Thecus Technology i Series User Manual

Thecus i Series

User’s Manual

Preface

This manual is the introduction of i Series, and to help user to know the operation of the disk array system easily. Information contained in the manual has been reviewed for accuracy, but not for product warranty because of the various environments/OS/settings, Information and specification will be changed without further notice. For any update information, please visit www.thecus.com and your contact windows.
Copyright@2008, Thecus Technology Corp. All rights reserved. Thank you for using Thecus Technology Corp. products; Please contact with
sales@thecus.com to get the latest user manual and firmware. If you have any question, please e-mail to sales@thecus.com
question as soon as possible.
The RAM size of i Series is recommended DDR-333 512MB or above. Please
refer to the certification list in Appendix A.
. We will answer your
- 2 -

Table of Contents

Chapter 1 RAID introduction..........................................5
1.1 Features........................................................................... 5
1.2 Terminology ..................................................................... 6
1.3 RAID levels ...................................................................... 8
Chapter 2 Getting started...............................................9
2.1 Before starting.................................................................. 9
2.2 iSCSI introduction ............................................................ 9
2.3 Management methods ................................................... 11
2.3.1 Web GUI............................................................................................... 11
2.3.2 Remote control – secure shell ..............................................................12
2.4 Enclosure ....................................................................... 12
2.4.1 LCM...................................................................................................... 12
2.4.2 System buzzer...................................................................................... 14
2.4.3 LED ......................................................................................................14
Chapter 3 Web GUI guideline.......................................15
3.1 GUI hierarchy................................................................. 15
3.2 Login .............................................................................. 16
3.3 Quick install.................................................................... 17
3.4 System configuration ..................................................... 19
3.4.1 System name .......................................................................................19
3.4.2 IP address ............................................................................................ 20
3.4.3 Language .............................................................................................20
3.4.4 Login config .......................................................................................... 21
3.4.5 Password.............................................................................................. 21
3.4.6 Date...................................................................................................... 22
3.4.7 Mail....................................................................................................... 22
3.4.8 SNMP ................................................................................................... 23
3.4.9 Messenger............................................................................................ 24
3.4.10 System log server................................................................................. 24
3.4.11 Event log ..............................................................................................25
3.5 iSCSI config ................................................................... 26
3.5.1 Entity property ...................................................................................... 26
3.5.2 NIC ....................................................................................................... 27
3.5.3 Node..................................................................................................... 27
3.5.4 Session................................................................................................. 28
3.5.5 CHAP account...................................................................................... 29
3.6 Volume configuration ..................................................... 30
3.6.1 Volume relationship diagram ................................................................ 30
3.6.2 Physical disk......................................................................................... 32
3.6.3 Volume group ....................................................................................... 34
3.6.4 User data volume ................................................................................. 36
3.6.5 Cache volume ......................................................................................38
3.6.6 Logical unit number .............................................................................. 39
3.6.7 Examples.............................................................................................. 40
- 3 -
3.7 Enclosure management ................................................. 50
3.7.1 SES configuration................................................................................. 51
3.7.2 Hardware monitor................................................................................. 51
3.7.3 Hard drive S.M.A.R.T. function support ................................................52
3.7.4 UPS ...................................................................................................... 53
3.8 System maintenance ..................................................... 54
3.8.1 Upgrade................................................................................................ 55
3.8.2 Info .......................................................................................................55
3.8.3 Reset to default .................................................................................... 56
3.8.4 Config import & export.......................................................................... 56
3.8.5 Shutdown .............................................................................................57
3.9 Logout ............................................................................ 57
Chapter 4 Advanced operation....................................58
4.1 Rebuild........................................................................... 58
4.2 VG migration and expansion.......................................... 60
4.3 UDV Extension............................................................... 61
4.4 Disk roaming .................................................................. 62
Appendix............................................................................63
A. Certification list............................................................... 63
B. Event notifications.......................................................... 65
C. Microsoft iSCSI Initiator.................................................. 70
D. MPIO and MC/S setup instructions................................ 75
- 4 -

Chapter 1 RAID introduction

1.1 Features

i Series features:

