background image

 

 

 

Appendix

 

25

 

Termination

 

If User breaches any of its obligations under this EULA, QSAN may terminate this EULA and 
take remedies available to QSAN immediately.

 

Miscellaneous

 

 

QSAN reserves the right to modify this EULA.

 

 

QSAN reserves the right to renew the software or firmware anytime.

 

 

QSAN may assign its rights and obligations under this EULA to any third party without 
condition.

 

 

This EULA will be binding upon and will inure to User’s successors and permitted 
assigns.

 

 

This EULA shall be governed by and constructed according to the laws of R.O.C. Any 
disputes arising from or in connection with this EULA, User agree to submit to the 
jurisdiction of Taiwan Shilin district court as first instance trial.

 

 

 

Summary of Contents for XCubeNAS Series

Page 1: ...s White Paper WORM QSAN Technology Inc www qsan com Copyright 2017 QSAN Technology Inc All rights reserved No part of this document may be reproduced or transmitted without written permission from QSAN Technology Inc ...

Page 2: ... Trademarks QSAN the QSAN logo XCubeNAS and QSAN com are trademarks or registered trademarks of QSAN Technology Inc Intel Xeon Pentium Core Celeron and Intel Inside logo are trademarks of Intel Corporation in the United States and other countries Other trademarks and trade names used in this document to refer to either the entities claiming the marks and names or their products are the property of...

Page 3: ... a controlled environment Therefore the results obtained in other operating environments may vary significantly Some measurements may have been made on development level systems and there is no guarantee that these measurements will be the same on generally available systems Furthermore some measurements may have been estimated through extrapolation Actual results may vary Users of this document s...

Page 4: ...ation Tip and Caution 2 Conventions 3 1 Overview 4 1 1 Introduction 4 1 2 Prerequisites 4 1 3 Concept 5 2 Instruction 9 2 1 Plan and identify WORM policy to apply 10 2 2 WORM Configuration 11 2 3 Summary 20 2 4 Apply to 20 3 Support and Other Resources 21 3 1 Getting Technical Support 21 3 2 Documentation Feedback 22 Appendix 23 End User License Agreement EULA 23 ...

Page 5: ...he equipment s components by yourself Doing so may violate your warranty and expose you to electric shock Refer all servicing to authorized service personnel Please always follow the instructions in this owner s manual Related Documents There are related documents which can be downloaded from the website XCubeNAS QIG Quick Installation Guide https www qsan com en download php Compatibility Matrix ...

Page 6: ...day UTC 8 Via Skype Chat Skype ID qsan support Service hours 09 30 02 00 Monday Friday UTC 8 Summertime 09 30 01 00 Via Email support qsan com Information Tip and Caution This manual uses the following symbols to draw attention to important safety and operational information INFORMATION INFORMATION provides useful knowledge definition or terminology for reference TIP TIP provides helpful suggestio...

Page 7: ...e which is a placeholder for actual text provided by the user or system Example copy source file target file square brackets Indicates optional values Example a b indicates that you can choose a b or nothing braces Indicates required or expected values Example a b indicates that you must choose either a or b vertical bar Indicates that you have a choice between two or more options or arguments Sla...

Page 8: ...ns to preserve for a limited period without changing access permission of related accounts 1 2 Prerequisites This white paper provides technical guidance for designing and implementing Write Once Read Many WORM feature and it is intended for use by system administrators NAS designers storage consultants or anyone who has purchased this product and is familiar with server and computer network netwo...

Page 9: ...nd unintentional deletion of files virus attack WORM is applicable for fields and industries such as Security Education Medical Finance Research facility Patents Government Agencies or Large Enterprises that have a high demand for data security The three available policies for WORM protection Figure 1 1 Three Policies of WORM Protection INFORMATION WORM Write Once Read Many When WORM is enabled da...

Page 10: ... Folder Jan 1st Retention expiry date of Share Folder Subfolders and Files Retention period is forever Example Protect this forever Retention Unlimited days Figure 1 2 Detail Structure of WORM Policy Protect This Forever CAUTION Once the WORM is set to forever the WORM can t be removed and reset device to default factory settings ...

Page 11: ...date of Share Folder Jan 1st Retention expiry date of Share Folder Subfolders and Files Based on WORM expiration date of this Share Folder Example Set retention period on this folder Retention 6 days Figure 1 3 Detail Structure of WORM Policy Set Retention Period on This Folder ...

Page 12: ...art date of Share Folder Jan 1st Retention expiry date of Share Folder Subfolders and Files WORM expiration date is based on Retention period of individual Subfolder and Files Example Set retention period on each file of this folder Retention 7 days Figure 1 4 Detail Structure of WORM Policy Set Retention Period on Each File of This Folder ...

Page 13: ...AS with different application scenarios with the three WORM policies The process of WORM setup can be divided into four phases Figure 2 1 The four phases of WORM setup INFORMATION Please be aware and fully understand the behavior of each WORM policy before applying WORM on shared folders ...

