You are on page 1of 127

GroupStor 9000 Series

High Performance

Fault Tolerant NAS

User Guide
Copyright
_______________________________________________________________

2005 Micro Design International, Inc. All rights reserved.

Micro Design International


45 Skyline Drive, Suite 1017
Lake Mary, FL 32746

Trademarks
GroupStor is a trademark of Micro Design International, Inc. (MDI). Micro Design
International is a trademark of MDI.

All other company and product names are trademarks of their respective owners.

Disclaimer
MDI makes no representations or warranties with respect to the contents of this publication and
specifically disclaims any implied warranties, merchantability, or fitness for any particular
purpose.

MDI reserves the right to revise this publication without notice.

Copy and Use Restrictions


The use and copying of this manual and the software product described herein is subject to a
license agreement. Any other use is prohibited. No part of this publication may be reproduced,
transmitted, transcribed, sorted in a retrieval system or translated into any language in any form
by any means without the prior consent of MDI.

Documentation Revision History


First Edition January 2003
Revision A April 2003
Revision B October 2003
Revision C June 2004
Revision D March 2005
Table of Contents

Chapter 1 Introduction........................................................1
1.1 Features ............................................................................................... 1
1.2 Conventions.......................................................................................... 1
Terminology............................................................................................ 1
Typographic Conventions ....................................................................... 1
Chapter 2 Installing and Starting the GroupStor ..............3
2.1 Installing the GroupStor 9000 Series .................................................... 3
Sliding Rail Installation (All Rack Models) ............................................... 3
2.2 Setting the IP Addresses ...................................................................... 7
LCD Console Flow Chart ........................................................................ 7
Configuring the IP Addresses Using the LCD Console............................ 8
Configuring the IP Addresses Using NAStart .......................................... 9
2.3 Accessing the Administration Home Page .......................................... 10

Chapter 3 Server Configuration .......................................13


3.1 Server Information and Settings.......................................................... 13
3.2 Upgrading the Firmware ..................................................................... 15
3.3 Shutting Down the Server ................................................................... 15
Shutdown, Reboot and Startup Actions................................................. 15
Scheduled Shutdown and Power-on ..................................................... 16
3.4 Enabling UPS Support ........................................................................ 16
3.5 Modifying the Administrators Password ............................................. 17

Chapter 4 Network Configuration ....................................19


4.1 Network Information............................................................................ 19
4.2 TCP/IP Settings .................................................................................. 20
Network Teaming Mode........................................................................ 20
Configuring TCP/IP Settings ................................................................. 21
4.3 Windows Settings ............................................................................... 22
Configuring Windows Network Settings ................................................ 22
4.4 UNIX/Linux Settings............................................................................ 23
Configuring UNIX/Linux Network Settings............................................. 24
Configuring NIS Settings....................................................................... 24
4.5 Macintosh Settings ............................................................................. 25
Configuring Macintosh Network Settings............................................... 25
4.6 NetWare Network Settings.................................................................. 26
Configuring NetWare Settings............................................................... 26
4.7 Web Data Access Settings ................................................................. 26
Configuring Web Data Access .............................................................. 27
4.8 FTP Data Access Settings .................................................................. 27
Configuring FTP Data Access............................................................... 27
4.9 SNMP Settings ................................................................................... 28
Configuring SNMP Settings .................................................................. 28
4.10 Email Settings................................................................................... 29
Configuring Email Settings.................................................................... 29
4.11 SSL Settings..................................................................................... 29

Chapter 5 Storage Management.......................................31


5.1 Volume Usage and Status .................................................................. 31
Volume View......................................................................................... 31
Device View .......................................................................................... 33
Data Transfer Modes ............................................................................ 34
DMA Modes .......................................................................................... 34
5.2 Creating a Volume .............................................................................. 34
5.3 Deleting a Volume .............................................................................. 35
5.4 Expanding a RAID-5 Volume .............................................................. 35
5.5 Volume/Disk Scan .............................................................................. 36
5.6 Assigning Hot-Spare Disks ................................................................. 36
5.7 Migrating Data Volumes...................................................................... 37
5.8 Hot-Swapping ..................................................................................... 37

Chapter 6 Security Control ...............................................41


6.1 Security Information............................................................................ 41
6.2 Creating the Local User and Local Group Accounts............................ 42
6.3 Caching Windows Domain User Accounts .......................................... 44
Synchronize User Database ................................................................. 45
Update User Database ......................................................................... 45
6.4 Creating UNIX/Linux Host................................................................... 46
6.5 Creating Shares and Assigning Share Permissions ............................ 46
To Create a New Share: ....................................................................... 46
To Assign Share Permissions for Local and Domain Accounts: ............ 47
To Assign Share Permissions for a UNIX/Linux Host: ........................... 48
6.6 Configuring File and Folder Security and ACL .................................... 49
Set File/Folder Permissions on Windows Network ................................ 50
To Change Ownership of a File or Folder ............................................. 52
6.7 Managing Quotas ............................................................................... 52
Configuring User Quota ........................................................................ 52
Configuring Folder Quota...................................................................... 53
Chapter 7 Disc Sharing and Disc Archiving....................55
7.1 Using the Disc Server Function........................................................... 55
7.2 Creating Disc Images ......................................................................... 56
Using the Local Optical Device to Duplicate Disc Images ..................... 56
Copying Disc Images Via Network Filing Protocols or SmartSync......... 56
Using the Remote Mirroring Software to Create Disc Images ............... 57
7.3 Managing Discs .................................................................................. 57
To Change the Disc Name:................................................................... 57
To Delete a Disc Image: ....................................................................... 57
7.4 Sharing Discs ..................................................................................... 57
To Share a Single Disc: ........................................................................ 58
To Share Multiple Discs: ....................................................................... 58
To Share a Disc Image Folder: ............................................................. 58
7.5 Burning Disc Images........................................................................... 59
7.6 Archiving Data to CD/DVD Discs ........................................................ 59
The Archive Folder................................................................................ 59
Summary Logs...................................................................................... 59
Setting Up Data Archiving Tasks........................................................... 60
Chapter 8 User Access .....................................................63
8.1 Workgroup or Domain Mode ............................................................... 63
8.2 Access From Windows ....................................................................... 64
8.3 Access From Web Browsers............................................................... 65
Tool-bar Icons....................................................................................... 66
File Browsing ........................................................................................ 66
8.4 Access From MacOS.......................................................................... 67
8.5 Access From FTP Clients ................................................................... 68
8.6 Access From NFS Clients................................................................... 69

Chapter 9 Backup and Recovery......................................71


9.1 Loading and Writing CD/DVD Discs.................................................... 71
Loading CD/DVD Data.......................................................................... 71
Writing CD/DVD Discs .......................................................................... 72
9.2 Tape Backup and Restore .................................................................. 74
Adding Backup Tasks ........................................................................... 75
Restoring Files From Tape.................................................................... 75
Checking Task Progress and Viewing Logs .......................................... 76
9.3 SmartSync NAS-to-NAS Data Replication and Backup.................... 77
Building a Mirror Site............................................................................. 77
Making Disk-to-Disk Backups ............................................................... 79
Restoring Files From SmartSync Backups............................................ 81
Distributing File Updates to Multiple Sites ............................................. 82
The SmartSync Options........................................................................ 83
9.4 Backup and Restore System Profiles.................................................. 84
Backing Up System Profiles.................................................................. 84
Recovering System Configurations When a Disaster Occurs................ 84
Chapter 10 Event Notification and System Status..........86
10.1 Thermal Settings............................................................................... 87
10.2 Checking the Event Logs .................................................................. 87
Viewing Web Reminder ........................................................................ 87
Viewing System Log ............................................................................. 88
Viewing Device Log .............................................................................. 88
Viewing Security Log ............................................................................ 88
10.3 Viewing System Status ..................................................................... 89
Viewing the Open Files ......................................................................... 89
Viewing the Active Connections............................................................ 89
10.4 Saving System Settings and Status as HTML Files .......................... 90
10.5 Share Access Counts ....................................................................... 90

Chapter 11 Virus Protection .............................................92


11.1 Information........................................................................................ 92
11.2 Real-time, Manual and Scheduled Scanning .................................... 93
Enable Real-time Scanning................................................................... 93
Configure Manual Scanning.................................................................. 93
Configure Schedule Scanning............................................................... 94
11.3 Configuring Scan Settings ................................................................ 94
File Types to Scan ................................................................................ 94
Actions When Virus Is Found................................................................ 95
11.4 Updating The Virus Pattern File ........................................................ 95
Configure a Manual Update .................................................................. 95
Configure a Scheduled Update ............................................................. 96
Chapter 12 Activating Optional Features ........................97
12.1 Activating Optional Features............................................................. 97

Chapter 13 Warranty ....................................................98


Appendix A Specification ...............................................102
Hardware Specification for the GroupStor NAS Controller (All Models) .. 102
Hardware Specification for the GroupStor 9300 Tower Models............... 105
Hardware Specification for the GroupStor 9400 & 9500 Tower Models .. 106
Hardware Specification for the GroupStor 9400 & 9500 Rack Models .... 106

Appendix B Utility for the GroupStor System ...............107


System Requirements......................................................................... 108
Installing TCP/IP Protocol for Microsoft Networks ............................... 108
Installing NAStart ................................................................................ 108
To Set the Automatic Refresh Interval ................................................ 109
Server Quick Setup Using NAStart ..................................................... 109
Browsing Servers................................................................................ 110
Tool Bar Functions.............................................................................. 112
Burning Disc Images........................................................................... 120
Supported CD Formats ....................................................................... 120
Chapter 1 Introduction

1.1 Features

The GroupStor is a premier NAS product featuring up to 2TBs of storage capacity, a


full-range of data protection, and a cost-effective, highly reliable high-performance
storage system for the fast growing network storage market. It:

Delivers terabytes of storage capacity


Expands RAID storage capacity without downtime
Maximizes storage flexibility with a hot-swappable HDD
Accelerates network throughput with dual-NIC and Gigabit Ethernet
support
Utilizes power management support with UPS
Provides seamless integration into heterogeneous networking security
Loads CD/DVD and writes to CD-R/RW and DVD-R/RW
Backups and archives important data to the local tape drive, CD/DVD
writer or a remote GroupStor NAS Server

1.2 Conventions
Terminology

The term GroupStor means all the models of the network-attached storage servers
unless the specific model is mentioned.

Typographic Conventions

Conventions Meaning
Italic Variable name which should be replaced
by user-defined text in context
Bold Menu item
Monospaced font Text which users should type in
Underline Cross-reference

-1-
Chapter 2 Installing and Starting the
GroupStor
This chapter covers the installation procedure for the GroupStor. Instructions on how
to startup the GroupStor by setting up the basic configuration through the Admin
Home page or NAStart, the start-up software wizard, are outlined in this chapter.

2.1 Installing the GroupStor 9000 Series

All GroupStor models come pre-installed as ordered with all disk, CD/DVD, tape or
other options included prior to shipment.

1. Connect the GroupStor to the network by attaching a LAN cable from the LAN
port located at the back of the GroupStor. (At least one network connection is
required.)
2. Plug the power cord into the power connector on the GroupStor.
3. Make sure the power switch on the power supply is in the ON position.
4. Press the power button in the upper right hand corner of the GroupStor.
5. Wait for the server to boot up. The boot up process takes approximately 2 minutes.

Sliding Rail Installation (All Rack Models)

1. Make sure you have the following mounting parts for the sliding rails.

4 L-shaped brackets (see the left side of the photo)


8 long screws and washers (see the upper right side of the photo)

-3-
2. Take the sliding rail apart by sliding out the center slide. Push down the hook
to separate. Pull the center slide out all the way until it reaches the end.

3. Install the center slide to the rack-mount chassis. The screw holes on both
sides of the rack-mount chassis are used for mounting the center slide. Fasten
the eight screws to attach the center slides onto the chassis. The center slides
will be used later to attach the sliding rail.

-4-
4. Next, attach the two L-shaped mounting brackets onto the sliding rail. Use the
M4 screws to secure the L-shaped bracket onto the sliding rail.

5. Attach the sliding rail onto a rack-mount cabinet. Secure the sliding rail onto
the rack-mount cabinet via the screw holes on the L-shaped brackets.

6. After properly attaching both sliding rails to the rack-mount cabinet, slide the
rack-mount chassis (mounting) into the cabinet.

-5-
-6-
2.2 Setting the IP Addresses

LCD Console Flow Chart

L C D m en u co n so le flo w ch art
S ystem R ead y

No

E n ter Y es
L A N 1 m ask : L A N 1 g atew ay : L A N 1 IP : C o n fig u re L A N 1? C o n fig u re L A N 1
255.255.0.0 192.168.1.254 192.168.1.1 Y es / N o IP /G atew ay/M ask

No

E n ter Y es
L A N 2 m ask : L A N 2 g atew ay : L A N 2 IP : C o n fig u re L A N 2? C o n fig u re L A N 2
255.255.0.0 192.168.2.254 192.168.2.1 Y es / N o IP /G atew ay/M ask

No

L A N 3 m ask : L A N 3 g atew ay : L A N 3 IP : E n ter Y es


C o n fig u re L A N 3? C o n fig u re L A N 3
255.255.0.0 192.168.3.1 192.168.3.1 Y es / N o IP /G atew ay/M ask

S erver N am e:
N A S D 8040000

D ata/T im e:
8/21/2002 05:30
O n ly d isp lay w h en
G ig ab it E th ern et
A d ap ter is in stalled

S ystem w ill
F irm ew are V er.: au to m atically d isp lay
V 1.00 th e n ext screen every
tw o seco n d s w h en id le

C P U F an S p eed :
3994 R P M

T h erm al (o C )
67 40

V o ltag e (V )
1.44 3.30 4.68

-7-
Configuring the IP Addresses Using the LCD Console

1. After the GroupStor is booted, the LCD console shows System Ready. Press the
right button.

System Ready

2. The IP address of LAN1 is shown. Press the middle button to configure LAN1 IP
address. Note that the symbol in the right hand upper corner indicates that the
IP address can be configured using the LCD console.

LAN1 IP: 
192.168.170.171

3. Move the cursor to Yes by pressing the left button and then press the middle
button to confirm.

Configure LAN 1?
Yes/No

-8-
4. Move the cursor to the correct position using the left or right button. Then press
the middle button to change that number.

LAN1 IP:
192.168.170.171

5. After editing the last digit of the IP address, press the right button and configure
the Subnet Mask address.
6. Repeat 4 and 5 to configure the Subnet Mask and Gateway address.
7. After editing the last digit of the Gateway address, press the right button. Move
the cursor to Save and save the setting or Edit to repeat the above process or
Abort to quit the configuration process without saving.

Exit LAN 1 Menu?


Save/Edit/Abort

8. Repeat the above process to configure the other LAN port.

Configuring the IP Addresses Using NAStart

The NAStart utility will perform the initial setup of your new GroupStor system. The
utility is designed to perform a quick set up and puts the GroupStor online in just a
few minutes. During startup, NAStart discovers all the GroupStor systems on the
network. The default server name is NASxxxxxxxx and xxxxxxxx is the last eight
digits of the Ethernet address of the LAN1.

1. Highlight the server to be configured in the left hand pane.

-9-
2. Click the button on the toolbar.
3. Or, right click the server and select Configure
4. Enter the Server Name, Server Comment, and Workgroup/Domain Name.
Select either Workgroup mode or Domain mode.
5. Click Next to go to the next page.
6. Choose the Network Teaming Mode from the pull down menu. If you are
uncertain about this feature, continue with the default value.
7. To automatically assign IP settings, click Obtain IP settings automatically.
8. Or, specify IP settings manually.
9. Click Next to go to the next page.
10. Change the admin password if necessary.
11. Click Finish to save the settings. Note: The server may need to reboot for
certain parameters changes to take effect.

