0% found this document useful (0 votes)
91 views101 pages

Tyrone Storage Manual

The document provides a comprehensive manual for logging into and managing the OPSLAG FS2 system, including instructions for accessing system information, configuring network settings, and managing shares. It details various features such as sensor information, volume group status, and authentication settings, along with options for SMB, NFS, and FTP sharing. Additionally, it covers permissions, ACL settings, and the creation and management of shares within the system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views101 pages

Tyrone Storage Manual

The document provides a comprehensive manual for logging into and managing the OPSLAG FS2 system, including instructions for accessing system information, configuring network settings, and managing shares. It details various features such as sensor information, volume group status, and authentication settings, along with options for SMB, NFS, and FTP sharing. Additionally, it covers permissions, ACL settings, and the creation and management of shares within the system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 101

Tyrone OPSLAG FS2 3.

8
Manual

1
INTRODUCTION
Log in

To log in to the system, first acquire the IP address of the box. The default IP of
OPSLAG FS2 is 192.168.0.56 . After Logging, run a browser (preferably Mozilla
Firefox) from any machine on the same network and access the IP.

Fig. 1.0

Fig -1.0 here you have to select either you want to login as a user with Full Rights
(Full Access) or as a user with restricted rights (Users). Once you have selected,
provide the relevant password and click on the Submit button”

OPSLAG FS2

Default IP – 192.168.0.56
User type : Full Access
Default Password – opslag

2
Resource
Resource Information

OS Information
The default page seen after logging in full access mode is Os Information under
Resource Information .This page lists OS Information of the system as well as Host
and Remote IP as well.
From this section of the screen you can see, the box has RAM and a single
Xeon CPU. The name of the machine is OPSLAG and it is up Time. The IP address
of the server is 192.168.0.56 and the client accessing it is 192.168.0.175. The
CPU load , memory consumption builds and show you the serial number of the
box as well.”

Fig .1.0.1
Fig 1.0.1 Shows the options which are present in OS Information.

3
Sensor Information:

Fig 1.0.2
Fig-1.0.2 this section gives you information and alerts based on the system
sensors. So for instance from here you will be able to see if the temperature of the
CPU/s, RAID Controller are proper. It also gives you a colour coded warning in case
of any threshold is crossed. It also tells you the speed of all the fans installed in
the box and gives you warning in case of any power supply failure or if the chassis
is open (intrusion)”

4
Volume Group Information:

Fig 1.0.3
Fig-1.0.3 this will quickly give you a status of how many Volume Group is created
in the box and what is the total and available space in them.

Disk Information

Fig-1.0.4
Fig-1.0.4 from here you can get a quick update on how many Logical volumes are
created and how much space is used (in %). It also tells over which protocol these
logical volumes are shared.

5
Date and Time Settings
There are three sub options present:

Manual: There is a small calendar icon on the right side. This will pop up a
window to select the date and at the bottom to set the time manually. There
is a time zone option to be set which is drop down.

Use this PC Time: Opslag FS2 time will be synchronized with the time of the
machine you are logged into currently and accessing the interface.

NTP Server: You need to provide a NTP server name with which Opslag FS2
time will synchronize in regular time intervals.
After setting the Date and Time click on Apply to save the changes.

Fig 1.0.5
“Here the first option (Manual) is been selected and calendar button is pressed to
show the calendar which lets the user select the date and time easily.”

6
NTP Server Time:
Network Time Protocol (NTP) is a networking protocol for clock synchronization
between computer systems over packet-switched, variable-latency data networks.
so Network Time Protocol is a dedicated server through time is synchronize all the
time.

Fig 1.0.6
Network Settings:
This option Helps to change all the network related configurations,name of the
FS2 Storage,the IP Address gateways , DNS configurations, Bonding of network
interfaces.

7
Host name:
Option to change the name of the FS2 storage Box.

Fig 1.0.7

Shows all the sub options which comes under network category and to change
the host name Provide the new name at the input box with the present name and
then click apply.

Network Information

This section helps to identify the LAN cards and configure the same. By Left Click
on the Icon you will get the all Information like Model ,Status,IP Address,
Mask,Identity, Edit Network.

