Home

Thecus i Series User`s Manual

image

Contents

1. 15 3 1 SU wt CN ET T 15 3 2 e OOO 16 3 3 DUC Install EE 17 3 4 SYSTEM CONPMOUFATION scera 19 3 4 1 System NaMe erer 19 3 4 2 LEE e e e 20 3 4 3 Gnd nooo sien 20 3 4 4 Login config eee 21 3 4 5 mtem c 21 3 4 6 DANG eer cade cade ade asda asasazasazasezasesaseseneaes 22 3 4 7 MELDE E 22 3 4 8 EE 23 3 4 9 Messe sra iaa ainia 24 3 4 10 oystem log SOVE A E 24 3 4 11 SN A 25 3 5 SOS FC ONG NOE E 26 3 5 1 mies rr io oo 26 3 5 2 reia 27 3 5 3 A 27 3 5 4 EE Eege 28 3 5 5 CHAPA UM 29 3 6 Volume configuration o nanonnanoananonnnnonnnnnnnnnrnnnnnnnnnnnnn 30 3 6 1 Volume relationship diagram esses 30 3 6 2 mile EE 32 3 6 3 Volume GOUD WEEN 35 3 6 4 Userdala VOLUME di 36 3 6 5 Cache VOIBITIO cd 38 3 6 6 Logical unit number 39 3 6 7 cuf 40 3 Enclosure management eene 90 3 7 1 SES ContiguallOl aeret tesis 51 3 7 2 Hardware Montsant 51 3 7 3 Hard drive S M A R T function support 52 3 7 4 Dr REED 53 3 8 System rnallterisli68 ive ee EE 54 3 8 1 JR IS 55 3 8 2 MO AAA AA 55 3 8 3 pick LO delata roo oc 56 3 8 4 Config import amp expor easa aa a Ea 56 3 8 5 Ms AA on 57 3 9 EOI aa 57 Chapter A Advanced operation 58 4 1 Biet e ECKE 58 4 2 BIR MEC TU TTE 60 4 3 DISK POGINING ettet 60 ele Le opener ete Ue 61 A Tarife WISI ERE TERES 61 B EVent AOQUHICA ON E
2. Sometimes rebuild is called recover these two have the same meaning The following table is the relationship between RAID levels and rebuild Disk striping No protection of data VG fails if any hard drive fails or unplugs Disk mirroring over 2 disks RAID 1 allows one hard drive fails or unplugging Need one new hard drive to insert to the system and rebuild to be completed Striping with parity on the dedicated disk RAID 3 allows one hard drive fail or unplugging Striping with interspersed parity over the member disks RAID 5 allows one hard drive fail or unplugging RAID 6 2 dimensional parity protection over the member disks RAID 6 allows two hard drives fails or unplugging If it needs to rebuild two hard drives at the same time it will rebuild the first one then the other by sequence RAID 0 1 Mirroring of the member RAID O volumes RAID 0 1 allows two hard drives fails or unplugging but at the same array RAID 10 Striping over the member RAID 1 volumes RAID 10 allows two hard drives fails or unplugging but at different arrays JBOD The abbreviation of Just a Bunch Of Disks No protection of data VG fails if any hard drive fails or unplugs 59 4 2 UDV Extension To extend UDV size please follow the procedures 1 Select Volume config User data volume 2 Decide which UDV to be extended click the button in the Size column next the number 3 Change the size The size m
3. Advanced Target Properties e E ET Sessions Devices Properties These are the devices exposed by Cal sessions to the target Click Adwanced to view information about the device and configure the multipath policy Devices Device Name amp a een SCSI Dik Device MulkPath Support r 5500 SCSI Disk Device Multi Path Support Advanced ma e Figure D 20 83 20 Click MPIO tab select Load Balance Policy to Round Robin Device Details A General MPIO Load Balance Policy Fai Over Only Fail Over Only PESOS EET A Round Robin With Subset Least Queue Depth Weighted Paths Least Blocks This device has the Following paths PathId Status Type Weight Session ID Ox20000 Zonne Active n a FFFFFFFFFS80e87c 400001 Ox 0001 Conne Standby n a FFFFFFFFFSa0ee c 400001 gt Details Edit cora Figure D 21 21 Click Apply Device Details E xj General MPIO Load Balance Policy Description The round robin policy attempts to evenly distribute incoming requests to all processing paths This device has the Following paths Pathid status Type Weight Session ID Ox20000 onne Active n a FFFFFFFFFSa0ee c 400001 Ox20001 Zonne Active n a FFFFFFFFFe80e87c 400001 Em Details Edit crea Figure D 22 84 22 Run Device Manage in Wi
4. UNE CNN MN Upgraded WE CUR NN Upgraded Failed Info Systemreboot Info System has been rebooted Info System shutdown Info System has been shutdown Info System Init OK Info System has been initialized OK kaaf System Init Failed Error System cannot be initialized in the last boot up 66 e LVM events i A ae Info VGCreatedOK _ Info VG lt name gt has been created Info VGDeleted _ Info VG name has been deleted Info UDVCreatedOK Info UDV name has been created Info UDVBDeleted _ Info UDV name has been deleted Info UDV Attached OK Info UDV name has been LUN attached Info lt number gt SCSI_ID lt number gt LUN lt number gt e NN Started Pe e Ra a MN Finished Fail rebuilding NN ee eoem Started D E a Finished Failed migration VG Degraded Warning VG lt name gt is under degraded mode UDV Degraded Warning UDV lt name gt is under degraded mode Info UDVIntOK Info UDV lt name gt completes the initialization Initialization initialization UDV lt name gt VG Failed Error Fail to access VG lt name gt UDV Failed Error Fail to access UDV lt name gt Global CV Error Fail to adjust the size of the global cache Adjustment Failed Global Cache Info The global cache is OK Info Failed A ee lt name gt A ee lt name gt m te aa Spare Disks dedic
5. 4 amm fi rn 1 5Gh 2 Good F e 2037001378a401c4 74 ee fi Fr 3 066 Auto spindown Disabled mme SE EE Figure 3 6 7 7 44 Figure 3 6 7 7 Slot 5 is set as global spare disk Step 5 Done They can be used as SCSI disks Delete UDVs VG please follow the steps Step 6 Detach LUN from UDV In Volume config Logical unit Oo 2 3 Attach Detach e Host LUN Permission UDY name Session N Read write D 1 1 1qn 1991 05 com microsoft s1300n 1 Read write UDY 2 O Attac e Detach e Figure 3 6 7 8 Select LUNs by clicking the checkbox of the row then click i Detach There will pop up a confirm page Choose OK Done Step 7 Delete UDV User Data Volume To delete the user data volume please follow the procedures PA NS Select Volume config User data volume Select UDVs by clicking the checkbox of the row Click Delete There will pop up a confirm page Choose OK Done Then the UDVs are deleted Tips When deleting UDV the attached LUN s related to this UDV will be detached automatically too Step 8 Delete VG Volume Group To delete the volume group please follow the procedures 45 1 Select Volume config Volume group 2 Select a VG by clicking the checkbox of the row make sure that there is no UDV on this VG or the UDV s on this VG must be deleted first 3 Click Delete There will pop up a confirmat
6. RAID row RAID cell in One 4 disk RAID O volume RAID width 4 RAID one row copy 1 RAID row 1 One 3 way mirroring volume RAID width 1 RAID copy 3 RAID row 1 One RAID 10 volume over 3 4 disk RAID 1 volume RAID width 1 RAID copy 4 RAID row 3 Write Through cache write policy A caching technique in which the completion of a write request is not signaled until data is safely stored on non volatile media Each data is synchronized in both data cache and the accessed physical disks 0 O I I Write Back cache write policy A caching technique in which the completion of a write request is signaled as soon as the data is in cache and actual writing to non volatile media occurs at a later time It soeeds up system write performance but needs to bear the risk where data may be inconsistent between data cache and the physical disks in one short time interval set the volume to be Read Only Dedicated Spare disks The spare disks are only used by one specific VG Others could not use these dedicated spare disks for any rebuilding purpose Global Spare disks GS is shared for rebuilding purpose If some VGs need to use the global spare disks for rebuilding they could get the spare disks out from the common spare disks pool for such requirement Dedicated Cache C Global Cache DeGraded mode Not all of the arrays member disks are functioning but the array is able to respond to applic
7. d Done the iSCSI device log off successfully D MPIO and MC S setup instructions Here is the step by step to setup MPIO There are 2 kinds of scenarios for MPIO Please see Figure D 1 Thecus suggests using scenario 2 for better performance Known issues Microsoft MPIO is not supported on Windows XP or Windows 2000 Professional Using Windows Server 2003 or Windows 2000 server to run MPIO Network diagram of MPIO 73 Read or Vwrite 1 Dual ports w t7 Velo iD rect connect host has z Oh pots read or wr e nove UL Gigabit switch Read or Wire Read or W te 2 Dual poris with Wl Gigabit switch Via switc s host as zZ LAY pons read er wein ore UDV Figure D 1 The setup instructions are in the following figures 1 Create a VG 2 Create a UDV Status Free GB PD UDV 148 2 0 Online Figure D 2 74 Create Create Delete RAID RAID 1 Delete 6 Attach Create Delete e Size R VG CV O No Name GB Status 1 2 lt RAID LUN SDSS MB 1 UDV 1 20 O we B HI x o nino RAID 1 0 R1 383 Attach Create Delete e Figure D 3 3 Run Microsoft iSCSI initiator and check the Initiator Node Name iSCSI Initiator Properties E X General Discovery Targets Persistent Targets Bound Volumes Devices The iSCSI protocol uses the following information to uniquely identify this initiator and authenticate targets Initiator Made Name ign 1331 D
8. 3 06bf Good e a E 5 E 2033001378a401c4 v4 VH Ee DS 1 566 2 Good a C l 5 D 20210013783401c4 Za fi FR 3 06bf Auto spindown Disabled Free disks Global spares e Dedicated spares a Figure 3 6 7 13 Figure 3 6 7 13 Slot 4 has been set as dedicated spare disk of VG named VG R5 Step 6 Done The PDs can be used as iSCSI disks Delete UDVs VG please follow the steps Step 7 Detach LUN from UDV Please refer to Step 6 of Example 1 to detach LUN Step 8 Delete UDV User Data Volume Please refer to Step 7 of Example 1 to delete UDV Step 9 Delete VG User Data Volume Please refer to Step 8 of Example 1 to delete VG Step 10 Free dedicated spare disk 49 To free dedicated spare disks please follow the procedures 1 Select Volume config Physical disk 2 Select the dedicated spare disk by clicking the checkbox of the row then click Free disks 2 to free disk Step 11 Delete dedicated cache volume To delete the cache volume please follow the procedures 1 Select Volume config Cache volume 2 Select a CV by clicking the checkbox of the row 3 Click Delete 2 There will pop up a confirmation page 4 Choose OK 5 Done The CV has been deleted Caution Global cache volume cannot be deleted Step 12 Done all volumes have been deleted 3 7 Enclosure management Enclosure management function allows managing enclosure inf
9. Another is a RAID 5 with 3 physical disks named VG R5 Volume group name The button next to the Name is Rename function Number of volume group The button next to the No is More Information indication It shows the details of the volume group Total GB Total capacity of this volume group Free GB Free capacity of this volume group sw The number of physical disks of the volume group UDV The number of user data volumes related to the volume group The status of volume group Online gt volume group is online Fail gt volume group is fail DG gt DeGraded mode This volume group is not completed The reason could be lack of one disk 35 or orfailureofdisk of disk Status 2 R gt Rebuild This volume group is doing rebuilding 2 Rebuild This volume group is BEE rebuilding M gt Migration This volume group is doing migration The RAID level of the volume group The button next to the RAID level is Migrate function Click Migrate can add disk s to do expansion or change the RAID level of the Volume group e VG operations description Create a volume group Delete Delete a volume group 3 6 4 User data volume Enter User data volume function to view the status of each user data volume Attach Create e Delete e Size R G cy No Mame GB Status 1 2 3 a RAID SUN Deg MB 1 LID 1 50 Online O we HI pe e mm e RAID LU 1
10. Click Advance if CHAP information is needed Please see Figure C 6 Advanced Settings Default Dy providing authentication between hor onfigured a Use meme lfargetsectet T Perfor mutual authentication T ep eee eb ed eat A E cur EK KL pap KEE bad Sir House mutua EnA specii aninitator secret on tre lnbator settings mane sel eebe ue thak ze Frer thata 2b z page and configure trat secret on the target Figure C 6 Click OK The status would be Connected Please see Figure C 7 7i s 9 Done it can connect to an iSCSI disk select tanget and click Log Un lo access the storage devices for thal target Chick details to see information about the sessions connections and devices for that target Targets ign 198242 scorad rad 000401c4 defaulba Connected Figure C 7 72 The following procedure is to log off iSCSI device 1 Click Details Please see Figure C 8 Target Properties E X Sessions Devices Properties This target has the Following sessions Identifier sl FFFFFFFFSS zz c684 400001 3708000000a SE Refresh session Properties Target Portal Group 1 Status Connected Connection Count 1 Session Connections To configure how the connections within this session are load balanced click Connections Connections Ok Cancel Appls Figure C 8 2 Check the Identifier which will be deleted 3 Click Log off
11. Delete a user data volume function 3 6 5 Cache volume Enter Cache volume function to view the status of cache volume The global cache volume is a default cache volume which is created after power on automatically and cannot be deleted The size of global cache is based on the RAM size It is total memory size minus the system usage Create e Delete e F No Size UDY name 1 au Global 303 e Empty Free 0 MB Create e Delete e Figure 3 6 5 1 e CV column description Number of the Cache volume The button next to the CV No is More Information indication It shows the details of the cache volume Size MB Total capacity of the cache volume The button next to the CV size is Resize function The CV size can be adjusted UDV Name Name of the UDV 38 e CV operations description Create Create a cache volume function Delete Delete a cache volume function If there is no free space for creating a new dedicated cache volume cut down the global cache size first After resized then dedicated cache volume can be created SE Tips The minimum size of global cache volume is 40MB The e P Nt minimum size of dedicated cache volume is 20MB 3 6 6 Logical unit number Enter Logical unit function to view the status of attached logical unit number of each UDV User can attach LUN by clicking the Attach Please refer to Figure 3 6 6 1 Host must in
12. Express Gigabit 2 ports TCP IP offload mo 1000 T 73P4201 PCI X Gigabit 2 ports TCP IP offload Intel PWLA8490MT PCI X Gigabit 1 port TCP IP offload P WLA8492MT PCI X Gigabit 2 ports TCP IP offload Intel PWLA8494MT PCI X Gigabit 4 ports TCP IP offload 62 e GbE Switch Venodr Model Y Yo NA A Del PowerComnect 5324 Del PowerConnect 27240 Dell PowerConnect 2708 e Hard drive i Series support SATA I Il disks Vendor EA AAA e aa 7200 7 ST380817AS 80G 7200RPM SATA 1 5Gb s 8M NCQ an a 7200 8 ST3400832AS 400G 7200RPM SATA 1 5Gb s 8M NCQ Barracuda 7200 9 ST3500641AS 500G 7200RPM SATA 3Gb s 16M NCQ Seagate NL35 ST3400633NS 400G 7200RPM SATA 3Gb s 16M Seagate NL35 ST3500641NS 500G 7200RPM SATA 3Gb s 16M Westem Digital Caviar SE WD800JD 80GB 7200RPM SATA 8M 63 B Event notifications e PD S M A R T events Description NENNEN AAA Info Disk inserted nfo Disk lt slot gt is inserted Info Disk removed Info Disk slot is removed Warning S M A R T Warning Disk lt slot gt S M A R T threshold threshold exceed exceed condition occurred for attribute of condition read error rate spin up time reallocated sector count seek error rate A Spin up retries calibration retries Warning S M A R T Warning Disk lt slot gt Failure to get S M A R T information information e Physical HW eve
13. Mail to address 1 Send events 1 INFO O WARNING v ERROR v Mail to address 2 Send events 2 INFO OI WARNING v ERROR v Mail ta address 3 Send events 3 INFO TT WARNING v ERROR v SMTP relay Fj SMTP server Authentication None Account Password Confirm Send test mail L Figure 3 4 7 1 3 4 8 SNMP Select SNMP to set up SNMP trap for alert via SNMP It allows up to 3 SNMP trap addresses Default community setting is public User can choose the event log levels and the default value of SNMP is INFO event log enabled only 5ystem config SNMP SNMP trap address 1 SNMP trap address 2 SNMP trap address 3 Community public Send events INFO kel WARNING LL ERROR O Figure 3 4 8 1 There are many SNMP tools The following web sites are for reference SNMPc http www snmpc com Net SNMP hitp net snmp sourceforge net Mo 3 4 9 Messenger Select Messenger to set up pop up message alert via Windows messenger not MSN User must enable the service Messenger in Windows Start gt Control Panel gt Administrative Tools gt Services gt Messenger and then event logs can be received lt allows up to 3 messenger addresses User can choose the event log levels and the default values are WARNING and ERROR event logs enabled only System config Messenger Messenger IP Computer name 1 Messenger IP Computer name Messenger IP Computer name 3 Se
14. Overheated The system will do the auto shutdown immediately Warning System temperature is a little bit higher _ Error System voltages failed The system will do the auto shutdown immediately Warning System voltage is a little bit higher lower Info PSU restore Info Power number is restored to work Error PSUFail Error Power number is out of work Info Fanrestre Info Fan numbers is restore to work Error FanFal Error Fan number is out of work Error Fannon exist X Error System cooling fan is not installed Error ACLoss Error AC loss for the system is detected Info UPS Detection OK Info UPS detection succeed Warning UPS detection failed Error AC loss for the system is detected Error UPS power low Error UPS Power Low The system will do the auto shutdown immediately 65 e NN Active Failed LAN Port Info RTCDeviceOK _ Info RTC device is active Info ResetPassword Info Reset Admin Password to default Info ResetlP Info Reset network settings set to default System config events AAA AA AAA Sys Config Info Default system configurations restored Defaults Restored Info SysNVRAMOK Info The system NVRAM is active Sys NVRAM IO Error Can t access the system NVRAM Failed Sys NVRAM is full Warning The system NVRAM is full System maintenance events E E
15. Subset Least Queue Depth Weighted Paths This session has the Following connections Source Portal Target Portal Status Type weight t 1923186811 122168511 Conne Active n a 0 gt Figure D 28 88 15 Choose Adavanced Add Connection Target name es a Figure D 29 16 Select Local adapter Source IP and Target Portal to iSCSI data port 2 192 168 12 229 Then select OK Advanced Settings j x General IPS ec Connect by using Local adapter Microsoft iSCSI Initiator T Source IP 192 168 12 34 KL Target Porta ERATE RE eT ERE Checksum Data digest Header digest CHAP logon information CHAF helpe ensure data security by providing authentication bebween a target andan inittator trying to establish a connection To Wee TE speci the same target ie secret that was cantigured on the target for thie mitetor User name Jo 991 05 com microsoft qa chrischau3 Target secret Perom mutual authentication To use mutual CHAF specie an mitiator secret on the Initiator Settings page and contigure that secret on the target Cancel Apply Figure D 30 17 The MC S setting is done 89
16. VR a0 E UDV 2 EI nline D we FH HI d m R RAID O il YG RO 80 3 LIDS a0 Online WEB HI D e e e x a Dr 359m RAID 5 D VG RS at Attach Create e Cielete Figure 3 6 4 1 Figure 3 6 4 1 Create a UDV named UDV 1 related to VG RO size is 50GB status is online write back high priority related to 1 LUN with cache volume 80MB 36 UDV column description Number of this user data volume The button in below to the UDV No is More Information indication lt shows the details of the User data volume Name of this user data volume The button in below to the UDV Name is Rename function Size GB Total capacity of this user data volume The button in below to the size is Extend function The status of this user data volume Online gt user data volume is online Fail gt user data volume is failed WT gt Write Through WB gt Write Back RO gt Read Only The button in below to the status1 is Set read write mode function HI gt High priority MD gt MID priority LO gt LOw priority The button in below to the status2 is Set Priority function gt user data volume is doing initializing R gt user data volume is doing rebuilding M gt user data volume is doing migration mae re e UDV operations description Attach to a LUN Create Create a user data volume function Delete
17. can login because it matches the rule 1 The access will be denied when there is no matching rule 3 6 7 Examples The followings are examples for creating volumes Example 1 is to create two UDVs sharing the same CV global cache volume and set a global spare disk 40 Example 2 is to create two UDVs One shares global cache volume the other uses dedicated cache volume Set a dedicated spare disk e Example 1 Example 1 is to create two UDVs in one VG each UDV uses global cache volume Global cache volume is created after system boots up automatically So no action is needed to set CV Then set a global spare disk The last delete all of them Step 1 Create VG Volume Group To create the volume group please follow the procedures Mame VG RO RAID Level RAID O wi RAID PD slot Select PO zz Back e Next gt gt e Figure 3 6 7 1 Select Volume config Volume group o Click T Create P i 3 Input a VG Name choose a RAID level from the picklist press Select PD t9 choose the RAID PD slot s then press Next gt gt 8 4 Check the outcome Press confirm if all setups are correct 5 Done A VG has been created 41 Create e Dielete e Total Free Mo Mame GB GB ZPD FUDY Status 11213 RAID 1 ViG RO A RAID O Online Create e Delete e Figure 3 6 7 2 Figure 3 6 7 2 Creating a RAID 0 with 2 physical disks named VG RO The total size is 148GB