2.3 Accessing the Administration Home Page

Configure the detail settings of the GroupStor in the administration home page. To
access the administration home page, type the URL name of the GroupStor in the
address field of the web browser:

http://192.168.1.1 /admin/

- 10 -
Note: It is recommended that the user change the admin password
immediately to keep the GroupStor secure and protect resources from
inappropriate access by other users on the network.

- 11 -
- 12 -
Chapter 3 Server Configuration
This chapter describes how to name the server, specify the server date and time,
upgrade the OS firmware, shut down the system and use UPS with the GroupStor.

3.1 Server Information and Settings

Click Server from the administration home page. You will see the Information page
describing the summary information of the GroupStor.

The Information page is divided into two sections. The General Settings section
shows the parameters that can be modified on the Server General page.

Server Name Name of the GroupStor. GroupStor has


one unique name, applicable to all
network protocols.
Server Comment The text shown in the comment field when
browsing network computers in Windows
Network Neighborhood
Date/Time Server date and time in a 24-hour format
Time Zone The time zone setting of the server relative
to Greenwich standard time.

Language (Codepage) The language used by the server to


interpret the server name, user names,
share names, file names, etc. Technically,
it specifies the codepage that is used to
interpret the characters.

CP437-DOSLatinUS: Latin characters for


the United States
CP850-DOSLatin1: Latin characters for
West European
CP932-Shift JIS: for Japanese
CP936-Chinese GB: for Simplified
Chinese
CP949-Unified Hangul: for Korean
CP950-Chinese Big5: for Traditional

- 13 -
Chinese
Mac Roman: Latin characters for
Macintosh
Configure From LCD Indicates if users can configure the server
from the LCD console
System LCD Banner Indicates the banner text displayed on the
LCD console when it receives no user
input or event messages for a period of
time
UPS Support Indicates if the UPS support is enabled or
not
Auto Power When enabled, the server will power on
Restoration automatically when the power restores
after abnormal shutdown
System folder resides in Displays the volume name where the
system folder is located

The System Information section shows the hardware and firmware status of the
server.

Firmware Version The version number of the OS firmware


Processor Speed The CPU operating frequency
Memory Capacity The total size of the main memory
No. of HDD/CD/Tape Displays the number of HDD/CD/Tape
installed in the system
LAN1/2/3 Ethernet The Ethernet MAC addresses of the
Address network controller chips and their types.
PCI Slot Displays the type of add-on adaptor
installed in the system.

- 14 -
3.2 Upgrading the Firmware

Updating OS firmware accommodates new functions or bug fixes. Once new releases
of an OS firmware image are obtained, upgrade the OS firmware using the web
browser. The process is simple and fast.

When you have the image file of the new OS firmware, open the Administration
Homepage of the GroupStor and select the Server Upgrade menu. Specify the full
path of the image file or click the Browse button to find it. Click Apply to begin.
The process takes several minutes. The server will reboot after the firmware is
upgraded.

3.3 Shutting Down the Server

Shutdown, Reboot and Startup Actions

Pressing the power button on the front of the server case will shut down the
GroupStor. The whole shutdown process takes seconds to minutes until the data is
safely saved to the hard disks.

To shut down the server from the Administration Homepage, select Shutdown from
the Server menu and click the Reboot or Shutdown button.

You can specify the actions taken during the next startup.

Recalculate user quota Recalculate the storage consumption per


information user during the next startup. It will take
more time if there are a large number of
files on the disk.
Reset configuration to Reset the server settings, network settings
factory default and event configuration to the factory
default during the next startup.
The settings relating to the storage, shares,
ACLs, and user database are not cleared.

- 15 -
Scheduled Shutdown and Power-on

To set the automatic power-on and shutdown schedules, select the


Server Shutdown menu. Click the Schedule tab to modify the schedules.

On the schedule settings page, set daily or day of month schedules. Check the Enable
boxes and specify the time of power on or shut down. Click the Apply button to
submit the changes.

3.4 Enabling UPS Support

The GroupStor 9000 Series supports UPS and basic power management functions. It
sends alerts when there are power events like utility power failure or low battery
capacity. When power events occur, the GroupStor will shut down automatically to
prevent potential data loss.

To use smart-signaling UPS, connect the UPS and the GroupStor with a RS-232 cable.
Go to the Server -> UPS Settings menu on the administration page to enable UPS
Support.

To use network-type UPS, connect the UPS to the LAN first. Then go to the Server -
> UPS Settings page on the administration page. To enable UPS Support, select
Network UPS from the UPS Type menu and enter the UP IP address.

Shutdown options for this page are shown below:

Shutdown immediately Specify whether to shut down the server


when battery is low when the UPS battery is low, Note:
NOTE: When utility power fails, the
GroupStor always shuts down.
Shutdown in x minutes Specify how many minutes to wait before
when AC fails shutting down the server when a power
event occurs.
Turn off the UPS when shutdown by IF checked, the GroupStor will turn off
power failure the UPS when shut down by power
failure. If not checked, the UPS will
continue working when the server is shut
down.

- 16 -
3.5 Modifying the Administrators Password

Admin is a built-in user account for the administrator. It is similar to the root account
in UNIX or the administrator account in Windows 2000 or XP. Users have access to
the administration homepage and all the storage resources using this account. The
default password for this user account is empty. It is strongly recommended that a
password be assigned during the initial setup of the GroupStor for security purposes.

To specify or modify the administrators password, select the Server Password


menu on the administration homepage. Input the current admin password in the Old
Admin Password field, the new password in the New Admin Password and
Confirm Admin Password fields. Then click Apply.

The administrator can grant administrators privileges to other users by including


them in the Admins built-in group. Select the Security Account menu. Select
Admins* in the Local User/Group window and click Property. Specify the users to
being granted privileges and click Apply.

- 17 -
- 18 -
Chapter 4 Network Configuration
This chapter details concepts and procedures for configuring the GroupStor and
establishing the system that communicates with other OS platforms. Management
protocol and email notification settings are also covered in this chapter.

4.1 Network Information

The Network Information screen provides a summary of the current network settings
of the GroupStor. It provides the administrator with a quick overview of the basic
network settings of the GroupStor.

The Information page is divided into two sections. The Network Protocols section
displays the current network protocol settings of the server.

Protocol Type Displays network protocol supported by the


server
Configuration Current status of the network protocol. Status:
Enabled or Disabled
Security Policy Displays the type of security policy of the
network protocol

The TCP/IP Suite Settings section shows the various TCP/IP settings of the server.

Port Displays Ethernet port #.


IP Address An identifier for network resources on a
TCP/IP network.
Subnet Mask A subnet mask is used to determine which
subnet an IP address belongs to.
Gateway A node on a network that works as a point of
entry to another network
Speed/Mode 10/100/1000 Mbps and full/half Duplex
Network Teaming Mode Displays the current network teaming mode.
Obtain TCP/IP Settings From Displays the IP settings either assigned
automatically from DHCP or manually

- 19 -
WINS Server IP Address Windows Internet Naming Service (WINS)
manages the association of network resource
names and their IP addresses without user or
administrator intervention with configuration
changes.
DNS Server IP Address IP address of the Domain Name System
(DNS) server which locates the domain name
and translates into IP addresses.
DNS Suffix Displays the DNS suffix.
NTP Time Server IP Address The IP address of the NTP (Network Time
Protocol) server used to synchronize system
time automatically over the net. The system
time is synchronized with the NTP server
every 24 hours.
SMTP Server Address IP address or server name of the SMTP
(Simple Mail Transfer Protocol) server used
to send and receive e-mail.
HTTP Proxy Server IP Address IP address of the HTTP proxy server. The
port number is next to the IP address.

4.2 TCP/IP Settings

TCP/IP handles the network communication between network nodes that are
connected to the network. It is important to set up the correct TCP/IP settings for the
GroupStor to function properly.

Network Teaming Mode

The GroupStor 9300, 9400 and 9600 models provide two (2) on-board 10/100/1000
Ethernet ports (LAN1 & LAN2) and one (1) Gigabit Port (LAN3). The GroupStor
9350 and 9500 models provide two (2) on-board 10/100/1000 Ethernet ports (LAN1
& LAN2). Configure the Ethernet ports using the following operating modes:

Stand Alone: LAN1 and LAN2 are configured with a unique IP address; they are
independent of each other. LAN3 (Gigabit) can only be configured in stand-alone
mode.

Fault Tolerance: Uses LAN2 when LAN1 has failed to connect to the network and is
designed to ensure server availability to the network.

- 20 -
Load Balancing: Provides increased network bandwidth allowing transmission to
multiple destination addresses using both LAN1 and LAN2. When the traffic of one
of the LAN ports is congested, requests are forwarded to the other LAN port until the
traffic of both LAN ports is balanced. Note: Only the LAN1 Ethernet port receives
incoming traffic. Load Balancing incorporates Fault Tolerance protection.

Link Aggregation: Combines both LAN1 and LAN2 into a single channel and uses a
single MAC address to provide greater bandwidth. It must be used with a network
switch having the Link Aggregation or Trunking function.

The GroupStor also supports Wake-On-LAN (available for LAN1 only). Wake-On-
LAN allows the administrator to remotely power on the GroupStor to perform
maintenance tasks on the server without physically going to the server.

The GroupStor 9350, 9500 and 9600 models reduce network overhead and increase
network throughput with Jumbo Frame Support. To support jumbo frame with
Gigabit Ethernet use 9000 byte packet sizes instead of the standard 1500 byte Ethernet
size. Enable jumbo frame support on the Gigabit switches and client PCs so they can
communicate.

To disable a LAN port, enter 0.0.0.0 in the IP address field. Use the LCD panel to
change the IP address to non-zero values if all LAN ports have been disabled and
cannot be accessed from the administration page.

Configuring TCP/IP Settings

1. Select a Network Teaming Mode from the pull-down menu.


2. Enable or Disable Wake-On-LAN (available for LAN1 only).
3. Click the Obtain IP settings automatically button to obtain IP addresses of
DHCP, BOOP or RARP server on the network.
4. Or, click the Use the following IP settings button to assign the IP addresses
manually.
5. Note: The LAN3 IP address field will appear when the optional Gigabit Ethernet
adapter is installed in the system.
6. Input the WINS server IP address.
7. Input the DNS server IP address.
8. Input the DNS Suffix.
9. Input the NTP Time Server IP Address if available.
10. Click Apply to save the settings.

- 21 -
4.3 Windows Settings

The GroupStor uses the SMB/CIFS (Server Message Block/Common Internet File
System) protocol. This protocol is used by Microsoft to share files, directories and
devices with Windows clients.

To configure the Windows Network Settings:

Workgroup Mode: The GroupStor becomes a member of a workgroup and


communicates with clients using an internal user database for authentication. It does
not require another authentication servers to be present on the network.

Domain Mode: The GroupStor becomes a member of the domain and communicates
with clients using the user database stored on the authentication server, which must be
present on the network.

Another option is to register the GroupStor on the domain. Once registered, the
GroupStor is created as a machine account on the domain controller. It uses Netlogon
as the authentication mechanism and provides a better integration into a Windows
network environment.

Configuring Windows Network Settings

1. Click the Enable Windows Network (SMB/CIFS Protocol) box to enable access
for SMB clients.
2. Enter the Workgroup/Domain name.
3. Click the Workgroup Mode button to configure the GroupStor in Workgroup
Mode.
4. Or, click the Domain Mode button to configure the GroupStor in Domain Mode.
5. Select the option to support Unicode.
6. When the disconnect idle connection option is enabled server connections that
have been idle for five minutes are automatically disconnected.
7. Click Apply to save the setting.

- 22 -
4.4 UNIX/Linux Settings

The GroupStor will export shares to UNIX/Linux clients via the NFS protocol.
UNIX/Linux clients can then mount shares and access the content of those shares.

UNIX/Linux clients typically use UNIX identification that consists of a User


Identifier (UID) and Group Identifier (GID) for network control. Non-NFS clients do
not use UIDs and GIDs for identification. The GroupStor works in a heterogeneous
network. Therefore, files created by non-NFS clients may have ownership information
that is not recognized and generates inaccurate quota information for UNIX/Linux
clients because the UID and GID dont match. Mapping is required to create the
correct identity for users with multiple protocol access to the GroupStor. To retain the
correct ownership information for UNIX/Linux clients, assign a UID/GID to the
Windows user name before forwarding requests from UNIX/Linux clients.

By default, the GroupStor maps all non-NFS users, including local users and domain
users, to the same UID/GID as described on this page. To assign different UIDs/GIDs
for different users, the administrator clicks on the Modify button to modify user
mapping of UIDs/GIDs.

UID: User ID is the numerical number assigned to a user in Unix/Linux permissions.


NFS uses UID to determine permissions of files and directories.

GID: Group ID is a part of POSIX permissions that determines groups of users. NFS
files have a GID assigned to them.

Permission: Three numbers are used for setting the file permission. Each of the three
numbers corresponds to the type of users- Owner, Members of a group and Everyone
Else.

Number Read (R) Write (W) Execute (X)


0 No No No
1 No No Yes
2 No Yes No
3 No Yes Yes
4 Yes No No
5 Yes No Yes
6 Yes Yes No
7 Yes Yes Yes

- 23 -
Example: If the permission of a file is set to 777, the owner, the group and other users
have read, write and execute permissions for this file.

Configuring UNIX/Linux Network Settings

1. Click the Enable UNIX/Linux Network (NFS Protocol) box to enable access for
NFS clients.
2. Enter the default permission for files created with a non-NFS protocol. (Default
setting = 755)
3. Click Apply to save the settings.
4. Click the Modify icon and enter the default UID and GID. (Default setting = 0)
5. Choose to map all users to the default UID/GID or assign UID/GID manually for
each user.
6. Click the Set Default link to set the UID/GID for all users to the default UID/GID.
Note: The Value -1 represents a UID/GID equal to the UID/GID configured
above.
7. Click Apply to save the settings.

Configuring NIS Settings

The NIS (Network Information Services), formerly known as Yellow Pages, is a


UNIX standard for centralizing the management of UNIX resources. The GroupStor
supports the retrieval of user accounts and the UID/GID from a NIS server.

If NIS support is enabled, the GroupStor can auto-map NIS users with local/domain
users. It matches user names and assigns the UID/GID of the matched NIS users to
local/domain users. The user auto-mapping function is enhanced and provides tighter
integration between NFS clients and other network operating systems.

Steps for enabling NIS support are:

1. Check the Enable NIS Support box.


2. The NIS domain name is required. Put the correct name in the NIS Domain
Name field.
3. Use Find by broadcast if you do not know the IP address of the NIS server.
Otherwise, specify the IP address in the fields.
4. After enabling NIS support, auto-map NIS users with local/domain users. In the
Unix/Linux menu, click the Modify icon.

- 24 -
5. Then click the Auto-map with NIS users link to map with the users on the
configured NIS server.
6. Click Apply to save the settings.

4.5 Macintosh Settings

The GroupStor has two kinds of protocol support for Mac OS clients AppleTalk
and TCP/IP (Open Transport). The GroupStor also provides two kinds of security
polices for Macintosh Network AFP client.

Local Account Authentication: Authenticate users through the GroupStors internal


user database.

Local and Domain Authentication: If Windows Network is enabled, you can


enable both local and domain authentication for AFP clients.

Current Zone: A division between groups of machines viewed using AppleTalk.


AppleTalk Zones can be seen in Chooser, the AppleTalk Control Panel, and Network
Browser.

AppleTalk Address: A unique number that identifies the server on the network. The
number to the left of the dot is the network number. The number to the right of the dot
is the node number.