Page 14: ...s Folder Files and folders will be kept as read only for a certain time until share folder is rewritable again Set Retention Period on Each File of This Folder Files and folders will be kept as read only for a certain time until each individual file or folder is rewritable again TIP Still not sure what to choose Composite Design Final Stage WORM Policy Transition Stage WORM Policy Initial Stage WO...

Page 15: ...gure 2 3 Configuration Process Flow Select or Create Share Folder for WORM Step 1 Open Control Panel Step 2 Go to File Sharing Folder Folder list Step 3 Select a Share Folder Click on the Gear icon Select WORM from dropdown menu Figure 2 4 Configuration Page for WORM Setup Plan and Identify WORM policy to Apply Select or Create Share Folder for WORM Apply WORM Policy to Share Folder Test WORM Shar...

Page 16: ... to enable WORM Figure 2 6 Enable WORM Step 5 Select WORM Policy There are three different policies so please choose the option you would like to proceed a For Protect This Forever policy Click on the Protect This Forever radio button Plan and Identify WORM Policy to Apply Select or Create Share Folder for WORM Apply WORM Policy to Share Folder Test WORM Share Folder ...

Page 17: ...13 Figure 2 7 Selecting Policy Protect This Forever Click on the Next button if all information is correct Figure 2 8 Information Applying Forever WORM Protection ...

Page 18: ...otection Figure 2 9 Confirmation Applying Forever WORM Protection b For Set Retention Period on This Folder policy Click on the Set Retention Period on This Folder radio button Enter a number equal to or greater than 1 Day s Click on the Next button Figure 2 10 Selecting Policy Set Retention Period on This Folder ...

Page 19: ... Period on This Folder c For Set Retention Period on Each File of This Folder policy Click on the Set Retention Period on Each File of This Folder radio button Enter a number equal to or greater than 1 Day s Click on the Next button Figure 2 12 Selecting Policy Set Retention Period on Each File of This Folder ...

Page 20: ...k on the Confirm button if all information is correct Figure 2 13 Confirmation Applying Set Retention Period on Each File of This Folder Step 6 Click on the Apply button to apply WORM protection onto designated Share Folder Figure 2 14 Applying WORM Configuration ...

Page 21: ...gging in Share Folder Step 8 Test existing Folder or File inside the Share Folder There are two methods to test the existing folder or file inside the share folder please following the steps below Plan and Identify WORM policy to Apply Select or Create Share Folder for WORM Apply WORM Policy to Share Folder Test WORM Share Folder ...

Page 22: ...18 Copyright 2017 QSAN Technology Inc All Right Reserved Method A Rename an existing Folder or File WORM is activated if Rename fails Figure 2 17 Test A Rename existing Folder or File ...

Page 23: ...r File WORM is activated if deleted Folder or File reappeared after refresh Delete existing Folder or File Figure 2 18 Test B Delete existing Folder or File Right click on your mouse and select Refresh Figure 2 19 Test A Refresh Share Folder ...

Page 24: ...B Check Share Folder Deleted File or Folder 2 3 Summary Application of WORM can vary from application and operation with QSAN XCubeNAS system WORM can extend integration scope of application and operation into a standard data secured file sharing system 2 4 Apply to This manual is applicable to XCubeNAS XN3000 XN5000 XN8000 series ...

Page 25: ...t Skype ID qsan support Service hours 09 30 02 00 Monday Friday UTC 8 Summertime 09 30 01 00 4 Via Email support qsan com Information to collect 1 Product name model or version and serial number 2 Firmware version 3 Error messages or screenshot images 4 Product specific reports and logs 5 Add on products or components installed 6 Third party products or components installed Information for Technic...

Page 26: ...oviding documentation that meets and exceeds your expectations To help us improve the documentation email any errors suggestions or comments to docsfeedback qsan com When submitting your feedback including the document title part number revision and publication date located on the front cover of the document ...

Page 27: ...ELLER S APPLICABLE RETURN POLICY General QSAN Technology Inc QSAN is willing to grant you User a license of software firmware and or other product sold manufactured or offered by QSAN the Product pursuant to this EULA License Grant QSAN grants to User a personal non exclusive non transferable non distributable non assignable non sub licensable license to install and use the Product pursuant to the...

Page 28: ...ING BUT NOT LIMITED TO ANY MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE WORKMANLIKE EFFORT TITLE AND NON INFRINGEMENT ALL PRODUCTS ARE PROVIDE AS IS WITHOUT WARRANTY OF ANY KIND QSAN MAKES NO WARRANTY THAT THE PRODUCT WILL BE FREE OF BUGS ERRORS VIRUSES OR OTHER DEFECTS IN NO EVENT WILL QSAN BE LIABLE FOR THE COST OF COVER OR FOR ANY DIRECT INDIRECT SPECIAL PUNITIVE INCIDENTAL CONSEQUENTIAL OR...

Page 29: ...the software or firmware anytime QSAN may assign its rights and obligations under this EULA to any third party without condition This EULA will be binding upon and will inure to User s successors and permitted assigns This EULA shall be governed by and constructed according to the laws of R O C Any disputes arising from or in connection with this EULA User agree to submit to the jurisdiction of Ta...

Reviews: