1 D-Link iSCSI IP SAN storage 10GbE iSCSI to SATA II / SAS RAID IP SAN storage DSN-6410 & DSN-6420 User Manual Version 1.
10MTU Maximum Transmission Unit. CHAP Challenge Handshake Authentication Protocol. An optional security mechanism to control access to an iSCSI s
100 Figure 5.6.12 10. After initiating the snapshot space, it will start cloning. Figure 5.6.13 11. Click “Schedule clone” to set up the clone
101 Figure 5.6.15 Run out of snapshot space while VD clone While the clone is processing, the increment data of this VD is over the snapshot sp
102 Figure 5.6.16
103 5.7 SAS JBOD expansion 5.7.1 Connecting JBOD D-LINK controller suports SAS JBOD expansion to connect extra SAS dual JBOD controller. When co
104 Figure 5.7.1.2 Figure 5.7.1.3 “/ Enclosure management / S.M.A.R.T.” can display S.M.A.R.T. information of all PDs, including Local and all SA
105SAS JBOD expansion has some constraints as described in the followings: 1 User could create RAID group among multiple chassis, max number of di
106 5.8 MPIO and MC/S These features come from iSCSi initiator. They can be setup from iSCSI initiator to establish redundant paths for sending I/
107 Figure 5.8.2 Difference: MC/S is implemented on iSCSI level, while MPIO is implemented on the higher level. Hence, all MPIO infrastructures ar
1085.9 Trunking and LACP Link aggregation is the technique of taking several distinct Ethernet links to let them appear as a single link. It has a
109 Figure 5.9.2 Caution Before using trunking or LACP, he gigabit switch must support trunking or LACP and enabled. Otherwise, host can not conne
11four hard drives. RAID 10 Striping over the member RAID 1 volumes. RAID 10 needs at least four hard drives. RAID 30 Striping over the member RAI
110 Figure 5.10.1.1 5.10.2 Ownership When creating RG, it will be assigned with a prefered owner, the default owner is controller 1. To change t
111 Figure 5.10.2.2 (Figure 5.10.2.2: The RG ownership is changed to the other controller.) 5.10.3 Controller status There are four statuses d
1125.11 Replication Replication function will help users to replicate data easily through LAN or WAN from one IP SAN storage to another. The proc
1133. If you want the replication port to be on special VLAN section, you may assign VLAN ID to the replication port. The setting will automaticall
114Figure 5.11.4 Create replication job on the source IP SAN storage 1. If the license key is activated on the IP SAN storage correctly, a new Re
115 Figure 5.11.7 4. The Replication uses standard iSCSI protocol for data replication. User has to log on the iSCSI node to create the iSCSI conn
116 Figure 5.11.9 6. A new replication job is created and listed on the Replication page. Figure 5.11.10 Run the replication job 1. Click t
117 Figure 5.11.12 3. User can monitor the replication job from the “Status” information and the progress is expressed by percentage. Figure 5.1
118 Figure 5.11.15 3. Select the iSCSI node to log on and click “Next”. Figure 5.11.16 4. Choose the same target virtual disk and click “Next”
119 Figure 5.11.17 5. A new target will be added in this replication job as a redundancy path. Figure 5.11.18 Configure the replication job
121.3 iSCSI concepts iSCSI (Internet SCSI) is a protocol which encapsulates SCSI (Small Computer System Interface) commands and data in TCP/IP pack
1202. The replication job can be scheduled to run by hour, by day, by week or by month. The execution time can be configurable per user’s need. If
121 Figure 5.11.21 There are three settings in the Replication configuration menu, Figure 5.11.22 “Snapshot space” specifies the ratio of snapsh
1225.12 VLAN VLAN (Virtual Local Area Network) is a logical grouping mechanism implemented on switch device using software rather than a hardware
123 Figure 5.12.2 4. VLAN ID 66 for LAN2 is set properly. Figure 5.12.3 Assign VLAN ID to LAG(Trunking or LACP) 1. After creating LAG, press
124 Figure 5.12.5 3. If iSCSI ports are assigned with VLAN ID before creating aggregation takes place, aggregation will remove VLAN ID. You need t
125Chapter 6 Troubleshooting 6.1 System buzzer The system buzzer features are listed below: 1. The system buzzer alarms 1 second when system b
126ERROR SATA PRD mem fail Failed to init SATA PRD memory manager ERROR SATA revision id fail Failed to get SATA revision id ERROR SATA set reg
127 RMS events Level Type Description INFO Console Login <username> login from <IP or serial console> via Console UI INFO Con
128ERROR VD move failed Failed to complete move of VD <name>. INFO RG activated RG <name> has been manually activated. INFO RG deac
129INFO VD erase started VD <name> starts erasing process. Snapshot events Level Type Description WARNING Snap mem Failed to allo
13 Hardware iSCSI HBA(s) provide its own initiator tool. Please refer to the vendors’ HBA user manual. Microsoft, Linux, Solaris and Mac provide iSC
130 INFO PD upgrade started JBOD <name> PD [<string>] starts upgrading firmware process. INFO PD upgrade finished JBOD <name>
131 System maintenance events Level Type Description INFO System shutdown System shutdown. INFO System reboot System reboot. INFO Syste
132Level Type Description INFO VD clone started VD <name> starts cloning process. INFO VD clone finished VD <name> finished cl
133Appendix A. Certification list iSCSI Initiator (Software) OS Software/Release Number Microsoft Windows Microsoft iSCSI Software Initiator
134 D-Link All D-Link Managed Gigabit Switches Avago AFBR-703SDZ (10 Gb/s SFP transceiver, 850nm) Finisar FTLX8571D3BCV (10 Gb/s SFP transceive
135Vendor Model Hitachi Deskstar 7K250, HDS722580VLSA80, 80GB, 7200RPM, SATA, 8M Hitachi Deskstar E7K500, HDS725050KLA360, 500GB, 7200RPM, SATA
136Vendor Model Seagate Constellation, ST9500530NS, 500GB, 7200RPM, SATA 3.0Gb/s, 32M (F/W: SN02) B. Microsoft iSCSI initiator Here is the step
137 Figure B.2 Figure B.3 4. It can connect to an iSCSI disk now. MPIO 5. If run
138 Figure B.4 Figure B.5 8. Click “OK”. Figure B.6
139 9. Click “Targets” tab, select the second path, and then click “Connect”. 10. Enable “Enable multi-path” checkbox. Then click “OK”. 11. Done,
14 The management port can be transferred smoothly to the other controller with the same IP address 6. Online firmware upgrade, no system down ti
140 Figure B.10 Figure B.11 17. Select Initiator IP and Target portal IP, and then cli
141 Disconnect 21. Select the target name, click “Disconnect”, and then click “Yes”. Figure B.14 22. Done, the iSCSI device disconnect succes
142C. From single controller to dual controllers This SOP applies to upgrading from DSN-6110 to DSN-6120 as well as from DSN-6410 to DSN-6420. Befo
143Please follow the steps below to upgrade to dual controller mode. Step 1 Go to “Maintenance\System”. Copy the IP SAN storage serial number. St
144Step 3 Click “confirm”. The system will ask you to shutdown. Please shutdown IP SAN storage. Click Ok.