Configuring Macintosh Network Settings

1. Click the Enable Macintosh Network (AFP Protocol) box to enable access for
the AFP client.
2. Select a protocol and click the button beside it.
3. Click the Local Account Authentication button to authenticate users with the
servers local user database.
4. Or click the Local and Domain Account Authentication button to use both local
account and Microsoft domain security authentication.
5. Select the Current Zone from the pull down menu or Default Zone to assign by
default.
6. Click Apply to save the setting.

- 25 -
4.6 NetWare Network Settings

The GroupStor 9000 Series operates in a manner similar to Novells NetWare 3.12
file server. The GroupStor can be set up and shared among Novell NetWare clients. A
share is mapped to the GroupStor using NetWare clients. Enable access to shares for
specific local users or local groups from the Administration Homepage.

Server Name: The default NetWare server name is the server name followed by an
underscore and "NW".

Security Policy: The policy used by the GroupStor for authentication.

Frame: Frame types determine how packets of network data are formatted on
different LANs. The default setting is AUTO on the GroupStor.

Internal Network Number: A logical network number that identifies an individual


NetWare server on the LAN.

Configuring NetWare Settings

1. Click the Enable NetWare Network (NCP Protocol) box to enable access for
NetWare clients.
2. The NetWare server name is the original server name followed by _NW. For
example, if the server name of the GroupStor is ABC then the NetWare server
name will be ABC_NW.
3. Click Apply to save the setting.

4.7 Web Data Access Settings

This section shows the parameters for setting up user access to the GroupStor users
home page. Configure the user access constraint, authentication policy and default
settings by defining the Access Control, Security Policy and Default User Page
settings.

- 26 -
Configuring Web Data Access

1. Click the Enable Web Data Access (HTTP Protocol) box to enable Web data
access.
2. Choose Allow file download only or Allow file upload and download.
3. Click the Local account authentication button to confirm the user with the
servers local user database.
4. Or, click the Local and domain account authentication button to use both local
account and Microsoft domain security authentication.
5. Select the default type of the folder display on the user page. Choose Detail View,
Large Icons or Small Icons.
6. Click the box beside the Allow users to modify ACL to give users modify ACL
table entries privileges.
7. Click Apply to save the settings.

4.8 FTP Data Access Settings

The GroupStor supports File Transfer Protocol (FTP) and allows users to transfer files
via the Internet. Properly configuring the FTP settings effectively controls how users
access the content on the GroupStor via FTP.

Configuring FTP Data Access

1. Click the Enable FTP Data Access box to enable FTP data access.
2. Select Access Control type. Click the Allow file download only or Allow file
upload and download button.
3. Select the appropriate Security Policy. Check the Allow anonymous login and
map to box and choose a local user from the pull down menu. An anonymous
login user now has the same security privileges as a selected local user.
4. Or, click Allow individual user login. Select Local account authentication to
authenticate a user with the local user database or click the Local and domain
account authentication button to use both local account and Microsoft domain
security authentication.
5. Select the User Limit. Click the Unlimited button or specify the maximum
number of users allowed to access the content on the GroupStor via FTP.
6. Specify the Home Directory for users who connect to the GroupStor via FTP.
Note: Be sure to select a volume to create a FTP home directory.
7. Specify the permission for the home directory by clicking Set icon.
8. Click Apply to save the setting.

- 27 -
4.9 SNMP Settings

Simple Network Management Protocol (SNMP) provides status information on the


SNMP agent and monitoring of the SNMP management console. The GroupStor acts
as an SNMP agent, answers requests and sends trap information to/from the
management console.

Configure the following options with the SNMP protocol:

Community: A name serves as a simple authentication. The communication between


the SNMP management console and the GroupStor cannot be established if there is a
disparity between the community names.

IP: IP address of the SNMP management console

Trap: A trap is a voluntary message sent out from a SNMP agent (the GroupStor)
when an event occurs.

Management: Configure the SNMP management console as Read Only or Full


Control.

Location: Provides the location information of the SNMP agent.

Contact: Provides the contact name of the person who has the management
information of the SNMP agent.

Configuring SNMP Settings

1. Click the Enable SNMP Protocol box to enable SNMP access.


2. Enter a Community name.
3. Enter the IP address of the management console.
4. Select Yes from the pull down menu if you want the corresponding management
console to receive trap messages.
5. Select Read Only from the pull down menu if you want the corresponding
management console to have read only privileges.
6. Repeat 2 5 if more than one management console is available. The GroupStor
supports up to four management consoles.

- 28 -
7. Enter the location information for each GroupStor.
8. Enter the name of the contact person who has management information on each
GroupStor.
9. Check the box beside Send a test trap to send a sample trap message to validate
SNMP settings.
10. Click Apply to save the setting.

4.10 Email Settings

The GroupStor can be configured for email notification when events occur. The
network SMTP server information must be entered in this menu. The type of event
triggered in the email notification process is configured in the
Event Configuration Advance menu.

Configuring Email Settings

1. Click the Enable SMTP Protocol box to enable SMTP protocol.


2. Enter the SMTP Server Address.
3. Enter the existing user account name of the SMTP server.
4. Enter the password of the account.
5. Enter up to two email addresses to receive email notification when an event
occurs.
6. Click the Send a test email box if you want to send out a test email to validate the
email setting.
7. Click Apply to save the setting.

4.11 SSL Settings

The GroupStor enables secure web access with SSL 3.0 support, both from the user
homepage and the administration homepage. To use SSL 3.0, the GroupStor generates
a server certificate for authentication and data encryption. The default for the server
certificate is issued with the IP address of the GroupStor designated. The server's full
name can also be specified on the server certificate. The server's full name is the
server name appended with its DNS suffix, such as nas.company.com. Refer to the
TCP/IP settings for the DNS suffix.

- 29 -
Clients must install the CA certificate first to access server web pages with a secure
connection. For example, if the server's IP address is 192.168.1.10, open
http://192.168.1.10/admin/CA for the certificate. Choose install the certificate when
the dialog-box pops up. Once the CA certificate is installed, the client can access the
web pages of all GroupStors with the SSL connection.

To access the GroupStor's web pages with the SSL connection if the server IP address
is 192.168.1.10, open https://192.168.1.10/ from the user homepage, or
https://192.168.1.10/admin/ from the administration homepage. If the server
certificate with the server name is selected, open https://[server_name] instead.

- 30 -
Chapter 5 Storage Management
This chapter describes how to create a single-disk volume or a RAID volume. It also
outlines the steps for deleting a volume, expanding a RAID-5 volume and assigning
hot-spare disks. After a volume is created, refer to the next chapter for more
information about sharing data and assigning permissions.

5.1 Volume Usage and Status

A volume is a logical storage unit. Each volume holds a complete file-system. A


volume can exist on a single disk or a RAID group consisting of two or more disks.

Volume View

List of Volumes

Displays all the volumes in the GroupStor. Volume Name shows the volume name
that is defined when creating a volume. Each volume name is also a hyperlink. It
opens a page showing detailed information of that volume. Members indicate the
hard disks that comprise a volume. RAID Type indicates whether this volume is
JBOD (a single hard disk), RAID 0, RAID 1 or RAID 5. Refer to the next section for
more information about RAID.

Free Space indicates the volume usage showing the free storage space in the volume
and the percentage. Total Space indicates the volume size.

Status indicates the disk activity on the volume. Disk activity may be one of the
following:

Ready The volume is mounted and ready for data


access.
Not Ready The volume has not mounted successfully.
It is not accessible.
Degraded One of the volume members is defective.
Data is still intact and accessible, but the
volume is no longer protected by RAID.

- 31 -
Data backup and RAID rebuilding are
strongly recommended when a volume is
in this state.
Faulty Two or more hard disks in the volume are
not functional.
It is not possible to perform any data
access or recover any data.
Faulty (RW) Two or more volume members are
defective.
There might be data loss, but it is possible
to recover some data. Copy data to a safe
place immediately when a volume is in
this state.
Inaccessible Two or more volume members are
missing. The volume is not mounted and
data cannot be accessed.
Apply (Ready) The volume settings on the server and
Apply (Degraded) those on the hard disks are not the same.
Apply (Faulty RW)
Apply (Rebuild) The server reads and applies volume
Apply (Expand) settings from the hard disks.
After the volume settings are restored, it
will return to the last known state, which
is specified in parentheses.
Checking Checking the file-system.
Mounting Mounting the volume for data access.
Create (xx%) Creating a volume. The progress is shown
in a percentage.
Rebuild (xx%) Rebuilding a RAID. The progress is
shown in a percentage.
Expand (xx%) Expanding a RAID. The progress is shown
in a percentage.
Scan (xx%) Scanning hard disks for bad sectors. The
progress is shown in a percentage.

Hot-Spare Disks

A hot-spare disk is used to automatically rebuild a RAID whenever a RAID volume is


degraded due to a bad or missing hard disk.

- 32 -
Free disks

Identifies hard disks that are not assigned and is used to create volumes or assign hot-
spare disks.

Volume Detail and Renaming a Volume

To change the name of a volume, click on the Volume Name hyperlink in the List of
Volumes table. Another page that displays detailed volume information appears. The
volume name can be modified on this page.

Device View

The list with all the storage devices connected to the GroupStor, including hard disks,
CD/DVD-ROM, CD/DVD writers and tape drives.

List of Hard Disks

In Volume shows to which volume the hard disk belongs. Location indicates the IDE
channel and master/slave position of the hard disk. Model Name shows the model or
the manufacturer of the hard disk. Capacity shows the unformatted capacity of the
hard disk. Status indicates the disk status or disk activity one of the following.

On-line The hard disk is a member of a mounted


volume that is ready for data access.
No init The hard disk is not initialized yet. A no-
init disk must be a free disk used to create
a volume or assigned as a hot-spare disk.
Defective The hard disk contains bad sectors.
Off-line The hard disk is not mounted or
accessible.

Backup/Archiving Devices

Devices are either CD/DVD-ROM drives, CD/DVD writers or tape drives. Type
indicates what kind of device it is. Mode indicates the data transfer mode of the
storage device interface.

Device type could be CD-ROM, CD-R, CD-RW, DVD-ROM, DVD+R, DVD+RW,


DVD-ROM+CD-RW or Tape.

- 33 -
Data Transfer Modes

Data transfer modes could be PIO x, DMA x, MDMA x, or UDMA x. PIO


(Programmed Input/Output) is the rate of data transfers performed by the host CPU.
DMA (Direct Memory Access) is the rate of data transfers performed by device
controllers; minimal host CPU time is required. MDMA (Multiword DMA). UDMA
(Ultra DMA) is a faster DMA mode.

PIO Modes PIO Mode 2: 8.3 Mbytes/sec


PIO Mode 3: 11.1 Mbytes/sec
PIO Mode 4: 16.6 Mbytes/sec
DMA Modes Multiword DMA Mode 2: 16.6Mbytes/sec
Ultra DMA Mode 2: 33 Mbytes/sec
Ultra DMA Mode 3: 44 Mbytes/sec
Ultra DMA Mode 4: 66 Mbytes/sec
Ultra DMA Mode 5: 100 Mbytes/sec
Ultra DMA Mode 6: 133 Mbytes/sec

5.2 Creating a Volume

First, create a volume on the hard disks to provide shared storage for user access and
set security controls.

To create a volume, go to the Volume Create page. Specify the volume name in the
Volume Name field and choose the volume type (JBOD, RAID 0, 1, or 5). Choose
the hard disks to be included in the volume. Click Apply to submit changes. The
status of volume creation is shown on the Volume Information page.

Volume types are shown below:

JBOD Just a Bunch Of Disks.


A JBOD-type volume contains only one
hard disk as its member.
RAID 0 RAID level 0 is disk striping only. Data is
evenly distributed over multiple disks for
better performance. There are no
safeguards against failure.
RAID level 0 uses two or more hard disks.
RAID 1 RAID level 1 uses disk mirroring and
provides 100% duplication of data. Its

- 34 -
highly reliable, but doubles storage cost.
RAID level 1 uses two hard disks.
RAID 5 RAID level 5 distributes data and parity
bits over multiple disks for both
performance and fault tolerance. A RAID
volume can still work when a hard disk
fails.
RAID level 5 uses three or more hard
disks. Building a RAID-5 volume may
take hours depending upon capacity.

5.3 Deleting a Volume

To delete a volume, go to the Volume Delete page. Select the volume to be deleted
and click the Delete button. Be very careful all data in the volume will be destroyed
and the RAID configuration will also be erased. All hard disk members in this volume
are free disks after the deletion.

5.4 Expanding a RAID-5 Volume

RAID-5 volume expansion increases volume capacity without rebooting the


GroupStor. Volume capacity grows on the fly. No change to share permissions,
security controls and quota settings is necessary after volume expansion. Storage
management becomes much easier.

To expand a RAID-5 volume, go to the Volume Expand page. Select the RAID-5
volume to be expanded. Choose the free disks as new members. Click Apply to
submit changes. The progress of RAID expansion is shown on the
Volume Information page.

- 35 -
5.5 Volume/Disk Scan

Volume/Disk scan is especially helpful for disk diagnostics. It repairs lost or cross-
linked clusters in Volume/Disk. All readable data is placed in new clusters and
defective clusters are marked as bad in the file system. All newly added devices are
scanned before usage to ensure their data integrity on the GroupStor.

Select the volumes or disks to be scanned, click the Scan Now button to start scanning.
Or, click Schedule to set the time for GroupStor to perform scanning at a scheduled
time. Be advised that this could take several hours to run and will disable all access to
the volume until the scan is complete.

Disk Auto-Scanning

Perform disk-scanning before creating or expanding a volume, migrating data or


assigning a hot spare disk to insure that the hard disks contain no bad sectors before
use. The GroupStor server will scan disks automatically if auto-scanning is enabled
and perform this function. If the hard disks have been scanned in the last 30 days auto-
scanning is skipped will not be activated too often.

Click the Configure hyperlink on the Volume Scan page to enable this feature. Set
the Disk Auto-Scanning to Enabled.

Please be advised that this could take several hours to run and will disable all access
to the volume until the scan is complete

5.6 Assigning Hot-Spare Disks

Hot-spare disks are global and not bound to any specific RAID volume. Whenever a
RAID volume goes into a degraded mode (due to a failed hard disk) a hot-spare disk
is immediately assigned to recover the RAID volume.

Go to the Volume Create page to assign hot-spare disks. Specify the volume type
as Hot Spare. To assign free disks as hot-spares use the dual window panes. Click
Apply to submit changes.

To remove disks from the hot-spare list, go to the Volume Delete page. Select the
hot-spares to be deleted in the Remove Hot-Spare Disks table and click Delete.

- 36 -
5.7 Migrating Data Volumes

Migrating data volumes is the duplication of a volume block by block. Its helpful to
administrators when migrating or duplicating data between volumes of different
RAID types or capacities. During data migration, both the source volume and the
target volume are unmounted not available for client access.

To migrate data, select a source volume and target volume to migrate data to. Choose
Data migration and click Apply. The target volume inherits all of the security and
quota settings of the source volume. Clients observe no difference before or after the
migration.

To duplicate a volume, select a source volume and target volume. Select Data
duplication and click Apply. The target volume stays on-line after data duplication.

5.8 Hot-Swapping
Hard disk failure, degraded RAID or general maintenance requires hard disks to be
changed. The GroupStor supports HDD hot swapping. Instructions for replacing hard
disks using the HDD module are shown below:

1. Identify which hard disk failed. The amber LED on the HDD tray will blink and
indicates hard disk failure.

2. Press the red button on the HDD tray to turn off the failed HDD.

- 37 -
3. When the amber LED stays on, unplug the HDD tray and replace the HDD with a
good one.

