Spring Switzerland GmbH Server Ver 161 User Manual

Manual (Ver. 1.61) May 02, 2006  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4
Copyright  
(c) 2004 Open-E GmbH. All rights reserved. No part of this publication may be reproduced,  
stored in a retrieval system, or transmitted in any form, by any means, electronic,  
mechanical, photo-copying, recording or otherwise, without the prior written consent of  
Open-E GmbH, Lindberghstr. 5, 82178 Puchheim, Germany.  
Trademarks  
Open-E and Open-E iSCSI logos are all registered trademarks of Open-E GmbH.  
Windows ((R)), Microsoft ((R)) and Apple ((R)) are registered trademarks in the United  
States and other countries. Pentium ((R)) and Intel ((R)) are registered trademarks in the  
United States and other countries. All other trademarks herein are property of their  
respective owners.  
Disclaimer  
Open-E GmbH assumes no responsibility for errors or omissions in this document, and  
Open-E GmbH does not make any commitment to update the information contained  
herein.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5
1 Before you get started  
Congratulations on purchasing Open-E iSCSI, the ideal solution for network-based  
storage management. This manual will assist you as you install and configure the  
hardware.  
In order to quickly reach the desired configuration, please read the following pages  
thoroughly. The time invested is well spent - after all, you have purchased this solution  
for your invaluable data.  
1.1 Content of this package  
Before you begin installing Open-E iSCSI ENTERPRISE, make sure that the package  
contains the following items:  
Open-E flash module  
Power adapter  
Quick Start brochure  
A CD containing the manual (this document), brochures, images and additional  
information material.  
Source CD.  
If something is missing, please contact your dealer.  
1.2 System requirements  
x86-compatible PC  
CPU 1 GHz or faster  
at least 512 MB main memory  
Hardware RAID Controller  
IDE port  
One or several suitable hard drives  
Network Interface Card (NIC)  
Open-E iSCSI contains its own operating system, no additional software is required.  
In order to generate maximum performance, we recommend using a network  
card with 1 Gb or more, as well as a processor with at least 2.8 GHz. If  
several computers are accessing the iSCSI system, we recommend 1024 MB  
main memory or more.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
6
1.3 Supported clients  
Microsoft Windows (all versions)  
Linux  
Unix  
Mac OS 8.0, 9.0 and MAC OS X  
1.4 Supported network protocols  
TCP/IP  
SNMP  
1.5 Required tools  
Grounding strap or mat in order to avoid electrostatic discharge (ESD)  
Tools for opening the computer's enclosure (typically, a screwdriver)  
1.6 Safety precautions  
1.6.1 Personal safety  
High voltages may occur inside computer equipment. Before removing  
the enclosure, please turn off the power switch and disconnect the  
power cords.  
1.6.2 Safety for your data  
If you are not using new hard drives for operating Open-E iSCSI, please backup all  
important data prior to installation. Adding a hard drive to Open-E iSCSI goes hand  
in hand with complete formatting of the hard drive, which can possibly delete  
existing data.  
1.6.3 ESD precautions  
In order to avoid damage to your computer or to Open-E iSCSI, please ensure you  
are grounded before opening the PC or the ESD package that contains Open-E  
iSCSI. Using grounding straps or mats is the best way to ensure this safety. If you  
don't have grounding equipment handy, please make sure you are grounded before  
working with Open-E iSCSI, for instance, by touching a heater.  
Avoid unnecessary touching of the components inside the PC  
Please touch Open-E iSCSI only on the edges  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
7
2 Features  
2.1 What is iSCSI?  
iSCSI (internet SCSI) is a protocol that encapsulates SCSI (Small Computer System  
Interface) commands and data in TCP/IP packets for linking storage devices with  
servers over common IP infrastructures. By using iSCSI, you can supply high  
performance SANs (Storage Area Networks) using standard IP networks like LAN,  
MAN, WAN or the Internet.  
iSCSI solutions are based on a separate operating system and often also on a special  
hardware. Typically, this operating system allows operating iSCSI technology.  
iSCSI solutions allow users to add additional disk devices to existing networks quickly,  
easily, and cost-efficiently.  
iSCSI is a client-server architecture. Clients of an iSCSI interface are called "initiators".  
Initiators issue iSCSI "commands" to request services from components, logical units,  
of a server known as a "target". The "device server" on the logical unit accepts iSCSI  
commands and processes them.  
2.2 Description of the functions  
Open-E iSCSI is one of the easiest ways of implementing an iSCSI technology in your  
network. Through its simple architecture; it is a flash memory with an IDE interface and  
Open-E iSCSi as its operating system, Open-E iSCSI can be used with all x86 PCs  
containing an IDE controller. Older computers may also be used.  
To begin working with Open-E iSCSI, all you need to do is to assign an IP address to  
the iSCSI Target, either automatically through an existing DHCP server or by assigning  
it manually. All other settings are handled via a web front-end, which can be easily  
accessed through the IP address of Open-E iSCSI using the encrypted https protocol.  
Open-E iSCSI allows users of client stations to delegate disk devices and aggregation  
and form iSCSI Targets and their local mounting from any site in the network.  
2.3 Why Open-E iSCSI?  
Often, storage in network environments is expanded the following way: File servers  
have to be shut down in order to install additional drives. In the next step, they need to  
be reconfigured. It is tedious work data often has to be copied manually onto larger  
drives, consuming a lot of time and money.  
With Open-E iSCSI, you can:  
Consolidated storage and backups for multiple servers.  
Improve data availability and efficiency.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
8
Lower costs by centralizing storage management.  
iSCSI also simplifies the installation and on-going management of a SAN versus using  
Fibre Channel.  
With Open-E iSCSI, you can add storage to your existing network quickly, easily, and  
most important cost-efficiently. Expensive hardware is no longer necessary. Take any  
computer, a new rack server or an old desktop PC and exchange the system drive for  
the Open-E iSCSI flash module. To store data Open-E iSCSI ENTERPRISE uses IDE  
(ATA), SATA or SCSI hard drives and hardware RAID controllers.  
Within a few minutes, you will have up to several hundred gigabytes available on your  
network without much effort or any downtime.  
2.4 RAID types  
This manual is not intended to replace your RAID controller manual. But we want to  
provide you with an overview of common RAID types so that you can make an  
informed decision on which type to choose. Depending on whom you ask, RAID  
means either Redundant Array of Independent Disks or Redundant Array of  
Inexpensive Disks. Both are correct. In essence, you combine the capacity, speed and  
security of several disks into one.  
RAID 0 forms one large hard disk by concatenating stripes from each member drive.  
Stripe size is configurable roughly between 64 KB and 1 MB. The result is a lightning-  
fast RAID, but with no added security. One failing drive may ruin the entire RAID.  
RAID 1 mirrors hard drives. By writing identical data onto more than one drive, security  
is enhanced. A completely defective drive does not cause any loss of data. The  
drawback is reduced performance and capacity.  
RAID 5 combines data striping from RAID 0 with parity checking, therefore combining  
speed and improved security. The loss of one drive is tolerable.  
RAID 6 extends RAID 5 by adding an additional parity block, thus it uses block-level  
striping with two parity blocks distributed across all member disks. It was not one of  
the original RAID levels. The user capacity of a RAID 6 array is N-2, where N is the  
total number of drives in the array. RAID 6 does not have a performance penalty for  
read operations, but it does have a performance penalty on write operations due to  
the overhead associated with the additional parity calculations.  
RAID 10 is a combination of RAID 1 and 0, hence the name. Data is written in a striped  
and mirrored configuration, providing high performance and robust security.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9
3 Hardware installation  
3.1 Getting ready  
Switch off the computer, remove the power supply, and open the PC's enclosure. In  
tower cases, the side parts often can be removed individually (on the backside of the  
enclosure you just need to remove a few screws). Many machines have U- or O  
shaped covers that have to be pulled off (either towards the front or the back). Should  
you need any assistance, please contact your dealer.  
Now localize the IDE connectors on your motherboard:  
Every motherboard has at least two such ports. To install Open-E iSCSI, you have to  
use the first (primary) port.  
Often, the labeling on the IDE connectors may be tiny, but it is always there, on each  
and every board. Preferably look for “IDE 0” If this connector does not exist, the first  
port is called “IDE 1” (with the second connector being 2).  
3.2 Installing Open-E iSCSI  
If necessary, remove the flat band cable that connects your hard drive with the  
controller. Open-E iSCSI should now be carefully inserted into the connector. As IDE  
ports can have a notch on one side, you can only insert the connector at the preset  
position.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
10  
In the package you will find an adapter cable, which provides Open-E iSCSI with  
power. The little white plug corresponds with the matching connector on Open-E  
iSCSI. As a final step, the adapter has to be connected to the white power-supply plug  
(see photo):  
That should conclude the installation! Before putting the enclosure on your computer  
again, do not forget to connect your hard drives to the IDE second connector, SATA  
connector or to the SATA port on the RAID controller.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
11  
4 Configuration  
4.1 The basic configuration of the iSCSI computer  
Connect your keyboard and a monitor to the iSCSI computer. You will only need those  
devices for the basic configuration or extended maintenance configuration.  
You may have to change the function “Halt On: All Errors” in your PC's BIOS,  
so that the system starts even without the keyboard. The correct configuration  
is “Halt On: All But Keyboard.”  
4.2 First-time operation of Open-E iSCSI  
Now start your system.  
After booting graphical screen is complete, Open-E iSCSI will provide you with  
information on the current software version and the network settings:  
Welcome to Open-E iSCSI  
-----------------------  
(Press F1 for Help)  
Model:  
Version:  
Open-E iSCSI ENTERPRISE  
1.61.IE00000000.1838  
Release date: 2006-05-22  
S/N: 1357186427  
Network settings:  
interface 1:  
interface 2:  
eth0  
eth1  
ip: 192.168.0.220/255.255.255.0  
ip: 192.168.1.220/255.255.255.0  
Https settings:  
port  
allow from  
443  
all  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
12  
If the network has a DHCP server, Open-E iSCSI should gain access to the IP settings  
automatically. If that is the case, you can proceed at 3.5. If your network does not  
have a DHCP server, Open-E iSCSI will start with the default settings: IP address  
192.168.0.220 and subnet mask 255.255.255.0.  
You can change these values again by typing in the following key combination: left  
CTRL, left ALT and N. You can select a different IP address now. All other available  
functions on of the console will appear after pressing F1 key (see below).  
After a connection has been established, all settings can also be changed remotely  
via the web browser. If your network requires it, the address of the standard gateway  
and the broadcast address can be changed.  
−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− Ηelp −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−  
You can use below key sequences (C-means ‘Left Ctrl’,A-‘Left Alt’)  
C-A-N  
C-A-P  
C-A-I  
C-A-T  
C-A-X  
C-A-H  
F2  
– to edit static IP addresses  
– to restore default factory administrator settings  
– to restore default factory IP configuration  
– to run console tools  
– to display extended tools  
– to display hardware and drivers info  
- to display all network interface  
– to refresh console info  
F5  
C-A-S  
– to shutdown the system  
−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− (100 %) −−−  
< EXIT >  
−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−  
For additional information, please read the chapter “Functions of the console  
display.”  
4.3 Logging into Open-E iSCSI ENTERPRISE  
You can establish a connection to Open-E iSCSI from every network computer. To  
establish this connection, use a browser (e.g. Microsoft Internet Explorer) and enter  
the IP address or the name of the computer hosting the Open-E iSCSI server into the  
For security reasons, Open-E iSCSI uses the encrypted SSL protocol (https).  
You will now be asked for verification of the encryption certification. Since Open-E  
iSCSI does not allow for creating shares on the Internet but only on the Intranet, there  
is no need for global certification by an authorized body. You can accept the  
certificate for the session only, but also for all future use.  
Now you have to accept the license in order to use the Open-E software and you can  
choose the language you want to use.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
13  
Page with the software agreement and available language option will be  
shown after first launching Open-E iSCSI. Later you can change the language  
using Language Settings, which are located in server through Setup.  
After accepting license agreement you can log into Open-E iSCSI Target using the  
standard password “ancom” (this can be changed later). In order to start working, you  
can now set all parameters.  
Password checking is case-sensitive. If you cannot log into Open-E iSCSI,  
please check the status of the Shift and Caps Lock keys.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
14  
4.4 Create RAID Units  
Use the RAID manager to build a disk array, when a hardware RAID controller is  
installed in Open-E iSCSI. To create disk arrays utilize 3ware RAID manager (3DM or  
3DM2) for RAID controllers series 7000/8000/9000. Use an ICP console for INTEL /  
ICP Vortex RAID controllers. For any additional information refer to a RAID controller  
user manual. You can use also storage devices connected to a Fibre Channel.  
If the hardware RAID controller is not installed, you can use software RAID, select  
“RAID| FC” in the menu and then “S/W RAID”.  
You will find a list of any available disk drives (units).  
To create a disk array, please mark any selected unit(s) and choose the appropriate  
RAID from the “destination”. Created RAID units appear as RAID 0, 1, 5 and 6.  
After clicking “create” button, the status will change to “in use” with additional  
information describing the kind of a disk array (e.g. MD0 is RAID 1)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
15  
4.5 Adding Disk Units  
Please select “setup” Æ “target manager” and then “volumes” on the left page. After  
selecting “volumes” you will find a list of all logical units. To add a new unit to the  
iSCSI, please click “Add”. After the initializing procedure, the status of the unit will  
change from the “Add” button into “in use, vg0”.  
Please note that you can expand the storage capacity by adding new disk drives. In  
the “Unit Manager” Function Open-E iSCSI will show both “in use” and “new units”. In  
order to add a new unit to the Volume Group (vg0), please simply click 'Add' after  
which Open-E iSCSI page will be restarted (see below).  
4.6 Creating iSCSI targets volume  
Next, by clicking on the branch “vg0” you can add disk volume to new “targets volume  
(tgv)” and snapshot or increase size on existing tgv's and snapshot (you can't  
decrease tgv size and snapshot). To set needed tgv size just use scrollbar, next to it  
on the right side it shows the available size to use (see below).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
16  
Here you can also set the snapshots number, and add them to the particular „targets  
volume”.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
17  
After creating “tgv” and “snapshots” click on the branch “targets” in Target Volume  
Manager Function, where you add “targets volumes” only in the premises of one vg0.  
Next, by clickling “CHAP user” on the branch, you can management the name and  
secure access to “tgv” by giving CHAP user name and password (password must  
consist from 12 to 16 characters if you use Microsoft iSCSI Initiator).  
4.7 Configuring end user workstation  
For iSCSI technology to work correctly on end-user computers, you need to install  
iSCSI Initiator software (if it is not provided with the operating system). For Microsoft  
Windows 2000/XP/2003 systems, it is an option and the Microsoft iSCSI Initiator is  
available to download from the web.  
Correct software configuration depends on installing individual “target volumes” by  
adding another disk letter in the system (in Windows XP and 2003) or as subfolder the  
same as with folders in UNIX system. All these functions are available via  
“administrative tools” Æ disks management.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
18  
How to connect iSCSI in Windows 2000/XP/2003:  
a. First, you have to install the iSCSI Initiator package. You must be logged in as  
administrator to install the Microsoft iSCSI Software Initiator package,  
b. Next, launch iSCSI Initiator software,  
c. If you set passwords on iSCSI and Target Access, press on branch “Initiator Setting”  
in “Initiator CHAP secret”, enter your passwords, and after entering each click “Save”  
button (your passwords is “Target secret”),  
d. In branch: “Target Portals” click button “Add”, then enter your Open-E iSCSI IP  
address,  
e. Next click “Advanced…” button, and mark “CHAP logon information”, next give User  
name and Target secret and then click “O.K.” button,  
f. In the branch “Available Targets” you will see name of available iSCSI targets e.g.  
“iqn.2005.05:iscsi.target0”,  
g. Click “Log On” button, and if you entered password, you have to do the same as in  
point “e”, then press “O.K.” button, then the chosen target status will change for  
“Connected”  
h. Next choose settings Æ control panel Æ administrative tools Æ computer management  
Æ disk management,  
i. Now all available iSCSI TARGET drives will be displayed. In order to use them you  
have to format them and mount to the system as a next disk letter.  
Microsoft iSCSI Initiator ver. 1.06 does not support dynamic disk. Target  
password must consist of minimum 12 and maximum 16 alphanumeric  
characters. Please read Manual and Release Notes of Microsoft iSCSI  
Initiator for more details, which you can also find on Microsoft website.  
Please do not ignore time settings on Open-E iSCSI and client station. Those  
settings must be the same. Time can be synchronized in the menu Web  
Interface “setup” Æ “server” in Function “Clock settings”  
Download from Www.Somanuals.com. All Manuals Search And Download.  
19  
5 Description of functions  
5.1 Functions of the console display  
While Open-E iSCSI can be fully administered remotely through a secure Web  
interface, some of the functions you can access on the console. Open-E iSCSI  
constantly displays following basic parameters:  
IP address  
Https settings  
CTRL+ALT+n  
If you press the left CTRL key + the left ALT key + n, you will be asked for the new IP  
address and the subnet mask. The DHCP server will be shut down.  
CTRL+ALT+p  
If you press the left CTRL key + the left ALT key + p, the access restrictions are lifted  
by entering the administrator password (in addition, there is a reset to the standard  
https port 443).  
CTRL+ALT+i  
By pressing a combination of left CTRL key + left ALT key +i, you can reset the  
original IP address (192.168.0.220) and the subnet settings (255.255.255.0). In this  
process, the DHCP server support is turned on.  
CTRL+ALT+t  
By pressing a combination of left CTRL key, left ALT key and t, you can run Console  
Tools. The menu will appear, with choice of following functions: Ping, DHCP Ping,  
Hardware info, Memory info, Time configuration, DNS configuration, Language  
settings, Modify driver option and Boot option.  
CTRL+ALT+x  
By pressing the left CTRL key, left ALT key and x, it will display extended tools.  
CTRL+ALT+r  
By pressing the left CTRL key, left ALT key and r, it will display CLI Management Tools  
for ICP Vortex.  
This function appears in Help Console only when an ICP Vortex hardware  
RAID controller is installed in the iSCSI system. In order to get additional  
information read the user manual of ICP Vortex RAID controller manufacturer.  
CTRL+ALT+h  
By pressing the left CTRL key, left ALT key and h, it will display hardware and driver  
information.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
20  
F1, F2 and F5  
Function key F1 is available to display help information while F5 will reset the console  
display to default. If you press F2 key all network interface information will be  
displayed.  
Shutting down and restarting  
With Ctrl + ALT + DEL the Open-E iSCSI host computer will be shut down and restart,  
while CTRL + ALT + S shut it down. Please be careful with this option when users are  
connected.  
5.2 Functions of Open-E iSCSI via browser access  
On the following pages, we will thoroughly describe every function of Open-E iSCSI.  
The functions are divided by menu options, which are located at the top part of the  
screen.  
5.2.1 Setup  
In this menu option, you fill find the following sub-functions: server, network,  
administrator, hardware and target manager.  
5.2.1.1 Server  
This is a key component of the setup menu, as some of the most crucial  
parameters are defined here.  
Function „Server name“  
Select a server name, which will be used to identify iSCSI target names.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
21  
Function “Language Settings”  
English and German are supported.  
5.2.1.2 Network  
In this place you can find functions helpful in management of nets parameters  
Open-E iSCSI system.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
22  
Function “IP address”  
Here you can set TCP/IP parameters for selected NIC.  
You can activate or deactivate network interface by setting "Activate" checkbox.  
You can use static or dynamic(DHCP) network interface configuration.  
If you want to dynamically get DNS address, select "get DNS".  
When using static configuration of network interface, enter address IP, netmask,  
broadcast and gateway.  
If you set new IP address, during activation, you will lose your connection to the  
server and you will have to log in again. In the URL entry line of your browser,  
please enter the new IP address.  
If you do not get access, please try the console to set new IP address. In order to  
access servers in another subnet, you need to enter the address of a router as  
Gateway.  
In case you use NTP server to maintain proper time & date, please  
make sure you have proper Gateway and DNS settings.  
Function “IPSEC”  
IPSEC provides strong authentication and encryption for the connections. It  
makes it nearly impossible to eavesdrop or forge the transmitted data.  
Encrypted data transmission imposes considerable overhead and  
depending on the amount data transmitted can impact the performance  
significantly.  
Function “Bonding”  
Bonding allows for load-balancing or fail-over for the incoming and outgoing  
connections.  
In order to take advantage of bonding more than one ethernet NIC need  
to be plugged into the box.  
set bonding  
Allows you to add new, remove or view settings of the existing bond group.  
mode  
Specifies one of the bonding policies:  
balance-rr  
Transmissions are received and sent out sequentially on each bonded slave  
interface. This mode provides fault tolerance and load balancing.  
active-backup  
Only one slave in the bond is active. Another bonded slave interface is only used  
if the active bonded slave interface fails. This mode provides fault tolerance.  
balance-xor  
Download from Www.Somanuals.com. All Manuals Search And Download.  
23  
Transmit based on [(source MAC address XOR'd with destination MAC address)  
modulo slave count]. This selects the same slave for each destination MAC  
address. This mode provides load balancing and fault tolerance. This mode  
provides fault tolerance and load balancing.  
broadcast  
Transmits everything on all slave interfaces.  
This mode provides fault tolerance.  
802.3ad  
IEEE 802.3ad Dynamic link aggregation. Creates aggregation groups that share  
the same speed and duplex settings. Utilizes all slaves in the active aggregator  
according to the 802.3ad specification. Require: a switch that supports IEEE  
802.3ad Dynamic link aggregation.  
balance-tlb  
Channel bonding that does not require any special switch support. The outgoing  
traffic is distributed according to the current load (computed relative to the  
speed) on each slave. Incoming traffic is received by the current slave. If the  
receiving slave fails, another slave takes over the MAC address of the failed  
receiving slave. This mode provides fault tolerance and load balancing.  
balance-alb  
Adaptive load balancing: includes balance-tlb plus receive load balancing (rlb)  
for IPV4 traffic, and does not require any special switch support. The receive load  
balancing is achieved by ARP negotiation. The bonding driver intercepts the ARP  
Replies sent by the local system on their way out and overwrites the source  
hardware address with the unique hardware address of one of the slaves in the  
bond such that different peers use different hardware addresses for the server.  
mii  
Specifies the MII link monitoring frequency in milliseconds. This determines how  
often the link state of each slave is inspected for link failures. A value of zero  
disables MII link monitoring. A value of 100 is a good starting point. The  
use_carrier option, below, affects how the link state is determined. See the High  
Availability section for additional information. The default value is 0.  
primary  
A string (eth0, eth2, etc) specifying which slave is the primary device. The  
specified device will always be the active slave while it is available. Only when the  
primary is off-line will alternate devices be used. This is useful when one slave is  
preferred over another, e.g., when one slave has higher throughput than another.  
The primary option is only valid for active-backup mode.  
5.2.1.3 Administrator  
In this section you may change parameters of administrator’s access, enabling  
e-mail notification, downloading SLL Certificate for your browser and defining  
power button action.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
24  
Function “Administrator Password”  
Using this function, you can change the password for Open-E iSCSI  
administrator.  
For security reasons, please make sure you change the standard password and  
select a new one.  
Password-checking is case-sensitive. For security reasons, the  
password you enter will not be displayed. Please check the status of the  
Shift and Caps Lock keys.  
Function “Administrator Access”  
Use this function to restrict access to the server administration.  
Set port: you can change https port (default 443)  
IP address: you can assign IP addresses (separated by a semicolon) that are  
allowed to access the Open-E iSCSI Web administration. This field left blank  
means no restriction.  
Lock console without password: disables access to the console  
Lock console with password: to get access to the console you need to type in a  
password. Note that this password should be exactly 8 characters long and  
include only 1-4 digits.  
Unlock console: the unrestricted access to the console  
Download from Www.Somanuals.com. All Manuals Search And Download.  
25  
Please exercise caution with this function when all computers in the  
network have assigned IP addresses via DHCP: any current IP can be  
replaced by a new one only after the lease ends. Please use Lock  
console feature carefully in case of any erroneous IP address settings  
you will not be able to reset default administrator access from the  
console. To restore default settings you have to re-update software in  
the Open-E iSCSI module or contact technical support.  
Function “E-mail notification”  
In case of significant events, critical errors, warnings, etc., system can send an  
email to the administrator. Please enter administrator email address.  
When SMTP server receiving mail, uses the monitoring function of IP  
numbers, it compares IP number from SMTP server (for example open-  
e.com) with IP number of a computer from which email was sent. This  
email may be treated as “spam” and will not be accepted. To avoid the  
above problem, use different SMTP server then the computer currently  
uses. The best solution for a correct email distribution is to use your  
local mail server.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
26  
Function “SSL Certificate Authority”  
If you want to install Certificate Authority (CA) to your web browser, click on the  
SSLCert.crt link. Download CA on Desktop, click on it and "Install Certificate".  
Browser will show you a warning that CA is not trusted and it is normal. Following  
the instructions, you will install CA to your web server.  
If you want to delete or view CA go to: Tools->Internet Preferences->  
Content->Certificates->Trusted Root Certification Authorities and  
OPEN-E GMBH which should be there.  
Function “USE SNMP”  
Simple Network Management Protocol (SNMP) is a protocol for monitoring a  
network and computer equipment.  
With SNMP you can get a lot of information:  
ethernet traffic,  
memory info,  
usage of CPU,  
system load,  
running processes  
uptime,  
MAC addresses of network card.  
System location and system contact are only for your information, for example  
when you connect from SNMP client, you will see your location and name.  
This function enables you change the access over the SNMP protocol in version  
2 or 3.  
SNMP in version 2 does not have encrypted transmission and authentication is  
only by community.  
SNMP in version 3 has encrypted transmission and authentication by community,  
login and password.  
The community you are setting can be max up to 20 characters and password  
min 8 characters.  
Links to SNMP clients:  
For better security use only SNMP 3 version ! This version provides  
login, password and encrypted transmission.  
How to retrieve information from SNMP?  
From Linux:  
snmpwalk - Æ it is command-line tool from snmp-package.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
27  
You can get information by:  
snmpwalk -v 3 -u public -l AuthNOPriv -A MD5 -A public123 adres_ip  
SysUpTime  
- v 3  
--> use only 3 version  
- u public --> community name  
- A MD5 --> encrypted by MD5  
- A public123  
address_IP  
SysUpTime  
--> password  
--> IP of iSCSI server  
--> OID with system uptime information  
To use SNMP from command line you have to know OID's, for example:  
ssCpu (processor load), mem (memory info), Location.  
But it is not the best choice to retrieve info from command line. You have to  
install SNMP client, so you can easily read any information you want.  
From MS Windows you can use following Windows Clients: PRTG, MIB Browser  
Professional, SNMP MIB Query Manager and INFTRAF.  
If you can't retrieve information from SNMP client, you can check  
iSCSI_ip/check_sys/index.html. There are SystemLoad, CPU, Memory,  
Swap, Uptime.  
Function: Remote access  
Using this function, you can administrate console tools remotely by ssh protocol  
(secure shell). Default user is 'cli' and you cannot change it, but password can be  
change.  
Allow IP:  
Set port:  
Password:  
You can assign IP addresses (separated by a semicolon) that  
are granted to iSCSI remote access. The field left blank means  
no restriction.  
Default port is 22222 for security reasons, because high ports  
are invisible for port scanners. You can change it only from  
range 1024-65535 except ports already used.  
Length of password is minimum 8 characters. Be sure to use  
strong passwords.  
Confirm pass.: Please retype your new password.  
Password cannot contain:  
characters: ' " ` ^ & $ # [ ] \/ | *  
spaces.  
To connect to iSCSI from Linux/MacOSX systems use:  
ssh -2 -p 22222 -l cli address_ip  
option: -2 is a version of ssh protocol used for connection.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
28  
option: -p is a port for Remote Access.  
option: -l is a user (In our product the user must be "cli").  
option: address_ip is a address of server you want to connect to.  
You will be ask for a password you entered on server for Remote Access.  
To connect to server from Microsoft Windows, download free ssh client Putty  
In Host Name (or IP address) field please enter IP address of the server  
In Port field please enter the same port as in the server GUI (default 22222)  
In Protocol please choose SSH  
In Category: Connection -> Data -> Auto-login-username please enter: "cli"  
In Terminal -> Keyboard -> The Function Keys and keypad please select  
"VT100+"  
Go back to Category Session, enter session name in field Saved Sessions and  
click on "Save" button.  
Then click on new saved session, click "Open" and enter the "password". (In  
case you did not enter Auto-login-username, it will prompt for username, so  
please enter: "cli")  
5.2.1.4 Hardware  
Function: “UPS configuration”  
In the function you can select a UPS device desired (Uninterrupted Power  
Supply). For the connection of the UPS device to the Open-E iSCSI, the USB port  
is most frequently used.  
In the settings you can select the UPS model, cable type, connection port and  
the length of the time out. The time-out defines the time between a power failure  
and the moment the system will shut down. UPS support in mode “Single”  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
29  
means that Open-E iSCSI is the only system attached to this UPS and that there  
is no action necessary to do remote shutdown for other systems in the network.  
Single means, that Open-E iSCSI is the only system attached to this UPS and  
that there is no action necessary to do remote shutdown for other systems in the  
network.  
Master means, that Open-E iSCSI is connected to the UPS and sends a signal  
through the network to shutdown other systems in the network.  
Slave means, that Open-E iSCSI is reacting on a "power down-signal" from an  
UPS master.  
During a power failure you cannot log into the Open-E iSCSI. Users,  
who are connected to the Open-E iSCSI server during the UPS-time  
continue to have full access to all files on the iSCSI target.  
Function “Clock settings”  
Here you define an NTP server (Network Time Protocol) to synchronize your  
Open-E iSCSI with a time server on the Internet.  
Time and date display are static. What is shown are the time and date  
at which the setup menu was accessed.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
30  
Function “Set time”  
With this function, date and time can be entered manually. Alternatively, take the  
route via an NTP server, which has to be defined in the previous function.  
Function “Power button settings”  
In this section you specify which action will be performed in case of power button  
is pressed Options:  
no action (none option),  
restart computer (reboot option),  
power off computer (halt option).  
Function “Motherboard info”  
With this function you can check info about your motherboard.  
5.2.1.5 Target Manager  
Function “Unit Manager”  
After clicking on the branch “volumes” in the left part of page you will find a list of  
all available units with entire disk size. In order to integrate available units into the  
volume group, just use the “add” button, after which the unit will combined into  
one volume group.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
31  
Next, the page will be reloaded, and status field will show your units as “in use”  
and with new group e.g. “vg0”. The Volume Group is the equivalent of a physical  
disk from the system point of view. It is also possible to combine two (or more)  
units into one Volume Group by choosing one of actually existing groups like  
“vg0”, or by choosing “new” option, which will create new group “vg1” after  
using “add” button.  
Function: Disks Localizer  
This function helps find disks in cage in your iSCSI server.  
If you connect hard drives to hardware RAID controller then you may not be able  
to determine which unit is which disk using S.M.A.R.T. tool or hardware RAID  
management tool (depends on manufacturer of RAID controller).  
When you click on "start" button then appropriate disk will start reading and you  
can determine which disk is it by watching "disk-activity LEDs". For proper  
operation of this function there should be no other activity on hard drives.  
Localization will stop automatically after one minute if you will not stop it  
manually (by unsetting appropriate checkbox and hitting apply button).  
Using this function during normal operation is highly not recommended  
and will cause slowing down your server.  
When the added unit is integrated, it cannot be remove in Web  
Interface. You need to use extended tools in console.  
You can only add units with capacity greater than 5 GB, smaller units  
are not supported.  
Function “Units Assigned”  
Here listed units are assigned to current volume group.  
Function “iSCSI Volume Manager”  
Using this function you can create new iSCSI target volumes inside one Volume  
Group. The iSCSI Volume is the equivalent of partitions, which are available for  
client stations. You can increase capacity of existing Logical Volume.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
32  
Depending on needed capacity administrator can add more capacity to  
particular Logical Volume. Using iSCSI Volume Manager Function you can add  
disk space to new LV and “snapshot” or increase size on existing iSCSI Volume  
and snapshot (you can’t decrease the size). To set needed iSCSI Volume size  
use scrollbar on the right side, it shows size available for use. In order to set the  
precise iSCSI Logical Volume size use left or right keyboard cursor key.  
This function can be also used to reserve disk space for “swap”.  
The SWAP is additional disk space used by the system to temporally release  
some amount of used RAM memory. So you can reserve some shared disk  
space for the system SWAP memory. We have added a lot of new features in  
our latest release that consume additional memory, so in some cases e.g.  
512MB of RAM would not be enough and some processes like SWAP would not  
function without additional RAM.  
Function “Number of snapshots”  
Here you can define number of snapshots for the server.  
Please take into account that changing the amount of snapshots will  
automatically reset all the settings in function Snapshot definition.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
33  
Function “Snapshot definition”  
This feature takes so-called snapshots of the file system. The Snapshot function  
of Open-E iSCSI enables the system administrator to freeze the data content of  
the targets volume at a period of time, this function is transparent to the user.  
From this moment on, the users work on a virtual data volume, all changes to the  
volume are stored in a different partition. The storage of all changes is  
independent of the file-system Open-E iSCSi uses on block-level. Only when the  
snapshot is deleted / removed the changes are permanently transferred to the  
actual data volume. Through a separate share, which is only available for the  
administrator, a complete backup of the dataset can be done. With the snapshot  
technology even a database can be backed up while the users are working on it.  
Snapshots can be activated / deactivated manually or automatically.  
In the schedule options "Begin time" and "End time" and day of week are used for  
automatic snapshots: this is the time of automatic activation and deactivation  
(syntax is “him”). When snapshot start is set, the snapshot will be deactivated  
and activated again at the given time.  
Alternatively, snapshots can be taken manually in the Maintenance->Snapshot  
menu even if snapshots are automatically created under “Snapshot Definition”.  
The button remove all can by useful for removing all snapshots at one time.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
34  
Function “Create new target”  
To create a target assign a name or leave the "Target Default Name" option  
checked. Target name can contain alphanumeric characters: ' . ' ' : ' - '  
A target name is considered case-insensitive. Every character entered will be  
converted to low-case. No spaces and no underscores are permitted.  
The server name will be used as a part of the default target name  
In this function you can create new targets, which will be seen in client stations  
as logical disks. You can change the name of any target.  
After creating new target (see below) there will be created a new branch:  
“target0”  
Function: CHAP User Target Access  
Add CHAP users that are granted to access to this target.  
You can use following keyboard keys in the lists (first set focus to  
desired list):  
o
o
o
o
Home: jump to the first  
End: jump to the last  
Shift + arrow key: for multi-select  
letter key: jump to the first position starting with pressed key  
If you enable CHAP user access authentication but will not select any users to  
have access, then nobody will have access to the Target.  
Additionally you can set password required to establish connection of iSCSI  
Initiator to iSCSI Target Server.  
To do this please use the function iSCSI Access Password situated in setup ->  
target manager -> targets.  
The Microsoft iSCSI software initiator requires using password from 12  
to 16 alphanumerical characters.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
35  
Function “Target Volume Manager”  
By using this function you can add available target volumes in premises of one  
target. In case of defining more than one target – free volumes will be available in  
actually edited volume. Analogically as with SCSI devices, it is possible to define  
LUN address device.  
Function “Target IP Access”  
You can assign network classes or specify individual IP addresses that have  
permission to access the target. Entries should be delimited by commas. When  
no entries are present everyone is permitted to access the target. Specifying at  
least one entry excludes all the clients that do not match it from accessing the  
target.  
Please note that already active sessions to the target will persist regardless of the  
newly applied settings. You can ensure that the settings are in force immediately  
after you apply them by going to maintenance->shutdown->Connection reset  
and resetting the connections manually. Keep in mind that all the unsaved client  
data might be lost.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
36  
Function “Target Rename”  
This function provides a new target name.  
Function “Target Remove”  
Removing target removes all the volumes from the target.  
Please note that the data stored on the volumes are not automatically  
removed. You can assign the volumes to different targets and still see  
the data. Please remove the data prior to removing target in order to  
prevent leakage of sensitive or classified information.  
Function: CHAP User Target Snapshot Access  
Add CHAP users that are granted to access the Target Snapshot.  
You can use following keyboard keys in the lists (first set focus to  
desired list):  
o Home: jump to the first  
o End: jump to the last  
o Shift + arrow key: for multi-select  
o letter key: jump to the first position starting with pressed key  
If you enable CHAP user access authentication but will not select any users to  
have access, then nobody will have access to the Snapshot.  
Additionally you can set password required to establish connection of iSCSI  
Initiator to iSCSI Target Server.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
37  
Function: Target Snapshot Access  
You can assign network classes or specify individual IP addresses that are  
permitted or denied to access the snapshot. Entries should be delimited by  
commas. When no entries are present in Denied access or Allowed access fields  
everyone is permitted to access the snapshot. Specifying at least one entry in  
Allowed access field excludes all the clients that doesn't match it from accessing  
the snapshot. When you specify at least one entry in Denied access field, every  
CHAP user or CHAP users from network class address are denied form  
accessing the snapshot. When you specify any IP address in Allowed access  
field, CHAP users form that address are allowed to access the snapshot even if  
the same address has been specified in Denied access field. If you enter only  
Allowed access field then Denied access field will be automatically entered with  
0.0.0.0/0 entry.  
Please note that already active sessions to the snapshots will persist  
regardless of the newly applied settings. You can ensure that the  
settings are forced immediately after you apply them by going to  
maintenance->shutdown->connection reset and resetting the  
connections manually. Keep in mind that all the unsaved client data  
might be lost.  
There is possibility of entering network class address in two ways:  
192.168.2.0/255.255.255.0 - normal form  
192.168.2.0/24 - short form.  
When You enter network class address in normal form, it will be automatically  
converted to short form.  
Examples:  
Denied access: 0.0.0.0/0  
Allowed access: 192.168.2.30/0, 192.168.3.45  
This settings deny access form every IP address or network class address, only  
addresses in Allowed access field are granted for accessing the snapshot.  
Denied access: 192.168.0.0/16  
Allowed access: 192.168.2.30, 192.168.10.230, 192.168.30.0/24  
This settings deny access to any IP addresses form network 192.168.0.0/16.  
Grant access for IP addresses 192.168.2.30, 192.168.10.230, all IP addresses  
from network 192.168.30.0/24 and all IP addresses that have not been denied in  
Denied access field.  
Function “Snapshot rename”  
With this function you will provide a new name for the snapshot target.  
Function: Create new CHAP user  
To create CHAP user enter name, password, retype password  
and press create button.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
38  
CHAP user name cannot:  
o contain characters: ~ ! @ # $ ^ & ( ) + [ ] { } * ; : ' " ., % | < > ? / \  
= `  
o begin or end with a space.  
Password cannot:  
o contain characters: ' " `  
o spaces.  
o The length of the password must be within 12 - 16 characters.  
If CHAP users forget their password, there is no way to retrieve it. You can only  
set a new password. do this please use the function iSCSI Access Password  
situated in setup -> target manager -> targets.  
Function: Edit CHAP user  
To change CHAP user password enter and confirm password, and press "apply"  
button.  
Password cannot:  
o contain characters: ' " `  
o spaces.  
The length of the password must be within 12 - 16 characters.  
Function: Delete CHAP user  
Click "remove" button to remove the CHAP user form the system.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
39  
Using snapshot with Open-E iSCSI  
Usage snapshot facility heavily depends on the initiator of software support for  
dynamic units* and the partition scheme which you use on the operating system  
where you attach the targets. The most common error is if on the client side that  
uses an LVM/LVM2 (Linux) scheme or Microsoft's Dynamic Disks which connect  
to the snapshot and original volume from the same client malfunctions. This is  
due to the fact that normally an LVM volume bares special metadata which is  
used as the identify information and since a snapshot simply doubles those  
metadata it can confuse your partitioning software (for example logical volume  
manager sees two identical volumes).  
In order to take proper advantage of Open-E iSCSI Target's snapshot technology  
the volumes your Open-E iSCSI Target exports should be imported in your  
operating system as Basic Volume (Windows) and you should not incorporate  
them as logical volumes in LVM/LVM2 (on Linux) if you plan to use snapshots  
and access them from the same machine at the same time.  
If you plan to take snapshots and import them alongside the original volume -  
access them from the same client. Below is instruction how to import a target in a  
Microsoft basic volume:  
a. Create target volumes (tgv),  
b. Create a target in Open-E iSCSI,  
c. Add chosen volumes to the target.  
d. In MS iSCSI Initiator add Open-E iSCSI Target as an iSCSI portal in the MS iSCSI  
Initiator console,  
e. Log onto the target,  
f. Open the computer management,  
g. Select the disk management,  
h. Add the volumes as basic disks,  
i. On Open-E iSCSI Target create snapshots: setup Æ target manager and reserve  
desired space for snapshots (reserve about 5-20% of total space for the  
snapshots). Determine number of snapshots, assigned to the volumes and  
distribute the reserved space as needed. To activate a snapshot go Maintenance  
Æ Snapshot.  
j. Follow the steps e-h to log and attach the snapshot target.  
*) Currently iSCSI Microsoft Initiator ver1.06 does not support dynamic volumes.  
The best solution to use snapshots without decreasing Open-E iSCSI  
performance is to assign separate RAID. This RAID will be optimized for  
a writing speed (e.g. few disks in RAID 0 only for snapshots). Follow the  
steps below:  
a. Add RAID chosen for data as NEW (Vg0) in the menu WebGui: setup Æ target  
manager Æ Volumes,  
b. Create one or more Tgv’s. At this point, there is no free space reserved for  
snapshots,  
c. Add the second RAID to existing Vg0, intended for snapshots, (RAID previously  
configured as RAID 0),  
d. Now only reserve all available space for snapshots.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
40  
e. The above procedure will greatly decrease the overload of a disk intended for  
data and will cut down the performance drop off in Open-E iSCSI with a  
snapshot turned on.  
5.2.2 Maintenance  
This page accessed with the Maintenance tab contains settings and functions  
pertaining to general management operations.  
5.2.2.1 Shutdown  
Function “System Shutdown“  
When using this function, you can shut down the Open-E iSCSI.  
The Open-E iSCSI can only be turned on again manually.  
Function “Schedule for shutdown“  
Here you can set more specific information like the time and day of a week for  
the shutdown.  
Function “System Restart”  
This function is self-explanatory: It allows restarting the system.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
41  
Function “Connection reset”  
It might be necessary to restart the iSCSI daemon to inform client about specific  
setting changes, e.g. resize of the volumes.  
All current connections with iSCSI initiators will be terminated  
immediately. It may cause loss of unsaved data files.  
If your client does not reestablish the connections automatically you will  
have to do it manually from the clients.  
5.2.2.2 Snapshot  
Here you can instantly create and remove snapshots. This can be useful if you  
need to make considerable changes to your data while you do not know if these  
changes are supposed to be permanent.  
5.2.2.3 Miscellaneous  
The next menu option is “miscellaneous” This function allows you to save  
settings, to retrieve them, and to remove them. To use those functions you must  
have had pen drive (USB Flash Memory) connected to USB port.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
42  
5.2.2.4 Software Update  
This function allows you to update the system software. There are two ways of  
updating Open-E iSCSI software.  
During updating from share please follow this steps:  
In resources menu create share "update" with default path.  
1. .Copy update file into update folder.  
2. .Press Update button.  
3. .Confirm update when you will be asked.  
Some updates need a system restart. In this case you will be informed  
about needed restart in confirmation message.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
43  
During update from CD please follow this steps:  
1. Write down the actual NAS server IP address and NAS server name. After having  
updated NAS, please re-enter both.  
2. Write down authorization settings. Before Updating, please save “User”,  
“Groups”, “Shares” and  
3. Under Menu: “Maintenance -> Resources Misc -> Save resources”.  
4. Download and save NAS Server Logs: Menu status -> hardware in Function  
Logs click on “Download”, then save on your local HDD.  
5. The ISO-Files which include in update file must be burned on a CD with your  
favorite Burning software. (For example: Nero Burning ROM - option: “Burn  
Image”, etc.)  
6. In order to re-flash the module, please install CD-ROM as Secondary-Master and  
DOM (disk-on-module) as Primary-Master.  
USB CD-ROM can be used as well.  
7. Set the BIOS to boot from CD-ROM drive.  
8. Boot from the ISO-CD and wait until prompt: “Update complete, Please Remove  
CD and restart”  
9. After re-fleshing, please reset the BIOS to boot from Primary-master HDD.  
Updating the system may take about 10 minutes.  
Please remember that making an update is activity that cannot be  
stopped in any way. We strongly recommend to update system  
when UPS is connected.  
Function: Update downloader  
With this function you can check if there is new update available and download it.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
44  
In order to download a new update you need to be registered at www.open-  
e.com. You also have to remember to setup correct DNS and Gateway address  
in “setup” -> “network menu”.  
5.2.2.5 S.M.A.R.T.  
Function: S.M.A.R.T. e-mail notification  
This function allows you to check S.M.A.R.T. status of hard disks and send it to  
e-mail address.  
S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) is a monitoring  
system for computer hard disks to detect and report on various indicators of  
reliability, in the hope of anticipating failures.  
In order to enable S.M.A.R.T. e-mail notification, you have to first enable E-mail  
notification function in setup -> administrator menu, then enable S.M.A.R.T. in  
Console tools at special options (press F1 on console to find out keyboard  
shortcuts).  
When S.M.A.R.T. is enabled you will see all detected hard drives with information  
about unit number, size and serial number.  
Select the checkbox of unit, form which you want to receive S.M.A.R.T. status  
and press "apply". If everything is ok, then status will be PASSED, in another case  
FAILED.  
It will be possible to enable S.M.A.R.T. when all hard disks support it and  
it is enabled in BIOS settings.  
5.2.3 Status  
This function provides you with a quick overview of the most important system  
parameters of your Open-E iSCSI. The corresponding sub-functions are network,  
hardware and S.M.A.R.T.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
45  
5.2.3.1 Network  
This function provides information on the IP address, Open-E iSCSI date and  
time and iSCSI status connections.  
5.2.3.2 Hardware  
The “Hardware” option provides you with information on storage and network  
controllers and the drivers (e.g. network driver and IDE driver). In addition, you  
may also download the latest Open-E iSCSI log files, remove them, check  
memory (RAM) usage and motherboard info..  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
47  
5.2.3.3 S.M.A.R.T.  
Through the S.M.A.R.T. system, modern hard disk drives incorporate a suite of  
advanced diagnostics that monitor the internal operations of a drive and provide  
an early warning for many types of potential problems. When a potential problem  
is detected, the drive can be repaired or replaced before any data is lost or  
damaged.  
Here you can find a tree with hard drives for which you can view S.M.A.R.T.  
information.  
It is possible to view information about separate hard drives or a summary for all  
drives in the system.  
To view S.M.A.R.T. information for a hard drive - please click on appropriate drive  
name.  
To view summary please click on "all units"  
Function: S.M.A.R.T. unit’s health status  
This function allows you to check S.M.A.R.T. status of hard disks. S.M.A.R.T.  
(Self-Monitoring, Analysis, and Reporting Technology) is a monitoring system for  
computer hard disks to detect and report on various indicators of reliability, in the  
hope of anticipating failures.  
To enable S.M.A.R.T. checks you need to use console tools and enable it in  
"special options"  
It will be possible to enable S.M.A.R.T. when all hard disks support it  
and it is enabled in BIOS settings.  
When S.M.A.R.T. is enabled you will see all detected hard drives with information  
if specified drive has passed health checks. To view more information and/or do  
more advanced test click on drive in drives tree on left side.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
48  
Function: S.M.A.R.T. info  
This function allows you to view S.M.A.R.T. parameters which this disk is able to  
return.  
In the upper part of this function you can see elementary parameters of hard  
drive such as device model or serial number. Below there is a table with  
S.M.A.R.T. attributes. In first column you will find an attribute name, in second -  
minimum threshold value of this parameter, then current value, next worst value  
and after the status.  
If the value of this attribute ever exceeds the worst of this value then the  
status will be "failed". If value of attribute is on the edge of the worst  
value then the status can be "pre-failed". On some hard drives part of  
the attributes can be displayed as "Unknown Attribute". This can  
happen when the manufacturer of that hard drive have done some  
modifications in S.M.A.R.T. and these changes are not yet supported by  
our software.  
Button "view errors" provide you ability to view S.M.A.R.T. log of that drive which  
is generated automatically.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
49  
Function: S.M.A.R.T. test  
This function allows you to perform short and long tests of the hard drive. You will  
be informed about progress of the test. After the test finishes please click on  
"results" button to view test log.  
Performing a test is not recommended during normal (daily) usage of that hard  
drive.  
On some motherboards and controllers S.M.A.R.T. tests can not be  
performed.  
5.2.4 RAID | FC  
In this place you can manage hardware RAID controllers, Fibre Channel or create  
disk array using software RAID.  
5.2.4.1 H/W Raid  
Please note that the RAID controller should be supported by the Open-E  
software. If a 3ware controller is installed you can click on RAID in the menu and  
the 3ware web base will start automatically.  
Function: “3ware administrations”  
This function will reset the 3DM password to factory default. (Default 3DM/3DM2  
password: 3ware)  
It is important to realize the need for time synchronization between an  
Open-E NAS/iSCSI box and the client browser you use to access the  
configuration panel. Since access to 3ware configuration utility expires  
after a certain time period (after period of inactivity). Open-E iSCSI/NAS  
must be in the same time zone as client station, if the difference  
becomes too large you'll loose authorization token to early or your  
authorization will be invalid immediately.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
50  
5.2.4.2 Fibre Channel  
When a fibre channel controller is detected you will find utilities and options  
specific to that hardware.  
Function: QLOGIC administration  
If a QLA23xx series controller is installed, you can use commandline tool in the  
Console Tools (press CTRL+ALT+F).  
The QLA23xx controller allows for remote administration. To access the  
configuration daemon download the client application SANsurfer from  
homepage provided by QLOGIC. Install it on your system and configure to  
access this server. Follow the online instructions to configure. If in doubt consult  
documentation manual. Make sure you have the essential information handy (Ip  
address of your server, username and password).  
5.2.4.3 S/W Raid  
Here you will find functions with which you can create software RAID units.  
Function: Create new S/W RAID unit  
In this function you can create software RAIDs from free (not used) units. If you  
want to create RAIDs form used units, you need first to Delete content of units in  
console, be aware this would ERASE all data form units.  
To create a RAID select units, then from ListBox select what type of RAID it will  
be, then select desired Chunk size. After setting all demanded parameters press  
“create” button.  
Allow to create degraded mode - it allows to create RAID1 with one unit, RAID5  
with two units or RAID6 with three units, even if minimal number of units is not  
meet.  
Chunk size - its a minimal portion of data that is written at a time.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
51  
Available RAIDS:  
RAID 0: it is stripe array and requires, minimum 2 units. In RAID 0 You can set  
the Chunksize 4k - 256k. The destination size of the RAID Array will be  
sum of each drive size in array.  
RAID 1: mirror array requires 2 units. Destination size will be equal:  
(SINGLE)UNIT_SIZE, where (SINGLE) UNIT_SIZE is the size of the  
smallest unit in array.  
RAID 5: stripe + parity algorithm array (required, minimum 3 units - with the  
same capacity). You can choose from the ListBoxes: (layout)parity-  
algorithm [left/right] [symmetric/asymmetric]. DESTINATION SIZE:  
(NR_OF_UNITS-1)*(SINGLE)UNIT_SIZE, where (SINGLE) UNIT_SIZE is  
the size of the smallest unit in array.  
RAID 6: stripe + parity algorithm array (required, minimum 4 units - with the  
same capacity). You can choose from the ListBoxes: (layout)parity-  
algorithm [left/right] [symmetric/asymmetric]. DESTINATION SIZE:  
(NR_OF_UNITS-2)*(SINGLE)UNIT_SIZE, where (SINGLE) UNIT_SIZE is  
the size of the smallest unit in array..  
The (layout) parity-algorithm in RAID 5 and 6 is described below.  
To remove RAID, if previously added to Volume Group please enter Console Tool  
and first delete Volume Group of the RAID. Then the Remove button will be  
enabled. Otherwise simply press Remove button.  
You can add spare units to RAID1, RAID5 and RAID6 arrays.  
Please remember that after creation of an RAID, in Function: 'Info' will be shown  
progress of Synchronization. Till end of this process all actions done on this array  
will be performed a bit slower.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
52  
RAID 5 (layout) parity-algorithm  
It is possible to set one of four algorithms of placement data blocks and parity  
blocks in matrix. Our default option is left-symmetric, which is the best for large  
reads. Other recommended value is left-asymmetric.  
Left-Asymmetric Algorithm  
Left-Symmetric Algorithm  
Unit  
S0  
0
3
6
Unit  
S1  
1
Unit  
S2  
2
Unit  
S3  
Parity  
5
8
11  
Unit  
S0  
0
4
8
Unit  
S1  
1
Unit  
S2  
2
Parity  
6
10  
Unit  
S3  
Parity  
3
7
11  
4
Parity  
5
Parity  
9
13  
7
Parity  
9
13  
Parity  
12  
10  
14  
Parity  
12  
Parity  
14  
Parity  
Right-Asymmetric Algorithm  
Right-Symmetric Algorithm  
Unit  
S0  
Parity  
3
Unit  
S1  
0
Parity  
7
10  
Unit  
S2  
1
Unit  
S3  
2
5
8
Unit  
S0  
Parity  
5
Unit  
S1  
0
Parity  
8
10  
Unit  
S2  
1
Unit  
S3  
2
4
6
4
3
6
9
Parity  
11  
13  
7
9
Parity  
11  
13  
Parity  
14  
Parity  
14  
Parity  
12  
Parity  
12  
RAID 6 (layout) parity-algorithm  
It is possible to set one from four algorithms of placement data blocks and parity  
blocks in matrix. Our default option is left-symmetric which is the best for large  
reads. Other recommended value is left-asymmetric.  
Left-Asymmetric Algorithm  
Left-Symmetric Algorithm  
Unit  
S0  
0
Unit  
S1  
1
Unit  
S2  
Parity Parity  
Unit  
S3  
Unit  
S0  
0
Unit  
S1  
1
Unit  
S2  
Parity Parity  
Unit  
S3  
2
Parity Parity  
3
5
3
Parity Parity  
2
5
Parity Parity  
Parity  
8
4
7
Parity Parity  
Parity  
8
4
7
6
9
Parity  
6
9
Parity  
Parity Parity  
Parity Parity  
Right-Asymmetric Algorithm  
Right-Symmetric Algorithm  
Unit  
S0  
Parity Parity  
Unit  
S1  
Unit  
S2  
0
Unit  
S3  
1
Unit  
S0  
Parity Parity  
Unit  
S1  
Unit  
S2  
0
Unit  
S3  
1
2
4
Parity Parity  
3
3
4
Parity Parity  
2
5
6
9
Parity Parity  
Parity  
Parity Parity  
5
6
Parity Parity  
Parity  
8
7
Parity  
Parity Parity  
7
8
Parity  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
53  
Function: “S/W RAID E-mail notification “  
It is possible to send notification by e-mail about events on software RAID arrays  
(e.g. rebuild started, rebuild finished, span is active). In order to do so please  
check Send array events.  
In order to “Send array events” you must enable E-mail notification in  
“setup” Æ “administrator”.  
If you check "Include resyncing/recovering progress" - you will be informed  
about progress of resync/rebuild if it is currently running. An e-mail will be send  
for every 20 % completed.  
If you check "Include array status" - to every event will be added the status of  
event-related array.  
After choice Raid Levels and by clicking “apply” button appear in field “Status”  
“in use” (see below)  
By clicking on the branch “MD0” appears new page, with Functions Manager,  
Info and Software RAID unit remove.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
54  
Function: „Manager“  
In this function you can manage RAID array  
Available operations:  
RAID 0:  
Construction of this RAID does not allowed to manage it anyway. Every unit must  
not be Failed. If any would be the whole array would be destroyed.  
RAID 1:  
To set unit as a Faulty one mark proper checkbox (in the column F) and click on  
Apply button.  
To delete any unit form an array mark proper checkbox (in the column R) and  
click on Remove button.  
RAID 5:  
To set unit as a Faulty one mark proper checkbox (in the column F) and click on  
Apply button.  
To delete any unit form an array mark proper checkbox (in the column R) and  
click on Remove button.  
RAID 6:  
To set unit as a Faulty one mark proper checkbox (in the column F) and click on  
Apply button.  
To delete any unit form an array mark proper checkbox (in the column R) and  
click on Remove button.  
RAIDs notation:  
PR - priority in array - describes priority of unit that will be added to array if  
another is set to Faulty.  
F - faulty - unit can be turned off from array  
R - hot remove - unit can be removed form array without shutting down the  
system.  
ST - describes state of unit in array, which can be:  
o
o
o
A - This means that Unit is active in array  
* - Number of Unit that belongs to the array  
S - Spare or spare rebuilding - this means that unit is free and can be  
added to the array or is free and currently is rebuilding.  
Limitations:  
There is no possibility to set any unit as faulty if the matrix is degraded or during  
resync/rebuild.  
While using RAID 1 and RAID 5 there is possibility to set only one disk from  
active as faulty. This regulation is not valid for Spare units in array.  
Only one disk form Active in Array can be set as Faulty or Removed  
Download from Www.Somanuals.com. All Manuals Search And Download.  
55  
Function: „Info“  
From this function you can obtain information like Creation Time, RAID Level,  
Array and Device Size, Update Time and state  
During syncing or rebuilding of array it is recommended to preform as  
few disk operations as possible. Status of syncing/rebuilding will be  
showed "live" - without need to refresh page manually.  
Function: „Software RAID unit remove“  
This function allows you to remove Software RAID unit (MD[nr]).  
This function is available only when no Logical Volume is created on  
appropriate MD[nr] and unit is not resyncing. If you want to remove  
software RAID unit with Logical Volume please use console Extended  
tools (press F1 on console to find out keyboard shortcuts) and remove  
Logical Volume first.  
5.2.5 Help  
When accessing Help - “Software License” you can read the license for software  
included in Open-E iSCSI ENTERPRISE.  
You can download a PDF version of this manual. In order to read the manual, you  
need a PDF viewer such as the Acrobat Reader (http://www.adobe.com).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
56  
By clicking on “Registration” in the “Help” menu you can register yourself at  
“About Open-E iSCSI ENTERPRISE” indicates which system version you are  
currently working with. In addition you find contact information regarding Open-E  
iSCSI Target; for instance how you can reach Open-E’s technical hotline if you  
should have problems or questions.  
You log out by closing the browser window.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
57  
6 Troubleshooting Guide  
Here is a list of common error messages and their meanings as well as corresponding  
tips on how to resolve the underlying problem. If your error message is not listed here  
please contact Open-E's support and service team (see section “help” above). Our  
staff will help you find a solution.  
Open-E iSCSI does not boot, keyboard LEDs are flashing  
This problem arises when you installed Open-E iSCSI into the secondary IDE slot by  
mistake. Open-E iSCSI is configured for and will only run in the primary IDE connector.  
Shut down the computer, remove Open-E iSCSI from secondary and place it into  
primary IDE slot. That should solve the problem.  
Error: values are not valid  
You have entered an invalid parameter. IP addresses have the form aaa.bbb.ccc.ddd:  
All four parameters range between 0 and 255 and are always separated by periods.  
Error: passwords do not match  
Make sure that you type the same password in each entry field. For safety reasons,  
the passwords are not displayed. Type slowly. Check the status of the Shift, Caps  
Lock, Control, and Alt-keys.  
Error: No pendrive detected  
You instructed Open-E iSCSI to perform a systems update, but did not supply a valid  
Open-E iSCSI update file. Download the latest Open-E iSCSI update file from the  
them to USB port. Please spell upgrade lower case. Finally, press update button.  
Error: invalid administrator password  
Administrator password cannot begin or end with a space. Spaces are not legitimate  
characters at the beginning and end of a password. Maybe you inadvertently hit the  
space bar during password entry. Reenter your password.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
58  
7 Appendix A  
Open-E Software License agreement  
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE  
AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. OPEN-E GMBH AND/OR  
ITS SUBSIDIARIES ("OPEN-E") IS WILLING TO LICENSE THE SOFTWARE TO YOU AS  
THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING  
THE SOFTWARE (REFERENCED BELOW AS "YOU OR YOUR") ONLY ON THE  
CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT.  
THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND OPEN-E. BY  
OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE "AGREE" OR  
"YES" BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR  
LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS  
AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK  
ON THE "I DO NOT AGREE", "NO" BUTTON, OR OTHERWISE INDICATE REFUSAL,  
MAKE NO FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL PRODUCT  
WITH PROOF OF PURCHASE TO THE DEALER FROM WHOM IT WAS ACQUIRED  
WITHIN NINETY (90) DAYS OF PURCHASE, AND YOUR MONEY WILL BE REFUNDED.  
The terms of this software license agreement, do not apply to the Free Software  
Programs distributed with Open-E software. Instead, those programs are covered by  
other licenses, including the GNU General Public License.  
A copy of the GPL along with the other applicable Free Software Licenses, can be found  
in Appendix B.  
Ownership and Copyright  
The Open-E software is non-exclusive licensed and sold to you for use only as  
permitted by this License Agreement. Open-E GmbH reserves any rights not expressly  
granted to you. Copying of the software is prohibited by law unless specifically  
authorized in writing by Open-E GmbH. You may not use copy, modify, sell, lease,  
sublease or otherwise transfer Open-E software in whole or in part.  
Intellectual Property Rights  
The Open-E software contains intellectual property rights, and in order to protect them,  
you may not decompile, reverse engineer, disassemble or otherwise reduce the Open-E  
software to a human perceivable form.  
Termination  
This license will be automatically terminated without notice from Open-E GmbH if you  
fail to comply with any term or condition of this agreement. If you do not agree to be  
bound by these terms and conditions, you may not use the Open-E or any of its  
software components.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
59  
Disclaimer of Warranties  
Open-E software are licensed "as is" without warrantee of any kind. Open-E GmbH  
hereby disclaims all warranties express and implied, relating to Open-E , the installation  
utilities and the embedded software including, without limitation, any implied warrantee  
of merchantability, fitness for a particular purpose or non-infringement.  
Limitation of Liability  
In no event will Open-E GmbH liability under this agreement exceed the price that you  
paid for your Open-E software. Furthermore, in no event will Open-E GmbH be liable for  
any lost profits, lost data, cost of procurement of substitute goods or services, or any  
special consequential, incidental, indirect or punitive damages arising out of or under  
this agreement.  
The limitation of liability set forth in this paragraph will apply, whether or not Open-E  
GmbH was advised of the possibility of the loss, liability or damages and  
notwithstanding any failure of essential purpose of any limited remedy.  
Waiver  
No delay or failure of Open-E GmbH to exercise any right under neither this agreement  
nor any partial exercise thereof shall be deemed to constitute a waiver or any rights  
granted hereunder or under law.  
Unlawful Provisions  
If any provision of the agreement is held to be unenforceable for any reason, all other  
provisions of this agreement shall nevertheless be deemed valid and enforceable to the  
fullest extent possible.  
Entire Agreement  
This agreement constitutes the sole and exclusive agreement between the parties  
concerning the subject matter hereof.  
LIMITED WARRANTY  
Open-E warrants that the media on which the software is distributed will be free from  
defects for a period of ninety (90) days from the date of delivery of the software to you.  
Your sole remedy in the event of a breach of this warranty is that Open-E will, at its  
option, replace any defective media returned to Open-E within the warranty period, or  
refund the money you paid for the software. Open-E does not warrant that the software  
will meet your requirements, that operation of the software will be uninterrupted, or that  
the software will be error-free.  
Authorized Service  
Only an authorized service representative can service Open-E software. Failure to  
comply with this requirement will void the warranty.  
Applicable Law  
This agreement shall be governed by German law. You agree to jurisdiction and venue  
in the courts located in Munich, Germany for all claims, disputes and litigation arising  
under or related to this agreement.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
60  
8 Appendix B  
GNU GENERAL PUBLIC LICENSE  
Version 2, June 1991  
Copyright (C) 1989, 1991 Free Software Foundation, Inc.  
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA  
Everyone is permitted to copy and distribute verbatim copies of this license document,  
but changing it is not allowed.  
Preamble  
The licenses for most software are designed to take away your freedom to share and  
change it. By contrast, the GNU General Public License is intended to guarantee your  
freedom to share and change free software to make sure the software is free for all its  
users. This General Public License applies to most of the Free Software Foundation's  
software and to any other program whose authors commit to using it. (Some other Free  
Software Foundation software is covered by the GNU Library General Public License  
instead.) You can apply it to your programs, too.  
When we speak of free software, we are referring to freedom, not price. Our General  
Public Licenses are designed to make sure that you have the freedom to distribute  
copies of free software (and charge for this service if you wish), that you receive source  
code or can get it if you want it, that you can change the software or use pieces of it in  
new free programs; and that you know you can do these things.  
To protect your rights, we need to make restrictions that forbid anyone to deny you  
these rights or to ask you to surrender the rights. These restrictions translate to certain  
responsibilities for you if you distribute copies of the software, or if you modify it.  
For example, if you distribute copies of such a program, whether gratis or for a fee, you  
must give the recipients all the rights that you have. You must make sure that they, too,  
receive or can get the source code. And you must show them these terms so they  
know their rights.  
We protect your rights with two steps: (1) copyright the software, and (2) offer you this  
license which gives you legal permission to copy, distribute and/or modify the software.  
Also, for each author's protection and ours, we want to make certain that everyone  
understands that there is no warranty for this free software. If the software is modified  
by someone else and passed on, we want its recipients to know that what they have is  
not the original, so that any problems introduced by others will not reflect on the original  
authors' reputations.  
Finally, any free program is threatened constantly by software patents. We wish to avoid  
the danger that redistributors of a free program will individually obtain patent licenses, in  
effect making the program proprietary. To prevent this, we have made it clear that any  
patent must be licensed for everyone's free use or not licensed at all.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
61  
The precise terms and conditions for copying, distribution and modification follow.  
GNU GENERAL PUBLIC LICENSE  
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND  
MODIFICATION  
0. This License Agreement applies to any software library or other program which  
contains a notice placed by the copyright holder or other authorized party saying it  
may be distributed under the terms of this Lesser General Public License (also called  
"this License"). Each licensee is addressed as "you".  
A "library" means a collection of software functions and/or data prepared so as to be  
conveniently linked with application programs (which use some of those functions and  
data) to form executables.  
The "Library", below, refers to any such software library or work which has been  
distributed under these terms. A "work based on the Library" means either the Library  
or any derivative work under copyright law: that is to say, a work containing the Library  
or a portion of it, either verbatim or with modifications and/or translated  
straightforwardly into another language. (Hereinafter, translation is included without  
limitation in the term "modification".)  
"Source code" for a work means the preferred form of the work for making  
modifications to it. For a library, complete source code means all the source code for  
all modules it contains, plus any associated interface definition files, plus the scripts  
used to control compilation and installation of the library.  
Activities other than copying, distribution and modification are not covered by this  
License; they are outside its scope. The act of running a program using the Library is  
not restricted, and output from such a program is covered only if its contents  
constitute a work based on the Library (independent of the use of the Library in a tool  
for writing it). Whether that is true depends on what the Library does and what the  
program that uses the Library does.  
1. You may copy and distribute verbatim copies of the Library's complete source code  
as you receive it, in any medium, provided that you conspicuously and appropriately  
publish on each copy an appropriate copyright notice and disclaimer of warranty;  
keep intact all the notices that refer to this License and to the absence of any  
warranty; and distribute a copy of this License along with the Library.  
You may charge a fee for the physical act of transferring a copy, and you may at your  
option offer warranty protection in exchange for a fee.  
2. You may modify your copy or copies of the Library or any portion of it, thus forming a  
work based on the Library, and copy and distribute such modifications or work under  
the terms of Section 1 above, provided that you also meet all of these conditions:  
a) The modified work must itself be a software library.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
62  
b) You must cause the files modified to carry prominent notices stating that you  
changed the files and the date of any change.  
c) You must cause the whole of the work to be licensed at no charge to all third parties  
under the terms of this License.  
d) If a facility in the modified Library refers to a function or a table of data to be supplied  
by an application program that uses the facility, other than as an argument passed  
when the facility is invoked, then you must make a good faith effort to ensure that, in  
the event an application does not supply such function or table, the facility still  
operates, and performs whatever part of its purpose remains meaningful.  
(For example, a function in a library to compute square roots has a purpose that is  
entirely well-defined independent of the application. Therefore, Subsection 2d  
requires that any application-supplied function or table used by this function must be  
optional: if the application does not supply it, the square root function must still  
compute square roots.)  
These requirements apply to the modified work as a whole. If identifiable sections of  
that work are not derived from the Library, and can be reasonably considered  
independent and separate works in themselves, then this License, and its terms, do  
not apply to those sections when you distribute them as separate works. But when  
you distribute the same sections as part of a whole which is a work based on the  
Library, the distribution of the whole must be on the terms of this License, whose  
permissions for other licensees extend to the entire whole, and thus to each and every  
part regardless of who wrote it.  
Thus, it is not the intent of this section to claim rights or contest your rights to work  
written entirely by you; rather, the intent is to exercise the right to control the  
distribution of derivative or collective works based on the Library.  
In addition, mere aggregation of another work not based on the Library with the  
Library (or with a work based on the Library) on a volume of a storage or distribution  
medium does not bring the other work under the scope of this License.  
3. You may opt to apply the terms of the ordinary GNU General Public License instead of  
this License to a given copy of the Library. To do this, you must alter all the notices  
that refer to this License, so that they refer to the ordinary GNU General Public  
License, version 2, instead of to this License. (If a newer version than version 2 of the  
ordinary GNU General Public License has appeared, then you can specify that version  
instead if you wish.) Do not make any other change in these notices.  
Once this change is made in a given copy, it is irreversible for that copy, so the  
ordinary GNU General Public License applies to all subsequent copies and derivative  
works made from that copy.  
This option is useful when you wish to copy part of the code of the Library into a  
program that is not a library.  
4. You may copy and distribute the Library (or a portion or derivative of it, under  
Section 2) in object code or executable form under the terms of Sections 1 and 2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
63  
above provided that you accompany it with the complete corresponding machine-  
readable source code, which must be distributed under the terms of Sections 1 and 2  
above on a medium customarily used for software interchange.  
