G-Technology G-RACK 12 User Manual

Copyrights
Copyrights
p. 3
Copyrights
G-Technology and G-RACK 12 are registered trademarks of Western Digital Corporation or its affiliates in the United States and/or other countries. Apple, Mac, Final Cut Pro, FireWire, MacBook Pro, Time Machine and the Mac logo are trademarks of Apple, Inc., registered in the U.S. and other countries. Microsoft, Active Directory, Internet Explorer, Windows, Windows Vista and Windows XP are trademarks or registered trademarks of Microsoft Corporation in the US and/or other countries. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. Intel, Thunderbolt and the Thunderbolt logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Other trademarks are the property of their respective owners.
©2016 Western Digital Corporation. R3 01/16
Introduction
Introduction
p. 5
The G-RACK 12 is a complete Network Attached Storage (NAS) system. The G-RACK 12 uses state of the art hardware and software to provide a turnkey storage solution for today’s storage user. Configuration and management is done through an easy to use web interface.
The G-RACK 12 hardware combines Intel® Xeon® processors, latest generation hard disks, high speed networking, with the G-RACK 12 software to provide a solution that is both powerful and easy to maintain.
The G-Technology NAS OS has been customized and optimized for speed, reliability and ease of use. The operating system implements the latest stable Linux® kernel combined with the powerful BTRFs file system. Features and compatibility are balanced so you get to provide a high speed solution that will work in most modern network environments.
When you install the G-RACK 12 you will get a fully operational storage system ready to use on your network.
Introduction
p. 6
About G-RACK12
The G-RACK 12 Network-Attached Storage (NAS) delivers the ultimate in high-performance, centralized storage for small-to-medium size post-production houses, ad agencies, TV/broadcast studios and in-house creative departments that use Avid Media Composer®, Final Cut Pro X®, or Adobe Premiere® software.
The G-RACK 12 brings G-Technology’s industry-leading reliability, scalability and studio-friendly technology to shared storage. Streamline demanding media and entertainment workflows of 4K and above with:
A flexible 12-Bay server in 48TB to 120TB capacities;
An optional 48TB to 120TB Expansion Module;
Seamless integration with your data network and non-linear editing (NLE) suites; and
The latest Btrfs file system for better data protection and faster content recovery.
Key Features:
Enterprise-grade Network-Attached Storage (NAS)
Seamless integration with top non-linear editing suites
Internet Small Computer System Interface (iSCSI) support for simple shared storage management over data networks
G-Technology NAS operating system with easy-to-use workstation interface and setup Wizard
Advanced B-tree file system (Btrfs) for superior data protection
Scalable 12-bay server with 48, 72, 96, 120TB capacities
Expandable to 240TB capacity with optional 120TB Expansion Module
Up to 2000 MB/s transfer rates
Ultra-reliable premium quality G-Technology hard disk drives
Outstanding 5-Year limited warranty
Introduction
p. 7
Safety Notice
Please read and observe the following precautions to assure personal safety. Improper use can result in hazardous situations.
1. The G-RACK 12 operates normally in the temperature range of 0ºC–50ºC and relative humidity of 8%–90%. Please make sure the environment is well ventilated.
2. The power cord and devices connected to the G-RACK 12 must provide correct supply voltage (100W, 90–264V). If unsure, please contact the distributor or the local power supply company.
3. Do NOT place the G-RACK 12 in direct sunlight or near chemicals.
4. Unplug the power cord and all the connected cables before cleaning. Wipe the G-RACK 12 with a dry towel. Do NOT use chemical or aerosol to clean the G-RACK 12.
5. Do NOT place any objects on the G-RACK 12 during normal system operations to avoid overheat.
6. Use the flat head screws in the product package to lock the hard disk drives in the G-RACK 12 when installing the hard drives for proper operation.
7. Do NOT place the G-RACK 12 on any uneven surface to avoid falling off and damage.
8. Do NOT expose the G-RACK 12 to dampness, dust, corrosive or any liquids.
9. Do NOT attempt to repair the G-RACK 12 in any occasions. Improper dissemblance of the product may expose you to electric shock or other risks. For any inquiries, please contact the distributor.
10. Do NOT use the G-RACK 12 near water, for example, in a wet basement or near a swimming pool.
11. Do NOT place any object on the power cord. Do NOT locate the G-RACK 12 where it can be stepped on or tripped over.
12. Do NOT install, use, or service the G-RACK 12 during a thunder storm. There is a remote risk of electric shock from lightning.
13. If an extension cord is used with the G-RACK12, make sure that the total ampere rating of the equipment plugged into the extension cord does not exceed the extension cord ampere rating. Also, make sure that the total rating of all products plugged into the wall outlet does not exceed the fuse rating.
14. Do NOT drop the G-RACK 12.
15. Do NOT use the G-RACK 12 outside, and make sure all the connections are indoors.
16. Never push objects of any kind into the G-RACK 12 through the chassis slots as they may touch dangerous voltage points or short out parts that could result in a fire or electric shock.
17. ONLY qualified service personnel should service or disassemble the G-RACK 12.
18. If the power adapter or cord is damaged, remove it from the power outlet. Do NOT attempt to repair the power adapter or cord. Contact your local vendor to order a new one.
Introduction
p. 8
System Requirements
Any computer that will be used to access your the G-RACK 12 must meet these requirements to ensure the best use experience:
Software
A Microsoft® Windows® or Apple Macintosh computer running one of these operating systems:
Windows 7, 8.1, or 10, with the latest Service Pack installed
Mac OS X 10.9, 10.10, 10.11
Supported Web browsers:
Microsoft Internet Explorer® 11 or newer (Windows only)
Microsoft Edge
Apple Safari v9 newer (Windows or Mac)
Mozilla Firefox® v42 or newer (Windows or Mac)
Google Chrome™ v46 or newer
Hardware
Local area network (LAN) or wireless LAN (WLAN)
Network switch or router, with at least one available Ethernet port
Internet connection (for remote access to server and software and firmware updates)
Ethernet port on your computer
NOTE: Compatibility may vary depending on your computer’s hardware configuration and operating system. For highest performance and reliability install the latest updates and service packs.
Getting Started
Getting Started
p. 10
What’s in the Box
You should inspect the box in which the G-RACK 12 was shipped and note if it was damaged in any way. If the unit itself shows damage you should file a damage claim with the carrier who delivered it.
Decide on a suitable location for the rack unit that will hold the G-RACK 12; it should be situated in a clean, dust-free area that is well ventilated. Avoid areas where heat, electrical noise and electromagnetic fields are generated. You will also need it placed near a grounded power outlet.
The G-RACK 12 must be handled with care during unpacking and installation. Drives may be damaged by rough handling, shock or vibration. Be aware of the following precautions when unpacking and installing your external storage product:
Do not drop or jolt the drive.
Do not move the drive while it is powered on.
Do not use this product as a portable drive.
Determine the area you plan on placing this device - designed for 19” data rack. Open the outer box, then open the inner box. Two people should work together to remove the device from the box. Remove the rail kit and install into the rack. Install the G-RACK 12 into the rack (or place the unit in your desired location).
Make sure that the package is not damaged.
Getting Started
p. 11
Box Contents
The G-RACK 12 server including 12 bays with internal hard drives
(2) Power cords
(2) Bezel locking Keys
Front bezel
Rack rail kit
Rail kit adapter
Hardware QSG
Software QSG
5-Year limited warranty
3.2. G-RACK 12 View
Getting Started
p. 12
Front View
Rear View
Getting Started
p. 13
G-RACK 12 Installation
Preparing for Setup
The box the G-RACK 12 was shipped in should include two sets of rail assemblies, two rail mounting brackets and the mounting screws you will need to install the system into the rack. Follow the steps in the order given to complete the installation process in a minimum amount of time. Please read this section in its entirety before you begin the installation procedure outlined in the sections that follow.
Choosing a Setup Location
Leave enough clearance in front of the rack to enable you to open the front door completely (˜25 inches) and approximately 30 inches of clearance in the back of the rack to allow for sufficient air flow and ease in servicing.
