO file name for burned image file. eee Click “Burn” to start the ISO file burning. The data burn does not support rewriteable media if it has been burned with left space. On the other hand, the used rewriteable media will be erased first then carry on with burning. 3333 External Devices The Thecus IP storage supports printer server and UPS via USB interface.
•• Windows XP SP2 To set up the Printer Server in Windows XP SP2, follow the steps below: 111 Connect the USB printer to one of the USB ports (preferably the rear USB ports; front USB ports can be used for external HDD enclosures). 222 Go to Start > Printers and Faxes. 333 Click on File > Add Printer. 444 The Add Printer Wizard appears on your screen. Click Next. 555 Select the “A network printer, or a printer attached to another computer” option.
333 Select Add a network, wireless or Bluetooth printer. 444 Select The printer that I want isn’t listed. You can press The printer that I want isn’t listed to go into next page without waiting for Searching for available printers to finish. 555 Click Select a shared printer by name.
Type http://:631/printers/usb-printer in the box, where is the IP address of Thecus IP storage. Click Next. 666 Select or install a printer and then press OK. 777 Windows will attempt to connect to the printer. 888 You can choose to set this printer as the default printer by checking the Set as the default printer box. Click Next to continue.
999 Done! Click Finish.
333333 Uninterrupted Power Source From the External Devices menu, choose the Uninterrupted Power Source item and the UPS Setting screen appears. Make any changes you wish, and press Apply to confirm changes. See the following table for a detailed description of each item.
Appendix A: Customer Support If you are still experiencing problems with your Thecus IP storage, or require a Return Merchandise Authorization (RMA), feel free to contact technical support via our Technical Support Website: http://www.thecus.com/sp_tech.php Customers in the US should send all technical support enquiries to the US contact window included in the following web page: http://www.thecus.com/sp_tech.php For Sales Information you can e-mail us at: sales@thecus.
Appendix B: RAID Basics •• Overview A Redundant Array of Independent Disks (RAID) is an array of several hard disks that provide data security and high performance. A RAID system accesses several hard disks simultaneously, which improves I/O performance over a single hard disk. Data security is enhanced by a RAID, since data loss due to a hard disk failure is minimized by regenerating redundant data from the other RAID hard disks.
RAID 5 RAID 5 offers data security and it is best suited for networks that perform many small I/O transactions at the same time, as well as applications that require data security such as office automation and online customer service. Use it also for applications with high read requests but low write requests. RAID 5 includes disk striping at the byte level and parity information is written to several hard disk drives.
listed below: RAID Level Percentage Used RAID 0 100% 1/n x 100% (n-1)/n x 100% (n-2)/n x 100% 50% 100% RAID 1 RAID 5 RAID 6 RAID 10 JBOD n: HDD number 116 Appendix B: RAID Basics
Appendix C: Active Directory Basics •• Overview With Windows 2000, Microsoft introduced Active Directory (ADS), which is a large database/ information store. Prior to Active Directory the Windows OS could not store additional information in its domain database. Active Directory also solved the problem of locating resources; which previously relied on Network Neighborhood, and was slow. Managing users and groups were among other issues Active Directory solved.
Appendix D: Licensing Information •• Overview This product included copyrighted third-party software licensed under the terms of GNU General Public License. Please see THE GNU General Public License for extra terms and conditions of this license. Source Code Availability Thecus Technology Corp. has exposed the full source code of the GPL licensed software. For more information on how you can obtain our source code, please visit our web site, http://www.thecus. com.
•• CGIC License Terms Basic License CGIC, copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004 by Thomas Boutell and Boutell. Com, Inc. Permission is granted to use CGIC in any application, commercial or noncommercial, at no cost. HOWEVER, this copyright paragraph must appear on a “credits” page accessible in the public online and offline documentation of the program.
the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software.
warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
ware interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machinereadable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
rivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.