background image

127

Appendix D: Licensing Information

the recipients all the rights that you have. You must make sure that they, too, receive or can get the 
source code.  And you must show them these terms so they know their rights.

We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which 
gives you legal permission to copy, distribute and/or modify the software.

Also, for each author's protection and ours, we want to make certain that everyone understands that 
there is no warranty for this free software.  If the software is modified by someone else and passed 
on, we want its recipients to know that what they have is not the original, so that any problems in-

want its recipients to know that what they have is not the original, so that any problems in-

 its recipients to know that what they have is not the original, so that any problems in-

troduced by others will not reflect on the original authors' reputations.

Finally, any free program is threatened constantly by software patents.  We wish to avoid the danger 
that redistributors of a free program will individually obtain patent licenses, in effect making the pro-
gram proprietary.  To prevent this, we have made it clear that any patent must be licensed for every-
one's free use or not licensed at all.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

0. 

This License applies to any program or other work which contains a notice placed by the 

copyright holder saying it may be distributed under the terms of this General Public License.  The 
"Program", below, refers to any such program or work, and a "work based on the Program" means 
either the Program or any derivative work under copyright law: that is to say, a work containing 
the Program or a portion of it, either verbatim or with modifications and/or translated into another 
Language.  (Hereinafter, translation is included without limitation in the term "modification".)  Each 
licensee is addressed as "you".

Activities other than copying, distribution and modification are not covered by this License; they are 
outside its scope.  The act of running the Program is not restricted, and the output from the Program 
is covered only if its contents constitute a work based on the Program (independent of having been 
made by running the Program).

Whether that is true depends on what the Program does.

1. 

You may copy and distribute verbatim copies of the Program's source code as you receive 

it, in any medium, provided that you conspicuously and appropriately publish on each copy an ap-
propriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this 
License and to the absence of any warranty; and give any other recipients of the Program a copy of 
this License along with the Program.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer 

Summary of Contents for N4310 Series

Page 1: ...User s Manual N4310 Series v1 0...

Page 2: ...s Technology Corporation reserves the right to modify the contents of this manual without notice Product name Thecus N4310 Series Manual Version 1 0 Release Date June 2014 Limited Warranty Thecus Tech...

Page 3: ...ative humidity of 20 85 Using Thecus IP storage under extreme environmental conditions could damage the unit Ensure that the Thecus IP storage is provided with the correct supply voltage AC 100V 240V...

Page 4: ...eb Administration Interface 12 3 2 1 Add Shortcut 13 3 2 2 Control Panel 13 3 2 3 Message Bar 14 3 2 4 Logout 14 3 2 5 Online Update Notification 14 3 2 6 Language Selection 15 3 3 System Management 1...

Page 5: ...CSI 49 3 5 File Sharing Privilege 57 3 5 1 ADS Support 57 3 5 2 Local User Configuration 58 3 5 3 Local Group Configuration 60 3 5 4 Batch Input 61 3 5 5 Shared Folder 62 3 5 6 User Quota 67 3 5 7 Use...

Page 6: ...pplication 83 3 8 Backup 84 3 8 1 Rsync Target Server 84 3 8 2 Data Guard Remote Backup 84 3 8 3 Data Guard Local Backup 96 3 8 4 ACL Backup and Restore 110 3 8 5 Data Burn 112 3 9 External Devices 11...

Page 7: ...er data response The Thecus IP storage offers data mobility with a disk roaming feature that lets you swap working hard drives for use in other Thecus IP storage securing the con tinuity of data in th...

Page 8: ...Blinking white Diagnostic mode kick in Solid white Diagnostic completed Solid Red System with error occurred 3 HDD1 HDD4 LED Blinking white HDD activity Red HDD failure 4 LAN LED Solid white LAN Cabl...

Page 9: ...or compatible USB devices such as digital cameras USB disks and USB printers 2 LAN Port LAN port for connecting to an Ethernet network through a switch or a router 4 Reset Button Resets the N4310 Pres...