Gigabit LAN (x2) -to- SATA II (xN bays) RAID controller.
RAID 6 ready.
SATA II support with SATA I backward compatible.
N-way mirror.
On-line volume expansion and RAID level migration.
Global/dedicated cache configuration by volume.
S.M.A.R.T. enabled.
Support Microsoft VDS (Virtual Disk Service).
Disk roaming.
MPIO ready (initiator driver support needed).
MC/S ready (initiator driver support needed).
Support iSCSI header and data digest.
Support CHAP authentication.
With proper configuration, i Series can provide non-stop service with a high degree of fault tolerance by the use of i Series RAID technology and advanced array management features. For more detail, please contact with your direct
sales or email to “sales@thecus.com”.
i Series connects to the host system in iSCSI interface. It can be configured to any RAID level. i Series provides reliable data protection for servers and the RAID 6 function ready. The RAID 6 function allows two HDD failures without any impact on the existing data. Data can be recovered from the remaining data and parity drives. (Data can be recovered from the rest disks/drives.)
Thecus RAID system is the most cost-effective disk array system with
completely integrated high-performance and data-protection capabilities which
meet or exceed the highest industry standards, and the best data solution for
small/medium business (SMB) users.
Caution
Please refer to RAM certification list in Appendix A for more detail.
- 5 -

1.2 Terminology

The document uses the following terms:

RAID

PD
VG
UDV
CV
RAID is the abbreviation of “Redundant Array of Independent Disks. There are different RAID levels with different degree
of the data protection, data availability, performance to host environment.
The Physical Disk belongs to the member disk of one specific
volume group.
Volume Group. A collection of removable media. One VG
consists of a set of UDVs and owns one RAID level attribute.
User Data Volume. Each VG could be divided into several
UDVs. The UDVs from one VG share the same RAID level, but may have different volume capacity.
Cache Volume. i Series uses the on board memory as cache.
All RAM (except for the part which is occupied by the controller) can be used as cache. User can divide the cache for one UDV or sharing among all UDVs. Each UDV will be associated with one CV for data transaction. Each CV could be assigned different cache memory size.
LUN
GUI
RAID width, RAID copy, RAID row
(RAID cell in one row)
Logical Unit Number. A logical unit number (LUN) is an
unique identifier used on a iSCSI connection which enables it to differentiate among separate devices (each of which is a logical unit).

Graphic User Interface.

RAID width, copy and row are used to describe one VG.

E.g.:

1. One 4-disk RAID 0 volume: RAID width= 4; RAID copy=1; RAID row=1.

2. One 3-way mirroring volume: RAID width=1; RAID copy=3; RAID row=1.

3. One RAID 10 volume over 3 4-disk RAID 1 volume: RAID width=1; RAID copy=4; RAID row=3.

- 6 -
WT
WB
RO
DS
GS
Write-Through cache write policy. A caching technique in
which the completion of a write request is not signaled until data is safely stored on non-volatile media. Each data is synchronized in both data cache and the accessed physical disks.
Write-Back cache write policy. A caching technique in which
the completion of a write request is signaled as soon as the data is in cache and actual writing to non-volatile media occurs at a later time. It speeds up system write performance but needs to bear the risk where data may be inconsistent between data cache and the physical disks in one short time interval.

Set the volume to be Read-Only.

Dedicated Spare disks. The spare disks are only used by one
specific VG. Others could not use these dedicated spare disks for any rebuilding purpose.
Global Spare disks. GS is shared for rebuilding purpose. If
some VGs need to use the global spare disks for rebuilding, they could get the spare disks out from the common spare disks pool for such requirement.
DC
GC
DG

S.M.A.R.T.

WWN
HBA

MPIO

MC/S

NIC

Dedicated Cache.

Global Cache.

DeGraded mode. Not all of the array’s member disks are
functioning, but the array is able to respond to application read and write requests to its virtual disks.

Self-Monitoring Analysis and Reporting Technology.

World Wide Name.

Host Bus Adapter.

Multi-Path Input/Output.

Multiple Connections per Session

Network Interface Card.

- 7 -

iSCSI

CHAP

iSNS

Internet Small Computer Systems Interface.

Challenge Handshake Authentication Protocol. An optional
security mechanism to control access to an iSCSI storage
system over the iSCSI data ports.

Internet Storage Name Service.

