ioSafe R4 User Manual

ioSafe® R4 : Disaster-proof NAS/RAID
User’s Guide, ioSafe R4
/N: 900-10004-00 REV 02
CONGRATULATIONS!
This product represents the latest in disaster proof computer equipment. This system has the following disaster proof specifications:
1. Fire proof data storage to 1700 F, 1 hr duration per UL72
2. Waterproof data storage to 30’ depth, 30 days in fresh water or salt water.
IMPORTANT NOTE: DISASTER RECOVERY
Please refer to the website for the latest disaster recovery procedures and product warranties. While no device can protect against every disaster, this ioSafe R4 system has been tested to protect data against fires, floods and building collapse. More information is available and updated online at our website www.iosafe.com. Please see the website or details in this manual for the terms and conditions of our Disaster Recovery Service.
If you have a disaster please contact the ioSafe Disaster Response Team at 1.888.984.6723 x430 for assistance in recovery of your ioSafe unit. Due to the unique nature of individual disasters, different recovery strategies may have to be employed depending on your particular circumstances. Let the experts at ioSafe assist with recovery.
Some general rules regarding recovery are as follows:
1. Don’t attempt to recover the ioSafe R4 unit by yourself. The lack of our expert support might lead to irretrievable data loss. Let our disaster support engineers help recover your critical data.
2. Turn off the power.
3. Do not restart the ioSafe R4 after a disaster without first consulting with an ioSafe disaster support person first.
Do not try to reconfigure or re-initialize the RAID array.
4.
Copyright © 2008,
ioSafe Inc
. All rights reserved.
http://www.iosafe.com
ioSafe is a trademark or registered trademark of ioSafe Inc.. ReadyNAS, X-RAID, FrontView, RAIDar, RAIDiator, Network Storage Processor, and NSP are trademarks or registered trademarks of Infrant Technologies Inc. All other product names are the property of their respective owner.
2
Limited Warranty Statement
Appendix A
Warranty Services
End User Limited Product Warranty
ioSafe Incorporated, ("ioSafe") values your business and always attempts to provide you the ver y best data protection and recovery services.
No limited warranty is provided by ioSafe unless you are the original customer of the product. ioSafe’s warranty is non-transferable. No limited warrant is provided unless your ioSafe product ("Product") was purchased from an authorized distributor or authorized reseller. Distributors may sell Products to resell ers who then sell Products to end users. Please see below for warranty information or obtaining service. No warranty service is provided unless the Product is returned ioSafe.
Warranty Policy
ioSafe warrants to the end user customer, subject to limitations list below, that the warranted hardware components, listed below, shall be free from defects in material or workmanship and will conform to ioSafe's specification for the particular Product for the applicable warranty period. ioSafe further warrants that for the applicable warrant period shown below and starting from the date of purchase, the media on which any software included in the hardware components is furnished will be free from defects in materials and workmanship under normal use. Except for the foregoing, such software is provided AS IS. During the applicable warranty period ioSafe will repair or replace (at ioSafe’s option) any warranted hardware part which does not comply with this warranty with a new or functionally equivalent replacement part, provided the defective part is returned to ioSafe as described in the “Returned Materials Authorization (RMA
)” section detailed below.
Warranted Product Warranty Period
ioSafe S2 3 Years – Optional 5 Years ioSafe R4 3 Years – Optional 5 Years
Note: The limited warranty extends only for the period of time set forth above. The period comm ences from the date of purchase of the original Product. To verify the warranty of your Product, please maintain the receipt of the original Purchase. In the United States, some states do not allow limitations on how long implied warranties last, so the above limitation may not apply to you.
THERE ARE NO WARRANTIES WHICH EXTEND BEYOND THE FACE OF THE IOSAFE LIMITED WARRANTY. IOSAFE DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, REGARDING THE PRODUCTS, INCLUDING ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IN THE UNITED STATES, SOME STATES DO NOT ALLOW THE EXCLUSION OF THE IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU.
Return Material Authorization (RMA)
No Product may be returned directly to ioSafe without first contacting ioSafe for a Return Material Authorization ("RMA") number. If it is determined that the Product may be defective, you will be given an RMA number and instructions for Product return. An unauthorized return, i.e. one for which an RMA number has not been issued, will be returned to you at your expense. Authorized returns are to be shipped prepaid and insured to the address on the RMA in an approved shipping container. To request an RMA, please refer to the ioSafe web site at www.iosafe.com.