This product is for installation only in a Restricted Access Location (dedicated equipment rooms, service closets and the like).
Determine the area you plan on placing this device - designed for 19” data rack.
Warnings and Precautions
Rack Precautions
Ensure that the leveling jacks on the bottom of the rack are fully extended to the floor with the full weight of the rack resting on them.
In single rack installation, stabilizers should be attached to the rack. In multiple rack installations, the racks should be coupled together.
Always make sure the rack is stable before extending a component from the rack.
Only one chassis should be extended from the rack at a time - extending two or more simultaneously may cause the rack to become unstable.
Server Precautions
Review the electrical and general safety precautions.
Determine the placement of each component in the rack before you install the rails.
Install the heaviest server components on the bottom of the rack first, and then work up.
Use a regulating uninterruptible power supply (UPS) to protect the server from power surges, voltage spikes and to keep your system operating in case of a power failure.
Allow any hot plug drives and power supply modules to cool before touching them.
Always keep the rack front door and all panels and components on the servers closed when not servicing to maintain proper airflow and cooling.
Getting Started
p. 14
Rack Mounting Considerations
Ambient Operating Temperature
If installed in a closed or multi-unit rack assembly, the ambient operating temperature of the rack environment may be greater than the ambient temperature of the room. The consideration should be given to installing the equipment in an environment compatible with the manufacturer’s maximum rated ambient temperature (TMRA).
Sucient Air ow
Equipment should be mounted into a rack so that a hazardous conditions does not arise due to uneven mechanical loading. These include: even floor surfaces, rack stabilizers, and making sure the server rails are level.
Mechanical Loading
Equipment should be mounted into a rack so that a hazardous condition does not arise due to uneven mechanical loading.
Circuit Overloading
Consideration should be given to the connection of the equipment to the power supply circuitry and the effect that any possible overloading of circuits might have on overcurrent protection and power supply wiring. Appropriate consideration of equipment nameplate ratings should be used when addressing this concern.
Reliable Ground
A reliable ground must be maintained at all times. To ensure this, the rack itself should be grounded. Particular attention should be given to power supply connections other than the direct connections to the branch circuit (i.e. the use of power strips, etc.).
Warning! To prevent bodily injury when mounting or servicing this unit in a rack, you must take special precautions to ensure that the system remains stable. The following guidelines are provided to ensure your safety:
This unit should be mounted at the bottom of the rack if it is the only unit in the rack.
When mounting this unit in a partially filled rack, load the rack from the bottom to the top with
the heaviest component at the bottom of the rack.
If the rack is provided with stabilizing devices, install the stabilizers before mounting or servicing
the unit in the rack.
Slide rail mounted equipment is not to be used as a shelf or a work space.
Getting Started
p. 15
Installing the System into a Rack
This section provides information on installing the G-RACK 12 chassis into a rack unit with the quick­release rails provided. There are a variety of rack units on the market, which may mean the assembly procedure will differ slightly. You should also refer to the installation instructions that came with the rack unit you are using.
Separating the Sections of the Rack Rails
The chassis package includes two rail assemblies in the rack mounting kit. Each assembly consists of two sections: an inner fixed chassis rail that secures directly to the server chassis and an outer fixed rack rail that secures directly to the rack itself.
Installing the Inner Rail Extension
The G-RACK 12 chassis includes a set of inner rails in two sections: inner rails and inner rail extensions. The inner rails are pre-attached to the chassis, and do not interfere with normal use of the chassis if you decide not to use a server rack. The inner rail extension is attached to the inner rail to mount the chassis in the rack.
Installing the Inner Rails
1. Place the inner rail extensions on the side of the chassis aligning the hooks of the chassis with the rail extension holes. Make sure the extension faces “outward” just like the pre-attached inner rail.
2. Slide the extension toward the front of the chassis.
3. Secure the chassis with 2 screws as illustrated. Repeat steps for the other inner rail extension.
Warning: do not pick up the server with the front handles. They are designed to pull the
system from a rack only.
Getting Started
p. 16
Figure 2-1. Separating the Rack Rails
Slide rail mounted equipment is not to be used as a shelf or a work space.
Stability hazard. The rack stabilizing mechanism must be in place, or the rack must be bolted to the floor before you slide the unit out for servicing. Failure to stabilize the rack can cause the rack to tip over.
Getting Started
p. 17
Figure 2-2. Assembling the Outer Rails
Outer Rack Rails
Outer rails attach to the rack and hold the chassis in place. The outer rails for the G-RACK 12 chassis extend between 30 inches and 33 inches.
Installing the Outer Rails to the Rack
1. Secure the back end of the outer rail to the rack, using the screws provided.
2. Press the button where the two outer rails are joined to retract the smaller outer rail.
3. Hang the hooks of the rails onto the rack holes and if desired, use screws to secure the front of the outer rail onto the rack.
4. Repeat steps 1-3 for the remaining outer rail.
Getting Started
p. 18
Figure 2-3. Installing the Rack Rails
Installing the Chassis into a Rack
1. Extend the outer rails as illustrated above.
2. Align the inner rails of the chassis with the outer rails on the rack.
3. Slide the inner rails into the outer rails, keeping the pressure even on both sides. When the chassis has been pushed completely into the rack, it should click into the locked position.
4. Optional screws may be used to secure the to hold the front of the chassis to the rack.
NOTE: The gure above is for illustration purposes only. Always install servers to the bottom of the rack rst.
Getting Started
p. 19
Physically Connecting G-RACK 12
1. Plug in 2 power cords to back of the G-RACK 12
2. Plug in the Ethernet cable
3. LEDs will flash green on ethernet port.
4. Press power button
Getting Started
p. 20
Connecting G-RACK 12 to Your Network
When first powered on, during the initial boot sequence, the G-RACK 12 will wait to be assigned an IP address via DHCP. If it does not receive a DHCP assigned IP address, by default, it will have a self­assigned IP address of 172.16.12.12. It is recommended to use IP Search Utility when accessing and configuring the G-RACK 12 for the first time. To make any needed changes in the network settings you can use web-based the G-RACK 12 Administrative Tool.
This can be found using Bonjour browser - Download Link (http://www.tildesoft.com/) or using dhclient
Getting Started
p. 21
If not using DHCP, you can plug your primary network cable into [ETH1]. The default IP Address is
172.16.12.12. You can connect to the G-RACK 12 with this static IP address and with the G-RACK 12 Administration Tool you can change the IP address to what works best for you.
Using static IP, you will need to change your client computer’s IP address to match the static.
For OS X:
1. Open Network Preferences
2. Choose WiFi and click “Advanced”
3. Click on TCP/IP tab
4. Click the drop down menu and choose “manually”
5. Enter IP 172.16.12.12
6. Enter Netmask 255.255.255.0
Getting Started
p. 22
7. Save your settings
For Windows:
1. Open Network
2. Go to Sharing > Change adapter settings and choose your connected network
3. View Properties.
4. Click Internet Protocol Version 4 and
5. Click Properties
Getting Started
p. 23
6. Change the IP to 172.16.12.12
7. Netmask 255.255.255.0
8. Save your settings
THE FURTHER PROCEDURES SHOULD BE COMPLETED ON ANOTHER NETWORKED CLIENT
COMPUTER WITH A WEB BROWSER
Access the G-RACK 12 by using a supported web browser and use the IP address of the device ( Listed in Bonjour or using Static IP from above)
Getting Started
p. 24
G-RACK 12 Web-Based Setup Wizard
The G-RACK 12 Web-based Administration Tool will initially provide a wizard or vertical market selection that is associated with a particular JSON configuration file that will configure the system in a single click of a mouse. The composite configuration will include a format for configuring the following:
Admin password setup;
Email notification;
User authentication;
Data disk configuration;
Networking performance.
THE FURTHER PROCEDURES SHOULD BE COMPLETED ON ANOTHER NETWORKED CLIENT
COMPUTER WITH A WEB BROWSER
Access the G-RACK 12 by using a supported web browser and use the IP address of the device ( Listed in Bonjour browser or using Static IP from previous chapter) The G-RACK 12 has a setup Wizard that allows you to quickly step through the basic procedures of the device settings for the first use and to configure it for your environment.
STEP 1. Access the G-RACK 12 by using a supported web browser. Use the IP address of the device(Refer to Bonjour browser or apply Static IP of the device). Log into the G-RACK 12 Administrator Tool: user: admin password: gtech
Getting Started
p. 25
STEP 2. End User License Agreement. An information window with the End User License Agreement prompting you to confirm will appear Please confirm that you have read and agree with the Agreement.
STEP 3. Choose a theme for your environment Theme is a set of pre-configured parameters, that are most likely to suit to desired working environment.
You can skip Wizard by pressing Skip To Storage Setup button Using the G-RACK 12 Administrative Tool you are free to reconfigure the G-RACK 12 later.
Getting Started
p. 26
STEP 4. Web Admin Password. Set your G-RACK 12 Admin password here. Login user name will remain “admin”. Please note that password is case sensitive. Min length is 5 characters. If you don’t change the password at this step, it will remain as default. You can reset it later using Web Administrator Password
Getting Started
p. 27
STEP 5. Email Notification Enable this option to receive notifications from the G-RACK 12 on drives and system health. It is possible to set email notifications later using Monitoring Settings menu. An email account for the G-RACK 12 is to be created prior to enabling this option.
Enable Toggle the button to enable the option
SMTP server Specify the SMTP server of the G-RACK 12 email
account
SMTP port Specify the SMTP port of the G-RACK 12 email
account
Use SSL/TLS secure connection Toggle to enable secure connection for of the
G-RACK 12 email account
Sender email Specify the G-RACK 12 email account
Authentication required Toggle to enable authentication
Username Specify Username of the G-RACK 12 email ac-
count
Password Specify Password of the G-RACK 12 email ac-
count
Recipient email Specify who will receive email for the G-RACK 12
to send to emails
Getting Started
p. 28
To choose additional notification alerts, go to Notifications in the G-RACK 12 Administration Tool.
STEP 6. Create User Accounts Set up at least one user to continue. User names are lower case only without length limits. Passwords allow both lower and upper cases ( case-sensitive) with the minimal length of 5 characters.
Choose whether all users will share a single workspace or each user will be assigned a separate one.
STEP 7. Customize your G-RACK 12 You will not see this dialog if you have chosen General theme. Divide space between Project shares and iSCSI Media. Setting a percentage of the space to be used for iSCSI Media will allocate the space on the default RAID created and this space will be displayed as occupied in the RAID under the Storage menu once the Wizard is completed.
Getting Started
p. 29
STEP 8. Customize the G-RACK 12 Shares and Targets settings. Enable network protocols to used for each Share (workspace) and Targets.
STEP 9. The G-RACK 12 Build Summary. This step is informational. Review the configuration settings to be applied to your G-RACK12.
Getting Started
p. 30
STEP 10. Welcome to the G-RACK 12 Administrative tool Once you are done with primary settings, you will see the Dashboard
Getting Started
p. 31
All settings can be changed manually in the G-RACK 12 Administrative Tool at any time.
Administrative Tool
Administrative Tool
p. 33
To access the Web user interface, open a web browser, type in the IP address of your G-RACK 12 and log in.
Dashboard
You are here
The G-RACK 12 Dashboard provides a quick overview of performance metrics and health statuses in the form of widgets. The title of a widget is a quick access link to the corresponding menu of the G-RACK 12 Administrative Tool. The information is periodically refreshed automatically.
System Status
Administrative Tool
p. 34
The widget displays the summary of total memory , used memory and CPU usages by all running processes. Click the widget title to see more details in the System Overview section. Network Health The widget indicates the state of the network connection and input/output traffic. Click the widget title to see more information in the Performance statistics section.
Drive Health
The widget displays the general health status for OS and Data physical drives. The status can be one of the following: “OK”, “Checking”, “Warning”, “Error”. Click the widget title to see more information in the S.M.A.R.T. menu section.
Filesystem Status
The widget shows all filesystems that have been created, and specifies total space allocated for each of them, space available and the status. The status can be one of the following: “Good”, “Replacing”, “Balancing”, “Degraded”, “Replacing_ stuck”. Click the widget title to see more information in the RAID section. More details on OS filesystem is in OS RAID menu.
System Health
The widget displays the status of CPU temperature, Fan speed and Voltage. The status can be one of the following: “OK”, “Abnormal”. For more details click the widget title to be see more information in the Monitoring section.
Connected Users
The widget displays all connected users except guests users along with the time of connection to the G-RACK 12. Dashboard will not show that a user is ‘logged into’ the G-RACK 12 server if the user logged in as user ‘ anonymous’ to the FTP service. This also applies to users who use the SMB/CIFS service if ‘guests allowed’ options is turned on. Click the widget title to go to Users menu for further information and settings.
System Information
The widget displays general system information, including hostname, system time and load average values. Click the widget title to go to System Overview menu for further information.
Service Status
Administrative Tool
p. 35
The widget displays the services available and their status. The status can be the following:
means the service is enabled.
means disabled.
the services disabled. Normally this goes together with service disable sign.
means the service is running.
If you see a RED running man, that means the service is stopped.
Click the widget title to see more information under Services section.
Workspace Status
The widget displays the workspaces created on the G-RACK 12 .
means at least one service is enabled for this particular workspace.
means no service is enabled for this particular workspace.
Administrative Tool
p. 36
Workspaces
You are here
Add/Edit Workspace
To create a Workspace, there should be a RAID already created.
Click the Add button to create a new Workspace
The following table describes the labels on the screen:
Name Input the name of the Workspace
Device Select RAID array, which will contain the volume.
Multiple volumes can share the same space in RAID.
Administrative Tool
p. 37
Compress files Compress files on-the-fly using Zlib algorithm.
NOTE: It is not recommended to enable Zlib option, if the volume will be used to work with video files.
Permissions The file level access of the shared folder path
Comment Add notes on the Workspace here
Click the Permissions button to set users and groups access permission for the Workspace. To change properties click the Edit button.
Modify Shared Folder Permissions
Click the Permissions button to set permission for the Workspace
The following table describes the labels on the screen:
Administrative Tool
p. 38
Directory Choose a workspace to set permission to
User/group permissions Decide on permission to be granted to a partic-
ular user or group for the workspace and toggle the button on.
Advanced options
Advanced options can be found by clicking the arrow at the bottom of the dialog window. The options allow specific access rights to individual users and groups to be assigned.
Owner The name of the owner and associated per-
missions
Group The name of the group and associated permis-
sions
Others Permissions for others, guests and anonymous
user types.
Replace Toggle on to replace all existing permissions
Default -” On”
Recursive Toggle on to apply permissions to files and
subfolders. Default -” On”
To enable domain users go to the Active Directory menu.
NOTE: In some situations the permissions of a user may differ from the permissions of a group he is assigned to.
NOTE: It is important to note that additionally you can also enable a guest account. This enables users without local or domain account to access the shares. Before they can access any share user „guest“ must be allowed under access settings for this share.
Create snapshot
A snapshot is a volume that shares its data and metadata with another volume. Once a writable snapshot is made, there is no difference between the original volume and the new snapshot volume.
Administrative Tool
p. 39
The following table describes the labels on the screen:
Device Name of the related physical disk
Volume’s name Name of the volume
Snapshots’s path The relative path according to root of the se-
lected file system
Read only Toggle to make the snapshot read-only
Quotas
This option is used to limit the amount of disk storage space that is allowed for a workspace. When the quota limits are approached or exceeded , the system will generate notifications. To set quota limits, select the Workspace and click the Quota button to open the setting dialog.
General settings
To enable quota limits toggle the button on and click Save.
Administrative Tool
p. 40
Quota information
The table lists all created workspaces, space already used and their quota
Select the workspace to set a quota limit and click the Edit Quota Limits button.
NOTE: It is not possible to set the quota limit less than the already used space.
Mount
Click the Mount button to mount a workspace. Until you mount the workspace, all the options will remain unavailable.
Unmount
To unmount the selected workspace, highlight it and click the Unmount button.
Administrative Tool
p. 41
Delete Workspace
To delete a workspace highlight the workspace and click Delete button.
