Professional Documents
Culture Documents
High Performance
User Guide
Copyright
_______________________________________________________________
Trademarks
GroupStor is a trademark of Micro Design International, Inc. (MDI). Micro Design
International is a trademark of MDI.
All other company and product names are trademarks of their respective owners.
Disclaimer
MDI makes no representations or warranties with respect to the contents of this publication and
specifically disclaims any implied warranties, merchantability, or fitness for any particular
purpose.
Chapter 1 Introduction........................................................1
1.1 Features ............................................................................................... 1
1.2 Conventions.......................................................................................... 1
Terminology............................................................................................ 1
Typographic Conventions ....................................................................... 1
Chapter 2 Installing and Starting the GroupStor ..............3
2.1 Installing the GroupStor 9000 Series .................................................... 3
Sliding Rail Installation (All Rack Models) ............................................... 3
2.2 Setting the IP Addresses ...................................................................... 7
LCD Console Flow Chart ........................................................................ 7
Configuring the IP Addresses Using the LCD Console............................ 8
Configuring the IP Addresses Using NAStart .......................................... 9
2.3 Accessing the Administration Home Page .......................................... 10
1.1 Features
1.2 Conventions
Terminology
The term GroupStor means all the models of the network-attached storage servers
unless the specific model is mentioned.
Typographic Conventions
Conventions Meaning
Italic Variable name which should be replaced
by user-defined text in context
Bold Menu item
Monospaced font Text which users should type in
Underline Cross-reference
-1-
Chapter 2 Installing and Starting the
GroupStor
This chapter covers the installation procedure for the GroupStor. Instructions on how
to startup the GroupStor by setting up the basic configuration through the Admin
Home page or NAStart, the start-up software wizard, are outlined in this chapter.
All GroupStor models come pre-installed as ordered with all disk, CD/DVD, tape or
other options included prior to shipment.
1. Connect the GroupStor to the network by attaching a LAN cable from the LAN
port located at the back of the GroupStor. (At least one network connection is
required.)
2. Plug the power cord into the power connector on the GroupStor.
3. Make sure the power switch on the power supply is in the ON position.
4. Press the power button in the upper right hand corner of the GroupStor.
5. Wait for the server to boot up. The boot up process takes approximately 2 minutes.
1. Make sure you have the following mounting parts for the sliding rails.
-3-
2. Take the sliding rail apart by sliding out the center slide. Push down the hook
to separate. Pull the center slide out all the way until it reaches the end.
3. Install the center slide to the rack-mount chassis. The screw holes on both
sides of the rack-mount chassis are used for mounting the center slide. Fasten
the eight screws to attach the center slides onto the chassis. The center slides
will be used later to attach the sliding rail.
-4-
4. Next, attach the two L-shaped mounting brackets onto the sliding rail. Use the
M4 screws to secure the L-shaped bracket onto the sliding rail.
5. Attach the sliding rail onto a rack-mount cabinet. Secure the sliding rail onto
the rack-mount cabinet via the screw holes on the L-shaped brackets.
6. After properly attaching both sliding rails to the rack-mount cabinet, slide the
rack-mount chassis (mounting) into the cabinet.
-5-
-6-
2.2 Setting the IP Addresses
L C D m en u co n so le flo w ch art
S ystem R ead y
No
E n ter Y es
L A N 1 m ask : L A N 1 g atew ay : L A N 1 IP : C o n fig u re L A N 1? C o n fig u re L A N 1
255.255.0.0 192.168.1.254 192.168.1.1 Y es / N o IP /G atew ay/M ask
No
E n ter Y es
L A N 2 m ask : L A N 2 g atew ay : L A N 2 IP : C o n fig u re L A N 2? C o n fig u re L A N 2
255.255.0.0 192.168.2.254 192.168.2.1 Y es / N o IP /G atew ay/M ask
No
S erver N am e:
N A S D 8040000
D ata/T im e:
8/21/2002 05:30
O n ly d isp lay w h en
G ig ab it E th ern et
A d ap ter is in stalled
S ystem w ill
F irm ew are V er.: au to m atically d isp lay
V 1.00 th e n ext screen every
tw o seco n d s w h en id le
C P U F an S p eed :
3994 R P M
T h erm al (o C )
67 40
V o ltag e (V )
1.44 3.30 4.68
-7-
Configuring the IP Addresses Using the LCD Console
1. After the GroupStor is booted, the LCD console shows System Ready. Press the
right button.
System Ready
2. The IP address of LAN1 is shown. Press the middle button to configure LAN1 IP
address. Note that the symbol in the right hand upper corner indicates that the
IP address can be configured using the LCD console.
LAN1 IP:
192.168.170.171
3. Move the cursor to Yes by pressing the left button and then press the middle
button to confirm.
Configure LAN 1?
Yes/No
-8-
4. Move the cursor to the correct position using the left or right button. Then press
the middle button to change that number.
LAN1 IP:
192.168.170.171
5. After editing the last digit of the IP address, press the right button and configure
the Subnet Mask address.
6. Repeat 4 and 5 to configure the Subnet Mask and Gateway address.
7. After editing the last digit of the Gateway address, press the right button. Move
the cursor to Save and save the setting or Edit to repeat the above process or
Abort to quit the configuration process without saving.
The NAStart utility will perform the initial setup of your new GroupStor system. The
utility is designed to perform a quick set up and puts the GroupStor online in just a
few minutes. During startup, NAStart discovers all the GroupStor systems on the
network. The default server name is NASxxxxxxxx and xxxxxxxx is the last eight
digits of the Ethernet address of the LAN1.
-9-
2. Click the button on the toolbar.
3. Or, right click the server and select Configure
4. Enter the Server Name, Server Comment, and Workgroup/Domain Name.
Select either Workgroup mode or Domain mode.
5. Click Next to go to the next page.
6. Choose the Network Teaming Mode from the pull down menu. If you are
uncertain about this feature, continue with the default value.
7. To automatically assign IP settings, click Obtain IP settings automatically.
8. Or, specify IP settings manually.
9. Click Next to go to the next page.
10. Change the admin password if necessary.
11. Click Finish to save the settings. Note: The server may need to reboot for
certain parameters changes to take effect.
Configure the detail settings of the GroupStor in the administration home page. To
access the administration home page, type the URL name of the GroupStor in the
address field of the web browser:
http://192.168.1.1 /admin/
- 10 -
Note: It is recommended that the user change the admin password
immediately to keep the GroupStor secure and protect resources from
inappropriate access by other users on the network.
- 11 -
- 12 -
Chapter 3 Server Configuration
This chapter describes how to name the server, specify the server date and time,
upgrade the OS firmware, shut down the system and use UPS with the GroupStor.
Click Server from the administration home page. You will see the Information page
describing the summary information of the GroupStor.
The Information page is divided into two sections. The General Settings section
shows the parameters that can be modified on the Server General page.
- 13 -
Chinese
Mac Roman: Latin characters for
Macintosh
Configure From LCD Indicates if users can configure the server
from the LCD console
System LCD Banner Indicates the banner text displayed on the
LCD console when it receives no user
input or event messages for a period of
time
UPS Support Indicates if the UPS support is enabled or
not
Auto Power When enabled, the server will power on
Restoration automatically when the power restores
after abnormal shutdown
System folder resides in Displays the volume name where the
system folder is located
The System Information section shows the hardware and firmware status of the
server.
- 14 -
3.2 Upgrading the Firmware
Updating OS firmware accommodates new functions or bug fixes. Once new releases
of an OS firmware image are obtained, upgrade the OS firmware using the web
browser. The process is simple and fast.
When you have the image file of the new OS firmware, open the Administration
Homepage of the GroupStor and select the Server Upgrade menu. Specify the full
path of the image file or click the Browse button to find it. Click Apply to begin.
The process takes several minutes. The server will reboot after the firmware is
upgraded.
Pressing the power button on the front of the server case will shut down the
GroupStor. The whole shutdown process takes seconds to minutes until the data is
safely saved to the hard disks.
To shut down the server from the Administration Homepage, select Shutdown from
the Server menu and click the Reboot or Shutdown button.
You can specify the actions taken during the next startup.
- 15 -
Scheduled Shutdown and Power-on
On the schedule settings page, set daily or day of month schedules. Check the Enable
boxes and specify the time of power on or shut down. Click the Apply button to
submit the changes.
The GroupStor 9000 Series supports UPS and basic power management functions. It
sends alerts when there are power events like utility power failure or low battery
capacity. When power events occur, the GroupStor will shut down automatically to
prevent potential data loss.
To use smart-signaling UPS, connect the UPS and the GroupStor with a RS-232 cable.
Go to the Server -> UPS Settings menu on the administration page to enable UPS
Support.
To use network-type UPS, connect the UPS to the LAN first. Then go to the Server -
> UPS Settings page on the administration page. To enable UPS Support, select
Network UPS from the UPS Type menu and enter the UP IP address.
- 16 -
3.5 Modifying the Administrators Password
Admin is a built-in user account for the administrator. It is similar to the root account
in UNIX or the administrator account in Windows 2000 or XP. Users have access to
the administration homepage and all the storage resources using this account. The
default password for this user account is empty. It is strongly recommended that a
password be assigned during the initial setup of the GroupStor for security purposes.
