Thecus N4310 en
Thecus N4310 en
Thecus N4310 en
N4310 Series
v1.0
Copyright and Trademark Notice
Thecus and other names of Thecus products are registered trademarks of Thecus Technology Corp.
Microsoft, Windows, and the Windows logo are registered trademarks of Microsoft Corporation.
Apple, iTunes and Apple OS X are registered trademarks of Apple Computers, Inc. All other
trademarks and brand names are the property of their respective owners. Specifications are subject
to change without notice.
Copyright © 2014 Thecus Technology Corporation. All rights reserved.
Limited Warranty
Thecus Technology Corporation guarantees all components of Thecus NAS products are thoroughly
tested before they leave the factory and should function normally under general usage. In case of
any system malfunctions, Thecus Technology Corporation and its local representatives and dealers
are responsible for repair without cost to the customer if the product fails within the warranty period
and under normal usage. Thecus Technology Corporation is not responsible for any damage or loss
of data deemed to be caused by its products. It is highly recommended that users conduct neces-
sary back-up practices.
Check the functions that are available on your particular Thecus NAS model at:
http://www.thecus.com.
For your safety, please read and follow the following safety warnings:
¾¾ Read this manual thoroughly before attempting to set up your Thecus IP storage.
¾¾ Your ���������������������������������������������������������������������������
Thecus IP storage����������������������������������������������������������
is a complicated electronic device. DO NOT attempt to re�
pair it under any circ umstances. In the case of malfunction, turn off the power im�
mediately and have it repaired at a qualified service center. Contact your vendor for
details.
¾¾ DO NOT allow anything to rest on the power cord and DO NOT place the power
cord in an area where it can be stepped on. Carefully place connecting cables to
avoid stepping or tripping on them.
¾¾ Your Thecus IP storage can operate normally under temperatures between 5°C and
40°C, with relative humidity of 20% – 85%. Using Thecus IP storage under extreme
environmental conditions could damage the unit.
¾¾ Ensure that the Thecus IP storage is provided with the correct supply voltage (AC
100V ~ 240V, 50/60 Hz, 3A). Plugging the Thecus IP storage to an incorrect power
source could damage the unit.
¾¾ DO NOT use chemicals or aerosols to clean Thecus IP storage. Unplug the power
cord and all connected cables before cleaning.
¾¾ DO NOT place any objects on the Thecus IP storage or obstruct its ventilation slots
to avoid overheating the unit.
iv Table of Contents
3.3.13 Power Management.................................................................................................. 24
3.3.14 File System Check...................................................................................................... 24
3.3.15 Wake-Up On LAN (WOL).......................................................................................... 26
3.3.16 SNMP Support ............................................................................................................ 26
3.3.17 UI Login Function....................................................................................................... 27
3.3.18 Networking.................................................................................................................. 27
3.3.19 Dual Power .................................................................................................................. 28
3.4 Storage Management.....................................................................29
3.4.1 Disks Information......................................................................................................... 29
3.4.2 RAID Management....................................................................................................... 31
3.4.3 NAS Stacking ................................................................................................................. 41
3.4.4 ISO Image Mounting .................................................................................................. 47
3.4.5 iSCSI ................................................................................................................................. 49
3.5 File Sharing/Privilege.......................................................................57
3.5.1 ADS Support ................................................................................................................. 57
3.5.2 Local User Configuration............................................................................................ 58
3.5.3 Local Group Configuration........................................................................................ 60
3.5.4 Batch Input..................................................................................................................... 61
3.5.5 Shared Folder................................................................................................................. 62
3.5.6 User Quota...................................................................................................................... 67
3.5.7 User and Group Backup.............................................................................................. 68
3.5.8 LDAP Support ............................................................................................................... 69
3.6 Network Service...............................................................................70
3.6.1 Samba / CIFS................................................................................................................. 70
3.6.2 AFP (Apple Network Setup)...................................................................................... 72
3.6.3 NFS Setup........................................................................................................................ 72
3.6.4 FTP .................................................................................................................................... 73
3.6.5 TFTP .................................................................................................................................. 73
3.6.6 WebService .................................................................................................................... 74
3.6.7 UPnP Service.................................................................................................................. 75
3.6.8 Bonjour Setting............................................................................................................. 75
3.6.9 SSH.................................................................................................................................... 75
3.6.10 DDNS.............................................................................................................................. 76
3.6.11 UPnP Port Management.......................................................................................... 77
3.6.12 WebDAV......................................................................................................................... 78
3.6.13 Auto Thumbnail.......................................................................................................... 78
Table of Contents v
3.6.14 ThecusID........................................................................................................................ 79
3.7 Application Server...........................................................................82
3.7.1 iTunes® Server (Built in)............................................................................................... 82
3.7.2 Add-on Official Applications..................................................................................... 82
3.7.3 3rd party App Installation.......................................................................................... 82
3.7.4 Official NAS Application............................................................................................. 83
3.8 Backup..............................................................................................84
3.8.1 Rsync Target Server...................................................................................................... 84
3.8.2 Data Guard (Remote Backup)................................................................................... 84
3.8.3 Data Guard (Local Backup)........................................................................................ 96
3.8.4 ACL Backup and Restore............................................................................................ 110
3.8.5 Data Burn........................................................................................................................ 112
3.9 External Devices...............................................................................115
3.9.1 Printers............................................................................................................................. 115
3.9.2 Uninterrupted Power Source.................................................................................... 120
Appendix A: Customer Support...................................................121
Appendix B: RAID Basics..............................................................122
Appendix C: Active Directory Basics...........................................124
Appendix D: Licensing Information.............................................125
vi Table of Contents
§Chapter 1: Introduction
1111 Overview
Thank you for choosing the Thecus IP Storage Server. The Thecus IP storage is an easy-to-use storage
server that allows a dedicated approach to storing and distributing data on a network. Data reliabil-
ity is ensured with RAID features that provide data security and recovery—over multiple Terabyte of
storage are available using RAID 5 and RAID 6. Gigabit Ethernet ports enhance network efficiency, al-
lowing Thecus���������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������
IP
��������������������������������������������������������������������������������������
storage����������������������������������������������������������������������������
to take over file management functions, increase application and data shar-
ing and provide faster data response. The Thecus IP storage offers data mobility with a disk roaming
feature that lets you swap working hard drives for use in other�������������������������������������
Thecus IP storage�������������������
, securing the con-
tinuity of data in the event of hardware failure. The Thecus IP storage allows data consolidation and
sharing between Windows (SMB/CIFS), UNIX/Linux, and Apple OS X environments. The Thecus IP
storage’s user-friendly GUI supports multiple Languages.