Administrative Tool
p. 42
Storage
You are here
Physical Disks
This information page displays all the hard drives of the G-RACK 12. It shows the drive slot number, system name of the drive, vendor, model, serial number and disk capacity. For best practice we recommend using all disks of the same capacity and the same vendor.
Physical disk properties
To enter the properties dialog select desired drive and click the Edit button.
Administrative Tool
p. 43
The following table describes the labels on the screen:
Spindown time Directly connected with Advanced Power
Management level chosen. Sets the idle time for the drive after which the spindle will stop spinning.
Write cache Enables write-cache.
This option is effective only if the hard drive supports it. It gives substantial write perfor­mance boost at the cost of loosing data on power down.
Wipe physical drive
This option erases all the data from a physical disk. When you click the button, a warning message will appear to inform you that all the data will be erased.
There are two options for wiping - Secure and Quick
Quick - erases only boot sector and file system meta data so that the drive will be treated by OS as a brand new one. Secure - in addition to the Quick erase functionality, Secure erase also erases all user’s data, which makes the data unrecoverable.
Administrative Tool
p. 44
Scan for new drives
Use this option to force the system to scan for new drives. The system automatically scans for new drives every minute.
S.M.A.R.T.
S.M.A.R.T. stands for “Self-Monitoring, Analysis and Reporting Technology”. This is the system on a hard drive used to monitor and report on the health of the drive. It helps to diagnose the system and provide early warnings about the drives’ health.
Devices
Provides the list of all installed physical drives. It is possible to switch on S.M.A.R.T. monitoring here and call Device properties dialog. In the list you can toggle the switch for each drive individually.
The following table describes the labels on the screen
Monitor Toggle on to enable monitoring
Device System name of the physical disk
Model Manufacturer’s model of the physical disk
Vendor Name of the vendor
Serial number Serial number of the physical disks
Capacity Capacity of the physical disk
Temperature Current temperature of the physical disk
The status of the physical disks is displayed in the Drive Health widget of the Dashboard:
OK - drives operating properly.
Checking - system is checking the health status of the drives.
Warning - at least one drive that has exceeded a S.M.A.R.T. parameters
Error - S.M.A.R.T. has detected at least one drive with a failure. The drive may need to be replaced.
Device properties
To enter the dialog select desired drive and click the Edit button.
Administrative Tool
p. 45
To allow S.M.A.R.T. monitoring system wide, select all the drives, then click the Edit button. Toggle the button and save.
S.M.A.R.T. information dialog provides a set of reports. The screens below display the information about the physical drive health. NOTE: The available S.M.A.R.T. information varies from one physical disk’s manufacturer to another. Also, not all physical disks have S.M.A.R.T. support.
Device information
Select the device and click the information button to pull up the information dialog.
The following table describes the labels on the screen:
Device Device reference name in the system
Device model Shows the hard drive’s model that uniquely
identifies a physical disk
Serial number Shows the individual serial number of an indi-
vidual physical disk from the manufacturer
Firmware version Shows the version of physical drive’s internal
operating system software.
Attributes
Describe the physical drive state, performance and other data S.M.A.R.T. can access.
Administrative Tool
p. 46
The following table describes the labels on the screen:
ID Identification number to mark a hard drive at-
tribute. This is a standard across all S.M.A.R.T. enabled storage devices. However it depends on the storage vendor which attributes it will allow S.M.A.R.T. to diagnose.
Attribute name This refers to an attribute of the hard drive that
S.M.A.R.T. can access. Attributes describe the drive’s physical state. performance, etc.
Administrative Tool
p. 47
Flags Indicates the main purpose of the attribute. An
attribute can be critical (able to predict failure) or statistical one ( does not directly affect condi­tion)
P - pre-failure
O - online
S - performance
R - error
C - event count
K - self-preserving
+ - any other flag
Value Value that correspond to the Raw value. Com-
pare this with the Threshold. S.M.A.R.T. com­presses the raw value(s) into a digit from 1 to 253, where 1 indicates the worst scenario while 253 indicates the best scenario. The value 100 or 200 usually represent the normal value.
Worst This is the lowest value attained by the hard
drive since S.M.A.R.T. started its assessment of the physical drive.
Treshold This is the attribute’s threshold value. if the at-
tribute’s current normalized value is less than or equal to the threshold, the attribute has failed. An attribute value close to or below the thresh­old indicates the hard drive is no longer reliable
When failed The field indicates when ( if ever) the attribute
failed. An attribute has failed if the normalized value is less than or equal to the threshold
Raw value This is the attribute’s unprocessed raw data.
These values show exact amount of time or numbers of attempts or errors. The meaning to the raw values is specific to the physical drive manufacture.
Self-test logs
This tab will show the results of any self-test that have been run
Administrative Tool
p. 48
Extended information from smartctl utility
Administrative Tool
p. 49
History
Scheduled Tests
Add/ Edit scheduled test
For each of the devices you can schedule a particular test from the list. The test will run at a pre­determined time and date. Click the plus button to add a scheduled test.
The following table describes the labels on the screen:
Enable Enables the scheduled test to run
Device Select a physical drive for a test. S.M.A.R.T. moni-
toring must be activated for the selected device.
Administrative Tool
p. 50
Type Choose type of test.
Short self-test
The goal of the short test is the rapid identi­fication of a defective hard drive. Therefore, a maximum run time for the short test is 2 min. The test checks the disk by dividing it into three different segments. The following areas are tested:
Electrical Properties: The controller tests its own electronics, and since this is specific to each manufacturer, it cannot be explained exactly what is being tested. It is conceiv­able, for example, to test the internal RAM, the read/write circuits or the head electron­ics.
Mechanical Properties: The exact sequence of the servos and the positioning mecha­nism to be tested is also specific to each manufacturer.
Read/Verify: It will read a certain area of the disk and verify certain data, the size and position of the region that is read is also specific to each manufacturer.
Long self-test
The long test was designed as the final test in production and is the same as the short test with two dierences. There is no time restriction and in the Read/Verify segment the entire disk is checked and not just a section. The Long test can, for example, be used to confirm the results of the short tests.
Conveyance self-test
This test can be performed to determine dam­age during transport of the hard disk within just a few minutes.
Oine immediate self-test
Administrative Tool
p. 51
Hour Set the time when the test will be performed.
Asterisk means “every hour”
Day of month Set the day when the test will be performed.
Asterisk means “every day”
Month Set the month when the test will be performed.
Asterisk means “every month”
Day of week Set the day of the week when the test will be
performed. Asterisk means “every week”
Comment Add optional text here
The test created will appear under the Scheduled tests tab.
To disable the test, toggle off the enable button. The test will not run, but will remain in the list.
Execute scheduled test
The Run button starts the test immediately. When finished, output is displayed in the dialog window. Most of the tests update smart attributes/counters that are shown in Attributes tab under S.M.A.R.T. information
Delete
Click the Delete button to delete the test.
Settings
Use this screen for setting hardware sensors to monitor physical disks’ health. They detect and report the changes the behavior of the fan, temperature and voltage.
Administrative Tool
p. 52
The following table describes the labels on the screen:
Enable Toggle on to enable S.M.A.R.T. monitoring for
the physical disks
Check interval Sets the interval between disk checks to N sec-
onds.
Administrative Tool
p. 53
Power mode Prevent a disk from being spun-up when it is
periodically polled.
Never - Poll (check) the device regardless of its power mode. This may cause a disk which is spun-down to be spun-up when it is checked.
Sleep - Check the device unless it is in SLEEP mode.
Standby - Check the device unless it is in SLEEP or STANDBY mode. In these modes most disks are not spinning, so if you want to prevent a disk from spinning up each poll, this is probably what you want.
Idle - Check the device unless it is in SLEEP, STANDBY or IDLE mode. In the IDLE state, most disks are still spinning, so this is prob­ably not what you want.
Difference Report if the temperature had changed by at
least N degrees Celsius since last report. Set to 0 to disable this report.
Informal Report if the temperature is greater or equal
than N degrees Celsius. Set to 0 to disable this report.