- 17 -
- 18 -
Chapter 4 Network Configuration
This chapter details concepts and procedures for configuring the GroupStor and
establishing the system that communicates with other OS platforms. Management
protocol and email notification settings are also covered in this chapter.
The Network Information screen provides a summary of the current network settings
of the GroupStor. It provides the administrator with a quick overview of the basic
network settings of the GroupStor.
The Information page is divided into two sections. The Network Protocols section
displays the current network protocol settings of the server.
The TCP/IP Suite Settings section shows the various TCP/IP settings of the server.
- 19 -
WINS Server IP Address Windows Internet Naming Service (WINS)
manages the association of network resource
names and their IP addresses without user or
administrator intervention with configuration
changes.
DNS Server IP Address IP address of the Domain Name System
(DNS) server which locates the domain name
and translates into IP addresses.
DNS Suffix Displays the DNS suffix.
NTP Time Server IP Address The IP address of the NTP (Network Time
Protocol) server used to synchronize system
time automatically over the net. The system
time is synchronized with the NTP server
every 24 hours.
SMTP Server Address IP address or server name of the SMTP
(Simple Mail Transfer Protocol) server used
to send and receive e-mail.
HTTP Proxy Server IP Address IP address of the HTTP proxy server. The
port number is next to the IP address.
TCP/IP handles the network communication between network nodes that are
connected to the network. It is important to set up the correct TCP/IP settings for the
GroupStor to function properly.
The GroupStor 9300, 9400 and 9600 models provide two (2) on-board 10/100/1000
Ethernet ports (LAN1 & LAN2) and one (1) Gigabit Port (LAN3). The GroupStor
9350 and 9500 models provide two (2) on-board 10/100/1000 Ethernet ports (LAN1
& LAN2). Configure the Ethernet ports using the following operating modes:
Stand Alone: LAN1 and LAN2 are configured with a unique IP address; they are
independent of each other. LAN3 (Gigabit) can only be configured in stand-alone
mode.
Fault Tolerance: Uses LAN2 when LAN1 has failed to connect to the network and is
designed to ensure server availability to the network.
- 20 -
Load Balancing: Provides increased network bandwidth allowing transmission to
multiple destination addresses using both LAN1 and LAN2. When the traffic of one
of the LAN ports is congested, requests are forwarded to the other LAN port until the
traffic of both LAN ports is balanced. Note: Only the LAN1 Ethernet port receives
incoming traffic. Load Balancing incorporates Fault Tolerance protection.
Link Aggregation: Combines both LAN1 and LAN2 into a single channel and uses a
single MAC address to provide greater bandwidth. It must be used with a network
switch having the Link Aggregation or Trunking function.
The GroupStor also supports Wake-On-LAN (available for LAN1 only). Wake-On-
LAN allows the administrator to remotely power on the GroupStor to perform
maintenance tasks on the server without physically going to the server.
The GroupStor 9350, 9500 and 9600 models reduce network overhead and increase
network throughput with Jumbo Frame Support. To support jumbo frame with
Gigabit Ethernet use 9000 byte packet sizes instead of the standard 1500 byte Ethernet
size. Enable jumbo frame support on the Gigabit switches and client PCs so they can
communicate.
To disable a LAN port, enter 0.0.0.0 in the IP address field. Use the LCD panel to
change the IP address to non-zero values if all LAN ports have been disabled and
cannot be accessed from the administration page.
- 21 -
4.3 Windows Settings
The GroupStor uses the SMB/CIFS (Server Message Block/Common Internet File
System) protocol. This protocol is used by Microsoft to share files, directories and
devices with Windows clients.
Domain Mode: The GroupStor becomes a member of the domain and communicates
with clients using the user database stored on the authentication server, which must be
present on the network.
Another option is to register the GroupStor on the domain. Once registered, the
GroupStor is created as a machine account on the domain controller. It uses Netlogon
as the authentication mechanism and provides a better integration into a Windows
network environment.
1. Click the Enable Windows Network (SMB/CIFS Protocol) box to enable access
for SMB clients.
2. Enter the Workgroup/Domain name.
3. Click the Workgroup Mode button to configure the GroupStor in Workgroup
Mode.
4. Or, click the Domain Mode button to configure the GroupStor in Domain Mode.
5. Select the option to support Unicode.
6. When the disconnect idle connection option is enabled server connections that
have been idle for five minutes are automatically disconnected.
7. Click Apply to save the setting.
- 22 -
4.4 UNIX/Linux Settings
The GroupStor will export shares to UNIX/Linux clients via the NFS protocol.
UNIX/Linux clients can then mount shares and access the content of those shares.
By default, the GroupStor maps all non-NFS users, including local users and domain
users, to the same UID/GID as described on this page. To assign different UIDs/GIDs
for different users, the administrator clicks on the Modify button to modify user
mapping of UIDs/GIDs.
GID: Group ID is a part of POSIX permissions that determines groups of users. NFS
files have a GID assigned to them.
Permission: Three numbers are used for setting the file permission. Each of the three
numbers corresponds to the type of users- Owner, Members of a group and Everyone
Else.
- 23 -
Example: If the permission of a file is set to 777, the owner, the group and other users
have read, write and execute permissions for this file.
1. Click the Enable UNIX/Linux Network (NFS Protocol) box to enable access for
NFS clients.
2. Enter the default permission for files created with a non-NFS protocol. (Default
setting = 755)
3. Click Apply to save the settings.
4. Click the Modify icon and enter the default UID and GID. (Default setting = 0)
5. Choose to map all users to the default UID/GID or assign UID/GID manually for
each user.
6. Click the Set Default link to set the UID/GID for all users to the default UID/GID.
Note: The Value -1 represents a UID/GID equal to the UID/GID configured
above.
7. Click Apply to save the settings.
If NIS support is enabled, the GroupStor can auto-map NIS users with local/domain
users. It matches user names and assigns the UID/GID of the matched NIS users to
local/domain users. The user auto-mapping function is enhanced and provides tighter
integration between NFS clients and other network operating systems.
- 24 -
5. Then click the Auto-map with NIS users link to map with the users on the
configured NIS server.
6. Click Apply to save the settings.
The GroupStor has two kinds of protocol support for Mac OS clients AppleTalk
and TCP/IP (Open Transport). The GroupStor also provides two kinds of security
polices for Macintosh Network AFP client.
AppleTalk Address: A unique number that identifies the server on the network. The
number to the left of the dot is the network number. The number to the right of the dot
is the node number.
1. Click the Enable Macintosh Network (AFP Protocol) box to enable access for
the AFP client.
2. Select a protocol and click the button beside it.
3. Click the Local Account Authentication button to authenticate users with the
servers local user database.
4. Or click the Local and Domain Account Authentication button to use both local
account and Microsoft domain security authentication.
5. Select the Current Zone from the pull down menu or Default Zone to assign by
default.
6. Click Apply to save the setting.
- 25 -
4.6 NetWare Network Settings
The GroupStor 9000 Series operates in a manner similar to Novells NetWare 3.12
file server. The GroupStor can be set up and shared among Novell NetWare clients. A
share is mapped to the GroupStor using NetWare clients. Enable access to shares for
specific local users or local groups from the Administration Homepage.
Server Name: The default NetWare server name is the server name followed by an
underscore and "NW".
Frame: Frame types determine how packets of network data are formatted on
different LANs. The default setting is AUTO on the GroupStor.
1. Click the Enable NetWare Network (NCP Protocol) box to enable access for
NetWare clients.
2. The NetWare server name is the original server name followed by _NW. For
example, if the server name of the GroupStor is ABC then the NetWare server
name will be ABC_NW.
3. Click Apply to save the setting.
This section shows the parameters for setting up user access to the GroupStor users
home page. Configure the user access constraint, authentication policy and default
settings by defining the Access Control, Security Policy and Default User Page
settings.
- 26 -
Configuring Web Data Access
1. Click the Enable Web Data Access (HTTP Protocol) box to enable Web data
access.
2. Choose Allow file download only or Allow file upload and download.
3. Click the Local account authentication button to confirm the user with the
servers local user database.
4. Or, click the Local and domain account authentication button to use both local
account and Microsoft domain security authentication.
5. Select the default type of the folder display on the user page. Choose Detail View,
Large Icons or Small Icons.
6. Click the box beside the Allow users to modify ACL to give users modify ACL
table entries privileges.
7. Click Apply to save the settings.
The GroupStor supports File Transfer Protocol (FTP) and allows users to transfer files
via the Internet. Properly configuring the FTP settings effectively controls how users
access the content on the GroupStor via FTP.
1. Click the Enable FTP Data Access box to enable FTP data access.
2. Select Access Control type. Click the Allow file download only or Allow file
upload and download button.
3. Select the appropriate Security Policy. Check the Allow anonymous login and
map to box and choose a local user from the pull down menu. An anonymous
login user now has the same security privileges as a selected local user.
4. Or, click Allow individual user login. Select Local account authentication to
authenticate a user with the local user database or click the Local and domain
account authentication button to use both local account and Microsoft domain
security authentication.
5. Select the User Limit. Click the Unlimited button or specify the maximum
number of users allowed to access the content on the GroupStor via FTP.
6. Specify the Home Directory for users who connect to the GroupStor via FTP.
Note: Be sure to select a volume to create a FTP home directory.