Please check to see if your package is complete. If you find that some items are missing, contact your
dealer.
Front Panel
Item Description
Solid blue: System ready
1. Power LED Blinking blue: Power on process
Solid Red: System with error occurred
Blinking white: Diagnostic mode kick-in
2. System status LED Solid white: Diagnostic completed
Solid Red: System with error occurred
Blinking white: HDD activity
3. HDD1~HDD4 LED
Red: HDD failure
Solid white: LAN Cable link
4. LAN LED
Blinking : Network activity
Solid white: Installed
5. USB LED Blinking white: USB copy activity
Solid Red: USB copy failure
6. USB Copy Button Copies USB storage contents to N4310.
7. Power Button Power the N4310 on/off.
8. HDD Trays HDD Trays for 4 2.5"/3.5" SATA HDDs with Hot-swappable supports.
Back Panel
Item Description
1. USB 3.0 Port USB 3.0 port for compatible USB devices, such as digital cameras, USB disks, and USB printers.
2. USB 3.0 Port USB 3.0 port for compatible USB devices, such as digital cameras, USB disks, and USB printers.
2. LAN Port LAN port for connecting to an Ethernet network through a switch or a router.
4. Reset Button Resets the N4310.
Pressing and holding the Reset button on the back for 5 seconds will reset your network
setting and password, and turn off Jumbo Frame Support.
5. Power Connector Connect the included power cords to this connector.
6. System Fan System fan that exhausts heat from the unit.
Chapter 1: Introduction ix
§Chapter 2: Hardware Installation
2222 Overview
Your Thecus IP storage is designed for easy installation. To help you get started, the following chapter
will help you quickly get your Thecus IP storage up and running. Please read it carefully to prevent
damaging your unit during installation.
222 Connect the provided power cord into the universal power socket on the back panel. Plug
the other end of the cord into a surge protector socket.
222 Login to the system using the administrator user name and password. The factory defaults
are:
User Name: admin
Password: admin
Once you are logged in as an administrator, the disclaimer page will appear as below. Please
click the check box if you do not want to have this page displayed during the next login.
Following the disclaimer page, you will see the Web Administration Interface. From here, you
can configure and monitor virtually every aspect of the Thecus IP storage from anywhere on
the network.
Administrators can add or remove add shortcut functions to My Favorites by right clicking the
mouse on the item.
Control Panel
Item Description
System Management Current system status of the Thecus IP storage.
Storage Information and settings for storage devices installed into the Thecus IP storage.
File Sharing / Privilege Allows configuration of users and groups.
Network Service To setup varies protocols which has supported by system
Application Server Application based program for system build-in, additional installed from official or 3rd party.
Backup Category of Backup Features setup of the Thecus IP storage.
External Devices Setting for devices where has installed through external interface such as USB
In the following sections, you will find detailed explanations of each function, and how to configure
your Thecus IP storage.
Message Bar
Item Status Description
Display the status of created RAID volume. Click to go to RAID Management page as
RAID Management
short cut.
Display the status of disks installed in the system. Click to go to Disk information
Disks Information
page as short cut.
333333 Logout
Click to logout Web Administration Interface.
333333 General
Once you login, you will first see the basic system Information screen providing Manufacturer,
Product No., Firmware Version, and System Up Time information.
General
Item Description
Manufacturer Displays the name of the system manufacturer.
Product No. Shows the model number of the system.
Firmware version Shows the current firmware version.
Up time Displays the total run time of the system.
333333 Logs
From the System Management category, choose the System Logs item and the System Logs screen
will appear. This screen shows a history of system usage and important events such as disk status,
network information, and system booting.
Export log option This can be set to Auto Export or Auto Delete.
The default logs displayed are for system events. From the dropdown list, administrators can
Log Type choose from various forms of user access, such as AFP, Samba, etc.
Note: Users need to enable the “User Access Log” service to view these details.
ALL: Provides all log information including system, warning, and error messages.
Log Level INFO: Shows information about system messages.
WARN: Shows only warning messages.
ERROR: Shows only error messages.
Export Records Export all logs to an external file.
The number of lines per page Specify the desired number of lines to display per page.
|<< < > >>| Use the forward ( > >>| ) and backward ( |<< < ) buttons to browse through the log pages.
Reload logs.
Columns can also be added to display additional information about each event.
The User Access Log Support section allows administrators to select the desired protocols to record
user activity for.
User Access Log
User Access Log
Item Description
User access log Enable or disable the User Access Log service.
Folder Select from the dropdown list where to store the user access log.
Service Select from the check box which access details to record.
Apply Click Apply to save changes.
Description The user access list will record different activities depending on which
protocol is selected.1. AFP: User login and logout.
2. FTP: User file deletion, uploads/downloads, folder creation, object
renaming, and login and logout.
3. iSCSI (if applicable): User login and logout.
4. Samba: User file deletion, folder creation, folder opening, and ob-
ject reading, renaming, and writing.
5. SSH (if applicable): User login and logout.
After the User Access Log Support has been set up and the “Apply” button selected, all selected
services will restart.
To view user access details related to the selected service(s), please go to System Log and choose a
service from the “Display” dropdown list.
Once (for example) 10,000 records have been reached, the log file will appear in /NAS_public/
access_log/
To designate a schedule for the Thecus IP storage to turn on and off, first enable the feature by
checking the Enable Scheduled On/Off checkbox.
Then, simply choose an on and off time for each day of the week.
Finally, click Apply to save your changes.
Example - Monday: On: 8:00; Off: 16:00
System will turn on at 8:00 AM on Monday, and off at 16:00 on Monday. System will turn on for the
rest of the week.
If you choose an on time, but do not assign an off time, the system will turn on and remain on until a
scheduled off time is reached, or if the unit is shutdown manually.
Example - Monday: On: 8:00
System will turn on at 8:00 AM on Monday, and will not shut down unless powered down manually.
You may also choose two on times or two off times on a particular day, and the system will act ac-
cordingly.
Example - Monday: Off: 8:00; Off: 16:00
System will turn off at 8:00 AM on Monday. System will turn off at 16:00 PM on Monday, if it was on. If
the system was already off at 16:00 PM on Monday, system will stay off.
Resetting to factory defaults will not erase the data stored in the hard
disks, but WILL revert all the settings to the factory default values
Once the system has rebooted, you will be returned to the File System Check prompt. There you will
see the available RAID volumes to run the file system check. Check the desired RAID volumes and
click Next to proceed with the file system check. Click Reboot to reboot without running the check.
Click Start to begin the file system check. Click Reboot to reboot the system.