Critical Report if the temperature is greater or equal
than N degrees Celsius. Set to 0 to disable this
report. The changes of status will be reflected in Dashboard. If the values are between LNC ( Low Non Critical)and UNC( Upper Non Critical), it is “OK”. Otherwise the status is “Abnormal”
“Abnormal” status for the fan means that it is failing, and the related hardware temperature will go up.
If the temperature is too high and shows the “Abnormal” status in Dashboard, the system will shut down by itself to protect the hardware, will malfunction or will break down. If voltages are not stable and the Dashboard displays “Abnormal” status, the system will show unstable behavior. It may randomly freeze or will not respond. If you experience any of these issues, call support team.
Administrative Tool
p. 54
RAID
This menu is used to set RAID configuration and format the data drives.
The status is displayed in the Dashboard and can be one of the following:
Good - normal state. everything is ok
Unmounted - filesystem unmounted, not in use
Degraded - there is a drive missing. The filesystem is still operational. Replace the missing drive.
Replacing (%) - the user has added a replacement drive into the system and the system in the process of bringing it into the RAID. Percentage will show how much is completed.
Balancing - when the filesystem is re-allocating/ distributing the information across all the drives
Delete missing - system is removing the drive that has failed( drive is gone), recovery operation
Replacing_stuck - mounting has been resumed after rebooting, but the physical disk is missing
Administrative Tool
p. 55
Create RAID device
Use this menu to create a new data RAID device
The following table describes the labels on the screen:
Name Input a name for new RAID
Level Choose RAID level from the list - 5 or 6. Please
refer to Appendix for additional information. Default displayed is RAID 5.
Devices Select physical drives, that will be part of this
RAID array.
NOTE: The minimal number of drives for different RAID levels is:
RAID 5 - minimum 2 physical disks
RAID 6 - minimum 3 physical disks
For best practice we recommend using all disks of the same capacity and the same vendor. If your system happens to have disks of different capacity, please make sure to have the disks of the same size within one RAID (When using disks of different sizes, the system may report the capacity incorrectly). This approach will help to ensure data integrity and security, it’s also associated with correctly storing and fetching the data.
Administrative Tool
p. 56
Grow RAID device
Select devices to be added to the RAID device. The list will display unassigned physical drives. Remember to perform balance on any modification of RAID structure.
The following table describes the labels on the screen:
Name The name of the RAID
Level The level of the RAID
Devices Choose physical drive to join the RAID array
NOTE: Remember to perform balance on any modification of RAID structure.
For best practice we recommend using all drives of the same capacity. If your system happens to have drives of different capacities, please make sure to have drive of the same capacity within one RAID. This approach will help to ensure data integrity and security, it’s also associated with correctly storing and fetching the data.
Remove devices from RAID
Select devices to be removed from the RAID device. Repeat the steps if you need to remove more than one physical drive.
Administrative Tool
p. 57
The following table describes the labels on the screen:
Name The name of the RAID
Level The level of the RAID
Devices Choose the physical disk to be removed from
the RAID
NOTE: The minimal number of drives for different RAID levels is:
RAID 5 - minimum 3 physical disks
RAID 6 - minimum 4 physical disks
Select hot spare devices for RAID
Hot spare is a standby physical disk that can repair a degraded RAID device by automatically replacing a failed disk. Setting a hot spare will minimize degraded array state. Click the Hot spare button to call the dialog to set a hot spare for a RAID. Select devices to be added as a hot spare to the selected RAID device
The following table describes the labels on the screen:
Name The name of the RAID will be displayed here
Level The level of the RAID will be displayed here
Devices Choose the physical disk to be set as a hot spare
It is possible to assign one standby physical disk as a hot spare to be shared by several RAID devices. Once the the data rebuilding finishes, the administrator can take out the faulty physical disk, insert a new one and assign it to be a new hot spare.
For best practice we recommend using a drive of the same capacity as the faulty drive.
Administrative Tool
p. 58
Balance
While the RAID is being balanced, its status in the field State will be “balancing”. Balance operation may take a significant amount of time. Balancing may have impact on the RAID performance but does not block any regular operations.
Array details
The menu will call the array information window
Mount
Click the Mount button to mount the RAID device. A newly created RAID will be mounted automatically
Unmount
To unmount the selected RAID click the Unmount button. To make this option active, all volumes of the RAID are to be deleted. Otherwise the status of the RAID will be displayed as “referenced” and Unmount option will stay inactive.
Delete
Click the Delete button to delete a RAID The button will become active only when unmounted RAID is selected.
Refresh
Click the Refresh button to force the system to search for new RAIDs or display the latest changes.
Administrative Tool
p. 59
Connect
You are here
Advanced Menu & Simple Menu
Simple menu button is set to shrink the displayed menu buttons to the most used items. The icons that are not displayed will remain hidden until you press the Advanced menu button. Simple menu displays only Network, Services, NFS, SMB/CIFS, AFP and iSCSI SCST. Advanced menu also includes FTP, Rsync and SSH.
Network
General
Here you can set the G-RACK 12 host and domain information.
Administrative Tool
p. 60
The following table describes the labels on the screen:
Hostname Label that identifies the system to the network
Domain Name DNS domain where the G-RACK 12 hostname
should be registered
Administrative Tool
p. 61
Interfaces
Add/Edit Ethernet
The menu is used to configure and add network interfaces. Both ipv4 and ipv6 are configurable using this menu. To configure a particular interface highlight, that interface and select the edit button.
Administrative Tool
p. 62
Set configuration for each network interface.
The following table describes the labels on the screen:
Name Type in the name if( active)
Comment Add text to remind you what the inteface is con-
nected to
IPv4 For IP version 4 protocol setup
Method Static - you manually enter an ip address of your
choosing, netmask and gateway Dynamic - allow dhcp server to assign you an ip address, a netmask and the gateway.
Address Supplied if you choose static or automatically
supplied if you dynamic method has been cho­sen
Netmask Add Netmask
Gateway Add Gateway
IPv6 For IP version 6 protocol setup
Method DHCP - allow DHCP server to assign you an IP
address, Netmask and the gateway. Auto - requests information specifically from an IPv6-enabled router and automatically config­ure your settings Static - Enter manually an IP address of your choosing, netmask and gateway( provided by your system administrator). Disabled - do not use IPv6
Address Add address
Prefix length Default value is always 64
Gateway Add gateway
Advanced settings
DNS servers IP addresses of domain name servers used to
resolve host names
Search domains Domains used when resolving host names
Administrative Tool
p. 63
MTU Media Transfer Unit - the size of the packet pay-
load for the this interface
Wake-on-LAN Toggle to enable Wake-on-Lan if packets arrive
at this interface
Options Additional device settings, e.g. ‘autoneg off
speed 100 duplex full’. See manual page for more details.
Administrative Tool
p. 64
Add/Edit Bond
Bonding is a technology that allows aggregations of multiple Ethernet interfaces into a single virtual link, thus getting higher data rates and providing failover.
How to Port Bond 4 ports:
1. Login to admin tool after G-RACK 12 has been setup and configured with one of the primary Ethernet ports (eth0 or eth1) I am using DHCP eth0 port to login as.
2. Navigate to Connect > Network > Interfaces tab
3. G-RACK 12 will configure eth0 and eth1(static). Delete eth1 interface.
4. After eth1 has been deleted, eth0 should be only one remaining. You will need this for now, do not delete both or all eth ports or else you will not be able to login to the admin tool with an IP address.
5. Click on “+” to add a new network interface.
6. Select “Bond” interface
7. In the Add bond connection view that displays, under the available slaves list select all 3 available and currently disabled eth ports.
The following table describes the labels on the screen:
Name Enter the name of the connection
Comment Add an optional text here
Bond Slaves Choose slaves from the drop down list
Mode Specifies one of the bonding policies
Primary Specifies which slave is the primary device.
Administrative Tool
p. 65
MII monitoring frequency Specifies the MII link monitoring frequency in
milliseconds
Down delay Specifies the time, in milliseconds, to wait
before enabling a slave after a link recovery has been detected
Up delay Specifies the time, i n milliseconds, to wait
before enabling a slave after a link recovery has been detected
IPv4 For IP version 4 protocol setup
Method Static - you manually enter an ip address of your
choosing, netmask and gateway Dynamic - allow dhcp server to assign you an ip address, a netmask and the gateway.
