Um MD ST

Download as pdf or txt
Download as pdf or txt
You are on page 1of 166

1

Operators
M A N U A L

miSAN-D Series
iSCSI Disk Storage with Exclusive SANDR Technology

UM-MD-ST Version L4-1103 FW4.19

UM-MD-ST

L4-1103

Cybernetics

1.1 About your Users Guide


Welcome to your miSAN-D Series User Manual. This manual explains how to set up, configure and use your miSAN-D Series.

1.2 Guide to Notes and Cautions


Throughout this miSAN-D Series manual, you will find caution and note boxes similar to those below. Please read the contents of cautions and notes carefully.

Note
This icon indicates useful tips on getting the most from your unit.

Caution
This icon indicates the existence of a potential hazard that could result in personal injury, damage to your equipment or loss of data if safety instruction is not observed.

Important
This icon indicates useful tips on getting the most from your equipment.

1.2.1 FCC Notice


This equipment is tested to comply with limits for a Class A digital device pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference when equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with this instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at the users own expense.

Caution
Failure to follow proper shutdown procedures can result in an undefined state that may involve loss of data.

Cybernetics

UM-MD-ST

L4-1103

1.3

UM-MD-ST

L4-1103

Cybernetics

Cybernetics

UM-MD-ST

L4-1103

List of Figures
Figure 1-1 miSAN-D16 Front Panel Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 1-2 miSAN-D6 Front Panel Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 1-3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 1-4 miSAN-D8/D12 Front Panel Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 1-5 Typical Front Panel Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 1-6 Typical miSAN-D Series Rear components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 1-7 IP Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 2-1 miSAN-D Series Power Supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 2-2 Power Button. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 16 16 16 16 17 17 20 20

Cybernetics

UM-MD-ST

L4-1103

Cybernetics

UM-MD-ST

L4-1103

Table of Contents
About your Users Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Guide to Notes and Cautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 FCC Notice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Chapter 1 miSAN-D Series Overview

13

A Legacy of Performance and Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Data Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 New Features with SANDR 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Dynamic LUN Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Dynamic Snapshot Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Virtual Disk Cloning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 iSCSI Tape and VTL Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Rear Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 IP Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Chapter 2 Setting Up the miSAN-D Series

19

Installing the miSAN-D Series. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Hardware Setup Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Setup Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Chapter 3 Using the IP SAN Disk Manager

27

Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Main Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Side Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Download Current Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Upload Saved Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Network Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Firewall Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Firewall Technical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 E-mail Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Direct-Attach Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Physical Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 RAID Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Reattach Tape Drive to Stacker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 iSCSI Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Job Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Portable Disk Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Offload/Restore from External USB/SATA Drive . . . . . . . . . . . . . . . . . . . . . . . . . 45 Offload a Virtual Disk to an external Hard drive . . . . . . . . . . . . . . . . . . . . . . 45 Restore a Virtual Disk from an external Hard Drive . . . . . . . . . . . . . . . . . . . 46 Shutdown/Restart. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Power Cycling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Log Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Chapter 4 Working with Virtual Disks

49

Cybernetics

UM-MD-ST

L4-1103

8 Virtual Disk Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Copy Virtual Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Add Virtual Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Delete a Virtual Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Virtual Disk Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Virtual Disk Property Instruction locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Configure A Virtual Disk Alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Extend Virtual Disk Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Snapshot Reservation Expansion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Configure Virtual Disk Sync Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Virtual Disk Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Edit a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Delete a user. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 IP-based Access Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Constraint for range of IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Virtual Disk Backup and Restore (Tape) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Backup / Restore Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Chapter 5 Working with Snapshots and Replication

69

Snapshot Support Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Snapshot Support Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Mount and Unmount snapshot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Rollback Snapshot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Offload Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Restore from a Snapshot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Restore from a Snapshot located on a Tape Drive . . . . . . . . . . . . . . . . . . . . 74 Restore from a Snapshot located on an External Hard Drive . . . . . . . . . . . . 74 Scheduled Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Automatic Offload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Global Snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Automatic Offload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Extend Snapshot Allocation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Configure Virtual Disk Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Delete a Replication Target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Chapter 6 Extra Menu Features

87

Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Temperature Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Multi Unit Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Download Internal Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Audio Beacon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Current Date / Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Failover (High-Availability) Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Changing Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Disabling High Availability:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Unit Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Failover Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Loss of Power to the Master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Loss of Power to the Slave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Failover ends with both units still running . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Failover Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Physical Setup: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Port assignments: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 IP Addresses During Paired Operation: . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Cybernetics

UM-MD-ST

L4-1103

9 Behavior During Paired Operation: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Chapter 7 Using the RAID Storage Manager

99

Browser Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Accessing From a Browser. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Access through the miSAN-D Series Side Menu . . . . . . . . . . . . . . . . . . . . . . . 100 Access Through Port 888 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Access Onboard LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 RAID Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Main Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Quick Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Raid Set Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Create Raid Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Delete Raid Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Expand Raid Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Activate Incomplete Raid Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Create Hot Spare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Delete Hot Spare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Rescue Raid Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Offline Raid Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Volume Set Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Create Volume Set (0/1/10/3/5/6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Create Raid30/50/60 (Volume Set 30/50/60). . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Delete Volume Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Modify Volume Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Volume Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Volume Set Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Check Volume Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Stop Volume Set Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Physical Drive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Create Pass-Through Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Modify Pass-Through Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Delete Pass-Through Disk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Identify Enclosure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Identify Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 System Controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 System Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 System Beeper Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Background Task Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 JBOD/RAID Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 SATA NCQ Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 HDD Read Ahead Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Volume Data Read Ahead. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 HDD Queue Depth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Stagger Power on Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Spin Down Idle HDD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 SAS Mux Setting (ARC-1680 Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Auto Activate Incomplete Raid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Disk Write Cache Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Disk Capacity Truncation Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Multiples Of 10G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Multiples Of 1G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 No Truncation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Ethernet Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Alert By Mail Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

Cybernetics

UM-MD-ST

L4-1103

10 SNMP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 View Events/Mute Beeper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Generate Test Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Clear Events Buffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Modify Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 Hardware Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Chapter 8 Product Specifications

125

Physical Dimensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Size and Weight (miSAN-D6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Size and Weight (miSAN-D8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Size and Weight (miSAN-D12) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Size and Weight (miSAN-D16) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Power Supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 miSAN-D6/L4 Power Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 miSAN-D8 Power Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 miSAN-D12 Power Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 miSAN-D16 Power Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Humidity and Temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Non-operating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Operating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Data Transfer Speed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

Appendix A Microsoft iSCSI Initiator

A-129

Downloading the Setup Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Installing the Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Logging On to the miSAN-D Series . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Logging On to a Virtual Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Setting Up a Virtual Disk on an iSCSI Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Disk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Dynamic Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Setting Up a Basic Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Creating a Basic Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Creating a Primary Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Creating an Extended Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Creating a Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

Appendix B Linux Open-iSCSI

B-147

Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Synaptic Package Manager (Debian/Ubuntu) . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Package Manager (RHEL5, CentOS 5). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Add/Remove Software (Fedora 10). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 miSAN-D Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Configure Open-iSCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Test Open-iSCSI installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Target node discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Automatic login setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Command Line setup of Automatic Login . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Automatic Login Setup by editing iscsid.conf . . . . . . . . . . . . . . . . . . . . . . . 154 Format iSCSI Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

Cybernetics

UM-MD-ST

L4-1103

11 Mount the iSCSI Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Version Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Versions Tested . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156

Appendix C Upgrading the miSAN-D Series Appendix D Technical Support and Repair Procedures Appendix E Return Policy

C-157 D-159 E-161

Hardware Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Shipping Damage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Software Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Tape Media Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Promotional Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Maintenance Contracts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Exceptions to Cybernetics 30-day hardware return policy: . . . . . . . . . . . . . . . 162 Return Procedure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162

Appendix F Notices

F-i

UM-MD-ST

L4-1103

Cybernetics

12

Cybernetics

UM-MD-ST

L4-1103

13

miSAN-D Series Overview

Chapter 1 miSAN-D Series Overview


The miSAN-D Series is a disk-based storage appliance that runs Cybernetics SANDR storage provisioning engine. Using the SANDR engine, the miSAN-D Series maps the internal disk drives to virtual disk drives. The miSAN-D Series presents virtual drives to host systems over the network as internal SCSI disk drives. Security is provided through user-password CHAP authentication, IP-address constraints for controlling access to virtual disks, and built in Firewall.

1.1 A Legacy of Performance and Value


1.1.1 Connectivity
All the processing power in the world cannot overcome connectivity limitations on a SAN. For this reason, Cybernetics incorporates ten GbE ports on the iSAN D Series, and offers upgrade to 10GbE. Even the smallest entry-level miSAN D Series models include five GbE ports. Each 125MB/s port has an independent IP address, and is compatible with MPIO to sustain blazing transfer rates between the SAN and network servers. Because Cybernetics hardware models have the physical connections to transfer exceptional performance within the SAN, the iSAN supports up to 1.2GB/s and the miSAN supports up to 500MB/s.

1.1.2 Data Protection


SAN storage virtualization enables powerful benefits for maximizing utilization through storage resource consolidation, emphasizing the importance of instantaneous and automatic data protection. Cybernetics SANDR incorporates important layers of protection against all types of threats to data: Snapshot Backup - Immediate, Online Recovery Portable Disk Backup - On-Site or Off-Site Recovery Tape Backup - Off-Site Archive and Disaster Recovery High Availability - Uninterrupted Operations WAN Replication - Remote Disaster Recovery Smart UPS Interface - Prevent Power-Related Corruption

Cybernetics

UM-MD-ST

L4-1103

14

miSAN-D Series Overview

1.2 Features
1.2.1 Hardware
Four interfaces for iSCSI data transfer (Gigabit Ethernet, 10/100/1000Base-T) Optional 10 GBe Ethernet One interface for remote administration (Gigabit Ethernet, 10/100/1000Base-T), (IP SAN Disk Manager and RAID Storage Manager Disk Manager 2) Integrated SAS RAID controller to control the hot swappable SATA disk drives SAS or optional Ultra 3 Wide LVD parallel SCSI for Snapshot and Virtual disk backup. High Availability (Failover) capability USB and eSATA connections for offload to external USB or eSATA drives. Optional Internal LTO tape drive (6 bay units only)

1.2.2 Software
SANDR storage provisioning engine iSCSI interface for multiple-host access IP SAN Disk Manager web-based GUI interface for configuring the miSAN-D Series, accessible from any computer on the network with a Web browser GUI interface for remotely viewing the status of and managing the RAID controller and associated disk drives User-password CHAP authentication and IP-address constraints for controlling access to virtual disks

Configurations The miSAN-D ships in one of three basic configurations: 1 dual SCSI port and 1 single SCSI port (3U Models default) 2 single SCSI ports (2U Models default) 2 dual SAS ports (2 host and 2 device, or 4 host, or 4 device) 1 single SCSI port (device) and 1 dual SAS ports (2 host or 2 device)

The instructions in this user manual are based on the default configurations, but can be applied to the other configurations.

1.3 New Features with SANDR 4.0


1.3.1 Dynamic LUN Provisioning
Storage requirements are dynamic, and so is the new Cybernetics SANDR 4.0 feature for dynamic LUN expansion. With the new Dynamic LUN Provisioning feature, the storage administrator can add capacity to any server or application on the fly. This feature also supports spanning RAID sets, so as capacity expansion modules are added to an original

Cybernetics

UM-MD-ST

L4-1103

miSAN-D Series Overview

15

iSAN or miSAN, any single virtual disk (LUN) can span to the newly added storage space. This feature makes it possible to provision for today's storage needs, and add storage only as needed, all without any disruption to production servers. Cybernetics iSAN and miSAN models support as many as eight RAID modules within a single SAN configuration, and they certainly have the horsepower to support add-on capacity modules, so the scalability is truly remarkable. The Cybernetics implementation of LUN provisioning avoids fragmentation issues, and prevents the possibility of storage capacity over-subscription causing a sudden halt for every server connected to the SAN.

1.3.2 Dynamic Snapshot Provisioning


Previous versions of the SANDR engine integrate agnostic, block-level snapshot backup, and with the release of 4.0, the feature is dramatically improved with the ability to migrate the online disk backup to second tier storage. A virtual disk / LUN running on expensive SSD or 15K SAS disk can send snapshot backup to a completely different RAID set running on SATA disk. And, exactly like the new Dynamic LUN Provisioning feature, snapshot allocation is also dynamically expandable, with the ability to span RAID sets. The flexibility to store online disk snapshot backup on second tier storage, and automatically migrate the snapshot backup to tape for archival, builds in a level of information life cycle management - without any backup server or backup software. The resulting cost savings add even more to the exceptional value of a Cybernetics iSAN or miSAN solution.

1.3.3 Virtual Disk Cloning


SANDR 4.0 includes Virtual Disk (LUN) Cloning for streamlined performance and administrator convenience. Cloning is simple, non-disruptive disk copying, and this new feature supports cloning to different RAID sets and different iSAN and miSAN models. Cybernetics Virtual Disk Cloning can even copy from a smaller to a larger LUN, or from a larger to a smaller LUN - assuming the new LUN has adequate capacity for the data, of course.

1.3.4 iSCSI Tape and VTL Backup


With SANDR 4.0, Cybernetics has expanded tape and virtual tape backup support to iSCSI attached devices. Cybernetics VTL solutions incorporate both SCSI and iSCSI connectivity, and Cybernetics iTape solutions are iSCSI attached. Now the Cybernetics SAN can stream serverless image backup to these devices without the requirement for a direct SCSI connection. iSCSI technology frees tape backup devices from the bonds of restrictive SCSI cables, for placement anywhere there is a network connection. Cybernetics is transitioning customers into a completely virtualized storage and backup environment. This latest release highlights Cybernetics' important role in the emergence of iSCSI SAN storage and backup technologies. Since 1978, storage and backup have been the sole focus of our engineering efforts, and many of the features taken for granted today trace their origins to Cybernetics development teams. Cybernetics is so confident, that all of our systems are backed by unrivaled technical support - free for as long as our customer has it in use.

UM-MD-ST

L4-1103

Cybernetics

16

miSAN-D Series Overview

1.3.5 Front Panel


Figure 1-1 miSAN-D16 Front Panel Components

Figure 1-2 miSAN-D6 Front Panel Components

Figure 1-3 Figure 1-4 miSAN-D8/D12 Front Panel Components

Figure 1-5 Typical Front Panel Components

eSATA Connection

USP Ports

Reset Button

Power Button

Cybernetics

UM-MD-ST

L4-1103

miSAN-D Series Overview

17

1.3.6 Rear Panel


Figure 1-6 Typical miSAN-D Series Rear components Network Reset Button Hole RAID SAS Port SAS Ports

AC Power Receptacles

Administrative LAN Interface ETH 0

Data Interfaces ETH 3, ETH 4

Data Interfaces ETH 1 ETH 2

1.3.7 IP Reset
If the miSAN-D Series becomes unreachable on the network, you can reset the network parameters to their default values using the network reset button on the rear panel. To perform the reset, while the miSAN-D Series is powered-on, first, insert a #0 Phillips screwdriver or paper clip into the network reset button hole on the rear panel. Then, press and hold down the reset button for 8 seconds. The miSAN-D Series will then restart. Afterward, you may change the network parameters from their default values. Figure 1-7 IP Reset

UM-MD-ST

L4-1103

Cybernetics

18

miSAN-D Series Overview

Cybernetics

UM-MD-ST

L4-1103

19

Setting Up the miSAN-D Series

Chapter 2 Setting Up the miSAN-D Series


This chapter discusses the necessary steps for installing the equipment and performing the initial setup of the miSAN-D Series hardware components, apart from the internal RAID disk array(s). For detailed operation instructions, refer to Chapter 3 Using the IP SAN Disk Manager.

2.1 Installing the miSAN-D Series


2.1.1 Requirements
Make sure the following are available before beginning the installation: Desktop or laptop computer with a JavaScript enabled Web browser. Ethernet cable (CAT 5e shielded) for each standard network interface (5). Standard, 3-prong AC power cord (IEC320 C13 to NEMA 5-15P) for each power supply. Network parameters specific to your network: IP Address, Netmask, Gateway (Default Route) and Nameserver. Rackmount space near a readily accessible power outlet. Rackmount hardware kit and tools for rackmount installations.

2.2 Hardware Setup Process


The main steps involved in setting up the miSAN-D Series hardware include: 1. Changing the factory-set, default network parameters to those that are supported by the intended network. 2. Installing the miSAN-D Series into a rackmount enclosure. 3. Connecting the network and power cables.

2.2.1 Setup Steps


This section provides instructions for changing the factory-set, default network parameters to allow the miSAN-D Series to become visible on the main network. This process involves creating a temporary private network and is easiest to complete before installing and connecting the miSAN-D Series in its permanent location. 1. Make sure a host computer with a JavaScript-enabled Web browser is powered on and ready for use.

Cybernetics

UM-MD-ST

L4-1103

20

Setting Up the miSAN-D Series

2. Connect a CAT 5e shielded ethernet cable (included with unit) between the Administrative LAN interface port (ETH 0) on the rear of the miSAN-D Series and the network interface port of the host computer.

3. Using the AC socket on power modules, connect the miSAN-D to a readily accessible AC power source using a standard 3-prong power cord for each socket. Figure 2-1 miSAN-D Series Power Supply

4. Power on the miSAN-D Series using the momentary power switch on the front panel. Wait for the miSAN-D Series to complete initialization before continuing. Figure 2-2 Power Button. Power Button

Cybernetics

UM-MD-ST

L4-1103

21

Setting Up the miSAN-D Series

5. Configure the host computer to communicate with the miSAN-D Series by changing the computers network interface IP Address to one on the 192.168.1.x network (e.g., 192.168.1.50) and the Subnet Mask to 255.255.255.0

Note
Before changing the IP Address and Netmask, make sure to write down their current settings to be used when resetting them later.
6. Launch the Web browser and point the URL location to http://192.168.1.1 The IP SAN Disk Manager Console will prompt for the administrative username and password.

Note
If more than one miSAN-D is being setup, the host may not recognize that it is connecting to a new unit (with the same default IP address) and therefore the miSAN-D may be unresponsive on ETH 0 for several minutes until the hosts ARP table is reset. This situation can be avoided by using ETH 0 (192.168.1.1) for the first unit, ETH 1 (192.168.1.2) for the second unit, ect.
7. The default Username is admin and the default Password is cyber. Enter these and then click the Login button.

8. Click Network Parameters on the side menu bar to access the Network Parameters page.

Cybernetics

UM-MD-ST

L4-1103

22

Setting Up the miSAN-D Series

9. In the Network Parameters page, click Change to the right of Administrative LAN.

10. Enter the parameters for your network.

11. Select 9000 MTU only if the server that will be connecting to the miSAN-D is capable of Jumbo Frames.

Important
If 9000 MTU (Jumbo frames) is selected in the miSAN-D, 9000 MTU must be set across the entire network path.

12. Select Delay until boot? and then click the Save Changes button.

Cybernetics

UM-MD-ST

L4-1103

23

Setting Up the miSAN-D Series

13. Click Change to the right of Data Interface #1.

14. Enter the parameters for your network.

15. Select 9000 MTU only if the server that will be connecting to the miSAN-D is capable of Jumbo Frames. If 9000 MTU (jumbo frames) is selected in the miSAN-D, 9000 MTU must be set across the entire network path. 16. Click the Save Changes button. 17. Repeat steps 13 - 16 for the remaining Data Interfaces.

Note
After changing the Data Interface network parameters and clicking "Save Changes", the changes will take effect immediately.

Important
Avoid having multiple NICS with the same subnet on a host or server.

Cybernetics

UM-MD-ST

L4-1103

24

Setting Up the miSAN-D Series

18. Click Change to the right of the Global Parameters settings to change the network parameters that are common to the five interfaces.

19. Enter the parameters for your network, and then click Save Changes.

20. Shut down the miSAN-D Series by clicking the Shutdown/Restart command on the side menu and selecting Shutdown. 21. Install into final location. Refer to the Rackmount Installation Guide for instructions on mounting the unit into a server rack.

Caution
The rackmount installation requires a 2U - 3U space in your rack. Due to its weight and bulk, two persons should be available to assist with mounting the unit in the rack. To install the rackmount kit, follow the instructions included in the rackmount kit or in the .pdf file on your cd.
22. Using the AC socket on power supplies, connect the miSAN-D Series to a readily accessible AC power source using a standard 3-prong power cord for each socket.

Important
You should use an Uninterruptible Power Supply (UPS) rated to at least 1000 VoltAmps for 2U units, 1250 VoltAmps for 12 Bay units and 1750 VoltAmps for 16 bay units. This will allow a 15 minute running time which ensures data buffered in the RAM cache will get written to disk during a power outage. Connect a power cable to each power supply module when connecting the miSAN-D Series to a UPS. If you do not use a UPS, each power supply module should be connected to a separate power main.

Cybernetics

UM-MD-ST

L4-1103

Setting Up the miSAN-D Series

25

23. If the offload feature will be used, connect a tape drive to one of the SCSI or SAS Ports and power it on before starting up the miSAN-D (Except for miSAN-D6). 24. If an external RAID or expansion array will be used, attach it to either a SCSI ora. 25. Do not attach a USB or eSATA drive to the unit before powering on the miSAN-D. 26. Set Flow Control to On for each host ethernet connection. If a switch is used to carry iSCSI traffic, it must be a managed switch with flow control enabled. Each host or server should have only one instance of each subnet. 27. Using the Administrative LAN interface port (ETH0), connect the miSAN-D Series to your Network using a shielded CAT 5e Ethernet cable.

28. Using one or more iSCSI data interface ports (ETH1 - ETH4), connect the miSAN-D Series to your LAN, Ethernet switch or backup server using a shielded CAT 5e Ethernet cable for each port. 29. Set Flow Control to On for each host ethernet connection. If a switch is used to carry iSCSI traffic, flow control must be enabled on the switch. 30. Confirm proper network settings and cable installation by logging into each interface.

UM-MD-ST

L4-1103

Cybernetics

26

Setting Up the miSAN-D Series

Cybernetics

UM-MD-ST

L4-1103

27

Using the IP SAN Disk Manager

Chapter 3 Using the IP SAN Disk Manager


Using the IP SAN Disk Manager The IP SAN Disk Manager Console is used for configuring the miSAN-D Series and can be accessed from any computer on the network with a Web browser. The administrator can use the Console to create virtual disks and add user accounts to access those disks, as well as other administrative tasks. To access the Console, launch a Web browser and point the location to the Administrative LAN interface IP Address of the miSAN-D Series.

3.1 Login
Once connected to the miSAN-D Series using the Web browser, the Administrative Login screen will appear. The miSAN-D Series supports only one login username and password, which grants full access to the user to configure the device as desired. At the login prompt, enter the administrative Username (default is admin) and Password (default is cyber), and then click Login. To access additional features (Maintenance and Failover), add an * to the end of the Username (i.e. admin*). Refer to Chapter 6 Extra Menu Features on page 87 for detailed explanations of the extra menu features.

Cybernetics

UM-MD-ST

L4-1103

28

Using the IP SAN Disk Manager

3.2 Main Page


The Current Status screen shows the state of the miSAN-D Series at the moment the page loads. This screen shows the miSAN-D Series network parameters and virtual disks, as configured by using the side menu commands. An Aggregate Network Traffic graph is adjustable for Seven Days, Three Days, or One Day; and All or Individual virtual disks.

Cybernetics

UM-MD-ST

L4-1103

29

Using the IP SAN Disk Manager

3.3 Side Menu


The Console presents a side menu from which all the configuration screens are accessible. To access a menu command, click it, and then wait for the page to load.

Return to Main Menu


To return to the Main Menu page from any other menu, press the SANDR IP SAN disk manager button at the top of any menu.

Admin Details

Cybernetics

UM-MD-ST

L4-1103

30

Using the IP SAN Disk Manager

Clicking the Admin Details command on the side menu will show the Administrator Details screen that allows for changing the administrator username and password from the default.

If the username or password are not being changed, press the Back link. If change are being made, then enter the new username and/or the new password. Confirm the new password and also enter the current password for verification purposes. Be sure to record the new username and password in a safe location.

Import/Export Setup
Clicking the Import/Export Setup command on the side menu will show the Import/ Export Setup screen that allows for downloading the current configuration of the miSAND Series as a file. This screen also allows for uploading a saved configuration file (named vault.bin by default). The configuration file is necessary to restore the configuration and virtual disks in the event of a firmware upgrade.

Cybernetics

UM-MD-ST

L4-1103

31

Using the IP SAN Disk Manager

3.3.0.1 Download Current Configuration


1. Click Import/Export Setup on the side menu.

2. Underneath Download Current Configuration will be the words, Click here to download the current configuration. Click the here link.

3. A screen will open up which asks what to do with this file. Press the OK button in Firefox or the Save button in Internet Explorer.

Firefox

Internet Explorer

Cybernetics

UM-MD-ST

L4-1103

32

Using the IP SAN Disk Manager

4. Browse a location to save the configuration file. The file may be renamed as long as the new name has the .bin ending. Press the Save button to save the file.

5. Press the Close button (Internet Explorer) or the Window Close X for Firefox.

Internet Explorer

Firefox

Cybernetics

UM-MD-ST

L4-1103

33

Using the IP SAN Disk Manager

3.3.0.2 Upload Saved Configuration

Caution
Follow these steps only after upgrading firmware, or being advised by Technical Support to do so.
Follow these steps only after upgrading firmware, or being advised by Technical Support to do so. 1. Click Import/Export Setup on the side menu.

2. Click the Browse... Button underneath Upload Saved Configuration.

Cybernetics

UM-MD-ST

L4-1103

34

Using the IP SAN Disk Manager

3. Browse to the folder containing the vault.bin file, and after highlighting the file, press the Open button.

4. Press the Upload Setup button.

5. The Import/Export Setup screen will now report that that the configuration has been changed. Restart the [Model] for the changes to take effect.

Cybernetics

UM-MD-ST

L4-1103

35

Using the IP SAN Disk Manager

3.3.1 Network Parameters


Clicking the Network Parameters command on the side menu will show the Network Parameters screen that allows for changing the network parameters.

1. Click Change to the right of Administrative LAN Interface.

2. Enter the parameters for your network. Select Delay until boot? to avoid having to login immediately using the new network parameters.

Cybernetics

UM-MD-ST

L4-1103

36

Using the IP SAN Disk Manager

3. Select 9000 MTU only if the server that will be connecting to the miSAN-D is capable of Jumbo Frames.

Important
If 9000 MTU (jumbo frames) is selected in the miSAN-D, 9000 MTU must be set across the entire network path.

4. Click Save Changes. 5. Click Change to the right of Data Interface #1.

6. Enter the parameters for the network. 7. Select 9000 MTU only if the server that will be connecting to the miSAN-D is capable of Jumbo Frames. If 9000 MTU (jumbo frames) is selected in the miSAN-D, 9000 MTU must be set across the entire network path. 8. Click Save Changes.

Note
After changing the Data Interface network parameters and clicking "Save Changes", the changes will take effect immediately.
9. Repeat steps 7 - 10 for each remaining Data Interface. Note the following details about the network parameters: IP (Address): An unused IP Address in dot-quad notation (nnn.nnn.nnn.nnn) Netmask (Subnet): The Subnet mask for the network in dot-quad notation (nnn.nnn.nnn.nnn). MTU: Choose 1500 or 9000 for the MTU packet size.

Cybernetics

UM-MD-ST

L4-1103

37

Using the IP SAN Disk Manager

10. Click Change to the right of the Global Parameters settings to change the network parameters that are common to the five interfaces.

Note the following details about the Global parameters: Default Route (Gateway): IP Address for the network gateway server. NTP Server: Allows for entering the IP Address of a Network Time Protocol (NTP) server, in dot-quad notation (nnn.nnn.nnn.nnn). The miSAN-D Series will synchronize the date and time with the NTP server. Go to http://www.ntp.org/ for a list of local NTP servers. Make sure the miSAN-D Series can access the NTP port 123 through any mediating firewalls. Nameserver 1/2: IP Address for a Domain Name Service (DNS) server in dot-quad notation (nnn.nnn.nnn.nnn). iSNS Server: A server that is running Internet Storage Name Service (iSNS) provides discovery services of iSCSI devices in a storage area network (SAN). ARP: (Address Resolution Protocol) The default is Yes. Do not change this unless you understand ARP and need to change the behavior for a particular network setup.

11. Enter the parameters for your network, and then click Save Changes.

Cybernetics

UM-MD-ST

L4-1103

Note
Be careful when making changes to network parameters. Make sure network settings will not render the unit unreachable on the network. If the miSAN-D becomes unreachable on the network, you can reset the network parameters to their default values using the network reset button on the rear panel. To perform the reset, while the miSAN-D is powered-on, first, insert a #0 Phillips screwdriver or paper clip into the network reset button hole on the rear panel. Then, press and hold down the reset button for 8 seconds. The miSAN-D will then restart. Afterward, you may change the network parameters from their default values.

Important
Avoid having multiple NICS with the same subnet on a host or server.

3.3.1.1 Firewall Settings


1. Select Network Parameters from the Side Menu of the Main Page.

2. Click on Firewall Parameters Change at the bottom of the Network Parameters page to enter the firewall settings menu.

3. To enable the Firewall settings, click on the Firewall Enabled check box.

UM-MD-ST

L4-1103

Cybernetics

Using the IP SAN Disk Manager

39

4. Click on each box needed and then press Save Changes. The firewall changes will take effect on the next [Model]-Series reboot.

3.3.2 Firewall Technical Notes


Enabling iSCSI on an Ethernet port allows an iSCSI Initiator to perform an iSCSI Login and establish an iSCSI Connection on that port. If Failover will be used, then Allow iSCSI should not be enabled for the Admin port. If Replication is enabled, then Allow iSCSI should be enabled for the Admin port. Enabling HTTP on an Ethernet port allows a web browser to access the web interface and perform administrative actions on that port. Enabling ICMP Echo on an Ethernet port allows a host to "ping" the unit on that port. Regardless of individual Firewall settings, DNS and NTP packets are always allowed so that the unit can get the responses to its DNS and NTP queries. If the Firewall is enabled, all outgoing ICMP messages are blocked (except for Echo Reply messages for each interface having ICMP Echo enabled). This hides the unit from many types of port-scanning attack. The Firewall will not allow you to disable all HTTP ports. It will automatically enable the admin port if no choices are set. It is often beneficial to have HTTP available on some or all of the Data Ports.

3.3.3 E-mail Parameters


The [Model] is capable of sending system emails to an e-mail address of your choice. 1. Select Network Parameters from the Side Menu of the Main Page.

UM-MD-ST

L4-1103

Cybernetics

40

Using the IP SAN Disk Manager

2. Press Change to the right of E-mail Parameters.

3. Enter the SMTP server address in numeric form (i.e. 192.168.1.100). 4. Enter the Admin e-mail address and then press Save Changes.

5. Click on the Back link.

3.4 Direct-Attach Ports

This screen allows you to define ports on this unit suitable for use in direct-attach configurations. In a direct attach configuration, virtual disks on the miSAN-D are treated as SCSI hard drives by

Cybernetics

UM-MD-ST

L4-1103

Using the IP SAN Disk Manager

41

a host. This menu option only appears in units which are equipped with direct-attach capable ports.

3.5 Physical Devices

The Physical Devices item in the side menu brings up the Physical Disk Information screen, which shows all locally-attached devices connected to this SANDR unit. Each logical disk the miSAN-D Series detects from the disk arrays will be listed, as well as any SCSI devices.

UM-MD-ST

L4-1103

Cybernetics

42

Using the IP SAN Disk Manager

3.5.1 RAID Settings


Use the RAID Settings link on the side menu of the Physical Disk Information page to open the RAID Storage Manager. See Chapter 7 Using the RAID Storage Manager on page 99Chapter 7 Using the RAID Storage Manager on page 99. 1.

3.5.2 Reattach Tape Drive to Stacker


This menu allows you to associate a Standalone Tape Drive with a Tape Library. 1. Click the reattach link for the Tape drive associated with the Tape Library.

2. Select the Associated Stacker (Tape Library) from the drop-down menu.

Cybernetics

UM-MD-ST

L4-1103

Using the IP SAN Disk Manager

43

3. Press Save Changes.

3.5.3 iSCSI Devices


Use this feature to make an iSCSI connection to an iSCSI backup device such as a miSAN-V or iSCSI enabled library. 1. Click on the Add iSCSI-Attached Device Button.

2. Enter the Remote Host IP, Username, Password and Target name and press save.

UM-MD-ST

L4-1103

Cybernetics

44

Using the IP SAN Disk Manager

3. After successfully connecting to the remote iSCSI device, return to the previous page or choose to add another iSCSI-Attached device or delete the device.

3.6 Job Monitor

The Job Monitor allows you to view the status of jobs and Cancel the job(s).

Cybernetics

UM-MD-ST

L4-1103

Using the IP SAN Disk Manager

45

3.7 Portable Disk Backup


3.7.1 Offload/Restore from External USB/ SATA Drive Caution
A USB or eSATA drive must never be connected during the booting of the miSAN-D unit. Connect the external drive ONLY after Boot.

Important
All data on target USB or eSATA drive will be overwritten.

The miSAN-D Series allows offload or restore to/from a USB or eSATA Hard Drive as long as the external hard drive is larger than the virtual disk being offloaded. Best practice would be to partition the external hard drive to the same size as the virtual disk. For Offload to a tape drive or library see Backup / Restore Steps on page 66. In order to initiate an offload/restore, click Offload on the side menu. This will bring up a menu which will say Please attach an offload disk to continue.

It may take a couple of seconds for the unit to recognize that an external drive has been attached. Just refresh the Offload page every couple of seconds until the vdisk selection list appears. Once the external drive is recognized, a drop-down menu will appear which allows a choice of virtual disks.

