D-Link DSN-6420 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour NAS et serveurs de stockage D-Link DSN-6420. D-Link DSN-6120 storage server Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 146
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - D-Link iSCSI IP SAN storage

1 D-Link iSCSI IP SAN storage 10GbE iSCSI to SATA II / SAS RAID IP SAN storage DSN-6410 & DSN-6420 User Manual Version 1.

Page 2 - Preface

10MTU Maximum Transmission Unit. CHAP Challenge Handshake Authentication Protocol. An optional security mechanism to control access to an iSCSI s

Page 3 - Table of Contents

100 Figure 5.6.12 10. After initiating the snapshot space, it will start cloning. Figure 5.6.13 11. Click “Schedule clone” to set up the clone

Page 4

101 Figure 5.6.15  Run out of snapshot space while VD clone While the clone is processing, the increment data of this VD is over the snapshot sp

Page 5 - Appendix 133

102 Figure 5.6.16

Page 6 - Chapter 1 Overview

103 5.7 SAS JBOD expansion 5.7.1 Connecting JBOD D-LINK controller suports SAS JBOD expansion to connect extra SAS dual JBOD controller. When co

Page 7 - 1.2 RAID concepts

104 Figure 5.7.1.2 Figure 5.7.1.3 “/ Enclosure management / S.M.A.R.T.” can display S.M.A.R.T. information of all PDs, including Local and all SA

Page 8 - 1.2.1 Terminology

105SAS JBOD expansion has some constraints as described in the followings: 1 User could create RAID group among multiple chassis, max number of di

Page 9 -  Part 2: iSCSI

106 5.8 MPIO and MC/S These features come from iSCSi initiator. They can be setup from iSCSI initiator to establish redundant paths for sending I/

Page 10 - 1.2.2 RAID levels

107 Figure 5.8.2 Difference: MC/S is implemented on iSCSI level, while MPIO is implemented on the higher level. Hence, all MPIO infrastructures ar

Page 11 - 1.2.3 Volume relationship

1085.9 Trunking and LACP Link aggregation is the technique of taking several distinct Ethernet links to let them appear as a single link. It has a

Page 12 - 1.3 iSCSI concepts

109 Figure 5.9.2 Caution Before using trunking or LACP, he gigabit switch must support trunking or LACP and enabled. Otherwise, host can not conne

Page 13 -  Controller features

11four hard drives. RAID 10 Striping over the member RAID 1 volumes. RAID 10 needs at least four hard drives. RAID 30 Striping over the member RAI

Page 14 -  Advanced data protection

110 Figure 5.10.1.1 5.10.2 Ownership When creating RG, it will be assigned with a prefered owner, the default owner is controller 1. To change t

Page 15 -  OS support

111 Figure 5.10.2.2 (Figure 5.10.2.2: The RG ownership is changed to the other controller.) 5.10.3 Controller status There are four statuses d

Page 16 - 1.4.2 FCC and CE statements

1125.11 Replication Replication function will help users to replicate data easily through LAN or WAN from one IP SAN storage to another. The proc

Page 17

1133. If you want the replication port to be on special VLAN section, you may assign VLAN ID to the replication port. The setting will automaticall

Page 18

114Figure 5.11.4  Create replication job on the source IP SAN storage 1. If the license key is activated on the IP SAN storage correctly, a new Re

Page 19 - Chapter 2 Installation

115 Figure 5.11.7 4. The Replication uses standard iSCSI protocol for data replication. User has to log on the iSCSI node to create the iSCSI conn

Page 20 - 2.3.2 Front LED lights

116 Figure 5.11.9 6. A new replication job is created and listed on the Replication page. Figure 5.11.10  Run the replication job 1. Click t

Page 21 - 2.3.3 Install drives

117 Figure 5.11.12 3. User can monitor the replication job from the “Status” information and the progress is expressed by percentage. Figure 5.1

Page 22 - 2.3.4 Rear view

118 Figure 5.11.15 3. Select the iSCSI node to log on and click “Next”. Figure 5.11.16 4. Choose the same target virtual disk and click “Next”

Page 23

119 Figure 5.11.17 5. A new target will be added in this replication job as a redundancy path. Figure 5.11.18  Configure the replication job

Page 24

121.3 iSCSI concepts iSCSI (Internet SCSI) is a protocol which encapsulates SCSI (Small Computer System Interface) commands and data in TCP/IP pack

Page 25 - Figure 2.4.1

1202. The replication job can be scheduled to run by hour, by day, by week or by month. The execution time can be configurable per user’s need. If