4. Plug in the HDD tray. Wait until the Green LED stays on.

When a RAID volume is degraded and there is no hot-spare disk available to rebuild,
the RAID volume will stay in a degraded state. Hot-unplug the failed hard disk and
plug a new drive into the same HDD tray. The RAID volume will automatically
rebuild using the new hard disk.

- 38 -
For the 1U Rack Mount Model:

Power switch

LED1 LED2 Hot swap switch

1. Identify which hard disk failed. The amber LED2 blinks indicating hard disk
failure.

2. Turn off the failed HDD by inserting the end of a large straightened paper clip
into the hot swap switch hole on the front bezel.

3. When the amber LED is steady on, the failed HDD is ready to be unplugged.
Unplug the HDD tray and replace the HDD with a good one.

4. Plug in the HDD tray and wait until the Green LED is steady on.

- 39 -
- 40 -
Chapter 6 Security Control
This chapter covers setting up the security control of files, folders and shares stored on
the GroupStor. Managing Access Control List (ACL) file level security, file
ownership and user quota are also covered in this chapter.

The following types of security control can be configured on the GroupStor:

1. Create, edit and delete user accounts in the local user database.
2. Create shares.
3. Configure files, folders and shares permission.
4. Configure local account, domain account and UNIX/Linux host permission.
5. Maintain the ACL table.
6. Configure the local user and domain user quota limit.

6.1 Security Information

The Security Information screen displays the status of the current security settings of
the GroupStor. It provides the administrator with a summary of the security database
and the status of the operation mode.

The Information page is divided into two sections The Security Database section
displays the number of shares, ACL nodes, and users/groups.

Number of Shares Total number of shares created on the


GroupStor.
Number of ACL Nodes Total number of ACL nodes created. ACL
tells the GroupStor which access rights each
user has for a folder or individual file.
Number of Accounts The total number of the Local Users/Groups,
Domain Users/Groups, Trust Domain
Users/Groups and Unix/Linux Host Entry.

- 41 -
Local User/Group The total number of local users/groups. A
local user or group account can be granted
permission and rights from the GroupStor.
Domain User/Group Total number of domain users/groups. The
network administrator manages domain users
or groups.
Trust Domain User/Group Total number of trust domain users/groups.
Host Entry Total number of Unix/Linux hosts entered.

The Security Configuration section shows the current security configuration settings
for the server.

Windows Security Mode Displays the status of the Windows Network


operating mode. Status: Domain Mode or
Workgroup Mode
Workgroup/Domain Name Displays either the workgroup name or
domain name
Domain Login Account Displays the username for retrieving the
domain user list in the domain.
ACL Security Control Displays the status of the ACL Security
Control. Status: Enabled or Disabled
User Quota Control Displays the status of the User Quota Control.
Status: Enabled or Disabled

6.2 Creating the Local User and Local Group


Accounts

A local user or group is an account that can be granted permissions and rights to the
GroupStor. Local users can be added to groups. Groups are indicated by an * sign at
the suffix of the name. Administrator privileges can also be granted to a local group.
Groups with administrator privileges are indicated by a # sign at the suffix of the
name.

To create a local user:

1. Go to the Security Account Local Account menu.


2. Click the Add User button.

- 42 -
3. Type in the user name and enter the password.
4. Re-type the password to confirm.
5. Click Apply to save the setting.

To create a local group:

1. Go to the Security Account Local Account menu.


2. Click the Add Group button.
3. Type in the group name.
4. To grant administrator privileges to this group, click the Grand
administrator privilege box.
5. Select the users from the left hand windows and click the >> button to join the
group.
6. Click Apply to save the setting.

Note: To grant administrator privileges to a user,


simply add the user to the built-in group Admins
have administrator privileges. Users with
administrator privileges can now access the
administration home page.

To view and change local user properties:

1. Go to Security Account Local Account menu.


2. Select a user.
3. Click the Property button.
4. To change the password, enter a new password and confirm.
5. To disable a user account, click the Disable user account box.
6. Select a group from the left hand window and click the >> button to add the
user as a member of this group in the Member of section.
7. Click Apply to save the setting.

View and change local group properties:

1. Go to Security Account Local Account menu.


2. Select a group.
3. Click the Property button.
4. To grant the administrator privilege to this group, click the Grand
administrator privilege box.
5. All members of this group appear in the right hand window.

- 43 -
6. Select a user from the left hand window and click the >> button to add this
user to the group.
7. Click Apply to save the setting.

A GroupStor server provides a mechanism for administrators to create multiple


accounts at one time. It imports accounts from a text file and creates local accounts
accordingly. The text file defines some parameters related to the accounts passwords,
user quotas, groups, etc. It can also be used to create user folders in a batch. An
example of the text file is shown below.

# username, password, group, user quota, user folder, folder quota, create default ACL
user001, aalaa1, groupA 1GB,/vol-1/users/user001, 1GB, yes
user002, bb2bb2, groupA, 1GB, /vol-1/users/user002, 1GB, yes
user101, 101101, groupB,10GB,/vol-1/users/user101,10GB, no

Administrators should use Microsoft Excel to maintain the account file and then save
as .CSV files where fields are delimited by commas. Then the advanced features of
Microsoft Excel (filling in a series of numbers or items, copy and paste) can be used.

To mass import local accounts:


1. Go to Security Account Local Account menu.
2. Click the Mass Import button.
3. Select a file to import.
4. Click the Apply button.
5. Errors are displayed in the pop-up window after clicking the
Last Import hyperlink.

6.3 Caching Windows Domain User Accounts

The network administrator manages domain users and groups. The Windows network
uses a domain controller to store the information of all the domain users and groups.
When the Windows Network is set to use Domain Mode on your GroupStor, youll
need to cache the domain account on the GroupStor servers local user database.
Caching the domain accounts speeds up the process of setting permissions and quotas.

To retrieve Windows domain user/group:

1. Go to the Security Account menu.


2. Click the Domain Account tab.

- 44 -
3. If you have not entered the valid Domain Login Account required for
retrieving Windows domain users and groups, click the Modify button.
Otherwise go to Step 7.
4. Enter the User Name and User Password for an existing account in the
domain shown in the Domain Name field.
5. Click Apply to save the setting.
6. To change another domain go to the pull down menu with the trust
relationship for the current domain to retrieve domain users and groups.
7. Select the domain users or groups from the left hand window and click the >>
button to join the authorized list stored in the local user database.
8. Click Apply to save the setting.

Note: If you modify the domain name or change the


Windows security mode (Workgroup or Domain),
all the domain users and groups on the GroupStor
user database will be cleared.

Synchronize User Database

This function synchronizes the domain accounts cached in the GroupStor server
database with the native domain controller. New domain accounts in the domain
controller will be added to the GroupStor user database and the non-existent domain
accounts will be removed from the GroupStor user database. There is a limitation on
system resources. The user database synchronization is skipped if there are more than
10,240 domain accounts in the domain controller

To synchronize with the domain controller, click the Synchronize user database
hyperlink. The GroupStor server will automatically synchronize with the GroupStor
user database by checking the Synchronize the user database with the native
domain automatically option. The synchronization interval is one hour.

Update User Database

User account changes on the domain controller will not automatically appear on the
GroupStor must be done manually. Choose the 'Update user database' function on
the Domain Account tab of the Security Account menu to find the user accounts
that have already been deleted from the domain controller. These accounts still remain
in the GroupStor user database. They can be deleted from the database. ACL and
share permissions can also be updated by removing the entries related to those users.

- 45 -
6.4 Creating UNIX/Linux Host

With the GroupStor, an administrator can grant NFS client mount privileges to the
UNIX/Linux host. First, the administrator needs to establish rights. When a
UNIX/Linux host is granted access rights to shares, users of the UNIX/Linux host also
have access to shares. The administrator should create a UNIX/Linux host list prior to
granting access rights.

To create a list in the UNIX/Linux host:

1. Go to Security Account menu.


2. Click the UNIX/Linux Host tab.
3. Enter a single host IP address in the first text box.
4. Or, enter the start IP address in the first text box and the last three digits of the
end IP address in the second text box to input a range of the host IP addresses
of the Host IP field.
5. Click the Add button to add the host IP to the host list.
6. Click Apply to save the setting.

6.5 Creating Shares and Assigning Share


Permissions

Multiple users on a network can share a specific folder in any volume created on the
GroupStor. When a share is created the administrator must assign permission to the
share and grant or deny user access to the share.

To Create a New Share:

1. Go to Security File/Folder menu.


2. Locate the volume to be shared on the volume lists.
3. Click the Create hyperlink to share to the corresponding volume. Then go to
9.
4. To share an existing folder under a volume, click the volume name hyperlink.
Click the folder hyperlink until the desired directory is reached. Then, go to 8.
5. To share a new folder in a volume, click the folder hyperlink until you reach
the desired directory path.
6. Click the Create Folder button to create a new folder.

- 46 -
7. Enter the new folder name and click Apply.
8. Click the Create hyperlink to share the corresponding folder.
9. Enter a unique share name in the Share Name field. The user sees this share
name when connecting to this share. The actual name of the folder does not
change.
10. To add a comment about the share, type the text in Comment.
11. To limit the number of users who connect to the share, go to User limit, click
Allow and enter the number of users.
12. Select the protocols to be shared.
13. Click Apply to save the setting.

To Assign Share Permissions for Local and Domain Accounts:

1. Go to Security Share menu.


2. Locate the share and click to assign or modify share permissions to this
share.
3. Highlight the users or groups in the left hand pane.
4. Select the appropriate permissions from the pull down menu at the bottom of
the left hand window.
5. Click the >> button to add to the list.
6. To modify user or group permissions in the privileged list, highlight the users
or groups and select the appropriate permission from the pull down menu in
the bottom right hand window.
7. Click Apply to save the setting.

Note: You can also modify share permissions in the


Security File/Folder menu by clicking on the
Modify hyperlink of the corresponding shared
folder.

To assign the following share permission to a user on the GroupStor:

No Access (NA) Account is denied access to the share.


Read Only (RO) Account is permitted to read the share.
Change (CH) Account is permitted to read and write to the share.
Full Control (FC) Account is permitted to read both read and write and change
permission to the file or folder.

- 47 -
To Assign Share Permissions for a UNIX/Linux Host:

1. Go to Security Share menu.


2. Locate the share and click to assign share permission.
3. Click the UNIX/Linux Host tab.
4. Assign the UID, GID and Permission of the share. The ownership and
permission of the mount point is overwritten once the NFS client mounts the
share. If NIS support is enabled, the UID and GID pull-down menu lists all
NIS users to choose from.
5. Allow all hosts to access read/write or read only permission to the share. Go
to 9.
6. Or, specify privileged hosts by highlighting the host IP in the left hand
windows.
7. Select the appropriate permission from the pull down menu at the bottom of
the left hand windows.
8. Assign the UID/GID of the root account that the UNIX host converts to when
accessing the share also known as root squash function.
9. Click the >> button to join the privileged list.
10. To modify the permissions of the host in the privileged list, first highlight the
privileged host and select the appropriate permission from the pull down
menu at the bottom of the right hand window.
11. Click Apply to save the setting.
12. To remove shares, check the corresponding box located in the bottom row and
click .

The share permissions shown below can be assigned to UNIX/Linux Hosts on the
GroupStor:

Read Only (RO) the host can read the share.


Read Write (RW) the host can read and write to the share.

- 48 -
6.6 Configuring File and Folder Security and
ACL

Access Control Lists (ACL) are associated with each file and folder along with the list
of users and groups permitted access to that file or folder. When a user is granted
access to the file or folder an ACL node is created and added to the ACL for that file
or folder.

To assign permission to a local user, a Security ID (SID) is created by the GroupStor


and referred to in the ACL file and folder security. When the local user is deleted, the
name remains the same but does not have permission to the file or folder because the
SID is not the same. The administrator must re-configure all group memberships and
access rights to files and folders.

The Security ID (SID) for domain users is issued and maintained by the domain
controller on the network. The administrator does not need to re-configure all the
group memberships and access rights to the files and folders if the domain user is
deleted from the local user database and the name created is the same as the previous
one.

Note: When the administrator changes a user


permission on a file or folder currently being
accessed, the permission setting does not take effect
immediately because the local handle is being used.
It changes when the user reconnects to the file or
folder.

There are two built-in user accounts: Admin and Guest and two built-in group
accounts: Admins and Everyone.

Every GroupStor user including local and domain users are members of the Everyone
group. When a volume is created, Admins and Admin will be granted Full Control
permission and Everyone will be granted Read/Write permission to the volume by
default.

Once permissions are set on a volume, all the new files and folders created under the
volume inherit these permissions. Uncheck the Inherit from parent folder when

- 49 -
setting up permissions for the files and folder if you do not want these permissions
inherited.

To configure file and folder security:

1. The default for ACL control is enabled.


2. Go to the Security File/Folder menu.
3. To configure the permission, locate the file or folder.
4. Click the icon. If the icon is disabled, go to the Security ACL menu to
enable the ACL Control.
5. Clear the Inherit from parent folder box.
6. Select the users or groups from the left hand windows and click the >> button
to join the privileged user/group list.
7. To assign the new permission to all files and subfolders, check the Propagate
to all subfolders and files box.
8. Click Apply to save the setting.

The following File/Folder permissions can be assigned to a user on the GroupStor:

No Access (NA) Account denied access to the file or folder.


Read Only (RO) Account has read only permission to the file or folder.
Write Only (WO) Account has write only permission to the file or folder
Read Write (RW) Account has read and write permission to the file or folder
but not to delete it.
Modify (MO) Account has both read, write and delete permission to the file or
folder.
Full Control (FC) Account is allowed to read both read and write and change
permission to the file or folder.

Set File/Folder Permissions on Windows Network

The GroupStor has a simple, efficient method for setting up and maintaining
file/folder security on a Windows network. The administrator has rights for
maintaining control, making modifications and must grant permission to others.
The permission-mapping table for the GroupStor on a Windows Network
environment is shown below:

- 50 -
File/Folder Folder Permission in File Permission in
Permission on Windows Network Windows Network
GroupStor
Full Control Full Control
Modify Modify
No Access Read & Execute Read & Execute
(NA) List Folder Contents Read
Read Write
Write
Full Control Full Control
Modify Modify
Read Only 5 Read & Execute Read & Execute
(RO) 5 List Folder Contents 5 Read
5 Read Write
Write
Full Control Full Control
Modify Modify
Write Only Read & Execute Read & Execute
(WO) List Folder Contents Read
Read 5 Write
5 Write
Full Control Full Control
5 Modify Modify
Read/Write 5 Read & Execute 5 Read & Execute
(RW) 5 List Folder Contents 5 Read
5 Read 5 Write
5 Write
Full Control Full Control
5 Modify 5 Modify
Modify 5 Read & Execute 5 Read & Execute
(MO) 5 List Folder Contents 5 Read
5 Read 5 Write
5 Write
5 Full Control 5 Full Control
5 Modify 5 Modify
5 Read & Execute 5 Read & Execute
Full Control (FC)
5 List Folder Contents 5 Read
5 Read 5 Write
5 Write

- 51 -
To set, view, change or remove file/folder permissions in a Windows Network:

1. Locate the file or folder being modified


2. Right-click the file or folder, click Properties Security
3. To change the permission for existing groups or users, click the Allow or
Deny box. Or, click the Remove button to remove groups or users.

To Change Ownership of a File or Folder

1. Go to the Security File/Folder menu.


2. To change the owners name of a corresponding file and folder, click the
owners name hyperlink. Select a new owner from the user list.
3. Check the box beside Apply to all sub folders and files to propagate the
ownership to all sub folders and files.
4. Click Apply to save the setting.

