Open-E DATA STORAGE SERVER

Total Page:16

File Type:pdf, Size:1020Kb

Open-E DATA STORAGE SERVER Open-E DATA STORAGE SERVER Manual (Ver. 5.00 up49) November 19, 2008 2 1 Before you get started .............................................................................. 5 1.1 Contents of this package ..................................................................................... 5 1.2 System requirements ............................................................................................ 5 1.3 Supported clients ................................................................................................. 5 1.4 Supported network protocols ............................................................................... 6 1.5 Supported network file protocols ......................................................................... 6 1.6 Required tools ...................................................................................................... 6 1.7 Safety precautions ................................................................................................ 6 1.7.1 Personal safety ............................................................................................ 6 1.7.2 Safety for your data ..................................................................................... 6 1.7.3 ESD precautions .......................................................................................... 6 2 Features ..................................................................................................... 7 2.1 What is Open-E Data Storage Server ................................................................... 7 2.2 DSS functionality .................................................................................................. 8 2.3 Why Open-E Data Storage Server? ...................................................................... 8 2.4 RAID types ............................................................................................................ 9 3 Hardware installation .............................................................................. 10 3.1 Getting ready ...................................................................................................... 10 3.2 Installing Open-E Data Storage Server .............................................................. 10 4 Configuration ........................................................................................... 12 4.1 The basic configuration of the Data Storage Server computer ......................... 12 4.2 First-time operation of Open-E Data Storage Server ......................................... 12 4.3 Logging into Open-E Data Storage Server ........................................................ 13 4.4 Create Disk Array ................................................................................................ 15 4.5 Adding Disk Array ............................................................................................... 15 4.6 Creating Open-E Data Storage Server shares ................................................... 17 4.6.1 Access to Windows Shares ....................................................................... 17 4.6.2 Accessing Open-E Data Storage Server shares under Linux ................... 22 4.7 Creating Open-E Data Storage Server iSCSI targets volume ............................ 22 4.7.1 Configuring end user workstation ............................................................. 24 5 Functions ................................................................................................. 25 5.1 Console display functions .................................................................................. 25 5.2 Functions of Open-E Data Storage Server via browser access ........................ 27 5.2.1 SETUP ........................................................................................................ 27 5.2.1.1 Network ......................................................................................... 27 5.2.1.1.1 Interfaces .................................................................................... 27 5.2.1.1.2 iSCSI Failover .............................................................................. 32 5.2.1.2 Administrator ................................................................................. 38 5.2.1.3 H/W RAID ...................................................................................... 43 5.2.1.4 S/W RAID ...................................................................................... 43 5.2.1.5 Fibre Channel ............................................................................... 49 5.2.1.6 iSCSI Initiator ................................................................................. 50 5.2.1.7 Hardware ...................................................................................... 52 5.2.1.8 GUI ................................................................................................ 56 5.2.2 CONFIGURATION ..................................................................................... 56 5.2.2.1 Volume manager .......................................................................... 56 5.2.2.2 NAS settings ................................................................................. 64 5.2.2.3 NAS resources .............................................................................. 96 5.2.2.3.1 Shares ......................................................................................... 96 5.2.2.3.2 Users ......................................................................................... 107 3 5.2.2.3.3 Groups ...................................................................................... 111 5.2.2.4 iSCSI target manager ................................................................. 113 5.2.2.5 FC target manager ..................................................................... 118 5.2.2.5.1 Groups ...................................................................................... 118 5.2.2.5.2 WWN Aliases............................................................................. 120 5.2.3 MAINTENANCE ....................................................................................... 123 5.2.3.1 Shutdown .................................................................................... 123 5.2.3.2 Connections ................................................................................ 124 5.2.3.3 Snapshot ..................................................................................... 125 5.2.3.4 Backup ........................................................................................ 