When the file system check is running, the system will show 20 lines of information until it is com-
plete. Once complete, the results will be shown at the bottom.
From the System Management category, choose the WOL item, and the Wake-up On LAN screen ap-
pears. From here, you can Enable or Disable.
3333333 Networking
From the System Management category, choose Networking, and the Networking Configuration
screen appears. This screen displays the network parameters of the global setting and available
network connection. You may change any of these items and press Apply to confirm your settings.
See a description of each item in the following table:
When both are connected and operating properly, the Dual Power window will list their status as
“Normal”.
If one of the power adaptors is not installed or abnormal voltage is detected, then the system will list
that input as “Failed”.
Disks Information
Item Description
Disk No. Indicates disk location.
Capacity Shows the SATA hard disk capacity.
Model Displays the SATA hard disk model name.
Firmware Shows the SATA hard disk firmware version.
Bad Block scan Yes to start scan Bad Block.
•• S.M.A.R.T. Information
On the Disk Information screen, select a disk then click on “Smart” to list the S.M.A.R.T. info of the
associated disk.
S.M.A.R.T. Information
Item Description
Tray Number Tray the hard disk is installed in.
Model Model name of the installed hard disk.
Power ON Hours Count of hours in power-on state. The raw value of this attribute shows total count of hours (or min-
utes, or seconds, depending on manufacturer) in power-on state.
Temperature Celsius The current temperature of the hard disk in degrees Celsius.
Reallocated Sector Count Count of reallocated sectors. When the hard drive finds a read/write/verification error, it marks this sec-
tor as "reallocated" and transfers data to a special reserved area (spare area).
This process is also known as remapping and "reallocated" sectors are called remaps. This is why, on a
modern hard disks, you cannot see "bad blocks" while testing the surface - all bad blocks are hidden in
reallocated sectors. However, the more sectors that are reallocated, the more a decrease (up to 10% or
more) can be noticed in disk read/write speeds.
Current Pending Sector Current count of unstable sectors (waiting for remapping). The raw value of this attribute indicates the
total number of sectors waiting for remapping. Later, when some of these sectors are read successfully,
the value is decreased. If errors still occur when reading sectors, the hard drive will try to restore the
data, transfer it to the reserved disk area (spare area), and mark this sector as remapped. If this attribute
value remains at zero, it indicates that the quality of the corresponding surface area is low.
Test Type Set short or long time to test.
Test Result Result of the test.
Test Time Total time of the test.
The bad block scan can be terminated by clicking on “Stop Detect Bad Block”.
RAID Management
Item Description
Master RAID The RAID volume currently designated as the Master RAID volume.
ID ID of the current RAID volume.
NOTE: All RAID IDs must be unique.
RAID Level Shows the current RAID configuration.
Status Indicates status of the RAID. Can read either Healthy, Degraded, or Damaged.
Disks Used Hard disks used to form the current RAID volume.
Total Capacity Total capacity of the current RAID.
Data Capacity Indicates the used capacity and total capacity used by user data.
•• Create a RAID
On the RAID Information screen, press the Create button to go to the RAID Volume Creation screen.
In addition to RAID disk information and status, this screen lets you make RAID configuration set-
tings.
222 On the RAID Configuration screen, set the RAID storage space as JBOD, RAID 0, RAID 1, RAID 5,
RAID 6�����������������������������������������������������������������������������������
or RAID 10������������������������������������������������������������������������
�����������������������������������������������������������������������
(depend����������������������������������������������������������������
s���������������������������������������������������������������
on model)�����������������������������������������������������
— see Appendix B: RAID Basics for a detailed descrip-
tion of each.
Once the Create button has been pressed with the Encryption checkbox enabled, the following
message pop-up will appear for confirmation.
After the RAID volume has been created, you may remove the USB disk until the next time the
system boots. The RAID volume cannot be mounted if the USB disk with the encryption key isn’t
found in any system USB port when the volume is accessed. To activate the encrypted volume, plug
the USB disk containing the encryption key and into any system USB port.
We strongly recommended copying the RAID volume encryption key to a safe place. You can find
the encryption key file from the USB disk in the following format:
(RAID volume created date)_xxxxxx.key
RAID volumes with encryption enabled will be displayed with a key lock symbol next to volume ID
name.
666 Quick RAID — Enabled the quick RAID setting is going to enhance RAID creation time.
We recommend using the “Quick RAID” setting only if the hard disks are
brand new or if no existing partitions are contained.
888 Selected the file system you would like to have for this RAID volume. .
Creating RAID destroys all data in the current RAID volume. The data will
be unrecoverable.
Model
N4310
RAID configuration is usually required only when you first set up the device. A brief description of
each RAID setting follows:
RAID Levels
Level Description
JBOD The storage volume is a single HDD with no RAID support. JBOD requires a minimum of 1 disk.
RAID 0 Provides data striping but no redundancy. Improves performance but not data safety. RAID 0 requires a minimum of
2 disks.
RAID 1 Offers disk mirroring. Provides twice the read rate of a single disk, but same write rate. RAID 1 requires a minimum of
2 disks.
RAID 5 Data striping and stripe error correction information provided. RAID 5 requires a minimum of 3 disks. RAID 5 can sus-
tain one failed disk.
RAID 6 Two independent parity computations must be used in order to provide protection against double disk failure. Two
different algorithms are employed to achieve this purpose. RAID 6 requires a minimum of 4 disks. RAID 6 can sustain
two failed disks.
RAID 10 RAID 10 has high reliability and high performance. RAID 10 is implemented as a striped array whose segments are
RAID 1 arrays. It has the fault tolerance of RAID 1 and the performance of RAID 0. RAID 10 requires 4 disks. RAID 10
can sustain two failed disks.
Creating RAID destroys all data in the current RAID volume. The data will
be unrecoverable.
•• Edit RAID
On the RAID Information screen, press the Edit button to go to the RAID Information screen.
Using Edit RAID, you can select RAID ID and the Spare Disk.
•• Expanding a RAID
To expand a RAID 1, RAID 5, or RAID 6 volume, follow the steps below:
111 Replace one of the hard drives in the RAID volume and allow it to automatically rebuild.
222 Once rebuilt, you can continue to replace any remaining disks in the RAID array.
333 When you are done replacing hard drives, log on to Web Management. Navigate to Storage>
RAID to open the RAID Configuration screen.