6.7 Managing Quotas

Configuring User Quota

The GroupStor supports two types of quotas: User and Folder. User quota monitors
the disk space usage of each user. Its based upon file ownership and independent of
where the volume of the file and folder are located. Descriptions of the parameters for
setting user quotas are shown below:

User Name User name in the local user database.


UID The user ID set in the user-mapping table in
Network UNIX/Linux menu.
GID The group ID set in the user-mapping table in
the Network UNIX/Linux menu.
Type User type. Local or Domain.
In Use Total amount of disk space used by the user.
Quota Limit The amount of disk space in MBs a user is
allowed to use.

1. Click the Enable quota control box to enable user quotas.


2. Enter the quota limit in MBs for the user in the Quota Limit column.

- 52 -
3. Click the Recalculate button to obtain the updated total amount of disk
space allocated to each user.
4. Click Apply to save the setting.

To set all quotas to the same value, specify the quota value in the Set all quotas to
xxMB input field. Click the Set hyperlink to save the setting.

Configuring Folder Quota

Folder quota monitors the amount of data that can be stored on the folder where folder
quota is applied regardless of the user. It can limit the total amount of data stored in
the GroupStor and effectively controls the proper use of storage resources. Note:
Setting folder quota to the Volume root or System folder and sub-folders is
prohibited.

Folder Name The path and folder name where the folder
quota was applied.
In Use Total amount of disk space used.
Quota Limit The amount of data that can be stored in
respective folders.

Delete quota entries by selecting the box at


the end of each quota entry and clicking the
icon.

1. Click the Enable folder quota control box to enable folder quotas.
2. Click Add to add quota to a folder.
3. Click Select Path to browse for the target folder.
4. Enter the quota limit in MBs.
5. Click Apply to save the settings.
6. Click Recalculate to obtain updated information on the total amount of
disk space in use in each folder.

To set all quotas to the same value, specify the quota value in the Set all quotas to
xxMB input field. Click the Set hyperlink to save the setting.

- 53 -
- 54 -
Chapter 7 Disc Sharing and Disc
Archiving
Disc Server creates and manages CD and DVD disc images for easy and fast disc
sharing. It eliminates the handling of huge numbers of discs. Thousands of discs can
be kept online for user access. To protect those disc images, all GroupStor servers are
equipped with a robust RAID subsystem featuring hot-spare disks and strong data
protection.

7.1 Using the Disc Server Function

The Disc Server function is activated on the GroupStor 9300, 9350, 9400 and 9600
models by default. Its an optional feature on the GroupStor 9500 models. To active
this feature on the GroupStor 9500 model, contact MDI Technical Support to get the
license key and enter the key on the Server License menu of the administration
page.

At least 256MB memory is required for the Disc Server function to work. The
GroupStor server will manage more disc images with more memory.

The GroupStor requires some simple configuration before the Disc Server function
can be used. Open the administration page and select Quick Setup from the Disc
Server menu. Select the CD or DVD device that will automatically duplicate the disc
image when a disc is inserted. Then specify the folder to store the duplicated disc
images. Click Apply to save the settings.

Insert a disc into the CD or DVD device. It will duplicate the disc image immediately.
When it finishes, network users can access the disc by opening the MIRROR share of
the GroupStor server.

- 55 -
7.2 Creating Disc Images
Using the Local Optical Device to Duplicate Disc Images

The simplest and fastest way to create a disc image is to use the CD or DVD device of
GroupStor server to duplicate the inserted discs. Typically a CD can be duplicated in 5
to 10 minutes.

To configure a device to automatically duplicate any inserted discs, go to the Disc


Server Disc Caching menu page of the administration page. In the Device List
table, click the hyperlink text in the CD Devices Function column and change the
CD function to Disc Mirroring.

The Disc Mirroring Settings section appears on the page. Select a folder as the target
location. The folder is called Disc Image Folder and is a folder created especially for
storing disc images. In addition to creating a new disc image, it can also replace an
existing disc image with the duplicated one. If the disc image being replaced is shared,
the duplicated disc image inherits all the share settings and permissions. The CD
replacement happens once and returns to the previous settings.

The disc images name can be either inherited from the CD label or user-defined. A
user-defined name only applies once to the next duplicated disc image.

Copying Disc Images Via Network Filing Protocols or


SmartSync

Disk images are stored in the disc image folders. Administrators can also copy or sync
the disk images from one GroupStor server to another using Windows Explorer,
MacOS Finder or SmartSync.

When disc images are copied to a disc image folder, the GroupStor server will not
immediately recognize the images. The administrator must manually discover the disc
images or set up the GroupStor server to discover disc image regularly.

To discover disc images manually, open the Disc ServerDisc Images administration
page and click the Rescan Images hyperlink to the right of the page.

- 56 -
To set up the GroupStor to discover the disc image regularly, open the Disc
Server Information page. Configure the Disc Server Settings to enable the
GroupStor server to scan for disc images every hour.

Using the Remote Mirroring Software to Create Disc Images

Refer to Appendix B for use of the remote mirroring software.

7.3 Managing Discs

Once the disc image is created in the GroupStor server, it is seen on the Disc
Server All Disc Images menu of the administration page.

If the disc images are not created or duplicated by the GroupStor server or the remote
mirroring software, administrators have to manually re-scan the disc image folders
from the disc images. For example, if disc images are copied from another GroupStor
server to a disc image folder over the network using the Windows or other OS
platforms, the GroupStor server will not be able to list them on the Disc Images page.
In such a case, administrators have to click the Re-scan Images hyperlink text to the
right of the page.

To Change the Disc Name:

To change the disc name, click on the hyperlink text in the Disc Name column. On
the same page, it also shows detailed information of the disc image.

To Delete a Disc Image:

To delete a disc image, check the boxes to the right and click the Delete icon.

7.4 Sharing Discs

Administrators can choose to share a single disc, multiple discs or a disc image folder.
If a single disc is shared, its content will be shown when users open the network share.

- 57 -
If multiple discs are shared, the discs will appear as individual folders under the
network share. The folder names are the same as the disc names. If a disc image folder
is shared, all the discs in the disc image folder will appear as individual folders under
the network share.

To Share a Single Disc:

To share a single disc, go to the Disc Server Disc Images menu of the
administration page. Click the Create hyperlink in the Share column. Click Apply to
share the disc. To restrict user access enter the Share Permissions tab and assign user
permissions. The Unix/Linux Setting tab is used for configuring NFS security
settings. Refer to Section 6.5 Creating Share and Assigning Share Permissions for
details of share permissions and NFS security settings.

Also go to the Disc Server Disc Shares page to share a single disc. Click the
Create Disc Share button. Specify the share name and click Apply to create the
share. Select the disc to share in the Share Target tab and click Apply.

To Share Multiple Discs:

To share multiple discs, go to the Disc Server Disc Shares page. Click the Create
Group Share button. Specify the share name and click Apply to save the settings.
Select the discs to share in the Share Target tab and click Apply. To restrict user
access, use the Share Permissions tab or the Unix/Linux Setting.

To Share a Disc Image Folder:

To share a disc image folder, go to the Disc Server Disc Images Disc Image
Folder menu of the administration page. Click the Create hyperlink in the Share
column. Specify the share name and click Apply. To restrict user access, use the
Share Permissions tab or the Unix/Linux Setting.

Also go to the Disc Server Disc Shares page to share a disc image folder. Click the
Create Disc Folder Share button. Specify the share name and click Apply to create
the share. Select the disc image folder to share in the Share Target tab and click
Apply.

- 58 -
7.5 Burning Disc Images

To burn an existing disc image, select Disc Recording from the Disc Server menu on
the administration page. The CD function must be configured as Loader/Writer to
record to disc. To change the CD function, click the hyperlink in the Function column
of the Device List table.

Then select the disc image by clicking the Select a Disc hyperlink. Aft the selection is
made, the disc image information will be shown underneath includes the image size,
disc format and disc volume label. Check the Erase disc before writing option if it is a
rewriteable disc that contains data. Click Apply to start recording to the disc.

7.6 Archiving Data to CD/DVD Discs


Data archiving is moving or copying data from the GroupStor server to CD/DVD
discs. To specify what to burn an administrator sets file filters based upon file date
and time. The primary purpose of this application is to move obsolete data from the
GroupStor server and free up disk space for future use.

The GroupStor server is more versatile when the Disc Server function is used along
with the Data Archiving function. Less frequently files can be saved as read-only disc
images, mounted by the Disc Server function and shared by network users in a read-
only format. Archived data that has not been used for a long period of time can be
burned to disc to free up hard disk space.

The Archive Folder


The disc imaging folder is used specifically for storing archived data in the form of
disc images. During data archiving the GroupStor server will create a disc image in
the archive folder. Specify the location of the archive folder on the
Disc Data Archivng Summary page before you use the data archiving function.

Summary Logs

The Disc Server Data Archiving Summary page also shows the execution
summary of data archiving tasks. It also keeps records of which disc images are
created, burned and which arent. Click the View hyperlink under the Discs column of
the Summary Logs table to view the list of disc images. Choose to burn disc images
that have not yet been burned here.

- 59 -
Setting Up Data Archiving Tasks
Archiving data can be done manually or as a scheduled task on the Disc
Server Data Archiving Tasks page.

Task Name The name of the data archiving task for


management purposes.
Source Folders Specifies the data to be archived. The folders
(do not save the full paths) are archived to
CD/DVD discs.
Disc Label Specifies the labels of the CD/DVD discs.
Data Extension Appends the date of archival of the disc label
when date extension is enabled. For example,
ARCH20041010_01 is the first disc created
by the data archiving task on October 25,
2004 with the date extension. The second
disc is ARCH20041010_02 if more than one
disc is created.
Disc Type Specified the media to be burned CD, DVD
or dual-layer DVD. The GroupStor server
creates disc images that match the size of the
disc type and then burns the disc images.
Advanced Settings File Filtering Originally the settings are hidden. Click the
Show hyperlink to display the advanced
settings.
File filter specifies which files in the source
folder to include for data archiving. Choose
to include only the source files that are N
days old or only the files for which the
archive bits are set. The GroupStor server
will clear the archive bits of the source files
that are archived if not deleted.
Advanced Settings Skips archiving Sets constraints so that the archiving task is
activated only when one of the following
conditions is met:
If the free volume space is lower than
n% skips data archiving if the free volume
space is high.
If the archived data is over n MB/GB
skips data archiving if the archived data is
below the threshold.

- 60 -
Archiving Schedule Specify the schedule of the archiving task. If
the schedule is due the GroupStor server will
check if the conditions specified in the
Advanced Settings are met. If met the data
archiving task is performed.
Options Delete source files after archiving is
complete If checked the GroupStor server
will delete the source files to free up disk
space after data is successfully archived as
disc images or burned to disc.
Burn Disc If checked data is archived to
CD or DVD disc. Multiple CD/DVD writers
can be specified here. Note: The CD/DVD
functions must be set to Loader/Writer before
beginning the burn process.

- 61 -
- 62 -
Chapter 8 User Access
The GroupStor appears in any network environment as soon as it is properly
configured. This chapter describes how to get the GroupStor ready for user access in
various operating environments on the network.

Please ensure that the GroupStor is configured with an IP address and that a volume
was successfully created. Throughout the remainder of this section the server default
name is NASSERVER, the IP address is 192.168.170.172 and there is a volume
named volume01.

8.1 Workgroup or Domain Mode

The GroupStor works in either workgroup mode or domain mode. In workgroup


mode, the administrator creates accounts for the GroupStor and maintains the user
database on the server. User authentication is accomplished by checking the local user
accounts. In domain mode, the GroupStor retrieves user names from the domain
controller and relies on the domain controller to authenticate users. It also
authenticates users by local accounts.

If a Windows user requests access to a shared folder in domain mode, the user will be
authenticated with the local accounts first and then the domain accounts. If the user
has been assigned access rights in share permissions and ACL settings, the user is
allowed to access the shared folder.

The security control mechanism for those using MacOS, web browsers or FTP is
similar. When the workgroup mode is set, the GroupStor authenticates all users for
various network-operating environments with local accounts only. If set to domain
mode, the GroupStor can be configured to use different security policies for different
network file protocols either authenticated by local accounts only, or by both local
and domain accounts.

For example, the GroupStor can authenticate Windows users by querying the domain
controller and at the same time check MacOS users with local user accounts. The
administrator can set the SMB/CIFS protocol to the domain mode and configure the
AFP protocol to apply Local account authentication.

- 63 -
8.2 Access From Windows

There are a number of steps to perform before Windows users can access the
GroupStor. First enter the administration homepage.

1. To configure the GroupStor to operate in either workgroup or domain mode:


Go to the Network Windows menu and select either Workgroup Mode or
Domain Mode. Specify the workgroup/domain name. Reboot the server
afterwards.
2. To create local accounts if the GroupStor is in the workgroup mode:
Go to the Security Account Local Account page and click the Add User or
Add Group button to create local accounts.
3. To get domain accounts from the domain controller if the GroupStor is in domain
mode:
Go to the Security Account Domain Account page. To retrieve domain
accounts, click the Modify button; enter the domain user account for logging onto
the domain controller. Next, use the >> and << buttons to specify the domain
accounts to be cached in the GroupStor.
4. To share the volume with network users:
Go to the Security File/Folder menu. Find the volume01 entry and click
Create in the Sharing column or click Modify if the volume has been shared. On
the Property page, check the Windows Network (SMB/CIFS) box and click
Apply.
5. Set share permissions.
After sharing the volume, specify the access rights of local users/groups and
domain users/groups.

Windows users can now access the GroupStor, run Windows Explorer and open the
path of \\nasserver. The shared folder volume01 will appear in the window.

Windows users can also map a network drive to \\nasserver\volume01 or use the net
use command in the Command Prompt window. The command is:

net use n: \\nasserver\volume01

- 64 -
8.3 Access From Web Browsers

In addition to the administration homepage, the GroupStor provides users with access
to data in the server from the user s homepage. Users can download files, create
folders, upload files and modify ACL with a web browser.

Follow these steps to provide user access from the web:

1. To enable the user homepage:


Open the administration page and enter the Network Web menu. Check the
Enable Web Data Access box, specify other parameters allows users access to
local accounts only or both local and domain accounts and click Apply.
2. To create local user accounts or retrieve domain accounts from the domain
controller, determine if the GroupStor is in the workgroup mode or domain mode.
3. To share the volume with network users:
Go to the Security File/Folder menu. Find the volume01 entry and click
Create in the Sharing column. Or, click Modify if the volume has been shared.
On the Property page, check the Web Access (HTTP) box and click Apply.
4. To set share permissions:
After sharing the volume, click the Share Permissions tab to specify access rights
of local users/groups and domain users/groups.

Users can now run the web browser and open the IP address 192.168.170.172 to
access the GroupStor. When the user homepage is opened, it prompts for user name
and password. All shared folders are displayed after the user login. An example of the
user homepage is shown below:

- 65 -
In the top right corner of the user page are the tool-bar icons that provide access to the
various functions, i.e., creating folders or uploading files. The server name and user
login appear below the tool-bar. The lower portion of the page is the file browsing
area.

Tool-bar Icons

Admin Page: switches to the administration home page.

Change View Mode: switches views of the file browsing area between Detail,
Large Icons and Small Icons.

Change Password: modifies the password of the login user. It allows a local
user to change the password.

Create Folder: creates a new folder in the current path if the login user has
access rights.

Upload File: uploads files to the current path if the login user has access
rights.

Help: opens a new window with help information

File Browsing

The file-browsing window shows all the shares on the server when the user page is
opened. All folders and files are presented as hyperlinks. When a folder is clicked, all
content will appear in that window. When a file is clicked, it either opens the file in
another browser window or a dialog-box for download will pop up. Click the Up
Directory icon to move to the upper level of directory.