Page 26 - 2.5 Deployment

121 Figure 5.11.21 There are three settings in the Replication configuration menu, Figure 5.11.22 “Snapshot space” specifies the ratio of snapsh

Page 27

1225.12 VLAN VLAN (Virtual Local Area Network) is a logical grouping mechanism implemented on switch device using software rather than a hardware

Page 28 - Figure 2.5.4

123 Figure 5.12.2 4. VLAN ID 66 for LAN2 is set properly. Figure 5.12.3  Assign VLAN ID to LAG(Trunking or LACP) 1. After creating LAG, press

Page 29 - Chapter 3 Quick setup

124 Figure 5.12.5 3. If iSCSI ports are assigned with VLAN ID before creating aggregation takes place, aggregation will remove VLAN ID. You need t

Page 30 - 3.1.3 Web UI

125Chapter 6 Troubleshooting 6.1 System buzzer The system buzzer features are listed below: 1. The system buzzer alarms 1 second when system b

Page 31 -  Indicator description:

126ERROR SATA PRD mem fail Failed to init SATA PRD memory manager ERROR SATA revision id fail Failed to get SATA revision id ERROR SATA set reg

Page 32 - 3.2.1 Quick installation

127 RMS events Level Type Description INFO Console Login <username> login from <IP or serial console> via Console UI INFO Con

Page 33 - Figure 3.2.1.3

128ERROR VD move failed Failed to complete move of VD <name>. INFO RG activated RG <name> has been manually activated. INFO RG deac

Page 34 - Figure 3.2.1.5

129INFO VD erase started VD <name> starts erasing process.  Snapshot events Level Type Description WARNING Snap mem Failed to allo

Page 35 - Figure 3.2.1.6

13 Hardware iSCSI HBA(s) provide its own initiator tool. Please refer to the vendors’ HBA user manual. Microsoft, Linux, Solaris and Mac provide iSC

Page 36 - Figure 3.2.2.2

130 INFO PD upgrade started JBOD <name> PD [<string>] starts upgrading firmware process. INFO PD upgrade finished JBOD <name>

Page 37 - Figure 3.2.2.4

131 System maintenance events Level Type Description INFO System shutdown System shutdown. INFO System reboot System reboot. INFO Syste

Page 38 - Chapter 4 Configuration

132Level Type Description INFO VD clone started VD <name> starts cloning process. INFO VD clone finished VD <name> finished cl

Page 39 - 4.2 System configuration

133Appendix A. Certification list  iSCSI Initiator (Software) OS Software/Release Number Microsoft Windows Microsoft iSCSI Software Initiator

Page 40 - 4.2.2 Network setting

134 D-Link All D-Link Managed Gigabit Switches Avago AFBR-703SDZ (10 Gb/s SFP transceiver, 850nm) Finisar FTLX8571D3BCV (10 Gb/s SFP transceive

Page 41 - 4.2.3 Login setting

135Vendor Model Hitachi Deskstar 7K250, HDS722580VLSA80, 80GB, 7200RPM, SATA, 8M Hitachi Deskstar E7K500, HDS725050KLA360, 500GB, 7200RPM, SATA

Page 42 - 4.2.4 Mail setting

136Vendor Model Seagate Constellation, ST9500530NS, 500GB, 7200RPM, SATA 3.0Gb/s, 32M (F/W: SN02) B. Microsoft iSCSI initiator Here is the step

Page 43 - 4.2.5 Notification setting

137 Figure B.2 Figure B.3 4. It can connect to an iSCSI disk now.  MPIO 5. If run

Page 44 - Figure 4.2.5.1

138 Figure B.4 Figure B.5 8. Click “OK”. Figure B.6

Page 45 - 4.3 iSCSI configuration

139 9. Click “Targets” tab, select the second path, and then click “Connect”. 10. Enable “Enable multi-path” checkbox. Then click “OK”. 11. Done,

Page 46 -  MTU / Jumbo frame:

14 The management port can be transferred smoothly to the other controller with the same IP address 6. Online firmware upgrade, no system down ti

Page 47 -  Ping host:

140 Figure B.10 Figure B.11 17. Select Initiator IP and Target portal IP, and then cli

Page 48 - 4.3.3 Node

141 Disconnect 21. Select the target name, click “Disconnect”, and then click “Yes”. Figure B.14 22. Done, the iSCSI device disconnect succes

Page 49 - Figure 4.3.3.2

142C. From single controller to dual controllers This SOP applies to upgrading from DSN-6110 to DSN-6120 as well as from DSN-6410 to DSN-6420. Befo

Page 50 - Figure 4.3.3.5

143Please follow the steps below to upgrade to dual controller mode. Step 1 Go to “Maintenance\System”. Copy the IP SAN storage serial number. St

Page 51 - 4.3.4 Session

144Step 3 Click “confirm”. The system will ask you to shutdown. Please shutdown IP SAN storage. Click Ok.