444 On the RAID Information screen, click Edit to open the RAID Configuration screen.
555 On the RAID Configuration screen, click Expand.
To
From RAID 0 RAID 5 RAID 6
RAID 1 [RAID 1] HDDx2 to [RAID 5] HDDx3 [RAID 1] HDDx2 to [RAID 6] HDDx4
[RAID 1] HDDx2 to [RAID 5] HDDx4
From the Control Panel, the stackable feature is located under “Storage”. Please refer the figure below
for reference.
From the figure above, click Add to access the stackable target device configuration page. Please
refer to the figure below:
With the added stack target you can “Enable” or “Disable” the stack target now or later depending on
usage required.
The Stacked Target name will become the network share name and will be displayed through
network access such as SMB. You may refer to the figure below to see the result. Please note the
naming limitation.
The Browseable setting is the same method used for setting a system share folder. It designates
whether or not this folder will be visible through web disk. You may refer to the figure below for
reference when Yes and No are selected.
After your settings have been applied, the system will bring you back to the Stack Target List window
as shown below. There is one stack target device that has been attached into this stack master.
In general, if the attached stack target device has been used by another Thecus NAS as stack target
volume, then the Format item will be display and system will recognize it straight away and display
its capacity. Otherwise, the Format item will be available and the Capacity and Status items will show
as “N/A” and “Unknown file system” respectively.
Next, click Format to proceed with formatting.
After the format is completed, the stack target volume will be created successfully. You will see the
volume’s capacity and status in the Stack Target List screen.
To make any changes to a stack target, click Edit for the corresponding stack target, and the system
will bring up the following dialogue window:
After��������������������������������������������������������������������������������������������
your���������������������������������������������������������������������������������������
change��������������������������������������������������������������������������������
s�������������������������������������������������������������������������������
have��������������������������������������������������������������������������
������������������������������������������������������������������������������
been made����������������������������������������������������������������
,���������������������������������������������������������������
click
��������������������������������������������������������������
��������������������������������������������������������
Apply to confirm any modification�����������������������
s����������������������
. ��������������������
Once c��������������
hange���������
s��������
are
�������
ap-
plied, the associated information will be updated on the Stack Target List window.
If the stack target Public setting set to Yes, then the ACL button will be grayed out. However, if Public
setting is set to No, then the ACL button will be available for you to setup user access permissions for
the stack target.
The ACL settings will be exactly the same as the system folder that you may have setup previously.
This is used to enable stack target devices that may have been disconnected due to a power outage
or a���������������������������������������������������������������������������������������������
disconnected network�����������������������������������������������������������������������
.����������������������������������������������������������������������
When this happens����������������������������������������������������
, the Reconnect button
������������������������������������
�����������������������������
will ������������������������
become available.
�����������������
������
To at-
tempt to reconnect the stack target, click Reconnect.
From the figure above, select an ISO file from the drop down share list.
After selection, the system will bring up the Mount table screen for further settings.
B. Using ISO
The mounted ISO file will be located in the share folder of the same name as the file. Please refer the
screen shot below. Here, the ISO file “Thecus 01” wasn’t assigned a mounting name, so the system
automatically created a folder “Thecus 01”.
•• iSCSI Target
To add iSCSI target volume, click iSCSI with associated RAID volume from its drop down list and
select the desired RAID volume.
iSCSI Target
Item Description
Add Click to allocate space to iSCSI target from associated RAID volume.
Modify Click this to modify the iSCSI Target.
Advanced There are 3 options (iSCSI CRC/Checksum, Max Connections, Error Recovery Level) These currently
allow the Admin to Enable/Disable the Thecus IP storage associated with the iSCSI setting.
Delete Click this to delete the iSCSI Target.
To allocate space for an iSCSI target on the current RAID volume, follow the steps below:
111 Under the iSCSI Target List, select iSCSI Target then click Add.
Be sure the iSCSI target volume has been enabled or it will not list out
while using Initiator to get associated iSCSI target volumes.
You will then see the dialog box displayed below. Drag the Expand Capacity bar to the size you want.
Then press Expand to confirm the operation.
•• iSCSI Thin-Provisioning
If iSCSI Thin-Provisioning is selected when creating an�������������������������������������������
iSCSI target volume,����������������������
virtual memory is as-
signed to the target, allowing the physical memory to reach maximum capacity and adding new
disks only when needed.
To setup iSCSI thin-provisioning, simply select “Thin-Provision” mode from the “Create LUN” setting
screen.
If creating an iSCSI target volume under “Instant Allocation”, physical memory is assign to the target,
being limited by the available memory. For the iSCSI target volume created under “thin-provisioning”,
virtual memory is assigned to the volume, which can go up to 16384GB (16TB).
•• LUN ACL
After iSCSI target has been created, you are one step away from using the iSCSI volume. Under “LUN
ACL”, you need to add “Initiator iqn” and setup ACL access privileges to determine the accessibility.
Please refer the screen shot below for where “Initiator iqn” can be found.
The accessible Initiator will be listed as shown in the screen shot displayed below.
The listed “Initiator iqn” can be modified or deleted by selecting the desired iqn and pressing Modify
or Delete.
•• Advance Option
There are 3 available options for the user to operate Thecus IP storage associated with iSCSI setting.
The details are listed in the following screenshot. If the options are modified, the system will need to
reboot for the changes to take place.
To enable this option, the initiator can connect with “Data digest” and “Header digest”.
Max Connections
The Error Recovery Level (ERL) is negotiated during a leading iSCSI connection login in traditional
iSCSI (RFC 3720) and iSER (RFC 5046).
ERL=0 (Session Recovery) is triggered when failures within a command, within a connec-
tion, and/or within TCP occur. This causes all of the previous connections from the failed
session to be restarted on a new session by sending a iSCSI Login Request with a zero
TSIHRestart all iSCSI connections on any failure.
ERL=1, only applies to traditional iSCSI. For iSCSI/SCTP (which has its own CRC32C)
and both types of iSER (so far), handling header and data checksum recovery can be
disabled.
ERL=2, allows for both single and multiple communication path sessions within a iSCSI
Nexus (and hence the SCSI Nexus) to actively perform realligence/retry on iSCSI ITTs
from failed iSCSI connections. ERL=2 allows iSCSI fabrics to take advantage of recovery
in all regards of transport level fabric failures, and in a completely OS independent
fashion (i.e. below the host OS storage stack).
To join an AD domain, you can refer to the figure here and use the example below to configure the
Thecus IP storage for associated filed input:
•• Add Users
111 Click on the Add button on Local User Configuration screen, and Local User Setting screen
appears.
222 On the Local User Setting screen, enter a name in the User Name box.
333 Enter a User ID number or leave blank to use the system default value.
444 Enter a password in the Password box and re-enter the password in the Confirm box.
555 Select which group the user will belong to. Group Members is a list of groups this user be-
longs to. Group List is a list of groups this user does not belong to. Use the << or >> buttons
to have this user join or leave a group.
666 Press the Apply button and the user is created.
•• Edit Users
111 Select an existing user from the Local User Configuration screen.
222 Click on the Edit button, and the Local User Setting screen appears.
333 From here, you can enter a new password and re-enter to confirm, or use the << or >> but-
tons to have this user join or leave a group. Click the Apply button to save your changes.
•• Remove Users
111 Select an existing user from the Local User Configuration screen.
222 Click on Remove button and the user is deleted from the system.
•• Add Groups
111 On the Local Group Configuration screen, click on the Add button.
222 The Local Group Setting screen appears.
333 Enter a Group Name.
444 Enter a Group ID number. If left blank, the system will automatically assign one.
555 Select users to be in this group from the Users List by adding them to the Members List using
the << button.
666 Click the Apply button to save your changes.
•• Remove Groups
111 On the Local Group Configuration screen, select a group name from the list.
222 Press Remove to delete the group from the system.
Add Folder
Item Description
RAID ID RAID volume where the new folder will reside.
Folder Name Enter the name of the folder.
Public Admit or deny public access to this folder.
Apply Press Apply to create the folder.
•• Modify Folders
On the Folder screen, press the Edit button and the Modify Folder screen appears. This screen allows
Modify Folder
Item Description
Folder Name Enter the name of the folder.
Public Admit or deny public access to this folder.
Apply Press Apply to create the folder.
•• Remove Folders
To remove a folder, press the Remove button from the specified folder row. The system will confirm
folder deletion. Press Yes to delete the folder permanently or No to go back to the folder list.
All the data stored in the folder will be deleted once the folder is deleted.
The data will not be recoverable.
NFS Share
Item Description
Hostname Enter the name or IP address of the host
Privilege Host has either read only or writeable access to the folder.
OS Support There are two selections available:
•• Unix / Linux System
•• AIX (Allow source port > 1024)
Choose the one which best fits your needs.
ID Mapping There are three selections available:
•• Guest system root account will have full access to this share (root:root).
•• Guest system root account will be mapped to anonymous user (nobody:nogroup) on NAS.
•• All user on guest system will be mapped to anonymous user (nobody:nogroup) on NAS.
Choose the one which best fits your needs.
Sync / Async Choose to determine the data “Sync” at once or “Async” in arranged batch.
Apply Click to save your changes.
Samba Configuration
Item Description
RAID ID RAID volume where the new folder will reside.
Folder Name Enter the name of the folder.
Public Admit or deny public access to this folder.
Apply Press Apply to create the folder.
If one user has belonged to more than one group with different
privilege, then the priority of the privilege will be as followed:
Writable > Read Only > Deny
To setup sub-folders ACL, click on “ ” symbol to extract sub folders list as screen shot shows below.
You may carry on with same steps as share level ACL setting.
The ACL screen also allows you to search for a particular user. To do this, follow the steps below:
111 In the blank, enter the name of the user you would like to find.
222 From the drop down select the group you would like to search for the user in.
333 Click Search.
Next, each user can be setup a global storage quota size for each RAID volume. Simply click on “Quota
Size” for each user and input the desired capacity. After the setup is complete, please click on “Apply”
to activate the user quota size.
•• Samba Service
Used for letting the operating system of UNIX series and SMB/CIFS of Microsoft Windows operating
system (Server Message Block / Common Internet File System).Do the link in network protocol.
Enable or Disable SMB/CIFS protocol for Windows, Apple, Unix drive mapping
Simply enable the “Recycle Bin” function and “Recycle Folder Display” then all of deleted files/folders
will reside in the “_NAS_Recycle_(Associated RDID Volume)” share folder.
For example, the system has created 2 RAID volumes with ID “RAIDpm” and ‘RAID”. Then it will have 2
recycle bin folder appear as “_NAS_Recycle_RAID” and “_NAS_Recycle_RAIDpm”.
There are 2 more setting could help to manage the recycle bin for deleted folders/files.
111 Setup the “Day” to remove deleted folders/files which has resided in recycle bin permanently.
Left default value “0” if desired to clean up recycle bin manually.
222 Setup the “Size” for recycle bin to allow deleted folders/files can store. Left default value “0”
with no limitation.
•• The deleted files/folders which have resided in recycle bin will keep
its permission. On the other hand, only the admin and owner can
view/read/write these folders/files.
•• If deleted single file size is large than 2GB then it won’t reside in the
recycle bin but erase permanently.
To access the share folder on the Thecus IP storage, use the appropriate user login and password
set up on the Users page. Access control to each share folder is set up on the ACL page (Storage
Management > Share Folder > ACL).
333333 TFTP
Thecus IP storage can act as a TFTP server, enabling users to download and upload files with their
favorite TFTP programs. From the Network Service category, choose the TFTP item, and the TFTP
screen appears. You can change any of these items and press Apply to confirm your settings.
333333 WebService
From the Network Service category, choose the WebService item, and the WebService Support
screen appears. This screen displays the service support parameters of the system. You can change
any of these items and press Apply to confirm your settings.
333333 SSH
The device is now SSH protocol supported. It allows user to use SSH and have console to manipulate
as����������������������������������������������������������������������������������������������������
needed. The SSH default login user name is “�������������������������������������������������������
��������������������������������������������������������
root���������������������������������������������������
”��������������������������������������������������
with full privilege������������������������������
���������������������������������������
and password�����������������
�������������������������
is admin��������
’�������
s �����
pass-
word. The default admin password is “admin” so once the admin password has changed then SSH
login need to change the password too.
A description for each item as following:
SSH
Item Description
SSH Service Enable or disable SSH service.
Port The port number is default 22.
SFTP Enable or disable SFTP protocol under SSH service.
Apply Click “Apply” to confirm the changes.
After the router has enabled “UPnP Service” then you will have information come from associated
router to UPnP port management as shown in the screen shot below.
And click “Add Rule” to add more port mapping from Internet to access desired services or press
“Refresh” to get most updated list.
3333333 WebDAV
The WebDAV is an extended protocol of http(s) which allows remote access to your NAS system.
To begin using WebDAV and WebDAV SSL, simply click enable and provide the port number. The
default port number is 9800, under normal circumstances this will not need to be changed.
WebDAV Configuration
Item Description
WebDAV Service Press the Enable button to activate WebDAV service and specify the port number
if it needs to change from the default value.
P.S. Port number is limited to greater than 1024 and less than 65536
WebDAV SSL Service Press the Enable button to activate WebDAV SSL service and specify the port
number if it needs to be changed from the default value.
P.S. The ort number is limited to greater than 1024 and less than 65536
Browser View Press the Enable button and viewing the share folder list through the browser
will be allowed
Apply Click Apply to save your changes.
From here, it will display the current Thecus ID and DDNS information for the associated Thecus
NAS system and also the port connection status. You can click logout if remote access is no longer
needed.
If your Thecus NAS system is not currently logged in, or if DDNS has not yet been applied, then it can
be done here.
Register Thecus ID
Item Description
Thecus ID Input a valid email address. It will require confirmation to activate your Thecus
ID.
Password Input the password for your Thecus ID
Confirm Password Re-input the password for your Thecus ID.
First Name Input your First name
Middle Name Input your Middle name
Last Name Input your Last name
Apply Click Apply to save your changes.
Once your ThecusID has been registered, you will be given access to a webpage providing more
information (i.e. connection test, re-send password, etc.).
http://thecusid.thecuslink.com/mythecusid/index.php
Once the iTunes service is enabled, Thecus IP storage will make all music located in the Music folder
available for iTunes-equipped computers on the network.
-Log in to your target (backup) NAS through the UI in your web browser
-Go to Rsync Target Server under Backup in the menu of the UI
You will need this user name and password while the data is going to
remotely backup to this Rsync target server.
Now Rsync is turned on your NAS, which means it can be used as a target for Rsync backup, in other
words, only the backup NAS needs to be activated in this way.
-Log in to your other NAS (your source NAS) through the UI in your web browser
-Go to Data Guard under Backup in the System Management category of the UI
-From the Data Guard function list, choose Add
The data backup setup wizard appears as below, click on ‘Remote Backup”:
After the settings are complete, please click on “Connection Test”. The source unit will try to connect
with the associated target system. If a connection can be built up successfully then “Connection
passed” will be prompted, otherwise “Failed” will appear.
Incremental Mode :
Makes your source match your target and keep all old files; adding files on your target
as they are added on your source, but NOT deleting files on your target as they are de-
leted on your source.
Compress With this option, compress the file data as it is sent to the destination machine, which
reduces the amount of data being transmitted – something that is useful over a slow
connection.
Backup NAS Config Enabling this will back up the source unit system configurations to the designed path
on the target system.
Resume Partial File
Handle Sparse File Try to handle sparse file efficiently so they take up less space on the destination.
Keep ACL Setting It will backup not just data itself but also ACL configuration with associated folders/
files.
Log Location Choose the folder to save the log details while the task is executed.
Speed Limit Input the bandwidth control for data backup operation.
Timeout Limit Setup the timeout when trying to build up a connection in between the source and
the target system.
Enable Schedule If backup is set as “Schedule”, please input the related period and time.
After the required fields are filled and the parameters are setup, click ‘Finish” to complete. The data
guard task will appear in the list as shown below.
•• Custom Backup
The custom backup setting is similar to the full backup. The only differences are explained below:
111 Inputs the share folder name of target sever where the source is going to backup. The sub-
folder can be left as blank.
222 Select the source share folder(s) which are desired to be backed up to the target server. You
can also click on “Select All” from top right corner check box.
444 Click “Finish” and the data guard task will appear in the list as shown below.
From the task list, you can now see the newly added “customback01”. This backup is setup as
“schedule”.
111 Inputs the share folder name of the target sever where the source is going to backup. The
sub-folder can be left as blank.
222 Select the iSCSI target volume which you wish to back up to the target server.
333 Click “Next” and more settings will appear. It is slightly differing from “Full backup” and “Custom
backup”. Only “Schedule” backup is supported with less options.
From the task list, you can now see the newly added “iscsiback”. This backup is setup as “schedule”.
The source folder name will use iSCSI_+target volume name. So here it
is displayed as “iSCSI_pmtest”. pmtest is the iSCSI target name when the
iSCSI target was created.
The iSCSI backup can see the result as below. The task “iSCSI_pmtest” has backup to target
172.16.66.131 and share folder NAS_Public with file “iSCSI_pmtest”.
•• Restore
To restore a backup from the backup task, simply select a task from the task list then click “Restore”
from the function bar. The restore task will start to have the associated files/folders from the target
server restored to the source.
The brand new source unit only has a 1 RAID volume ‘RAID”.
111 When adding a new backup task with “Full backup” or “Custom backup” and enabling the
option “Backup NAS Config” as shows below, the source unit system configurations are then
backed up to the designed path on the target system every time the task is executed.
222 Click on “Restore NAS Configuration” and the screen shown below will appear. Input the
target server’s IP address where the system configuration has been backed up, and necessary
authentication info. Confirm by doing a “Connection Test” to make sure the communication
between the source and the target server works.
444 After clicking “Next”, a screen will appear as shown below. Listed on the left hand side, you
will see the configuration backup details which contain the 3 RAID volumes. On the right
hand side, you will see a list of single “RAID” volume. You may roll back to previous page to
recall the example we have taken.
From the Data Guard function list, select Add. The data backup setup wizard appears as below, click
on “Local Backup”:
The local backup has 6 different selection you can choose from.
Click on the associated external device and the contain folders will be listed. Select the folders that
are going to be imported to the NAS and select the available RAID volume which is listed in Target
pane.
In here, we have selected the “Intel Graphi…” and “N10850” folders from the external device and
Next, please select the path from the drop down list to save the log. Also, give the access permission
whether these selected folders will be “Public” or not after the import.
And that the system has created 2 new share folders from the task just created.
Select a folder from the source pane which is going to be copy over, then select in target pane it’s
destination.
Choosing the sync type, “Incremental” or ‘Sync”, and select the log path from the drop menu list.
Now, you will see in the data guard task list that you have created a task.
333 Realtime Backup: click on “Realtime Backup” and this screen will appear.
2 different options can be selected from, folder to folder, folder to external device.
Let’s take “Folder to Folder” backup for example. Select from the source pane the folder “NAS_
Public”, then select its destination in the target panefolder “R6andy”.
Include File Type: Only the associated file format will do the real time backup.
Exclude File Type: The excluded file format won’t be included in the real time backup.
For document file format: doc, xls, pdf, docx, xlsx, txt, ppt, pptx, html, htm
For picture file format: jpg, bmp, tif, png, pbm, tga, xar, xbm
For video file format: avi, mpg, mp4, mkv, fli, flv, rm, ram
For music file format: mp3, wav, wma, acc, dss, msv, dvf, m4p, 3gp, amr, awb
Read the notes and check the “Accept” box for confirmation.
Now, you can see in the data guard task list that your created task is listed. The task status will say
“Processing” untill the “Stop” button is pressed.
Now, you will see in the data guard task list that you have created a task.
555 iSCSI Backup: click on “iSCSI Backup” and screen appear as below.
It can be backup to two different storage pool, iSCSI to folder, iSCSI to external device.
Next, provide the task name and where the task log will store.
Once “Start” click, the associated iSCSI volume will not allow to I/O during backup processing. And
the task status will change to ‘Processing”.
From the RAID volume folder ‘andy_local’, it has backup iSCSI volume file stored. This backup iSCSI
volume file is needed while it required import to storage. Next topic will describe about this.
Let’s take example to import “RAID folder to iSCSI” which is the iSCSI volume we have backup earlier
to RAID volume folder andy_local than import to volume RAID.
Now, from the data guard task list will have created task listed.
After inputting the ACL backup file and clicking the “Next” button, the system will show another
screen to list the matched folders in between the backup file and this RAID volume. Just select the
desired folders for the ACL restore.
•• The ACL backup will only back to share folder level; it does not apply
to its sub-layer.
•• If recursive has been checked during the ACL restoration, it will
apply to all of its sub-folders with the same permission.
aaa Click the Add button and the NAS share list appears.
bbb Select files/folders which you would like to burn. All of the selected folders/files will be
seen under the disc label name “New Disc”. The disc label name can be changed by
clicking on it and press “Edit” from menu bar. The selected folders/files also can be
removed by clicking on them and then pressing “remove” or “remove all” for all selected
items.
aaa Click “Browser” and the NAS share list will appear to locate the desired image file to
burn.
ccc Select from the installed USB burning devices. Please click the “detect disc” button to
check the status once the disc is inserted.
ddd Select the burning speed from the drop down list.
eee Select whether disc data verification is required or not.
fff Click “Burn” to start disc burning.
333 Create image file from files/folders
aaa Click the Add button and the NAS share list will appear.
bbb Select the files/folders which you would like to burn. All of the selected folders/files will
appear under the disc label name “New Disc”. The disc label name can be changed by
clicking on it and pressing “Edit” from the menu bar. The selected folders/files also can
be removed by clicking on them and pressing “remove” or “remove all” for all the
selected items.
The data burn does not support rewriteable media if it has been burned
with left space. On the other hand, the used rewriteable media will be
erased first then carry on with burning.
333333 Printers
From the ��������������������������������������������������������������������������������������
External Devices����������������������������������������������������������������������
menu, choose the Printer item, and the Printer Information screen ap-
pears. This screen provides the following information about the USB printer connected to the USB
port.
Printer Information
Item Description
Manufacturer Displays the name of the USB printer manufacturer.
Model Displays the model of the USB printer.
Status Displays the status of the USB printer.
Remove document from Queue Click to remove all documents from printer queue
Restart Printer service Click to restart printer service
If a corrupt print job is sent to a printer, printing may suddenly fail. If your print jobs seem to be
locked up, pressing the Remove All Documents button to clear the print queue may resolve the is-
sue.
You can configure �������������������������������������������������������������������������������������
Thecus IP storage��������������������������������������������������������������������
to act as a printer server. That way, all PCs connected to the net-
work can utilize the same printer.
•• Windows Vista
To set up the Printer Server in Windows Vista, follow the steps below:
111 Open Printer Folder from the Control Panel.
222 Click the right mouse button in anywhere on the Printers folder and then select Add Printer.
You can press The printer that I want isn’t listed to go into next page without waiting for Searching
for available printers to finish.
555 Click Select a shared printer by name.
888 You can choose to set this printer as the default printer by checking the Set as the default
printer box. Click Next to continue.
http://www.thecus.com/sp_tech.php
Customers in the US should send all technical support enquiries to the US contact window included
in the following web page:
http://www.thecus.com/sp_tech.php
RAID 0 is best suited for applications that need high bandwidth but do not require a high level of
data security. The RAID 0 level provides the best performance of all the RAID levels, but it does not
provide data redundancy.
RAID 0 uses disk striping and breaking up data into blocks to write across all hard drives in the vol-
ume. The system can then use multiple hard drives for faster read and write. The stripe size parame-
ter that was set when the RAID was created determines the size of each block. No parity calculations
complicate the write operation.
RAID 1
RAID 1 mirrors all data from one hard disk drive to a second one hard disk drive, thus providing com-
plete data redundancy. However, the cost of data storage capacity is doubled.
This is excellent for complete data security.
RAID 5
RAID 5 offers data security and it is best suited for networks that perform many small I/O transactions
at the same time, as well as applications that require data security such as office automation and on-
RAID 5 includes disk striping at the byte level and parity information is written to several hard disk
drives. If a hard disk fails the system uses parity stored on each of the other hard disks to recreate all
missing information.
RAID 6
RAID 6 is essentially an extension of RAID level 5 which allows for additional fault tolerance by using
a second independent distributed parity scheme (dual parity)
Data is striped on a block level across a set of drives, just like in RAID 5, and a second set of parity is
calculated and written across all the drives; RAID 6 provides for an extremely high data fault toler-
ance and can sustain two simultaneous drive failures.
This is a perfect solution for mission critical applications.
RAID 10
RAID 10 is implemented as a striped array whose segments are RAID 1 arrays. RAID 10 has the same
fault tolerance as RAID level 1.
RAID 10 has the same overhead for fault-tolerance as mirroring alone. High I/O rates are achieved by
striping RAID 1 segments.
Under certain circumstances, RAID 10 array can sustain up to 2 simultaneous drive failures
Excellent solution for applications that would have otherwise gone with RAID 1 but need an addi-
tional performance boost.
JBOD
Although a concatenation of disks (also called JBOD, or “Just a Bunch of Disks”) is not one of the num-
bered RAID levels, it is a popular method for combining multiple physical disk drives into a single
virtual one. As the name implies, disks are merely concatenated together, end to beginning, so they
appear to be a single large disk.
As the data on JBOD is not protected, one drive failure could result total data loss.
Stripe Size
The length of the data segments being written across multiple hard disks. Data is written in stripes
across the multiple hard disks of a RAID. Since multiple disks are accessed at the same time, disk strip-
ing enhances performance. The stripes can vary in size.