Extended Warranty
Customers can purchase an extended warranty on eligible ioSafe products with less than a 5-year warranty. The maximum warranty period for these products, including any warranty extension, cannot be longer than 5 years from the date of purchase. Extended warranty is currently available for purchase online.
3
LIMITATION OF REMEDIES
YOUR EXCLUSIVE REMEDY FOR ANY DEFECTIVE PRODUCT IS LIMITED TO THE REPAIR OR REPLACEMENT OF THE DEFECTIVE PRODUCT.
ioSafe may elect which remedy or combination of remedies to provide in its sole discretion. ioSafe shall have a reasonable time after determining that a defective Product exists to repair or replace a defective Product. ioSafe's replacement Product under its limited warranty will be manufactured from new and serviceable used parts. ioSafe's warranty applies to repaired or replaced Products for the balance of the a pplicable period of the original warranty or ninety days from the date of shipment of a repaired or replaced Product, whichever is longer.
LIMITATION OF DAMAGES
IOSAFE'S ENTIRE LIABILITY FOR ANY DEFECTIVE PRODUCT SHALL IN NO EVENT EXCEED THE PURCHASE PRICE FOR THE DEFECTIVE PRODUCT. THIS LIMITATION APPLIES EVEN IF IOSAFE CANNOT OR DOES NOT REPAIR OR REPLACE ANY DEFECTIVE PRODUCT AND YOUR EXCLUSIVE REMEDY FAILS OF ITS ESSENTIAL PURPOSE.
NO CONSEQUENTIAL OR OTHER DAMAGES
NOTWITHSTANDING ANYTHING ELSE IN THIS POLICY OR OTHERWISE, IOSAFE WILL NOT BE LIABLE WITH RESPECT TO THE PRODUCTS UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY (I) FOR ANY AMOUNT IN EXCESS OF THE PURCHASE PRICE FOR THE DEFECTIVE PRODUCT OR (II) FOR ANY GENERAL, CONSEQUENTIAL, PUNITIVE, INCIDENTAL OR SPECIAL DAMAGES. THESE INCLUDE LOSS OF RECORDED DATA, INTERRUPTION OF USE, THE COST OF RECOVERY OF LOST DATA, LOST PROFITS AND THE COST OF THE INSTALLATION OR REMOVAL OF ANY PRODUCTS, THE INSTALLATION OF REPLACEMENT PRODUCTS, AND ANY INSPECTION, TESTING, OR REDESIGN CAUSED BY ANY DEFECT OR BY THE REPAIR OR REPLACEMENT OF PRODUCTS ARISING FROM A DEFECT IN ANY PRODUCT. THIS SECTION DOES NOT LIMIT LIABILITY FOR BODILY INJURY OF A PERSON.
IN THE UNITED STATES, SOME STATES DO NOT ALLOW EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE LIMITATIONS ABOVE MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE.
Your Use of the Product
ioSafe will have no liability for any Product returned if ioSafe determines that:
The product was stolen from ioSafe.
The asserted defect:
A. is not present, B. cannot reasonably be fixed because of damage occurring when the Product is in the possession of
someone other than ioSafe, or
C. is attributable to misuse, improper installation, alteration (including removing or obliterating labels
and opening or removing external covers (unless authorized to do so by ioSafe or an authorized Service Center)), accident or mishandling while in the possession of someone other than ioSafe.
The Product was not sold to you as new.
Additional Limitations on Warranty
ioSafe’s limited warranty does not cover Products which have been received improperly packaged, altered, or physically damaged. Products will be inspected upon receipt. You can view additional examples of the warranty limitations below by clicking on the available links.
4
ioSafe Disaster Recovery Service Terms and Conditions
As applicable during the warranty period and proper registering of an ioSafe product, ioSafe will assist the original purchaser who has experienced a “qualified disaster” to restore the data that was stored on their ioSafe product by the following ways:
1. ioSafe will provide phone or email based support to assist in recovering the data, or
2. ioSafe will pay for the disaster exposed product to be shipped back to ioSafe headquarters for data recovery. If data recovery is successful, a replacement product will be loaded with the original data and shipped back to the original user, or
3. if the data recovery by ioSafe is not successful, ioSafe will pay up to the amount shown in the table below for the specific ioSafe product to a third party disk recovery service of ioSafe's choice to extract the data. Any data extracted will be loaded on a replacement product and shipped back to the original user. ioSafe has the right to use a factory refurbished product as the replacement product.
Product Line U.S. Dollars per disk
ioSafe S2, ioSafe R4 $5,000
ioSafe's good faith attempts to restore and recover the data in accordance with these terms and conditions shall b e the purchaser's sole and exclusive remedy and ioSafe shall not be liable for any damages whatsoever. ioSafe cannot guarantee that any data will be recoverable nor can it guarantee which data files are on the ioSafe product. Data restoration or recovery shall be strictly limited to whatever files are restorable or recoverable and not what the purchaser believ es to exist on the ioSafe product. Only one instance of data extraction per ioSafe product is covered by this program. Other exclusions may apply. See web site for details: www.iosafe.com.
A “qualified disaster” is defined as a disaster by which a police or fire incident report is written to describe the disaster event. The disaster event would include, but is not limited to: fire, flood, theft and acts of God.
5
Contents
About This Guide 10
1 FrontView Advanced Control 11
Network 14
Ethernet 14
► Speed/Duplex Mode 15 ► MTU 15 ► VLAN Setting 15 ► Performance Setting 16
Global Network Settings 17
► Hostname 17 ► Default Gateway 17 ► DNS 17
WINS 18 DHCP 19 Route 20
Security 21
Admin Password 21 Security Mode Selection 22 Share Security Mode 23
► Specify a Workgroup 23 ► Share Accounts 23
User Security Mode 23
► Specify a Workgroup 24 ► Setting up Accounts 24 ► Managing Groups 25 ► Managing Users 28 ► Setting Accounts Preferences 30
Domain Security Mode 31
► Domain/ADS Authentication 31 ► Setting up Accounts 32
6
Services 33
Standard File Protocols 33 Streaming Services 34 Discovery Services 36
Volumes 37
Volume Management 37
► Advantages of Flex-RAID 37 ► Advantages of X-RAID 37
Volume Management for Flex-RAID 37
► Deleting a Volume 38 ► Adding a Volume 39 ► RAID Settings 40
Volume Management for X-RAID 41
► X-RAID Redundancy Overhead 41 ► X-RAID Has one data volume 42 ► Adding a 2nd DISK for Redundancy 42 ► Adding a 3rd and 4th DISK for MORE Capacity 42 ► Replacing All Your Disks for Even MORE Capacity 42
Changing Between X-RAID and Flex-RAID Modes 43 Snapshot 43
► Taking and Scheduling Snapshot 43 ► Resizing Snapshot Space 46
USB Storage 47
Shares 50
Adding Shares 50 Managing Shares 51
► Setting Share Access in Share Mode 53 ► Setting Share Access in User and Domain Modes 55 ► Advanced Options 58
USB Shares 59
Printers 60
Print Shares over CIFS/SMB 60 IPP Printing 61 Managing Print Queues 61
Backup 62
Adding a New Backup Job 62
► Step 1 – Select Backup Source 63 ► Step 2 – Select Backup Destination 65 ► Step 3 – Choose Backup Schedule 65 ► Step 4 – Choose Backup Options 65
7
Viewing the Backup Schedule 67 Programming the Backup Button 68 Viewing the Backup Log 68 Editing a Backup Job 68
System 69
Clock 69
► System Time 69 ► NTP Option 69
Alerts 70
► Alerts Contacts 70 ► Alerts Settings 71 ► SNMP 72 ► SMTP 73
Performance 74
► Adding a UPS for performance 75
Language 76 Unicode for User, Group, and Share Names 77 Enable Character encoding conversion for FTP clients 77 Updating ioSafe R4 77
► Remote Update 77 ► Local Update 79 ► Settings 80 ► Factory Default 80
Power Management 82
► Disk Spin-down Option 82 ► Power Timer 83 ► UPS Configuration 83
Shutdown 84
Status 85
Health 85 Logs 86
2 Accessing Shares 87
Windows 88
MAC OS X 89
AFP over Bonjour 89 AFP over AppleTalk 91
MAC OS 9 93
Linux/Unix 95
Web Browser 96
8
FTP / FTPS 98
Rsync 99
Networked DVE Players and UPnP AV Media Adapters 100
3 Replacing a Failed Disk 101
Locate the Failed Disk 101 Ordering Replacement Disk 101 Replace the Failed Disk 101 Re-synchronize the Volume 102 Disaster Recovery Procedure 102
4 System Reset Switch 105 5 Changing User Passwords 107
A RAID Levels Simplified 108
RAID Level 0 108 RAID Level 1 108 RAID Level 5 108 RAID Level “X” (X-RAID) 109
B Input Field Format 110
Domain/Workgroup Name 110 Host 110 Host Name 110 ioSafe R4 Host Name 110 Host Expression 111 Share Name 111 Share Password 111 SNMP Community 111 User/Group Name 111 User Password 111
C Glossary 112 D If You Need Help… 113
9
About This Guide
Congratulations and thank you for purchasing an ioSafe disaster proof backup and storage system from ioSafe Inc. This ioSafe system represents the latest technology in disaster-proof computer hardware.