Page 52 - 4.3.5 CHAP account

145 Go to “Maintenance\Reboot and shutdown”. Click “Shutdown” to shutdown the system. Click Ok.

Page 53 - 4.4 Volume configuration

146Step 4 Power off DSN-6110 or DSN-6410. Insert the second controller to the IP SAN storage. And then power on the system. The IP SAN storage shoul

Page 54 - 4.4.1 Physical disk

155. Instant volume configuration restoration 6. Smart faulty sector relocation 7. Hot pluggable battery backup module support  Enclosure monit

Page 55 -  PD column description:

16 Windows  Linux  Solaris  Mac  Drive support 1. SAS 2. SATA II (optional) 3. SCSI-3 compliant 4. Multiple IO transaction processing

Page 56 -  PD operation description:

17 (EN55022 / EN55024) UL statement FCC statement This device has been shown to be in compliance with and was tested in accordance with the me

Page 57 - 4.4.2 RAID group

18 The ITE is not intended to be installed and used in a home, school or public area accessible to the general population, and the thumbscrews shou

Page 58 -  RG column description:

19Chapter 2 Installation 2.1 Package contents The package contains the following items: 1. DSN-6410/6420 IP SAN storage (x1) 2. HDD trays (x12

Page 59 -  RG operation description:

2Preface Copyright Copyright@2011, D-Link Corporation. All rights reserved. No part of this manual may be reproduced or transmitted without writte

Page 60 - 4.4.3 Virtual disk

20 The drives can be installed into any slot in the enclosure. Slot numbering will be reflected in web UI. Tips It is advisable to install at leas

Page 61 - Figure 4.4.3.2

212.3.3 Install drives Note : Skip this section if you purchased a solution populated with drives. To install SAS or SATA drives with no Bridge B

Page 62 -  VD column description:

22 Figure 2.3.3.3  HDD tray description:  HDD power LED:  Green  HDD is inserted and good.  Off  No HDD.  HDD access LED:  Blue b

Page 63 -  VD operation description:

23 Controller 2. (only on DSN-6420)  Controller 1.  Power supply unit (PSU1).  Fan module (FAN1 / FAN2).  Power supply unit (PSU2).  Fan modul

Page 64

24 Figure 2.3.4.3 (DSN-6410 SFP+)  Connector, LED and button description:  10GbE ports (x2). Link LED:  Orange  Asserted when a 1G link

Page 65 - 4.4.4 Snapshot

25 BBM Status Button:  When the system power is off, press the BBM status button, if the BBM LED is Green, then the BBM still has power to keep d

Page 66

262.5 Deployment Please refer to the following topology and have all the connections ready. Figure 2.5.1 (DSN-6420) Figure 2.5.2 (DSN-6410)

Page 67

272. In addition, installing an iSNS server is recommended for dual controller system. 3. Power on DSN-6420/6410 and DSN-6020 (optional) first, an

Page 68 - 4.4.5 Logical unit

28 Figure 2.5.4 1. Using RS-232 cable for console (back color, phone jack to DB9 female) to connect from controller to management PC directly. 2.

Page 69 - 4.4.6 Example

29Chapter 3 Quick setup 3.1 Management interfaces There are three management methods to manage D-LINK IP SAN storage, describe in the following:

Page 70 - Figure 4.4.6.2

3Table of Contents Chapter 1 Overview...61.1 Features...

Page 71 - Figure 4.4.6.4

30 3.1.3 Web UI D-LINK IP SAN storage supports graphic user interface (GUI) to operate. Be sure to connect the LAN cable. The default IP setting i

Page 72 - Figure 4.4.6.6

31  Indicator description: RAID light:  Green  RAID works well.  Red  RAID fails. Temperature light:  Green  Temperature is normal. 