Page 10: ...al 111 If possible wear an anti static wrist strap during installation to prevent static discharge from 222 damaging the sensitive electronic components on the Thecus IP storage Be careful not to use...

Page 11: ...11 Chapter 2 Hardware Installation Press the power button on the Front Panel to boot up the Thecus IP storage 333 N4310 power button S S...

Page 12: ...IP storage IP address into your 111 browser Default IP address can be found through IntelligentNAS utility Login to the system using the administrator user name and password The factory defaults 222 a...

Page 13: ...l Item Description System Management Current system status of the Thecus IP storage Storage Information and settings for storage devices installed into the Thecus IP storage File Sharing Privilege All...

Page 14: ...n Display the status of disks installed in the system Click to go to Disk information page as short cut Network Green Connection to the network is normal Red abnormal connection to the network Logout...

Page 15: ...iewing on current Product info System Status Service Status and Logs The menu bar allows you to see various aspects of the Thecus IP storage From here you can discov er the status of the Thecus IP sto...

Page 16: ...tion 333333 From the System Management category choose the Hardware Information item and the system will display the related HW details for the associated model Below is an example of the information...

Page 17: ...e the User Access Log service to view these details Log Level ALL Provides all log information including system warning and error messages INFO Shows information about system messages WARN Shows only...

Page 18: ...iption The user access list will record different activities depending on which protocol is selected 1 AFP User login and logout 2 FTP User file deletion uploads downloads folder creation object renam...

Page 19: ...er administrators must first select the desired number of records from the dropdown list and also select the Auto export option Please choose the number of logs export and click Apply to activate thes...

Page 20: ...rror Information and warning If client has been selected then Local or Remotely can be choose Target Choose Local all system logs will be stored in an associated syslog folder filled in from next file...

Page 21: ...irm all settings See following table for a detailed description of each item Notifications Configuration Item Description Beep Notification Enable or disable the system buzzer that beeps when a proble...

Page 22: ...to save your changes Example Monday On 8 00 Off 16 00 System will turn on at 8 00 AM on Monday and off at 16 00 on Monday System will turn on for the rest of the week If you choose an on time but do...

Page 23: ...ges Config Mgmt 3333333 From the System Management category choose the Config Mgmt item and the System Configura tion Download Upload screen appears From here you can download or upload stored system...

Page 24: ...appears Press Reboot to restart the system or Shutdown to turn the system off File System Check 3333333 The File System Check allows you to perform a check on the integrity of your disks file system U...

Page 25: ...l see the following screen Click Start to begin the file system check Click Reboot to reboot the system When the file system check is running the system will show 20 lines of information until it is c...

Page 26: ...mode via LAN port From the System Management category choose the WOL item and the Wake up On LAN screen ap pears From here you can Enable or Disable SNMP Support 3333333 From the System Management ca...

Page 27: ...name Specifies the domain name of Thecus IP storage WINS Server To set a server name for NetBIOS computer DNS Mode Select the DNS server is coming from DHCP server or manual input A total of 3 DNS ser...

Page 28: ...er Ethernet 10 100 Switches Routers do not support Jumbo Frame and will not be able to connect to your Thecus NAS after Jumbo Frame is turned on Dual Power 3333333 The Thecus N4310 supports the option...

Page 29: ...f the mouse is moved over the installed disk The screen shot below is just an example from a Thecus IP Storage The disk slots number can range from 1 2 to 4 slots depending on the model of Thecus IP s...

Page 30: ...pare area This process is also known as remapping and reallocated sectors are called remaps This is why on a modern hard disks you cannot see bad blocks while testing the surface all bad blocks are hi...

Page 31: ...ut the status of your RAID volumes as well as the capacities allocated for data RAID Management Item Description Master RAID The RAID volume currently designated as the Master RAID volume ID ID of the...

Page 32: ...er RAID volume See the NOTE below for more information Stripe Size This sets the stripe size to maximize performance of sequential files in a storage volume Keep the 64K setting unless you require a s...

Page 33: ...ate this function the Encryption option needs to be en abled while the RAID is created and followed by a password input for identification Also an external writable USB disk plugged into any USB port...