7. Specify the permission for the home directory by clicking Set icon.
8. Click Apply to save the setting.
- 27 -
4.9 SNMP Settings
Trap: A trap is a voluntary message sent out from a SNMP agent (the GroupStor)
when an event occurs.
Contact: Provides the contact name of the person who has the management
information of the SNMP agent.
- 28 -
7. Enter the location information for each GroupStor.
8. Enter the name of the contact person who has management information on each
GroupStor.
9. Check the box beside Send a test trap to send a sample trap message to validate
SNMP settings.
10. Click Apply to save the setting.
The GroupStor can be configured for email notification when events occur. The
network SMTP server information must be entered in this menu. The type of event
triggered in the email notification process is configured in the
Event Configuration Advance menu.
The GroupStor enables secure web access with SSL 3.0 support, both from the user
homepage and the administration homepage. To use SSL 3.0, the GroupStor generates
a server certificate for authentication and data encryption. The default for the server
certificate is issued with the IP address of the GroupStor designated. The server's full
name can also be specified on the server certificate. The server's full name is the
server name appended with its DNS suffix, such as nas.company.com. Refer to the
TCP/IP settings for the DNS suffix.
- 29 -
Clients must install the CA certificate first to access server web pages with a secure
connection. For example, if the server's IP address is 192.168.1.10, open
http://192.168.1.10/admin/CA for the certificate. Choose install the certificate when
the dialog-box pops up. Once the CA certificate is installed, the client can access the
web pages of all GroupStors with the SSL connection.
To access the GroupStor's web pages with the SSL connection if the server IP address
is 192.168.1.10, open https://192.168.1.10/ from the user homepage, or
https://192.168.1.10/admin/ from the administration homepage. If the server
certificate with the server name is selected, open https://[server_name] instead.
- 30 -
Chapter 5 Storage Management
This chapter describes how to create a single-disk volume or a RAID volume. It also
outlines the steps for deleting a volume, expanding a RAID-5 volume and assigning
hot-spare disks. After a volume is created, refer to the next chapter for more
information about sharing data and assigning permissions.
Volume View
List of Volumes
Displays all the volumes in the GroupStor. Volume Name shows the volume name
that is defined when creating a volume. Each volume name is also a hyperlink. It
opens a page showing detailed information of that volume. Members indicate the
hard disks that comprise a volume. RAID Type indicates whether this volume is
JBOD (a single hard disk), RAID 0, RAID 1 or RAID 5. Refer to the next section for
more information about RAID.
Free Space indicates the volume usage showing the free storage space in the volume
and the percentage. Total Space indicates the volume size.
Status indicates the disk activity on the volume. Disk activity may be one of the
following:
- 31 -
Data backup and RAID rebuilding are
strongly recommended when a volume is
in this state.
Faulty Two or more hard disks in the volume are
not functional.
It is not possible to perform any data
access or recover any data.
Faulty (RW) Two or more volume members are
defective.
There might be data loss, but it is possible
to recover some data. Copy data to a safe
place immediately when a volume is in
this state.
Inaccessible Two or more volume members are
missing. The volume is not mounted and
data cannot be accessed.
Apply (Ready) The volume settings on the server and
Apply (Degraded) those on the hard disks are not the same.
Apply (Faulty RW)
Apply (Rebuild) The server reads and applies volume
Apply (Expand) settings from the hard disks.
After the volume settings are restored, it
will return to the last known state, which
is specified in parentheses.
Checking Checking the file-system.
Mounting Mounting the volume for data access.
Create (xx%) Creating a volume. The progress is shown
in a percentage.
Rebuild (xx%) Rebuilding a RAID. The progress is
shown in a percentage.
Expand (xx%) Expanding a RAID. The progress is shown
in a percentage.
Scan (xx%) Scanning hard disks for bad sectors. The
progress is shown in a percentage.
Hot-Spare Disks
- 32 -
Free disks
Identifies hard disks that are not assigned and is used to create volumes or assign hot-
spare disks.
To change the name of a volume, click on the Volume Name hyperlink in the List of
Volumes table. Another page that displays detailed volume information appears. The
volume name can be modified on this page.
Device View
The list with all the storage devices connected to the GroupStor, including hard disks,
CD/DVD-ROM, CD/DVD writers and tape drives.
In Volume shows to which volume the hard disk belongs. Location indicates the IDE
channel and master/slave position of the hard disk. Model Name shows the model or
the manufacturer of the hard disk. Capacity shows the unformatted capacity of the
hard disk. Status indicates the disk status or disk activity one of the following.
Backup/Archiving Devices
Devices are either CD/DVD-ROM drives, CD/DVD writers or tape drives. Type
indicates what kind of device it is. Mode indicates the data transfer mode of the
storage device interface.
- 33 -
Data Transfer Modes
First, create a volume on the hard disks to provide shared storage for user access and
set security controls.
To create a volume, go to the Volume Create page. Specify the volume name in the
Volume Name field and choose the volume type (JBOD, RAID 0, 1, or 5). Choose
the hard disks to be included in the volume. Click Apply to submit changes. The
status of volume creation is shown on the Volume Information page.
- 34 -
highly reliable, but doubles storage cost.
RAID level 1 uses two hard disks.
RAID 5 RAID level 5 distributes data and parity
bits over multiple disks for both
performance and fault tolerance. A RAID
volume can still work when a hard disk
fails.
RAID level 5 uses three or more hard
disks. Building a RAID-5 volume may
take hours depending upon capacity.
To delete a volume, go to the Volume Delete page. Select the volume to be deleted
and click the Delete button. Be very careful all data in the volume will be destroyed
and the RAID configuration will also be erased. All hard disk members in this volume
are free disks after the deletion.
To expand a RAID-5 volume, go to the Volume Expand page. Select the RAID-5
volume to be expanded. Choose the free disks as new members. Click Apply to
submit changes. The progress of RAID expansion is shown on the
Volume Information page.
- 35 -
5.5 Volume/Disk Scan
Volume/Disk scan is especially helpful for disk diagnostics. It repairs lost or cross-
linked clusters in Volume/Disk. All readable data is placed in new clusters and
defective clusters are marked as bad in the file system. All newly added devices are
scanned before usage to ensure their data integrity on the GroupStor.
Select the volumes or disks to be scanned, click the Scan Now button to start scanning.
Or, click Schedule to set the time for GroupStor to perform scanning at a scheduled
time. Be advised that this could take several hours to run and will disable all access to
the volume until the scan is complete.
Disk Auto-Scanning
Click the Configure hyperlink on the Volume Scan page to enable this feature. Set
the Disk Auto-Scanning to Enabled.
Please be advised that this could take several hours to run and will disable all access
to the volume until the scan is complete
Hot-spare disks are global and not bound to any specific RAID volume. Whenever a
RAID volume goes into a degraded mode (due to a failed hard disk) a hot-spare disk
is immediately assigned to recover the RAID volume.
Go to the Volume Create page to assign hot-spare disks. Specify the volume type
as Hot Spare. To assign free disks as hot-spares use the dual window panes. Click
Apply to submit changes.
To remove disks from the hot-spare list, go to the Volume Delete page. Select the
hot-spares to be deleted in the Remove Hot-Spare Disks table and click Delete.
- 36 -
5.7 Migrating Data Volumes
Migrating data volumes is the duplication of a volume block by block. Its helpful to
administrators when migrating or duplicating data between volumes of different
RAID types or capacities. During data migration, both the source volume and the
target volume are unmounted not available for client access.
To migrate data, select a source volume and target volume to migrate data to. Choose
Data migration and click Apply. The target volume inherits all of the security and
quota settings of the source volume. Clients observe no difference before or after the
migration.
To duplicate a volume, select a source volume and target volume. Select Data
duplication and click Apply. The target volume stays on-line after data duplication.
5.8 Hot-Swapping
Hard disk failure, degraded RAID or general maintenance requires hard disks to be
changed. The GroupStor supports HDD hot swapping. Instructions for replacing hard
disks using the HDD module are shown below:
1. Identify which hard disk failed. The amber LED on the HDD tray will blink and
indicates hard disk failure.
2. Press the red button on the HDD tray to turn off the failed HDD.
- 37 -
3. When the amber LED stays on, unplug the HDD tray and replace the HDD with a
good one.
4. Plug in the HDD tray. Wait until the Green LED stays on.
When a RAID volume is degraded and there is no hot-spare disk available to rebuild,
the RAID volume will stay in a degraded state. Hot-unplug the failed hard disk and
plug a new drive into the same HDD tray. The RAID volume will automatically
rebuild using the new hard disk.
- 38 -
For the 1U Rack Mount Model:
Power switch
1. Identify which hard disk failed. The amber LED2 blinks indicating hard disk
failure.
2. Turn off the failed HDD by inserting the end of a large straightened paper clip
into the hot swap switch hole on the front bezel.
3. When the amber LED is steady on, the failed HDD is ready to be unplugged.
Unplug the HDD tray and replace the HDD with a good one.
4. Plug in the HDD tray and wait until the Green LED is steady on.
- 39 -
- 40 -
Chapter 6 Security Control
This chapter covers setting up the security control of files, folders and shares stored on
the GroupStor. Managing Access Control List (ACL) file level security, file
ownership and user quota are also covered in this chapter.