Page 73 - Figure 4.4.6.8

32 Mute alarm beeper. Tips If the status indicators in Internet Explorer (IE) are displayed in gray, but not in blinking red, please enable “Inter

Page 74 - 4.5 Enclosure management

33 Figure 3.2.1.2 Step2: Confirm the management port IP address and DNS, and then click “Next”. Figure 3.2.1.3 Step 3: Set up the data port IP a

Page 75 - 4.5.1 Hardware monitor

34 Figure 3.2.1.4 Step 4: Set up the RAID level and volume size and click “Next”. Figure 3.2.1.5 Step 5: Check all items, and click “Finish”.

Page 76 - 4.5.2 UPS

35 Figure 3.2.1.6 Step 6: Done. 3.2.2 Volume creation wizard “Volume create wizard” has a smarter policy. When the system is inserted with some

Page 77 -  UPS column description:

36 Figure 3.2.2.1 Step 2: Please select the combination of the RG capacity, or “Use default algorithm” for maximum RG capacity. After RG size is c

Page 78 - 4.5.4 Hard drive S.M.A.R.T

37Step 3: Decide VD size. User can enter a number less or equal to the default number. Then click “Next”. Figure 3.2.2.3 Step 4: Confirmation pag

Page 79 - 4.6 System maintenance

38Chapter 4 Configuration 4.1 Web UI management interface hierarchy The below table is the hierarchy of web GUI. System configuration System

Page 80 - 4.6.2 Event log

39Maintenance System information  System information Event log  Download / Mute / Clear Upgrade  Browse the firmware to upgrade Firmware s

Page 81

44.4.1 Physical disk...544.4.2 RAID group

Page 82 - 4.6.3 Upgrade

40 Figure 4.2.1.1 Check “Change date and time” to set up the current date, time, and time zone before using or synchronize time from NTP (Network T

Page 83 - 4.6.6 Import and export

41 Figure 4.2.2.1 4.2.3 Login setting “Login setting” can set single admin, auto logout time and admin / user password. The single admin is to

Page 84 - 4.7 Home/Logout/Mute

42 Figure 4.2.3.1 Check “Change admin password” or “Change user password” to change admin or user password. The maximum length of password is 12 ch

Page 85 - 4.7.3 Mute

43 Figure 4.2.4.1 4.2.5 Notification setting “Notification setting” can set up SNMP trap for alerting via SNMP, pop-up message via Windows messe

Page 86 - 5.1 Volume rebuild

44 Figure 4.2.5.1 “SNMP” allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and defaul

Page 87

45Most UNIX systems build in syslog daemon. “Event log filter” setting can enable event log display on “Pop up events” and “LCM”. 4.3 iSCSI confi

Page 88 - 5.2 RG migration

46 Figure 4.3.1.2  Default gateway: Default gateway can be changed by checking the gray button of LAN port, click “Become default gateway”. There

Page 89 - 5.4 Snapshot

47LACP packets to the peer. The advantages of LACP are (1) increases the bandwidth. (2) failover when link status fails on a port. Trunking / LACP

Page 90 - Figure 5.4.1

48 Figure 4.3.1.5 (Figure 4.3.1.5 shows a user can ping host from the target to make sure the data port connection is well.) 4.3.2 Entity proper

Page 91 - 5.4.2 Auto snapshot

49 Figure 4.3.3.1  CHAP: CHAP is the abbreviation of Challenge Handshake Authentication Protocol. CHAP is a strong authentication method used in

Page 92 - 5.4.3 Rollback

56.2 Event notifications ...125Appendix 133A. Certification list...

Page 93 - 5.4.4 Snapshot constraint

50 Figure 4.3.3.3 5. Go to “/ iSCSI configuration / CHAP account” page to create CHAP account. Please refer to next section for more detail. 6. C

Page 94

51  Rename alias: User can create an alias to one device node. 1. Check the gray button of “OP.” column next to one device node. 2. Select “Ren

Page 95 - 5.6 VD clone

528. DataSeginOrder(Data Sequence in Order) 9. DataPDUInOrder(Data PDU in Order) 10. Detail of Authentication status and Source IP: port number.