18. capabilities which meet or exceed the highest industry standards and the best data solution for small medium business SMB users Caution A Please refer to RAM certification list in Appendix A for more detail 1 2 Terminology The document uses the following terms RAID is the abbreviation of Redundant Array of Independent Disks There are different RAID levels with different degree of the data protection data availability performance to host environment The Physical Disk belongs to the member disk of one specific volume group Volume Group A collection of removable media One VG consists of a set of UDVs and owns one RAID level attribute User Data Volume Each VG could be divided into several UDVs The UDVs from one VG share the same RAID level but may have different volume capacity Cache Volume Series uses the on board memory as cache All RAM except for the part which is occupied by the controller can be used as cache User can divide the cache for one UDV or sharing among all UDVs Each UDV will be associated with one CV for data transaction Each CV could be assigned different cache memory size Logical Unit Number A logical unit number LUN is an unique identifier used on a iSCSI connection which enables it to differentiate among separate devices each of which is a logical unit Graphic User Interface RAID width RAID width copy and row are used to describe one VG RAID copy E g
19. have different volume capacity Each UDV will be associated with one specific CV Cache Volume to execute the data transaction Each CV could have different cache memory size from users modification setting LUN is the logical volume unit which the users could access through SCSI commands 3 6 2 Physical disk Enter Physical disk to view the status of hard drives inserted in the system The following are operation tips 1 Multiple select Select one or more checkboxes in front of the slot number Or select the checkbox at the top left corner will select all Check again will select none 2 The list box will disappear if there is no VG or only VG of RAID O JBOD Because these RAID levels cannot be set as dedicated spare disk 3 These three functions Free disks Global spares Dedicated spares can do multiple selects too 4 The operations of the other web pages e g volume config of VG UDV CV LUN pages are similar to previous steps Free disks Global spares e Dedicated spares e Size G Slot WEIN cB aes Status 1 2 Speed d Good F 20340013 83940104 Za WG RO pe Fl np 3 06b 2 Good F o 202600137839401c4 Za WG RO f np 3 cb 3 Gond C e 202100134Ba401c4 Za VG R5 amm Fi np 3 06b 4 Good C o 0330013 6a401c4 Za VH pe fi np 1 5Gh a Good F e 203 0013 89401c04 Za VH amm fi np 3 066 Auto spindoawn Disabled Free disks Global spares e Dedicated spares e Figure 3 6 2 1 Figure
20. on LCM The default setting of these three displays is WARNING and ERROR event logs enabled on Web Ul and LCM The popup is default disabled Show events INFO C WARNING ERROR Pop up events INFO WARNING L ERROR L Show on LCM INFO L WARNING ERROR zz Back e Confirm a Figure 3 4 11 2 The event log is displayed in reverse order which means the latest event log is on the first page The event logs are actually saved in the first four hard drives each hard drive has one copy of event log For one controller there are four copies of event logs to guarantee users can check event log most of the time when there is are failed disk s Tips Please plug in anyone of first four hard drives and then event logs can be saved and appeared in next system boot up Otherwise event logs would be gone 95 3 5 ISCSI config SCSI config selection is for the setup of Entity Property NIC Node Session and CHAP account Entity property iSCSI entity property IC SCSI portal configuration Node SCSI node configuration Session SCSI session information CHAP account Add ERemaove account far iSCSI node Figure 3 5 1 3 5 1 Entity property Select Entity property to view the view the entity name of the controller and setup ISNS IP for SNS Internet Storage Name Service Add an SNS server IP address to the SNS servers list which the iSCSI initiator service can send quer
21. or how many residual spaces on created VGs are free the system will calculate maximum spaces on RAID levels 0 1 3 5 6 Quick install function will occupy all residual VG space for one UDV Quick Install function has a smarter policy When the system is full inserted with 5 HDD and all HDD are in the same size Quick Install function lists all possibilities and sizes among different RAID levels Quick Install will use all available HDD for the RAID level which user decides But when the system is inserted with different sizes of HDD e g 2 200G HDD and 3 80G i Series also lists all possibilities and combinations of different RAID Level and different sizes After user chooses RAID level user may finds there are still some HDD are not used Free Status The result is from i Series s smarter policy on Quick Install which gives user 1 Biggest capacity of RAID level which user chooses and 2 The fewest disk number for the RAID level volume size Step 1 Select Quick install then choose the RAID level to set Please refer to Figure 3 3 1 After choosing the RAID level click Next gt gt which links to another page user can set up LUN here f Quick install f Stepl RAID Level RAID 01 222 GB e i RAID 1 74 GB RAID 3 i 148 GB 1 SND ES seeded anis Figure 3 3 1 Step 2 Please select a LUN number Access control of host would show as a wildcard which means every ho
22. will be stopped after mute The alarm will be muted automatically when the error situation is resolved E g when RAID 5 is degraded and alarm rings immediately after user changes adds one physical disk for rebuilding and when the rebuilding is done the alarm will be muted automatically LED The LED features are describing as follows 1 Marquee Disk Status Disk Rebuilding LED The Marquee Disk Status Disk Rebuilding LEDs are displayed in the same LEDs The LEDs behave for different functions in different stages l Marquee LEDs When system powers on and succeeds to boot up the Marquee LED acts until the system is booting successful l Disk status LEDs the LEDs reflect the disk status for the tray Only On Off situation Il Disk rebuilding LEDs the LEDs are blinking when the disks are under rebuilding Disk Access LED Hardware activated LED when accessing disks IO Disk Power LED Hardware activated LED when the disks are plugged in and powered System status LED Used to reflect the system status by turn on the LED when error occurs or RAID malfunctioning happens Management LAN port LED GREEN LED is for LAN transmit receive indication ORANGE LED is for LAN port 10 100 LINK indication BUSY LED Hardware activated LED when the front end channel is DUSy POWER LED Hardware activated LED when system is powered on Chapter 3 Web GUI guideline 3 1 GUI hierarchy The below table is the hierarchy of Sys
23. 3 6 2 1 Physical disks of slot 1 2 are created for a VG named VG RO Physical disks of slot 3 4 5 are created for a VG named VG R5 32 e PD column description The position of hard drives The number of slot begins from left to right at the front side The button next to the number of slot is More Information indication lt shows the details of the hard drive WWN World Wide Name Size GB Capacity of hard drive VG Name Related volume group name The status of hard drive GOOD gt the hard drive is good DEFECT gt the hard drive has the bad blocks FAIL gt the hard drive cannot work in the respective volume RD gt RAID Disk This hard drive has been set to RAID FR gt FRee disk This hard drive is free for use DS gt Dedicated Spare This hard drive has been set to the dedicated spare of the VG GS gt Global Spare This hard drive has been set to a global spare of all VGs RS gt ReServe The hard drive contains the VG information but cannot be used It may be caused by an uncompleted VG set or hot plug of this disk in the running time In order to protect the data in the disk the status changes to reserve It can be reused after setting it to FR manually R 2 Rebuild The hard drive is doing rebuilding M gt Migration The hard drive is doing migration 3 0G gt From SATA ATAPI standard if the disk can supp
24. 54 Figure 3 5 4 2 Figure 3 5 4 2 SCSI Connection 3 5 5 CHAP account Delete Error recovery count O o T Delete Authentication no lt Back Enter CHAP account function to create delete a CHAP account for authentication iSCSI config CHAP account Create User chapi max 223 Secret 222000 min 12 max 16 Confirm 20 1 mn 12 max 15 Figure 3 5 5 1 Figure 3 5 5 1 Press Create to create a CHAP account 29 Create e Delete e d User chapi Create Delete Figure 3 5 5 2 Figure 3 5 5 2 Create a CHAP account named chap1 3 6 Volume configuration Volume config selection is for the setup of volume configurations including Physical disk Volume group User data volume Cache volume and Logical unit functions Physical disk Hard disks to store data Volume group Sets of physical disks with RAID functions User data volume Slices of volume groups Cache volume Dedicated or global cache space for user data volume Logical unit Target volumes for hosts access Figure 3 6 1 3 6 1 Volume relationship diagram 30 UDV 1 UDV 2 UDV 3 CV Dedicated CV mee ue The above diagram describes the relationship of RAID components One VG Volume Group consists of a set of UDVs User Data Volume and owns one RAID level attribute Each VG can be divided into several UDVs The UDVs from one VG share the same RAID level but may
25. Because of no related UDV there free size still remains 148GB Step 2 Create UDV User Data Volume To create a data user volume please follow the procedures Mame D 1 VG name CV No Global 383 MB Iw Capacity GB s0 Stripe height KB Block size B Read Write O Write through cache 9 write back cache Priority 9 High priority Middle priority Low priority lt Back e Confirm e Figure 3 6 7 3 Select Volume config User data volume Click T Create P i Input a UDV name choose a VG Name and input a size to the UDV decide the stripe high block size read write mode and set priority finally click T Contirm e e Done A UDV has been created Do one more time to create another UDV 49 Attach e Create e Delete e Size R M CY Mo Mame GB Status 1 2 3 m RAID LUN Se MB 1 UoW 1 50 Online D Wwe Ah e e e e e RAID 0 A VG RO 383 2 Lp 2 ag nline fi We Fi HI e e E e RAID 0 a G F0 383 ttach Create e Delete Figure 3 6 7 4 Figure 3 6 7 4 Create UDVs named UDV 1 and UDV 2 related to VG RO the size of UDV 1 is 50GB the size of UDV 2 is 98GB The status of these UDVs are online write back high priority with cache volume 383MB There is no LUN attached Step 3 Attach LUN to UDV There are 2 methods to attach LUN to UDV 1 In Volume config User data volume press T Attach B 5 2 In Volume config Logical unit pr
26. CHAP is a strong authentication method used with point to point for user login It s a type of authentication in which the authentication server sends the client a key to be used for encrypting the username and password CHAP enables the username and password to transmitting in an encrypted form for protection 1 Click in Auth column 2 Select CHAP 3 Goto iSCSI config CHAP page to create account and password iSCSI contig Node Change Authentication Authentication Figure 3 5 3 2 Mame Auth CHAP Iqn 1982 02 scsirald rald 0003401c04 default target Figure 3 5 3 3 4 Select None to disable CHAP Tips After setting CHAP the initiator in host server should be set the same Account Password Otherwise user cannot login 3 5 4 Session Enter Session function it will display iSCSI session and connection information including the following items 1 Host Initiator Name 2 Error Recovery Level 3 Error Recovery Count 4 Detail of Authentication status and Source IP port number 28 No Initiator name TPGT Error recovery level Dia i iqn 1987 05 com cisco D1 cO4 7c42de54 002 o Diti i iqn 19887 05 cam cisco D1 cO47c42de54 Ox02 o Tlie i iqn 1987 05 cam cisco D1 cO47c42de54 Dat a Figure 3 5 4 1 Figure 3 5 4 1 iSCSI Session Pressing the button will display connection s No Initiator IP Initiator name O 192 168 12 212 1qn 1987 05 com csco 04 c047c42de
27. EN 64 C Microsoft iSCSI Inttator nenen enenenenenenen 68 D MPIO and MC S setup instructions 73 Chapter 1 RAID introduction 1 1 Features i Series features Gigabit LAN x2 to SATA II xN bays RAID controller RAID 6 ready SATA II support with SATA backward compatible N way mirror On line volume expansion and RAID level migration Global dedicated cache configuration by volume S M A R T enabled Support Microsoft VDS Virtual Disk Service Disk roaming MPIO ready initiator driver support needed MC S ready initiator driver support needed Support iSCSI header and data digest Support CHAP authentication With proper configuration Series can provide non stop service with a high degree of fault tolerance by the use of Series RAID technology and advanced array management features For more detail please contact with your direct sales or email to sales thecus com Series connects to the host system in iSCSI interface It can be configured to any RAID level i Series provides reliable data protection for servers and the RAID 6 function ready The RAID 6 function allows two HDD failures without any impact on the existing data Data can be recovered from the remaining data and parity drives Data can be recovered from the rest disks drives Thecus RAID system is the most cost effective disk array system with completely integrated high performance and data protection
28. P com microsoft qa chrischoud To rename the initiator node click Change Change To authenticate targets using CHAP click Secret to specify a CHAP secret Secret To configure PSec Tunnel Mode addresses click Tunnel BA Tunnel Figure D 4 4 Attaching LUN to UDV_1 UDV Input the Initiator Node Name in Host field UDV UDV 1 20GB v Host iSCSI node name iqn 1991 05 com microsoft thect LUN Lo a Permission O Read only Read write lt lt Back Confirm Figure D 5 5 The volume config setting is done 75 Attach Detach Host LUN Permission UDV name Session F iqn 1991 05 com microsoft thecuspm thecus com 0 Read write UDV 1 0 Attach Detach Figure D 6 6 Check iSCSI settings The IP address of iSCSI data port 1 is 192 168 11 229 port 2 is 192 168 12 229 for example Name DHCP IP address Netmask Gateway Jumbo frame MAC address Link No 192 168 11 254 Enabled U LAN1 y 192 168 11 229 255 255 255 0 2 00 13 78 04 04 26 a No 12 Enabled U LAN2 192 168 12 229 255 255 255 0 ang 4 G z 00 13 78 04 04 27 3 Figure D 7 7 Add Target Portals on Microsoft iSCSI initiator iSCSI Initiator Properties x General Discovery Targets Persistent Targets Bound Volumes Devices Target Portals Address Pot Adapter IP Address Remove Refresh DND Servers Mame Add Remove Refresh Figure D 8 8 Input the IP address of iSCSI dat
29. PS Type Shutdown Battery Level Shutdown Delay Shutdown UPS 15 Maintenance Upgrade gt Browse the firmware to upgrade Export config Info gt System information Reset to default gt Sure to reset to factory default Config import amp gt Import Export Import file export Shutdown gt Reboot Shutdown Sure to logout 3 2 Login i Series supports graphic user interface GUI to operate the system Be sure to connect the LAN cable The default IP address is 192 168 1 100 open the browser and enter http 192 168 1 100 Please check IP address first on LCM Click any function at the first time it will pop up a dialog for authentication Login name admin Default password admin After login you can choose the function blocks on the left side of window to do configuration Quick install System config iSCSI contig Volume contig Enclosure management Maintenance Logout Figure 3 2 1 There are four indicators at the top right corner E 7 le A Figure 3 2 2 1 RAID light Green means RAID works well Red represents RAID failure happening 2 E oes light Green is normal Red represents abnormal temperature 3 Voltage light Green is normal Red represents abnormal voltage status 4 D UPS light Green is normal Red represents abnormal UPS status 3 3 Quick install It is easy to use Quick install function to create a volume Depend on how many physical disks
30. UDY name 1 au L Global au L e Empty Free 223 MBI Create e Delete Figure 3 6 7 9 1 Select Volume config Cache volume 2 fthere is no free space for creating a new dedicated cache volume cut down the global cache size first by clicking the button gt in the size column After resized click Confirm to return to cache volume page 3 Click reale to enter the setup page 4 Fill in the size and click CARA mti 5 Done A new dedicated cache volume has been set Tips The minimum size of global cache volume is 40MB The minimum size of dedicated cache volume is 20MB Step 2 Create VG Volume Group Please refer to Step 1 of Example 1 to create VG Step 3 Create UDV User Data Volume Please refer to Step 2 of Example 1 to create UDV To create a data user volume with dedicated cache volume please follow the below procedures oe ly ae Mame Eng VG name CV No Capacity GB ep Stripe height KB Black size B Read Write O Write through cache 9 write back cache Priority 9 High priority Middle priority Low priority lt Back Figure 3 6 7 10 1 Select Volume config User data volume 2 Click Create B e Confirm 3 Input a UDV name choose a VG Name select Dedicated cache which is created at Step 1 and input the size for the UDV decide the stripe height block size read write mode and set priority finally cli
31. a port 1 192 168 11 229 as mentioned in previous page 76 mr Target Portal 192 158 11 279 3260 Advanced EISE EME Apply Figure D 9 9 Add second Target Portals on Microsoft iSCSI initiator iSCSI Initiator Properties ee Default Bera pd Figure D 10 71 10 Input the IP address of iSCSI data port 2 192 168 12 229 as mentioned in previous page Add Target Portal 192 168 12 229 3260 d Figure D 11 11 The initiator setting is done 78 12 Log on iSCSI Initiator Properties ids 1581122d S50 Deal Defauk 4 192 168 12 229 3260 Default Apply DTP Figure D 13 79 13 Enable Enable multi path checkbox Then click Advanced Log On to Target F Figure D 14 14 Select Target Portal to iSCSI data port 1 192 168 11 229 Then click OK Advanced Settings Username l anget secret E Perform mutual auiinentication use mutual AA spreto an miitiato secret on tores rator Settings h Si es Ee y Hz 2 4 E Less m Eed L EE GP page a a configure that secret on tne target 80 Figure D 15 15 Log on Enable multi path again iSCSI Initiator Properties E aj General Discovery Targets Persistent Targets Bound Volumes Devices Select a target and click Log On to access the storage devices for that target Click details to see information about the sessions connections a
32. ally a If the new added disk is not clean with other i Series VG information it would be marked as RS reserved and the system will not start auto rebuild b If this disk is not belonging to any existing VG it would be FR Free disk and the system will start Auto Rebuild function c if user only removes the failed disk and plugs the same failed disk in the same slot again the auto rebuild will start by this case But rebuilding in the same failed disk may impact customer data later from the unstable disk status Thecus suggests all customers not to rebuild in the same failed disk for better data protection 2 When there is enough global spare disk s or dedicated spare disk s for the degraded array i Series starts Auto Rebuild immediately And in RAID 6 if there is another disk failure happening during the time of rebuilding i Series will starts the above Auto Rebuild scenario as well And the Auto Rebuild feature only works at RUNTIME It will not work the downtime Thus it will not conflict with the Roaming function In degraded mode the status of VG is DG 58 When rebuilding the status of PD VG UDV is R and R in UDV will display the ratio in percentage After complete rebuilding R and DG will disappear VG will become complete one Tips The list box doesn t exist if there is no VG or only VG of RAID 0 JBOD Because user cannot set dedicated spare disk for these RAID levels
33. are setting is fully supported 2 Read the latest release notes before upgrading Release notes accompany with release firmware 3 A server with a NIC or iSCSI HBA 4 CAT 5e or CAT 6 network cables for management port and iSCSI data ports Recommend CAT 6 cables for best performance 5 Prepare storage system configuration plan 6 Management and iSCSI data ports network information When using static IP please prepare static IP addresses subnet mask and default gateway 7 CHAP security information including CHAP usernames and secrets Optional 2 2 iSCSI introduction SCSI Internet SCSI is a protocol which encapsulates SCSI Small Computer system Interface commands and data in TCP IP packets for linking storage devices with servers over common IP infrastructures iSCSI provides high performance SANs over standard IP networks like LAN WAN or the Internet IP SANs are true SANs Storage Area Networks which allow few of servers to attach to an infinite number of storage volumes by using iSCSI over TCP IP networks IP SANs can scale the storage capacity with any type and brand of storage system In addition using any type of network Ethernet Fast Ethernet Gigabit Ethernet and combining operating systems Microsoft Windows Linux Solaris etc within the SAN network IP SANs also include mechanisms for security data replication multi path and high availability Storage protocol such as iSCSI has two ends i