1. Create, edit and delete user accounts in the local user database.
2. Create shares.
3. Configure files, folders and shares permission.
4. Configure local account, domain account and UNIX/Linux host permission.
5. Maintain the ACL table.
6. Configure the local user and domain user quota limit.
The Security Information screen displays the status of the current security settings of
the GroupStor. It provides the administrator with a summary of the security database
and the status of the operation mode.
The Information page is divided into two sections The Security Database section
displays the number of shares, ACL nodes, and users/groups.
- 41 -
Local User/Group The total number of local users/groups. A
local user or group account can be granted
permission and rights from the GroupStor.
Domain User/Group Total number of domain users/groups. The
network administrator manages domain users
or groups.
Trust Domain User/Group Total number of trust domain users/groups.
Host Entry Total number of Unix/Linux hosts entered.
The Security Configuration section shows the current security configuration settings
for the server.
A local user or group is an account that can be granted permissions and rights to the
GroupStor. Local users can be added to groups. Groups are indicated by an * sign at
the suffix of the name. Administrator privileges can also be granted to a local group.
Groups with administrator privileges are indicated by a # sign at the suffix of the
name.
- 42 -
3. Type in the user name and enter the password.
4. Re-type the password to confirm.
5. Click Apply to save the setting.
- 43 -
6. Select a user from the left hand window and click the >> button to add this
user to the group.
7. Click Apply to save the setting.
# username, password, group, user quota, user folder, folder quota, create default ACL
user001, aalaa1, groupA 1GB,/vol-1/users/user001, 1GB, yes
user002, bb2bb2, groupA, 1GB, /vol-1/users/user002, 1GB, yes
user101, 101101, groupB,10GB,/vol-1/users/user101,10GB, no
Administrators should use Microsoft Excel to maintain the account file and then save
as .CSV files where fields are delimited by commas. Then the advanced features of
Microsoft Excel (filling in a series of numbers or items, copy and paste) can be used.
The network administrator manages domain users and groups. The Windows network
uses a domain controller to store the information of all the domain users and groups.
When the Windows Network is set to use Domain Mode on your GroupStor, youll
need to cache the domain account on the GroupStor servers local user database.
Caching the domain accounts speeds up the process of setting permissions and quotas.
- 44 -
3. If you have not entered the valid Domain Login Account required for
retrieving Windows domain users and groups, click the Modify button.
Otherwise go to Step 7.
4. Enter the User Name and User Password for an existing account in the
domain shown in the Domain Name field.
5. Click Apply to save the setting.
6. To change another domain go to the pull down menu with the trust
relationship for the current domain to retrieve domain users and groups.
7. Select the domain users or groups from the left hand window and click the >>
button to join the authorized list stored in the local user database.
8. Click Apply to save the setting.
This function synchronizes the domain accounts cached in the GroupStor server
database with the native domain controller. New domain accounts in the domain
controller will be added to the GroupStor user database and the non-existent domain
accounts will be removed from the GroupStor user database. There is a limitation on
system resources. The user database synchronization is skipped if there are more than
10,240 domain accounts in the domain controller
To synchronize with the domain controller, click the Synchronize user database
hyperlink. The GroupStor server will automatically synchronize with the GroupStor
user database by checking the Synchronize the user database with the native
domain automatically option. The synchronization interval is one hour.
User account changes on the domain controller will not automatically appear on the
GroupStor must be done manually. Choose the 'Update user database' function on
the Domain Account tab of the Security Account menu to find the user accounts
that have already been deleted from the domain controller. These accounts still remain
in the GroupStor user database. They can be deleted from the database. ACL and
share permissions can also be updated by removing the entries related to those users.
- 45 -
6.4 Creating UNIX/Linux Host
With the GroupStor, an administrator can grant NFS client mount privileges to the
UNIX/Linux host. First, the administrator needs to establish rights. When a
UNIX/Linux host is granted access rights to shares, users of the UNIX/Linux host also
have access to shares. The administrator should create a UNIX/Linux host list prior to
granting access rights.
Multiple users on a network can share a specific folder in any volume created on the
GroupStor. When a share is created the administrator must assign permission to the
share and grant or deny user access to the share.
- 46 -
7. Enter the new folder name and click Apply.
8. Click the Create hyperlink to share the corresponding folder.
9. Enter a unique share name in the Share Name field. The user sees this share
name when connecting to this share. The actual name of the folder does not
change.
10. To add a comment about the share, type the text in Comment.
11. To limit the number of users who connect to the share, go to User limit, click
Allow and enter the number of users.
12. Select the protocols to be shared.
13. Click Apply to save the setting.
- 47 -
To Assign Share Permissions for a UNIX/Linux Host:
The share permissions shown below can be assigned to UNIX/Linux Hosts on the
GroupStor:
- 48 -
6.6 Configuring File and Folder Security and
ACL
Access Control Lists (ACL) are associated with each file and folder along with the list
of users and groups permitted access to that file or folder. When a user is granted
access to the file or folder an ACL node is created and added to the ACL for that file
or folder.
The Security ID (SID) for domain users is issued and maintained by the domain
controller on the network. The administrator does not need to re-configure all the
group memberships and access rights to the files and folders if the domain user is
deleted from the local user database and the name created is the same as the previous
one.
There are two built-in user accounts: Admin and Guest and two built-in group
accounts: Admins and Everyone.
Every GroupStor user including local and domain users are members of the Everyone
group. When a volume is created, Admins and Admin will be granted Full Control
permission and Everyone will be granted Read/Write permission to the volume by
default.
Once permissions are set on a volume, all the new files and folders created under the
volume inherit these permissions. Uncheck the Inherit from parent folder when
- 49 -
setting up permissions for the files and folder if you do not want these permissions
inherited.
The GroupStor has a simple, efficient method for setting up and maintaining
file/folder security on a Windows network. The administrator has rights for
maintaining control, making modifications and must grant permission to others.
The permission-mapping table for the GroupStor on a Windows Network
environment is shown below:
- 50 -
File/Folder Folder Permission in File Permission in
Permission on Windows Network Windows Network
GroupStor
Full Control Full Control
Modify Modify
No Access Read & Execute Read & Execute
(NA) List Folder Contents Read
Read Write
Write
Full Control Full Control
Modify Modify
Read Only 5 Read & Execute Read & Execute
(RO) 5 List Folder Contents 5 Read
5 Read Write
Write
Full Control Full Control
Modify Modify
Write Only Read & Execute Read & Execute
(WO) List Folder Contents Read
Read 5 Write
5 Write
Full Control Full Control
5 Modify Modify
Read/Write 5 Read & Execute 5 Read & Execute
(RW) 5 List Folder Contents 5 Read
5 Read 5 Write
5 Write
Full Control Full Control
5 Modify 5 Modify
Modify 5 Read & Execute 5 Read & Execute
(MO) 5 List Folder Contents 5 Read
5 Read 5 Write
5 Write
5 Full Control 5 Full Control
5 Modify 5 Modify
5 Read & Execute 5 Read & Execute
Full Control (FC)
5 List Folder Contents 5 Read
5 Read 5 Write
5 Write
- 51 -
To set, view, change or remove file/folder permissions in a Windows Network:
The GroupStor supports two types of quotas: User and Folder. User quota monitors
the disk space usage of each user. Its based upon file ownership and independent of
where the volume of the file and folder are located. Descriptions of the parameters for
setting user quotas are shown below:
- 52 -
3. Click the Recalculate button to obtain the updated total amount of disk
space allocated to each user.
4. Click Apply to save the setting.
To set all quotas to the same value, specify the quota value in the Set all quotas to
xxMB input field. Click the Set hyperlink to save the setting.
Folder quota monitors the amount of data that can be stored on the folder where folder
quota is applied regardless of the user. It can limit the total amount of data stored in
the GroupStor and effectively controls the proper use of storage resources. Note:
Setting folder quota to the Volume root or System folder and sub-folders is
prohibited.
Folder Name The path and folder name where the folder
quota was applied.
In Use Total amount of disk space used.
Quota Limit The amount of data that can be stored in
respective folders.
1. Click the Enable folder quota control box to enable folder quotas.
2. Click Add to add quota to a folder.
3. Click Select Path to browse for the target folder.
4. Enter the quota limit in MBs.
5. Click Apply to save the settings.
6. Click Recalculate to obtain updated information on the total amount of
disk space in use in each folder.
To set all quotas to the same value, specify the quota value in the Set all quotas to
xxMB input field. Click the Set hyperlink to save the setting.
- 53 -
- 54 -
Chapter 7 Disc Sharing and Disc
Archiving
Disc Server creates and manages CD and DVD disc images for easy and fast disc
sharing. It eliminates the handling of huge numbers of discs. Thousands of discs can
be kept online for user access. To protect those disc images, all GroupStor servers are
equipped with a robust RAID subsystem featuring hot-spare disks and strong data
protection.
The Disc Server function is activated on the GroupStor 9300, 9350, 9400 and 9600
models by default. Its an optional feature on the GroupStor 9500 models. To active
this feature on the GroupStor 9500 model, contact MDI Technical Support to get the
license key and enter the key on the Server License menu of the administration
page.
At least 256MB memory is required for the Disc Server function to work. The
GroupStor server will manage more disc images with more memory.