8
Fig 1.0.8
This section lets you identify and configure the LAN cards. Blink : On clicking the
Identify button activates the LED of that particular LAN card and helps to identify
it in the box.
EthX: On the click of the Ethernet Card 'ethx' will pop up a window to Edit Network
and Gateway for that particular card. Please see the image below.”

Fig. 1.0.9
Fig 1.0.9 Enter the desired IP, Net mask and gateway for the particular Eth device.
click on the Apply button to save the changes.”

9
DNS Configuration:

Option to provide the IP address of the DNS (Domain Name System) server for
the Internet name resolution.

Click on apply to save the changes.

Fig 1.1.0
Here you can see, the DNS address is configured to a local DNS server from the
same

Ethernet Teaming/Aggregation

This option helps to provide methods to combine multiple network combinations


of
multiple network connections in parallel to increase throughput beyond what a
single connection could sustain, and also to provide redundancy in case some of
the links fail.
Bond Name :Enter the name which is suitable to you.
Choose Ethernet Devices: Choose the devices which you want to add in the
bond if you use the device which is already being used then user connected
through that device will get disconnected.
IP Address:Choose the IP address which is not being used before.
Net Mask: According to IP Address select the Netmask.
Gateway : Enter the gateway which you want to use for Communication , you
can leave it blank as well or default gateway.
Bond Type:
balance-rr: Round-robin policy: Transmit packets in sequential order from the
first available slave through the last. This mode provides load balancing and fault

10
tolerance.
Active backup: Only one slave in the bond is active. A different slave becomes
active if, and only if, the active slave fails. The bond's MAC address is externally
visible on only one port (network adapter) to avoid confusing the switch. This
mode provides fault tolerance. The primary option affects the behavior of this
mode.

Balance Xor: Transmit based on [(source MAC address XOR'd with destination
MAC address) modulo slave count]. This selects the same slave for each
destination MAC address. This mode provides load balancing and fault tolerance.

Broad Cast: Transmits everything on all slave interfaces. This mode provides
fault tolerance.
Balance tlb: Adaptive transmit load balancing: channel bonding that does not
require any special switch support. The outgoing traffic is distributed according to
the current load (computed relative to the speed) on each slave. Incoming traffic
is received by the current slave. If the receiving slave fails, another slave takes
over the MAC address of the failed receiving slave.
802.3ad : It is the most complex bonding technique enabled on the storage
nodes. It
provides for Link Aggregation. They require switch support and link aggregation is
dynamic in both the directions.
Balance alb: Adaptive load balancing: includes balance-tlb plus receive load
balancing (rlb) for IPV4 traffic, and does not require any special switch support.
The receive load balancing is achieved by ARP negotiation. The bonding driver
intercepts the ARP Replies sent by the local system on their way out and
overwrites the source hardware address with the unique hardware address of one
of the slaves in the bond such that different peers use different hardware
addresses for the server.

11
Fig 1.1.1
Here you can Select by default balance alb .
Delete/Modify Bond :
To delete or to modify bond left click on bond and we will get the option modify
and Remove option.

Fig 1.1.2

12
Authentication Settings:
This option allows you to Choose a server for Authentication. Choose any one of
four option and click on “Apply” button.

Local Server : Local server option is use full for taking authentication Locally.

Fig 1.1.3

13
Network Information Server:
NIS Authentication required IP address and Domain name of NIS server.

Fig 1.1.4

Active Directory Server:

Active Directory Server required user name , Password , FQDN(fully qualified


domain name),DNS .These information you can get for ADS.

Fig 1.1.5

14
LDAP: Lightweight Directory Access Protocol (LDAP):

LDAP is an open, vendor-neutral, industry standard application protocol for


accessing and maintaining distributed directory information services over an
Internet Protocol (IP) network.

Fig 1.1.6

15
NAS
Share:

Helps you to attach to the NAS, protocols supported this mode are SMB, NFS and
FTP.
This option allows you to create and configure a Share, provide quota to
pr-created users or groups.
Here as we can see that Blue Color represent Node1 and Red Color represent
Node2 ,so basically this page show all the share which are part of Node1 and
Node2.

Fig 2.0.0

16
Create Share:

For Creating any Share on the Icon indicated below. Then you will get the window
like in figure.