128 5.2.3.4.1 Backup devices ........................................................................ 128 5.2.3.4.2 Backup tasks ............................................................................ 131 5.2.3.4.3 Data replication ......................................................................... 134 5.2.3.5 Restore ........................................................................................ 136 5.2.3.6 Antivirus ...................................................................................... 140 5.2.3.7 Miscellaneous ............................................................................. 142 5.2.3.8 Software update .......................................................................... 144 5.2.4 STATUS .................................................................................................... 145 5.2.4.1 Network ....................................................................................... 145 5.2.4.2 Logical volume ............................................................................ 146 5.2.4.3 Connections ................................................................................ 147 5.2.4.4 System ........................................................................................ 148 5.2.4.5 Hardware .................................................................................... 149 5.2.4.6 Tasks ........................................................................................... 155 5.2.4.7 S.M.A.R.T. ................................................................................... 157 5.2.5 HELP ........................................................................................................ 159 5.2.5.1 Software License ........................................................................ 159 5.2.5.2 About Data Storage Server ......................................................... 159 6 Troubleshooting Guide ......................................................................... 161 7 Appendix A ............................................................................................ 164 8 Appendix B ............................................................................................ 166 4 Copyright (c) 2004 Open-E GmbH. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form, by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written consent of Open-E GmbH, Lindberghstr. 5, 82178 Puchheim, Germany. Trademarks Open-E and Open-E Data Storage Server (DSS) logos are all registered trademarks of Open-E GmbH. Windows ((R)), Microsoft ((R)) and Apple ((R)) are registered trademarks in the United States and other countries. Pentium ((R)) and Intel ((R)) are registered trademarks in the United States and other countries. All other trademarks herein are property of their respective owners. Disclaimer
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • The New Standard for Data Archiving
    The new standard for data archiving 1 Explosively increasing 2 Why data management digital data is important Ever-increasing volumes of digital data are mounting up every day due to rapidly growing Today, files can be lost from computers in any number of ways—you might accidentally internet technology, widespread use of SNS, data transmission between network- connected delete a file, a virus might wipe one out, or there could be a complete hard drive failure. devices, and other trends. Within the video production industry, data-heavy video content When a hard drive dies an untimely death, it can feel like a house has burnt down. (for example, 4K, 8K, and 4K/8K high-frame-rate video) is becoming a major source of video Important personal items are usually gone forever—photos, significant documents, broadcasting. Many companies and research institutes are creating high volumes of data downloaded music, and more. (big data) for use in AI systems. Somehow, these newly created assets need to be managed effectively, stored safely, and utilized along with the old assets. There are many options for backing up content without any sophisticated equipment—you can 163,000 EB use DVDs, external hard drives, optical discs, or even online storage. It’s a good idea to back up data to multiple places. Computer Natural Viruses Disasters 4% Other 2% 40,026 EB 3% 2,837 EB 8,591 EB 1,227 EB Software Corruption 9% 2010 2012 2015 2020 2025 System/ Hardware 1 EB = 1,000,000 TB Malfunction 56% User Error Performance 26% Source: Ontrack Data Recovery High Performance www.ontrack.co.uk/understandingdataloss E-commerce, Financial HOT SSD RAM Capacity Optimized Back O­ce, General Service WARM HDD Sony's Optical Disc Archive storage system offers the solution, Long-Term Archive COLD with a low total cost of ownership through the use of long-life Auto Loader, O-line Tape Optical Disc Cost media, and it includes inter-generational compatibility based on the same optical disc technology used in DVDs and Blu-ray discs.
    [Show full text]
  • CERBERUS FTP SERVER 8.0] User Manual for Cerberus FTP Server 8.0
    V.8 Cerberus, LLC Grant Averett [CERBERUS FTP SERVER 8.0] User manual for Cerberus FTP Server 8.0. It contains detailed steps and help on configuring Cerberus FTP Server. CONTENTS Introduction .............................................................................................................................................. 11 Description ........................................................................................................................................... 11 Guide .................................................................................................................................................... 11 Minimum System Requirements .............................................................................................................. 12 Hardware Requirements ...................................................................................................................... 12 Operating Systems ................................................................................................................................ 12 Cerberus FTP Server 5.0, 6.0, and 7.0 ............................................................................................... 12 Cerberus FTP Server 8.0 and higher ................................................................................................. 12 Installation ................................................................................................................................................ 13 Upgrading an Existing Installation ............................................................................................................