Page 34: ...ption enabled will be displayed with a key lock symbol next to volume ID name Quick RAID Enabled the quick RAID setting is going to enhance RAID creation time 666 We recommend using the Quick RAID set...

Page 35: ...RAID 1111 volume building Building a RAID volume may be time consuming depending on the size of hard drives and RAID mode In general if the RAID volume building process is up to RAID Building then the...

Page 36: ...sks RAID 5 Data striping and stripe error correction information provided RAID 5 requires a minimum of 3 disks RAID 5 can sus tain one failed disk RAID 6 Two independent parity computations must be us...

Page 37: ...To remove a RAID volume follow the steps below On the RAID List screen select the RAID volume by clicking on its radio button and click RAID 111 Information to open the RAID Configuration screen On t...

Page 38: ...e hard drives in the RAID volume and allow it to automatically rebuild 111 Once rebuilt you can continue to replace any remaining disks in the RAID array 222 When you are done replacing hard drives lo...

Page 39: ...or change the RAID array all together To migrate a RAID 1 RAID 5 or RAID 6 volume follow the steps below From the RAID Configuration screen click Migrate RAID 111 A list of possible RAID migration co...

Page 40: ...ill be 222 in read only mode but read write of the user data will be possible during the operation The migration scheme below is based on Thecus IP Storage product s maximum possible combination For o...

Page 41: ...systems These can be stacked through single network access like SMB or AFP acting as a share folder type From the Control Panel the stackable feature is located under Storage Please refer the figure...

Page 42: ...the volume IP has been set you may need to input a valid user name and password to validate your access rights If there is no user name and password needed to access target volume then leave it blank...

Page 43: ...result before and after via Microsoft Network Access when settings have been completed The Browseable setting is the same method used for setting a system share folder It designates whether or not th...

Page 44: ...be able to access it and ACL button will be grayed out If Public is set to No the ACL button will be available in the Stack Target List window Click Apply to save your changes B Activate a Stack Targ...

Page 45: ...he Capacity and Status items will show as N A and Unknown file system respectively Next click Format to proceed with formatting After the format is completed the stack target volume will be created su...

Page 46: ...to setup user access permissions for the stack target The ACL settings will be exactly the same as the system folder that you may have setup previously E Reconnect a Stack Target This is used to enab...

Page 47: ...from the mounted ISO file From the Control Panel the ISO Image Mounting feature is located under Storage Please refer the figure below for reference Select the ISO Image Mounting function and the ISO...

Page 48: ...tem will automatically give an export name to the ISO file The mounting name will then be defined by the ISO file name After completion the page will display all mounted ISO files You can click Unmoun...

Page 49: ...Description Add Click to allocate space to iSCSI target from associated RAID volume Modify Click this to modify the iSCSI Target Advanced There are 3 options iSCSI CRC Checksum Max Connections Error R...

Page 50: ...r the chosen password RAID ID ID of current RAID volume LUN Allocation Two modes can be choose from Thin provision iSCSI thin provisioning shares the available physical capacity to multiple iSCSI targ...

Page 51: ...assword be reentering it in the Password Confirm box Choose Thin Provision or Instant Allocation 888 Enter a LUN Name 999 Designate the percentage to be allocated from the Allocation drag bar 1111 Whe...

Page 52: ...pacity from unused space Instant Allocation mode only From the volume list simply select the iSCSI volume you like to expand and click the Expand button You will then see the dialog box displayed belo...

Page 53: ...ing is selected when creating an iSCSI target volume virtual memory is as signed to the target allowing the physical memory to reach maximum capacity and adding new disks only when needed To setup iSC...

Page 54: ...r the iSCSI target volume created under thin provisioning virtual memory is assigned to the volume which can go up to 16384GB 16TB LUN ACL After iSCSI target has been created you are one step away fro...

Page 55: ...hown in the screen shot displayed below The listed Initiator iqn can be modified or deleted by selecting the desired iqn and pressing Modify or Delete Advance Option There are 3 available options for...