Fig 2.0.1
You can fill the name which you want and default location will come but if you
want to change the location you can click on custom location option check box
and select the location.
Click on Create its done of creation on share.
Click on this NAS , Share button to go back and check the shares.

17
Fig 2.0.2
After going into shares left click on the share on which you want to work and you
will see the window like figure 2.0.3

Fig-2.0.3

18
Edit the Share:

This tab will help you to Edit the Comment on share , you can not edit the name
or location of the share.

Fig 2.0.4

19
SMB Settings:
You can enable the SMB sharing for the share by just selecting the “Use SMB”
check box. The rest of the options are to set the permissions and visibility. Clicking
on the Read only will mark the share as read only and clicking on the Visible will
make the share visible. In the “User access permissions” section, you can select
Guest if you want to let the windows Guest user access the share.
The Public option will enable universal access for the share. The Authenticated
User option will set the share to be accessible by either the internal users of FS4
or through an ADS or LDAP users.

Fig 2.0.5

Above Fig. Shows for Public users but if you want to work for Authenticated user
then Click on Radio Button of Authenticated user and you will get the window like
the fig 2.0.6 Below one.
Now you can select the domain and user according to your wish and what
privileged you want for that user.
Update Configuration will set the SMB Setting for share.

20
Append Mode:

Next Option is Append Mode bit more will let you see the “Append Mode Settings”.
It is a very unique feature of OPSLAG. This feature is useful in case if multiple
users are accessing a single folder, then this mode could be enabled to restrict
accidental deletion of file by any of the authorized users.
This is essentially full access without deletion rights.

Fig 2.0.6

When you enable append mode, it only restricts the file which exist at the point
enabling the Append Mode. The file created afterwards can be deleted.

21
AFP Settings:
Apple file Protocol is used for accessing data from Mac OS X. This is like SMB in
Mac machine.
Share permissions, and ownership and properties need to be set as we do for SMB
according to that our requirement .

Fig 2.0.7

Authentication user or Guest Mode can be Selected but Authentication mode is


recommended for security purpose.

22
NFS Mode:
This section you can enable the NFS sharing for the selected folder. It is as
simple as just checking on the “Use NFS” check box and click on the “Configure
button. “

no_root_squash: By default, any file request made by user root on the client
machine is treated as if it is made by user nobody on the server. If
no_root_squash is selected, then root on the client machine will have the same
level of access to the files on the system as root on the server. This can have
serious security implications, although it may be necessary if you want to perform
any administrative work on the client machine that involves the exported
directories. You should not specify this option without a good reason.

no_wdelay (Write disk as soon as possible) NFS has an optimization algorithm


that delays disk writes if NFS deduces a likelihood of a related write request soon
arriving. This saves disk writes and can speed performance.

insecure_locks: Some NFS clients don't send credentials with lock requests, and
hence work incorrectly with secure_locks., in which case you can only lock
world-readable files. If you have such clients, either replace them with better
ones, or use the insecure_locks option.

insecure: Requires that requests originate on a specific port .

synchronous :Reply only after disk write,Replies to the NFS request only after all
data has been written to disk. This is much safer than async, and is the default in
all nfs-utils versions after 1.0.0.
all_squash: Convert incoming requests, from ALL users, to the anonymous uid
and gid.

Fig 2.0.8

23
FTP Setting:
The File Transfer Protocol (FTP) is a standard network protocol used to transfer
computer files from one host to another host over a PCT-based network, such as
the Internet.
From here you can enable the share over FTP. All you have to do is to click on the
check box and then press the “Configure” button and you are done.

Fig 2.0.9

Here are two option Anonymous mode and Authentication mode.


In Anonymous mode you need to enter the IP Address of Access machine IP and
write machine IP and you are done

In Authentication mode you can select specific user for communication .

ACL Settings:
“Access Control Settings”. Here you can select the rights and users for different
sub folders inside the share. This will be only applicable if you have selected
“Authenticated Users” in the previous section. Here all you have to do is to select
the file/folders and then select the users from the ‘Available Users column and
move them to ‘Authorized users’ column. Once added , you can one by one set
the permissions for the users.”

First of All set the path before you begin.

24
Fig 2.1.0

Create ACL:
After Selecting Path you need to Create share for that select Domain and Select
the user and group for your need and if ADS is connected then ADS uses will come
here automatically.