    [Show full text]
  • Restoring in All Situations
    Restoring in all situations Desktop and laptop protection 1 Adapt data restore methods to different situations Executive Summary Whether caused by human error, a cyber attack, or a physical disaster, data loss costs organizations millions of euros every year (3.5 million euros on average according to the Ponemon Institute). Backup Telecommuting Office remains the method of choice to protect access to company data and ensure their availability. But a good backup strategy must necessarily be accompanied by a good disaster recovery strategy. Nomadization The purpose of this white paper is to present the best restore practices depending on the situation you are in, in order to save valuable time! VMs / Servers Apps & DBs NAS Laptops Replication 2 Table of Contents EXECUTIVE SUMMARY .......................................................................................................................... 2 CONTEXT ................................................................................................................................................ 4 WHAT ARE THE STAKES BEHIND THE RESTORING ENDPOINT USER DATA? ................................. 5 SOLUTION: RESTORING ENDPOINT DATA USING LINA ................................................................... 6-7 1. RESTORE FOR THE MOST NOVICE USERS ................................................................................ 8-10 2. RESTORE FOR OFF SITE USERS ................................................................................................11-13 3. RESTORE FOLLOWING LOSS,
    [Show full text]
  • IBM Connect:Direct for Microsoft Windows: Documentation Fixpack 1 (V6.1.0.1)
    IBM Connect:Direct for Microsoft Windows 6.1 Documentation IBM This edition applies to Version 5 Release 3 of IBM® Connect:Direct and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1993, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. Release Notes.......................................................................................1 Requirements...............................................................................................................................................1 Features and Enhancements....................................................................................................................... 2 Special Considerations................................................................................................................................ 3 Known Restrictions...................................................................................................................................... 4 Restrictions for Connect:Direct for Microsoft Windows........................................................................ 4 Restrictions for Related Software.......................................................................................................... 6 Installation Notes.........................................................................................................................................6
    [Show full text]
  • A Survey of Distributed File Systems
    A Survey of Distributed File Systems M. Satyanarayanan Department of Computer Science Carnegie Mellon University February 1989 Abstract Abstract This paper is a survey of the current state of the art in the design and implementation of distributed file systems. It consists of four major parts: an overview of background material, case studies of a number of contemporary file systems, identification of key design techniques, and an examination of current research issues. The systems surveyed are Sun NFS, Apollo Domain, Andrew, IBM AIX DS, AT&T RFS, and Sprite. The coverage of background material includes a taxonomy of file system issues, a brief history of distributed file systems, and a summary of empirical research on file properties. A comprehensive bibliography forms an important of the paper. Copyright (C) 1988,1989 M. Satyanarayanan The author was supported in the writing of this paper by the National Science Foundation (Contract No. CCR-8657907), Defense Advanced Research Projects Agency (Order No. 4976, Contract F33615-84-K-1520) and the IBM Corporation (Faculty Development Award). The views and conclusions in this document are those of the author and do not represent the official policies of the funding agencies or Carnegie Mellon University. 1 1. Introduction The sharing of data in distributed systems is already common and will become pervasive as these systems grow in scale and importance. Each user in a distributed system is potentially a creator as well as a consumer of data. A user may wish to make his actions contingent upon information from a remote site, or may wish to update remote information.
    [Show full text]
  • File Server Scaling with Network-Attached Secure Disks
    Appears in Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics ‘97), Seattle, Washington, June 15-18, 1997. File Server Scaling with Network-Attached Secure Disks Garth A. Gibson†, David F. Nagle*, Khalil Amiri*, Fay W. Chang†, Eugene M. Feinberg*, Howard Gobioff†, Chen Lee†, Berend Ozceri*, Erik Riedel*, David Rochberg†, Jim Zelenka† *Department of Electrical and Computer Engineering †School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213-3890 [email protected] http://www.cs.cmu.edu/Web/Groups/NASD/ Abstract clients with efficient, scalable, high-bandwidth access to stored data. This paper discusses a powerful approach to fulfilling this By providing direct data transfer between storage and client, net- need. Network-attached storage provides high bandwidth by work-attached storage devices have the potential to improve scal- directly attaching storage to the network, avoiding file server ability for existing distributed file systems (by removing the server store-and-forward operations and allowing data transfers to be as a bottleneck) and bandwidth for new parallel and distributed file striped over storage and switched-network links. systems (through network striping and more efficient data paths). The principal contribution of this paper is to demonstrate the Together, these advantages influence a large enough fraction of the potential of network-attached storage devices for penetrating the storage market to make commodity network-attached storage fea- markets defined by existing distributed file system clients, specifi- sible. Realizing the technology’s full potential requires careful cally the Network File System (NFS) and Andrew File System consideration across a wide range of file system, networking and (AFS) distributed file system protocols.