34. ated spare disk we e on Disks Info Info back cache policy for UDV UDV Read Only Info UDV names is a read only volume WRBK Cache Info Use the write Policy lt name gt WRTHRU Cache Info Use the write through cache policy for UDV bre EN Info PD configuration Error PD slot Iba lt gt length lt gt config read write error lt read write gt failed ew PD read write error Error PD st Iba lt gt length lt gt read write error UDV recoverable Error UDV lt name gt stripe lt gt PD lt gt Iba lt gt read write error length lt gt read write recoverable UDV unrecoverable Error UDV lt gt stripe lt gt PD it Iba lt gt read write error length lt gt read write unrecoverable UDV stripe rewrite Info UDV lt name gt stripe lt gt rewrite column start fail succeed bitmap lt BITMAP gt lt started failed finished gt C Microsoft iSCSI Initiator Here is the step by step to setup Microsoft iSCSI Initiator Please visit Microsoft website for latest iSCSI initiator The following setup may not use the latest Microsoft iSCSI initiator 1 Run Microsoft iSCSI Initiator version 2 03 Please see Figure C 1 2 Click Discovery iSCSI Initiator Properties a X General Discovery Targets Persistent Targets Bound Valumes Devices The SCS protocol uses the following information to uniquely identify this i
35. ation read and write requests to its virtual disks S M A R T Self Monitoring Analysis and Reporting Technology World Wide Name z W Host Bus Adapter Multi Path Input Output MC S Multiple Connections per Session NIC Network Interface Card SCSI Internet Small Computer Systems Interface Challenge Handshake Authentication Protocol An optional security mechanism to control access to an iSCSI storage system over the iSCSI data ports Internet Storage Name Service 1 3 RAID levels RAID 0 Disk striping RAID 0 needs at least one hard drive Disk mirroring over two disks RAID 1 needs at least two hard drives N way Extension to RAID 1 level It has N copies of the disk mirror striping with parity on the dedicated disk RAID 3 needs at least three hard drives Striping with interspersed parity over the member disks RAID 3 needs at least three hard drives RAID 6 2 dimensional parity protection over the member disks RAID 6 needs at least four hard drives RAID 0 1 Mirroring of the member RAID O volumes RAID 0 1 needs at least four hard drives RAID 10 Striping over the member RAID 1 volumes RAID 10 needs at least four hard drives JBOD The abbreviation of Just a Bunch Of Disks JBOD needs at least one hard drive Chapter 2 Getting started 2 1 Before starting Before starting prepare the following items 1 Check the Certification list in Appendix A to confirm the hardw
36. ck i Confirm P 4 Done A UDV using dedicated cache has been created Attach Size R No Name GB Status 1 2 3 1 UDW 1 80 Online O we B HI 2 UDW 2 68 Online O wb B HI a O M e amm I 5 RAID 5 Attach Figure 3 6 7 11 Create RAID RAID 5 G Cv LUN aime MB 0 VG R5 80 VG R5 8 Create Figure 3 6 7 11 UDV named UDV 1 uses global cache volume 80MB and UDV 2 uses dedicated cache volume 80MB UDV 2 is initialing about 596 Create L No Size 1 1 El i s Free 223 MB Create Figure 3 6 7 12 e Delete e UDY name Global LI e Delete e Figure 3 6 7 12 In Volume config Cache volume UDV named UDV 2 uses dedicated cache volume 80MB 48 Step 4 Attach LUN to UDV Please refer to Step 3 of Example 1 to attach LUN Step 5 Set dedicated spare disk To set dedicated spare disks please follow the procedures 1 Select Volume config Physical disk 2 Select a VG from the list box then select the free disk s click Dedicated spares to set as dedicated spare for the selected VG 3 There is a DS icon shown up at status 1 column vG R5 w Free disks Global spares e Dedicated spares e 1 slot WW eee ae Status 1 2 Speed 1 Good 2044001378a401c4 74 VG RS Gees on 1 5Gb s z Good a E E 5 C 204001378340 lcd p VG R5 FH np 1 5Gb 3 Good a E 5 D 2034n001378a401c4 Za VG ES FH np
37. details aspx FamilyID 12cb3c1la 15d6 4585 b385 befd1319f825 amp DisplayLang en Please refer to Appendix C for Microsoft iSCSI initiator installation procedure 2 Linux iSCSI initiator is also available For different kernels there are different iSCSI drivers Please check Appendix A for software iSCSI initiator certification list If user needs the latest Linux iSCSI initiator please visit Open iSCSI project for most update information Linux ISCSI sfnet and Open iSCSI projects merged in April 11 2005 Open iSCSI website hitp www open iscsi org Open iSCSI README http www open iscsi org docs README Features http www open iscsi org cgi bin wiki pl Roadmap Support Kernels http www open iscsi org cgi bin wiki pl Supported Kernels Google groups http qroups google com group open iscsi threads qvc 2 http qroups google com group open iscsi topics Open iSCSI Wiki http www open iscsi org cgi bin wiki pl 3 ATTO iSCSI initiator is available for Mac Website http www attotech com xtend html 2 3 Management methods There are two management methods to manage i Series describe in the following 2 3 1 Web GUI Series support graphic user interface to manage the system Be sure to connect LAN cable The default setting of management port IP is Static IP Default IP address 192 168 1 100 Click any function at the first time it will pop up a dialog to authenticate current user Login name admin Default pa
38. ess fcc H The procedures are as follows Host E LUN Permission Q Read only 9 Read write zx Back Confirm Figure 3 6 7 5 1 Select a UDV 2 Input Host which is an initiator node name for access control or fill in wildcard which means every host can access this volume Choose LUN and permission then click CODE uf 3 Done 43 Attach e Detach e F Host LUN Permission UDY name 5essi0n l o Read write UD 1 E 1qn 1991 05 com microsoft s1300n 1 Read write LIDV 3 O Attach e Detach e Figure 3 6 7 6 Figure 3 6 7 6 UDV1 is attached to LUN 0 with any hosts can access UDV2 is attached to LUN 1 with only initiator note named iqn 1991 05 com microsoft s1300n can access EE Tips Xj The matching rules of access control are from top to down by sequence Please refer 3 6 6 for details Step 4 Set global spare disk To set global spare disks please follow the procedures 1 Select Volume config Physical disk 2 Select the free disk s by clicking the checkbox of the row then click Global spares to set as global spares 3 There is a GS icon shown up at status 1 column Free disks Global spares e Dedicated spares e Size G L Slot WWN Ke e Status 1 2 Speed O 2034001378a401c4 74 VG RO Good Grp 3 06b d mmm c gt al E S Don O 202b001378340104 74 ViG RO ELLA 3 06b 3 Good L S 2 02f001378a401c4 4 PE G 3 066 EE Good F 2D033001378a401c4
39. ies The entity name cann t be changed iSCSI contig Entity property Entity name Iqn 1982 02 iscsiraid raid O00a401ic4 ISNS IP Figure 3 5 1 1 26 3 5 2 NIC select NIC to change IP addresses of iSCSI data ports Name DHCP IP address Netmask Gateway Jumbo frame MAC address Link No 172 16 66 135 Enabled Up LAN1 a 172 16 66 18 255 255 252 0 2 5 00 13 78 04 0a 58 e No 172 16 66 135 Disabled Up LAN2 172 16 66 19 255 255 252 0 00 13 78 04 0a 59 e Figure 3 5 2 2 Figure 3 5 2 2 there are 2 iSCSI data ports User can change IP address by clicking the button in the DHCP column There are 2 selections DHCP Get IP address from DHCP server or static IP iSCSI config NIC IP address DHCP 9 Static Address 132 168 1 1 Mask 255 255 n Es ofr Gateway 192 168 1 254 Figure 3 5 2 3 Default gateway can be changed by clicking the button in the Gateway column There is only one default gateway Jumbo frame setting can be changed by clicking the button in the Jumbo frame column Default setting is Disable 3 5 3 Node Select Node to view the target name for iSCSI initiator The node name of i Series exists by default and can not be changed Mame Auth EP None on 1982 02 5csiraid raid O00asd01c4 default rarget Figure 3 5 3 1 2D 2 CHAP CHAP is the abbreviation of Challenge Handshake Authorization Protocol
40. iew IP Setting Display current IP address subnet mask and gateway Change IP oet IP address subnet mask and gateway There are 2 Config selections DHCP Get IP address from DHCP server or set static IP Reset to Default Reset to default sets password to default admin and set IP address to default setting Default IP address 192 168 1 100 Static IP Default subnet mask 255 255 255 0 Default gateway 192 168 1 1 The following is LCM menu hierarchy Alarm Mute AYes Nov NENNEN Reset AYes Nov Meset Shutdown Shutdown AYes Nov RAID 0 Volume Size Adjust Volume Quick Install RAID 1 RAID 3 xxxxxx Q Size RAID 5 RAID 6 Apply The AYes Nov xxxxxx GB Config Siate I NN Static 1P 192 168 001 100 View IP Setting IP Subnet Mask EN 255 255 255 0 192 168 001 001 EA DHCP AYes Nov Adjust IP Liban Change IP IP Subnet Adjust Submask Config Static IP Mask UB IP Gateway Adjust Gateway IP Apply IP Setting 4 Yes Reset to Default AYes Nov A Nov Caution Before power off it is better to execute Shutdown to flush 2 4 2 the data from cache to physical disks System buzzer The system buzzer features are describing in the following 1 2 3 2 4 3 The system buzzer alarms 1 second when system boots up successfully The system buzzer alarms continuously when there is error level event happened The alarm
41. ion page 4 Choose OK 5 Done The VG has been deleted Tips The action of deleting one VG will succeed only when all of the related UDV s are deleted in this VG Otherwise it will have an error when deleting this VG Step 9 Free global spare disk To free global spare disks please follow the procedures 1 Select Volume config Physical disk 2 Select the global spare disk by clicking the checkbox of the row then click Free disks 82 to free disk Step 10 Done all volumes have been deleted e Example 2 Example 2 is to create two UDVs in one VG One UDV shares global cache volume the other uses dedicated cache volume First dedicated cache volume should be created it can be used in creating UDV The last delete them Each UDV is associated with one specific CV cache volume to execute the data transaction Each CV could have different cache memory size If there is no Special request in UDVs it uses global cache volume Or user can create a dedicated cache for indivifual UDV manually Using dedicated cache volume the performance would not be affected by the other UDV s data access The total cache size depends on the RAM size and set all to global cache automatically To create a dedicated cache volume first step is to cut down global cache size for the dedicated cache volume Please follow the procedures Step 1 Create dedicated cache volume 46 Create Delete F No Size