Fig 2.1.1

25
Share Permissions:

Here Read, Write and Execute permissions can be set for the specific share for
'Owner', 'Group', and 'Others'. When the permissions are set for a share, the
folder which is shared with the share name inherits the given permissions. If you
would like to inherit the permissions to sub-folders with in the shared folder, click
the option 'Inherit permissions to sub- folders'. In this case, the permissions are
set recursively to the sub-folders.”
In open Source software if write permission is given that mean delete permission
is also being given to that folder.

Fig 2.1.2

Read – only visible and user can copy .


Write – user can Paste + delete in the folder.
Execute- user can open that folder.

26
Share Ownership:
From here the share can be assigned to a specific user selected by Clicking on
Change USER and Change Group option. Ownership can be inherited to
sub-folders by clicking the 'Inherit ownership to sub-folders' option.

Fig 2.1.3
ACL User/Group Info:
It help us to Know the ACL user and group permissions , we can Remove any user
or Group from ACL By click on the option Remove.

Fig 2.1.4

27
Remove ACL:
Before Removing ACL Please check the Path which is set for ACL .Recursive option
is helpful removing all the share which is inside that share.

Fig 2.1.5
Properties:
Share Properties option help you to Set SMB Settings and AFP Setting by Directory
Mask and Create Mask.

Fig 2.1.6

28
Directory Mask
This really the same concept as create mask but it applies to directories not files.
Just remember that if you want any of the 3 groups (owner, group, other) to be
able to at least access a directory, set the read AND execute permissions. There
are many factors that may affect this parameter.
That should be enough information to get the newcomer on their way to using
directory and file masks. For more information see the man or info pages for, ls,
chmod, and smb.conf.

Create Mask:

This setting tells samba what permissions to mask against the DOS/Windows
assigned permissions for a new file when it is created from a Windows/DOS client.
This means that if a permission isn't indicated in this create mask parameter, then
it won't be assigned to the file when created. This applies to files only, not
directories. There are many factors that may affect this parameter so for detailed
information see the man or info pages for smb.conf.

Quota Configuration:
The next option in the NAS settings option is the Quota configuration. In this
section you can set fixed quota for created users and groups. The process is
very simple .Here we will tell you how you can do that. To start with first go to NAS
and then click on the Quota Button.

Fig 2.1.7
These are the sub options of quota configurations User Quota and its details.
You will see a section like this. It is very simple to allocate Quota either for a user
or for a group. If you are setting quota for a user, click on the ‘Users’ radio button

29
and in the column next to it, you will see all the local users available in the FS2
box. Click on a user and then at the bottom of the section, in the “Size” Field fill
in the amount of disk space (in GB) you want to assign to the selected user. And
hit the enter button.
Assigning the quota to the Group is also very similar to assigning the quota to the
user.
Select the group from the list and provide the quota amount (in GB) in the Size
field.”

User Quota Details:

The Next tab is “user Quota Details” this section lets you see the quota amount
configured for each user or group. Just select the type (User or Group) and from
the drop down select the particular user or group. It will show you the information.
And when it prints the information, it will also let you delete the quota settings for
the selected user/group by clicking on the “Delete Quota” button”

Fig 2.1.8

30
SAN
SAN Disks:
A storage area network (SAN) is a dedicated network that provides access to
consolidated, block level data storage. SAN are primarily used to enhance storage
devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to
servers so that the devices appear like locally attached devices to the operating
system.

Fig 3.0.0

31
ISCSI:

ISCSI is an acronym for Internet Small Computer System Interface, an


Internet Protocol (IP)-based storage networking standard for linking data storage
facilities. By this option we can check Iscsi status, iscsi target , Disk to Target
Properties Target Information, Session Information.

Fig 3.0.1

32
Create Iscsi Target:
An iSCSI target is often a dedicated network-connected hard disk storage device,
but may also be a general- purpose computer, since as with initiators, software to
provide an iSCSI target is available for most mainstream operating systems.iscsi
Target is the option to create new Target or you can Delete the target

Fig 3.0.2

33
Iscsi Disk to Target:

Fig 3.0.3

In the Iscsi disk to target ,we have to add a disk and LUN number in the the
target but before that make sure BIO disk is added and disk is added to SAN
otherwise disk will not appear here and remove a disk from the target option is
also present here before removing disk make sure initiator is not added to the
disk, otherwise you will not able to remove disk from target.