The GroupStor requires some simple configuration before the Disc Server function
can be used. Open the administration page and select Quick Setup from the Disc
Server menu. Select the CD or DVD device that will automatically duplicate the disc
image when a disc is inserted. Then specify the folder to store the duplicated disc
images. Click Apply to save the settings.
Insert a disc into the CD or DVD device. It will duplicate the disc image immediately.
When it finishes, network users can access the disc by opening the MIRROR share of
the GroupStor server.
- 55 -
7.2 Creating Disc Images
Using the Local Optical Device to Duplicate Disc Images
The simplest and fastest way to create a disc image is to use the CD or DVD device of
GroupStor server to duplicate the inserted discs. Typically a CD can be duplicated in 5
to 10 minutes.
The Disc Mirroring Settings section appears on the page. Select a folder as the target
location. The folder is called Disc Image Folder and is a folder created especially for
storing disc images. In addition to creating a new disc image, it can also replace an
existing disc image with the duplicated one. If the disc image being replaced is shared,
the duplicated disc image inherits all the share settings and permissions. The CD
replacement happens once and returns to the previous settings.
The disc images name can be either inherited from the CD label or user-defined. A
user-defined name only applies once to the next duplicated disc image.
Disk images are stored in the disc image folders. Administrators can also copy or sync
the disk images from one GroupStor server to another using Windows Explorer,
MacOS Finder or SmartSync.
When disc images are copied to a disc image folder, the GroupStor server will not
immediately recognize the images. The administrator must manually discover the disc
images or set up the GroupStor server to discover disc image regularly.
To discover disc images manually, open the Disc ServerDisc Images administration
page and click the Rescan Images hyperlink to the right of the page.
- 56 -
To set up the GroupStor to discover the disc image regularly, open the Disc
Server Information page. Configure the Disc Server Settings to enable the
GroupStor server to scan for disc images every hour.
Once the disc image is created in the GroupStor server, it is seen on the Disc
Server All Disc Images menu of the administration page.
If the disc images are not created or duplicated by the GroupStor server or the remote
mirroring software, administrators have to manually re-scan the disc image folders
from the disc images. For example, if disc images are copied from another GroupStor
server to a disc image folder over the network using the Windows or other OS
platforms, the GroupStor server will not be able to list them on the Disc Images page.
In such a case, administrators have to click the Re-scan Images hyperlink text to the
right of the page.
To change the disc name, click on the hyperlink text in the Disc Name column. On
the same page, it also shows detailed information of the disc image.
To delete a disc image, check the boxes to the right and click the Delete icon.
Administrators can choose to share a single disc, multiple discs or a disc image folder.
If a single disc is shared, its content will be shown when users open the network share.
- 57 -
If multiple discs are shared, the discs will appear as individual folders under the
network share. The folder names are the same as the disc names. If a disc image folder
is shared, all the discs in the disc image folder will appear as individual folders under
the network share.
To share a single disc, go to the Disc Server Disc Images menu of the
administration page. Click the Create hyperlink in the Share column. Click Apply to
share the disc. To restrict user access enter the Share Permissions tab and assign user
permissions. The Unix/Linux Setting tab is used for configuring NFS security
settings. Refer to Section 6.5 Creating Share and Assigning Share Permissions for
details of share permissions and NFS security settings.
Also go to the Disc Server Disc Shares page to share a single disc. Click the
Create Disc Share button. Specify the share name and click Apply to create the
share. Select the disc to share in the Share Target tab and click Apply.
To share multiple discs, go to the Disc Server Disc Shares page. Click the Create
Group Share button. Specify the share name and click Apply to save the settings.
Select the discs to share in the Share Target tab and click Apply. To restrict user
access, use the Share Permissions tab or the Unix/Linux Setting.
To share a disc image folder, go to the Disc Server Disc Images Disc Image
Folder menu of the administration page. Click the Create hyperlink in the Share
column. Specify the share name and click Apply. To restrict user access, use the
Share Permissions tab or the Unix/Linux Setting.
Also go to the Disc Server Disc Shares page to share a disc image folder. Click the
Create Disc Folder Share button. Specify the share name and click Apply to create
the share. Select the disc image folder to share in the Share Target tab and click
Apply.
- 58 -
7.5 Burning Disc Images
To burn an existing disc image, select Disc Recording from the Disc Server menu on
the administration page. The CD function must be configured as Loader/Writer to
record to disc. To change the CD function, click the hyperlink in the Function column
of the Device List table.
Then select the disc image by clicking the Select a Disc hyperlink. Aft the selection is
made, the disc image information will be shown underneath includes the image size,
disc format and disc volume label. Check the Erase disc before writing option if it is a
rewriteable disc that contains data. Click Apply to start recording to the disc.
The GroupStor server is more versatile when the Disc Server function is used along
with the Data Archiving function. Less frequently files can be saved as read-only disc
images, mounted by the Disc Server function and shared by network users in a read-
only format. Archived data that has not been used for a long period of time can be
burned to disc to free up hard disk space.
Summary Logs
The Disc Server Data Archiving Summary page also shows the execution
summary of data archiving tasks. It also keeps records of which disc images are
created, burned and which arent. Click the View hyperlink under the Discs column of
the Summary Logs table to view the list of disc images. Choose to burn disc images
that have not yet been burned here.
- 59 -
Setting Up Data Archiving Tasks
Archiving data can be done manually or as a scheduled task on the Disc
Server Data Archiving Tasks page.
- 60 -
Archiving Schedule Specify the schedule of the archiving task. If
the schedule is due the GroupStor server will
check if the conditions specified in the
Advanced Settings are met. If met the data
archiving task is performed.
Options Delete source files after archiving is
complete If checked the GroupStor server
will delete the source files to free up disk
space after data is successfully archived as
disc images or burned to disc.
Burn Disc If checked data is archived to
CD or DVD disc. Multiple CD/DVD writers
can be specified here. Note: The CD/DVD
functions must be set to Loader/Writer before
beginning the burn process.
- 61 -
- 62 -
Chapter 8 User Access
The GroupStor appears in any network environment as soon as it is properly
configured. This chapter describes how to get the GroupStor ready for user access in
various operating environments on the network.
Please ensure that the GroupStor is configured with an IP address and that a volume
was successfully created. Throughout the remainder of this section the server default
name is NASSERVER, the IP address is 192.168.170.172 and there is a volume
named volume01.
If a Windows user requests access to a shared folder in domain mode, the user will be
authenticated with the local accounts first and then the domain accounts. If the user
has been assigned access rights in share permissions and ACL settings, the user is
allowed to access the shared folder.
The security control mechanism for those using MacOS, web browsers or FTP is
similar. When the workgroup mode is set, the GroupStor authenticates all users for
various network-operating environments with local accounts only. If set to domain
mode, the GroupStor can be configured to use different security policies for different
network file protocols either authenticated by local accounts only, or by both local
and domain accounts.
For example, the GroupStor can authenticate Windows users by querying the domain
controller and at the same time check MacOS users with local user accounts. The
administrator can set the SMB/CIFS protocol to the domain mode and configure the
AFP protocol to apply Local account authentication.
- 63 -
8.2 Access From Windows
There are a number of steps to perform before Windows users can access the
GroupStor. First enter the administration homepage.
Windows users can now access the GroupStor, run Windows Explorer and open the
path of \\nasserver. The shared folder volume01 will appear in the window.
Windows users can also map a network drive to \\nasserver\volume01 or use the net
use command in the Command Prompt window. The command is:
- 64 -
8.3 Access From Web Browsers
In addition to the administration homepage, the GroupStor provides users with access
to data in the server from the user s homepage. Users can download files, create
folders, upload files and modify ACL with a web browser.
Users can now run the web browser and open the IP address 192.168.170.172 to
access the GroupStor. When the user homepage is opened, it prompts for user name
and password. All shared folders are displayed after the user login. An example of the
user homepage is shown below:
- 65 -
In the top right corner of the user page are the tool-bar icons that provide access to the
various functions, i.e., creating folders or uploading files. The server name and user
login appear below the tool-bar. The lower portion of the page is the file browsing
area.
Tool-bar Icons
Change View Mode: switches views of the file browsing area between Detail,
Large Icons and Small Icons.
Change Password: modifies the password of the login user. It allows a local
user to change the password.
Create Folder: creates a new folder in the current path if the login user has
access rights.
Upload File: uploads files to the current path if the login user has access
rights.
File Browsing
The file-browsing window shows all the shares on the server when the user page is
opened. All folders and files are presented as hyperlinks. When a folder is clicked, all
content will appear in that window. When a file is clicked, it either opens the file in
another browser window or a dialog-box for download will pop up. Click the Up
Directory icon to move to the upper level of directory.
- 66 -
To delete files or folders, check the boxes in the 'Delete' column and click the 'Delete'
icon .
Click the Rename icon to rename a file or folder, input the name and press the
Enter key.
A user with 'Full Control' access rights to a file or folder can modify their ACL by
clicking the ACL icon in the Permission column.
First set the GroupStor to operate in either workgroup mode or domain mode. Follow
the steps shown below to configure the GroupStor for MacOS user access:
After the configuration is complete, MacOS 8 and OS 9 users can use the MacOS
Chooser or Network Browser to access the GroupStor. Use the Connect to Server
function to open the GroupStor.