145 Go to “Maintenance\Reboot and shutdown”. Click “Shutdown” to shutdown the system. Click Ok.
146Step 4 Power off DSN-6110 or DSN-6410. Insert the second controller to the IP SAN storage. And then power on the system. The IP SAN storage shoul
155. Instant volume configuration restoration 6. Smart faulty sector relocation 7. Hot pluggable battery backup module support Enclosure monit
16 Windows Linux Solaris Mac Drive support 1. SAS 2. SATA II (optional) 3. SCSI-3 compliant 4. Multiple IO transaction processing
17 (EN55022 / EN55024) UL statement FCC statement This device has been shown to be in compliance with and was tested in accordance with the me
18 The ITE is not intended to be installed and used in a home, school or public area accessible to the general population, and the thumbscrews shou
19Chapter 2 Installation 2.1 Package contents The package contains the following items: 1. DSN-6410/6420 IP SAN storage (x1) 2. HDD trays (x12
2Preface Copyright Copyright@2011, D-Link Corporation. All rights reserved. No part of this manual may be reproduced or transmitted without writte
20 The drives can be installed into any slot in the enclosure. Slot numbering will be reflected in web UI. Tips It is advisable to install at leas
212.3.3 Install drives Note : Skip this section if you purchased a solution populated with drives. To install SAS or SATA drives with no Bridge B
22 Figure 2.3.3.3 HDD tray description: HDD power LED: Green HDD is inserted and good. Off No HDD. HDD access LED: Blue b
23 Controller 2. (only on DSN-6420) Controller 1. Power supply unit (PSU1). Fan module (FAN1 / FAN2). Power supply unit (PSU2). Fan modul
24 Figure 2.3.4.3 (DSN-6410 SFP+) Connector, LED and button description: 10GbE ports (x2). Link LED: Orange Asserted when a 1G link
25 BBM Status Button: When the system power is off, press the BBM status button, if the BBM LED is Green, then the BBM still has power to keep d
262.5 Deployment Please refer to the following topology and have all the connections ready. Figure 2.5.1 (DSN-6420) Figure 2.5.2 (DSN-6410)
272. In addition, installing an iSNS server is recommended for dual controller system. 3. Power on DSN-6420/6410 and DSN-6020 (optional) first, an
28 Figure 2.5.4 1. Using RS-232 cable for console (back color, phone jack to DB9 female) to connect from controller to management PC directly. 2.
29Chapter 3 Quick setup 3.1 Management interfaces There are three management methods to manage D-LINK IP SAN storage, describe in the following:
3Table of Contents Chapter 1 Overview...61.1 Features...
30 3.1.3 Web UI D-LINK IP SAN storage supports graphic user interface (GUI) to operate. Be sure to connect the LAN cable. The default IP setting i
31 Indicator description: RAID light: Green RAID works well. Red RAID fails. Temperature light: Green Temperature is normal.
32 Mute alarm beeper. Tips If the status indicators in Internet Explorer (IE) are displayed in gray, but not in blinking red, please enable “Inter
33 Figure 3.2.1.2 Step2: Confirm the management port IP address and DNS, and then click “Next”. Figure 3.2.1.3 Step 3: Set up the data port IP a
34 Figure 3.2.1.4 Step 4: Set up the RAID level and volume size and click “Next”. Figure 3.2.1.5 Step 5: Check all items, and click “Finish”.
35 Figure 3.2.1.6 Step 6: Done. 3.2.2 Volume creation wizard “Volume create wizard” has a smarter policy. When the system is inserted with some
36 Figure 3.2.2.1 Step 2: Please select the combination of the RG capacity, or “Use default algorithm” for maximum RG capacity. After RG size is c
37Step 3: Decide VD size. User can enter a number less or equal to the default number. Then click “Next”. Figure 3.2.2.3 Step 4: Confirmation pag
38Chapter 4 Configuration 4.1 Web UI management interface hierarchy The below table is the hierarchy of web GUI. System configuration System
39Maintenance System information System information Event log Download / Mute / Clear Upgrade Browse the firmware to upgrade Firmware s
44.4.1 Physical disk...544.4.2 RAID group
40 Figure 4.2.1.1 Check “Change date and time” to set up the current date, time, and time zone before using or synchronize time from NTP (Network T
41 Figure 4.2.2.1 4.2.3 Login setting “Login setting” can set single admin, auto logout time and admin / user password. The single admin is to
42 Figure 4.2.3.1 Check “Change admin password” or “Change user password” to change admin or user password. The maximum length of password is 12 ch
43 Figure 4.2.4.1 4.2.5 Notification setting “Notification setting” can set up SNMP trap for alerting via SNMP, pop-up message via Windows messe
44 Figure 4.2.5.1 “SNMP” allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and defaul
45Most UNIX systems build in syslog daemon. “Event log filter” setting can enable event log display on “Pop up events” and “LCM”. 4.3 iSCSI confi
46 Figure 4.3.1.2 Default gateway: Default gateway can be changed by checking the gray button of LAN port, click “Become default gateway”. There
47LACP packets to the peer. The advantages of LACP are (1) increases the bandwidth. (2) failover when link status fails on a port. Trunking / LACP
48 Figure 4.3.1.5 (Figure 4.3.1.5 shows a user can ping host from the target to make sure the data port connection is well.) 4.3.2 Entity proper
49 Figure 4.3.3.1 CHAP: CHAP is the abbreviation of Challenge Handshake Authentication Protocol. CHAP is a strong authentication method used in