34
Iscsi Initiators:
In this section add a initiators to the target. and also add a check
portals(Ip).Delete Initiators from the target.

Fig 3.0.4

35
Iscsi Authentication: It is the act of confirming the truth of an attribute of a
datum or entity. This might involve confirming the identity of a person or software
program, tracing the origins of an artifact, or ensuring that a product is what its
packaging and labeling claims to be. Authentication often involves verifying the
validity of at least one form of identification.

Fig 3.0.5

36
ISCSI Properties:

Target Properties is the option of getting completely information about the


particular target like data digest , first brust length, Header digest, immediate
data ,Initial R2T , Max Brust length , Max outstanding R2T, max receive data
segment length , max session ,max xmit data segment length,Nop in interval
,Queued Commands ,RSP timeout ,Address Method ,Enabled etc.

Fig 3.0.6

37
Iscsi Target Information:
As the name suggest Target Information gives the brief description about the
Target like target name , Disk , initiators.

Fig 3.0.7

38
Iscsi Session Information:
In this section get a target information of the target ,like target name, disk name
and Initiators name.

Fig 3.0.8

39
Iscsi Delete target:
In this Section delete the the target .But before Deleting target you should make
sure that Initiators,disk to target is already removed otherwise you will not be able
to remove the target.

Fig 3.0.9

40
SRP
In computing the SCSI RDMA Protocol (SRP) is a protocol that allows one computer
to access SCSI devices attached to another computer via remote direct memory,
access (RDMA).The use of RDMA makes higher throughput and lower latency
possible than what is possible through e.g. the TCP/IP communication protocol.
when click on the SRP target then option like SRP Target , SRP Disk. To Target ,
SRP Initiators , Target Information , Session Information and Srp Enable/Disable is
pop-up.

Fig 3.1.0

41
SRP Disk to Target :Here We have two option add disk to the target , delete
disk from the target. To add disk to the particular target we have to select disk
and LUN number.

Fig 3.1.1

42
SRP initiators:
one can add or delete initiator by the help of this option for adding any initiator
one should remember that initiator name should be in Hexadecimal format or you
can put it name “ * “as well.

Example 2100:b024:0025:367a
2100:0024:af4a:3675
2100:d024:0041:367b
* (Access for all )

Fig 3.1.2

43
Target Information:
In this Section show the information of target name, disk and initiators.

Fig 3.1.3

44
SRP Session: In this section show the information of connected client and all
information related to that session like SRP Target , Connected client.

Fig 3.1.4

45
SRP Enable/Disable: In this Section Enable and disable operation is performed.

Fig 3.1.5

46
FC:
FC, is a high-speed network technology (commonly running at 2-, 4-, 8- and
16-gigabyte per second rates) primarily used to connect computer data storage.
When Click on FC target then option like FC Target , FC Disk To Target FC
Initiator , Target Information , Session Information and FC Enable/Disable option
is pop-up.

Fig 3.1.6

47
FC Disk to Target :Here We have two option add disk to the target , delete
disk from the target. To add disk to the particular target we have to select disk
and LUN number.

Fig 3.1.7

48
Fc initiators:
one can add or delete initiator by the help of this option for adding any initiator
one should rember that initiator name should be in Hexadecimal format or you
can put it name “ * “as well.

Example 21:00:00:24:ff:37:87:58

21:00:00:24:ff:37:87:58

(Access for all ) *

Fig 3.1.8

49
FC Target Information:
In this Section show the information of target name, disk and initiators.

Fig 3.1.9

50
Fc Session: In this section show the information of connected client.

Fig 3.2.0

51
FC Enable/Disable:

In this Section Enable and disable operation is performed.

Fig 3.2.1

52
VTL
A virtual tape library (VTL) is a data storage visualization technology used
typically for backup and recovery purposes. A VTL presents a storage component
(usually hard disk storage) as tape libraries or tape drives for use with existing
backup software.

VTL Settings
Here we are having two options create VTL Library and Show VTL Libraries .