1.3 RAID levels

RAID 0

RAID 1

N-way mirror

RAID 3

Disk striping. RAID 0 needs at least one hard drive.

Disk mirroring over two disks. RAID 1 needs at least two hard drives.

Extension to RAID 1 level. It has N copies of the disk.

Striping with parity on the dedicated disk. RAID 3 needs at least three hard drives.

RAID 5

RAID 6

RAID 0+1

RAID 10

JBOD

Striping with interspersed parity over the member disks. RAID 3 needs at least three hard drives.

2-dimensional parity protection over the member disks. RAID 6 needs at least four hard drives.

Mirroring of the member RAID 0 volumes. RAID 0+1 needs at least four hard drives.

Striping over the member RAID 1 volumes. RAID 10 needs at least four hard drives.

The abbreviation of “Just a Bunch Of Disks”. JBOD needs at
least one hard drive.
- 8 -

Chapter 2 Getting started

2.1 Before starting

Before starting, prepare the following items.

1. Check the “Certification list” in Appendix A to confirm the hardware
setting is fully supported.

2. Read the latest release notes before upgrading. Release notes accompany with release firmware.

3. A server with a NIC or iSCSI HBA.

4. CAT 5e, or CAT 6 network cables for management port and iSCSI data ports. Recommend CAT 6 cables for best performance.

5. Prepare storage system configuration plan.

6. Management and iSCSI data ports network information. When using static IP, please prepare static IP addresses, subnet mask, and default gateway.

7. CHAP security information, including CHAP usernames and secrets. (Optional)

2.2 iSCSI introduction

iSCSI (Internet SCSI) is a protocol which encapsulates SCSI (Small Computer System Interface) commands and data in TCP/IP packets for linking storage devices with servers over common IP infrastructures. iSCSI provides high performance SANs over standard IP networks like LAN, WAN or the Internet.
IP SANs are true SANs (Storage Area Networks) which allow few of servers to attach to an infinite number of storage volumes by using iSCSI over TCP/IP networks. IP SANs can scale the storage capacity with any type and brand of storage system. In addition, using any type of network (Ethernet, Fast Ethernet, Gigabit Ethernet) and combining operating systems (Microsoft Windows, Linux, Solaris, …etc.) within the SAN network. IP-SANs also include mechanisms for security, data replication, multi-path and high availability.
Storage protocol, such as iSCSI, has “two ends” in the connection. These ends are the initiator and the target. In iSCSI we call them iSCSI initiator and iSCSI target. The iSCSI initiator requests or initiates any iSCSI communication. It requests all SCSI operations like read or write. An initiator is usually located on the host/server side (either an iSCSI HBA or iSCSI SW initiator).
- 9 -
The iSCSI target is the storage device itself or an appliance which controls and serves volumes or virtual volumes. The target is the device which performs SCSI commands or bridges it to an attached storage device. iSCSI targets can be disks, tapes, RAID arrays, tape libraries, and etc.
Host 1
(initiator)
NIC
Host 2
(initiator)
iSCSI
HBA
IP SAN
iSCSI device 1
(target)
iSCSI device 2
(target)

Figure 2.2.1

The host side needs an iSCSI initiator. The initiator is a driver which handles the SCSI traffic over iSCSI. The initiator can be software or hardware (HBA). Please refer to the certification list of iSCSI HBA(s) in Appendix A. OS native initiators or other software initiators use the standard TCP/IP stack and Ethernet hardware, while iSCSI HBA(s) use their own iSCSI and TCP/IP stacks on board.
Hardware iSCSI HBA(s) would provide its initiator tool. Please refer to the
vendors’ HBA user manual. Microsoft, Linux and Mac provide software iSCSI
initiator driver. Below are the available links:

1. Link to download the Microsoft iSCSI software initiator:

http://www.microsoft.com/downloads/details.aspx?FamilyID=12cb3c1a­15d6-4585-b385-befd1319f825&DisplayLang=en

Please refer to Appendix C for Microsoft iSCSI initiator installation procedure.