Chapter 1
, “FrontView Advanced Control”, describes all the menus and tabs available in the
Advanced Control mode.
If you have already configured the ioSafe R4 and you need help in accessing the shares on the ioSafe R4, skip to
In the event of a disk failure, the proper procedure for replacing the failed disk is in
Chapter 2
, “Accessing Shares”.
Chapter 3
“Replacing a Failed Disk”.
Sometimes it may be necessary to re-install the firmware or reset the system back to the factory default configuration.
Chapter 5
, “Changing User Passwords”, covers how non-admin users can access FrontView to
Chapter 4
, “System Reset Switch”, explains the process for doing both.
change their password.
For an explanation of the RAID levels that the ioSafe R4 supports, please refer to
Appendix A
“RAID Levels Simplified”.
If you have questions on what constitutes a valid input for host name, workgroup, or password,
Appendix B
Appendix C
, “Input Field Format”, describes these and more.
, “Glossary”, provides definitions for some of the technical terminologies used in this
document.
,
,
If you need help during setup, refer to
Appendix D
, “If You Need Help…”.
10
Chapter
1
FrontView Advanced Control
The Advanced Control mode offers the all settings available in the Setup Wizard plus more.
When you first switch to this mode, you’ll see the menus on the left that allow you to quickly jump to the desired menu page. Towards the bottom left, you’ll notice buttons that allow you to switch back and forth between the Setup Wizard mode and the Advanced Control mode.
As you click on the menu buttons, you’ll notice a similar theme across all menu pages. At the top right corner is the command bar which typically provides options to return to the home page, refresh the browser window, display help where available, or to log out of the session. Due to security reasons, the which is necessary to securely log out.
Logout
button only acts as a reminder to close the current browser session
11
At the furthest bottom is the status bar with the date button which doubles its duty as a clock and a link to the Clock page. The status LEDs to the right gives a quick glimpse of the system device status.
The statuses represent:
 Not present
 Normal
– No disk or device attached.
– Device in normal operating mode. If the LED is blinking, this disk is currently re-syncing. During the re-sync process, the performance is temporarily in a “degraded” mode and another disk failure in the volume will render it dead.
 Warning or Dead
 Inactive spare
– The device has failed or requires attention.
– This disk is a “hot spare” on standby. When a disk fails, this disk will
take over automatically.
 Awaiting re-sync
 Life support mode
– This disk is waiting to re-sync to the RAID volume.
– The volume has encountered multiple disk failures and is in the state of being marked dead. However, the ioSafe R4 has blocked it from being marked dead in the event that someone may have accidentally pulled out the wrong disk during runtime. If the wrong disk was pulled out, shutdown the ioSafe R4 immediately, reconnect the disk, and power-on the ioSafe R4. If you reconnect the disk during runtime, the ioSafe R4 will mark it as a newly added disk and you will no longer be able to access the data on it.
 Background task active
– A lengthy background task such as a system update is in
progress.
12
Move the mouse cursor over the LED to display more information on the device, or click on it to display the status in more detail.
Right above the status bar is the action bar. To the left are the Advanced Control and Setup Wizard buttons. To the right is the Apply button. Use this to save any changes in the current menu page.
13
Network
Ethernet
The Ethernet tab allows you to specify network interface-specific settings.