Page 56: ...ssion to be restarted on a new session by sending a iSCSI Login Request with a zero TSIHRestart all iSCSI connections on any failure ERL 1 Digest Failure Recovery ERL 1 only applies to traditional iSC...

Page 57: ...se Authentication item and the ADS Support screen appears You can change any of these items and press Apply to confirm your settings A description of each item follows ADS NT Support Item Description...

Page 58: ...figuration screen appears This screen allows you to Add Edit and Remove local users Local User Configuration Item Description Add Press the Add button to add a user to the list of local users Edit Pre...

Page 59: ...e Edit button and the Local User Setting screen appears 222 From here you can enter a new password and re enter to confirm or use the or but 333 tons to have this user join or leave a group Click the...

Page 60: ...al groups Edit Press the Edit button to modify a selected group from the system Remove Press the Remove button to delete a selected group from the system Add Groups On the Local Group Configuration sc...

Page 61: ...select a group name from the list 111 Press Remove to delete the group from the system 222 Batch Input 333333 The Thecus IP storage can also add users and groups in batch mode This enables you to con...

Page 62: ...ess the Add button and the Add Folder screen appears This screen allows you to add a folder After entering the information press Apply to create new folder Add Folder Item Description RAID ID RAID vol...

Page 63: ...ublic Admit or deny public access to this folder Apply Press Apply to create the folder Remove Folders To remove a folder press the Remove button from the specified folder row The system will confirm...

Page 64: ...ections available Unix Linux System AIX Allow source port 1024 Choose the one which best fits your needs ID Mapping There are three selections available Guest system root account will have full access...

Page 65: ...new folder will reside Folder Name Enter the name of the folder Public Admit or deny public access to this folder Apply Press Apply to create the folder Folder and sub folders Access Control List ACL...

Page 66: ...roup or user selected press one of the buttons from the three access level col 222 umns at the top The group or user then appears in that column and has that level of access to the folder Continue sel...

Page 67: ...ct the group you would like to search for the user in 222 Click Search 333 User Quota 333333 The Thecus IP storage support local or AD users with storage quota limitations in each RAID volume of the s...

Page 68: ...user and group backup feature allow system users and groups to be backed up to another location and be restored if needed Please note when restoring previous backup users and groups the current users...

Page 69: ...DAP server IP address Base Domain Input base domain information ex dc tuned dc com dc tw Bind DN or LDAP Administrator Account Input Administrator s name Password Input Administrator s password User B...

Page 70: ...ng In some environments due to security concerns you may wish to disable SMB CIFS as a precaution against computer viruses Samba Anonymous Login Authentication To enable this option no matter there is...

Page 71: ...here are 2 more setting could help to manage the recycle bin for deleted folders files Setup the Day to remove deleted folders files which has resided in recycle bin permanently 111 Left default value...

Page 72: ...s and is assigned with multiple zones assign a zone name to the Thecus IP storage If you do not want to assign a network zone enter an asterisk to use the default setting Time Machine Click the enable...

Page 73: ...files and directories on the server Available options are BIG5 HZ GB2312 GB18030 ISO EUC JP SHIFT JIS and UTF 8 Allow Anonymous FTP Access Upload Download Allow anonymous FTP users to upload or downlo...

Page 74: ...confirm your settings A description of each item follows Web Service Item Description HTTP WebDisk Support Enable or disable WebDisk support Enter the port number if this option is enabled The port nu...

Page 75: ...lticast Domain Name System service records This definitive guide walks you through Bonjour zero configuration networking with a complete description of the protocols and technologies used to create Bo...

Page 76: ...the NAS will notify the DDNS provider immediately to record the new IP address When the user tries to connect to the NAS by the host name the DDNS will transfer the recorded IP address to the user The...

Page 77: ...the router has enabled UPnP Service then you will have information come from associated router to UPnP port management as shown in the screen shot below And click Add Rule to add more port mapping fro...

Page 78: ...n 1024 and less than 65536 WebDAV SSL Service Press the Enable button to activate WebDAV SSL service and specify the port number if it needs to be changed from the default value P S The ort number is...