- 67 -
Either type the IP address of the GroupStor in the Address field and click Connect
to put it on the Desktop. Or click AppleTalk in the middle left window pane to find
the zone and the server. Once the server is found, click Connect to put it on the
Desktop.
Users can access an FTP home directory in the GroupStor server. To set up access, do
a login authentication by checking the ACL to the FTP home directory. During the
FTP session, the server checks the ACL as it receives any FTP requests - such as ls,
put, get, etc. Both local accounts and domain accounts are supported depends
upon the security policy.
After setting the GroupStor to operate in workgroup or domain mode, follow the steps
below to configure for FTP access:
- 68 -
Click the Set hyperlink to specify the access rights (ACL) for the FTP home
directory volume01 for accounts permitted to login into the GroupStor using ftp
software. Note: Unchecking the Inherited List box clears the inherit from
parent folder. Click the Apply button
The security control for NFS clients accessing the GroupStor follows the traditional
UNIX-style trust-host mechanism and UID/GID checking. These steps enable NFS
support and export the volume for NFS clients to mount.
After the volume is exported, use one of the NFS clients in the privileged host list to
mount the volume. Login as the root and use the following command to mount
volume01 under the /mnt directory.
Once mounted, the /mnt directory will link to volume01 and inherit the same UID,
GID and permission as specified in the configuration steps. Users on the NFS client
with proper access rights can access the /mnt directory and the GroupStor.
- 69 -
Chapter 9 Backup and Recovery
9.1 Loading and Writing CD/DVD Discs
The GroupStor may include an optional DVD-ROM or DVD-R/RW for loading data
from CD/DVD discs or burning files onto writable CD/DVD discs. The CD and DVD
burning feature turns the GroupStor into a powerful data storage appliance and makes
it into a device that publishes data.
The Loader function copies data from a CD or DVD disc to any location on the
GroupStor. This function is useful for restoring archived data on CD/DVD discs or
simply copying files from discs to the server.
To load data from CD/DVD discs first insert the source disc into the CD or DVD
device. Open the Administration Page and select Backup Loader/Writer. Follow
these steps:
- 71 -
1. Select the Source Device where you insert the disc to be loaded. A device list
appears for your reference above the Source Device item.
2. Specify the destination. Click on the Select Path hyperlink and select a Target
Path.
3. To overwrite the existing files choose, Overwrite with newer files, and the
target is overwritten if the files on the CD/DVD disc are newer.
4. Click Apply to start copying data.
The disc copying progress can be viewed by clicking the hyperlink in the Status
column of the Device List. A separate browser window pops up. Progress is indicated
either by the progress bar, the Processed Folders item, the Processed Files item or
the Size Processed item.
The GroupStor supports CD or DVD burning. Use ISO 9660 format to write data to
CD or DVD discs. CD-RW, DVD-RW and DVD+RW writer devices are supported.
Dual-layer DVD writing is also supported.
- 72 -
To write data to CD/DVD discs, insert a blank disc into the CD/DVD writer. Open the
Administration Page and enter the Backup Loader/Writer page. Follow these
steps:
- 73 -
To check the progress of writing to the disc, click the hyperlink in the Status column
of the Device List. A separate browser window pops up. The progress bar in either the
Processed Folders item, the Processed Files item or the Size Processed item,
indicates the progress. Check Task Phase to discover what the CD/DVD writer is
doing.
If more than one disc is required to burn the source data, a prompt for a new disc
appears after the first disc is burned. The Task % progress bar indicates the total task
progress or the percentage of the source data, which has been burned to discs. The
Disc % progress bar indicates the CD/DVD writing percentage of the current disc.
The GroupStor includes backup software for data protection. The backup software
features full or incremental backup, scheduled tasks, and multi-volume backup. The
administrator defines the backup procedure by including one or more backup tasks.
The hardware compression capability can also be utilized. Its simple, yet powerful
and fulfills most backup demands.
The backup software requires the system folder to operate. To specify the system
folder, open the Administration Page and go to the Server Maintenance page.
Specify the volume that contains the system folder. If no system folder exists in the
specified volume, it will be automatically created.
- 74 -
Adding Backup Tasks
To add a task, click the Add Task button. Follow these steps:
To restore data from tape, open the administration page and go to the Backup Tape
Backup page. Click the Restore tab and follow these steps:
- 75 -
1. Specify the Tape Drive being restored.
2. Specify a backup set to restore by selecting a backup index required to restore
data from tape. If the backup index is missing, the index must be imported from
the tape before the restoration process can continue. To import backup indexes,
select a tape drive and click the Import hyperlink.
3. Select restore all files in the backup set or only certain files or folders. The latter
requires a Java virtual machine for the UI. Go to http://java.sun.com for the latest
Java virtual machine.
4. Click the Next button.
5. To restore selected files or folders, make selections on the Java UI in the What to
Restore item.
6. Choose the target location and restore data to either the original location or an
alternative location. If the original location is selected data is restored to the
original location where it was backed up. Note: If the original volume is missing
nothing is restored. The alternative location is any user-defined path. Use the
Select Path hyperlink to specify the path and restore files and the full directory
hierarchy under the specified path.
7. Specify if the ACL settings and files are to be restored together.
8. Specify if existing files and backup files are to be overwritten.
9. Click the Apply button to start the restoration.
When a tape task is running, view the progress on the Summary page. A list of tape
drives appears in the upper Summary page. Any task currently running is shown as a
- 76 -
hyperlink in the Status column. Click a hyperlink for task progress and details. Ready
will appear if there is no task running.
After backup or restoration task finishes, a summary log appears in the system folder
in the lower Summary page. These logs keep records of statistics and errors for all
backup/restoration tasks ever executed. Click the hyperlink in the Tape Label column
to see details. To delete logs, check the boxes to the right and click the Delete icon.
There are three operating modes - "mirror" for one-to-one data replication,
"backup" for disk-based backup and "distribute" for one-to-many data distribution.
The following sections describe the usage and applications of these operating modes.
Two GroupStor systems are required one as the SmartSync server and the other as
the SmartSync client to replicate data from the client to the server.
One GroupStor acts as the SmartSync server and creates a sync point in it. A sync
point is a folder in the SmartSync server that is accessible by clients for data
- 77 -
replication. The sync point of the mirror mode receives data from a SmartSync client
and makes an identical copy.
On the second GroupStor server, which acts as the SmartSync client, set up a
SmartSync task, define the schedule settings, and the source folder.
1. To specify the IP address of the SmartSync server, enter the IP address of the
- 78 -
GroupStor where the sync point is to be created. Enter the port number in the
Second box. Port 873 is the default for the sync point names and other information
relating to the remote SmartSync server. Specify the remapped port number here if
the port was remapped by a firewall or NAT device.
2. To choose the sync point of Mirror mode for the SmartSync server provide a
user account with the privilege to replicate data to the sync point.
3. To complete the task settings, provide the task name, select the source folder to
replicate, specify the schedule and configure the SmartSync options on this page.
Two or more GroupStor servers are required one as the SmartSync server and the
others as SmartSync client to backup data from the SmartSync clients to the
SmartSync server.
On the GroupStor that acts as the SmartSync server, create the sync point of
Backup mode to receive data from SmartSync clients and create data backups.
- 79 -
The GFS media rotation mechanism is the process for managing backup versions and
is described below. Basically it checks for obsolete versions and deletes them when a
new backup version is created. For example: X, Y, Z are user-defined numbers.
On the GroupStor that acts as the SmartSync client, set up a SmartSync task, define
the schedule settings and the source folder.
- 80 -
The four steps to add a SmartSync task are:
2. Choose the sync point Backup mode on the SmartSync server. Specify the
action as Backup to server and grant a user account the privilege to replicate
data to the sync point.
3. To complete the task settings provide the task name, select the source
folder to replicate, specify the schedule, and configure the SmartSync options on
this page.
To restore data from the SmartSync server, create a SmartSync task on the client.
Open the Administration Page and enter the Backup SmartSync Task menu.
Click the Add Task button.
2. Choose the sync point of Backup mode on the SmartSync server. Specify
Restore from server and provide the user account with the privilege to replicate
data to the sync point.
3. To complete the task settings, provide the task name, select which
backup version to restore, specify the target folder, configure the SmartSync
options and the overwrite options on this page. The overwrite options specify
whether to overwrite the target with files of the same name.
- 81 -
Distributing File Updates to Multiple Sites
Two or more GroupStor systems are required one as the SmartSync server and one
or more as SmartSync clients to replicate data from the SmartSync server to the
SmartSync client.
On the GroupStor server that acts as the SmartSync server, create a sync point in
Distribute mode to distribute data to the SmartSync clients as requested.
On the GroupStor that acts as the SmartSync client set up a SmartSync task that
defines the schedule settings and target folder.
- 82 -
To add the SmartSync task:
2. Choose the sync point Distribute mode in the SmartSync server and specify the
user account with the privilege to request data from the sync point.
3. To complete the task settings, provide the task name, select the target folder to
receive data, specify the schedule and configure the SmartSync options on this
page.
Compress the data stream during data transmission: When checked, data is
compressed before transmission to the SmartSync server.
- 83 -
Include/exclude file patterns: Excludes or includes certain file types in the
synchronization. For example, to exclude WORD files, type -*.doc; . To
exclude all WORD files except those beginning with abc, type +abc*;-
*.doc; .