42. n the connection These ends are the initiator and the target In iSCSI we call them iSCSI initiator and iSCSI target The iSCSI initiator requests or initiates any iSCSI communication It requests all SCSI operations like read or write An initiator is usually located on the host server side either an iSCSI HBA or SCSI SW initiator The SCSI target is the storage device itself or an appliance which controls and serves volumes or virtual volumes The target is the device which performs SCSI commands or bridges it to an attached storage device iSCSI targets can be disks tapes RAID arrays tape libraries and etc Host 1 initiator Host 2 initiator SCSI HBA SCSI device 1 target SCSI device 2 target Figure 2 2 1 The host side needs an iSCSI initiator The initiator is a driver which handles the SCSI traffic over iSCSI The initiator can be software or hardware HBA Please refer to the certification list of SCSI HBA s in Appendix A OS native initiators or other software initiators use the standard TCP IP stack and Ethernet hardware while iSCSI HBA s use their own iSCSI and TCP IP stacks on board Hardware iSCSI HBA s would provide its initiator tool Please refer to the vendors HBA user manual Microsoft Linux and Mac provide software iSCSI initiator driver Below are the available links 1 Link to download the Microsoft iSCSI software initiator http www microsoft com downloads
43. nd devices for that target Targets qn 2004 08 tw com p60e bsca0001 e det Connected Figure D 16 16 Enable Enable multi path checkbox Then click Advanced iSCSI Initiator Propertie E m x Log On to Target E Target name ign 2004 08 ba com p Oc b3ca0001e deFault target Automatically restore this connection when the system boots A Only select this option if iSCSI multi path software is already installed 4 on your computer Sul 5 Cancel Details Log On Refresh OF Cancel Apply Figure D 17 81 17 Select Target Portal to iSCSI data port 2 192 168 12 229 Then select OK Advanced Settings er Microsoft SCSI Initiator Username m r cr DIE e rn fr IPTE AF B chre ap GC j EX D 7 L d en fangetsecret oo KE herp Oo GN PA IAS Bedam mutual authentica eg ue mmutu ppo secret an the Initiator Settings page and configure tnat secret on the target Figure D 18 18 iSCSI device is connected Click Details 82 iSCSI Initiator Properties E E General Discovery Targets Persistent Targets Boun baca Select a target and click Log On to access the storage devices hor that target Click details to see information about the sessions connections and devices for that target Targets le Log On Refresh caos 1 Figure D 19 19 Click Device tab then click
44. nd events INFO TT WARNING v ERROR v Figure 3 4 9 1 3 4 10 System log server Select System log server to set up alert via syslog protocol The default port of syslog is 514 User can choose the facility and the event log level The default values of event level are WARNING and ERROR event logs enabled F System config System log server Server IP hostname Pnrt 514 Facility Event level INFO DO WARNING v ERROR Figure 3 4 10 1 There are some syslog server tools The following web sites are for reference WinSyslog http www winsyslog com Kiwi Syslog Daemon http www kiwisyslog com Most UNIX systems build in syslog daemon 24 3 4 11 Event log Select Event log to view the event messages Press Filter button to choose the display Press Download button will save the whole event log as text file with file name log ModelName SerialNumber Date Time txt Press Clear button will clear event log Press Mute button will stop alarm if system alerts Filter Download e Mute e Clear INFO Wed 08 Aug 2007 18 04 25 CST Up QLICkR 6sa09 has been created INFO Wed 08 Aug 2007 18 04 25 CST vi QUICE4d5427 has been created INFO W ed 08 Aug 2007 18 01 17 CST admin login from 192 168 10 121 via Web UI Figure 3 4 11 1 For customizing your own display of event logs there are total three display methods on Web Ul Console event log page popup windows on Web Ul and
45. ndows Make sure MPIO device is available Then the disk can be tested performance by IOMETER The MC S setup instructions are very similar to MPIO detail steps are in the following figures For the target side setting the steps are exactly the same as MPIO Please refer to Figure D 1 to Figure D 9 AI Qo n 9 Create a VG Create a UDV Run Microsoft iSCSI initiator and check the Initiator Node Name Attaching LUN to UDV 1 UDV Input the Initiator Node Name in Host field The volume config setting is done Check iSCSI settings The IP address of iSCSI data port 1 is 192 168 11 229 port 2 is 192 168 12 229 for example Add Target Portals on Microsoft iSCSI initiator Input the IP address of iSCSI data port 1 192 168 11 229 as mentioned in previous pages iSCSI Initiator Properties l r AX General Discovery Targets Persistent Targets Bound Valumes Devices Target Portals Address Pot Adapter IP Address 192 168 11 229 3260 Default Default Remove Refresh SHS Servers lt ee o a Dees mer Remove Refresh OE Cancel Apply Figure D 23 Log on 85 SCSI Initiator Properties E xj General Discovery Targets Persistent Targets Bound YolumesDevices Select a target and click Log On to access the storage devices hor that target Click details to see information about the sessions connections and devices for that target Targets De
46. nitiator and authenticate targets Initiator Node Mame ign 1991 05 com microsoft demo To rename the initiatar node click Change Change To authenticate targets using CHAP click Secret to e specify a CHAP secret zecret To configure PSec Tunnel Mode addresses click Tunnel Tunnel Apply Figure C 1 68 3 4 Click Add Input IP address or DNS name of iSCSI storage device Please see Figure C 2 Add Target Portal 197 168 11 229 oe Figure C 2 Click OK Please see Figure C 3 iSCSI Initiator Properties 132458 11 229 3260 Default Remove Apply Figure C 3 69 5 Click Targets Please see Figure C 4 SCSI Initiator Properties Select largel and click Lag On to access tne storage devices for bat target Chick details to see information about the sessions connections and devices for that tanget Targets PERRERA E EA ian 19824 cad rad DOC cA delata Inactive Figure C 4 6 Click Log On Please see Figure C 5 Check Enable multi path if running MPIO Log On to Target S l E i Target name gn 1982 02 iscsir aid raid 0008401c4 def aulk karget Automatically restore this connection when the system books Enable multi path A Oribe select this option if SCSI multi path software is already installed on your computer Advanced Cancel Figure C 5 70 8
47. nter Hardware monitor function to view the information of current voltage and temperature 51 Item Information 1 35 1 36 Y min 1 28 Y max 1 47 V EK 3 41 Y imin 3 03 V max 3 63 W 54 H5 14 Y min 4 50 Y max 5 50 W 12 12 23 Y min 10 80 Y max 13 20 V 254 2 59 Y min 2 35 V max 2 85 W Core Processor 43 0 C hyst 0 0 C high 65 0 C1 Location 1 39 0 C hyst 0 0 C high 60 0 ICH Location 2 33 5 C hyst 0 0 C high 60 0 ICH Auto shutdown Confirm Figure 3 7 2 1 If Auto shutdown has been checked the system will shutdown automatically when voltage or temperature is out of the normal range For better data protection please check Auto Shutdown For better protection and to avoid single short period of high temperature triggering Auto shutdown i Series use multiple condition judgments for Auto shutdown below is the detail of when the Auto shutdown will be triggered 1 The core processor temperature limit is 85 C i Series will check each sensor every 30 seconds When sensor is over the high temperature value for continuous 3 minutes the Auto shutdown will be triggered immediately 2 If the high temperature situation doesn t last for 3 minutes i Series will not do auto shutdown 3 7 3 Hard drive S M A R T function support S M A R T Self Monitoring Analysis and Reporting Technology is a diagnostic tool for hard drives t
48. nts SAA AAA Warning Single bit ECC error is detected Error Multi bit ECC error is detected Error ECC DIMM Info ECC Memory is installed Installed Info Eror Host chip failure Error Host channel chip failed Error__ Drive chip failure Error Drive channel chip failed e HDD IO events AE AAN IA Error Disk lt slot gt read block error Error Disk lt slot gt writes block error HDD failure Error Disk lt slot gt is failed Error Disk lt slot gt IO incomplete 64 e SES events AA AAA AAA Info SES load conf OK Info SES configuration has been loaded Failure SES device is disabled Info SESisdisabled Info The SES device is disabled Info SESisenabled_ Info The SESdeviceisenabled e Environmental events A AS ISA e Info Admin login from lt IP or serial console gt via lt Web UI or Console Ul gt eee Info Admin logout from lt IP or serial console gt via lt Web UI or Console Ul gt iSCSI data port Info iSCSI login from lt IQN gt lt IP Port login Number gt succeeds Warning iSCSI data port Warning iSCSI login from lt IQN gt lt IP Port login reject Number gt was rejected reason of initiator error authentication failure authorization failure target not found unsupported version too many connections missing parameter session does not exist target error out of resources unknown Error System
49. o give advanced warning of drive failures S M A R T provides users chances to take actions before possible drive failure S M A R T measures many attributes of the hard drive all the time and decide the hard drives which are close to out of tolerance The advanced notice of possible hard drive failure can allow users to back up hard drive or replace the hard drive This is much better than hard drive crash when it is writing data or rebuilding a failed hard drive Enter S M A R T function will display S M A R T information of hard drives The number is the current value the number in parenthesis is the threshold value The threshold values of hard drive vendors are different please refer to vendors specification for details 59 FE Enclosure management SMART Slot Read error Spin up Reallocated sector Seek error Spin up Calibration Temperature rate time count rate rebies rebies C 1 20051 158 21 1971140 200 51 10051 100151 2 2 200151 168f21 176 140 200151 100151 100151 aa 3 20051 16721 200140 100 51 10051 100151 B9 4 2D0 51 157 21 200 140 100 513 100 51 100 51 39 F 200 51 167 21 200140 200 51 10051 10051 31 Figure 3 7 3 1 3 7 4 UPS Enter UPS function will set UPS Uninterruptible Power Supply UPS Type Shutdown Battery Level 99 Shutdown Delay 5 Shutdown UPS Status Battery Level 92 Confirm e Figure 3 7 4 1 Currently the system only suppor