- 66 -
To delete files or folders, check the boxes in the 'Delete' column and click the 'Delete'
icon .

Click the Rename icon to rename a file or folder, input the name and press the
Enter key.

A user with 'Full Control' access rights to a file or folder can modify their ACL by
clicking the ACL icon in the Permission column.

8.4 Access From MacOS

First set the GroupStor to operate in either workgroup mode or domain mode. Follow
the steps shown below to configure the GroupStor for MacOS user access:

1. Enable the Macintosh Network support (AFP protocol).


Open the administration page and enter the Network Macintosh menu. Check
the Enable Macintosh Network box and specify the security policy and the
AppleTalk zone. Click Apply. Local account authentication can only be
selected as the security policy in workgroup mode. In domain mode either option
can be selected.
2. Creating local user accounts or retrieving domain accounts from the domain
controller depends upon whether the GroupStor is in workgroup or domain mode.
3. To share the volume with network users:
Go to the Security File/Folder menu. Find the volume01 entry and click
Create in the Sharing column. Or, click Modify if the volume has been shared.
On the Property page, check the Macintosh Network (AFP) box and click
Apply.
4. To set share permissions.
After sharing the volume, specify the access rights of local users/groups and
domain users/groups.

After the configuration is complete, MacOS 8 and OS 9 users can use the MacOS
Chooser or Network Browser to access the GroupStor. Use the Connect to Server
function to open the GroupStor.

An example of the open Connect to Server window in Finder is shown:

- 67 -
Either type the IP address of the GroupStor in the Address field and click Connect
to put it on the Desktop. Or click AppleTalk in the middle left window pane to find
the zone and the server. Once the server is found, click Connect to put it on the
Desktop.

8.5 Access From FTP Clients

Users can access an FTP home directory in the GroupStor server. To set up access, do
a login authentication by checking the ACL to the FTP home directory. During the
FTP session, the server checks the ACL as it receives any FTP requests - such as ls,
put, get, etc. Both local accounts and domain accounts are supported depends
upon the security policy.

After setting the GroupStor to operate in workgroup or domain mode, follow the steps
below to configure for FTP access:

1. To enable the FTP data access feature.


Open the administration page and enter the Network FTP menu. Check the
Enable FTP Data Access box and specify the security policy. In workgroup
mode the only selection is Local account authentication as the security policy.
In domain mode, select either one. Specify the FTP home directory as volume01.
Click Apply to save the settings.
2. Create local user accounts or retrieve domain accounts from the domain controller
depends upon whether the GroupStor is in workgroup or domain mode.
3. To control user access configure the folder security settings of volume01:

- 68 -
Click the Set hyperlink to specify the access rights (ACL) for the FTP home
directory volume01 for accounts permitted to login into the GroupStor using ftp
software. Note: Unchecking the Inherited List box clears the inherit from
parent folder. Click the Apply button

Run an FTP client to connect to 192.168.170.172. Login as the user assigned in


step 3 above. Access to volume01 is complete.

8.6 Access From NFS Clients

The security control for NFS clients accessing the GroupStor follows the traditional
UNIX-style trust-host mechanism and UID/GID checking. These steps enable NFS
support and export the volume for NFS clients to mount.

1. To enable the UNIX/Linux Network support (NFS protocol):


Open the administration page and enter the Network UNIX/Linux menu.
Check the Enable UNIX/Linux Network box and click Apply.
2. Go to the Security Account UNIX/Linux Host page and add the hosts for
access to the GroupStor.
3. To export a volume to NFS clients:
Go to the Security File/Folder menu. Find the volume01 entry and click
Create in the Sharing column. Or, Modify if the volume has been shared. On the
Property page, check the UNIX/Linux Network (NFS) box and click Apply.
4. To add NFS clients to the privileges host list and assign UID, GID and permission
rights to the exported volume.
Enter the UNIX/Linux Host tab to specify UID, GID, permission and the
privileged hosts to the exported volume.

After the volume is exported, use one of the NFS clients in the privileged host list to
mount the volume. Login as the root and use the following command to mount
volume01 under the /mnt directory.

mount 192.168.170.172:/volume01 /mnt

Once mounted, the /mnt directory will link to volume01 and inherit the same UID,
GID and permission as specified in the configuration steps. Users on the NFS client
with proper access rights can access the /mnt directory and the GroupStor.

- 69 -
Chapter 9 Backup and Recovery
9.1 Loading and Writing CD/DVD Discs

The GroupStor may include an optional DVD-ROM or DVD-R/RW for loading data
from CD/DVD discs or burning files onto writable CD/DVD discs. The CD and DVD
burning feature turns the GroupStor into a powerful data storage appliance and makes
it into a device that publishes data.

Loading CD/DVD Data

The Loader function copies data from a CD or DVD disc to any location on the
GroupStor. This function is useful for restoring archived data on CD/DVD discs or
simply copying files from discs to the server.

Note: The GroupStor only recognizes data on CD or


DVD and supports ISO 9660 and UDF formats.
Such multimedia CD formats as audio CD or video
CD are not supported.

To load data from CD/DVD discs first insert the source disc into the CD or DVD
device. Open the Administration Page and select Backup Loader/Writer. Follow
these steps:

- 71 -
1. Select the Source Device where you insert the disc to be loaded. A device list
appears for your reference above the Source Device item.
2. Specify the destination. Click on the Select Path hyperlink and select a Target
Path.
3. To overwrite the existing files choose, Overwrite with newer files, and the
target is overwritten if the files on the CD/DVD disc are newer.
4. Click Apply to start copying data.

The disc copying progress can be viewed by clicking the hyperlink in the Status
column of the Device List. A separate browser window pops up. Progress is indicated
either by the progress bar, the Processed Folders item, the Processed Files item or
the Size Processed item.

Writing CD/DVD Discs

The GroupStor supports CD or DVD burning. Use ISO 9660 format to write data to
CD or DVD discs. CD-RW, DVD-RW and DVD+RW writer devices are supported.
Dual-layer DVD writing is also supported.

- 72 -
To write data to CD/DVD discs, insert a blank disc into the CD/DVD writer. Open the
Administration Page and enter the Backup Loader/Writer page. Follow these
steps:

1. Click the Writer tab in the Backup Loader/Writer menu


2. Select the Target Device where the blank CD/DVD disc(s) will be burned. A
device list appears above the Target Device item for your reference.
3. To specify the source folders, click Select Folders and specify which folders to
burn.
4. Specify the volume label of the CD or DVD disc.
5. Check the overwrite option to erase a rewriteable disc before burning.
6. Click Apply to start burning CD or DVD discs.

- 73 -
To check the progress of writing to the disc, click the hyperlink in the Status column
of the Device List. A separate browser window pops up. The progress bar in either the
Processed Folders item, the Processed Files item or the Size Processed item,
indicates the progress. Check Task Phase to discover what the CD/DVD writer is
doing.

If more than one disc is required to burn the source data, a prompt for a new disc
appears after the first disc is burned. The Task % progress bar indicates the total task
progress or the percentage of the source data, which has been burned to discs. The
Disc % progress bar indicates the CD/DVD writing percentage of the current disc.

9.2 Tape Backup and Restore

The GroupStor includes backup software for data protection. The backup software
features full or incremental backup, scheduled tasks, and multi-volume backup. The
administrator defines the backup procedure by including one or more backup tasks.
The hardware compression capability can also be utilized. Its simple, yet powerful
and fulfills most backup demands.

The backup software requires the system folder to operate. To specify the system
folder, open the Administration Page and go to the Server Maintenance page.
Specify the volume that contains the system folder. If no system folder exists in the
specified volume, it will be automatically created.

- 74 -
Adding Backup Tasks

To create backup schedules, open the Administration Page and go to the


Backup Tape Backup page. Click the Backup tab. A list of all the scheduled tasks
appears on this page.

To add a task, click the Add Task button. Follow these steps:

1. Select a tape drive for backup.


2. Input the tape label for identifying tapes. It will append backup start date/time to
the tape label when running a backup task.
3. Specify full or incremental backup. A full backup task copies all selected folders
and files onto tape. An incremental backup task copies only modified or newly
created files since the last backup. It checks archive bits and only backs up those
with archive bits set.
4. Choose which folders to back up. Click the Select Folders hyperlink and select
what to back up. Your selection will be copied to the lower list box, which shows
the folders to back up.
5. Specify a backup schedule. Backups can start immediately or on an arranged
schedule. Schedules can be specified as any weekday or a day of the month.
6. Specify if the tape is to be overwritten. If yes, the backup task will rewind the tape
to the beginning and overwrite it with backup files. If no, the backup to tape is
appended existing data on the tape is not overwritten.
7. Enables hardware compression capability if the tape drive has this feature.
8. Click the Apply button.

Restoring Files From Tape

To restore data from tape, open the administration page and go to the Backup Tape
Backup page. Click the Restore tab and follow these steps:

- 75 -
1. Specify the Tape Drive being restored.
2. Specify a backup set to restore by selecting a backup index required to restore
data from tape. If the backup index is missing, the index must be imported from
the tape before the restoration process can continue. To import backup indexes,
select a tape drive and click the Import hyperlink.
3. Select restore all files in the backup set or only certain files or folders. The latter
requires a Java virtual machine for the UI. Go to http://java.sun.com for the latest
Java virtual machine.
4. Click the Next button.
5. To restore selected files or folders, make selections on the Java UI in the What to
Restore item.
6. Choose the target location and restore data to either the original location or an
alternative location. If the original location is selected data is restored to the
original location where it was backed up. Note: If the original volume is missing
nothing is restored. The alternative location is any user-defined path. Use the
Select Path hyperlink to specify the path and restore files and the full directory
hierarchy under the specified path.
7. Specify if the ACL settings and files are to be restored together.
8. Specify if existing files and backup files are to be overwritten.
9. Click the Apply button to start the restoration.

Checking Task Progress and Viewing Logs

When a tape task is running, view the progress on the Summary page. A list of tape
drives appears in the upper Summary page. Any task currently running is shown as a

- 76 -
hyperlink in the Status column. Click a hyperlink for task progress and details. Ready
will appear if there is no task running.

After backup or restoration task finishes, a summary log appears in the system folder
in the lower Summary page. These logs keep records of statistics and errors for all
backup/restoration tasks ever executed. Click the hyperlink in the Tape Label column
to see details. To delete logs, check the boxes to the right and click the Delete icon.

9.3 SmartSync NAS-to-NAS Data Replication


and Backup
GroupStor systems are integrated with the SmartSync NAS-to-NAS data replication.
Two or more GroupStors are required one as the SmartSync server and one or more
as SmartSync clients. The SmartSync server is like an ftp server. SmartSync clients
can either replicate their data to the SmartSync server or copy data from the
SmartSync server dependent upon the task settings. The feature of creating sync
points for backup mode or distribution mode is available on all GroupStor models.

There are three operating modes - "mirror" for one-to-one data replication,
"backup" for disk-based backup and "distribute" for one-to-many data distribution.
The following sections describe the usage and applications of these operating modes.

Building a Mirror Site

Two GroupStor systems are required one as the SmartSync server and the other as
the SmartSync client to replicate data from the client to the server.

One GroupStor acts as the SmartSync server and creates a sync point in it. A sync
point is a folder in the SmartSync server that is accessible by clients for data

- 77 -
replication. The sync point of the mirror mode receives data from a SmartSync client
and makes an identical copy.

To create a sync point, go to the Backup SmartSync Server menu on the


Administration Page. Click the Add button to open the page below. Specify the sync
point name and group allowed to replicate data to this sync point on this page. Set the
mode to Mirror.

On the second GroupStor server, which acts as the SmartSync client, set up a
SmartSync task, define the schedule settings, and the source folder.

To set up a SmartSync task, go to the Backup SmartSync Task menu on the


Administration Page. Click the Add Task button.

The four steps to add a SmartSync task are:

1. To specify the IP address of the SmartSync server, enter the IP address of the

- 78 -
GroupStor where the sync point is to be created. Enter the port number in the
Second box. Port 873 is the default for the sync point names and other information
relating to the remote SmartSync server. Specify the remapped port number here if
the port was remapped by a firewall or NAT device.

2. To choose the sync point of Mirror mode for the SmartSync server provide a
user account with the privilege to replicate data to the sync point.

3. To complete the task settings, provide the task name, select the source folder to
replicate, specify the schedule and configure the SmartSync options on this page.

4. Confirmation shows a brief description of the task settings.

Making Disk-to-Disk Backups

Two or more GroupStor servers are required one as the SmartSync server and the
others as SmartSync client to backup data from the SmartSync clients to the
SmartSync server.

On the GroupStor that acts as the SmartSync server, create the sync point of
Backup mode to receive data from SmartSync clients and create data backups.

To create a sync point, go to the Backup SmartSync Server menu on the


Administration Page. Click the Add button to open the page below. Put the sync
point name and specify the groups allowed to replicate data to this sync point on this
page. Set the mode to Backup.

- 79 -
The GFS media rotation mechanism is the process for managing backup versions and
is described below. Basically it checks for obsolete versions and deletes them when a
new backup version is created. For example: X, Y, Z are user-defined numbers.

a. Keeps all the backup versions today.


b. Keeps one backup version per day in the last X days, except today.
c. Keeps one backup version per week in the last Y weeks prior to the X
days.
d. Keeps one backup version per month in the last Z months prior to the
Y weeks.

On the GroupStor that acts as the SmartSync client, set up a SmartSync task, define
the schedule settings and the source folder.

To set up a SmartSync task, go to the Backup SmartSync Task menu on the


Administration Page. Click the Add Task button.

- 80 -
The four steps to add a SmartSync task are:

1. Specify the IP address of the SmartSync server.

2. Choose the sync point Backup mode on the SmartSync server. Specify the
action as Backup to server and grant a user account the privilege to replicate
data to the sync point.

3. To complete the task settings provide the task name, select the source
folder to replicate, specify the schedule, and configure the SmartSync options on
this page.

4. Confirmation shows a brief description of the task settings.

Restoring Files From SmartSync Backups

To restore data from the SmartSync server, create a SmartSync task on the client.
Open the Administration Page and enter the Backup SmartSync Task menu.
Click the Add Task button.

To add the SmartSync task:

1. Specify the IP address of the SmartSync server.

2. Choose the sync point of Backup mode on the SmartSync server. Specify
Restore from server and provide the user account with the privilege to replicate
data to the sync point.

3. To complete the task settings, provide the task name, select which
backup version to restore, specify the target folder, configure the SmartSync
options and the overwrite options on this page. The overwrite options specify
whether to overwrite the target with files of the same name.

4. Confirmation shows a brief description of the task settings.

- 81 -
Distributing File Updates to Multiple Sites

Two or more GroupStor systems are required one as the SmartSync server and one
or more as SmartSync clients to replicate data from the SmartSync server to the
SmartSync client.

On the GroupStor server that acts as the SmartSync server, create a sync point in
Distribute mode to distribute data to the SmartSync clients as requested.

To create a sync point, go to the Backup SmartSync Server menu on the


Administration Page. Click the Add button to open the page shown below. Specify
the sync point name and group allowed to request data from this sync point on this
page. Set the mode to Distribute.

On the GroupStor that acts as the SmartSync client set up a SmartSync task that
defines the schedule settings and target folder.

To set up a SmartSync task, go to the Backup SmartSync Task menu on the


Administration Page. Click the Add Task button.

- 82 -
To add the SmartSync task:

1. Specify the IP address of the SmartSync server.

2. Choose the sync point Distribute mode in the SmartSync server and specify the
user account with the privilege to request data from the sync point.

3. To complete the task settings, provide the task name, select the target folder to
receive data, specify the schedule and configure the SmartSync options on this
page.