Address Enter an IP address
Netmask Enter the subnet mask of your network
Gateway Enter the IP address of your gateway
IPv6 For IP version 6 protocol setup
Method DHCP - allow DHCP server to assign you an IP
address, Netmask and the gateway. Auto - requests information specifically from an IPv6-enabled router and automatically config­ure your settings Static - Enter manually an IP address of your choosing, netmask and gateway( provided by your system administrator). Disabled - do not use IPv6
Address Enter an IP address
Prefix length Default value is always 64
Gateway Enter the IP address of your gateway
Advanced Settings
DNS servers IP addresses of domain name servers used to
resolve host names
Search domains Domains used when resolving host names
Administrative Tool
p. 66
MTU Media Transfer Unit - the size of the packet pay-
load for the this interface
Wake-on-LAN Toggle to enable Wake-on-LAN if packets arrive
at this interface
Options Additional device settings, e.g. ‘autoneg off
speed 100 duplex full’. See manual page for more details
Under IPv4 choose either static or DHCP as the method.
Not changing any other settings, save the new bond configuration. Bond0 should display in the list with a DHCP IP generated.
Log out of the admin tool after getting IP for bond0 interface, then login to the admin tool with bond0 IP instead.
Navigate back to Connect > Network > Interfaces and delete eth0 interface.
After deleting eth0 successfully edit bond0 interface and add eth0 slave to bond interface then save.
bond0 should now have all 4 Ethernet ports as slave members; IP should not have changed.
Remember to add all four ports on switch side to be trunk members in LACP Lag type configuration as well.
Once a new bond connection has been created, use “Edit Ethernet connection” dialog for its configuration.
Administrative Tool
p. 67
Identify
This menu is used to find Ethernet port corresponding to the particular Interface.
Delete
To delete an interface, hightlight it and click the Delete button.
Service Discovery
The service allows the tool that probes each TCP/UDP port to see if there is a service listening. Then the tool will know that the service is available to connect to the G-RACK 12. If the advertising of service of each port is turned on, the port can be scanned .
NOTE: Enabling a service discovery for a particular service does not enable the service itself. To enable the service, refer to the corresponding setting menu under Connect menu.
Administrative Tool
p. 68
Firewall
Firewall Filters the network traffic based on specific ruled, added by the administrator .
Add/Edit
By adding custom rules , it is possible to allow or block access based on the service or application, source or destination IP addresses, time of the day. its also possible to choose to log traffic that matches or does not match the defined rule.
Administrative Tool
p. 69
The following table describes the labels on the screen:
Family For IPv4
Direction Choose the direction of the traffic to filter
Action This specifies what to do if the packet matches
Source Source address can be either a network IP ad-
dress (with/mask), an IP range or a plain IP ad­dress. A”!” argument before the address specifi­cation inverts the sense of the address
Source port Match if the source port is one of the given
ports. E.g. 21 or !443 or 1024-65535
Destination Destination address can be either a network IP
address (with/mask), an IP range or a plain IP ad­dress. A”!” argument before the address specifi­cation inverts the sense of the address
Destination port Match if the destination port is one of the given
ports, E.g. 21 or !443 or 1024-65535
Protocol Choose the protocol from drop down menu
Advanced options Text field for adding additional commands
Comment Add an optional text
Delete
Use this button to delete the rule.
Up/Down
The Up button and the down button will move the rule.
Save
The save button saves the changes made.
Refresh
The Refresh button will reload the screen and display the changes.
Administrative Tool
p. 70
Services
Overview
The menu shows network services enabled and successfully running.
SSH
The menu shows additional information on SSH status, currently logged in users and established connections.
Administrative Tool
p. 71
SMB/CIFS
The menu shows additional information on SMB/CIFS status, currently logged in users and established connections.
FTP
The menu shows additional information on its status, currently logged in users and established connections.
Administrative Tool
p. 72
NFS
The G-RACK 12 supports Network File System ( NFS) service. Enable this multi-platform file system here. Otherwise disable the option to prevent unnecessary CPU overhead.
Shares
Share is a way a user will connect to the G-RACK 12 to transfer files. We are sharing a workspace. Need set NFS protocol to reach the workspace. i.e. to share a workspace.
Administrative Tool
p. 73
The following table describes the labels on the screen:
Shared Workspace The name of the workspace you wish to share.
You can choose an existing workspace or create a new one. Find your Workspace by using the drop down option or you can use the search fea­ture to locate the Workspace desired. The NFS share will be accessible at /export/ when your NFS client is pointed to the share.
Client This defines the scope of network access to the
NFS share. You can limit or expand access to the NFS share by setting these parameters.
The most limiting parameter would be to type in an exact IP address. An example of this is setting of 192.168.0.12 and by doing so you would limit the NFS share to exactly the one computer that had that IP address.
The next level of access is to provide access to all computers on a specific subnet. An example of this is a setting of 192.168.0.0/24 and by doing so you would limit the NFS share to all computers that have a mat­ching subnet. This means all computers with IP addresses in the 192.168.0.0 to
192.168.0.254 range would be able to mount this NFS share.
Finally, the least restrictive setting available for this Client parameter is leaving it blank. If you leave it blank then any computer that can negotiate traffic to the IP address of the G-RACK 12 will have access to the NFS share. You will only want to use this in networks where outside traffic is limited by other means such as a secure firewall.
Administrative Tool
p. 74
Privilege This is a dropdown box that has two options
that are fairly clear. 1) Read-only which means you will be able read and copy the files on this NFS share but you will not be able to edit them and 2) Read-Write that gives you privileges to read, edit, copy, and delete the files available on this NFS share.
Advanced options Advanced Options - Additional information on
these settings can be found online at http:// linux.die.net/man/5/exports
Comment This is fairly self explanatory. Place text in this
box that you want associated with this NFS sha­re. It can be notes on why it was created or any other information you choose
Administrative Tool
p. 75
Settings
Use this menu to enable the service
The following table describes the labels on the screen:
Enable Turns on the service protocol
Number of servers Specifies how many server threads to create. The
number of users that can connect to the server at one time.
NOTE: The Dashboard will show the service as “running” only if at least one workspace is set to use NFS protocol. NFS service doesn’t run unless something is exported.
Mac Client Information
On a Mac clients and mounting through NFS with the ‘Connect to Server’ option the Mac client admin must go to NFS share and change it from ‘secure’ to ‘insecure’ in the extra options. The whole share directory will be set as insecure since it does not display child folders.
When mounting through NFS OS X does not ask for user authentication like SMB, it automatically mounts it. In order to write to the share admins need to go into admin tool and go to workspace and
Administrative Tool
p. 76
enable read/write/execute for Others in the ACL options. (This can be set for child folders only)
Use these steps to mount and allow users to write to the share.
1. Go through Wizard > Media > Both setup and enable NFS protocol
2. After creating shares and logging in, navigate to Connect > NFS
3. Edit share and change client IP
4. In extra options change secure to insecure and save
5. Navigate to Access Control > Workspaces and open up ACL options
6. Change Others to Read/Write/Execute and save
7. On mac client open up ‘Connect to Server’ (can hit command+k)
8. Enter url for server: nfs://grack_ip/export/share_name
NFS share will mount and folder that had Others enabled to Read/Write/Execute will allow write ability.
Administrative Tool
p. 77
SMB/CIFS
Workspaces
Add a workspace that will connect via SMB/CIFS service
Administrative Tool
p. 78
The following table describes the labels on the screen:
Enable Toggle on to enable the service
Workspace folder The location of the files to share.
Name The name of the share.
Comment This is a text field that is seen next to a share
when a client queries the server.
Public If ‘Guests allowed’ is selected and no login cre-
dential is provided, then access as guest. Always access as guest when ‘Only guests’ is selecting; in this case no password is required to connect to the share.
Read only Set read only.
If this parameter is set, then users may not crea­te or modify files in the share
Browseable Set browseable
This controls whether this share is seen in the list of available shares in a net view and in the browse list.