56.2 Event notifications ...125Appendix 133A. Certification list...
50 Figure 4.3.3.3 5. Go to “/ iSCSI configuration / CHAP account” page to create CHAP account. Please refer to next section for more detail. 6. C
51 Rename alias: User can create an alias to one device node. 1. Check the gray button of “OP.” column next to one device node. 2. Select “Ren
528. DataSeginOrder(Data Sequence in Order) 9. DataPDUInOrder(Data PDU in Order) 10. Detail of Authentication status and Source IP: port number.
53 Figure 4.3.5.1 3. Click “OK”. Figure 4.3.5.2 4. Click “Delete” to delete CHAP account. 4.4 Volume configuration “Volume configuration” i
54 4.4.1 Physical disk “Physical disk” can view the status of hard drives in the system. The followings are operational steps: 1. Check the gray
55Figure 4.4.1.3 (Figure 4.4.1.3: Physical disks in slot 1,2,3 are created for a RG named “RG-R5”. Slot 4 is set as dedicated spare disk of the RG
56 “Failed” the hard drive is failed. “Error Alert” S.M.A.R.T. error alert. “Read Errors” the hard drive has unrecoverable read errors
57Set Dedicated spares Set a hard drive to dedicated spare of the selected RG. Upgrade Upgrade hard drive firmware. Disk Scrub Scrub the hard driv
58Step 2: Confirm page. Click “OK” if all setups are correct. Figure 4.4.2.2 (Figure 4.4.2.2: There is a RAID 0 with 4 physical disks, named “RG
59Health The health of RAID group: “Good” the RAID group is good. “Failed” the RAID group fails. “Degraded” the RAID group is not h
6Chapter 1 Overview 1.1 Features D-LINK DSN-6000 series IP SAN storage provides non-stop service with a high degree of fault tolerance by using D
60property Write cache: “Enabled” Enable disk write cache. (Default) “Disabled” Disable disk write cache. Standby: “Disabled” Disabl
61 Figure 4.4.3.1 Caution If shutdown or reboot the system when creating VD, the erase process will stop. Step 2: Confirm page. Click “OK” if a
62 VD column description: The button includes the functions which can be executed. Name Virtual disk name. Size (GB) (MB) Total capacity of th
63Clone The target name of virtual disk. Schedule The clone schedule of virtual disk: Health The health of virtual disk: “Optimal” the virtu
64/ … / 100. Delete Delete the virtual disk. Set property Change the VD name, right, priority, bg rate and read ahead. Right: “WT” Write Thro
65Stop clone Stop clone function. Schedule clone Set clone function by schedule. Set snapshot space Set snapshot space for taking snapshot. Please
66 Figure 4.4.4.2 (Figure 4.4.4.2: “VD-01” snapshot space has been created, snapshot space is 15GB, and used 1GB for saving snapshot index.) Step
67Step 5: Attach a LUN to a snapshot VD. Please refer to the next section for attaching a LUN. Step 6: Done. Snapshot VD can be used. Snapshot
68Delete Delete the snapshot VD. Attach Attach a LUN. Detach Detach a LUN. List LUN List attached LUN(s). 4.4.5 Logical unit “Logical unit”
69 LUN operation description: Attach Attach a logical unit number to a virtual disk. Detach Detach a logical unit number from a virtual disk.