4. Confirmation shows a brief description of the task settings.

The SmartSync Options

When setting up a SmartSync task, the following SmartSync options appear:

Compress the data stream during data transmission: When checked, data is
compressed before transmission to the SmartSync server.

Note: It is faster to complete a task. It takes


extra CPU time to compress data. There may be
a performance penalty if the compression ratio is
low.

Contains security information: When checked, the ACL information is sent to


the SmartSync server.
Bandwidth control: Limits the maximum bandwidth for the task.

- 83 -
Include/exclude file patterns: Excludes or includes certain file types in the
synchronization. For example, to exclude WORD files, type -*.doc; . To
exclude all WORD files except those beginning with abc, type +abc*;-
*.doc; .
Perform quick synchronization: Quick synchronization only checks the file date,
time and size when matching files, instead of checking block-by-block. It
significantly speeds up the synchronization but there is an added risk because files
may not be identical.
Generate transaction logs: When checked files added, updated or deleted during
the data replication are recorded. Details of the transaction logs are displayed on
the SmartSync Summary page.

9.4 Backup and Restore System Profiles

To restore data from a GroupStor server failure requires restoring data and system
configurations. Tape backup and SmartSync are used to restore data; system profiles
are used to recover system configurations. System profiles are the backups of all
system configurations, user databases and security information.

Backing Up System Profiles

To backup system configurations, open the administration page and go to


Backup System Profile. System profiles are saved manually or on a regular basis
as defined on this page. System profiles are saved locally on the HD. Current backups
are displayed in the lower half of the page. To delete a system profile, check the box
and click the Delete icon.

Recovering System Configurations When a Disaster Occurs

If a system failure corrupts system configurations, reset system configurations to the


factory default. Go the Server Shutdown page. Check the Reset configuration to
factory default option and click the Reboot button.

Restore system configurations using one of the system profiles. Go to the


Backup System Profiles Restore page. Select a system profile and choose which
part of the system settings to restore. Then click the Apply button.

- 84 -
The NAStart software can also create a system profile. To recover from a system
profile saved by NAStart click the An external file item and find the system profile.
Specify the restore option and click the Restore button.

Restore options are:

Server, network and backup settings includes all settings on the Server,
Network, Backup and Event Configuration menus.

Note: The admin password will not be restored


during the recovery.

User accounts and quota settings Includes local accounts, current domain
accounts and trust domain accounts, along with their quota settings. User accounts
will be appended to the existing user database local accounts with the same
names will be overwritten; domain accounts with the same SID will be
overwritten; others will be added to the existing user database.
Security Information, including network shares and ACLs Includes all
network shares, share permissions and access control lists.

- 85 -
Chapter 10 Event Notification and System
Status
This chapter covers the Event Notification and System Status pages. The GroupStor
collects information about the system, hardware and security events and records three
kinds of logs:

System Log
Device Log
Security Log

All events are categorized into three levels: Info, Warning and Error. Use the
Event Configuration menu to configure the level of the logs. Use the Advance or
Basic button to switch between the display for advance and basic information. The
Advance view shows all the information in the Basic view plus additional event
notification settings that may be of interest to the more advanced user. Various
notification methods are provided by the GroupStor to ensure non-stop operation and
data integrity:

LCD Alert provides warning and error level notification:


o Warning level notification such information as very low
disk space and hot spare disk consumed, etc. is detected on
this volume.
o Error level notification such information as CPU fan failed;
volume is degraded or faulty, etc. is detected here.
Web Reminder* provides instant notification on the administration
homepage.
Email Alert* provides notification via email.
SNMP Trap* sends SNMP trap to the Network Manager System
(NMS) information such as HP Open View.
Buzzer Alert* an audio sound that goes off from the built-in buzzer in
the GroupStor when events occur. To turn of the buzzing sound, either
press any button the LCD front panel or click the Mute Buzzer icon on
the administration page.

* Configure the type of event notifications in the Event Configuration Advance


menu.

- 86 -
10.1 Thermal Settings

Users can define the thermal scheme of the GroupStor to provide a warning message
or shut down when the system or CPU temperature is over a pre-defined threshold
temperature.

To configure thermal settings:

1. Go to Thermal Settings in Event Configuration menu.


2. Enable CPU Fan Control to adjust the CPU fan speed automatically based upon
the CPU and System temperature. Otherwise, the CPU fan will always run at full
speed.
3. To set the GroupStor to give a warning message or shutdown based upon the CPU
or System temperature, check the Warning and Shutdown boxes and select the
proper temperature from the pull down menu.
4. Click the Advance button to configure notification for various events.
5. Click Apply to save the setting.

10.2 Checking the Event Logs

Use Web Reminder, System Log, Device Log & Security Log to view a summary
of all events that occurred on the GroupStor. The severity of each event is determined
by the GroupStor and displayed in different colors:

Information = Green
Warning = Yellow
Error = Red

Viewing Web Reminder

Web Reminder is the warning message that appears on the first screen of the
administrator home page and alerts the administrator that one or multiple critical
events have been found on the GroupStor. The administrator is immediately notified
of the status of the GroupStor upon entering the administrator home page. Click the
hyperlink of the Web Reminder message for a Web Reminder summary menu.

- 87 -
Go to the Event Web Reminder menu for a summary of all critical events that
occurred on the GroupStor.

Viewing System Log

In the Event System Log menu:

1. Select the number of the most recent events show on the screen.
2. Select the severity level for the events to be reviewed.
3. Click Refresh or button to refresh the screen.
4. Click Clear or button to clear the log.

Viewing Device Log

In the Event Device Log menu:

1. Select the number of most recent events shown on the screen.


2. Select the severity level for the events to be reviewed.
3. Click Refresh or button to refresh the screen.
4. Click Clear or button to clear the log.

Viewing Security Log

In the Event Security Log menu:

1. Select the number of most recent events shown on the screen.


2. Select the severity level for the events to be reviewed.
3. Click Refresh or button to refresh the screen.
4. Click Clear or button to clear the log.
5. Select the protocols and click the Refresh button to show corresponding events.
Default event represents a general security event for the GroupStor and is not
related to any protocols.

- 88 -
10.3 Viewing System Status

System Status displays a comprehensive view of the system fan status, thermal status
and system voltage. Use this information to quickly find a problem with the
GroupStor and take the appropriate action. The Status Environment page monitors
the CPU fan status, CPU and system temperatures and System Voltages. Click
Refresh to obtain the latest status.

Viewing the Open Files

The Status Open Files menu provides the following information about all open files
on the GroupStor:

R/W read/write privileges of the opened file.


User the name of the user who has opened the file.
Protocol - the protocol used for the network connection: SMB, NFS, AFP
or FTP.
File Name lists the name and path of the open file.

Viewing the Active Connections

In the Status Connections:

Current Connections shows the configuration and protocol of the


client currently connected to the GroupStor by clicking the box beside the
protocol to be viewed on the list.
User the name of user connected to the GroupStor.
Computer the computer name of the client connected to the GroupStor.
Address the IP address of the client connected to the GroupStor.
Protocol the protocol used for the network connection: SMB, NFS,
AFP or FTP.
Connected Time the date / time that the connection was established.
Open Files total number of open files.
Disconnect disconnect a particular connection by checking the
disconnect box or click the icon.

- 89 -
10.4 Saving System Settings and Status as
HTML Files

It is helpful and sometimes necessary to have an overview of all system settings,


current system status and event logs for maintenance and technical support purposes.
Its helpful if a server can provide these updates via email.

The GroupStor does all this with a few mouse-clicks.

First, create a system folder to store these files. The system folder is also required to
perform tape backups. To create the system folder, open the Administration Page
and go to the Server Maintenance menu. On the menu page, select a volume for
the system folder. Click Apply to create the system folder.

Once the system folder is created, save the system settings and event logs as HTML
files. On the same page, choose the files to save and click the Apply button. To
preview the files before saving, click the Preview: hyperlinks. Previewing does not
create any files in the system folder.

After generating the files, theyll appear in the table. Click any hyperlink to view the
content of a file.

To email the saved files, choose the files to save and check the
Send the saved files by email box. Enter the email address and click
Apply to send via email and save copies in the system folder.

10.5 Share Access Counts


The Status Access Counts menu page displays the number of times shares have been
accessed. The count is added whenever a connection to the share is established by
Windows, NFS, MacOS and NetWare clients.

There are several share types.

Normal Share indicates a share folder in any data volume.


Aggregation Share indicates a share or grouping of several volumes.
System Share indicates the MIRROR share that holds all CD/DVD volumes.
Disc Share indicates a share of a single CD/DVD volume.
Group Share indicates a share or grouping of several CD/DVD volumes.
Disc Folder Share indicates a share in a disc image folder.

- 90 -
- 91 -
Chapter 11 Virus Protection
Most storage systems are vulnerable to virus attacks. An infected file on your network
can be exchanged among clients systems and results in corrupted data or productivity
loss. The antivirus software integrated into the GroupStor offers the best-of-breed
security and provides reliable antivirus protection to prevent viruses from spreading.

The antivirus scanning software is an option on some GroupStor models. To active


this feature on the GroupStor, contact MDI Technical Support to get the license key.

11.1 Information

The Information screen displays a summary of the current antivirus settings. It


provides a comprehensive overview of the current status of antivirus general settings,
real-time scan history, and a scan task summary of the GroupStor. General settings
displays the present condition of the following:

Real-time Scan Displays real-time scanning is either


disabled or enabled
Virus Scan Schedule Displays scheduled virus scanning is
either disabled or enabled
Virus Scan Status Displays virus scanning is either idle
or scanning.
Pattern Update Schedule Displays the status and schedule for
the next virus pattern file update
Last Successful Update Displays the date/time of the last
successful virus pattern file update
Scan Engine Version Displays the current scan engine
version
Virus Pattern Version Displays the current virus pattern file
version
Quarantine Folder Displays the folder name and path
where virus infected files are located
and quarantined

- 92 -
The real-time scan history displays the date/time the virus was found, virus name,
action taken and full path name of the infected file. The scan task summary displays
the start time of each manual or scheduled scan task.

11.2 Real-time, Manual and Scheduled


Scanning

An embedded antivirus utility provides several options for virus protection including
real-time, manual and scheduled scanning to offer comprehensive antivirus and
content security solutions for enterprise customers.

Note:
Antivirus requires the system folder to operate. Go to
the Server Maintenance page and specify the
volume where the system folder resides.

Note:
For the first operation, go to the Virus Scan Update
page and obtain the most recent updated virus pattern
file. Otherwise the antivirus function cannot work.

Enable Real-time Scanning

The real-time scanning function provides antivirus protection while users are reading
or writing files to the GroupStor.

1. Click the Enable Real-time Scan box to enable real-time scanning.


2. Select scan direction. Incoming files are those being stored in the GroupStor and
outgoing files are copied or moved from the GroupStor to another location.
1. Click Apply to save the settings.

Configure Manual Scanning

The manual and scheduled scanning functions will scan any folders for infected files.
The scan results will be listed as a scan task summary on the Information page.

- 93 -
1. Go to the Virus Scan Setting page to configure the scan settings required.
See Configuring Scan Settings in the next section below.
2. Click the Manual tab to go to the manual scanning page.
3. Click the Select Folders hyperlink and specify the folder where the manual scan
is to be performed.
4. Click Apply to save the settings.

Configure Schedule Scanning

1. Click the Enable Scheduled Scan For Infected Files box to enable scheduled
scanning.
2. Click the Select Folders hyperlink to specify the folder where the scheduled scan
is to be performed.
3. Configure the start time and recurrence pattern for the scheduled scanning.
4. Click Apply to save the settings.

11.3 Configuring Scan Settings

All virus scans have two options that need to be configured.

File Type to Scan limits scanning to specific file types.


Action When Virus Found three actions quarantine, clean, delete
when a virus is found.

File Types to Scan

- 94 -
1. Click the desired scan file type.
2. If All file types is selected, all files regardless of the file extension will be
scanned.
3. If Files with Specified File Extensions Only is selected, specify using the
recommended extensions or manually scan file extensions.

Note: The maximum scanning layer of a


compressed file is set to 2 layers for all real-
time, manual and scheduled scans.

Actions When Virus Is Found

1. Click the desired action when a virus is found.


2. Click Apply to save the settings.

11.4 Updating The Virus Pattern File

Virus pattern updates can be performed either manually or according to a schedule.


The first time a manual update is required and must be performed immediately after
the antivirus function is activated.

Configure a Manual Update

1. Select Trend Micro Update Server on Internet to download virus patterns from
the Internet. Note: Specify the DNS server IP address on the Network TCP/IP
menu of the Administration Page.
2. Or manually download the virus pattern file in ZIP format from Trend Micros
website http://www.trendmicro.com. Select A virus pattern file in ZIP
format and specify the location of the virus pattern file.
3. Click Apply to save the settings.

- 95 -
Configure a Scheduled Update

1. Click the Enable Scheduled Update of Virus Pattern Files box to enable
a scheduled update.
2. Configure the download schedule. Select the start time and recurrence pattern for
the scheduled update.
3. Click Apply to save the settings.

- 96 -
Chapter 12 Activating Optional Features
Optional software features of the GroupStor are disabled by default. A license key
from an MDI Support Technician is required to activate these optional features before
use.

12.1 Activating Optional Features

To activate the optional features follow these steps below:

1. Open the Administration Page, select License from the Server menu.
The page is shown below:

2. Enter the license key in the input field. A license key is a string of 24 characters.
The characters can be any combination of numbers or English letters. Note:
License keys are case-sensitive.
3. Click Apply to save the settings.
4. The activation is successful if the License Type is Full.

- 97 -
Chapter 13 Warranty
The GroupStor comes with a 12-month warranty. Read the material
that follows for specific information about:

Your Product Warranty


Product Return Guidelines

Make sure you fill out your Product Registration Card, included in
your package, and then mail or FAX it back to Micro Design
Customer Support.

Call (407) 472-6000 for extended warranty information.

- 98 -
Attention!

WARRANTY REGISTRATION
PLEASE FILL OUT THE INFORMATION ON THE
PRODUCT REGISTRATION CARD INCLUDED IN THE
SHIPPING CONTAINER OF THE GROUPSTOR. THIS
INFORMATION MUST BE COMPLETED AND RETURNED
TO MDI TO ACTIVATE YOUR PRODUCT WARRANTY!

Please fill out the Product Registration Card completely.

You are encouraged to FAX the Registration to


MDI Customer Support at

(407) 472-6100
or
Mail to:
Micro Design International Inc
45 Skyline Drive, Suite 1017
Lake Mary, FL 32746
Attn: Customer Support
or
Register online:

http://www.mdi.com/Customer

- 99 -
Product Warranty
Micro Design International, Inc. warrants this product to be in good working order for a period
of 12-months from the date of purchase as a new product. Should this product fail to conform to
specifications at any time within that period, Micro Design International Inc. will, at its option,
repair or replace this product at no cost except as set forth in this warranty. Replacement parts or
products will be furnished on an exchange basis only. Replacement parts assume the remaining
warranty of the parts they replace. Replaced parts and/or products become the property of Micro
Design International Inc. No warranty is express or implied for products damaged by accident,
abuse, misuse, natural or personal disaster, or unauthorized modification.

Warranty registration must be completed and sent to Micro Design International Inc., via
FAX (407) 472-6100 or mailed to 45 Skyline Drive, Suite 1017, Lake Mary, FL 32746, for
warranty to be in effect.

Warranty service described herein may be obtained by sending this product information during
the warranty period to Micro Design International Inc., 45 Skyline Drive, Suite 1017, Lake
Mary, FL 32746. Product must be accompanied by proof of purchase date or have a warranty
registration form on file and a Return Merchandise Authorization Number. (This number is
to be obtained by calling Micro Design International Inc. at 407-472-6000.) If shipped by U.S.
Mail or any common carrier, the owner agrees to insure and accept all liability for loss or
damage to this product, to prepay all shipping charges, and to use a shipping container
equivalent to original packaging.