Inherit ACLs Honor existing ACLs
This parameter can be used to ensure that if default ACLs exist on parent directories, they are always honored when creating a new file or subdirectory in these parent directories.
Inherit permissions Enable permission inheritance
The permissions on new files and directories are normally governed by create mask and direc­tory mask but the inherit permissions parameter overrides this. This can be particularly useful on systems with many users to allow a single share to be used flexibly by each user.
Administrative Tool
p. 79
Recycle bin Enable recycle bin.
This will create a recycle bin on the share. Files that are larger than the specified number of bytes will not be put into the recycle bin. Set to 0 for unrestricted file size. Files in the recycle bin will be deleted automati­cally after the specified number of days. Set to 0 for manual deletion.
Hide dot files This parameter controls whether files starting
with a dot appear as hidden files
Extended attributes Enable extended attribute support
Allow clients to attempt to store OS/2 style ex­tended attributes on a share.
Store DOS attributes Enable store DOS attributes support
If this parameter is set, Samba attempts to first read DOS attributes (SYSTEM, HIDDEN, ARCHI­VE or READ-ONLY) from a file system extended attribute, before mapping DOS attributes to UNIX permission bits. When set, DOS attributes will be stored onto an extended attribute in the UNIX file system, associated with the file or directory.
Hosts allow This option is a comma, space, or tab delimited
set of hosts which are permitted to access this share. You can specify the hosts by name or IP number. Leave this field empty to use default settings.
Hosts deny This option is a comma, space, or tab delimited
set of host which are NOT permitted to access this share. Where the lists conflict, the allow list takes precedence. In the event that it is neces­sary to deny all by default, use the keyword ALL (or the netmask 0.0.0.0/0) and then explicitly specify to the hosts allow parameter those hosts that should be permitted access. Leave this field empty to use default settings.
Administrative Tool
p. 80
Audit Audit file operations.
NOTE: Connecting a shared workspace through SMB protocol, the username is case sensitive.
Administrative Tool
p. 81
Settings
Use this menu to enable the service
The following table describes the labels on the screen:
Enable Toggle on to enable the service
Workgroup The workgroup the server will appear to be in
when queried by clients.
Description The NT description field.
Local Master Browser Allow this server to try and become a local mas-
ter browser. Eae i use a computer it will show all available shares
Time server Allow this server to advertise itself as a time
server to Windows clients
WINS support Enable WINS server
Act as a WINS server
WINS server Use the specified WINS server.
Log level Choose log level from None, Minimum, Normal,
Full, Debug.
Administrative Tool
p. 82
AFP (Apple Filling Protocol)
The G-RACK 12 supports Apple Filling Service for connectivity with Mac OS computers. If you need to use AFP service enable it here otherwise leave it disabled to reduce CPU resource overhead.
Workspaces
Add a workspace that will connect via AFPservice
The following table describes the labels on the screen:
Shared workspace The location of the files to share.
Workspace The name of the share.
Read only Set read only. If this option is set, then users may
not create or modify files in the share.
Guest login Allow guest login. Guests only have read access
by default.
Guest permissions Allow guests to create or modify files.
Time Machine support Enable Time Machine support for this share.
Unix privileges Use AFP3 unix privileges.
Administrative Tool
p. 83
Use dots Don’t do :hex translation for dot files. When
this option gets set, certain file names become illegal. These are .Parent and anything that starts with .Apple.
Hide dot files Make dot files invisible.
Forces filename restrictions This forces filenames to be restricted to the
character set used by Windows.
Case folding This option handles, if the case of filenames
should be changed.
Comment Add an optional text here
Settings
Use this menu to enable the service
The following table describes the labels on the screen:
Enable Toggle on to enable the protocol
Allow plain passwords Allow logins with passwords transmitted in the
clear.
Administrative Tool
p. 84
FTP
SSL/TLS
Use this tab to enable SSL/TLS encryption for FTP connections. You may also want to restrict FTP ovel SSL/TLS connections to establish only certain SSL certificates.
The following table describes the labels on the screen:
Enable Enable SSL/TLS connections
Certificate The SSL certificate.
Required This option requires clients to use FTP over TLS
when talking to this server.
No certificate request This option causes the server to not send a certi-
ficate request during a SSL handshake.
No session reuse required The requirement that the SSL session from the
control connection is reused for data connecti­ons is not required.
Implicit SSL This option will handle all connections as if they
are SSL connections implicitly.
Administrative Tool
p. 85
Ban List
The tab allows further hardening of FTP server security. Here you can limit users for various criteria, like maximum amount of simultaneous connections or maximum duration of the client-server session.
The following table describes the labels on the screen:
Event This rule is triggered whenever the selected
event directive occurs.
Occurrence This parameter says that if N occurrences of the
event happen within the given time interval, then a ban is automatically added.
Time interval Specifies the time interval in hh:mm:ss in which
the given number of occurrences must happen to add the ban.
Expire Specifies the time in hh:mm:ss after which the
ban expires.
The Ban List blocked will display the IP addresses you blocked.
Administrative Tool
p. 86
Shares
Add a workspace that will connect via FTP service
The following table describes the labels on the screen:
Shared workspace The location of the files to share.
Comment Optional comment text box
Administrative Tool
p. 87
Settings
Use this menu to enable the FTP service
The following table describes the labels on the screen:
Enable Toggle on to enable the service
Port Specify the port to be used
Max. clients Set the maximum number of simultaneous
clients that can connect to the FTP server
Max.connections per host Maximum number of connections per IP (0 =
unlimited).
Max. login attempts Maximum number of allowed password at-
tempts before disconnection.
Administrative Tool
p. 88
Timeout Maximum idle time in seconds. Setting idle
timeout to 0 disables the idle timer completely (clients can stay connected for ever, without sending data).
Anonymous FTP Enable anonymous FTP
Welcome message The welcome message which will be displayed
to the user when they initially login.
Permit root login Specifies whether it is allowed to login as supe-
ruser directly
Require valid shell Deny logins which do not have a valid shell
Bandwidth restriction Use the following bandwidth restriction: 0 KiB/s
means unlimited.
Passive FTP Use the following port range: In some cases you
have to specify passive ports range to by-pass firewall limitations. Passive ports restricts the range of ports from which the server will select when sent the PASV command from a client. The server will randomly choose a number from within the specified range until an open port is found. The port range selected must be in the non-privileged range (eg. greater than or equal to 1024). It is strongly recommended that the chosen range be large enough to handle many simultaneous passive connections (for example, 49152-65534, the IANA-registered ephemeral port range).
Masquerade address If your host is acting as a NAT gateway or port
forwarder for the server, this option is useful in order to allow passive transfers to work. You have to use your public address and opening the passive ports used on your firewall as well.
Specifies the amount of time, in seconds, be­tween checking and updating the masquerade address by resolving the IP address. Set this value to 0 to disable this option.
Administrative Tool
p. 89
FXP Enable FXP protoco. FXP allows transfers be-
tween two remote FTP servers without any file data going to the client asking for the transfer. Note: In order to use FXP (File Exchange Proto­col) for server-to-server data transfer, make sure to change the port from 21 to some other port. Also, make sure to open the corresponding port on your router and forward that port from your router to the device.
Resume Allow clients to resume interrupted uploads and
downloads
Ident protocol Enable the ident protocol (RFC1413) . When a
client initially connects to the server the ident protocol is used to attempt to identify the remo­te username.
Reverse DNS lookup Enable reverse DNS lookup. Enable reverse
DNS lookup performed on the remote host’s IP address for incoming active mode data connec­tions and outgoing passive mode data connec­tions.
Transfer log Enable transfer log
Administrative Tool
p. 90
Rsync
Rsync is a tool for copying and backing up data from one location( the source) to another( the destination). It is efficient because it only transfers files which are different between the source and destination directories.
Jobs
To add a new rsync task press the Add button. These parameters define the overall behavior of RSync.