Page 79: ...ed From here it will display the current Thecus ID and DDNS information for the associated Thecus NAS system and also the port connection status You can click logout if remote access is no longer need...

Page 80: ...ion to activate your Thecus ID Password Input the password for your Thecus ID Confirm Password Re input the password for your Thecus ID First Name Input your First name Middle Name Input your Middle n...

Page 81: ...81 Chapter 3 System Administration...

Page 82: ...sable the iTunes Service iTunes Server Name Name used to identify Thecus IP storage to iTunes clients Password Enter a password to control access to your iTunes music Rescan Interval Rescan interval i...

Page 83: ...apter 3 System Administration Official NAS Application 333333 Click on Official NAS Application from the Application Server category it will list the current system software and official application s...

Page 84: ...emote Replication Step 1 Enabling Rsync on your target backup NAS Log in to your target backup NAS through the UI in your web browser Go to Rsync Target Server under Backup in the menu of the UI Enabl...

Page 85: ...f a task has been setup in real time then clicking Stop can terminate the running process Simple click Start to re start the real time operation Restore Restore the associated task Log Click to view t...

Page 86: ...o destination It could also create shares automatically from destination if it is not existent This only applies if the target server is the same model as the source Custom Backup The Custom backup al...

Page 87: ...le it Please make sure the associated target server also has encryption enabled Carry on with inputting valid remote target server account name and password After the settings are complete please clic...

Page 88: ...ompress the file data as it is sent to the destination machine which reduces the amount of data being transmitted something that is useful over a slow connection Backup NAS Config Enabling this will b...

Page 89: ...med on the fly Custom Backup The custom backup setting is similar to the full backup The only differences are explained below Inputs the share folder name of target sever where the source is going to...

Page 90: ...more setting appears These are the as the settings for Custom backup 333 Click Finish and the data guard task will appear in the list as shown below 444 From the task list you can now see the newly ad...

Page 91: ...backup select iSCSI backup from data guard wizard Inputs the share folder name of the target sever where the source is going to backup The 111 sub folder can be left as blank Select the iSCSI target v...

Page 92: ...SI_pmtest pmtest is the iSCSI target name when the iSCSI target was created The iSCSI backup can see the result as below The task iSCSI_pmtest has backup to target 172 16 66 131 and share folder NAS_P...

Page 93: ...ID When adding a new backup task with Full backup or Custom backup and enabling the 111 option Backup NAS Config as shows below the source unit system configurations are then backed up to the designed...

Page 94: ...ave the option to download the current system configuration before restoring from the backup file After clicking Next a screen will appear as shown below Listed on the left hand side you 444 will see...

Page 95: ...kup configuration RAID volume list which RAID volume to map to the current system Let s see the following screen to make it clearer The current system has 2 RAID volumes RAID and RAIDa Select the RAID...

Page 96: ...p the associated running task Also can be used if a task has been setup as real time clicking Stop can terminate the running process Simply click Start to re start the real time operation Restore Rest...

Page 97: ...ately Schedule Backup The task will be executed on schedule between the source and the target iSCSI Backup The iSCSI volume will be backup to the destination as a single file iSCSI Import The iSCSI fi...

Page 98: ...lected folders will be Public or not after the import Read the note s and check the Accept box for confirmation If a share name already exists for the im port then the import will be rename automatica...

Page 99: ...ask list that you have created a task And that the system has created 2 new share folders from the task just created Copy click on Copy and this screen appears 222 3 different options can be selected...

Page 100: ...100 Chapter 3 System Administration Folder to Folder Folder to external device External device to Folder...

Page 101: ...RAID volume and its associated folder list will appear same method in the target pane for the associated external device Select a folder from the source pane which is going to be copy over then selec...

Page 102: ...t you have created a task Realtime Backup click on Realtime Backup and this screen will appear 333 2 different options can be selected from folder to folder folder to external device Let s take Folder...

Page 103: ...103 Chapter 3 System Administration Next fill in the task name and related settings...

Page 104: ...between xx and xxx will execute real time backup If xx blank and xxx 2 then only file size xxx will execute real time backup Include File Type Only the associated file format will do the real time ba...