Perform quick synchronization: Quick synchronization only checks the file date,
time and size when matching files, instead of checking block-by-block. It
significantly speeds up the synchronization but there is an added risk because files
may not be identical.
Generate transaction logs: When checked files added, updated or deleted during
the data replication are recorded. Details of the transaction logs are displayed on
the SmartSync Summary page.
To restore data from a GroupStor server failure requires restoring data and system
configurations. Tape backup and SmartSync are used to restore data; system profiles
are used to recover system configurations. System profiles are the backups of all
system configurations, user databases and security information.
- 84 -
The NAStart software can also create a system profile. To recover from a system
profile saved by NAStart click the An external file item and find the system profile.
Specify the restore option and click the Restore button.
Server, network and backup settings includes all settings on the Server,
Network, Backup and Event Configuration menus.
User accounts and quota settings Includes local accounts, current domain
accounts and trust domain accounts, along with their quota settings. User accounts
will be appended to the existing user database local accounts with the same
names will be overwritten; domain accounts with the same SID will be
overwritten; others will be added to the existing user database.
Security Information, including network shares and ACLs Includes all
network shares, share permissions and access control lists.
- 85 -
Chapter 10 Event Notification and System
Status
This chapter covers the Event Notification and System Status pages. The GroupStor
collects information about the system, hardware and security events and records three
kinds of logs:
System Log
Device Log
Security Log
All events are categorized into three levels: Info, Warning and Error. Use the
Event Configuration menu to configure the level of the logs. Use the Advance or
Basic button to switch between the display for advance and basic information. The
Advance view shows all the information in the Basic view plus additional event
notification settings that may be of interest to the more advanced user. Various
notification methods are provided by the GroupStor to ensure non-stop operation and
data integrity:
- 86 -
10.1 Thermal Settings
Users can define the thermal scheme of the GroupStor to provide a warning message
or shut down when the system or CPU temperature is over a pre-defined threshold
temperature.
Use Web Reminder, System Log, Device Log & Security Log to view a summary
of all events that occurred on the GroupStor. The severity of each event is determined
by the GroupStor and displayed in different colors:
Information = Green
Warning = Yellow
Error = Red
Web Reminder is the warning message that appears on the first screen of the
administrator home page and alerts the administrator that one or multiple critical
events have been found on the GroupStor. The administrator is immediately notified
of the status of the GroupStor upon entering the administrator home page. Click the
hyperlink of the Web Reminder message for a Web Reminder summary menu.
- 87 -
Go to the Event Web Reminder menu for a summary of all critical events that
occurred on the GroupStor.
1. Select the number of the most recent events show on the screen.
2. Select the severity level for the events to be reviewed.
3. Click Refresh or button to refresh the screen.
4. Click Clear or button to clear the log.
- 88 -
10.3 Viewing System Status
System Status displays a comprehensive view of the system fan status, thermal status
and system voltage. Use this information to quickly find a problem with the
GroupStor and take the appropriate action. The Status Environment page monitors
the CPU fan status, CPU and system temperatures and System Voltages. Click
Refresh to obtain the latest status.
The Status Open Files menu provides the following information about all open files
on the GroupStor:
- 89 -
10.4 Saving System Settings and Status as
HTML Files
First, create a system folder to store these files. The system folder is also required to
perform tape backups. To create the system folder, open the Administration Page
and go to the Server Maintenance menu. On the menu page, select a volume for
the system folder. Click Apply to create the system folder.
Once the system folder is created, save the system settings and event logs as HTML
files. On the same page, choose the files to save and click the Apply button. To
preview the files before saving, click the Preview: hyperlinks. Previewing does not
create any files in the system folder.
After generating the files, theyll appear in the table. Click any hyperlink to view the
content of a file.
To email the saved files, choose the files to save and check the
Send the saved files by email box. Enter the email address and click
Apply to send via email and save copies in the system folder.
- 90 -
- 91 -
Chapter 11 Virus Protection
Most storage systems are vulnerable to virus attacks. An infected file on your network
can be exchanged among clients systems and results in corrupted data or productivity
loss. The antivirus software integrated into the GroupStor offers the best-of-breed
security and provides reliable antivirus protection to prevent viruses from spreading.
11.1 Information
- 92 -
The real-time scan history displays the date/time the virus was found, virus name,
action taken and full path name of the infected file. The scan task summary displays
the start time of each manual or scheduled scan task.
An embedded antivirus utility provides several options for virus protection including
real-time, manual and scheduled scanning to offer comprehensive antivirus and
content security solutions for enterprise customers.
Note:
Antivirus requires the system folder to operate. Go to
the Server Maintenance page and specify the
volume where the system folder resides.
Note:
For the first operation, go to the Virus Scan Update
page and obtain the most recent updated virus pattern
file. Otherwise the antivirus function cannot work.
The real-time scanning function provides antivirus protection while users are reading
or writing files to the GroupStor.
The manual and scheduled scanning functions will scan any folders for infected files.
The scan results will be listed as a scan task summary on the Information page.
- 93 -
1. Go to the Virus Scan Setting page to configure the scan settings required.
See Configuring Scan Settings in the next section below.
2. Click the Manual tab to go to the manual scanning page.
3. Click the Select Folders hyperlink and specify the folder where the manual scan
is to be performed.
4. Click Apply to save the settings.
1. Click the Enable Scheduled Scan For Infected Files box to enable scheduled
scanning.
2. Click the Select Folders hyperlink to specify the folder where the scheduled scan
is to be performed.
3. Configure the start time and recurrence pattern for the scheduled scanning.
4. Click Apply to save the settings.
- 94 -
1. Click the desired scan file type.
2. If All file types is selected, all files regardless of the file extension will be
scanned.
3. If Files with Specified File Extensions Only is selected, specify using the
recommended extensions or manually scan file extensions.
1. Select Trend Micro Update Server on Internet to download virus patterns from
the Internet. Note: Specify the DNS server IP address on the Network TCP/IP
menu of the Administration Page.
2. Or manually download the virus pattern file in ZIP format from Trend Micros
website http://www.trendmicro.com. Select A virus pattern file in ZIP
format and specify the location of the virus pattern file.
3. Click Apply to save the settings.
- 95 -
Configure a Scheduled Update
1. Click the Enable Scheduled Update of Virus Pattern Files box to enable
a scheduled update.
2. Configure the download schedule. Select the start time and recurrence pattern for
the scheduled update.
3. Click Apply to save the settings.
- 96 -
Chapter 12 Activating Optional Features
Optional software features of the GroupStor are disabled by default. A license key
from an MDI Support Technician is required to activate these optional features before
use.
1. Open the Administration Page, select License from the Server menu.
The page is shown below:
2. Enter the license key in the input field. A license key is a string of 24 characters.
The characters can be any combination of numbers or English letters. Note:
License keys are case-sensitive.
3. Click Apply to save the settings.
4. The activation is successful if the License Type is Full.
- 97 -
Chapter 13 Warranty
The GroupStor comes with a 12-month warranty. Read the material
that follows for specific information about:
Make sure you fill out your Product Registration Card, included in
your package, and then mail or FAX it back to Micro Design
Customer Support.
- 98 -
Attention!
WARRANTY REGISTRATION
PLEASE FILL OUT THE INFORMATION ON THE
PRODUCT REGISTRATION CARD INCLUDED IN THE
SHIPPING CONTAINER OF THE GROUPSTOR. THIS
INFORMATION MUST BE COMPLETED AND RETURNED
TO MDI TO ACTIVATE YOUR PRODUCT WARRANTY!
(407) 472-6100
or
Mail to:
Micro Design International Inc
45 Skyline Drive, Suite 1017
Lake Mary, FL 32746
Attn: Customer Support
or
Register online:
http://www.mdi.com/Customer
- 99 -
Product Warranty
Micro Design International, Inc. warrants this product to be in good working order for a period
of 12-months from the date of purchase as a new product. Should this product fail to conform to
specifications at any time within that period, Micro Design International Inc. will, at its option,
repair or replace this product at no cost except as set forth in this warranty. Replacement parts or
products will be furnished on an exchange basis only. Replacement parts assume the remaining
warranty of the parts they replace. Replaced parts and/or products become the property of Micro
Design International Inc. No warranty is express or implied for products damaged by accident,
abuse, misuse, natural or personal disaster, or unauthorized modification.
Warranty registration must be completed and sent to Micro Design International Inc., via
FAX (407) 472-6100 or mailed to 45 Skyline Drive, Suite 1017, Lake Mary, FL 32746, for
warranty to be in effect.
Warranty service described herein may be obtained by sending this product information during
the warranty period to Micro Design International Inc., 45 Skyline Drive, Suite 1017, Lake
Mary, FL 32746. Product must be accompanied by proof of purchase date or have a warranty
registration form on file and a Return Merchandise Authorization Number. (This number is
to be obtained by calling Micro Design International Inc. at 407-472-6000.) If shipped by U.S.
Mail or any common carrier, the owner agrees to insure and accept all liability for loss or
damage to this product, to prepay all shipping charges, and to use a shipping container
equivalent to original packaging.