Disk Usage
When all disks are of the same size, and used in RAID, Thecus IP storage disk usage percentage is
listed below:
RAID Level Percentage Used
RAID 0 100%
RAID 1 1/n x 100%
RAID 5 (n-1)/n x 100%
RAID 6 (n-2)/n x 100%
RAID 10 50%
JBOD 100%
n: HDD number
111 Easy integration of Thecus IP storage into the existing office IT infrastructure
The ������������������������������������������������������������������������������������������
Thecus IP storage�������������������������������������������������������������������������
acts as a member of the ADS. This feature significantly lowers the over-
head of the system administrator. For example, corporate security policies and user privileges
on an ADS server can be enforced automatically on Thecus IP storage.
222 Centralized user/password database
The Thecus IP storage does not maintain its own copy of the user/password database. This
avoids data inconsistency between Thecus IP storage and other servers. For example, without
ADS support, an administrator might need to remove a specific user privilege on Thecus IP
storage and each individual server. With ADS support, the change on an ADS server is known
to all of its ADS members.
CGIC, copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004 by Thomas Boutell and Boutell.
Com, Inc.
Everyone is permitted to copy and distribute verbatim copies of this license document, but chang-
ing it is not allowed.
•• PREAMBLE
The licenses for most software are designed to take away your freedom to share and change it.
By contrast, the GNU General Public License is intended to guarantee your freedom to share and
change free software--to make sure the software is free for all its users. This General Public License
applies to most of the Free Software
Foundation's software and to any other program whose authors commit to using it. (Some other
Free Software Foundation software is covered by the GNU Library General Public License instead.)
You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses
are designed to make sure that you have the freedom to distribute copies of free software (and
charge for this service if you wish), that you receive source code or can get it if you want it, that you
can change the software or use pieces of it in new free programs; and that you know you can do
these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or
to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give
126 Appendix D: Licensing Information
the recipients all the rights that you have. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which
gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that
there is no warranty for this free software. If the software is modified by someone else and passed
on, we ���������������������������������������������������������������������������������������������
want�����������������������������������������������������������������������������������������
its recipients to know that what they have is not the original, so that any problems in-
troduced by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger
that redistributors of a free program will individually obtain patent licenses, in effect making the pro-
gram proprietary. To prevent this, we have made it clear that any patent must be licensed for every-
one's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
0. This License applies to any program or other work which contains a notice placed by the
copyright holder saying it may be distributed under the terms of this General Public License. The
"Program", below, refers to any such program or work, and a "work based on the Program" means
either the Program or any derivative work under copyright law: that is to say, a work containing
the Program or a portion of it, either verbatim or with modifications and/or translated into another
Language. (Hereinafter, translation is included without limitation in the term "modification".) Each
licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running the Program is not restricted, and the output from the Program
is covered only if its contents constitute a work based on the Program (independent of having been
made by running the Program).
1. You may copy and distribute verbatim copies of the Program's source code as you receive
it, in any medium, provided that you conspicuously and appropriately publish on each copy an ap-
propriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this
License and to the absence of any warranty; and give any other recipients of the Program a copy of
this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work
based on the Program, and copy and distribute such modifications or work under the terms of Sec-
tion 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the
files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be licensed as a whole at no charge to all third par-
ties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause
it, when started running for such interactive use in the most ordinary way, to print or display an an-
nouncement including an appropriate copyright notice and a notice that there is no warranty (or
else, saying that you provide a warranty) and that users may redistribute the program under these
conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is
interactive but does not normally print such an announcement, your work based on the Program is
not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are
not derived from the Program, and can be reasonably considered independent and separate works
in themselves, then this License, and its terms, do not apply to those sections when you distribute
them as separate works. But when you distribute the same sections as part of a whole which is a
work based on the Program, the distribution of the whole must be on the terms of this License,
whose permissions for other licensees extend to the entire whole, and thus to each and every part
regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely
by you; rather, the intent is to exercise the right to control the distribution of derivative or collective
works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with
a work based on the Program) on a volume of a storage or distribution medium does not bring the
other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object
code or executable form under the terms of Sections 1 and 2 above provided that you also do one
of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must
be distributed under the terms of Sections 1 and 2 above on a medium customarily used for soft-
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a
charge no more than your cost of physically performing source distribution, a complete machine-
readable copy of the corresponding source code, to be distributed under the terms of Sections 1
and 2 above on a medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding
source code. (This alternative is allowed only for noncommercial distribution and only if you re-
ceived the program in object code or executable form with such an offer, in accord with Subsection
b above.)
The source code for a work means the preferred form of the work for making modifications to it. For
an executable work, complete source code means all the source code for all modules it contains,
plus any associated interface definition files, plus the scripts used to control compilation and
installation of the executable. However, as a special exception, the source code distributed need
not include anything that is normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on which the executable runs,
unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated
place, then offering equivalent access to copy the source code from the same place counts as
distribution of the source code, even though third parties are not compelled to copy the source
along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided
under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is
void, and will automatically terminate your rights under this License. However, parties who have re-
ceived copies, or rights, from you under this License will not have their licenses terminated so long
as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing
else grants you permission to modify or distribute the Program or its derivative works. These actions
are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the
Program (or any work based on the Program), you indicate your acceptance of this License to do so,
and all its terms and conditions for copying, distributing or modifying the Program or works based
on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient
automatically receives a license from the original licensor to copy, distribute or modify the Program
subject to these terms and conditions. You may not impose any further restrictions on the recipi-
ents' exercise of the rights granted herein. You are not responsible for enforcing compliance by third
parties to this License.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the
balance of the section is intended to apply and the section as a whole is intended to apply in other
circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right
claims or to contest validity of any such claims; this section has the sole purpose of protecting the
integrity of the free software distribution system, which is implemented by public license practices.
Many people have made generous contributions to the wide range of software distributed through
that system in reliance on consistent application of that system; it is up to the author/donor to de-
cide if he or she is willing to distribute software through any other system and a licensee cannot im-
pose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest
of this License.
8. �����������������������������������������������������������������������������������������������
If the distribution and/or use of the Program is restricted in certain countries either by pat-
ents or by copyrighted interfaces, the original copyright holder who places the Program under this
License may add an explicit geographical distribution limitation excluding those countries, so that
distribution is permitted only in or among countries not thus excluded. In such case, this License in-
corporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public
License from time to time. Such new versions will be similar in spirit to the present version, but may
differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number
of this License which applies to it and "any later version", you have the option of following the
terms and conditions either of that version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of this License, you may choose any
version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution
conditions are different, write to the author to ask for permission. For software which is copyrighted
by the Free Software Foundation, write to the Free Software Foundation; we sometimes make ex-
ceptions for this. Our decision will be guided by the two goals of preserving the free status of all de-
130 Appendix D: Licensing Information
rivatives of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN
WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITH-
OUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PRO-
GRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCU-
RATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE
WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.