2. Linux iSCSI initiator is also available. For different kernels, there are different iSCSI drivers. Please check Appendix A for software iSCSI initiator certification list. If user needs the latest Linux iSCSI initiator, please visit Open-iSCSI project for most update information. Linux­iSCSI (sfnet) and Open-iSCSI projects merged in April 11, 2005.
- 10 -

Open-iSCSI website: http://www.open-iscsi.org/ Open-iSCSI README: http://www.open-iscsi.org/docs/README Features: http://www.open-iscsi.org/cgi-bin/wiki.pl/Roadmap Support Kernels:

http://www.open-iscsi.org/cgi-bin/wiki.pl/Supported_Kernels

Google groups:

http://groups.google.com/group/open-iscsi/threads?gvc=2 http://groups.google.com/group/open-iscsi/topics

Open-iSCSI Wiki: http://www.open-iscsi.org/cgi-bin/wiki.pl

3. ATTO iSCSI initiator is available for Mac.

Website: http://www.attotech.com/xtend.html

2.3 Management methods

There are two management methods to manage i Series, describe in the following:

2.3.1 Web GUI

i Series support graphic user interface to manage the system. Be sure to connect LAN cable. The default setting of management port IP is Static IP.
Default IP address: 192.168.1.100

Click any function at the first time; it will pop up a dialog to authenticate current user.

Login name: admin Default password: admin

Or login with the read-only account which only allows seeing the configuration and cannot change setting.

Login name: user Default password: 1234
- 11 -

2.3.2 Remote control – secure shell

SSH (secure shell) is required for i Series to remote login. The SSH client
software is available at the following web site: SSHWinClient WWW: http://www.ssh.com/ Putty WWW: http://www.chiark.greenend.org.uk/

Host name: 192.168.1.100 Login name: admin Default password: admin

Tips
Thecus i Series only support SSH for remote control. For using SSH, the IP address and the password is required for login.

2.4 Enclosure

2.4.1 LCM

There are four buttons to control LCM (LCD Control Module), including:

c (up), d (down), ESC (Escape), and ENT (Enter).

After booting up the system, the following screen shows management port IP and model name:

192.168.1.100 i Series
Press “ENT”, the LCM functions “Alarm Mute”, “Reset/Shutdown”, “Quick Install”, “View IP Setting”, “Change IP Config” and “Reset to Default” will rotate by pressing c (up) and d (down).

When there is WARNING or ERROR level of event happening, the LCM shows the event log to give users more detail from front panel too.

- 12 -

The following table is function description.

Alarm Mute

Reset/Shutdown

Quick Install

Mute alarm when error occurs.

Reset or shutdown controller.

Quick three steps to create a volume. Please refer to section 3.3 for operation in web UI.

View IP Setting

Change IP Config

Display current IP address, subnet mask, and gateway.

Set IP address, subnet mask, and gateway. There are 2 selections, DHCP (Get IP address from DHCP server) or set static IP.

Reset to Default

Reset to default sets password to default: admin, and
set IP address to default setting.
Default IP address: 192.168.1.100 (Static IP) Default subnet mask: 255.255.255.0 Default gateway: 192.168.1.1

The following is LCM menu hierarchy.

[Alarm Mute] [cYes Nod]

[Reset] [cYes Nod]

[Shutdown] [cYes Nod]

RAID 0

(RAID 1/RAID 3/

RAID 5/RAID 6)

xxxxxx GB [IP Config]

[Static IP]

[IP Address]

[192.168.001.100]

[IP Subnet Mask]

[255.255.255.0]

[IP Gateway]

[192.168.001.001]

[DHCP] [cYes Nod]

[Static IP]

cd

[Reset/Shutdown]

[Quick Install]

[View IP Setting]

[Change IP
Config]

[Reset to Default] [cYes Nod]

Volume Size

(xxxxxx G)

Apply The
Config

[IP Address]

[IP Subnet
Mask]

[IP Gateway]

[Apply IP
Setting]
Adjust Volume
Size
[cYes Nod]
Adjust IP
address
Adjust Submask
IP
Adjust Gateway
IP
[cYes Nod]
- 13 -
Caution Before power off, it is better to execute “Shutdown” to flush
the data from cache to physical disks.

2.4.2 System buzzer

The system buzzer features are describing in the following:

1. The system buzzer alarms 1 second when system boots up successfully.

2. The system buzzer alarms continuously when there is error level event happened. The alarm will be stopped after mute.

3. The alarm will be muted automatically when the error situation is resolved. E.g., when RAID 5 is degraded and alarm rings immediately, after user changes/adds one physical disk for rebuilding, and when the rebuilding is done, the alarm will be muted automatically.