7 D-LINK DSN-6410/6420 feature highlights Host Interface 4 x 10GbE iSCSI ports (DSN-6420) 2 x 10GbE iSCSI ports (DSN-6410) Drive Interface 12 x SA
70 Figure 4.4.6.1 1. Select “/ Volume configuration / RAID group”. 2. Click “Create“. 3. Input a RG Name, choose a RAID level from the list, cli
71 Figure 4.4.6.3 1. Select “/ Volume configuration / Virtual disk”. 2. Click “Create”. 3. Input a VD name, choose a RG Name and enter a size fo
72 Figure 4.4.6.5 1. Select a VD. 2. Input “Host” IQN, which is an iSCSI node name for access control, or fill-in wildcard “*”, which means every
73 Figure 4.4.6.7 (Figure 4.4.6.7: Slot 4 is set as a global spare disk.) Step 5: Done. Delete VDs, RG, please follow the below steps. Step 6:
74 To delete a RAID group, please follow the procedures: 1. Select “/ Volume configuration / RAID group”. 2. Select a RG which all its VD are del
754.5.1 Hardware monitor “Hardware monitor” can view the information of current voltages and temperatures. Figure 4.5.1.1
76 If “Auto shutdown” is checked, the system will shutdown automatically when voltage or temperature is out of the normal range. For better data pro
77 Figure 4.5.2.2 (Figure 4.5.2.2: With Smart-UPS.) UPS column description: UPS Type Select UPS Type. Choose Smart-UPS for APC, None for othe
78Battery Level (%) Current power percentage of battery level. 4.5.3 SES SES represents SCSI Enclosure Services, one of the enclosure management
79 Figure 4.5.4.1 (SAS drives & SATA drives) 4.6 System maintenance “Maintenance” allows the operations of system functions which include “S
8RAID is the abbreviation of “Redundant Array of Independent Disks”. The basic idea of RAID is to combine multiple drives together to form one large
80 Status description: Normal Dual controllers are in normal stage. Degraded One controller fails or has been plugged out. Lockdown The firmwar
81 The event log is displayed in reverse order which means the latest event log is on the first / top page. The event logs are actually saved in the
82 4.6.3 Upgrade “Upgrade” can upgrade controller firmware, JBOD firmware, change operation mode, and activate Replication license. Figure 4.6.3
83master ones no matter what the firmware version of slave controller is newer or older than master. In normal status, the firmware versions in cont
84 1. Import: Import all system configurations excluding volume configuration. 2. Export: Export all configurations to a file. Caution “Import”
85For security reason, please use “Logout” to exit the web UI. To re-login the system, please enter username and password again. 4.7.3 Mute Clic
86Chapter 5 Advanced operations 5.1 Volume rebuild If one physical disk of the RG which is set as protected RAID level (e.g.: RAID 3, RAID 5, or
87 Rebuild operation description: RAID 0 Disk striping. No protection for data. RG fails if any hard drive fails or unplugs. RAID 1 Disk mirrori
885.2 RG migration To migrate the RAID level, please follow below procedures. 1. Select “/ Volume configuration / RAID group”. 2. Check the gra
89 5.3 VD extension To extend VD size, please follow the procedures. 1. Select “/ Volume configuration / Virtual disk”. 2. Check the gray butto
9in cache and actual writing to non-volatile media occurs at a later time. It speeds up system write performance but needs to bear the risk where da
90any unfortunate reason it might be (e.g. virus attack, data corruption, human errors and so on). Snap VD is allocated within the same RG in which
91 Figure 5.4.1.1 7. Check the gray button next to the Snapshot VD number; click “Expose”. Enter a capacity for snapshot VD. If size is zero, the
92 Figure 5.4.2.1 (Figure 5.4.2.1: It will take snapshots every month, and keep the last 32 snapshot copies.) Tips Daily snapshot will be taken a
93 5.4.4 Snapshot constraint D-LINK snapshot function applies Copy-on-Write technique on UDV/VD and provides a quick and efficient backup methodo
94 On Linux and UNIX platform, a command named sync can be used to make the operating system flush data from write caching into disk. For Windows pl
95When a snapshot has been rollbacked, the other snapshots which are earlier than it will also be removed. But the rest snapshots will be kept after
96 Figure 5.6.1 2. Create two virtual disks (VD) “SourceVD_R5” and “TargetVD_R6”. The raid type of backup target needs to be set as “BACKUP”. Fi
97 Figure 5.6.4 Snapshot space: Figure 5.6.5 This setting is the ratio of source VD and snapshot space. The default ratio is 2 to 1. It mean
98 Restart the task an hour later if failed: (The setting will be effective after enabling schedule clone) Figure 5.6.7 When running out of sn
99 Figure 5.6.9 7. Now, the clone target “TargetVD_R6” has been set. Figure 5.6.10 8. Click “Start clone”, the clone process will start. Fig
Commentaires sur ces manuels