Page 96 - Figure 5.6.3

53 Figure 4.3.5.1 3. Click “OK”. Figure 4.3.5.2 4. Click “Delete” to delete CHAP account. 4.4 Volume configuration “Volume configuration” i

Page 97 - Figure 5.6.6

54 4.4.1 Physical disk “Physical disk” can view the status of hard drives in the system. The followings are operational steps: 1. Check the gray

Page 98 - Figure 5.6.8

55Figure 4.4.1.3 (Figure 4.4.1.3: Physical disks in slot 1,2,3 are created for a RG named “RG-R5”. Slot 4 is set as dedicated spare disk of the RG

Page 99 - Figure 5.6.11

56 “Failed”  the hard drive is failed.  “Error Alert”  S.M.A.R.T. error alert.  “Read Errors”  the hard drive has unrecoverable read errors

Page 100 - Figure 5.6.14

57Set Dedicated spares Set a hard drive to dedicated spare of the selected RG. Upgrade Upgrade hard drive firmware. Disk Scrub Scrub the hard driv

Page 101 - Figure 5.6.15

58Step 2: Confirm page. Click “OK” if all setups are correct. Figure 4.4.2.2 (Figure 4.4.2.2: There is a RAID 0 with 4 physical disks, named “RG

Page 102 - Figure 5.6.16

59Health The health of RAID group:  “Good”  the RAID group is good.  “Failed”  the RAID group fails.  “Degraded”  the RAID group is not h

Page 103 - 5.7 SAS JBOD expansion

6Chapter 1 Overview 1.1 Features D-LINK DSN-6000 series IP SAN storage provides non-stop service with a high degree of fault tolerance by using D

Page 104 - Figure 5.7.1.2

60property Write cache:  “Enabled”  Enable disk write cache. (Default)  “Disabled”  Disable disk write cache. Standby:  “Disabled”  Disabl

Page 105

61 Figure 4.4.3.1 Caution If shutdown or reboot the system when creating VD, the erase process will stop. Step 2: Confirm page. Click “OK” if a

Page 106 - 5.8 MPIO and MC/S

62  VD column description: The button includes the functions which can be executed. Name Virtual disk name. Size (GB) (MB) Total capacity of th

Page 107 - Figure 5.8.2

63Clone The target name of virtual disk. Schedule The clone schedule of virtual disk: Health The health of virtual disk:  “Optimal”  the virtu

Page 108 - 5.9 Trunking and LACP

64/ … / 100. Delete Delete the virtual disk. Set property Change the VD name, right, priority, bg rate and read ahead. Right:  “WT”  Write Thro

Page 109 - 5.10.1 Perform I/O

65Stop clone Stop clone function. Schedule clone Set clone function by schedule. Set snapshot space Set snapshot space for taking snapshot. Please

Page 110 - 5.10.2 Ownership

66 Figure 4.4.4.2 (Figure 4.4.4.2: “VD-01” snapshot space has been created, snapshot space is 15GB, and used 1GB for saving snapshot index.) Step

Page 111 - 5.10.3 Controller status

67Step 5: Attach a LUN to a snapshot VD. Please refer to the next section for attaching a LUN. Step 6: Done. Snapshot VD can be used.  Snapshot

Page 112 - 5.11 Replication

68Delete Delete the snapshot VD. Attach Attach a LUN. Detach Detach a LUN. List LUN List attached LUN(s). 4.4.5 Logical unit “Logical unit”

Page 113 - Figure 5.11.3

69  LUN operation description: Attach Attach a logical unit number to a virtual disk. Detach Detach a logical unit number from a virtual disk.

Page 114 - Figure 5.11.6

7 D-LINK DSN-6410/6420 feature highlights Host Interface 4 x 10GbE iSCSI ports (DSN-6420) 2 x 10GbE iSCSI ports (DSN-6410) Drive Interface 12 x SA

Page 115 - Figure 5.11.8

70 Figure 4.4.6.1 1. Select “/ Volume configuration / RAID group”. 2. Click “Create“. 3. Input a RG Name, choose a RAID level from the list, cli

Page 116 - Figure 5.11.11

71 Figure 4.4.6.3 1. Select “/ Volume configuration / Virtual disk”. 2. Click “Create”. 3. Input a VD name, choose a RG Name and enter a size fo

Page 117 - Figure 5.11.14

72 Figure 4.4.6.5 1. Select a VD. 2. Input “Host” IQN, which is an iSCSI node name for access control, or fill-in wildcard “*”, which means every

Page 118 - Figure 5.11.16

73 Figure 4.4.6.7 (Figure 4.4.6.7: Slot 4 is set as a global spare disk.) Step 5: Done. Delete VDs, RG, please follow the below steps. Step 6:

Page 119 - Figure 5.11.19

74 To delete a RAID group, please follow the procedures: 1. Select “/ Volume configuration / RAID group”. 2. Select a RG which all its VD are del

Page 120 - Figure 5.11.20

754.5.1 Hardware monitor “Hardware monitor” can view the information of current voltages and temperatures. Figure 4.5.1.1