2.4.3 LED

The LED features are describing as follows:

1. Marquee/Disk Status/Disk Rebuilding LED: The Marquee/Disk
Status/Disk Rebuilding LEDs are displayed in the same LEDs. The LEDs behave for different functions in different stages.
I. Marquee LEDs: When system powers on and succeeds to boot
up, the Marquee LED acts until the system is booting successful.
II. Disk status LEDs: the LEDs reflect the disk status for the tray.
Only On/Off situation.
III. Disk rebuilding LEDs: the LEDs are blinking when the disks are
under rebuilding.

2. Disk Access LED: Hardware activated LED when accessing disks (IO).

3. Disk Power LED: Hardware activated LED when the disks are plugged
in and powered.
4. System status LED: Used to reflect the system status by turn on the
LED when error occurs or RAID malfunctioning happens.
5. Management LAN port LED: GREEN LED is for LAN transmit/receive
indication. ORANGE LED is for LAN port 10/100 LINK indication.
6. BUSY LED: Hardware activated LED when the front-end channel is
busy.

7. POWER LED: Hardware activated LED when system is powered on.

- 14 -

Chapter 3 Web GUI guideline

3.1 GUI hierarchy

The below table is the hierarchy of i Series GUI.

Æ

Quick Install System Config

System name

IP address

Language

Login config

Password

Messenger

System log

Event log

iSCSI config

Entity Property

CHAP account

Session

Volume config

Physical disk

Volume group

User data

Volume

Cache volume

Logical unit

Enclosure management

SES config

Hardware

monitor

S.M.A.R.T.

Date

Mail

SNMP

server

NIC

Node

UPS

Step 1 / Step 2 / Step 3 / Confirm

System name

Æ
DHCP / Static / Address / Mask / Gateway / DNS /
Æ
HTTP port / HTTPS port / SSH port Language
Æ

Auto logout / Login lock

Æ

Old password / Password / Confirm

Æ

Time zone / Date / Time / NTP Server

Æ
Mail-from address / Mail-to address / Sent events /
Æ
SMTP relay / SMTP server / Authentication / Account / Password / Confirm / Send test mail SNMP trap address / Community / Send events
Æ

Messenger IP/hostname / Send events

Æ

Server IP/hostname / Port / Facility / Event level

Æ

Filter / Download / Mute / Clear

Æ

Entity name / iSNS IP

Æ
IP settings for iSCSI ports / Become default gateway /
Æ
Set Jumbo Frame Change Authentication
Æ

Delete

Æ

Create /Delete

Æ
Free disks / Global spares / Dedicated spares / More
Æ
information / Auto Spindown Create / Delete / More information / Rename / Migrate
Æ
Attach / Create / Delete / More information / Rename /
Æ
Extend / Set read/write mode Create / Delete / More information / Resize
Æ

Attach / Detach

Æ

Enable / Disable

Æ

Auto shutdown

Æ
Æ
UPS Type / Shutdown Battery Level / Shutdown Delay
Æ
/ Shutdown UPS
- 15 -

Maintenance

Logout

Upgrade

Info

Reset to default

Config import &
export

Shutdown

Browse the firmware to upgrade / Export config

Æ

System information

Æ

Sure to reset to factory default?

Æ

Import/Export / Import file

Æ

Reboot / Shutdown

Æ

Sure to logout?

3.2 Login

i Series supports graphic user interface (GUI) to operate the system. Be sure to
connect the LAN cable. The default IP address is 192.168.1.100; open the
browser and enter:

http://192.168.1.100 (Please check IP address first on LCM)

Click any function at the first time; it will pop up a dialog for authentication.

Login name: admin Default password: admin

After login, you can choose the function blocks on the left side of window to do configuration.

Figure 3.2.1

There are four indicators at the top-right corner.

Figure 3.2.2

- 16 -
1. RAID light: Green means RAID works well. Red represents RAID
failure happening.
2.
3.

4. UPS light: Green is normal. Red represents abnormal UPS status.

Temperature light: Green is normal. Red represents abnormal
temperature.
Voltage light: Green is normal. Red represents abnormal voltage
status.