In the
Standard Setting
and MTU settings. In most networks where a DHCP server is enabled, you can simply specify the “Use values from a DHCP server” option to automatically set the IP address and network mask.
box, you can specify the IP address, network mask, speed/duplex mode,
If you assign a static IP address, be aware that the browser will lose connection to the ioSafe R4 device after the IP address has been changed. You can click Rescan in RAIDar to locate the device and reconnect from there.
14
Note
If you elect to assign the IP address using DHCP, it is advisable to set the lease time on the DHCP server/router to a value of at least a day. Otherwise, you may notice that the ioSafe R4 IP address may change even when it has been powered down for only a few minutes. Most DHCP servers allow you to assign a static IP address for specified MAC addresses. If you have this option, this would be a good way to ensure your ioSafe R4 maintains the same IP address even in DHCP mode.
SPEED/DUPLEX MODE
If you have a managed switch that works best if the devices are forced to a particular speed or duplex mode, you can select the desired setting. It’s advisable to keep the setting in auto-negotiation mode otherwise.
MTU
In some network environments, changing the default MTU value may fix throughput problems. It’s advisable to leave the default setting otherwise.
VLAN SETTING
Virtual Local Area Network, or VLAN, allows devices residing on different segments of a LAN to appear in the same segment, or conversely allows devices on the same switch to behave as though they belong to a different LAN.
If you wish to use the ioSafe R4 in a VLAN environment, select the
Enable VLAN support
checkbox and input a numeric VLAN tag. You will need to reboot the ioSafe R4 for the VLAN function to take effect.
15
Warning
Do not enable VLAN support unless you are sure your clients also support VLAN. Otherwise, you can lose network access to the ioSafe R4 and you may need to perform a firmware re-installation to disable the VLAN setting.
PERFORMANCE SETTING
The
Enable jumbo frames
option allows you to optimize the ioSafe R4 for large data transfers such as multiple streams of video playback. Select this option if your NIC and your gigabit switch support jumbo frames.
Note
The ioSafe R4 supports a 7936 byte frame size, so for optimal performance, a switch capable of this frame size or larger should also be used.
Your ioSafe R4 device comes with multiple Ethernet interfaces, you will see a separate configuration tab for each interface.
16
Global Network Settings
HOSTNAME
The Hostname you specify is used to advertise the ioSafe R4 on your network. You can use the hostname to address the ioSafe R4 in place of the IP address when accessing the ioSafe R4 from Windows, or over OS X using SMB. This is also the name that will appear in the RAIDar scan list.
The default hostname is
DEFAULT GATEWAY
nas-
followed by the last three bytes of your primary MAC address.
The Default Gateway specifies the IP address of the system where your network traffic is routed to if the destination is outside of your subnet. In most homes and smaller offices, this is the IP address of the router connected to the cable modem or your DSL service.
If you had selected the DHCP option in the Ethernet tab, the Default Gateway field will be automatically populated with the setting from your DHCP server. If you had selected the Static option, you can manually specify the IP addresses of the default gateway server here.
DNS
The DNS box allows you to specify up to three Domain Name Service servers for host name resolution. If you are unfamiliar with DNS, the service translates host names into IP addresses.
17
If you had selected the DHCP option in the Ethernet tab, the domain name server fields will be automatically populated with the DNS settings from your DHCP server. If you had selected the Static option, you can manually specify the IP addresses of the DNS servers and the domain name here.
WINS
The WINS option allows you to specify the IP address of the WINS (Windows Internet Naming Service) server. A WINS server is typically a Windows server on the network that will allow the ioSafe R4 or other devices on the network to be (Windows) browsed from other subnets.
If you do not have an existing WINS server, you can designate the ioSafe R4 to be one. Simply select the
Become a WINS server
checkbox and configure your Windows PC to specify the ioSafe R4 IP address as the WINS server. This can be useful if you wish to browse by hostname across multiple subnets, i.e. over VPN.
18
DHCP
The DHCP tab allows this device to act as a DHCP (Dynamic Host Configuration Protocol) server. DHCP service simplifies management of a network by dynamically assigning IP addresses to new clients on the network.
Click on the
Enable DHCP service
checkbox if you want the ioSafe R4 device to act as a DHCP
server. This is convenient in networks where DHCP service is not already available.