    [Show full text]
  • An Advanced Solution for Long-Term Retention of Enterprise Digital
    Data Management, Simplified. Enterprise Edition An Advanced Solution for Long-term Retention of Enterprise Digital Assets A centrally managed, secure archive is a key requirement for today’s enterprises, which must contend with exponential growth in data volumes, long-term retention requirements, and e-discovery mandates. Atempo Digital Archive, Enterprise Edition, is a comprehensive solution that addresses each of these data archiving challenges. Providing capabilities for both automatically and manually archiving data in long-term storage platforms, Atempo Digital Archive ensures that all corporate data is easy to find and access for as long as it needs to be retained. An Answer to Each Archiving Need Addressing Today’s Storage Management Challenges Enabling the Long-term Retention of Digital Assets Today, organizations must manage more, and more Digital information represents both the lifeblood of a critical, data than ever before—and data volumes continue business today, and the basis of records that may need to grow at an explosive pace. Traditional backup and to be accessed for generations. With its integrated recovery solutions have proven ill-equipped to keep up capabilities for full content indexing, search, and metadata with these demands. To ensure these increasing volumes indexing, Atempo Digital Archive allows users to retrieve of critical information are always available when needed, information quickly and easily. In addition, it offers organizations require advanced new archiving capabilities. refreshing mechanisms that verify whether storage Atempo Digital Archive is the one solution that enables media is still readable, and that ensure information IT organizations to address their storage management can continue to be accessed on an ongoing basis.
    [Show full text]
  • Overview Addressing Today's Storage Management Challenges Enabling
    DATA PROTECTION ATEMPO-DIGITAL ARCHIVE High performance file archiving software for large data volumes OVERVIEW A centrally managed, secure archive is a key requirement for today’s enterprises, which must contend with exponential growth in data volumes and long-term retention requirements. Atempo-Digital Archive is a comprehensive solution that addresses each of these data archiving challenges. Providing capabilities for both automatically and manually archiving large data volumes in long-term storage platforms, Atempo-Digital Archive ensures that all corporate data is easy to find and access for as long as it needs to be retained. ADDRESSING TODAY’S STORAGE MANAGEMENT CHALLENGES Today, organizations must manage more critical data than ever before - and data volumes continue to grow at an explosive pace. Traditional backup and recovery solutions have proven ill-equipped to keep up with these demands. To ensure these increasing volumes of critical information are always available when needed, organizations require advanced new archiving capabilities. Atempo-Digital Archive (ADA) is the one solution that enables IT organizations to address their storage management challenges today and in the long term. By managing data in a secure, centrally-managed archive, Atempo-Digital Archive represents the most efficient, reliable, and cost-effective way to protect critical business information. This solution ensures that an organization’s most valuable data is organized and easily accessible - while at the same time freeing up expensive disk space, lowering storage costs, and reducing the backup window for data that is infrequently accessed. ENABLING THE LONG-TERM RETENTION OF DIGITAL ASSETS Digital information represents both the lifeblood of a business today, and the basis of records that may need to be accessed for generations.