3.3 Quick install

It is easy to use “Quick install” function to create a volume. Depend on how
many physical disks or how many residual spaces on created VGs are free, the
system will calculate maximum spaces on RAID levels 0/1/3/5/6. “Quick install”
function will occupy all residual VG space for one UDV.
Quick Install function has a smarter policy. When the system is full inserted with 5 HDD, and all HDD are in the same size, Quick Install function lists all possibilities and sizes among different RAID levels, Quick Install will use all
available HDD for the RAID level which user decides. But, when the system is inserted with different sizes of HDD, e.g., 2*200G HDD and 3*80G, i Series also lists all possibilities and combinations of different RAID Level and different sizes. After user chooses RAID level, user may finds there are still some HDD are not
used (Free Status). The result is from i Series’s smarter policy on Quick Install
which gives user:

1. Biggest capacity of RAID level which user chooses and,

2. The fewest disk number for the RAID level/volume size.

- 17 -
Step 1: Select “Quick install” then choose the RAID level to set. Please refer to
Figure 3.3.1. After choosing the RAID level, click “ ”, which
links to another page, user can set up “LUN” here.

Figure 3.3.1

Step 2: Please select a LUN number. Access control of host would show as a
wildcard “*”, which means every host can access this volume. In this page, the “Volume size” can be changed. The maximum volume size is shown. To re-enter the size be sure it has to be less or equal to maximum volume size. Then click
”.
Step 3: Confirm page. Click “ ” if all setups are correct. Then
a page with the “User data volume” just been created will be shown as Figure
3.3.2.

Done. You can start to use the system now.

Figure 3.3.2

(Figure 3.3.2: A RAID 0 user data volume with the UDV name “QUICK98273”, named by the system itself, with the total available volume size 222GB.)

- 18 -

3.4 System configuration

“System config” selection is for the setup of “System name”, “IP address”, “Language”, “Login config”, “Password”, “Date”, “Mail”, “SNMP”, “Messenger” , “System log server” and view “Event log”.

Figure 3.4.1

3.4.1 System name

Select “System name” to change system name. Default system name
composed by model name and serial number of this system.

Figure 3.4.1.1

- 19 -

3.4.2 IP address

Select “IP address” to change IP address for remote administration usage.
There are 2 selections, DHCP (Get IP address from DHCP server) or static IP. The default setting is Static IP (192.168.1.100 ) enabled. User can change the HTTP, HTTPS, and SSH port number when the default port number is not allowed on host/server.

Figure 3.4.2.1

3.4.3 Language

Select “Language” is to set the language shown in Web UI. The option “Auto
Detect” will be detected by browser language setting.

Figure 3.4.3.1

- 20 -

3.4.4 Login config

Select “Login config” is to set only one admin and set the auto logout timing.
The only one admin can prevent multiple users access the same controller in the same time.

1. Auto logout: The options are (1) Disable; (2) 5 mins; (3) 30 mins; (4) 1 hour. The system will log out automatically when the user is no response for a period of time.

2. Login lock: Disable/Enable. When the login lock is enabled, the system allows only one user to login/modify the system settings.

Figure 3.4.4.1

3.4.5 Password

Select “Password” is for changing administrator password. The maximum
length of admin password is 12 characters.

Figure 3.4.5.1

- 21 -

3.4.6 Date

Select “Date” to set up the current date, time, and time zone before using or
synchronize time from NTP(Network Time Protocol) server.

Figure 3.4.6.1

3.4.7 Mail

Select “Mail” to enter at most 3 mail addresses for receiving the event notification. Some mail servers would check “Mail-from address” and need authentication for anti-spam. Please fill the necessary fields and select “Send test mail” to check whether the email works fine. User can also select which
levels of event logs are needed to be sent out by Mail. Default setting is only ERROR and WARNING event logs enabled.
- 22 -

Figure 3.4.7.1

3.4.8 SNMP

Select “SNMP” to set up SNMP trap for alert via SNMP. It allows up to 3 SNMP
trap addresses. Default community setting is “public”. User can choose the event log levels and the default value of SNMP is INFO event log enabled only.