Page 121 - Figure 5.11.22

76 If “Auto shutdown” is checked, the system will shutdown automatically when voltage or temperature is out of the normal range. For better data pro

Page 122 - 5.12 VLAN

77 Figure 4.5.2.2 (Figure 4.5.2.2: With Smart-UPS.)  UPS column description: UPS Type Select UPS Type. Choose Smart-UPS for APC, None for othe

Page 123 - Figure 5.12.4

78Battery Level (%) Current power percentage of battery level. 4.5.3 SES SES represents SCSI Enclosure Services, one of the enclosure management

Page 124 - Figure 5.12.5

79 Figure 4.5.4.1 (SAS drives & SATA drives) 4.6 System maintenance “Maintenance” allows the operations of system functions which include “S

Page 125 - Chapter 6 Troubleshooting

8RAID is the abbreviation of “Redundant Array of Independent Disks”. The basic idea of RAID is to combine multiple drives together to form one large

Page 126 - EMS events

80 Status description: Normal Dual controllers are in normal stage. Degraded One controller fails or has been plugged out. Lockdown The firmwar

Page 127 - LVM events

81 The event log is displayed in reverse order which means the latest event log is on the first / top page. The event logs are actually saved in the

Page 128

82 4.6.3 Upgrade “Upgrade” can upgrade controller firmware, JBOD firmware, change operation mode, and activate Replication license. Figure 4.6.3

Page 129 - JBOD events

83master ones no matter what the firmware version of slave controller is newer or older than master. In normal status, the firmware versions in cont

Page 130

84 1. Import: Import all system configurations excluding volume configuration. 2. Export: Export all configurations to a file. Caution “Import”

Page 131 - Clone events

85For security reason, please use “Logout” to exit the web UI. To re-login the system, please enter username and password again. 4.7.3 Mute Clic

Page 132 - Replication events

86Chapter 5 Advanced operations 5.1 Volume rebuild If one physical disk of the RG which is set as protected RAID level (e.g.: RAID 3, RAID 5, or

Page 133 - Appendix

87 Rebuild operation description: RAID 0 Disk striping. No protection for data. RG fails if any hard drive fails or unplugs. RAID 1 Disk mirrori

Page 134

885.2 RG migration To migrate the RAID level, please follow below procedures. 1. Select “/ Volume configuration / RAID group”. 2. Check the gra

Page 135 - SATA 2.5”

89 5.3 VD extension To extend VD size, please follow the procedures. 1. Select “/ Volume configuration / Virtual disk”. 2. Check the gray butto

Page 136 - B. Microsoft iSCSI initiator

9in cache and actual writing to non-volatile media occurs at a later time. It speeds up system write performance but needs to bear the risk where da

Page 137 -  MPIO

90any unfortunate reason it might be (e.g. virus attack, data corruption, human errors and so on). Snap VD is allocated within the same RG in which

Page 138 - 8. Click “OK”

91 Figure 5.4.1.1 7. Check the gray button next to the Snapshot VD number; click “Expose”. Enter a capacity for snapshot VD. If size is zero, the

Page 139 -  MC/S

92 Figure 5.4.2.1 (Figure 5.4.2.1: It will take snapshots every month, and keep the last 32 snapshot copies.) Tips Daily snapshot will be taken a

Page 140

93 5.4.4 Snapshot constraint D-LINK snapshot function applies Copy-on-Write technique on UDV/VD and provides a quick and efficient backup methodo

Page 141 - Figure B.14

94 On Linux and UNIX platform, a command named sync can be used to make the operating system flush data from write caching into disk. For Windows pl

Page 142

95When a snapshot has been rollbacked, the other snapshots which are earlier than it will also be removed. But the rest snapshots will be kept after

Page 143

96 Figure 5.6.1 2. Create two virtual disks (VD) “SourceVD_R5” and “TargetVD_R6”. The raid type of backup target needs to be set as “BACKUP”. Fi

Page 144 - Click Ok

97 Figure 5.6.4  Snapshot space: Figure 5.6.5 This setting is the ratio of source VD and snapshot space. The default ratio is 2 to 1. It mean

Page 145

98  Restart the task an hour later if failed: (The setting will be effective after enabling schedule clone) Figure 5.6.7 When running out of sn

Page 146

99 Figure 5.6.9 7. Now, the clone target “TargetVD_R6” has been set. Figure 5.6.10 8. Click “Start clone”, the clone process will start. Fig

Commentaires sur ces manuels

Pas de commentaire