Note
These options are available only if this device is not already using a DHCP address. Enabling DHCP service on a network already utilizing another DHCP server will result in conflicts. If you wish to use this device as a DHCP server, make sure to specify static addresses in the Ethernet and DNS tabs.
19
Route
The
Route
tab is available if you have two or more network interfaces (Ethernet or Wireless combined) on your ioSafe R4. In some environments, you can optimize your network traffic by manually setting up a routing table.
Route table management is beyond the scope of this manual, and this option is provided only for advanced users who understand routing and wish to deviate from the default routes.
20
Security
Admin Password
The
Admin Password
only user that can access FrontView and this user has administrative privileges when accessing shares. Be sure to set a password different from the default password and make sure this password is kept in a safe place. Anyone who obtains this password can effectively change or erase the data on the ioSafe R4. The default
tab allows you to change the
admin
user password is “iosafe1” .
admin
user password. The
admin
user is the
Note
In User or Domain security mode, you can use the admin account to login to a Windows share, and perform maintenance on any file or folder in that share. The admin user also has permission to access all user private home shares to perform backups.
As a safeguard, you will be requested to enter a password recovery question, the expected answer, and an email address. If, in the future, you forget the password, you can go to
https://
ip_address
/password_recovery. Successfully answering the questions there will reset the
admin password, and that new password will be sent to the email address you enter in this tab.
21
Security Mode Selection
The ioSafe R4 device offers three security options for your network environment. Read the quick overview below to help select the most appropriate option based on the required level of security and your current network authentication scheme.
The Share security mode is suitable for most home and small office environments, providing a simple way for people in a trusted environment to share files without the necessity of setting up separate user and group accounts. Shares that you create in this environment can be password­protected if desired.
A more appropriate selection for the medium-size office or workgroup environment is the User security mode. This mode allows you to set up user and group accounts to allow for more specific share access restrictions. Access to shares requires proper login authentication, and you can specify which users and/or groups you wish to offer access. As an example, you may want to restrict company financial data to just users belonging to one particular group. In this security mode, the administrator will need to set up and maintain user and group accounts on the ioSafe R4 device itself. In addition, each user account will be automatically set up with a private home share on the ioSafe R4.
The Domain security mode is most appropriate for larger department or corporate environments, where a centralized Windows-based domain controller or active directory server is present. The ioSafe R4 device integrates in this environment by creating a trusted relationship with the domain/ADS authentication server and allowing all user authentications to occur there, eliminating the need for separate account administration on the device itself. Also, in this security mode, each domain/ADS user will be automatically set up with a private home share on the ioSafe R4.
22
Note
The FrontView management system will slow down in proportion to the number of users in the domain. It is not advisable to use the ioSafe R4 in a domain environment with more than 1000 users.
Share Security Mode
The
Share security mode
SPECIFY A WORKGROUP
You only need to specify a workgroup if you wish to change it from the default.
A valid workgroup name must conform to the following restrictions:
is the easiest security option to set up.
 Name must consist of characters a-z, A-Z, 0-9, and the symbols _ (underscore), – (dash),
and . (period).
 Name must start with a letter.
 Name length must be 15 characters or less.
SHARE ACCOUNTS
You will notice the Accounts tab which consists of share accounts which match the current share names on the ioSafe R4. These share accounts are listed to allow you the option of changing the UID and quota assigned to the share. The share quota can be changed from the Share Listing in the Share menu as well. The UID does not need to be changed unless you wish to avoid a UID conflict with an existing NFS user.
User Security Mode
In User security mode, you specify a workgroup name just as you would in the previous security option, and create user and group accounts. You will have control over how much disk space is allocated for each user or group.
In this security mode, each user will be given a home share on the ioSafe R4 device that the user can use to keep private data such as backups of the user’s PC. This home share is accessible only by that user and the administrator who needs the privilege to perform backups of these private shares. The option to automatically generate the private home share is controlled in the Accounts/Preferences tab, and you can disable it if you wish.
23
Note
Private user shares are only accessible by users using CIFS (Windows) or AppleTalk file protocols.
To set up the ioSafe R4 for this security mode, you will need the following information:
 Workgroup name
 Group names you wish to create (i.e. Marketing, Sales, Engineering)
 User names you wish to create (plus email addresses if you will be setting disk quotas)
 Amount of disk space you would like to allocate to users and groups (optional)
SPECIFY A WORKGROUP
To change or set a workgroup name, enter the desired name in the Workgroup field in the User option box. The name can be the workgroup name that is already used on your Windows network.