Warranty Limitations
The warranty stated above is the only warranty applicable to this product. All other warranties,
express or implied, (including all implied warranties of merchantability or fitness for a purpose),
are hereby disclaimed. If this product does not perform as warranted herein, owner's sole
remedy shall be repair or replacement as provided above. In no event will Micro Design
International Inc. be liable to any purchaser for damages, consequential damages arising from
purchase, use or inability to use this product, even if Micro Design International Inc. has been
advised of the possibility of such damages.
- 100 -
Product Return Guidelines
Return Merchandise Authorization (RMA)
To obtain a Micro Design International RMA number, these guidelines must be followed:
Upon contacting MDI and providing the required information, an RMA number will be assigned
from a technical services specialist.
All products must be packaged for return shipment in the original MDI packaging or equivalent
protective shipping container. At your request, MDI will provide MDI packaging for shipment
at a small C.O.D. charge, excluding jukebox pallets.
All equipment must be insured and shipped PRE-PAID freight. Display RMA number
prominently on the outside of the shipping box. Upon receipt of the returned product(s), our
technical staff will evaluate the problem described. If the product is defective within the terms
of the MDI warranty, we will repair or replace the appliance at no charge, and then return the
product(s) to you pre-paid freight.
In the event that the product inspection and testing discloses that the returned product(s) is not
defective within the terms of the warranty, you will be assessed a minimum bench fee of
$125.00. This charge will be billed to you C.O.D. when MDI returns the product(s). If the
service charge or repair exceeds $125.00, you will be contacted first to authorize all repairs.
- 101 -
Appendix A Specification
LED Indicators
On Off Blink
Amber* 1000M no link 1000M
link activity
Green 100M link no link 100M
LAN 1 activity
Yellow 10M link no link 10M
activity
Amber* 1000M no link 1000M
link activity
Green 100M link no link 100M
LAN 2 activity
Yellow 10M link no link 10M
activity
- 102 -
Red IDE
HD Access activity
Green Power on
Power/Fault Yellow Fault
- 103 -
Pin Number Function
Pin 1 PowerSwitch#
Pin 2 GND
Pin 3 ResetSwitch#
Pin 4 GND
DIP 3
ON HDD Hot Swap
Module Not Installed
OFF HDD Hot Swap
Module Installed
- 104 -
LED 1 LED 2 Meaning
(Power/Fault) (HD Access)
Green Blinks Off (Master) Powering up
Red On (Slave)
Green On Red On during access HDD is being accessed
Dimension 261x178x363mm (H x W x D)
Input Power 90 260V
Current Output for +5V 20A
Maximum Current Output 16A
for +12V
Peak Current Output for 28A
+12V
Output Wattage 370W
- 105 -
Hardware Specification for the GroupStor 9400
& 9500 Tower Models
Dimension 430x175x490mm (H x W x D)
Input Power 90 260V
Current Output for +5V 20A
Maximum Current Output 16A
for +12V
Peak Current Output for 28A
+12V
Output Wattage 370W
Dimension 175x490x530mm (H x W x D)
Input Power 90 260V
Current Output for +5V 20A
Maximum Current Output 16A
for +12V
Peak Current Output for 28A
+12V
Output Wattage 370W
- 106 -
Appendix B Utility for the GroupStor System
Use NAStart to display and modify the setting created. Also perform server settings
replication from a configured server to other GroupStor Servers on the network.
Server parameters of a GroupStor can be imported into other GroupStor Servers to
avoid the tedious task of setting up each individual unit on the network.
Features:
Server Management -
Discovers all GroupStor Servers on the network
Configures GroupStor Servers for first-time or quick setup
Export /Import GroupStor Servers system settings
User Interface -
Explorer-like user interface with user friendly wizards
Task Manager monitors all on-going and scheduled tasks
- 107 -
Installation
System Requirements
NAStart communicates with GroupStor Servers through the TCP/IP protocol. Client
for Microsoft Networks and the TCP/IP protocol in Windows must be installed to
use NAStart.
Installing NAStart
The TCP/IP protocol must be installed on your computer prior to the NAStart utility.
To install NAStart, insert the Utility CD into the CD-ROM drive. On the auto-run
interface, click Install NAStart. If the auto-run interface does not appear, go to
X:\NAStart and run NAStart.exe; X is the drive letter of the CD-ROM drive.
Follow the instructions in the setup wizard to install NAStart. It will create shortcuts
on the Desktop and in the Programs folder of the Start menu.
NAStart can also locate GroupStor servers by IP addresses. Its useful when
GroupStor servers are on the Internet or located in different network segments from
NAStart. Select Remote NAS List from the File menu to locate P address, click the
Add button and enter the IP address of the GroupStor server.
- 108 -
To Set the Automatic Refresh Interval
Click the OK button to save the settings. Note: The server may need to be rebooted
for certain parameter changes to take effect.
This section describes how to export the system settings of the GroupStor into a file.
This file can be read into another GroupStor on the network using the import feature.
Import System Settings and Export System Settings form a combined process that
replicates system settings from one configured GroupStor to another GroupStor.
- 109 -
To Export System Settings of the GroupStor
1. Right click any GroupStor Server and select Import System Settings.
2. Or, go to the Server -> Import System Settings menu.
3. A prompt asks for the administrator password before proceeding.
4. There are two options select a server or an export file as the source.
5. Click Next.
6. Select the type of system settings to import into the target servers. Details of
system settings are displayed in the preview text box beside each section.
7. Click OK. The GroupStor will automatically reboot.
Browsing Servers
The main window of NAStart is shown below. Upon execution, NAStart brings up
Windows Explorer and files can be dragged and dropped into My Container for use
later in image building. To disable this option, choose the Tool->NAStart Options
and un-check the option - "Open Windows Explorer when NAStart starts".
- 110 -
The main window consists of a file menu, tool bar, tree view pane on the left, list view
pane on the right, and status bar at the bottom.
The tree view pane lists all the GroupStor Servers found by NAStart on the network.
It is also included in My Computer the one in Windows Explorer. My Container
keeps information about the files/folders that can be built as a CD image on a
GroupStor Server using the "Build Image" function. Click on any item in the tree view
pane and its content are displayed in the list view pane.
The status bar indicates NAStart status and information. The left side of the status bar
shows function hints or item properties. The right side displays the PC date and time.
Mouse over each GroupStor and see the Domain Name and IP Addresses.
Note: A GroupStor Server is protected by the admin password. Enter the password
to set up or write to the server.
- 111 -
NAS Server: Represents a GroupStor Server
Displays all the disc images, path name, size, status and file system.
The tool-bar provides easy access to the main functions of NAStart. An explanation
each tool-bar icon and their representations is shown below:
- 112 -
Refresh: Manually updates the directory content of My Computer or GroupStor
Network.
Tree View Mode: Expands or shrinks the directory tree in the tree view pane (to
the left).
List View Mode: Changes the view mode of items in the list view pane (to the
right).
Mirror CD: Starts the "Mirror CD" wizard and duplicates CD images into the
GroupStor Server.
Build Image: Starts the "Build Image" wizard and builds a CD image from My
Container into a GroupStor Server.
Wizard: Brings up a wizard and provides access to such major functions as:
"Mirror CD", "Build Image" and "Server Quick Setup".
- 113 -
Task Manager: Opens a task manager window, displays and controls all
ongoing and scheduled tasks.
To copy a CD from a PCs CD-ROM drive onto a GroupStor Server follow these
steps:
2. Choose one or more servers as the destination. Choose a server in the Target &
File Path list, select Smart mode to check the redundancy of the CD image or
select Force mode to make a second copy of the same CD image. Click the >>
button. The task will be added to the right-hand pane. Click the Next button to
go to next page.
- 114 -
3. Change the volume label of the CD/DVD image if necessary. To change the
volume label, click the 2. User Define button and enter the volume label in the
box. Click the Update button and the Next button afterwards.
- 115 -
5. Set Mirror CD options if necessary.
- 116 -
Archiving Files As a CD/DVD Image
To build a CD image from My Container into a GroupStor Server follow these steps:
1. Collect the files to build a CD/DVD image by opening Windows Explorer and
drag and drop the files into My Container.
2. Click the "Build Image" icon on the tool-bar and bring up the "Build
Image" wizard. Click the Validate button to check if the file/folder information
in My Container is correct. If not, choose to update My Container.
- 117 -
3. Choose one or more servers as the destination. Select a server in the Target &
File Path box, select Smart mode to check the redundancy of the CD image or
select Force mode for a second copy of the same CD image. Click the >>
button. View the task being added in the right-hand pane. Click the Next button
to go to next page.
4. Name the CD/DVD image being created. Enter the name in the Volume label
box and click the Update button. Press Next afterwards.
- 118 -
5. Specify the date/time to run the task. Then press OK.
- 119 -
Burning Disc Images
If the GroupStor server is equipped with a CD or DVD writer it will burn any existing
disc image. Select the GroupStor server from the NAS Servers tree view pane of the
NAStart main window. Select a disc image in the GroupStor server and right-click on
it. Select Record CD/DVD from the right-click menu.
Specify the parameters in the wizard and click the Add CD-R Option button. Click
Next to continue. On the next page, specify the launch schedule and click OK.
Supported CD Formats
The "Mirror CD" function copies CD or DVD discs from a PCs CD/DVD drive into a
GroupStor Server. A list of CD formats that can be mirrored remotely is shown below:
- 120 -