Create VTL Library :


When Select VTL disk ,then select vendor, select Library and select tape drive is
pop-up .After that when Select Tape Drive then option like Select No. of Tape
Drive , Select Import/Export Slots,Select Library Backoff Value,Enter Tape Size
(MB),Select No of Slots full with Tape in Library,Select No of empty Slots in
Library,Choose Compression Factor,Select Tape Compression Factor and Choose
Compression Type.
.

Fig 4.0.0

This fig gives the summary of how to create VTL Library.

53
Show VTL Library:

This option gives the info about Library name, Library status, Library ID Drive(s).
you can work on particular Library by making it on line by clicking on red button.
Now you can Add tape to the Library by selecting few details like Tape Density,
Tape Type Here you can Select Tape Density where you have multiple option and
in tape type you have two option like data and clear. In clear Tape type will be 1
by default .if you want to remove clean then first you have to make it off line.

Fig 4.0.1

54
ADD VTL Target: Once VTL Target in online now you can Add Target using ISCI
,FC or SRP but Right now only ISCSI option is available FC and SRP are under
Development .

Fig 4.0.2

55
RAID
Volume Configuration
Disk Configuration: In this Section display the volume Information, and
show the information of used and free size.

Fig 5.0.1

56
Disk Creation option: in this Section , when Click on the bottom of volume
Configuration , the a pop-up box is open and a option like NAS Disk,VTL
Disk,Bio Disk and FIO Disk is pop-up.

Fig 5.0.2

57
Disk Creation: when click on the NAS disk option ,then a fancy-box is open for
creation of NAS disk creation. On every option click like VTL, BIO and FIO the
same fancy-box will be open.

Fig 5.0.3

58
Disk List:
In this Section Display all the created Disk Information .when click on the bottom
of disk then a option is show like Increase size,Information and Delete. when
you want Increase the disk size then just click only increase the small window is
open and increase the size.

Fig 5.0.4

This is the main wizard page for creating and managing the NAS Disks”. Click on
the volume groups (vg1, ...) in which you want to create a NAS disk. Enter the size
for the disk to be created, and select the unit from the drop down. Limit is the
available size shown. Click the 'Create' button.

Ones the disk is created you will see two more buttons. Increase Size and Delete
selected. As the
name suggests, increase size button lets you increase the size of the volume on
the fly, and
delete selection button lets you delete all the selected volumes from the list.

59
Raid setup: In the Volume creation Section create the Volume. This can added
only if Raid is set up before. Otherwise No free disk available option will come.

Fig 5.0.5

60
Remove Volume: In this Section remove the Volume. If there is a disk in
volume then can't delete the volume as shown in below diagram there will be no
option to edit the volume.

Fig 5.0.6

61
RAID Set Function:
In this tab we have the option to create Raid set , Delete Raid set ,Create Hot
spare, Delete Hot Spare. By the help of these tabs we can Configure Raid .

Fig 5.0.7

Create Raid Set:


Here it shows hard disk and help to Create Raid Set..

Fig 5.0.8
For Creating NAS Storage you have to Create RAID of the disks . And then Add
volume then it will show in Disk Configuration.

62
Delete Raid Set:
It help to Delete the Raid set which we have created but for deleting an exiting
Raid set you have to make sure the Raid set is empty i.e you have to delete
volume set and for deleting volume set you have to Clear Volume set you have to
delete the existing data.

Fig 5.0.9

Create Hot Spare:In Case of one Hard disk crash you need to change the
hard disk. So when new hard disk is placed make it hot spare.

Fig 5.1.0

63
Delete Hot Spare : In care you want to Delete the Hot spare then this is the
best option for you.

Fig 5.1.1

Volume Set Function:


Volume set function is created by the help of Raid Set so if you want to create
Volume set then first you need to create Raid Set. In Volume Set Function are are
two options first Create Volume set and Delete Volume Set.

Fig 5.1.2

64
Create Volume Set: If you select Raid Set then you will have this info put
volume Set Name and click on create. And you can change Raid Level according
to your wish.

Fig 5.1.3
Delete Volume Set :
You can Select the Volume set by the Radio button which you want to delete.

Fig 5.1.4

65
MAINTENANCE
Maintenance menu
In this section you will be able to do regular maintenance related tasks such as
Services . scheduling shutdowns, and reboot of FS2. Creating Snapshots, checking
for number of active connections,etc. we will talk about all of them one by one
and explain how to use all of the features in detail.

Services :In this Section Start/Restart the Services like SAN,NFS,SMB,AFP,FTP


and Raid Controller.

Fig 6.0.1

66
Logs menu
You have options to get logs or auto schedule logs daily,weekly,monthly.

Get Logs

The FS2 stores all the logs generated by it in a specific location which can be
accessed and downloaded by the web interface. All you have to do is to go to
Maintenance -->Logs and click on Get Entire Log to get all the logs in a single
file.
The “Clear Logs” button lets you delete all the log files from the system.

Fig 6.0.6

Shows the Get Logs button when you click it a BIN file is created for the entire
settings in the FS2 Box, it is for the backup.

67
Auto Schedule Logs:
Chose a week day and click on the auto schedule log button to delete it
automatically weekly.

Fig 6.0.7
This fig Shows the Schedule option for Automatic deletion of Logs.

68
Log rotate

In this section we handle the frequency of logs. We can create configuration by


putting new name and configuration path.

Fig 6.0.8

This figure shows the create configuration option , frequency , configuration files
,log rotate frequency.

69
SMB Log Path:
In SMB log path we can set the SMB Log by selecting log path and can set the log
path.

Fig 6.0.9

shows the choose log path option and set the log path .

70
FS2 Backup/ Restore:
This section lets you take a system setting’s backup for your FS2. A simple file is
created which you can download and preserve.
and in case you change some settings in FS2 or something goes wrong. You can
just use that file to restore all settings instantly.
It’s a very good idea to create a backup and preserve after every major
configuration Change you do to the box. Or before upgrading the firmware.

Fig 6.1.0

Shows the options for FS2 Backup i.e. Take FS2 Backup and Restore it back.

71
Restore FS2 backup
The interface for taking backup and restoring is very simple. All you have to do is
to click on the Take FS2 Backup button and you will have the option to
download Delete Restore .

Fig 6.1.1

This Figure Shows the Backup button for FS2 .

72
Shutdown
From this section you can either shut down or restart the FS2 box or you can plan
and schedule future recurring Shutdown/restarts.

System Shutdown
Simply click on the Shutdown button to send the shutdown command to the box
instantly.

Fig 6.0.2

Shows the Shutdown button and if you click the FS2 box shutdown.

73
System Restart
For an instant reboot click on the restart button here.

Fig 6.0.3

Shows the Restart button to reboot the FS2 box when you click it.

74
Schedule Shutdown : in this Section when click on Schedule shutdown
button ,then a fancybox is open and scheduled the shutwon Information as per
user Requirement.

From here you can schedule a shutdown for your FS2 box. You can either select
aday from the list at the left hand side or you can set a specific date and time
from the right hand side of the window. In case you select a day from the left hand
side and keep ‘*’ as the selection in all the fields at the right hand side, then on
the day which you have selected, the FS2 will keep shutting down whenever its
booted. To avoid such a situation, you can specify a time along with the day for
scheduling the shutdown. So for instance you select ‘Sun’ and 12 Hours 00
Minutes. Then the device will shut down at that particular time.

Fig 6.0.4

shows the schedule shutdown option where months,day,minutes and hours


options are given to schedule the shutdown automatically.

75
Schedule Restart :
In this Section when Click onthe Scheduled restart button ,then a fancy box is
open and scheduled the system restart as per user requirement.

This interface is exactly same as the Shutdown interface. Juts that instead of the
shutdown, it will send the restart command to the FS2 box on the desired
scheduled date.

Fig 6.0.5

Show the Schedule interface for restart automatically , this is same as shutdown

76
Schedule Shutdown Information:
In this Section show the Information of Scheduled shutdown.

Fig 6.1.2

77
Schedule Reboot Information :In this Section show the Information of
Scheduled Reboot..

Fig 6.1.3

78
Scan Volume:Scan mean look at all parts of (something) carefully in order
to detect some feature.It scan the volume of the system that they are
function well or not.

Fig 6.1.4

79
Remount:

When you 'mount' something you are placing access to the file system
contained within onto your root file system structure. You can remount the
drive if needed by the single click.

Fig 6.1.5

80
Create NAS Snapshot :

By this one can easily create NAS Snapshot by putting Disk name and size.

Fig 6.1.6

This Fig Shows the snapshots to be created for NAS protocol and the size , there
is a limit provided as standard and recommended.

81
NAS Snapshot Details :

Fig 6.1.7

This Fig Shows the details of the snapshots that are created, even delete it form
the same interface. It also lets you share a NAS Snapshot either as a SMB or as
NFS share by just clicking on the check boxes at the right most Column.

82
Schedule NAS Snapshot : In this Section Scheduled the Snapshot.

Fig 6.1.8

This Figure Shows the NAS snapshot scheduled to be taken at a particular time.

83
Search Snapshot List: In this Section choose the disk name and
corresponding Information is displayed on the given below.

Fig 6.1.9

84
Scheduled Snapshot Remove: In this Section Scheduled Snapshot
Information is displayed. when click on the delete image , Scheduled snapshot is
deleted.

Fig 6.2.0

85
Manage Users:
In this section you can manage the setting of users and groups. If you want can
the password for any particular user then click on Manager user in this section.

Create Users
This option allows you to create a user.

Fig 6.2.1
Type the user name and the password for the user and click on “Create”
button.

86
Create Groups:

This option allows you to create Group.

Fig 6.2.2
Type the group name that you want to create and click on “Create
Group” button

87
Manager User
In this Section you can change the password for the user and change the group of
particular user.

Fig 6.2.3

This figure gives the control to Manage user .

88
Manage Groups:

This option allows you to manage groups. You can add or remove users from a
particular group.

Fig 6.2.4 gives the control to manage group.

89
Delete Users
This option is used to delete users.

Fig 6.2.5

Type the name of the user you want to delete and click on “Delete”
button.

90
Delete Groups:
This option is used to Delete Groups.

Fig 6.2.6
In This figure Type the name of the group you want to delete and click on
“Delete” button.

91
Synchronization: In this Section ,when click on the button ,the all users and
group are Synchronized.

Fig 6.2.7

92
Updates:
This option allows you to upload the update file. Select the update file and click on
the “Update File” button.

Fig 6.2.8

This will give you an option to update file.

93
Mail Configuration : In this Section configure the mail. If any problem comes
in storage then this functionality will help to email or give notification to the
administrator .

Fig 6.2.9

94
SAN Advance Settings:

SRP Mapping: In this Section mapping the SRP target of both node and help
HA environment to handle .

Fig 6.3.0

95
SRP Mapping Information: In this Section select the Source target name
,and get the Information.

Fig 6.3.1

96
FC Mapping: In this Section mapping the FC target for this particular node.

Fig 6.3.2

97
Fc Mapping Information: In this Section select the Source target and get
the mapping Information.

Fig 6.3.3

98
FS2 data Analysis: In this Section show the charts of System temperature
,memory Information, Disk Graph and Interfaces information. These charts show
the which section is used how many data.

System Temperature: This fig .show the data uses of temperature.

Fig 6.3.4

99
Memory Information: This fig. show the data uses of memory
Information.

Fig 6.3.5

And the blue show the free memory and red color show the used
memory that is counted in MB size this is basically RAM size .

100
INDEX
A E V
ACL Settings 24 Ethernet Teaming/Aggregation Volume group
10 Information 5
VTL 53
ADS 15 , 19 ,25 F
AFP Setting 21,28 FC 47
ALB 11 FC Initiators 48
Append mode 20 FTP setting 23
Authentication 13,36 FC Target 50
Authentication mode
22,24

B I
ISCSI 32
Backup 11,53,74,75 ISCSI Setting 33-35
BIO 34 ,62,63 ISCSI Status 32
Blink 9 ISCSI Target 33

N
C NTP server 8
Change host name 8 Network setting 9
Configure share 17 Network Information 10
Create user 85 NAS Setting 29
Create VTL 53
Create Group 86 R
RAID 56
RAID volume set option 56
D
Date and time setting 6 S
DNS Configuration 10 Sensor Information 4
Disk Information 5,63 SRP 40
Disk To Target 34 SRP initiators 43
Delete Initiators 35 SRP Target 44,45
SRP Status
Delete Users 89 share ownership 27
Delete Groups 90

101

You might also like