Figure 3.4.8.1

There are many SNMP tools. The following web sites are for reference: SNMPc: http://www.snmpc.com/ Net-SNMP: http://net-snmp.sourceforge.net/
- 23 -

3.4.9 Messenger

Select “Messenger” to set up pop-up message alert via Windows messenger
(not MSN). User must enable the service “Messenger” in Windows (Start Æ Control Panel Æ Administrative Tools Æ Services Æ Messenger), and then event logs can be received. It allows up to 3 messenger addresses. User can choose the event log levels and the default values are WARNING and ERROR event logs enabled only.

Figure 3.4.9.1

3.4.10 System log server

Select “System log server” to set up alert via syslog protocol. The default port
of syslog is 514. User can choose the facility and the event log level. The default values of event level are WARNING and ERROR event logs enabled.

Figure 3.4.10.1

There are some syslog server tools. The following web sites are for reference: WinSyslog: http://www.winsyslog.com/ Kiwi Syslog Daemon: http://www.kiwisyslog.com/ Most UNIX systems build in syslog daemon.

- 24 -

3.4.11 Event log

Select “Event log” to view the event messages. Press “Filter” button to choose the display. Press “Download” button will save the whole event log as text file with file name “log-ModelName-SerialNumber-Date-Time.txt”. Press “Clear” button will clear event log. Press “Mute” button will stop alarm if system alerts.

Figure 3.4.11.1

For customizing your own display of event logs, there are total three display methods, on Web UI/Console event log page, popup windows on Web UI, and on LCM. The default setting of these three displays is WARNING and ERROR event logs enabled on Web UI and LCM. The popup is default disabled.

Figure 3.4.11.2

The event log is displayed in reverse order which means the latest event log is on the first page. The event logs are actually saved in the first four hard drives; each hard drive has one copy of event log. For one controller, there are four copies of event logs to guarantee users can check event log most of the time when there is/are failed disk(s).
Tips
Please plug-in anyone of first four hard drives, and then event logs can be saved and appeared in next system boot up. Otherwise, event logs would be gone.
- 25 -

3.5 iSCSI config

“iSCSI config” selection is for the setup of “Entity Property”, “NIC”, “Node”, “Session”, and “CHAP account”.

Figure 3.5.1

3.5.1 Entity property

Select “Entity property” to view the view the entity name of the controller, and setup “iSNS IP” for iSNS (Internet Storage Name Service). Add an iSNS server
IP address to the iSNS servers list which the iSCSI initiator service can send queries. The entity name cann’t be changed.

Figure 3.5.1.1

- 26 -

3.5.2 NIC

Select “NIC” to change IP addresses of iSCSI data ports.

Figure 3.5.2.2

(Figure 3.5.2.2: there are 2 iSCSI data ports.)

User can change IP address by clicking the button “ ” in the “DHCP”
column. There are 2 selections, DHCP (Get IP address from DHCP server) or static IP.

Figure 3.5.2.3

Default gateway can be changed by clicking the button “ ” in the
“Gateway” column. There is only one default gateway.
Jumbo frame setting can be changed by clicking the button “
” in the
“Jumbo frame” column. Default setting is Disable.

3.5.3 Node

Select “Node” to view the target name for iSCSI initiator.The node name of i
Series exists by default and can not be changed.

Figure 3.5.3.1

- 27 -
CHAP: CHAP is the abbreviation of Challenge Handshake Authorization Protocol. CHAP
is a strong authentication method used with point-to-point for user login. It’s a type of authentication in which the authentication server sends the client a key to be used for encrypting the username and password. CHAP enables the username and password to transmitting in an encrypted form for protection.

1. Click “ ” in Auth column.

2. Select “CHAP”.

3. Go to / iSCSI config / CHAP page to create account and password.

Figure 3.5.3.2

Figure 3.5.3.3

4. Select “None” to disable CHAP.

Tips
After setting CHAP, the initiator in host/server should be set the same Account/Password. Otherwise, user cannot login.

3.5.4 Session

Enter “Session” function; it will display iSCSI session and connection
information, including the following items:

1. Host (Initiator Name)

2. Error Recovery Level

3. Error Recovery Count

4. Detail of Authentication status and Source IP: port number.

- 28 -
Loading...
+ 63 hidden pages