SETTING UP ACCOUNTS
In this security mode, the Accounts tab allows you to manage user and group accounts on the ioSafe R4. A good starting point would be to select the
Manage groups
option from the drop-down box
in the upper right corner.
24
MANAGING GROUPS
To add a new group, click on the Add Group tab if it is not already selected. You can add up to five groups at a time. If you expect to have just one big set of users for one group, you can forego adding a new group and accept the default
users
group.
If desired, a user can belong to multiple groups. Once you have created user accounts, you can specify secondary groups that the user can belong to. This allows for finer-grain settings for share access. For instance, you can have user can access shares restricted to only
joe
in group
marketing
and
marketing
sales
groups.
also belong to group
sales
so
joe
While adding a new group, you can specify the amount of disk space you wish to allocate that group by setting a disk quota. A value of 0 denotes no limit. You can set or change the quota at a later time. You can also set the Group ID, or GID, of the group that you are adding. You can leave this field blank and let the system automatically assign this value unless you wish to match your GID to your NFS clients.
25
After adding your groups, you can view or change your groups by clicking on the alphabetical index tab, or
All
to list all groups.
If you wish to add a large number of groups, select
Import group list
from the selection box.
26
Here, you can upload a CSV (Comma Separated Value) formatted file containing the group account information. The format of the file is:
name1,gid1,quota1,member11:member12:member13 name2,gid2,quota2,member21:member22:member23 name3,gid3,quota3,member31:member32:member33
Please note the following:
 Spaces around commas are ignored.
 The name fields are required.
 Quota will be set to default if not specified.
 GID will be automatically generated if not specified.
 Empty fields are replaced with accounts defaults.
 Group members are optional.
Examples of acceptable formats are as follows (note that you can omit follow-on commas and fields if you wish to accept the system defaults for those fields, or you can leave the fields empty):
flintstones
In this example, group
flintstones
will be created with an automatically assigned GID, and default
quota.
rubble,1007,5000,barney:betty
In this example, group
betty
.
rubble
will have GID 1007, quota of 5000 MB, with members
barney
and
27
MANAGING USERS
To manage user accounts, select the Manage users option in the drop-down box.
To add a user, click on the Add User tab. You can add up to five users at a time.
You can enter a user name, email address, user ID, select a group, password, and disk quota for the user. Only the user name and password fields are required, however, you should specify the user email address if you intend to set up disk quotas. Without an email address, the user will not be warned when disk usage approaches the specified disk quota limit. If you do not wish to assign a disk quota, enter 0.
If you wish to add a large number of users, select
Import user list
from the selection box.
28
Here, you can upload a CSV (Comma Separated Value) formatted file containing the user account information. The format of the file is:
name1,password1,group1,email1,uid1,quota1 name2,password2,group2,email2,uid2,quota2 name3,password3,group3,email3,uid3,quota3
Please note the following:
 Spaces around commas are ignored.
 The name and password fields are required.
 If a listed group account does not exist, it will be automatically created.
 Group and quota will be set to the defaults if not specified.
 Email notification will not be sent to the user if the field is ommitted or left blank.
 UID will be automatically generated if not specified.
 Empty fields are replaced with accounts defaults.
Examples of acceptable formats are as follows (note that you can ommit follow-on commas and fields if you wish to accept the system defaults for those fields, or you can leave the fields empty):
fred,hello123
In this example, user
fred
will have password set to
hello123
notification, automatic UID assigned, and default quota.
barney,23stone,,barney@bedrock.com
, belongs to the default group, no email
29
In this example, user sent email notification to
wilma,imhiswif,ourgroup,wilma@bedrock.com,225,50
barney
will have password set to
barney@bedrock.com
23stone
, automatic UID assigned, and default quota.
, belongs to the default group, will be
In this example, user sent to
wilma@bedrock.com
SETTING ACCOUNTS PREFERENCES
wilma
will have password
, UID set to
imhiswif
225
, and quota set to
, belongs to group
50MB
.
ourgroup
, email notification
You can set various account defaults by selecting the Preferences option in the drop-down box.
30
Loading...
+ 83 hidden pages