Page 105: ...ckup Item Description Task Name Input the task name length limited to 4 12 characters Create Sub folder If you choose to create a sub folder then it will use the task name as folder name then copy the...

Page 106: ...the Accept box for confirmation Now you will see in the data guard task list that you have created a task iSCSI Backup click on iSCSI Backup and screen appear as below 555 It can be backup to two dif...

Page 107: ...SCSI_iscsiv502 to volume RAID folder andy_local The source pane listed iSCSI_iscsiv502 and iSCSI_iscsiv50 where are iscsi volume has existed in this system with name iSCSI_ iscsi target volume name Ne...

Page 108: ...rt click the associated iSCSI volume will not allow to I O during backup processing And the task status will change to Processing States change to Finish after task complete From the RAID volume folde...

Page 109: ...t can be imported from two different storage pools folder to iSCSI or external device to iSCSI It is depend on where iSCSI volume has backup to Let s take example to import RAID folder to iSCSI which...

Page 110: ...tore 333333 The ACL backup and restore feature enables the system ACL Access Control List to be backed up on the RAID volume based to other location and restored if needed Let s look at the example be...

Page 111: ...and screen shot After inputting the ACL backup file and clicking the Next button the system will show another screen to list the matched folders in between the backup file and this RAID volume Just se...

Page 112: ...nd Write files folders to image Write Files folders to disc 111 Click the Add button and the NAS share list appears aaa Select files folders which you would like to burn All of the selected folders fi...

Page 113: ...ccc check the status once the disc is inserted Select the burning speed from the drop down list ddd Select whether disc data verification is required or not eee Click Burn to start disc burning fff Wr...

Page 114: ...t eee Click Burn to start disc burning fff Create image file from files folders 333 Click the Add button and the NAS share list will appear aaa Select the files folders which you would like to burn Al...

Page 115: ...he following section shows you how Printers 333333 From the External Devices menu choose the Printer item and the Printer Information screen ap pears This screen provides the following information abo...

Page 116: ...RESS 631 printers usb printer into the URL field Your Windows system will ask you to install drivers for your printer Select the correct driver 777 for your printer Your Windows system will ask you if...

Page 117: ...ireless or Bluetooth printer 333 Select The printer that I want isn t listed 444 You can press The printer that I want isn t listed to go into next page without waiting for Searching for available pri...

Page 118: ...Thecus_NAS_IP is the IP address of Thecus IP storage Click Next Select or install a printer and then press OK 666 Windows will attempt to connect to the printer 777 You can choose to set this printer...

Page 119: ...119 Chapter 3 System Administration Done Click Finish 999...

Page 120: ...the UPS device is connected to via USB or RS232 Input the IP address of your network UPS Manufacturer Choose the UPS manufacturer from the dropdowns Model Choose the UPS model number from the dropdown...

Page 121: ...rization RMA feel free to contact technical support via our Technical Support Website http www thecus com sp_tech php Customers in the US should send all technical support enquiries to the US contact...

Page 122: ...els 0 1 5 6 10 and JBOD You choose a RAID level when you create a system volume The factors for selecting a RAID level are Your requirements for performance Your need for data security Number of hard...

Page 123: ...erance as mirroring alone High I O rates are achieved by striping RAID 1 segments Under certain circumstances RAID 10 array can sustain up to 2 simultaneous drive failures Excellent solution for appli...

Page 124: ...S Benefits ADS lets Thecus IP storage integrate itself with the existing ADS in an office environment This means the Thecus IP storage is able to recognize your office users and passwords on the ADS s...

Page 125: ...rnia Berkeley and its contributors This product includes software developed by Winning Strategies Inc This product includes software developed by the Apache Group for use in the Apache HTTP server pro...

Page 126: ...are and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Pu...

Page 127: ...program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program o...

Page 128: ...o print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and...

Page 129: ...by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are n...

Page 130: ...he is willing to distribute software through any other system and a licensee cannot im pose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the re...

Page 131: ...AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AG...

Reviews: