User manual INFRANT TECHNOLOGIES READYNAS INSTANT STORAGE

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual INFRANT TECHNOLOGIES READYNAS INSTANT STORAGE. We hope that this INFRANT TECHNOLOGIES READYNAS INSTANT STORAGE user guide will be useful to you.


INFRANT TECHNOLOGIES READYNAS INSTANT STORAGE : Download the complete user guide (8199 Ko)

Manual abstract: user guide INFRANT TECHNOLOGIES READYNAS INSTANT STORAGE

Detailed instructions for use are in the User's Guide.

[. . . ] READYNAS INSTANT STORAGE User Guide Updated for RAIDiator 3. 01c1-p5 Copyright © 2006, Infrant Technologies Inc. http://www. infrant. com ReadyNAS, X-RAID, FrontView, RAIDar, RAIDiator, Network Storage Processor, and NSP are trademarks or registered trademarks of Infrant Technologies Inc. P/N: IT-05-1-1040-U-08 Page 2 2 Contents About This Guide 7 8 1 FrontView Advanced Control Network 10 Ethernet Speed/Duplex Mode MTU VLAN Setting Performance Setting 10 11 11 11 12 Wireless Global Network Settings Hostname Default Gateway DNS 13 14 14 14 14 WINS DHCP Route Security 15 16 17 18 Admin Password Security Mode Selection Share Security Mode Specify a Workgroup Share Accounts Specify a Workgroup Setting up Accounts Managing Groups Managing Users Setting Accounts Preferences Domain/ADS Authentication 18 19 20 20 21 User Security Mode 21 21 21 22 24 26 Domain Security Mode 27 27 Page 3 3 Services Setting up Accounts 28 29 Standard File Protocols Streaming Services Discovery Services Volumes 29 30 31 32 Volume Management Advantages of Flex-RAID Advantages of X-RAID Deleting a Volume Adding a Volume RAID Settings X-RAID Redundancy Overhead X-RAID Has one data volume Adding a 2nd DISK for Redundancy Adding a 3rd and 4th DISK for MORE Capacity Replacing All Your Disks for Even MORE Capacity 32 32 32 Volume Management for Flex-RAID 32 33 34 35 Volume Management for X-RAID 36 36 36 36 36 37 Changing Between X-RAID and Flex-RAID Modes Snapshot Shares Taking and Scheduling Snapshot Resizing Snapshot Space 37 37 38 40 USB Storage Adding Shares Managing Shares Printers Setting Share Access in Share Mode Setting Share Access in User and Domain Modes Advanced Options 40 43 43 44 45 46 48 USB Shares Print Shares over CIFS/SMB IPP Printing Managing Print Queues Backup 49 50 50 51 51 52 Adding a New Backup Job Step 1 ­ Select Backup Source Step 2 ­ Select Backup Destination Step 3 ­ Choose Backup Schedule 52 52 53 54 Page 4 4 Step 4 ­ Choose Backup Options 54 Viewing the Backup Schedule Programming the Backup Button Viewing the Backup Log Editing a Backup Job System 55 56 56 56 57 Clock System Time NTP Option Alerts Contacts Alerts Settings SNMP SMTP Adding a UPS for performance 57 57 57 Alerts 58 58 58 59 60 Performance Language Unicode for User, Group, and Share Names Updating ReadyNAS Status Remote Update Local Update Settings Factory Default Disk Spin-down Option Power Timer 61 62 63 64 64 64 65 65 66 Power Management 67 67 67 Shutdown Health Logs 2 Accessing Shares Windows MAC OS X 68 70 70 71 73 74 75 AFP over Bonjour AFP over AppleTalk MAC OS 9 Linux/Unix Web Browser FTP / FTPS Rsync Page 5 5 75 77 79 81 82 84 85 Networked DVD Players and UPnP AV Media Adapters 3 Replacing a Failed Disk 86 87 Locate the Failed Disk Order Replacement Disk Replace the Failed Disk Re-synchronize the Volume 4 System Reset Switch 5 Changing User Passwords A RAID Levels Simplified 87 87 88 88 89 91 92 RAID Level 0 RAID Level 1 RAID Level 5 RAID Level "X" (X-RAID) B Input Field Format 92 92 92 93 94 Domain/Workgroup Name Host Host Name ReadyNAS Host Name Host Expression Share Name Share Password SNMP Community User/Group Name User Password C Glossary D If You Need Help. . . 94 94 94 94 95 95 95 95 95 95 96 98 Page 6 6 About This Guide Congratulations and thank you for purchasing a ReadyNAS Instant Storage system from Infrant Technologies. If you haven't already done so, please read the Getting Started guide provided in the shipping box and the Quick Installation Guide on the CD-ROM. [. . . ] We'll first look at how we can control the services. Adding Shares To add a share, click on the Volume tab. If more than one volume is configured, click on the volume you wish to add the share. In the Share mode, you will enter the share name, description, and optional password and disk quota. The share password and share disk quota is available only in this security mode. In the User or Domain security modes, the Add Share tab consists only of fields for the share name and description. Password and disk quotas are account-specific. Page 43 43 In either case, you can add up to five shares at a time. Once you finish adding the shares, you can refer to Chapter 2 for instructions on how to access them from different client interfaces. Managing Shares Once you have added shares, you may want to manually fine-tune share access in the Share List tab. This tab has two looks, one for Share security mode and one for User and Domain mode. They're both similar except for the password and disk quota prompts which only appear in Share mode. If you want to delete a share, click on the checkbox to the far right of the share listing and click Delete. The columns to the left of the Delete checkbox represent the services that are currently enabled, and the access icons in those columns summarize the access rights to the share for each of the services. You can move the mouse pointer over the access icons to get a quick glimpse of the access settings. The settings represent: Disabled ­ Access to this share is disabled. Read/Write Access ­ Access to this share is read/write. Page 44 44 Read Access with exceptions ­ Either (1) access to this share is read-only and only allowed for specified hosts, (2) access is read-only except for one or more users or groups that are granted read/write permission, or (3) access is disabled except for one or more users or groups that are granted read-only privilege. Write Access with exceptions ­ Either (1) access to this share is read/write and only allowed for specified hosts, (2) access is read/write except for one or more users or groups that are restricted to read-only access, or (3) access is disabled except for one or more users or groups that are granted read/write privilege. You can click on the access icons to bring up the Share Options tab where you can set the access rules for each file protocol. Keep in mind that access options will differ between protocols. SETTING SHARE ACCESS IN SHARE MODE In Share mode, the CIFS/Windows share options tab will look as follows: In this tab, you can select the default access at the top and optionally specify the host(s) that you wish to allow restrict access to in the Share Access Restriction box. Share Access Restriction For instance, select read-only for default access and list the hosts you wish to allow access to. For example, to allow only host 192. 168. 2. 101 read-only access to the share, specify the following: Default: Hosts allowed access: Read-only 192. 168. 2. 101 Multiple hosts can be separated with commas (see Appendix B for more description of valid host formats. ) For example, if you wish to limit access to the share to particular hosts, you can enter host IP addresses or valid DNS hostnames in the Host allowed access field. In addition, you can enter a range of hosts using common IP range expressions such as: 192. 168. 2. , 192. 168. 2. 0/255. 255. 255. 0, 192. 168. 2. 0/24 The above designations all allow hosts with IP addresses 192. 168. 2. 1 through 192. 168. 2. 254. Page 45 45 Towards the bottom of the Windows [CIFS] tab, you'll notice the Share Display, Recycle Bin, and Advanced CIFS Permission options. Refer to the description for these options below. SETTING SHARE ACCESS IN USER AND DOMAIN MODES In User or Domain modes, the same tab would look as follows (note the addition of read-only and write-enabled user and group fields): Share Access Restriction If you wish to limit share access to particular users and/or groups, you can enter their names in the Read-only users, Read-only groups, Write-enabled users, and Write-enabled group fields. The names must be valid accounts, either on the ReadyNAS or on the domain controller. For instance, if you wish to allow read-only access to all and read/write access only user fred and group engr, you would set the following: Default: Write-enabled users: Write-enabled groups: Read-only fred engr If you wish to limit the above access only to hosts 192. 168. 2. 101 and 192. 168. 2. 102, set the following: Default: Hosts allowed access: Write-enabled users: Write-enabled groups: Read-only 192. 168. 2. 101, 192. 168. 2. 102 fred engr If you wish to specify some users and groups for read-only access and some for read/write access, and disallow all other users and groups, enter the following: Default: Hosts allowed access: Read-only users: Read-only groups: Write-enabled users: Write-enabled groups: Disabled 192. 168. 2. 101, 192. 168. 2. 102 mary, joe marketing, finance fred engr Page 46 46 Note that access control will differ slightly from service to service. Share Display Option Restricting access to a share will not prevent users from seeing the share in the browse list. In certain instances, this might not be desirable, such as for backup shares that you may want to prevent users from seeing. For example, to access a hidden share, enter \\host\share in the Windows Explorer. The ReadyNAS can have a Recycle Bin for each share for Windows users. You will see the Enable Recycle Bin option at the bottom of the Windows [CIFS] access tab. [. . . ] Name length must be 15 characters or less. Host A valid IP address or a host name. Host Name A valid host name must conform to the following restrictions: Name must only consist of characters a-z, A-Z, 0-9, and the symbols ­ (dash) and . A fully-qualified domain name (FQDN) must have no more than 63 characters in each section separated by . Example of a valid FQDN: firstpart. secondpart. thirdpart. com. ReadyNAS Host Name A valid host name except the first part or short host name must be 15 characters or less due to NetBIOS name length restriction. Page 94 94 Host Expression A valid host expression is either a valid host or the common IP expression form specifying a range of addresses in a network; for example: 192. 168. 2. 192. 168. 2. 0/255. 255. 255. 0 192. 168. 2. 0/24 Share Name Name must only consist of characters a-z, A-Z, 0-9, and the symbols ­ (dash) and . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE INFRANT TECHNOLOGIES READYNAS INSTANT STORAGE




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual INFRANT TECHNOLOGIES READYNAS INSTANT STORAGE will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.