If distribution of object code is made by offering access to copy from a designated  
place, then offering equivalent access to copy the source code from the same place  
satisfies the requirement to distribute the source code, even though third parties are  
not compelled to copy the source along with the object code.  
5. A program that contains no derivative of any portion of the Library, but is designed to  
work with the Library by being compiled or linked with it, is called a "work that uses the  
Library". Such a work, in isolation, is not a derivative work of the Library, and therefore  
falls outside the scope of this License.  
However, linking a "work that uses the Library" with the Library creates an executable  
that is a derivative of the Library (because it contains portions of the Library), rather  
than a "work that uses the library". The executable is therefore covered by this  
License.  
Section 6 states terms for distribution of such executables.  
When a "work that uses the Library" uses material from a header file that is part of the  
Library, the object code for the work may be a derivative work of the Library even  
though the source code is not. Whether this is true is especially significant if the work  
can be linked without the Library, or if the work is itself a library. The threshold for this  
to be true is not precisely defined by law.  
If such an object file uses only numerical parameters, data structure layouts and  
accessors, and small macros and small inline functions (ten lines or less in length),  
then the use of the object file is unrestricted, regardless of whether it is legally a  
derivative work. (Executables containing this object code plus portions of the Library  
will still fall under Section 6.)  
Otherwise, if the work is a derivative of the Library, you may distribute the object code  
for the work under the terms of Section 6.  
Any executables containing that work also fall under Section 6, whether or not they are  
linked directly with the Library itself.  
6. As an exception to the Sections above, you may also combine or link a "work that  
uses the Library" with the Library to produce a work containing portions of the Library,  
and distribute that work under terms of your choice, provided that the terms permit  
modification of the work for the customer's own use and reverse engineering for  
debugging such modifications.  
You must give prominent notice with each copy of the work that the Library is used in it  
and that the Library and its use are covered by this License. You must supply a copy  
of this License. If the work during execution displays copyright notices, you must  
include the copyright notice for the Library among them, as well as a reference  
directing the user to the copy of this License. Also, you must do one of these things:  
a) Accompany the work with the complete corresponding machine-readable source  
code for the Library including whatever changes were used in the work (which must  
Download from Www.Somanuals.com. All Manuals Search And Download.  
64  
be distributed under Sections 1 and 2 above); and, if the work is an executable linked  
with the Library, with the complete machine-readable "work that uses the Library", as  
object code and/or source code, so that the user can modify the Library and then  
relink to produce a modified executable containing the modified Library. (It is  
understood that the user who changes the contents of definitions files in the Library  
will not necessarily be able to recompile the application to use the modified  
definitions).  
b) Use a suitable shared library mechanism for linking with the Library. A suitable  
mechanism is one that (1) uses at run time a copy of the library already present on  
the user's computer system, rather than copying library functions into the executable,  
and (2) will operate properly with a modified version of the library, if the user installs  
one, as long as the modified version is interface-compatible with the version that the  
work was made with.  
c) Accompany the work with a written offer, valid for at least three years, to give the  
same user the materials specified in Subsection 6a, above, for a charge no more  
than the cost of performing this distribution.  
d) If distribution of the work is made by offering access to copy from a designated  
place, offer equivalent access to copy the above specified materials from the same  
place.  
e) Verify that the user has already received a copy of these materials or that you have  
already sent this user a copy.  
For an executable, the required form of the "work that uses the Library" must include  
any data and utility programs needed for reproducing the executable from it.  
However, as a special exception, the materials to be distributed need not include  
anything that is normally distributed (in either source or binary form) with the major  
components (compiler, kernel, and so on) of the operating system on which the  
executable runs, unless that component itself accompanies the executable.  
It may happen that this requirement contradicts the license restrictions of other  
proprietary libraries that do not normally accompany the operating system. Such a  
contradiction means you cannot use both them and the Library together in an  
executable that you distribute.  
7. You may place library facilities that are a work based on the Library side-by-side in a  
single library together with other library facilities not covered by this License, and  
distribute such a combined library, provided that the separate distribution of the work  
based on the Library and of the other library facilities is otherwise permitted, and  
provided that you do these two things:  
a) Accompany the combined library with a copy of the same work based on the Library,  
uncombined with any other library facilities. This must be distributed under the terms  
of the Sections above.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
65  
b) Give prominent notice with the combined library of the fact that part of it is a work  
based on the Library, and explaining where to find the accompanying uncombined  
form of the same work.  
8. You may not copy, modify, sublicense, link with, or distribute the Library except as  
expressly provided under this License. Any attempt otherwise to copy, modify,  
sublicense, link with, or distribute the Library is void, and will automatically terminate  
your rights under this License. However, parties who have received copies, or rights,  
from you under this License will not have their licenses terminated so long as such  
parties remain in full compliance.  
9. You are not required to accept this License, since you have not signed it. However,  
nothing else grants you permission to modify or distribute the Library or its derivative  
works. These actions are prohibited by law if you do not accept this License.  
Therefore, by modifying or distributing the Library (or any work based on the Library),  
you indicate your acceptance of this License to do so, and all its terms and conditions  
for copying, distributing or modifying the Library or works based on it.  
10. .Each time you redistribute the Library (or any work based on the Library), the recipient  
automatically receives a license from the original licensor to copy, distribute, link with  
or modify the Library subject to these terms and conditions. You may not impose any  
further restrictions on the recipients' exercise of the rights granted herein. You are not  
responsible for enforcing compliance by third parties with this License.  
11. If, as a consequence of a court judgment or allegation of patent infringement or for  
any other reason (not limited to patent issues), conditions are imposed on you  
(whether by court order, agreement or otherwise) that contradict the conditions of this  
License, they do not excuse you from the conditions of this License. If you cannot  
distribute so as to satisfy simultaneously your obligations under this License and any  
other pertinent obligations, then as a consequence you may not distribute the Library  
at all. For example, if a patent license would not permit royalty-free redistribution of  
the Library by all those who receive copies directly or indirectly through you, then the  
only way you could satisfy both it and this License would be to refrain entirely from  
distribution of the Library.  
If any portion of this section is held invalid or unenforceable under any particular  
circumstance, the balance of the section is intended to apply, and the section as a  
whole is intended to apply in other circumstances.  
It is not the purpose of this section to induce you to infringe any patents or other  
property right claims or to contest validity of any such claims; this section has the sole  
purpose of protecting the integrity of the free software distribution system which is  
implemented by public license practices. Many people have made generous  
contributions to the wide range of software distributed through that system in reliance  
on consistent application of that system; it is up to the author/donor to decide if he or  
she is willing to distribute software through any other system and a licensee cannot  
impose that choice.  
This section is intended to make thoroughly clear what is believed to be a  
consequence of the rest of this License.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
66  
12. If the distribution and/or use of the Library is restricted in certain countries either by  
patents or by copyrighted interfaces, the original copyright holder who places the  
Library under this License may add an explicit geographical distribution limitation  
excluding those countries, so that distribution is permitted only in or among countries  
not thus excluded. In such case, this License incorporates the limitation as if written in  
the body of this License.  
13. The Free Software Foundation may publish revised and/or new versions of the Lesser  
General Public License from time to time. Such new versions will be similar in spirit to  
the present version, but may differ in detail to address new problems or concerns.  
Each version is given a distinguishing version number. If the Library specifies a  
version number of this License which applies to it and "any later version", you have the  
option of following the terms and conditions either of that version or of any later  
version published by the Free Software Foundation. If the Library does not specify a  
license version number, you may choose any version ever published by the Free  
Software Foundation.  
14. If you wish to incorporate parts of the Library into other free programs whose  
distribution conditions are incompatible with these, write to the author to ask for  
permission. For software which is copyrighted by the Free Software Foundation, write  
to the Free Software Foundation; we sometimes make exceptions for this. Our  
decision will be guided by the two goals of preserving the free status of all derivatives  
of our free software and of promoting the sharing and reuse of software generally.  
NO WARRANTY  
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO  
WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  
EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS  
AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF  
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,  
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND  
PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE  
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR  
CORRECTION.  
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN  
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY  
MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE  
TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR  
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE  
THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING  
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR  
A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF  
SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF  
SUCH DAMAGES.  
END OF TERMS AND CONDITIONS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
67  
How to Apply These Terms to Your New Libraries  
If you develop a new library, and you want it to be of the greatest possible use to the  
public, we recommend making it free software that everyone can redistribute and  
change. You can do so by permitting redistribution under these terms (or,  
alternatively, under the terms of the ordinary General Public License).  
To apply these terms, attach the following notices to the library. It is safest to attach  
them to the start of each source file to most effectively convey the exclusion of  
warranty; and each file should have at least the "copyright" line and a pointer to where  
the full notice is found.  
<one line to give the library's name and a brief idea of what it does.>  
Copyright (C) <year> <name of author>  
This library is free software; you can redistribute it and/or modify it under the  
terms of the GNU Lesser General Public License as published by the Free  
Software Foundation; either version 2.1 of the License, or (at your option) any  
later version.  
This library is distributed in the hope that it will be useful, but WITHOUT ANY  
WARRANTY; without even the implied warranty of MERCHANTABILITY or  
FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public  
License for more details.  
You should have received a copy of the GNU Lesser General Public License  
along with this library; if not, write to the Free Software Foundation,  
Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA  
Also add information on how to contact you by electronic and paper mail.  
You should also get your employer (if you work as a programmer) or your school, if  
any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample;  
alter the names:  
Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a  
library for tweaking knobs) written by James Random Hacker.  
<signature of Ty Coon>, 1 April 1990  
Ty Coon, President of Vice  
That's all there is to it!  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Snapper Lawn Aerator 3882 User Manual
Snapper Lawn Mower ZF2501KH ZF5201M ZF6101M User Manual
Sonance Speaker VP85S User Manual
Sony Cell Phone Accessories SCR26 User Manual
Sony MiniDisc Player MZ R700 User Manual
Sony Portable Speaker SS SRX7 User Manual
Stanton Mixer M212 User Manual
Stiga Lawn Mower 33 EL User Manual
Suunto Watch EN
Suzuki Automobile SX4 SX4 SEDAN User Manual