50. ormation including SES config Hardware monitor S M A R T and UPS functions For the enclosure management there are many sensors for different purposes such as temperature sensors voltage sensors hard disks power sensors and LED status And due to the hardware characteristics are different among these sensors for different sensors they have different polling intervals Below is the detail polling time intervals Temperature sensors 1 minute Voltage sensors 1 minute Hard disk sensors 10 minutes Power sensors 10 seconds when there are continuous 3 times of error controller sends ERROR event log ER s 50 5 LED status 10 seconds SES config Access control for SES management Hardware monitor System monitored voltage temperature and battery backup module 5 M A R T Self monitoring analysis and reporting technology for physical disks UPS Uninterruptible power supply Figure 3 7 1 3 7 1 SES configuration SES represents SCSI Enclosure Services one of the enclosure management standards Enter SES config function can enable or disable the management of SES Enable Disable IT Host LUN Permission UDY name RW ii D Read write SES Enable Disable Figure 3 7 1 1 Figure 3 7 1 1 Enable SES in LUN 0 and can be accessed from every host The SES client software is available at the following web site SANtools http www santools com 3 7 2 Hardware monitor E
51. ort ATAPI IDENTIFY PACKET DEVICE command and the speed can achieve Serial ATA Gen 2 signaling speed 3 0Gbps 1 5G gt From SATA ATAPI standard if the disk can Speed mee re support ATAPI IDENTIFY PACKET DEVICE command and the speed can achieve Serial ATA Gen 1 signaling speed 1 5Gbps Unknown gt The disk doesnt support above command so the speed is defined as unknown e PD operations description Make the selected hard drive to be free for use Global Set the selected hard drive s to global spare of all spares VGs Dedicated Set hard drive s to dedicated spare of selected VGs spares In this page Series also provides HDD auto spindown down function to save power The default value is disabled User can set up in physical disk page too Auto spindawn Disabled Select B Free disks a Global spares e Dedicated spares e Figure 3 6 2 2 Volume config Physical disk Auto spindovin Auto spindown Figure 3 6 2 3 34 3 6 3 Volume group Enter Volume group to view the status of each volume group e VG column description Total L No Name cB 1 WG RO 3 3 148 2 VG ES DW 3 S 148 Create e Delete Free GB PD FUDY Status 11213 RAID Online RAID O S I ne Online RAID 5 A 3 1 ne Create Delete Figure 3 6 3 1 Figure 3 6 3 1 There is a RAID 0 with 2 physical disks named VG RO total size is 148GB related to 2 UDV
52. out The options are 1 Disable 2 5 mins 3 30 mins 4 1 hour The system will log out automatically when the user is no response for a period of time 2 Login lock Disable Enable When the login lock is enabled the system allows only one user to login modify the system settings System config Login config Auto logout Disable Bl tem CORSE e Enable Figure 3 4 4 1 3 4 5 Password Select Password is for changing administrator password The maximum length of admin password is 12 characters F System contig Password Old password Password Contirm Figure 3 4 5 1 91 3 46 Date Select Date to set up the current date time and time zone before using or synchronize time from NTP Network Time Protocol server System config Date WO Time zone 9 Setup date and time manually Date 1970 if G Time 16 He ES O NTP Server Figure 3 4 6 1 3 4 7 Mail Select Mail to enter at most 3 mail addresses for receiving the event notification Some mail servers would check Mail from address and need authentication for anti spam Please fill the necessary fields and select Send test mail to check whether the email works fine User can also select which levels of event logs are needed to be sent out by Mail Default setting is only ERROR and WARNING event logs enabled _99 System config f Mail Mail from address mailmanmiss500
53. put an initiator node name for access control or fill in wildcard which means every host can access the volume Choose LUN number and permission then click confirm Please refer to Figure 3 6 6 2 Users can assign up to 256 LUNs per system controller For host connections the number of simultaneous hosts are limited to 32 hosts per system controller For single user data volumes UDV up to three hosts can access one UDV at the same time Tips Three hosts access the same UDV in the same time The function is depending on the software installed on the client PC i e MetaSAN 39 UDY UDVW 1 5068 sw Host LUN O v Permission Q Read only 9 Read write lt lt Back e Confirm Figure 3 6 6 1 Attach e Detach e C Host LUN Permission UDY name 5essi0n F o Read write UDVY 1 1 1qn 1991 05 com microsoft s1300n il Read write UDV 2 O Attach e Detach e Figure 3 6 6 2 Figure 3 6 6 2 UDV 01 is attached to LUN 0 with every host can access UDV 02 is attached to LUN 1 with only initiator note named iqn 1991 05 com microsoft s1300n can access e LUN operations description Attach a logical unit number to a user data volume Detach a logical unit number from a user data volume The matching rules of access control are from top to down by sequence For example there are 2 rules for the same UDV one is LUN 0 the other is iqn host1 LUN 1 The other host iqn host2
54. r configuration values to origin settings Config import amp export to export and import all controller configuration except for VG UDV setting and LUN setting and Shutdown to either reboot or shutdown the system Upgrade Remote upload firmware Info System information Reset to default Reset to factory default Config import amp export Import export configurations Shutdown Reboot or shutdown system 54 Figure 3 8 1 3 8 1 Upgrade Enter Upgrade function to upgrade firmware Please TA new firmware file named xxxx bin in local hard drive then press I to select the file Click onim it will pop up a message Upgrade system now If you want to downgrade to the previous FW later please export your system config first click Cancel to export system config first then click OK to start to upgrade firmware Browse the firmware to upgrade Browse Export config Confirm Figure 3 8 1 1 WA Uperade system now M Tf rou want to downgrade to the previous EW later please export your sstem config first Cancel Figure 3 8 1 2 When upgrading there is a progress bar running After finished upgrading the system must reboot manually gt t Tips Xj Please contact with www thecus com for latest firmware 3 8 2 Info Enter Info function will display system information including firmware version CPU type installed system memor
55. rhea Thecus Series User s Manual Preface About this manual This manual is the introduction of i Series and to help user to know the operation of the disk array system easily Information contained in the manual has been reviewed for accuracy but not for product warranty because of the various environments OS settings Information and specification will be changed without further notice For any update information please visit www thecus com and your contact windows Copyright 2008 Thecus Technology Corp All rights reserved Thank you for using Thecus Technology Corp products Please contact with sales thecus com to get the latest user manual and firmware If you have any question please e mail to sales thecus com We will answer your question as soon as possible The RAM size of i Series is recommended DDR 333 512MB or above Please refer to the certification list in Appendix A Table of Contents Chapter 1 RAID introduction 5 1 1 EECHER 5 1 2 i e E 6 1 3 FS WMC IS A E E A 8 Chapter 2 Getting started 9 2 1 Belore Sta O BEE 9 2 2 Leute ele tel BE 9 2 3 Management methods ccooccocccoccccncociconiccncnnnncncnnnnnnnss 11 2 3 1 MN Sa a 11 2 3 2 Remote control secure bell 12 2 4 Enciso EE ENTERS 12 2 4 1 LE RE 12 2 4 2 SE eege Seege 14 2 4 3 BEE 14 Chapter 3 Web GUI guideline
56. rk Management Protocol SNMP Transmits net send and Alerter service messages between clients and servers Alert to remote system log server System event log to record critical events Figure 3 4 1 System name Select System name to change system name Default system name composed by model name and serial number of this system System contig System name System name 5500 440174 Figure 3 4 1 1 19 3 4 2 IP address Select IP address to change IP address for remote administration usage There are 2 selections DHCP Get IP address from DHCP server or static IP The default setting is Static IP 192 168 1 100 enabled User can change the HTTP HTTPS and SSH port number when the default port number is not allowed on host server System config IP address DHCP 9 Static Address 192 168 1 100 Mask Eisen esha Saye i Gateway 192 158 1 1 DAS js Hp MAC OO 13 78 A4 01 04 uu 80 Ale 443 55H port CR Figure 3 4 2 1 3 4 3 Language Select Language is to set the language shown in Web UI The option Auto Detect will be detected by browser language setting System config Language Language English w Simplified Chinese Figure 3 4 3 1 20 3 4 4 Login config Select Login config is to set only one admin and set the auto logout timing The only one admin can prevent multiple users access the same controller in the same time 1 Auto log
57. ssword admin Or login with the read only account which only allows seeing the configuration and cannot change setting Login name user Default password 1234 2 3 2 Remote control secure shell SSH secure shell is required for 1 Series to remote login The SSH client software is available at the following web site SSHWinClient WWW http www ssh com Putty WWW http www chiark greenend org uk Host name 192 168 1 100 Login name admin Default password admin Tips Thecus i Series only support SSH for remote control For using SSH the IP address and the password is required for login 2 4 Enclosure 2 4 1 LCM There are four buttons to control LCM LCD Control Module including A up v down ESC Escape and ENT Enter After booting up the system the following screen shows management port IP and model name 192 168 1 100 Series Press ENT the LCM functions Alarm Mute Reset Shutdown Quick Install View IP Setting Change IP Config and Reset to Default will rotate by pressing 4 up and w down When there is WARNING or ERROR level of event happening the LCM shows the event log to give users more detail from front panel too The following table is function description Mute alarm when error occurs Reset Shutdown Reset or shutdown controller Quick three steps to create a volume Please refer to section 3 3 for operation in web Ul V