The following table describes the labels on the screen:
Administrative Tool
p. 91
Enable Toggle the button to enable RSync
Type Choose the type: Local - synchronizes two
local directories Remote - synchronizes a local directory to a remote one. Obtain SSH access to perform this. The remote system is to have synchronizing enabled
Mode This option will be available if “remote” type
has been chosen. Is specifies the synchronizing direction. Push - pushes the directory from the local system to a remote system Pull - is used to sync a remote directory to the local system.
Source shared folder The source shared folder to be synchronized
Destination shared folder The destination shared folder.
Trial run Perform a trial run with no changes made
Recursive Recurse into directories
Times Preserve modification times
Compress Compress file data during the transfer
Archive Enable archive mode
Delete Delete files on the receiving side that don’t exist
on sender
Quiet Suppress non-error messages
Preserve permissions Set the destination permissions to be the same
as the source permissions
Preserve ACLs Update the destination ACLs to be the same as
the source ACLs
Preserve extended attributes Update the destination extended attributes to
be the same as the local ones
Keep partially transferred files Enable this option to keep partially transferred
files, otherwise they will be deleted if the transfer is interrupted.
Send email Send command output via email. An email mes-
sage with the command output (if any produ­ced) is send to the administrator.
Administrative Tool
p. 92
Comment Optional comment text box
Administrative Tool
p. 93
Rsync and iSCSI
It is possible to rsync one iSCSI target to another G-RACK 12. Unfortunately, there is no native way to access it from the G-RACK 12 Administration GUI and initiators will not recognize it.
In order to access the duplicate iSCSI target on the second G-RACK 12 you will need to do the following hack:
Create an iSCSI target (original).
Rsync this iSCSI target to another G-RACK 12 (duplicate).
If at this point you try to discover the (duplicate) target from initiator the result will be it is not recognized
On the G-RACK 12 that has the duplicate you will want to create new target LUN (fake target).
Replace new (fake) target with rsync’d (duplicate) target keeping (fake) targets file name.
Re-discover targets from initiator computer.
Result: You will be able to access rsync’d (duplicate) target using the (fake) target’s name.
Administrative Tool
p. 94
Server
Settings
Use this menu to enable rsync utility and set the port
The following table describes the labels on the screen:
Enable Toggle on to enable
Port Choose the port. Default :873
Administrative Tool
p. 95
Modules
Use this mvenu to set a folder to be shared.
The following table describes the labels on the screen:
Enable Toggle the button to enable
Shared folder The location of the files to share.
Name The name of the share
User This option specifies the user name that file
transfers to and from that module should take place.
Group This option specifies the group name that file
transfers to and from that module should take place.
Use chroot Enable chroot. If this option is set, the daemon
will chroot to the shared folder path before star­ting the file transfer with the client. Then it is not possible to map users and groups by name and the daemon is not being able to follow symbolic links that are either absolute or outside of the new root path.
Authenticate users Enable user authentication. If set then the client
will be challenged to supply a username and password to connect to the module.
Administrative Tool
p. 96
Read only Set read only
If this option is set, then any attempted uploads will fail.
Write only Set write only. If this option is set, then any
attempted downloads will fail.
List Enable module listing
This option determines if this module should be listed when the client asks for a listing of availa­ble modules.
Max.connections This option specifies the maximum number of
simultaneous connections. 0 means no limit.
Hosts allow This option is a comma, space, or tab delimited
set of hosts which are permitted to access this module. You can specify the hosts by name or IP number. Leave this field empty to use default settings.
Hosts deny This option is a comma, space, or tab delimited
set of host which are NOT permitted to access this module. Where the lists conflict, the allow list takes precedence. In the event that it is ne­cessary to deny all by default, use the keyword ALL (or the netmask 0.0.0.0/0) and then explici­tly specify to the hosts allow parameter those hosts that should be permitted access. Leave this field empty to use default settings.
Comment Add an optional text here
Administrative Tool
p. 97
iSCSI SCST
iSCSI stands for “Internet SCSI”. iSCSI allows a SCSI-protocol to be transported in Ethernet packages via an IP network. This allows enterprises to set up inexpensive SANSs using their already existing standardized Ethernet network infrastructure. iSCSI runs on widely used and trusted IP networks which makes it possible to use the advantages of a SAN without creating a new network infrastructure, and in addition you do not need to train your employees. On the client side it requires an iSCSI “initiator“ . The connection between the G-RACK 12 server and the iSCSI initiator is set via the normal Ethernet infrastructure (Network switch). The client then detects the storage of the G-RACK 12 server as an own local hard disk drive.
Settings
Toggle the button to enable the protocol and click the Save button.
Administrative Tool
p. 98
Targets
Under configured iSCSI targets you can see all existing targets on the server and their corresponding status. Click the Add button to create a new iSCSI target. Also you can configure CHAP Authentication for this iSCSI Target
The following table describes the labels on the screen:
Name The name of target.
User name optional attribute containing user name for
incoming user name. goes to the iSCSI target and the LUN that is automatically created. CHAP secret
Password optional attribute containing user password for
incoming user name. Password must be at least 12 characters
QueuedCommands defines maximum number of commands qu-
eued to any session of this target. Default is 32 commands.
IntialR2T Turns on the default use of R2T; if disabled,
allows an initiator to start sending data to a tar­get as if it had received an initial R2T. The result function is OR
ImmediateData Configure using of unsolicited data. The result
function is AND.
HeaderDigest *
DataDigest *
Administrative Tool
p. 99
MaxConnections The maximum number of connections that can
be requested or are acceptable. The result func­tion is Min.
MaxRecvDataSegmentLenght The maximum amount of data that the target
can receive in any iSCSI PDU. This is a connec­tion- and direction- specific parameter. The actual value used for targets will be Min (This value, MaxBurstLength) for data-in and solicited data-out data. Min (This value, FirstBurstLength) for unsolicited data.
MaxXmitDataSegmentLenght The maximum amount of data that the target
can transmit in any iSCSI PDU. This is a con­nection- and direction- specific parameter. The actual value used for targets will be Min (This value, MaxBurstLength) for data-in and solicited data-out data. Min (This value, FirstBurstLength) for unsolicited data.
MaxBurstLenghth Maximum SCSI data payload in bytes for data-in
or for a solicited data-out sequence. The respon­der’s number is used. The result function is Min.
FirstBurstLength Maximum SCSI payload, in bytes, of unsolicited
data an initiator may send to the target. Includes immediate data and a sequence of unsolicited Data-Out PDUs. Must be <= MaxBurstLength. The result function is Min.
DefaultTime2Wait Min seconds to wait before attempting connec-
tion and task allegiance reinstatement after a connection termination or a connection reset. The results function is Max. A value of zero means that task reassignment can be done im­mediately. Also known as Time2Wait.
DefaultTime 2Retain Max seconds that connection and task allegi-
ance reinstatement is still possible following a connection termination or reset. The results function is Min. Zero means no reinstatement is possible. Also known as Time2Retain.
Administrative Tool
p. 100
MaxOutstandingR2T The maximum number of outstanding R2Ts. The
responder’s value is used. The result function is Min.
DataPDUInOrder No indicates that the data PDUs within a sequ-
ence can be in any order. Yes indicates that the data PDUs within a sequence have to be at con­tinuously increasing addresses and that overlays are forbidden. The result function is OR.
DataSequenceInOrder If set to No, the data PDU sequence may be
transferred in any order. If set to Yes, the sequ­ence must be transferred using continuously increasing offsets except for error recovery. The result function is OR.
ErrorRecoveryLevel Recovery levels represent a combination of
recovery capabilities. Each level includes all the capabilities of the lower recovery level. The result function is Min.
OfMaker Turns on or off the initiator-to-target markers.
The result function is AND
IfMaker Turns on or off the initiator-to-target markers.
The result function is AND
OfMarkInt The interval value (in 4-byte words) for initia-
tor-to-target markers, measured from the end of one marker to the beginning of the next. The offer can have only a range; the response can have only a single value (picked from the offe­red range) or Reject.
IfMarkInt Interval value (in 4-byte words) for target-to- ini-
tiator markers. The interval is measured from the end of one marker to the beginning of the next one. The offer can have only a range; the respon­se can have only a single value (picked from the offered range) or Reject.
Loading...