3.7.1.1 Offload a Virtual Disk to an external


UM-MD-ST L4-1103 Cybernetics

46

Using the IP SAN Disk Manager

Hard drive

Important
All data on target hard drive will be overwritten.

1. Choose a virtual disk from the drop-down menu that is equal or lesser in size than the external (offload) disk.

2. Click on the Offload button. In order to see the transfer progress, refresh the page. The entire Virtual Disk will be copied to the external drive, so the external hard drive size should be greater than the Virtual Disk size (not the amount of data populating the Virtual Disk file system, which is irrelevant). If the external drive is not big enough, the unit copies as much as it can, but the resulting integrity of the copy is not guaranteed.

Note
The total length of cable between an eSATA drive and the source should be no longer than 6 ft. Since the internal cabling is approximately 2 ft. long, the external cable should be no longer than 4 ft. long. Data Corruption can result from using longer cable lengths.

3.7.1.2 Restore a Virtual Disk from an external Hard Drive


1. Choose a virtual disk from the drop-down menu that is equal or larger in size than the external (offload) disk.

2. Click on the Restore button. In order to see the transfer progress, refresh the page. The entire contents of the External Drive will be copied to the Virtual Disk, so the Virtual Disk size should be greater than the External Hard Drive size (not the amount of data populating the Vir-

Cybernetics

UM-MD-ST

L4-1103

Using the IP SAN Disk Manager

47

tual Disk file system, which is irrelevant). If the Virtual Disk is not big enough, the unit copies as much as it can but the resulting integrity of the copy is not guaranteed.

Note
The total length of cable between an eSATA drive and the source should be no longer than 6 ft. Since the internal cabling is approximately 2 ft. long, the external cable should be no longer than 4 ft. long. Data Corruption can result from using longer cable lengths.

Important
The restore process will overwrite any data stored on the Virtual disk.

3.8 Shutdown/Restart

Clicking the Shutdown/Restart command on the side menu will show a screen used to shutdown or restart the miSAN-D Series: Log off any iSCSI connections to the unit and disable Failover before shutting down or restarting. When Shutdown is clicked, the miSAN-D Series will terminate the connection to the IP SAN Disk Manager Console and safely shut down the operating software and hardware.

Caution
Failure to follow proper shutdown procedures can result in an undefined state which may involve loss of data. Log off all iSCSI connections and disable Failover before shutting down the unit. Always use the menu to shut down the unit.

UM-MD-ST

L4-1103

Cybernetics

48

Using the IP SAN Disk Manager

When Restart is clicked, the miSAN-D Series will perform the same shutdown routine explained above, however the operating software and hardware will reboot. The entire restart process takes about 2 minutes to complete.

Caution
A USB or eSATA drive must never be connected during the booting of the miSAN-D unit. Connect the external drive ONLY after Boot.

3.9 Power Cycling


POWER CYCLING (or CYCLING POWER) is the act of turning the power off, and then turning it back on again -- usually after a brief waiting period. Although a POWER CYCLE can be done by simply unplugging the power cord(s) from a particular device, the preferred method is to use the device's main power switch (the location of which can vary). Because of the nature/design of most electronic devices and switching power supplies, "quick" power cycles are not recommended. A complete power drain can take several seconds once power has been "removed" from a device, and a quick cycle can sometimes cause that device to power-up in an indeterminate state (thus preventing it from functioning properly). In some rare cases, a device may even refuse to power ON again because the power supply was not left OFF for a sufficient amount of time. Therefore, in order to ensure a proper POWER CYCLE, the minimum OFF period recommended for the miSAN-D Series is 15 seconds.

3.10 Log Out


Logging out of the [Model] has no effect on the unit, other than to cease administrative access. Be sure to log out of the unit after each administrative session unless the computer being used for the session is in a secure location.

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

49

Chapter 4 Working with Virtual Disks


4.1 Virtual Disk Configuration
Clicking the Virtual Disks link on the side menu will show the Virtual Disk Configuration screen that lists all the virtual disks configured by the miSAN-D Series.

4.1.1 Copy Virtual Disk


Virtual Disk Copy allows the contents of one virtual disk to be copied to another virtual disk. The virtual disks can reside on the same miSAN-D Series or a separate miSAN-D Series. If a user has three miSAN-D Seriess, a virtual disk copy job can be initiated from

UM-MD-ST

L4-1103

Cybernetics

50

Working with Virtual Disks

miSAN-D Series # 1 that copies a virtual disk from miSAN-D Series # 2 to miSAN-D Series # 3. 1. Follow the directions in section 4.1.2 to create a virtual disk that is identical in size to a source virtual disk.

2. Click the Copy Virtual Disk link on the side menu bar. 3. Enter the information for the source and the destination

4. Press the copy button.

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

51

4.1.2 Add Virtual Disk


The following figure and steps explain how to add a virtual disk from the Virtual Disk Configuration screen. 1. Click the Add Virtual Disk link on the side menu bar.

2. Select which physical disk to use by clicking on the radio button. 3. Choose how much of the available free space you want to use for the virtual disk: To specify the size, select Gigabytes from the drop-down listbox, and then enter the desired size in the box to the left. To make a small virtual disk that is less than one GB, enter a decimal number such as .20 or .85 To select a percentage of the available space, select Percent from the drop-down listbox, and then enter the desired size in the box to the left.

3 4
4. Choose (Snapshots disabled), or select a percentage ranging from 10% to 90% from the Reserved for Snapshots pull-down menu.

Note
A percentage lower than 50% should only be used on a virtual disk that will have few changes or additions after the initial transfer of Data. Virtual Disks that will experience many data changes should have 50% or more reserved.
5. Click on Security Erase to ensure that an unformatted disk is presented to the Windows operating system. The "Security Erase" feature erases the first sector of a

UM-MD-ST

L4-1103

Cybernetics

52

Working with Virtual Disks

virtual disk at creation time which prevents data from a deleted Virtual Disk from appearing in a newly created Virtual Disk. 6. Click Save New Disk.

6 7
7. Click Continue on the side menu bar.

8. After creating the virtual disk, the initial Virtual Disk Configuration screen will reappear showing the new disk.

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

53

4.1.3 Delete a Virtual Disk


1. To delete a virtual disk, click the Delete command for the desired virtual disk from the Virtual Disk Configuration screen.

2. Click the Confirm Delete button.

A confirmation message will announce the permanent removal of the virtual disk.

4.2 Virtual Disk Properties


To access the Virtual Disk Properties for any Virtual Disk, click on the link located in the Virtual Disk Status section of either the Virtual Disk Configuration page or the Main Menu page.

UM-MD-ST

L4-1103

Cybernetics

54

Working with Virtual Disks

The options available depend on the configuration of the unit and the Virtual Disk.The remainder of this chapter will follow the order shown in the Virtual Disk Properties page.

4.2.1 Virtual Disk Property Instruction

locations
Alias

Configure A Virtual Disk Alias on page 54 Extend Virtual Disk Size on page 55 Snapshot Support Setup on page 70Snapshot Support

Extend Virtual Disk Size Snapshot Support Setup on page 70

Snapshot Support > Extend Snapshot Reservation Expansion on page 57 Scheduled Snapshots on page 75 Sync during failover? Scheduled Snapshots on page 75Scheduled Snapshots Configure Virtual Disk Sync Mode on page 58

Configure Virtual Disk Replication on page 81Configure Replication Virtual Disk Replication on page 81 Users IP Constraints Tape Operations Virtual Disk Users on page 59 IP-based Access Configuration on page 64 Backup / Restore Steps on page 66

4.2.2 Configure A Virtual Disk Alias


You can add an iSCSI Alias to a virtual disk using the Alias link in the Virtual Disk Properties of the desired virtual disk. The iSCSI Alias is an additional descriptive name for a virtual disk. This helps the user recognize a virtual disk at a glance, rather than discern its iSCSI Name (EUI). The miSAN-D Series sends the iSCSI Alias to logged-in iSCSI initia-

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

55

tors to be displayed to the user. This is useful only if the iSCSI initiator is capable of displaying iSCSI Aliases. 1. Click on the Alias link.

2. Enter the Alias.

3. Click on the Save Alias button. You will be returned to the Virtual Disk Properties page.

4.2.3 Extend Virtual Disk Size


With the new Dynamic LUN Provisioning feature, the storage administrator can add capacity to any server or application on the fly. This feature also supports spanning RAID sets, so as capacity expansion modules are added to an original iSAN or miSAN, any single virtual disk (LUN) can span to the newly added storage space. 1. Click on the link for the Virtual disk to be expanded.

UM-MD-ST

L4-1103

Cybernetics

56

Working with Virtual Disks

2. In the Virtual Disk Properties menu, click the Extend link on the size line.

3. Select which physical disk to use by clicking on the radio button. 4. Choose how much of the available free space you want to use for the virtual disk: To specify the size, select Gigabytes from the drop-down listbox, and then enter the desired size in the box to the left. To make a small virtual disk that is less than one GB, enter a decimal number such as .20 or .85 To select a percentage of the available space, select Percent from the drop-down listbox, and then enter the desired percent (must be equal or less than 100%) in the box to the left.

3 4
5. Press the Extend Virtual Disk button.

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

57

4.2.4 Snapshot Reservation Expansion


1. Click on the link for the Virtual disk to extend the Snapshot area.

2. In the Virtual Disk Properties menu, click the Extend link on the Snapshot Support line.

3. Select which physical disk to use by clicking on the radio button. 4. Choose how much of the available free space you want to use for the virtual disk: To specify the size, select Gigabytes from the drop-down listbox, and then enter the desired size in the box to the left. To make a small virtual disk that is less than one GB, enter a decimal number such as .20 or .85 To select a percentage of the available space, select Percent from the drop-down listbox, and then enter the desired percent (must be equal or less than 100%) in the box to the left.

3 4

UM-MD-ST

L4-1103

Cybernetics

58

Working with Virtual Disks

5. Press the Extend Snapshot Area button.

4.2.5 Configure Virtual Disk Sync Mode


It is possible to choose which Virtual Disks are synchronized during Failover. The default is for all Virtual Disks to be synchronized during Failover. 1. To change the settings for Sync during failover, click the link for the individual Virtual Disk and then click the link for Sync during failover?.

1a

1b

2. Keep the box checked to synchronize the virtual disk in Failover.

2 3

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

59

3. Press Save to save your change or Back to return to the Virtual Disk configuration menu without making any change.

4.2.6 Virtual Disk Users

Note
For the purpose of this manual, a "User" is any computer or server that uses a hardware or software iSCSI initiator to make an iSCSI connection to the miSAN.

Caution
Simultaneous connections from multiple initiators to a single virtual disk can lead to data corruption. Do not allow more than a single initiator to be connected to a virtual disk.
1. To setup Users for a virtual disk, click the link for the individual Virtual Disk and then click the link for Users.

UM-MD-ST

L4-1103

Cybernetics

60

Working with Virtual Disks

2. Click on the Add User link in the left-hand column.

3. Select Authenticated User or Anonymous User.

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

61

4. If an Authenticated User is selected, enter the desired username in the blank next to Username, and enter the desired password in the blank next to Password

Note
When choosing a username and password, remember the "Username" must be at least 1 alphanumeric character with no spaces or puctuation, and the "Password" must be between 12 and 16 alphanumeric characters to conform to the Microsoft CHAP standard for a "Target Secret". After entering the new "Username" and "Password," click "Save User". When configuring an iSCSI initiator, the "Username" and "Password" are used for the iSCSI CHAP logon "Name" and "Secret", as explained in Chapter 3.
5. A confirmation message will show the new authorized user. Click on Back to return to the virtual disk configuration page.

6. If Anonymous User is selected, enter the anonymous users IP address and Netmask. A range of addresses may be entered. Example: 192.168.0.0 .

UM-MD-ST

L4-1103

Cybernetics

62

Working with Virtual Disks

7. For either type of user, choose the type of access to the virtual disk you want the user to have:

Read/Write: The user has full access to the virtual disk. Read-only: The user will not be able to write to the virtual disk. Attempts to write/ save to a virtual disk as a Read-only user may seem successful, such that a copy or save operation may complete. However, no data will have been written to the virtual disk.

Note
If using a virtual disk in Microsoft Windows as a Read-only user, be aware that attempting to write to the virtual disk may result in a corruption error when the volume is dismounted. However, be assured, the volume has not been corrupted.
8. Click Save User when finished.

9. A confirmation message will show the new authorized user. Click on Back to return to the virtual disk configuration page.

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

63

4.2.6.1 Edit a User


The list of authorized users for a virtual disk is displayed by clicking Users for the desired virtual disk on the Virtual Disk Properties screen.

1. Click on Edit, to edit a user.

The Password and Access may be changed for an Authenticated user.

UM-MD-ST

L4-1103

Cybernetics

64

Working with Virtual Disks

The IP address, Netmask, and Access may be changed for an Anonymous user.

2. Enter your changes and click on the Save User button.

4.2.6.2 Delete a user


1. Click on Delete, to delete a user.

A confirmation message will appear.

2. Click Back to return to the Virtual Disk Configuration page.

4.2.7 IP-based Access Configuration


The miSAN-D Series provides access-control for virtual disks based on an iSCSI hosts IP Address. You can constrain, allow and deny, access to a virtual disk using the IP Constraints link of the desired virtual disk.

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

65

The following figure and steps explain how to add an IP-address constraint to virtual disk user from the Virtual Disk Configuration screen 1. Click the IP Constraints link of the desired virtual disk.

1
2. Click the Add Constraint command on the side menu bar to bring up the Add IP Access Constraint screen.

2 3 4 5
3. Enter the IP Address and Netmask for the iSCSI host. 4. Select Allow or Deny to give full or no access to the iSCSI host, respectively. 5. Click Save Constraint when finished.

4.2.7.1 Constraint for range of IP addresses


It may be desirable to allow only a select number of addresses from a whole subnet. Use the following steps. 1. Allow any addresses you want to have access. 2. After adding any Allowed addresses, add the Deny addresses. Ranges may be designated by placing a 0 or 255 in a quad. Example: IP 192.168.0.0 Netmask 255.255.0.0

4.2.7.1.1 Examples
To allow 192.168.6.200, but deny 192.168.6.x Allow 192.168.6.200 Deny 192.168.6.0 Netmask 255.255.255.255 Netmask 255.255.255.0

UM-MD-ST

L4-1103

Cybernetics

66

Working with Virtual Disks

To allow 192.168.6.x , but deny 192.168.6.200 Allow IP 192.168.6.0 Deny IP 192.168.6.200 Netmask 255.255.255.0 Netmask 255.255.255.0

To allow 192.168.x.x , but deny all else: Allow IP 192.168.0.0 Netmask 255.255.0.0

4.3 Virtual Disk Backup and Restore (Tape) Caution


The [Model] unit must be powered off before connecting a SCSI/SAS tape drive. Attaching a SCSI/SAS device to the [Model] while it is powered on can cause damage to the [Model] and the SCSI/SAS device.

Note
If the [Model] unit is part of a Failover Pair, you must break Failover before restoring a Virtual Disk from tape.
The miSAN-D Series is capable of backing up to and restoring from an internal tape drive ( 6 bay units only) and external tape drives and libraries. When a tape drive or library is attached and a tape is present in the drive, the Virtual Disk Configuration menu changes to include Offload and Restore for each virtual drive and snapshot. Restoring from a tape will overwrite any information on the virtual drive. A Virtual drive can be restored from a tape containing an offload from a Virtual drive or a snapshot. For instructions on offloading and restoring to/from external USB/eSATA drives, see Offload a Virtual Disk to an external Hard drive on page 45.

4.3.1 Backup / Restore Steps


1. If a tape drive is not attached to the miSAN-D Series, log off all iSCSI connections and shut down the unit. 2. Connect a tape drive and install a terminator on the tape drive if necessary. Turn on the tape drive. 3. Restart the miSAN-D Series. 4. Insert a tape into the tape drive. 5. Log onto the miSAN-D Series. 6. From the Side Menu, click Virtual Disks.

Cybernetics

UM-MD-ST

L4-1103

Working with Virtual Disks

67

7. Choose a Virtual Disk to Offload from or Restore to.

8. Choose Offload or Restore

9. Use the next screen to select the desired offload or restore device.

10. Use the dropdown menu to choose the device. 11. Select the slots available for the job. 12. Press Queue Restore or Queue Backup. The job details will appear. Refresh the page to track progress.

If the virtual disk is larger than the tape, you will be asked to insert another tape.

UM-MD-ST

L4-1103

Cybernetics

68

Working with Virtual Disks

Cybernetics

UM-MD-ST

L4-1103

Working with Snapshots and Replication

69

Chapter 5 Working with Snapshots and Replication


5.1 Snapshot Support Considerations Note
Take the first snapshot and set the change threshold before any planned, initial data migration to the Virtual Disk. If a data migration is planned, the change threshold should be set to a size approximately 2 Gb smaller than the snapshot allotment size. Make an archive backup copy of the volume as it exists just prior to initial migration to the SAN virtual disk.
Snapshots are one of the most convenient forms of restoration operations. Cybernetics D series SANs have a snapshot capability that is optimized for data protection while using minimal disk space. Snapshot reservation is determined when the virtual disk is created. The snapshot reservation can range from 10% to 90% of the total virtual disk. Cybernetics recommends at least a 50% snapshot reservation for normal use, which halves the available live storage capacity. The snapshot threshold feature in conjunction with with scheduled snapshots can be used to ensure that snapshots are taken on a manageable schedule that is not only defined by time, but by the amount of data that has been changed since the last snapshot. If the initial allocation proves inadequate, it can be extended (See Extend Snapshot Allocation on page 80). A fundamental understanding of how snapshots function is imperative to making an informed decision about snapshot reservation size. Snapshots function as non-quiesced (change is not stopped for the snapshot), restore points of the volume. To minimize the amount of space required to store restore points images of your entire volume, they only contain the data that has changed since the last snapshot. Therefore, a virtual disk with large amounts of data change between snapshots will have larger individual snapshots.

UM-MD-ST

L4-1103

Cybernetics

70

Working with Snapshots and Replication

Snapshots, while providing mount points of stable data, do not exist forever. Once the snapshot reservation approaches capacity, the SAN will overwrite the oldest snapshot. Ensure that a snapshot does not grow larger than the snapshot capacity. Practices for preventing this include, but are not limited to : Setting Snapshot Thresholds Using Scheduled Snapshots

Example 1: A user creates a 100 GB virtual disk with a 20% snapshot reservation. The user formats the virtual disk, adds 16 GB of data, and takes a snapshot. Initially the snapshot will be approximately .06 MB. The user then adds 10 GB of data, as the data is transferred, the initial snapshot grows to reflect the change in data. When the user takes a second snapshot, the first snapshot will be roughly 10 GB, and the new snapshot will be .06 MB

5.2 Snapshot Support Setup


Click the Virtual Disks link on the side menu to show the Virtual Disk Configuration screen that lists all the virtual disks configured by the miSAN-D Series.

Note
Take the first snapshot and set the change threshold before any planned, initial data migration to the Virtual Disk. If a data migration is planned, the change threshold should be set to a size approximately 2 Gb smaller than the snapshot allotment size. Make an archive backup copy of the volume as it exists just prior to initial migration to the SAN virtual disk.
1. To create and manage Virtual disk snapshots, click the link for the individual Virtual Disk.

Cybernetics

UM-MD-ST

L4-1103

Working with Snapshots and Replication

71

2. Take note of the Snapshot Allotment size and then click the link for Snapshot Support.

Snapshot Allotment

3. Enter a title for the initial snapshot, and click Snapshot Now.

4. The Snapshot Management will now show the snapshot information for the virtual disk. Enter a threshold size in Gigabytes that is at least 2 Gigabytes less than the snapshot allotment size.

Threshold size should be at least 2 GB smaller than the Snapshot Allotment

Snapshot Allotment

5. Press the Set Threshold button after entering the threshold size. 6. Begin the initial data migration.
UM-MD-ST L4-1103 Cybernetics

72

Working with Snapshots and Replication

7. Take a snapshot immediately after the migration completes to establish a mount point to the original data state. This snapshot will be the first usable mount point. The threshold size can be changed at any time. If the Threshold feature is not to be used, it can be disabled by entering 0 in the Threshold box, but careful management of the snapshots will be required in order to avoid completely filling the snapshot allotment.

5.2.1 Mount and Unmount snapshot


Mounting a snapshot makes it possible to view and copy files that have been changed or deleted from a Virtual Disk. 1. To mount the snapshot, click on the Mount link.

The snapshot can now be connected to with an iSCSI initiator in order to copy files that may have been deleted or changed. The snapshot is read-only.

Caution
Do not use iSCSI to log into both the Virtual Disk and its snapshot(s) simultaneously from the same computer unless the computer is running Windows 2008 Server. Do not use iSCSI to log into more than one snapshot of a Virtual Disk at a time, unless the computer is running Windows 2008 Server.
Refer to the following chart to determine which Operating Systems have the ability to make iSCSI connections to mounted snapshots.

Cybernetics

UM-MD-ST

L4-1103

Working with Snapshots and Replication

73

2. To unmount the Snapshot, click the Unmount link.

5.2.2 Rollback Snapshot


Rollbacks will revert the virtual disk to the point in time that the snapshot was taken. 1. To Rollback a Snapshot, click on the Rollback link.

2. To return to the Virtual Disk Configuration page, click on the Back link.

5.2.3 Offload Snapshot


To Offload a snapshot, a tape drive or USB/eSATA Disk Drive must be connected to the miSAN-D Series. To offload to a Tape Drive, a tape must be placed in the tape drive. The offload process may take some time depending on the size of the snapshot and the type of drive and tape. 1. Click Offload to tape or Offload to disk.

UM-MD-ST

L4-1103

Cybernetics

74

Working with Snapshots and Replication

2. Select the Offload device and press the Queue Offload Button.

3. Press Back when the offload is finished. If necessary, press Cancel to end the job before it is finished. If the offload is larger than the tape size you will be prompted to change the tape unless you are using a library. To monitor the job progress, navigate to the Job Monitor page from the Main Menu.

5.2.4 Restore from a Snapshot


To restore from a snapshot, a tape drive or USB/eSATA Disk Drive must be connected to the miSAN-D Series. To restore from a Tape Drive, a tape containing the snapshot must be placed in the tape drive. The upload process may take some time depending on the size of the snapshot and the type of drive and/or tape. The uploaded Snapshot will overwrite any data on the virtual disk.

5.2.4.1 Restore from a Snapshot located on a

Tape Drive

To restore a Virtual Disk from a Snapshot located on a Tape Drive, follow the directions in Restore from a Snapshot located on a Tape Drive on page 74.

5.2.4.2 Restore from a Snapshot located on an

External Hard Drive

To restore a Virtual Disk from a Snapshot located on an External Hard Drive, follow the directions in Offload/Restore from External USB/SATA Drive on page 43.

Cybernetics

UM-MD-ST

L4-1103

Working with Snapshots and Replication

75

5.3 Scheduled Snapshots


1. To create and manage Virtual disk snapshots, click the link for the individual Virtual Disk and then click the link for Scheduled Snapshots.

2. In the Scheduled Snapshots section, choose either Disabled, Hourly, Daily, or Monthly. a. Disabled- Select Disabled and press Save Schedule.

b. Hourly- Choose the time each hour to take a Global snapshot. (More than one timeslot may be chosen) and press Save Schedule.

UM-MD-ST

L4-1103

Cybernetics

76

Working with Snapshots and Replication

c. Daily- Choose the Time and Day(s) to take a Global Snapshot and press Save Schedule.

d. Monthly- Choose Time and Date(s) and press Save Schedule.

5.3.1 Automatic Offload


For Hourly, Daily, and Monthly Snapshots, Automatic Offload can be enabled. This option will automatically offload the latest snapshot to a tape drive or library attached to the [Model_name]. 1. Click on the Enabled button. 2. Choose the snapshot offload device (Tape Drive or Library).

Cybernetics

UM-MD-ST

L4-1103

Working with Snapshots and Replication

77

3. If the device is a standalone tape drive, you will be required to manually load and remove tapes during the job.

5.4 Global Snapshots


When at least one Virtual Disk with snapshot support is created, Global Snapshots can be scheduled. A global snapshot will take a snapshot of every virtual disk that has snapshot support. Use caution with this feature, as it has the potential to exceed the storage ability of individual Virtual Disks if too many snapshots are scheduled. For individual snapshots see Snapshot Support Considerations on page 69.

Note
Take the first snapshot(s) only after any planned, initial data transfers to the Virtual Disk(s). The size (but not the content) of a snapshot is determined by the amount of data that is added or changed before the NEXT snapshot is taken. Exceeding the storage space allotted for snapshots will cause snapshot support to be ended for that Virtual Disk.
1. To create and manage Global snapshots, click the Global Snapshots link on the Virtual Disk Configuration page.

The Reset Schedule button returns to the last saved schedule. The Save Schedule button saves the current configuration.

UM-MD-ST

L4-1103

Cybernetics

78

Working with Snapshots and Replication

2. In the Scheduled Global Snapshots section, choose Disabled, Hourly, Daily, or Monthly.

a. Disabled- Select Disabled and press Save Schedule.

b. Hourly- Choose the time each hour to take a Global snapshot. (More than one timeslot may be chosen) and press Save Schedule.

Cybernetics

UM-MD-ST

L4-1103

Working with Snapshots and Replication

79

c. Daily- Choose the Time and Day(s) to take a Global Snapshot and press Save Schedule.

d. Monthly- Choose Time and Date(s) and press Save Schedule.

5.4.1 Automatic Offload


For Hourly, Daily, and Monthly Global Snapshots, Automatic Offload can be enabled. This option will automatically offload the latest snapshot to a tape drive or library attached to the [Model_name]. 1. Click on the Enabled button. 2. Choose the device (Tape Drive or Library) for the snapshots to be offloaded to.

UM-MD-ST

L4-1103

Cybernetics

80

Working with Snapshots and Replication

3. If the device is a standalone tape drive, you will be required to manually load and remove tapes during the job.

5.4.2 Extend Snapshot Allocation


1. Click the link for the Source Virtual Disk and then click the link for Snapshot Support.

2. Click the Extend link.

3. Choose a physical disk and the amount of space to use. 4. Press the Extend Snapshot Area button.

Cybernetics

UM-MD-ST

L4-1103

Working with Snapshots and Replication

81

5.5 Configure Virtual Disk Replication


The miSAN-D Series supports Replication between a source virtual disk and a replica virtual disk on a separate unit through the use of snapshots. 1. Create identical virtual disks with snapshots enabled on two separate units. 2. If the disk to be replicated is already in use, create an identically sized virtual disk on the second unit. Snapshots must be enabled on both virtual disks. Log off any iSCSI connections to the original virtual disk. 3. Assure that the source unit is the only host able to connect to the target virtual disk by adding an authenticated user with password to the destination virtual disk or using IP constraints. 4. Click the link for the Source Virtual Disk and then click the link for Snapshot Support.

5. Click the link for Snapshot Support.

6. Enter a name for the initial snapshot and then press the Snapshot Now button.

UM-MD-ST

L4-1103

Cybernetics

82

Working with Snapshots and Replication

7. Enter a number in Gigabytes as a snapshot threshold. This value can be changed at any time. Use this feature to automatically take a snapshot after a set amount of data has been processed.

8. Click on the Back link to return to the Virtual Disk Properties menu.

9. Click on the Replication link.

10. Press the Add Replication Target button.

11. Enter the Replica Virtual Disk Information including Bandwidth limit (default is Unlimited) and press Continue. Note that the IP address used can be the Administration Port of the Remote Host.

Cybernetics

UM-MD-ST

L4-1103

Working with Snapshots and Replication

83

12. If the settings are incorrect, or the virtual disk is not available, a message similar to below will appear and you will need to enter the correct information.

13. If the settings are correct, but one of the connections on the miSAN-D are down, then you may get a message similar to below. Check the connections.

14. When the connections are correct, the target will appear in the Replication Targets list.

15. A virtual disk can be replicated on multiple units. Repeat steps 10-14 for each Replication Target. 16. Press the Back link to go back to the Virtual Disk Configuration page.

17. The Virtual Disk Configuration page for the source virtual disk will show the IP and name of the replica virtual disk. Click on Snapshot Support link.

UM-MD-ST

L4-1103

Cybernetics

84

Working with Snapshots and Replication

18. Enter a title for this snapshot, and click Snapshot Now.

19. Click the Back Link.

20. The status line of the Virtual Disk Properties page will show a status of Replicating.

When the initial replication is complete, you may connect to the Source virtual disk with an iSCSI initiator. Do not connect to the Replica virtual disk unless there is a failure of the Source virtual disk or data needs to be recovered from the replica. 21. Repeat steps 16-19 each time you want to manually update the replicated disk. Use scheduled snapshots to automate the replication process based on scheduled time/ date. Use snapshot threshold to automate the replication based on amount of data transfer. The replica disk is updated each time a snapshot is taken, whether Immediate or scheduled. If it becomes necessary to end replication, simply delete the replication target.

Cybernetics

UM-MD-ST

L4-1103

Working with Snapshots and Replication

85

5.6 Delete a Replication Target Note


Deleting a replication target does not delete the target virtual disk or any information on the virtual disk. The target is removed from the Replication Targets list. However, deleting the replication target when the status of the virtual disk is Replicating will cause the status to stay that way until another Replication Target is provided.
1. Log off any iSCSI connections to the source and target virtual disks. 2. To delete a replication target for a virtual disk, click the link for the individual Virtual Disk and then click the link for Replication.

3. Click on the Delete link to delete the target virtual disk from the Replication Targets list.

UM-MD-ST

L4-1103

Cybernetics

86

Working with Snapshots and Replication

Cybernetics

UM-MD-ST

L4-1103

87

Extra Menu Features

Chapter 6 Extra Menu Features


Extra Menu Features Logging onto the miSAN-D Series using * at the end of the username (i.e. admin*) will show two extra menu items, Maintenance and Failover. Details on the Maintenance feature can be found on the following page. Failover Instructions are located in Failover (High-Availability) Setup on page 92 .

Cybernetics

UM-MD-ST

L4-1103

88

Extra Menu Features

6.1 Maintenance
To initiate maintenance, click Maintenance in the left menu of the main page.

The Maintenance page allows for Multi-Unit Management, Downloading of Internal log, Audio Beacon, and setting the Date/Time.

Cybernetics

UM-MD-ST

L4-1103

Extra Menu Features

89

6.1.1 Temperature Monitoring

This screen displays the temperature history for this unit.

6.1.2 Multi Unit Management


Multi-Unit Management allows you to perform management operations on multiple [Model] units from one Master unit. This feature is not recommended for use with Failover. To set up Multi-Unit Management, make sure each [Model] has its own unique IP address(es) (i.e. both units can not have 192.168.1.1 as the ETH0 IP address). Follow these steps. 1. Log onto each [Model] and enter the Maintenance menu. 2. Type in the name of the unit and press set.

3. Log off each unit except the Master.

UM-MD-ST

L4-1103

Cybernetics

90

Extra Menu Features

4. On the Master Unit, type in the IP address of a new unit. A drop down menu will appear with the name of each unit for which you enter an IP address.

5. Select a unit from the drop down menu and press Go.

6. Log into the unit. Now you will be able to use the drop down menu to switch between units. 7. In some cases you may need to refresh the page in order to see the drop-down menu for the first time.

6.1.3 Download Internal Log


Cybernetics Technical Support may request that you download the Internal Log to assist in troubleshooting. In the Download Internal Log section, click where it says, Click here to download the internal log. (see screenshot). A file download message will appear.

Cybernetics

UM-MD-ST

L4-1103

Extra Menu Features

91

Save the file (explog.bin) and email it to Cybernetics Technical Support at [email protected]

6.1.4 Audio Beacon


The Audio Beacon is provided to help locate the unit in a server environment.

6.1.5 Current Date / Time


Use this menu item to make changes to the current date and time.

UM-MD-ST

L4-1103

Cybernetics

92

Extra Menu Features

6.2 Failover (High-Availability) Setup


The Cybernetics High Availability Feature (Failover) requires two identical miSAN-D Series and synchronizes them so that if one unit loses connection, the other unit will take over. This process is possible because High-Availability synchronization turns the Slave into a complete copy of the Master. Any Virtual disk activity on the Master is duplicated on the Slave. 1. Connect both miSAN-D units to a UPS. 2. Log off all iSCSI connections.

Note
It is best to set up the virtual disks after synchronizing the units.

3. Save your settings by using the Import/Export Setup from the miSAN-D series main menu on each unit. 4. Connect a host to Admin of the Master and Admin of the Slave. 5. Log into each miSAN-D Series. 6. Access the RAID settings on each unit. Verify that the RAIDs on both miSAN-D Series are exactly the same. If changes are made to the RAIDs, it will be necessary to restart the units. 7. Set the IP addresses for each unit using the following rules: The first three Quads on each matching Data Interface (example: ETH 2 of Unit 1 and ETH 2 of Unit 2) must be identical. (example: 192.168.3.1 and 192.168.3.2) The fourth Quad on each matching Data Interface (example: ETH 2 of Unit 1 and ETH 2 of Unit 2) must be different. (example: 192.168.3.1 and 192.168.3.2) The third Quad on each Data Interface of a unit must be different (i.e. each Data Interface of a miSAN-D must be in a different subnet)(example: 192.168.2.1, 192.168.3.1, 192.168.4.1 and 192.168.5.1)

Example One ETH 0 Unit 1: 192.168.1.1 Unit 2: 192.168.1.2 Example Two ETH 0 ETH1 ETH 2 ETH 3 192.168.4.1 192.168.4.2 ETH 4 192.168.5.1 192.168.5.2 ETH1 192.168.2.1 192.168.2.2 ETH 2 192.168.3.1 192.168.3.2 ETH 3 192.168.4.1 192.168.4.2 ETH 4 192.168.5.1 192.168.5.2

Unit 1: 157.147.5.40 157.147.2.20 157.147.6.1 Unit 2: 157.147.5.44 157.147.2.21 157.147.6.2

Cybernetics

UM-MD-ST

L4-1103

Extra Menu Features

93

8. Connect a shielded CAT-5e Ethernet cable from ETH 3 of one miSAN-D Series to ETH 3 of the other miSAN-D Series. 9. Connect another shielded CAT-5e cable from ETH 4 of one miSAN-D Series to ETH 4 of the other miSAN-D Series. 10. Connect Network data ports on each unit (ETH1 and optionally, ETH2) and the Host, to a Network Switch.
Switch Unit 1 (Master) Eth0 Eth3 Eth 4 Eth1 Eth2

Unit 2 (Slave) Eth0 Eth3 Eth 4 Eth1 Eth2

Legend Admin Data Failover

Switch or Hub

Host

5 port Failover Setup

11. Login to the Master unit, adding * to the username.

Caution
Enable Failover on the Master unit ONLY. Enabling Failover on the Slave unit will cause data on the Master unit to be overwritten.
12. Click Failover in the left menu of the main page of the Master unit.

UM-MD-ST

L4-1103

Cybernetics

94

Extra Menu Features

13. Click the Enable Failover Button on the Master unit.

The above message will now say Failover has been initiated for this unit. Please wait while the disks are synchronized. 14. After a few seconds, refreshing the page will show a synchronization progress bar. Refresh the page to update the progress bar. If there are no virtual disks setup, there will be no progress bar.

15. When the sychronization is complete, a message will show the status of the unit (Master or Slave) and the peer status..

6.2.1 Changing Status


The Slave unit may be changed to Master status by entering the Failover Support page and clicking where it says, Click here to request a transition to Master status.

Cybernetics

UM-MD-ST

L4-1103

Extra Menu Features

95

The message will change as shown below.

6.2.2 Disabling High Availability:


1. To separate two paired High Availability units for independent operation, log in to Master unit via the Admin Interface. You must place an asterisk immediately after the usual Username for the Failover page to be offered. 2. Click on Failover. On the Failover Support page, click on Disable Failover. 3. After several seconds, the units will come up as independent units using their originally configured IP addresses. 4. Combining the units as a failover pair once again will require another synchronization operation.

6.2.3 Unit Maintenance


If either unit in a Failover Pair needs to be shut down for maintenance, log onto the Master and use the Shutdown feature of the Main Menu. Both units will shut down. After the maintenance is completed, start both units simultaneously. Failover will be restored.

6.2.4 Failover Recovery


Recovery procedures vary depending on whether the Master or Slave lose power; or if Failover ended without either unit shutting down. If a unit shuts down or loses power, the remaining unit will continue to act as the Master. It will be necessary to log off all iSCSI connections before synchronizing the units in order to ensure data integrity.

Note
Contact Technical Support for assistance if you are unclear on which recovery procedure to follow or if your situation does not match the following scenarios.

UM-MD-ST

L4-1103

Cybernetics

96

Extra Menu Features

Note
In the following sections, the Original Master will be referred to as Unit #1 and the Original Slave will be referred to as Unit #2.

6.2.4.1 Loss of Power to the Master


If the Master unit loses power, the Slave unit will take the Master role. 1. Log off all miSAN-D series iSCSI targets. 2. Log onto Unit #2 and disable Failover. 3. Adjust IP addresses if necessary. Restart unit(s) if IP addresses are changed. 4. Power up and log into Unit #1. 5. Enter the Unit #1 Network Parameters page and change the Network Addresses for ETH 1, ETH 2, ETH 3, and ETH 4 so they are different from Unit #2. 6. Log onto Unit #2 and initiate Failover. 7. Once Synchronization is complete, all iSCSI connections may be re-connected.

6.2.4.2 Loss of Power to the Slave


If the Slave Unit loses power, the Master unit will continue as Master. No adjustments to the Network Parameters will be necessary upon recovery. 1. Log off all iSCSI connections to the miSAN-D Series. 2. Log onto Unit #1 and disable Failover. 3. Power up and log into Unit #2. 4. Confirm that the IP addresses for the two units are unique. 5. Initiate Failover from Unit #1. 6. Once Synchronization is complete, all iSCSI connections may be re-connected.

6.2.4.3 Failover ends with both units still

running

In rare situations, such as a network switch malfunction, failover may end. In most cases the following steps will restore failover. 1. Log off all iSCSI connections to the miSAN-D Series 2. Log onto both units using the Administration Ports. 3. Confirm that the network settings are returned to the original settings. 4. If necessary, adjust the Network Addresses. 5. Re-start both units

Cybernetics

UM-MD-ST

L4-1103

Extra Menu Features

97

6. Initiate Failover from the unit that will be the Master. 7. Once Synchronization is complete, all iSCSI connections may be re-connected.

6.2.5 Failover Details


6.2.5.1 Physical Setup:
The intended master and slave units must be physically identical. The RAID setup on the master and slave units must be identical.

6.2.5.2 Port assignments:


Paired units each have one Administration LAN Interface, two Data ports, and two Crossover ports. The Administrative port is for the web interface only, and does not participate in Failover. The Data port(s) connect to a host computer through a network switch. The Crossover port(s) are directly connected between the master and slave units.

The port assignments are: Administrative port: Administrative LAN Interface (ETH 0) Data ports: Data Interface #1 (ETH 1) and Data Interface #2 (ETH 2) Crossover ports: Data Interface #3 (ETH 3) and Data Interface #4 (ETH 4)

6.2.5.3 IP Addresses During Paired Operation:


When the paired units reboot, some of their IP and MAC Addresses will be different. The Administrative LAN Interface of both units will remain unchanged. Administrator may log into each unit individually, as before. The

The Crossover port(s) will have internal IP Addresses that have no relation to their previous (unpaired) Addresses. Since the units' Crossover ports are directly connected to each other, these Addresses are of no interest to external hosts. If the IP address for ETH 1 or ETH 2 must be changed, be sure to change it in the Paired Interface and Unpaired Data Interface sections of the Network Parameters menu.

6.2.5.4 Behavior During Paired Operation:


When operating as a Failover pair, certain administrative operations will be propagated to the other paired unit. These include the Shutdown and Restart directives.

UM-MD-ST

L4-1103

Cybernetics

98

Extra Menu Features

Any changes made to the virtual disks on either the Master or Slave will be duplicated on the other unit. The exception to this is disk restore. You must end Failover before restoring a Virtual disk from tape.

Note
You must end Failover before restoring a Virtual Disk from tape.

Cybernetics

UM-MD-ST

L4-1103

99

Using the RAID Storage Manager

Chapter 7 Using the RAID Storage Manager


Using the RAID Storage Manager The SAS RAID controller offers a web-based GUI interface that allows for viewing the status of and managing the controller and associated disk drives remotely.

7.1 Browser Requirements


The RAID storage manager is firmware-based utility, which is accessible via the web browser installed on your operating system. The web browser-based RAID storage manager is a HTML-based application, which utilizes the browser (IE, Netscape and Mozilla, etc.) installed on your monitor station.

7.2 Accessing From a Browser


There are three supported ways to access the RAID storage manager: 1. Through the miSAN-D Series Physical DevicesTools>Disk Storage menu. 2. Through the port 888. 3. Through the onboard LAN port (Default IP Address: 192.168.1.100) Each method will bring up a dialog that asks for username and password. (The dialog box will vary in appearance depending on the OS and web browser). Type the User Name and Password. The RAID controller default User Name is admin and the Password is 0000. After entering the user name and password, press Enter key or press the OK button to access the SAS RAID storage manager

Cybernetics

UM-MD-ST

L4-1103

100

Using the RAID Storage Manager

Note
Whichever method is used to connect to the SAS RAID controller, the miSAN-D Series must be restarted in order for the changes to take effect.

7.2.1 Access through the miSAN-D Series

Side Menu

1. Log into the miSAN-D Series. 2. Click on the Physical Devices link on the side menu.

3. Click on the RAID Settings link.

4. Enter the Username and password.

7.2.2 Access Through Port 888


The SAS RAID controller runs a web server on its default HTTP port 888. To access the RAID storage manager, point the web browser to the miSAN-D Series hostname or IP address with the port 888. Examples include (using defaults): http://192.168.1.1:888 http://192.168.2.1:888

7.2.3 Access Onboard LAN


The SAS RAID controller can be accessed through the Onboard LAN using the default IP Address 192.168.1.100. This address is adjustable (see Ethernet Configuration on page 119).

Cybernetics

UM-MD-ST

L4-1103

101

Using the RAID Storage Manager

7.3 RAID Storage Manager


The RAID storage manager initial start-up screen displays the current configuration of your SAS RAID controller. It displays the Raid Set List, Volume Set List, and Physical Disk List. The RAID set information, volume set information, and drive information can also be viewed by clicking on the RAID Set Hierarchy screen. The current configuration can also be viewed by clicking on RAID Set Hierarchy in the main menu.

To display RAID set information, move the mouse cursor to the desired RAID set number, then click it. The RAID set information will appear. To display volume set information, move the mouse cursor to the desired volume set number, then click it. The volume set Information will display. To display drive information, move the mouse cursor to the desired physical drive number, then click it. The drive information will display.

7.4 Main Menu


The main menu shows all available functions, accessible by clicking on the appropriate link.

Cybernetics

UM-MD-ST

L4-1103

102

Using the RAID Storage Manager

7.5 Quick Function

The number of physical drives in the SAS RAID controller determines the RAID levels that can be implemented with the RAID set. You can create a RAID set associated with exactly one volume set. The user can change the RAID Level, Capacity, Initialization Mode and Stripe Size. A hot spare option is also created, depending on the exist configuration. Click the Confirm The Operation check box and click on the Submit button in the Quick Create screen, the RAID set and volume set will start to initialize. Initialization progress is shown in the Information > RAID Set Hierarchy portion of the menu.

Note
In Quick Create, your volume set is automatically configured based on the number of disks in your system. Use the Raid Set Functions and Volume Set Functions if you prefer to customize your volume set, or RAID 30/50/60 volume set.

7.6 Raid Set Functions


Use the Raid Set Function and Volume Set Function if you prefer to customize your volume set. Manual configuration can provide full control of the RAID set settings, but it will take longer to complete than the Quick Volume/Raid Setup configuration. Select the Raid Set Function to manually configure the RAID set for the first time or delete and reconfigure existing RAID sets. (A RAID set is a group of disks containing one or more volume sets.)

7.6.1 Create Raid Set


To create a RAID set, click on the Create Raid Set link. A Select The Drives For RAID Set screen is displayed showing the drive(s) connected to the current controller and enclosures. Click on the selected physical drives within the current RAID set. Enter 1 to 15 alphanumeric characters to define a unique identifier for a RAID set. The default RAID set name will always appear as Raid Set #.

Cybernetics

UM-MD-ST

L4-1103

103

Using the RAID Storage Manager

Click the Confirm The Operation check box and click on the Submit button on the screen; the RAID set will start to initialize. If you have available disk members, you can repeat above procedures to define another RAID set.

Note
To create RAID 30/50/60 volume, you need create multiple RAID sets first with the same disk members on each RAID set. The max no. disk drives per volume set: 32 for RAID 0/1/10(1E)/3/50/60 and 128 for RAID 30/50/60.

7.6.2 Delete Raid Set


To delete a RAID set, click on the Deleted Raid Set link. A Select The RAID Set To Delete screen is displayed showing all exist RAID sets in the current controller. Click the RAID set number that you want to delete in the select column on the delete screen. Then, click the Confirm The Operation check box and click on the Submit button in the screen to delete it. The volume sets included in the Delete RAID Set. It will be deleted

Cybernetics

UM-MD-ST

L4-1103

104

Using the RAID Storage Manager

by this action. But for the Raid 30/50/60, you need to delete the volumes belonging to those RAID sets.

7.6.3 Expand Raid Set


Instead of deleting a RAID set and recreating it with additional disk drives, the Expand Raid Set function allows the users to add disk drives to the RAID set that have already been created. To expand a RAID set: Select the Expand Raid Set option. Select the target RAID set by clicking on the appropriate radio button and pressing the Submit button..

Select the target disk by clicking on the appropriate check box(es).

Press the Submit button to start the expansion on the RAID set. The new additional capacity can be utilized by one or more volume sets. The volume sets associated with this RAID set appear for you to have chance to modify RAID level or stripe size. Follow

Cybernetics

UM-MD-ST

L4-1103

105

Using the RAID Storage Manager

the instruction presented in the Modify Volume Set to modify the volume sets; operation system specific utilities may be required to expand operating system partitions.

Note
1. Once the Expand Raid Set process has started, user can not stop it. The process must be completed. 2. If a disk drive fails during raid set expansion and a hot spare is available, an auto rebuild operation will occur after the RAID set expansion completes. 3. RAID 30/50/60 does not support the "Expand Raid set".

7.6.4 Activate Incomplete Raid Set


If one of the disk drives is removed in power off state, the RAID set state will change to Incomplete State. If the user wants to continue to operate the controller without poweroff the SAS RAID controller, the user can use the Activate Incomplete Raid Set option to active the RAID set. After the user completes this function, the Raid State will change to Degraded Mode and start to work.

To activate the incomplete the RAID set, click on the Activate Raid Set link. A Select The RAID SET To Activate screen is displayed showing all RAID sets existing on the current controller. Click the RAID set number to activate in the select column. Click on the Submit button on the screen to activate the RAID set that had a disk removed (or failed) in the power off state. The SAS RAID controller will continue to work in degraded mode.

7.6.5 Create Hot Spare


When you choose the Create Hot Spare option in the Raid Set Function, all unused physical devices connected to the current controller appear. Select the target disk by clicking on the appropriate check box. Click the Confirm The Operation check box and

Cybernetics

UM-MD-ST

L4-1103

106

Using the RAID Storage Manager

click the Submit button in the screen to create the hot spares. The Create Hot Spare option gives you the ability to define a global hot spare.

7.6.6 Delete Hot Spare


Select the target hot spare disk to delete by clicking on the appropriate check box. Click the Confirm The Operation check box and click the Submit button on the screen to delete the hot spares.

7.6.7 Rescue Raid Set


When the system is powered off in the RAID set update/creation period, the configuration possibly could disappear due to this abnormal condition. The RESCUE function can recover the missing RAID set information. The RAID controller uses the time as the RAID set signature. The RAID set may have different time after the RAID set is recovered. The SIGANT function can regenerate the signature for the RAID set.

7.6.8 Offline Raid Set


This function is for customer being able to unmount and remount a multi-disk volume. All hard drives of the selected RAID set will be put into offline state, spun down and fault LED

Cybernetics

UM-MD-ST

L4-1103

107

Using the RAID Storage Manager

in fast blinking mode. User can remove those hard drives and insert new hard drives on those empty slots without needing power down the controller.

Note
Once the RAID is put offline, EACH disk in the raid will need to be removed and inserted before the RAID will come back online. It may also be necessary tro restart the miSAN.

7.7 Volume Set Functions


A volume set is seen by the host system as a single logical device. It is organized in a RAID level with one or more physical disks. RAID level refers to the level of data performance and protection of a volume set. A volume set capacity can consume all or a portion of the disk capacity available in a RAID set. Multiple volume sets can exist on a group of disks in a RAID set. Additional volume sets created in a specified RAID set will reside on all the physical disks in the RAID set. Thus each volume set on the RAID set will have its data spread evenly across all the disks in the RAID set. The following is the volume set features for the SAS RAID controller. 1. Volume sets of different RAID levels may coexist on the same RAID set. 2. Up to 128 volume sets can be created in a RAID set. 3. The maximum addressable size of a single volume set is not limited to two TB, because the controller is capable of 64-bit LBA mode. However the operating system itself may not be capable of addressing more than two TB.

7.7.1 Create Volume Set (0/1/10/3/5/6)


To create volume set from RAID set system, move the cursor bar to the main menu and click on the Create Volume Set link. The Select The Raid Set To Create On It screen will show all RAID set number. Tick on a RAID set number that you want to create and then click on the Submit button.

Cybernetics

UM-MD-ST

L4-1103

108

Using the RAID Storage Manager

The new create volume set attribute allows user to select the Volume Name, RAID Level, Capacity, Greater Two TB Volume Support, Initialization Mode, Strip Size, Cache Mode, Tagged Command Queuing, SCSI Channel/SCSI ID/SCSI Lun.

Volume Name The default volume name will always appear as ARC-1680-VOL. You can rename the volume set providing it does not exceed the 15 characters limit.

Volume Raid Level Set the RAID level for the volume set. Highlight the desired RAID Level and press Enter key. The available RAID levels for the current volume set are displayed. Select a RAID level and press Enter key to confirm.

Capacity The maximum volume size is the default initial setting. Enter the appropriate volume size to fit your application.

Greater Two TB Volume Support

Cybernetics

UM-MD-ST

L4-1103

109

Using the RAID Storage Manager

If volume capacity will exceed Two TB, controller will show the "Greater Two TB Volume Support" sub-menu. Greater Two TB Volume Support option: No and 64bit LBA. Cybernetics recommends the 64bit LBA option.

Initialization Mode Press Enter key to define Background Initialization, Foreground Initialization or No Init (To Rescue Volume). When Background Initialization is chosen, the initialization proceeds as a background task and the volume set is fully accessible for system reads and writes. When Foreground Initialization is chosen, the initialization process must be completed before the volume set is ready for system accesses. No initialization happens when the No Init option is selected. No Init is for customer to rescue volume without losing data in the disk.

Stripe Size This parameter sets the size of the stripe written to each disk in a RAID 0, 1, 10, 5, 6, 50 or 60 logical drive. You can set the stripe size to 4 KB, 8 KB, 16 KB, 32 KB, 64 KB, or 128 KB. A larger stripe size produces better read performance, especially if your computer does mostly sequential reads. However, if you are sure that your computer does random reads more often, select a smaller stripe size.

Note
RAID level 3 can not modify the cache stripe size.
Cache Mode The SAS RAID controller supports Write Through and Write Back cache. Tagged Command Queuing The Enabled option is useful for enhancing overall system performance under multitasking operating systems. The Command Tag (Drive Channel) function controls the SAS command tag queuing support for each drive channel. This function should normally remain Enabled. Disabled this function only when using SAS drives that do not support command tag queuing. SCSI Channel/SCSI ID/SCSI Lun
UM-MD-ST L4-1103

Cybernetics

110

Using the RAID Storage Manager

SCSI Channel: The SAS RAID controller function is simulated as a external SCSI RAID controller. The host bus is represented as a SCSI channel. Choose the SCSI Channel. SCSI ID: Each SCSI device attached to the SCSI card, as well as the card itself, must be assigned a unique SCSI ID number. A SCSI channel can connect up to 15 devices. The SAS RAID controller is a large SCSI device. Assign an ID from a list of SCSI IDs. SCSI LUN: Each SCSI ID can support up to 8 LUNs. Most SAS controllers treat each LUN like a SAS disk.

7.7.2 Create Raid30/50/60 (Volume Set 30/

50/60)

To create 30/50/60 volume set from RAID set group, move the cursor bar to the main menu and click on the Create Raid30/50/60 link. The Select The Raid Set To Create Volume On It screen will show all RAID set number. Tick on the RAID set numbers (same disk No per RAID set) that you want to create and then click on the Submit button. The new create volume set attribute allows user to select the Volume Name, RAID Level, Capacity, Greater Two TB Volume Support, Initialization Mode, Strip Size, Cache Mode, Tagged Command Queuing, SCSI Channel/SCSI ID/SCSI Lun. Please refer to above section for details description of each item.

Note
RAID level 30 50 and 60 can support up to eight subvolumes, but it can not support expansion and migration.

Cybernetics

UM-MD-ST

L4-1103

111

Using the RAID Storage Manager

7.7.3 Delete Volume Set


To delete a volume from RAID set, move the cursor bar to the main menu and click on the Delete Volume Set link. The Select The Raid Set To Delete screen will show all RAID set numbers. Click a RAID set number and the Confirm The Operation check box and then click the Submit button to show all volume set items in the selected RAID set. Click a volume set number and the Confirm The Operation check box and then click the Submit button to delete the volume set.

7.7.4 Modify Volume Set


To modify a volume set from a RAID set: (1). Click on the Modify Volume Set link. (2). Click the volume set check box from the list that you wish to modify. Click the Submit button. The following screen appears. Use this option to modify the volume set configuration. To modify volume set attributes, move the cursor bar to the volume set attribute menu and click it. The Enter The Volume Attribute screen appears. Move the cursor to an attribute item and then click the attribute to modify the value. After you complete the modification, click the Confirm The Operation check box and click the Submit button to complete the action. The user can only modify the last volume set capacity.

7.7.4.1 Volume Growth


Use Expand RAID Set" function to add a disk to a RAID set. The additional capacity can be used to enlarge the last volume set size or to create another volume set. The Modify Volume Set function can support the Volume Modification function. To expand the last volume set capacity , move the cursor bar to the Capacity item and entry the capacity size. When finished with the above action, press the ESC key and select the Yes option to complete the action. The last volume set starts to expand its capacity.

Cybernetics

UM-MD-ST

L4-1103

112

Using the RAID Storage Manager

To expand an existing volume: Only the last volume can expand capacity. When expanding volume capacity, you can not modify the stripe size RAID level simultaneously. You can expand volume capacity, but you can not reduce volume capacity size. After volume expansion, the volume capacity can not be decreased.

For greater 2TB expansion: If your system installed in the volume, do not expand the volume capacity greater 2TB, currently OS can not support boot up from a greater 2TB capacity device. Expand over 2TB used LBA64 mode. Please make sure your OS supports LBA64 before expanding it.

7.7.4.2 Volume Set Migration


Migrating occurs when a volume set is migrating from one RAID level to another, when a volume set strip size changes, or when a disk is added to a RAID set. Migration state is displayed in the volume state area of the Volume Set Information screen.

Caution
If the volume is RAID level 30, 50, or 60, you can not change the volume to another RAID level. If the volume is RAID level 0, 1, 10(1E), 3, 5, or 6, you can not change the volume to RAID level 30, 50, or 60.

Cybernetics

UM-MD-ST

L4-1103

113

Using the RAID Storage Manager

7.7.5 Check Volume Set


To check a volume set from a RAID set: (1). Click on the Check Volume Set link. (2). Click on the volume set from the list that you wish to check. Tick on Confirm The Operation and click on the Submit button. Use this option to verify the correctness of the redundant data in a volume set. For example, in a system with dedicated parity, volume set check means computing the parity of the data disk drives and comparing the results to the contents of the dedicated parity disk drive. The checking percentage can also be viewed by clicking on RAID Set Hierarchy in the main menu.

7.7.6 Stop Volume Set Check


Use this option to stop the Check Volume Set function.

7.8 Physical Drive


Choose this option to select a physical disk from the main menu and then perform the operations listed below.

7.8.1 Create Pass-Through Disk


To create pass-through disk, move the mouse cursor to the main menu and click on the Create Pass-Through link. The relative setting function screen appears. A pass-through disk is not controlled by the SAS RAID controller firmware, it can not be a part of a volume set. The disk is available to the operating system as an individual disk. It is typically used on a system where the operating system is on a disk not controlled by the RAID firmware.

Cybernetics

UM-MD-ST

L4-1103

114

Using the RAID Storage Manager

The user can also select the Cache Mode, Tagged Command Queuing, SCSI channel/ SCSI_ID/SCSI_LUN for this pass-through disk.

7.8.2 Modify Pass-Through Disk


Use this option to modify the pass-through disk attribute. The user can modify the Cache Mode, Tagged Command Queuing, and SCSI Channel/ID/LUN on an existing passthrough disk. To modify the pass-through drive attribute from the pass-through drive pool, move the mouse cursor bar and click on the Modify Pass-Through link. The Select The Pass Through Disk For Modification screen appears mark the check box for the pass-through disk from the pass-through drive pool and click on the Submit button to select drive. When the Enter Pass-Through Disk Attribute screen appears, modify the drive attribute values, as you want. After you complete the selection, mark the check box for Confirm The Operation and click on the Submit button to complete the selection action.

7.8.3 Delete Pass-Through Disk


To delete a pass-through drive from the pass-through drive pool, move the mouse cursor bar to the main menus and click the Delete Pass Through link. After you complete the

Cybernetics

UM-MD-ST

L4-1103

115

Using the RAID Storage Manager

selection, mark the check box for Confirm The Operation and click the Submit button to complete the delete action.

7.8.4 Identify Enclosure


To prevent removing the wrong enclosure, the selected expander enclosure all disks fault LED indicator will light for physically locating the selected enclosure when the Identify Enclosure is selected. This function will also light the enclosure LED indicator, if it is existed.

7.8.5 Identify Drive


To prevent removing the wrong drive, the selected disk fault LED indicator will light for physically locating the selected disk when the Identify Selected Device is selected.

Cybernetics

UM-MD-ST

L4-1103

116

Using the RAID Storage Manager

7.9 System Controls


7.9.1 System Config
To set the RAID system function, move the cursor to the main menu and click the System Controls link. The Raid System Function menu will show all items, then select the desired function.

7.9.1.1 System Beeper Setting


The System Beeper Setting function is used to Disabled or Enabled the SAS RAID controller alarm tone generator.

7.9.1.2 Background Task Priority


The Background Task Priority is a relative indication of how much time the controller devotes to a rebuild operation. The SAS RAID controller allows the user to choose the rebuild priority (UltraLow, Low, Normal and High) to balance volume set access and rebuild tasks appropriately. For high array performance, specify a Low value.

7.9.1.3 JBOD/RAID Configuration


JBOD is an acronym for Just a Bunch Of Disk. A group of hard disks in a RAID box are not set up as any type of RAID configuration. All drives are available to the operating system as an individual disk. JBOD does not provide data redundancy. User needs to delete the RAID set, when you want to change the option from the RAID to the JBOD function.

Cybernetics

UM-MD-ST

L4-1103

117

Using the RAID Storage Manager

7.9.1.4 SATA NCQ Support


The controller supports both SAS and SATA disk drives. The SATA NCQ allows multiple commands to be outstanding within a drive at the same time. Drives that support NCQ have an internal queue where outstanding commands can be dynamically rescheduled or re-ordered, along with the necessary tracking mechanisms for outstanding and completed portions of the workload. The SAS RAID controller allows the user to select the SATA NCQ support: Enabled or Disabled.

7.9.1.5 HDD Read Ahead Cache


Allow Read Ahead (Default: Enabled)When Enabled, the drives read ahead cache algorithm is used, providing maximum performance under most circumstances.

7.9.1.6 Volume Data Read Ahead


The volume read data ahead parameter specifies the controller firmware algorithms which process the Read Ahead data blocks from the disk. The Read Ahead parameter is normal by default. To modify the value, you must set it from the command line using the Read Ahead option. The default normal option satisfies the performance requirements for a typical volume. The disabled value implies no read ahead. The most efficient value for the controllers depends on your application. Aggressive read ahead is optimal for sequential access but it degrades random access.

7.9.1.7 HDD Queue Depth


This parameter is adjusted the queue depth capacity of NCQ (SATA HDD) or Tagged Command Queuing (SAS) which transmits multiple commands to a single target without waiting for the initial command to complete.

7.9.1.8 Stagger Power on Control


In a PC system with only one or two drives, the power can supply enough power to spin up both drives simultaneously. But in systems with more than two drives, the startup current from spinning up the drives all at once can overload the power supply, causing damage to the power supply, disk drives and other system components. This damage can be avoided by allowing the host to stagger the spin-up of the drives. The SAS/SATA drives have support stagger spin-up capabilities to boost reliability. Stagger spin-up is a very useful feature for managing multiple disk drives in a storage subsystem. It gives the host the ability to spin up the disk drives sequentially or in groups, allowing the drives to come ready at the optimum time without straining the system power supply. Staggering drive spin-up in a multiple drive environment also avoids the extra cost of a power supply designed to meet short-term startup power demand as well as steady state conditions. The RAID controller has included the option for customer to select the disk drives sequentially stagger power up value. The values can be selected from 0.4s to 6s per step, which powers up one drive.

Cybernetics

UM-MD-ST

L4-1103

118

Using the RAID Storage Manager

7.9.1.9 Spin Down Idle HDD


This function can automatically spin down the drive if it has not been accessed for a certain amount of time. This value is used by the drive to determine how long to wait (with no disk activity, before turning off the spindle motor to save power.)

7.9.1.10 SAS Mux Setting (ARC-1680 Only)


The function is only for ARC-1680 Intel SAS controller limitation of auto configuration of CH5-8 for internal or external. If there is no linkage at the beginning power on stage, some SAS hard drives PHY will automatically enter the sleep mode. In this condition, our firmware will set no linkage on those channels. Since some hard drives have this behavior, our controller firmware will configure the active channel CH5-8 on the external port. We added this function for customer to set, if the controller automatically configuration function detect the wrong direction of CH5-8 internal channels. Please set the "SAS MUX SETTING" to "Internal" in the setup manual then restart the system to set the active channel CH5-8 on the internal port.

7.9.1.11 Auto Activate Incomplete Raid


When some of the disk drives are removed in power off state or boot up stage, the RAID set state will change to Incomplete State. But if a user wants to automatically continue to work while the SAS RAID controller is powered on, the user can set the Auto Activate Incomplete Raid option to enable. The RAID state will change to Degraded Mode while it powers on.

7.9.1.12 Disk Write Cache Mode


User can set the Disk Write Cache Mode to Auto, Enabled, or Disabled. Enabled increases speed, while Disabled increases reliability.

7.9.1.13 Disk Capacity Truncation Mode


Cybernetics RAID controllers use drive truncation so that drives from differing vendors are more likely to be able to be used as spares for each other. Drive truncation slightly decreases the usable capacity of a drive that is used in redundant units. The controller provides three truncation modes in the system configuration: Multiples Of 10G, Multiples Of 1G, and Disabled.

7.9.1.13.1 Multiples Of 10G


If you have 120 GB drives from different vendors; chances are that the capacity varies slightly. For example, one drive might be 123.5 GB, and the other 120 GB. Multiples of 10G, truncates the number under tens. This makes the same capacity for both of these drives so that one could replace the other.

7.9.1.13.2 Multiples Of 1G
If you have 123 GB drives from different vendors; chances are that the capacity varies slightly. For example, one drive might be 123.5 GB, and the other 123.4

Cybernetics

UM-MD-ST

L4-1103

119

Using the RAID Storage Manager

GB. Multiples Of 1G, truncates the fractional part. This makes capacity for both of these drives so that one could replace the other.

7.9.1.13.3 No Truncation
It does not truncate the capacity.

7.9.2 Ethernet Configuration


Use this feature to set the controller Ethernet port configuration. DHCP (Dynamic Host Configuration Protocol) is a protocol that lets network administrators manage centrally and automate the assignment of IP (Internet Protocol) configurations on a computer network. When using the internets set of protocols (TCP/IP), in order for a computer system to communicate to another computer system, it needs a unique IP address. Without DHCP, the IP address must be entered manually at each computer system. DHCP lets a network administrator supervise and distribute IP addresses from a central point. The purpose of DHCP is to provide the automatic (dynamic) allocation of IP client configurations for a specific time period (called a lease period) and to eliminate the work necessary to administer a large IP network. To configure the RAID controller Ethernet port, move the cursor bar to the main menu and click on the System Controls link. The System Controls menu will show all items. Move the cursor bar to the Ethernet Configuration item, then press Enter key to select the desired function.

7.9.3 Alert By Mail Configuration


To configure the RAID controller e-mail function, move the cursor bar to the main menu and click on the System Controls link. The System Controls menu will show all items. Move the cursor bar to the Alert By Mail Configuration item, then select the desired function. This function can only be set via web-based configuration. The firmware contains a

Cybernetics

UM-MD-ST

L4-1103

120

Using the RAID Storage Manager

SMTP manager monitoring all system events. Single or multiple user notifications can be sent via Plain English e-mails with no software required.

7.9.4 SNMP Configuration


To configure the RAID controller SNMP function, click on the System Controls link. The System Controls menu will show available items. Select the SNMP Configuration item. This function can only set via web-based configuration. The firmware SNMP agent manager monitors all system events and the SNMP function becomes functional with no agent software required. SNMP Trap Configurations Enter the SNMP Trap IP Address. SNMP System Configurations Enter the system Contact, Name and Location that will be shown in the outgoing SNMP trap.

Cybernetics

UM-MD-ST

L4-1103

121

Using the RAID Storage Manager

NTP Configuration

The Network Time Protocol (NTP) is used to synchronize the time of a computer client or server to another server or reference time source, such as a radio or satellite receiver or modem. It provides accuracies typically within a millisecond on LANs and up to a few tens of milliseconds on WANs relative to Coordinated Universal Time (UTC) via a Global Positioning Service (GPS) receiver, for example: NTP Server Address

The most important factor in providing accurate, reliable time is the selection of NTP servers to be used in the configuration file. Typical NTP configurations utilize multiple redundant servers and diverse network paths in order to achieve high accuracy and reliability. Our NTP configuration supports two existing public NTP synchronization subnets. Time Zone

Time Zone conveniently runs in the system tray and allows you to easily view the date and time in various locations around the world. You can also quickly and easily add your own personal locations to customize time zone the way you want. Automatic Daylight Saving

Cybernetics

UM-MD-ST

L4-1103

122

Using the RAID Storage Manager

Automatic Daylight Saving will normally attempt to automatically adjust the system clock for daylight saving changes based on the computer time zone. This tweak allows you to disable the automatic adjustment.

Note
NTP feature works through the onboard Ethernet port. So you must make sure that you have connected onboard Ethernet port at http:// 192.168.1.105.

7.9.5 View Events/Mute Beeper


To view the SAS RAID controllers event information, click on the View Event/Mute Beeper link. The SAS RAID controller System events Information screen appears. The mute beeper function is automatically enabled by clicking on View Events/Mute Beeper. Select this option to view the system events information: Timer, Device, Event type, Elapse Time and Errors. The RAID controller does not have a built-in real time clock. The

Cybernetics

UM-MD-ST

L4-1103

123

Using the RAID Storage Manager

time information is the relative time from the system time setting. The maximum event amount is 256 per controller.

7.9.6 Generate Test Event


Use this feature to generate events for testing purposes.

7.9.7 Clear Events Buffer


Use this feature to clear the entire events buffer information.

7.9.8 Modify Password


To set or change the SAS RAID controller password, select System Controls from the menu and click on the Modify Password link. The Modify System Password screen appears. The manufacture default password is set to 0000. The password option allows user to set or clear the SAS RAID controllers password protection feature. Once the password has been set, the user can only monitor and configure the SAS RAID controller by providing the correct password. The password is used to protect the SAS RAID controller from unauthorized entry. The controller will check the password only when entering the main

Cybernetics

UM-MD-ST

L4-1103

menu from the initial screen. The SAS RAID controller will automatically go back to the initial screen when it does not receive any command in 5 minutes. Do not use spaces when you enter the password, If spaces are used, it will lock out the user. To disable the password, leave the fields blank. Once the user confirms the operation and clicks the Submit button, the existing password will be cleared. Then, no password checking will occur when entering the main menu from the starting screen.

7.9.9 System Information


To view the SAS RAID controllers system information, move the mouse cursor to the main menu and click on the System Information link. The SAS RAID controller RAID Subsystem Information screen appears. Use this feature to view the SAS RAID controllers system information. The controller name, controller firmware version, Boot ROM version, SAS firmware version, serial number, main processor, CPU data/instruction cache size, system memory size/speed and current IP address appear in this screen.

7.9.10 Hardware Monitor


The hardware monitor information of the enclosure attached in this controller is also shown on this screen.

UM-MD-ST

L4-1103

Cybernetics

125

Product Specifications

Chapter 8 Product Specifications


8.1 Physical Dimensions
8.1.1 Size and Weight (miSAN-D6)
Height 3.5 in. (8.9 cm) (2U) Width, chassis 16.9 in. (42.9 cm), front panel 18.9 in. (48.0 cm) Depth 26.4 in. (67.1 cm) Weight 48.8 lbs. (22.1 kg), with 6 disk drives

8.1.2 Size and Weight (miSAN-D8)


Height Width, chassis Depth Weight 3.5 in. (8.9 cm) (2U) 16.9 in. (42.9 cm), front panel 18.9 in. (48.0 cm) 26.2 in. (66.5 cm) 53.9 lbs. (24.4 kg), with 8 disk drives

8.1.3 Size and Weight (miSAN-D12)


Height Width, chassis Depth Weight 5.0 in. (3U) 16.9 in. , front panel 18.9 in. (48.0 cm) 26.2 in. 72.1 lbs. , with 12 -2TB disk drives

8.1.4 Size and Weight (miSAN-D16)


Height Width, chassis Depth Weight 5.0 in. (3U) 16.9 in. , front panel 18.9 in. (48.0 cm) 26.2 in. 78 lbs. with 16- 2TB disk drives

8.2 Power Supply


Power supply input voltage is auto-sensing: Voltage 100240 VAC, 4763 Hz

Cybernetics

UM-MD-ST

L4-1103

126

Product Specifications

8.2.1 miSAN-D6/L4 Power Usage

8.2.2 miSAN-D8 Power Usage

8.2.3 miSAN-D12 Power Usage

8.2.4 miSAN-D16 Power Usage

Cybernetics

UM-MD-ST

L4-1103

Product Specifications

127

8.3 Humidity and Temperature


8.3.1 Non-operating
Humidity Temperature Operating: 20% - 80% Non-Operating: 10% - 90%" -40140F (-4060C)

8.3.2 Operating
Humidity Internal Unit Temperature Ambient (External) Temperature 4060%, non-condensing 50104F (1040C) 41-75F

8.4 Data Transfer Speed


Capable of read speeds in excess of 390 MB/s using all four iSCSI ports in a Round-robin configuration. Data Transfer speeds will test between 100-110 MB/s for a virtual disk with one iSCSI connection..

UM-MD-ST

L4-1103

Cybernetics

128

Product Specifications

Cybernetics

UM-MD-ST

L4-1103

129

Appendix A Microsoft iSCSI Initiator


Note
Certain models of older GbE NICs may experience connectivity issues due to the structure and volume of iSCSI traffic. Contact Cybernetics technical support for a list of NICs that have been tested and do not experience these issues.

A.1 Downloading the Setup Program


Caution
Simultaneous connections from multiple initiators to a single virtual disk can lead to data corruption. Do not allow more than a single initiator to be connected to a virtual disk.
The iSCSI Initiator setup program can be downloaded from the Microsoft Web site by doing the following: 1. Go to the Web site http://www.microsoft.com/downloads 2. Type Microsoft iSCSI Software Initiator in the search box, and then click the magnifying lens icon.

Cybernetics

UM-MD-ST

L4-1103

130

3. Click the link for the latest version of the driver that appears.

4. Scroll down to the Files in this Download section, and then click the applicable fre link for a 32-bit (x86) or 64-bit (ia64) system.

5.Click Save in the File Download dialog box.

Cybernetics

UM-MD-ST

L4-1103

131

6.Choose a location for the file in the Save As dialog box, and then click Save. The file is then saved to the specified location.

A.2 Installing the Software


To install and set up the iSCSI Initiator software, complete the following steps: 1. To install the driver, first, double-click the .msi file to run the setup program. The Setup Wizard will then execute.

2. If asked Do you want to run this file?, click on the Run button.

Cybernetics

UM-MD-ST

L4-1103

132

3. Click Next to continue.

4. Read the license agreement in the License Agreement window, select I agree, and then click Next.

Cybernetics

UM-MD-ST

L4-1103

133

5. Choose from the available options. The default choices will work for most installations. Click Next to continue in the Confirm Installation window.

6. The Microsoft iSCSI Installation Program will execute once the setup files have been copied. 7. Click the Finish button to complete the installation.

Cybernetics

UM-MD-ST

L4-1103

134

A.3 Logging On to the miSAN-D Series


For host systems running the Windows operating system, Microsoft offers an iSCSI initiator driver. The following figure and steps below explain how to configure the Microsoft iSCSI Initiator to log on to the miSAN-D-Series

2 3

4 8
9

6 7
1. From the Windows Control Panel, double-click the iSCSI Initiator icon to launch the client interface 2. On the Discovery tab, click Add in the Target Portals frame 3. On the Add Target Portal box, enter the IP Address of the miSAN-D Series, with the default Socket 3260 4. Click Advanced... to access the CHAP logon information 5. Select the CHAP logon information checkbox to allow for entering a miSAN-D Series username and password 6. In the User name field, enter the Username, and in the Target secret field, enter the Password 7. Click OK when finished entering the miSAN-D Series logon information

Cybernetics

UM-MD-ST

L4-1103

135

8. Click OK on the Add Target Portal box 9. Click OK to log on to the miSAN-D Series.

A.4 Logging On to a Virtual Disk


After logging on to the miSAN-D Series, the virtual disks are then visible and available for logging onto. The figure and steps below explain how to log on to a virtual disk.

1 4 9 5 2 3 10 6

7 8

Cybernetics

UM-MD-ST

L4-1103

136

Note
When setting up the passwords for a virtual disk, the miSAN-DSeries will accept a password of almost any length. However only a password of between 12 and 16 characters will work with iSCSI CHAP authentication.
1. Select the Targets tab for a list of the virtual disks. To reveal the entire target name and see the virtual disk names, right-click and drag the end of the Name column to the right. 2. Select the desired virtual disk 3. Click Log On... 4. Select the Automatically restore this connection when the system boots checkbox to make this virtual disk a persistent target (listed on the Persistent Targets tab). This prevents having to repeat the log on process after each boot and ensures the drive letter/mount point and network shares will not change. Do not enable Multi-path unless you are sure that your computer supports it. 5. Click Advanced... to access the CHAP logon information 6. Select the CHAP logon information checkbox to allow for entering a miSAN-D Series username and password for this virtual disk 7. In the User name field, enter the Username, and in the Target secret field, enter the Password 8. Click OK when finished entering the virtual disk logon information 9. Click OK on the Log On to Target box 10. Click OK to log on to the virtual disk.

A.5 Setting Up a Virtual Disk on an iSCSI Host


When the iSCSI Initiator is logged on to the virtual disks that are to be set up, each virtual disk will appear to the host as an unformatted, unpartitioned SCSI disk drive of the type Cybernetics iSAN Vault SCSI Disk Device. To use a virtual disk, it must first be initialized as a basic disk. This process varies depending on the iSCSI host initiators operating system. Next, the basic disk must be partitioned and formatted into one or more logical volumes.Before formatting the virtual disk, take into consideration the other intended iSCSI host initiators, since the desired file system may not be compatible with the other hosts operating systems (e.g., FAT32).

Cybernetics

UM-MD-ST

L4-1103

137

The following sections explain how to set up a virtual disk using the Windows XP Pro, 2000 or 2003 Server operating system. For further explanation of any of the Windows software components mentioned below, refer to Windows documentation.

A.5.1 Disk Management


The Disk Management snap-in for Windows XP Pro/2000/2003 Server is used by an Administrator to perform disk-related tasks. To open Disk Management: 1. Right Click My Computer. 2. Click Manage. 3. Highlight Disk Management under Storage in the Computer Management tree. The virtual disk will appear as an Unknown disk, as seen in the figure below.

A.5.1.1 Dynamic Disks


For iSCSI host initiators running Windows XP Pro/2000/2003 Server, Cybernetics recommends formatting the virtual disk as a basic disk into a single or multiple partitions; do not upgrade to a dynamic disk. Dynamic disk volumes are not supported using the Microsoft iSCSI Initiator, due to timing issues that may prevent disk volumes from being reactivated at system startup. If the disk is set up as Dynamic then it will be necessary to revert to Basic. 1. To do this, right click the name of the virtual drive in the square next to its disk space. 2. Select Revert to Basic Disk The disk will now appear as a Basic disk.

UM-MD-ST

L4-1103

Cybernetics

138

A.5.2 Setting Up a Basic Disk


The following sections in this chapter explain in sequence how to partition and create a logical volume from a basic disk.

A.5.2.1 Creating a Basic Disk


Creating a basic disk involves first initializing the virtual disk by writing a signature to it. To do this 1. Right-click the name of the virtual drive in the square next to its disk space 2. Select Write Signature 3. In the Write Signature box, select the name of the disk, and then click OK Wait a moment while Windows initializes the disk.

Afterward, the disk status will change to Basic

After creating a basic disk, you must partition the disk. The two types of partitions are Primary and extended. A primary partition is a volume you create using free space on a baic disk. You can create up to four primary partitions on a basic disk, or you can make three primary partitions and an extended partition. An extended partition is a portion of a basic disk that can contain logical drives. Use an extended partition if you want to have more than four volumes on your basic disk.

Cybernetics

UM-MD-ST

L4-1103

139

A.5.2.2 Creating a Primary Partition


To create a Primary Partition from a basic disk: 1. Right-click the disk space, and then select Create Partition... to start the Wizard

2. Click Next > to begin the Create Partition Wizard

3. Select Primary partition and then click Next > .

UM-MD-ST

L4-1103

Cybernetics

140

4. Specify Partition size and then press Next >.

5. Assign a drive letter or path and press Next >.

Cybernetics

UM-MD-ST

L4-1103

141

6. Format the partition with the desired file system and volume label. Choose whether or not to perform a Quick Format and if file and folder compression should be enabled. When choosing the file system, take into consideration the other intended iSCSI host initiators, since the desired file system may not be compatible with the other hosts operating systems (e.g., FAT32)..

7. Review the format settings, and then click Finish.

A.5.2.3 Creating an Extended Partition


To create an Extended partition from a basic disk: 1. Right-click the disk space, and then select Create Partition... to start the Wizard

2. Click Next > to begin the Create Partition Wizard

UM-MD-ST

L4-1103

Cybernetics

142

3. Select Extended partition, and then click Next

4. Specify Partition Size and press Next >.

5. Close the Wizard by selecting Finish.

Cybernetics

UM-MD-ST

L4-1103

143

A.5.2.4 Creating a Logical Volume


After creating an extended partition on the basic disk, one or more logical volumes (logical drives) must be created on the disk. Though more than one volume can be created if desired, only a single volume needs to be created from the total volume size 1. Right-click the disk space, and then select Create Logical Drive... to start the Wizard.

2.

Click Next > to begin the Create Partition Wizard

3.

Select Logical drive, and then press Next >.

UM-MD-ST

L4-1103

Cybernetics

144

4.

Choose a drive letter, and then click Next

5.

Format the partition with the desired file system and volume label.

Cybernetics

UM-MD-ST

L4-1103

145

6.

Review the format settings, and then click Finish.

7.

Wait while the disk formats. The disk status will change from Free Space to Formatting and then to Healthy

A.6

UM-MD-ST

L4-1103

Cybernetics

146

Cybernetics

UM-MD-ST

L4-1103

147

Appendix B Linux Open-iSCSI


Open-iSCSI can be installed on most Linux Distributions (Kernel >=2.6.11) using a simple terminal command. Open-iSCSI can also be installed using a Package Manager on many versions of Linux. These instructions assume a basic working knowledge of the Linux Distribution. They also assume that the user has administrative rights on the system and that sudo and yum (Red Hat based Distros) are already installed and setup properly. Before installation make sure that the latest updates for your system are applied. For a list of Linux Distributions these instructions were tested on, see the last section of these instructions.

Caution
Simultaneous connections from multiple initiators to a single virtual disk can lead to data corruption. Do not allow more than a single initiator to be connected to a virtual disk.

Note
Certain models of older GbE NICs may experience connectivity issues due to the structure and volume of iSCSI traffic. Contact Cybernetics technical support for a list of NICs that have been tested and do not experience these issues.

B.1 Installation
B.1.1 Terminal
1. Open a terminal and type: sudo apt-get install open-iscsi (Debian/Ubuntu) sudo yum install iscsi-initiator-utils At the prompts, type in y. (RedHAT) (RedHAT)

B.1.2 Synaptic Package Manager (Debian/


Cybernetics UM-MD-ST L4-1103

Ubuntu)
1. Open System>Administration>Synaptic Package Manager 2. Highlight Networking in the left window and then select open-iscsi in the package window. Leftclick on the highlighted Mark for Installation

3. Select Apply to install the package.

B.1.3 Package Manager (RHEL5, CentOS 5)


1. In the Main menu of the Desktop, open Applications>Add/Remove Software 2. Open the Search Tab 3. Enter iSCSI into the search field and press the Search button.

4. Select iscsi-initiator-utils

5. Press the Apply button to install the package. 6. Press Continue.

7. Import key..

8. Press Okay to finish installation.

B.2 Add/Remove Software (Fedora 10)


1. Enter iSCSI into the Find field. 2. Press the Find button and then highlight iSCSI daemon and utility programs.

150

3. Press the Apply button to install.

B.3 miSAN-D Setup


Log into the miSAN-D. Follow the instructions in Chapter 3 of the user manual or the Quick Start Guide to: 1. Setup the network. 2. Create a Virtual Disk (2TB or smaller for 32 bit systems). 3. Create an Authenticated User. Do not create an Anonymous user except for testing purposes.

Note
Each Virtual Disk which will be connected to by the same Linux box will need the same username and password. Open-iSCSI is only capable of handling one CHAP username and password.

B.4 Configure Open-iSCSI


1. In order for autologin to work properly, two files need to be soft-linked (path fixed). Enter: sudo ln -s /etc/{iscsid.conf,initiatorname.iscsi} /etc/iscsi/ 2. To turn on or start the iSCSI service at boot enter: sudo update-rc.d open-iscsi defaults (Debian/Ubuntu) sudo chkconfig iscsi on Red Hat/CentOS/Fedora 3. Edit the iSCSI configuration file at /etc/iscsid.conf using your favorite file editor. To use the nano editor type:

Cybernetics

UM-MD-ST

L4-1103

151

sudo nano /etc/iscsi/iscsid.conf In the iscsid.conf file, any line that starts with a # is ignored as a comment. In the following instructions, Uncomment a line means to delete the #. Comment a line means to add a # to the beginning of the line. A Scroll down to the Chap settings section. To enable CHAP authentication: 1. Uncomment- #node.session.auth.authmethod = CHAP

B Set a CHAP user name and password for initiator authentication by the target(s). 1. Uncomment- #node.session.auth.username = username 2. Replace username with the Authenticated User username. 3. Uncomment- #node.session.auth.password = password 4. Replace password with the Authenticated User password.

C To set a CHAP password for discovery : 1. Uncomment- #discovery.sendtargets.auth.authmethod = CHAP 2. Uncomment- #discovery.sendtargets.auth.username = username 3. Replace username with the Authenticated User username. 4. Uncomment- #discovery.sendtargets.auth.password = password

Cybernetics

UM-MD-ST

L4-1103

152

5. Replace password with the Authenticated User password

D Save and close the file. Restart open-iscsi service: sudo /etc/init.d/open-iscsi restart

B.5 Test Open-iSCSI installation


B.5.1 Target node discovery
1. To start the iSCSI service, type: sudo /etc/init.d/open-iscsi start (Debian/Ubuntu) sudo /etc/init.d/iscsi start (RedHat/CentOS 5) If the iSCSI service was already started then type: sudo /etc/init.d/open-iscsi restart (Debian/Ubuntu) sudo /etc/init.d/iscsi restart (RedHat/CentOS 5) 2. To discover the iSCSI target nodes on the miSAN-D Series use the format: sudo iscsiadm -m discovery -t sendtargets -p ISCSI-SERVER-IP-ADDRESS For example, if you are using the default IP address of 192.168.2.1 enter: sudo iscsiadm -m discovery -t sendtargets -p 192.168.2.1 If you receive a command not found message, try adding /sbin/ to the iscsiadm command. This problem occurs when the user path is not set properly (most often in RedHat variants): sudo /sbin/iscsiadm -m discovery -t sendtargets -p 192.168.2.1

Cybernetics

UM-MD-ST

L4-1103

153

The following screenshot shows how to discover the Target nodes, and interpret the results.i

In the above example, the miSAN-D has one Admin port and four data ports. There are four Virtual Disks. Each target will have a record ID shown once for each possible portal (IP address). Compare this list with the list shown in the Virtual Disk Status area of the miSAN-D Main menu page in order to determine which Virtual Disks to log into..

B.5.2 Login
Login may be accomplished manually or automatically. For automatic login, see the following section. 1. Use the following command to log into a target node presented by the miSAN-D. Substitute the record ID identified earlier and the portal which is in the same subnet as the Linux box. sudo iscsiadm --mode node --targetname eui.000b5600EE277A92 --portal 192.168.2.1 --login The login command can be shortened as follows: sudo iscsiadm -m node -T eui.000b5600EE277A92 -p 192.168.2.1 -l 2. Confirm that the OS sees the device(s). `cat /proc/scsi/scsi` will list all attached SCSI devices (including iSCSI).

UM-MD-ST

L4-1103

Cybernetics

154

sudo cat /proc/scsi/scsi

3. Restart the iSCSI service again to confirm that each target node is automatically logged into. sudo /etc/init.d/open-iscsi restart (Debian/Ubuntu) sudo /etc/init.d/iscsi restart (RedHat/CentOS 5) The iSCSI service may report a connection failure if you do not have a connection to each possible portal on the miSAN-D. This is normal and will not effect performance.

B.5.3 Automatic login setup


There are two methods to set up automatic login: Command Line and Editing of /etc/ iscsi/iscsid.conf. If you performed a discovery before editing the automatic login section of the iscid.conf file, it may be necessary to manually setup the automatic login for any devices previously discovered.

B.5.3.1 Command Line setup of Automatic Login


1. Type in the following command for each device that has been discovered, changing the record ID (and if necessary, the portal): sudo iscsiadm -m node -T eui.000b56000000a3f1 -p 192.168.2.1 --op update n node.conn[0].startup -v automatic 2. Restart the iSCSI service again to confirm that each target node is automatically logged into. sudo /etc/init.d/open-iscsi restart (Debian/Ubuntu) sudo /etc/init.d/iscsi restart (RedHat/CentOS 5) The iSCSI service may report a connection failure if you do not have a connection to each possible portal on the miSAN-D. This is normal and will not effect performance.

B.5.3.2 Automatic Login Setup by editing

Cybernetics

UM-MD-ST

L4-1103

155

iscsid.conf

Caution
Do not use the iscsi.conf file to setup Automatic Login If other hosts will be connecting to the iSAN/miSAN-V. You must configure the login from the command line to avoid loss of Data resulting from two or more hosts connecting to the same target. To avoid this, each host must have it's own virtual stacker and must specify which targets it will log into by using the procedure outlined in the previ1. Edit the iSCSI configuration file at /etc/iscsid.conf using your favorite file editor. To use the nano editor type: sudo nano /etc/iscsi/iscsid.conf 2. Comment out node.startup =manual 3. Uncomment #node.startup = automatic

4. Save and close the file. Restart open-iscsi service: sudo /etc/init.d/open-iscsi restart 5. Run the discovery command. sudo iscsiadm -m discovery -t sendtargets -p 192.168.2.1 6. Restart open-iscsi service: sudo /etc/init.d/open-iscsi restart Open-iSCSI will now log into any available target that matches your username and password on the connections you have made available. It will also give a message that it couldnt log in, for any possible connection on the unit. For this reason, it is often preferable to setup Automatic login from the command line instead of from iscsd.conf. 7. Confirm that the OS sees the device(s). `cat /proc/scsi/scsi` will list all attached SCSI devices (including iSCSI). sudo cat /proc/scsi/scsi

B.5.4 Format iSCSI Volume


A partitioner such as Gnome Partitioner can be used to easily format the iSCSI Volumes. If a terminal is being used instead, use the following procedure. Note that on 32 Bit systems there is a 2TB size limit. Use the following procedure to format the iSCSI volumes. 1. In the terminal, type sudo fdisk -l to see the device name of the Virtual Disk(s). 2. If, as an example, the device name is /dev/sdb, enter the following command to create a partition, substituting the actual device name:

UM-MD-ST

L4-1103

Cybernetics

156

sudo fdisk /dev/sdb Press n to add a new partition. Press e for an Extended partition; p (1-4) for a Primary Partition. Press Enter twice for default cylinder settings. 3. Format the partition using the following command:

B.5.5 Mount the iSCSI Volume


1. Make a directory to house the mounted volume. sudo mkdir /mnt/iscsi 2. Mount the file system sudo mount /dev/sdb1 /mnt/iscsi 3. In order to mount iSCSI drive automatically at boot time, open /etc/fstab file and append config directive (substituting device, file type, and mount location as appropriate for the system): /dev/sdb1 /mnt/iscsi ext3 _netdev 0 0

sudo mkfs.ext3 /dev/sdb1

B.6 Version Notes


Fedora 10 has a bug that disallows automatic login. Check Fedora Website for updated versions. As tested, iSCSI volumes must be manually logged into each time the system is started. Once mounted the first time, the volume will automatically mount the volume when logged into. Ubuntu 7.10 has a bug that can stall or hang the unit when shutting down, after open-iscsi is installed. This has the effect of making boot-time mounting of the volume not work. It does not effect automatic log-in. Make sure latest updates are installed.

B.7 Versions Tested


These instructions were tested on: RedHAT based Distrubutions: CentosOS 5.0, Fedora 10 Debian based Distributions: Ubuntu 7.10 Desktop Ubuntu 8.04 32Bit and 64Bit Desktop and Server; Ubuntu 8.10 32Bit and 64Bit Desktop and Server Ubuntu 9.04 32Bit Desktop

Cybernetics

UM-MD-ST

L4-1103

157

Appendix C Upgrading the miSAN-D Series


The miSAN-D Series allows for upgrading the device firmware via a flash drive. One Upgrade flash drive is shipped with the unit. Replacement flash drives may be obtained from Cybernetics by contacting Technical Support at (757) 833-9200 or [email protected].

Caution
Before upgrading the miSAN-D Series, download and save the current configuration. The upgrade process will reset the configuration parameters to their default values.

Caution
Failover must be disabled before upgrading the miSAN-D Series .
Before updating the miSAN-D Series, make sure all iSCSI connections to the unit are logged off. If the unit is part of a Failover pair, Failover must be disabled. To update the firmware, follow the steps below: 1. Open the IP SAN Disk Manager Console in a Web browser pointed to the Administrative LAN interface IP Address. 2. Log on using the admin username and password. 3. Save the current configuration. See Download Current Configuration on page 31. 4. Insert the 1GB Flash Drive into either of the USB ports on the front panel. 5. In the Console, click the Shutdown/Restart command on the side menu. 6. Click the Restart button to restart the miSAN-D Series.

Cybernetics

UM-MD-ST

L4-1103

7. After restarting, the miSAN-D Series will read the Flash Drive and install the firmware.

Caution
During the upgrade, do not power off the miSAN-D-Series.

8. After installing the upgrade, the miSAN-D-Series will shut down. 9. Remove the Flash Drive from the USB port. 10. Power the miSAN-D-Series on using the front power switch. The miSAN-D-Series will complete initializing and be available for use again. 11. Upload the previously-saved configuration file (named vault.bin by default; see Upload Saved Configuration on page 33. This will restore your previously saved configuration, including network parameters and virtual disk partitions.

UM-MD-ST

L4-1103

Cybernetics

159

Appendix D Technical Support and Repair Procedures


If you have a problem with the unit, call Cybernetics Technical Support at (757) 833-9200. Make sure to have the following information available before calling: Your company name, ZIP code, and phone number The 8-digit Cybernetics serial number, located on the device case and on the Product Documentation CD The following information about your system and problem: System Configuration SCSI Daisy-Chaining/Termination Configuration Drive-Switch Settings Computer System Type Operating System and Version Number Backup Procedure and Software System Errors and Messages Drive Errors and Messages

Error Behavior

This information may instead be faxed to (757) 833-9300 or e-mailed to [email protected]. Send to Attention: Technical Support. A Cybernetics Technical Support Engineer will assist in troubleshooting the unit. When communicating with the engineer, be sure to have physical access to the unit so you may be able to answer questions about the units physical condition and installation environment. If the problem persists and the Cybernetics Technical Support Engineer advises that the unit must be returned to Cybernetics for repair or replacement, you will be issued a Return Authorization Number (RAN).

Cybernetics

UM-MD-ST

L4-1103

160

When packing the unit for return to Cybernetics, you must follow the instructions in Packing and Shipping Instructions on page 127. Ship the unit fully insured at your expense via an airfreight carrier to the following address:
Cybernetics (RAN XX-XXXX) 111 Cybernetics Way Yorktown, VA 23693

Note

To purchase extended warranties and warranty upgrades, contact your salesperson at (757) 833-9000. Extended warranties cover parts and labor and can be extended annually.

Cybernetics

UM-MD-ST

L4-1103

161

Appendix E Return Policy


Return Policies

E.1 Hardware Products


At Cybernetics, we take customer satisfaction very seriously, and we value our relationship with every customer. We go to great lengths to understand every aspect of your requirements before we quote a solution, and we work closely with customers to make sure the solution you receive will meet your expectations. Accordingly, our products are backed by a 30-day functionality guarantee. If you experience any technical issues, please contact our Technical Support group (see Technical Support and Repair Procedures appendix) for free telephone support within 30 days of receipt of your order. If we determine that the hardware is incompatible, and fails to function in your environment, we will issue a RAN (Return Authorization Number) for the equipment. Upon receipt of the equipment in new condition, we will issue a credit or refund for the purchase price paid, less shipping and handling. If the equipment is returned for any reason other than an approved functionality issue, a 15% restocking fee will apply. In all cases, the hardware must be returned via prepaid air freight. To qualify as eligible for return (with or without restocking fee), the transaction must meet the following requirements: The product was purchased directly from Cybernetics The product was originally shipped within the past 30 days The customer made a good faith effort to cooperate with Cybernetics Technical Support for troubleshooting Cybernetics has issued a RAN for the product The product is returned via an airfreight carrier The product arrives in undamaged, like new condition within 5 days of RAN issue date

E.2 Shipping Damage


You must immediately inspect your new Cybernetics equipment and notify Cybernetics and the freight carrier within 2 business days of receipt, if the item arrives damaged. Cybernetics cannot be responsible for shipping damage that is not immediately reported Cybernetics is not responsible for shipping damage which is unreported within 2 business days of receipt.

Cybernetics

UM-MD-ST

L4-1103

162

E.3 Software Products


Software is not eligible for return.

E.4 Tape Media Products


Unopened tapes are eligible for return within 14 days of the original shipment date. Opened tapes are not eligible for return.

E.5 Promotional Items


If a promotional item was provided as the result of hardware purchase, the promotional item must also be returned in like new condition in the event a return is approved for the qualifying hardware purchase. Media club promotional items are not eligible for return.

E.6 Maintenance Contracts


Extended service contracts and upgraded maintenance service fees are not eligible for refund. Cybernetics may, at its own discretion, prorate and transfer any remaining service period to a new hardware purchase.

E.7 Exceptions to Cybernetics 30-day hardware return policy:


Special order products and accessories are not eligible for return Custom built products and configurations are not eligible for return

E.8 Return Procedure


To return products, you must first contact Cybernetics Technical Support or Customer Service at (757) 833-9200 to request a Return Authorization Number (RAN) within the return policy period applicable to the product you want to return. A refund or credit will not be issued unless accompanied by a valid RAN.

Note
For a return, you must ship the product(s) to Cybernetics within five (5) days of the date the RAN was issued.
You must: 1. Return all products you are seeking to return to Cybernetics, in the original shipping containers. If the original shipping containers were discarded, you can purchase replacements through Customer Service or Technical Sales. 2. Return the products properly prepared for shipment, and in their original packaging material, in the new condition along with any media, documentation, and all other items

Cybernetics

UM-MD-ST

L4-1103

163

that were included in the original shipment. For more information about preparing the equipment for shipping, please see your product manual. 3. Ship the product(s) at your expense, and insure the shipment or accept the risk of loss or damage during shipment. Upon receipt of the complete, undamaged and like new returned purchase, Cybernetics will issue a credit, replacement, or refund of the purchase price paid, less shipping, handling and applicable restocking fees.

Note
Before you ship the product(s) to us, make sure to back up the data on the hard drive(s) and any other storage device(s) in the product(s). Remove any confidential, proprietary or personal information, removable media, such as floppy disks, CDs, or PC Cards. We are not responsible for any of your confidential, proprietary or personal information; lost or corrupted data; or damaged or lost removable media.
Ship the unit fully insured at your expense via an airfreight carrier to the following address: Cybernetics (RAN XX-XXXX) 111 Cybernetics Way Yorktown, VA 23693

Cybernetics

UM-MD-ST

L4-1103

164

Cybernetics

UM-MD-ST

L4-1103

Appendix F Notices Cybernetics miSAN-D Series


Copyright 2006 Cybernetics, Inc. All rights reserved. This manual and the information contained herein are the property of Cybernetics. No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language in any form or by any means - electronic, mechanical, magnetic, optical, chemical, manual, or otherwise - without prior written permission of Cybernetics, 111 Cybernetics Way, Yorktown, VA 23693. Warranty Cybernetics makes no representation or warranties with respect to the contents of this document and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Further, Cybernetics reserves the right to revise this publication and to make changes in it from time to time without obligation to notify any person or organization of such revision or changes. Trademarks CY-miSAN-D-Series, iSAN Vault and miSAN are trademarks or registered trademarks of Cybernetics. Other names and products are trademarks or registered trademarks of their respective holders. FCC Notice This equipment was tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his own expense.

Cybernetics

UM-MD-ST

L4-1103

ii

Shielded cables are required for this device to comply with FCC regulations. Use shielded cables when connecting this device to others. CSA Notice Le prsent appareil numrique nmet pas de bruits radiolectriques dpassant les limites applicables aux appareils numriques de Classe A prscrites dans le reglement sur le brouillage radiolectrique dict par le Ministre des Communications du Canada. English translation: This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus as set out in the radio interference regulations of the Canadian Department of Communications. Product Warranty Statement The miSAN-D Series is warranted to be free from defects in materials, parts and workmanship and will conform to the current product specification upon delivery. For specific details of your warranty, contact Cybernetics. The warranty for the miSAN-D Series shall not apply to failures of any unit when any of the following occur: the miSAN-D Series is repaired by anyone other than Cybernetics or authorized service personnel the miSAN-D Series is physically abused or is used in a manner inconsistent with the operating instructions or product specifications defined by Cybernetics the miSAN-D Series fails because of abuse, accident, acts of God, alteration, excessive dirt/dust buildup, faulty installation, misapplication, mishandling, misuse, modification, neglect, or service by anyone other than Cybernetics or authorized service personnel the miSAN-D Series is damaged during transport because of improper packaging, including using unauthorized packaging

For Cybernetics devices with integral hard disk drives (HDD) in their enclosures, each HDD is covered by its manufacturers warranty. If a HDD malfunctions, contact Cybernetics Technical Support at (757) 833-9200 or [email protected] to initiate a service request. Customers can opt to send the HDD to Cybernetics to coordinate the service request through the manufacturer or obtain service directly from the manufacturer.

Cybernetics

UM-MD-ST

L4-1103

You might also like