58. st can access this volume In this page the Volume size can be changed The maximum volume size is shown To re enter the size be sure it has to be less or equal to maximum volume size Then click T Next gt gt Do gt Step 3 Confirm page Click confirm it all setups are correct Then a page with the User data volume just been created will be shown as Figure 923 2 Done You can start to use the system now Attach Create Delete Size R VG CY LI Mo Mame GB Status 1 2 3 7 RAID LUN Epis MB 1 QUICKIE 73 222 Online D wB A HI L T A e e RAID LU 1 QUICK 13203 383 Attach e Create e Delete e Figure 3 3 2 Figure 3 3 2 A RAID 0 user data volume with the UDV name QUICK98273 named by the system itself with the total available volume size 222GB 18 3 4 System configuration System config selection is for the setup of System name IP address Language Login config Password Date Mail SNMP Messenger System log server and view Event log System name IP address Language Login contig Password Messenger System log server Event log 3 4 1 System name for identification Internet Protocol IP address for remote administration Language preference for WebUI Configuration for auto logout and login lock Administrator s password System time for event log Alert by e mail Alert via Simple Netwo
59. t and communicate with smart UPS function of APC American Power Conversion Corp UPS Please check detail from http www apc com First connect the system and APC UPS via RS 232 for communication Then set up the shutdown values when the power is gone UPS of other vendors can work fine but they have no such function of communication UPS Type Select UPS Type Choose Smart UPS for APC None for other vendors or no UPS Shutdown When below the setting level the system will Battery Level shutdown Setting level to 0 will disable UPS 53 Shutdown lf power failure occurred and the system can not Delay s return back to the setting value period the system will shutdown Setting delay to 0 will disable the function Select ON when power is gone UPS will shutdown by itself after the system shutdown successfully After power comes back UPS will start working and notify system to boot up OFF will not The status of UPS Detecting Running Unable to detect UPS Communication lost UPS reboot in progress UPS shutdown in progress Batteries failed Please change them NOW Battery Level Current percentage of battery level 3 8 System maintenance Maintenance function allows operation of the system functions including Upgrade to the latest firmware Info to show the system version Reset to default to reset all controlle
60. tails Log 0 E Refresh caos 1 Figure D 24 10 Then click Advanced iSCSI Initiator Properties Log On to Target Target name A Only select this option if S51 multi path software is already installed on your computer ced Susi 5 Details Log On Refresh OF Cancel Apply Figure D 25 86 11 Select set Local Adapter Source IP and Target Portal to iSCSI data port 1 192 168 11 229 Then click OK Advanced Settings ter Microsoft iSCSI Initiator Username J mpe AA H Ve gt langetsecreb T Perom mutual authentication louse mutua Enie scr ah initiator secret on tie mtatar settings gel l Figure D 2 12 After connected click Details then in the Session Connections 87 tab click SCSI Initiator Properties E x General Discovery Targets Persistent Targets Bound Volumes Devices Select a target and click Log On to access the storage devices hor that target Click details to see information about the sessions connections and devices for that target Targets Hames o oe ee ee Cte le Log On Refresh caos 1 Figure D 27 13 Choose Round Robin for Load Balance Policy 14 Add Source Portal for the SCSI data port 2 192 168 12 229 Session Connechons Load Balance Policy Round Robin bl Round Robin DC Round Robin With
61. tem Config System name IP address Language Login config Password Date Mail SNMP Messenger System log server Event log ISCSI config Entity Property NIC Node Session CHAP account Volume config Physical disk Volume group User data Volume Cache volume Logical unit Enclosure management SES config Hardware monitor S M A R T UPS gt Y vvv ve de de de db vv ve de de vv i Series GUI Step 1 Step 2 Step 3 Confirm System name DHCP Static Address Mask Gateway DNS HTTP port HTTPS port SSH port Language Auto logout Login lock Old password Password Confirm Time zone Date Time NTP Server Mail from address Mail to address Sent events SMTP relay SMTP server Authentication Account Password Confirm Send test mail SNMP trap address Community Send events Messenger IP hostname Send events Server IP hostname Port Facility Event level Filter Download Mute Clear Entity name SNS IP IP settings for iSCSI ports Become default gateway Set Jumbo Frame Change Authentication Delete Create Delete Free disks Global spares Dedicated spares More information Auto Spindown Create Delete More information Rename Migrate Attach Create Delete More information Rename Extend Set read write mode Create Delete More information Resize Attach Detach Enable Disable Auto shutdown U
62. ust be larger than the original and then click confirm to start extension d Extension starts If UDV needs initialization it will display an I in Status 3 and complete percentage of initialization in R96 Size 90 Free 58 GB lt lt Back e Confirm Figure 4 3 1 Figure 4 3 1 Extend UDV RO from 80GB to 90GB Tips The size of UDV extension must be larger than original Caution UDV Extension cannot be executed during rebuild or migration 4 3 Disk roaming Physical disks can be re sequenced in the same system or move whole physical disks from system 1 to system 2 This is called disk roaming Disk roaming has some constraints as described in the following 1 Check the firmware of two systems first It is better that both have same firmware version or newer 2 Whole physical disks of related VG should be moved from system 1 to system 2 together The configuration of both VG and UDV will be kept but LUN configuration will be cleared to avoid conflict with system 2 60 Appendix A Certification list e RAM i Series RAM Spec 184pins DDR333 PC2700 Reg register or UB Unbufferred ECC or Non ECC from 64MB to 1GB 32 bit or 64 bit data bus width x8 or x16 devices 9 to 11 bits column address Vendr CMe o IEA ATP AB28L7208SHC4S 1GB DDR 400 ECC Reg with Samsung Unigen UG764D7588KZ DH 512MB DDR 333 ECC Reg with Elpida PA i 256MB DDR 333 Unbuffered Lo
63. w profile with Hynix Mmmm 512MB DDR 333 Unbuffered Low profile with Hynix Unigen UG718D6688LN GJF 1GB DDR 400 with Hynix Unigen UG718D6688LN GJF 1GB DDR 400 with Elpida 61 SCSI Initiator Software 0S8 Software Release Number AAA AA AA Microsoft Microsoft iSCSI Software Initiator Version 2 04 Windows system Requirements 1 Windows XP Professional with SP2 2 Windows 2000 Server with SP4 3 Windows Server 2003 with SP1 4 Windows Server 2003 R2 The iSCSI Initiators are different for different Linux Kernels For Red Hat Enterprise Linux 3 Kernel 2 4 install linux iscsi 3 6 3 tar For Red Hat Enterprise Linux 4 Kernel 2 6 use the build in ISCSI initiator iscsi initiator utils 4 0 3 0 4 in kernel 2 6 9 For Red Hat Enterprise Linux 5 Kernel 2 6 use the build in SCSI initiator iscsi initiator utils 6 2 0 695 0 7 e15 in kernel 2 6 18 ATTO XTEND 2 0x SAN Mac iSCSI Initiator system Requirements 1 Mac OS X v10 3 5 or later SCSI HBA card AA Adaptec ASC 7211C PCI X Gigabit 1 port TCP IP offload iSCSI offload UE PCI Express Gigabit 2 ports TCP IP offload iSCSI offload Logic QLA4010C PCI X Gigabit 1 port TCP IP offload iSCSI offload QLogic QLA4052C PCI X Gigabit 2 ports TCP IP offload iSCSI offload NIC Vendor Model AA AAA A D Link DGE 530T PCI Gigabit 1 port HP NC7170 PCI X Gigabit 2 ports HP NC360T PCI
64. will be cleared 56 3 8 5 Shutdown Enter Shutdown function it will display Reboot and Shutdown buttons Before power off it s better to press Shutdown to flush the data from cache to physical disks The step is better for the data protection Reboot Shutdown e Figure 3 8 5 1 3 9 Logout For security reason Logout function will allow logout while no user is operating the system Re login the system please enter username and password again 57 Chapter 4 Advanced operation 4 1 Rebuild If one physical disk of the VG which is set as protected RAID level e g RAID 3 RAID 5 or RAID 6 is FAILED or has been unplugged removed then the VG status is changed to degraded mode the system will search detect spare disk to rebuild the degraded VG to a complete one It will detect dedicated spare disk as rebuild disk first then global spare disk i Series support Auto Rebuild function When the RAID level allows disk failures which the VG is protected such as RAID 3 RAID 5 RAID 6 and etc i Series starts Auto Rebuild as below scenario Take RAID 6 for example 1 When there is no global spare disk or dedicated spare disk on the system Series will be in degraded mode and wait until A there is one disk assigned as spare disk or B the failed disk is removed and replaced with new clean disk then the Auto Rebuild starts The new disk will be a spare disk to the original VG automatic
65. y and controller serial number 55 3 8 3 Reset to default Enter Reset to default function it allows user to reset controller to the factory default setting Sure to reset to factory default Contirm Figure 3 8 3 1 Reset to default sets password to default admin and set IP address to default as Static IP Default IP address 192 168 1 100 Static IP Default subnet mask 255 255 255 0 Default gateway 192 168 1 1 3 8 4 Config import amp export Enter Config import amp export function it allows user to save system configurable values export function and to apply all configuration import function For the volume config setting the values are available in export function and not available in import function which can avoid confliction date deleting between two controllers That says if one controller already has valuable data on the disks and user may forget it use import function could return to the original config If the volume setting was also imported the user s current data will be cleared Import Export Import ATI Import file Import Lagical unit only ugue Export Confirm e Figure 3 8 4 1 1 Import Import all system configurations including volume config 2 Import Logical unit only No system and volume configurations 3 Export Export all configurations to a file Caution Import function will import all system configurations including volume config the user s current data

Download Pdf Manuals

image

Related Search

Related Contents

Milwaukee 49-24-0145 User's Manual  操作ガイド (本体編)  217001 Utilisation des phytocides  Hinweis - novagrid ag  IP Camera user manual  manual de instrucciones  PB 60120-02 ATLAS COPCO  Toshiba Tecra R850-S8552  EC type-examination certificate UK/0126/0138  

Copyright © All rights reserved.
Failed to retrieve file