Warranty Limitations
The warranty stated above is the only warranty applicable to this product. All other warranties,
express or implied, (including all implied warranties of merchantability or fitness for a purpose),
are hereby disclaimed. If this product does not perform as warranted herein, owner's sole
remedy shall be repair or replacement as provided above. In no event will Micro Design
International Inc. be liable to any purchaser for damages, consequential damages arising from
purchase, use or inability to use this product, even if Micro Design International Inc. has been
advised of the possibility of such damages.

Micro Design International Inc.


45 Skyline Drive, Suite 1017
Lake Mary, FL 32746
Phone: (407) 472-6000
FAX: (407) 472-6100

- 100 -
Product Return Guidelines
Return Merchandise Authorization (RMA)
To obtain a Micro Design International RMA number, these guidelines must be followed:

Contact MDI at (407) 472-6000 (ask for Customer Support)


Provide your Name and Dealer/Distributor Name
Provide Product Model Number
Provide Product Serial Number
Provide Date of Purchase
Provide Reason For Return and Nature of Problem

Upon contacting MDI and providing the required information, an RMA number will be assigned
from a technical services specialist.

All products must be packaged for return shipment in the original MDI packaging or equivalent
protective shipping container. At your request, MDI will provide MDI packaging for shipment
at a small C.O.D. charge, excluding jukebox pallets.

All equipment must be insured and shipped PRE-PAID freight. Display RMA number
prominently on the outside of the shipping box. Upon receipt of the returned product(s), our
technical staff will evaluate the problem described. If the product is defective within the terms
of the MDI warranty, we will repair or replace the appliance at no charge, and then return the
product(s) to you pre-paid freight.

In the event that the product inspection and testing discloses that the returned product(s) is not
defective within the terms of the warranty, you will be assessed a minimum bench fee of
$125.00. This charge will be billed to you C.O.D. when MDI returns the product(s). If the
service charge or repair exceeds $125.00, you will be contacted first to authorize all repairs.

Send RMA Merchandise to:


Micro Design International Inc.
45 Skyline Drive, Suite 1017
Lake Mary, FL 32746
Please Retain These RMA Guidelines

For Future Reference

- 101 -
Appendix A Specification

Hardware Specification for the GroupStor NAS


Controller (All Models)
Dimension 41x148x287mm (H x W x D)
Input Power Standard ATX power connector
GroupStor 9300/9400:
3.3V: 3A
5V: 4A
12V: 0.5A
GroupStor 9500:
3.3V: 4A
5V: 4A
12V: 1A
GroupStor 9600
3.3V:8.8A
5V:20A
12V Max:21.2A
12Vpeak:28A
Operating Temperature 0 40o Celsius
Operating Humidity 10 80%, non-condensing
Regulatory Certifications FCC Class A, CE

LED Indicators
On Off Blink
Amber* 1000M no link 1000M
link activity
Green 100M link no link 100M
LAN 1 activity
Yellow 10M link no link 10M
activity
Amber* 1000M no link 1000M
link activity
Green 100M link no link 100M
LAN 2 activity
Yellow 10M link no link 10M
activity

- 102 -
Red IDE
HD Access activity
Green Power on
Power/Fault Yellow Fault

Jumpers and DIP Switch

JP1: (Reset to Default)

Pin Number Function


Pin 1 PWR
Pin 2 SetDefault#
Pin 3 GND

Short Pin 1/2 => normal operation


Short Pin 2/3 => reset system configuration to factory default

J3: (Power Switch & Reset Switch)

- 103 -
Pin Number Function
Pin 1 PowerSwitch#
Pin 2 GND
Pin 3 ResetSwitch#
Pin 4 GND

Pin 1/2: connected to the system power switch.


Pin 3/4: connected to the system reset switch.

S1: (Operation Mode)

DIP 1 DIP 2 Operation Mode


ON ON Clear Password
OFF ON Manufacturing Use
ON OFF Network Recovery
Mode
OFF OFF Normal

DIP 3
ON HDD Hot Swap
Module Not Installed
OFF HDD Hot Swap
Module Installed

LED Indicators for Hot-Swap HDD Module


Dimension 130x150x220mm (H x W x D)
Input Power Standard ATX power connector
Power ratings depend upon HDD.
Operating Temperature 0 40o Celsius
Operating Humidity 10 80%, non-condensing

- 104 -
LED 1 LED 2 Meaning
(Power/Fault) (HD Access)
Green Blinks Off (Master) Powering up
Red On (Slave)
Green On Red On during access HDD is being accessed

Green Blinks Red On RAID building, rebuilding, expanding


Fast or disk-scanning
Amber On Off HDD is ready for hot-unplug
Amber Blinks Off HDD carrier fan error. Blinking interval
Fast is about 0.5 seconds.
Amber Blinks Off Disk faulty. Blinking interval is about 2
Slowly seconds.
Green/Amber Off IDE cable connect error
Interleaves
Off Off No power
Hard disk absent
IDE cable not connected

Hardware Specification for the GroupStor 9300


Tower Models

Dimension 261x178x363mm (H x W x D)
Input Power 90 260V
Current Output for +5V 20A
Maximum Current Output 16A
for +12V
Peak Current Output for 28A
+12V
Output Wattage 370W

- 105 -
Hardware Specification for the GroupStor 9400
& 9500 Tower Models
Dimension 430x175x490mm (H x W x D)
Input Power 90 260V
Current Output for +5V 20A
Maximum Current Output 16A
for +12V
Peak Current Output for 28A
+12V
Output Wattage 370W

Hardware Specification for the GroupStor 9400


& 9500 Rack Models

Dimension 175x490x530mm (H x W x D)
Input Power 90 260V
Current Output for +5V 20A
Maximum Current Output 16A
for +12V
Peak Current Output for 28A
+12V
Output Wattage 370W

- 106 -
Appendix B Utility for the GroupStor System

NAStart is a powerful software that discovers and administers GroupStor Servers on


the network and remotely loads disc images into the GroupStor Server. It either
duplicates a whole CD or builds an image from a group of files. Sharing and
publishing data has never been so easy.

Use NAStart to display and modify the setting created. Also perform server settings
replication from a configured server to other GroupStor Servers on the network.
Server parameters of a GroupStor can be imported into other GroupStor Servers to
avoid the tedious task of setting up each individual unit on the network.

Features:

Server Management -
Discovers all GroupStor Servers on the network
Configures GroupStor Servers for first-time or quick setup
Export /Import GroupStor Servers system settings

Create CD Images Remotely -


Remotely loads CD images from a local CD-ROM drive into a GroupStor
Server
Collects and duplicate files into GroupStor Servers as a single CD image
Allows users to assign six different destination servers when building CD
images
Fully integrates the CD-R function of the GroupStor Server
Supports up to 16 different tasks

User Interface -
Explorer-like user interface with user friendly wizards
Task Manager monitors all on-going and scheduled tasks

- 107 -
Installation

System Requirements

IBM PC or compatible with 80486 processor or higher


At least 8MB of free memory (16MB is recommended)
Minimum 5MB of free hard disk space
VGA or higher resolution monitor
Microsoft Windows 95/98/98SE/ME, Windows NT/2000/XP

Installing TCP/IP Protocol for Microsoft Networks

NAStart communicates with GroupStor Servers through the TCP/IP protocol. Client
for Microsoft Networks and the TCP/IP protocol in Windows must be installed to
use NAStart.

Installing NAStart

The TCP/IP protocol must be installed on your computer prior to the NAStart utility.
To install NAStart, insert the Utility CD into the CD-ROM drive. On the auto-run
interface, click Install NAStart. If the auto-run interface does not appear, go to
X:\NAStart and run NAStart.exe; X is the drive letter of the CD-ROM drive.

Follow the instructions in the setup wizard to install NAStart. It will create shortcuts
on the Desktop and in the Programs folder of the Start menu.

Discovering the GroupStor System


Upon startup, NAStart automatically discovers all GroupStor systems on the network
and displays a list of servers under the node Local Server. NAStart will automatically
refresh the server list at a specified interval. The default interval is ten minutes.

NAStart can also locate GroupStor servers by IP addresses. Its useful when
GroupStor servers are on the Internet or located in different network segments from
NAStart. Select Remote NAS List from the File menu to locate P address, click the
Add button and enter the IP address of the GroupStor server.

- 108 -
To Set the Automatic Refresh Interval

1. Go to the Tool NAStart Options menu.


2. Enter a number between 1 to 60 minutes.
3. Click OK.

Server Quick Setup Using NAStart

To perform initial setup for the GroupStor system using NAStart:

1. Click the button on the toolbar.


2. Or, go to Server -> Server Quick Setup.
3. Select a GroupStor Server from the server list and click the Next button.
4. Choose the Network Teaming Mode from the pull down menu. Continue with
the default value or refer to Chapter 4.2 TCP/IP Settings if you are not familiar
with this feature.
5. To automatically assign IP settings, click Obtain IP settings automatically.
6. Or, manually specify the IP settings.
7. Click the Next button to go to the next page.
8. Enter the Server Name, Server Comment, and Workgroup/Domain Name and
select either the Workgroup mode or Domain mode. Note: The server name as
it appears on the network is not relevant to the network protocol used.
9. Click the Next button to go to the next page.
10. Change the admin password if necessary.

Click the OK button to save the settings. Note: The server may need to be rebooted
for certain parameter changes to take effect.

Importing & Exporting System Settings

This section describes how to export the system settings of the GroupStor into a file.
This file can be read into another GroupStor on the network using the import feature.
Import System Settings and Export System Settings form a combined process that
replicates system settings from one configured GroupStor to another GroupStor.

- 109 -
To Export System Settings of the GroupStor

1. Highlight the server from the server list.


2. Right click the server and select Export System Settings.
3. Or, go to Server -> Export System Settings menu.
4. A prompt asks for the administrator password before proceeding.
5. Select a location to save and specify the name of the export file.
6. Click Save.

To Import System Settings Into Multiple GroupStors

1. Right click any GroupStor Server and select Import System Settings.
2. Or, go to the Server -> Import System Settings menu.
3. A prompt asks for the administrator password before proceeding.
4. There are two options select a server or an export file as the source.
5. Click Next.
6. Select the type of system settings to import into the target servers. Details of
system settings are displayed in the preview text box beside each section.
7. Click OK. The GroupStor will automatically reboot.

Browsing & Administering Servers

Browsing Servers

The main window of NAStart is shown below. Upon execution, NAStart brings up
Windows Explorer and files can be dragged and dropped into My Container for use
later in image building. To disable this option, choose the Tool->NAStart Options
and un-check the option - "Open Windows Explorer when NAStart starts".

- 110 -
The main window consists of a file menu, tool bar, tree view pane on the left, list view
pane on the right, and status bar at the bottom.

The tree view pane lists all the GroupStor Servers found by NAStart on the network.
It is also included in My Computer the one in Windows Explorer. My Container
keeps information about the files/folders that can be built as a CD image on a
GroupStor Server using the "Build Image" function. Click on any item in the tree view
pane and its content are displayed in the list view pane.

The status bar indicates NAStart status and information. The left side of the status bar
shows function hints or item properties. The right side displays the PC date and time.

Mouse over each GroupStor and see the Domain Name and IP Addresses.

Note: A GroupStor Server is protected by the admin password. Enter the password
to set up or write to the server.

Icons and their definitions are shown below:

NAS Network: Displays all GroupStor Servers found on the LAN.

- 111 -
NAS Server: Represents a GroupStor Server

Disc Image Folder: Contains disc images of the GroupStor Server.


Double click to view the content.

Disc Image: Represents a mirrored CD/DVD image.

Some examples of browsing servers are shown below:

Example 1. Content of a disc image folder

Displays all the disc images, path name, size, status and file system.

Tool Bar Functions

The tool-bar provides easy access to the main functions of NAStart. An explanation
each tool-bar icon and their representations is shown below:

- 112 -
Refresh: Manually updates the directory content of My Computer or GroupStor
Network.

Up Directory: Moves the cursor up one level.

Tree View Mode: Expands or shrinks the directory tree in the tree view pane (to
the left).

List View Mode: Changes the view mode of items in the list view pane (to the
right).

Save Container: Saves data of My Container into a container file.

Load Container: Loads a container file into My Container.

Mirror CD: Starts the "Mirror CD" wizard and duplicates CD images into the
GroupStor Server.

Build Image: Starts the "Build Image" wizard and builds a CD image from My
Container into a GroupStor Server.

Server Quick Setup: Configures some fundamental parameters of a selected


GroupStor Server and configures an un-initialized or initialized server.

Wizard: Brings up a wizard and provides access to such major functions as:
"Mirror CD", "Build Image" and "Server Quick Setup".

- 113 -
Task Manager: Opens a task manager window, displays and controls all
ongoing and scheduled tasks.

Help: Opens the Help window and displays help information.

Mirroring CD/DVD Remotely

To copy a CD from a PCs CD-ROM drive onto a GroupStor Server follow these
steps:

1. To mirror a CD or a DVD remotely into a GroupStor Server, click the


"Mirror CD" icon on the tool-bar. It invokes the "Mirror CD" wizard as shown
below. Select a PCs CD-ROM drive as the source. Press Next to continue.

2. Choose one or more servers as the destination. Choose a server in the Target &
File Path list, select Smart mode to check the redundancy of the CD image or
select Force mode to make a second copy of the same CD image. Click the >>
button. The task will be added to the right-hand pane. Click the Next button to
go to next page.

- 114 -
3. Change the volume label of the CD/DVD image if necessary. To change the
volume label, click the 2. User Define button and enter the volume label in the
box. Click the Update button and the Next button afterwards.

4. Specify the date/time to run the task and press Next.

- 115 -
5. Set Mirror CD options if necessary.

Click OK to start the task. Task Manager shows the progress.

- 116 -
Archiving Files As a CD/DVD Image

To build a CD image from My Container into a GroupStor Server follow these steps:

1. Collect the files to build a CD/DVD image by opening Windows Explorer and
drag and drop the files into My Container.

2. Click the "Build Image" icon on the tool-bar and bring up the "Build
Image" wizard. Click the Validate button to check if the file/folder information
in My Container is correct. If not, choose to update My Container.

- 117 -
3. Choose one or more servers as the destination. Select a server in the Target &
File Path box, select Smart mode to check the redundancy of the CD image or
select Force mode for a second copy of the same CD image. Click the >>
button. View the task being added in the right-hand pane. Click the Next button
to go to next page.

4. Name the CD/DVD image being created. Enter the name in the Volume label
box and click the Update button. Press Next afterwards.

- 118 -
5. Specify the date/time to run the task. Then press OK.

Task Manager shows the progress.

- 119 -
Burning Disc Images
If the GroupStor server is equipped with a CD or DVD writer it will burn any existing
disc image. Select the GroupStor server from the NAS Servers tree view pane of the
NAStart main window. Select a disc image in the GroupStor server and right-click on
it. Select Record CD/DVD from the right-click menu.

Specify the parameters in the wizard and click the Add CD-R Option button. Click
Next to continue. On the next page, specify the launch schedule and click OK.

Supported CD Formats
The "Mirror CD" function copies CD or DVD discs from a PCs CD/DVD drive into a
GroupStor Server. A list of CD formats that can be mirrored remotely is shown below:

ISO 9660 Level 1, 2, 3 (Includes Romeo, Joliet and Rock-Ridge Extension)


CD HFS
CD/DVD UDF
High Sierra
Hybrid (ISO+HFS)
Multi-session CD
Mixed Mode CD
UDF V1.5, V2.0

- 120 -

You might also like