    [Show full text]
  • IT Acronyms.Docx
    List of computing and IT abbreviations /.—Slashdot 1GL—First-Generation Programming Language 1NF—First Normal Form 10B2—10BASE-2 10B5—10BASE-5 10B-F—10BASE-F 10B-FB—10BASE-FB 10B-FL—10BASE-FL 10B-FP—10BASE-FP 10B-T—10BASE-T 100B-FX—100BASE-FX 100B-T—100BASE-T 100B-TX—100BASE-TX 100BVG—100BASE-VG 286—Intel 80286 processor 2B1Q—2 Binary 1 Quaternary 2GL—Second-Generation Programming Language 2NF—Second Normal Form 3GL—Third-Generation Programming Language 3NF—Third Normal Form 386—Intel 80386 processor 1 486—Intel 80486 processor 4B5BLF—4 Byte 5 Byte Local Fiber 4GL—Fourth-Generation Programming Language 4NF—Fourth Normal Form 5GL—Fifth-Generation Programming Language 5NF—Fifth Normal Form 6NF—Sixth Normal Form 8B10BLF—8 Byte 10 Byte Local Fiber A AAT—Average Access Time AA—Anti-Aliasing AAA—Authentication Authorization, Accounting AABB—Axis Aligned Bounding Box AAC—Advanced Audio Coding AAL—ATM Adaptation Layer AALC—ATM Adaptation Layer Connection AARP—AppleTalk Address Resolution Protocol ABCL—Actor-Based Concurrent Language ABI—Application Binary Interface ABM—Asynchronous Balanced Mode ABR—Area Border Router ABR—Auto Baud-Rate detection ABR—Available Bitrate 2 ABR—Average Bitrate AC—Acoustic Coupler AC—Alternating Current ACD—Automatic Call Distributor ACE—Advanced Computing Environment ACF NCP—Advanced Communications Function—Network Control Program ACID—Atomicity Consistency Isolation Durability ACK—ACKnowledgement ACK—Amsterdam Compiler Kit ACL—Access Control List ACL—Active Current
    [Show full text]
  • Optical Disc Archive File Manager2
    5-000-611-15(1) Optical Disc Archive File Manager2 Help ODS-FM2 © 2018 Sony Imaging Products & Solutions Inc. Overview ODS-FM2 is a software application for archiving and retrieving using the Optical Disc Archive System. In addition to systems using ODS-L10 and ODS-L30M devices, it can also be used with drive units connected directly to a server. ODS-FM2 can be used to manage not just cartridges inserted in an Optical Disc Archive System, but also cartridges for shelf management. 2 File Manager Mode This section describes the screens and operation in File Manager mode. • Archive screen • Archiving • Archiving using watched folders • Retrieving • Displaying/editing file metadata • Deleting cartridge information • Deleting files/folders on cartridges • Duplicating cartridges • Adding a network drive Archive Screen Archive and retrieve operations are performed from this screen. The Archive screen is made up of the following sections. (1) (2) (3) (4) Common operations Tree area (left side of Desktop/Library area) • Multiple selections are not supported. List area (right side of Desktop/Library area, Job area, [Placeholder] dialog) The operating method is analogous to both Explorer (Windows) and the Finder (macOS). • Select multiple files using the Shift key, Ctrl key (Windows), and Command key (macOS). • Select all files using Ctrl+A (Windows) or Command+A (macOS). 3 (1) Global menu Click the icons to move between screens. • (Archive): Displays the Archive screen to perform archive/retrieve operations. • (Settings): Displays the Settings screen. • (Help): Displays the Help and version information. • (Logout): Logs the user out. (2) Desktop area Displays the folders and files on the local computer and computers on the network.
    [Show full text]
  • Gigabit Ethernet Hard Drive User Guide
    Gigabit Ethernet Hard Drive User Guide Contents Introduction ...................................................................................2 Controls, Connectors and Indicators .................................................2 Front Panel Area ...............................................................................2 Rear Panel Area ................................................................................3 About the Hard Disk ..........................................................................4 Locating NAS Drive on Your Desk ......................................................5 Bundled Software ..............................................................................5 Finder.exe ........................................................................................5 Backup Software ..............................................................................5 TorrentFlux .......................................................................................5 Connecting To Your Network ..............................................5 About NAS Drive User Accounts ........................................................7 Connecting The NAS Drive To Your LAN ............................................8 Web-Based Administration Tool .....................................................10 Administration Login .....................................................................10 Basic Settings For Initial Setup ......................................................11 NAS Drive Operation .............................................................17
    [Show full text]