Manual (Ver. 1.61) May 02, 2006
Download from Www.Somanuals.com. All Manuals Search And Download.
3
6 Troubleshooting Guide...........................................................................57
7 Appendix A..............................................................................................58
8 Appendix B..............................................................................................60
Download from Www.Somanuals.com. All Manuals Search And Download.
4
Copyright
(c) 2004 Open-E GmbH. All rights reserved. No part of this publication may be reproduced,
stored in a retrieval system, or transmitted in any form, by any means, electronic,
mechanical, photo-copying, recording or otherwise, without the prior written consent of
Open-E GmbH, Lindberghstr. 5, 82178 Puchheim, Germany.
Trademarks
Open-E and Open-E iSCSI logos are all registered trademarks of Open-E GmbH.
Windows ((R)), Microsoft ((R)) and Apple ((R)) are registered trademarks in the United
States and other countries. Pentium ((R)) and Intel ((R)) are registered trademarks in the
United States and other countries. All other trademarks herein are property of their
respective owners.
Disclaimer
Open-E GmbH assumes no responsibility for errors or omissions in this document, and
Open-E GmbH does not make any commitment to update the information contained
herein.
Download from Www.Somanuals.com. All Manuals Search And Download.
5
1 Before you get started
Congratulations on purchasing Open-E iSCSI, the ideal solution for network-based
storage management. This manual will assist you as you install and configure the
hardware.
In order to quickly reach the desired configuration, please read the following pages
thoroughly. The time invested is well spent - after all, you have purchased this solution
for your invaluable data.
1.1 Content of this package
Before you begin installing Open-E iSCSI ENTERPRISE, make sure that the package
contains the following items:
• Open-E flash module
• Power adapter
• Quick Start brochure
• A CD containing the manual (this document), brochures, images and additional
information material.
• Source CD.
If something is missing, please contact your dealer.
1.2 System requirements
• x86-compatible PC
• CPU 1 GHz or faster
• at least 512 MB main memory
• Hardware RAID Controller
• IDE port
• One or several suitable hard drives
• Network Interface Card (NIC)
Open-E iSCSI contains its own operating system, no additional software is required.
In order to generate maximum performance, we recommend using a network
card with 1 Gb or more, as well as a processor with at least 2.8 GHz. If
several computers are accessing the iSCSI system, we recommend 1024 MB
main memory or more.
Download from Www.Somanuals.com. All Manuals Search And Download.
6
1.3 Supported clients
• Microsoft Windows (all versions)
• Linux
• Unix
• Mac OS 8.0, 9.0 and MAC OS X
1.4 Supported network protocols
• TCP/IP
• SNMP
1.5 Required tools
Grounding strap or mat in order to avoid electrostatic discharge (ESD)
Tools for opening the computer's enclosure (typically, a screwdriver)
1.6 Safety precautions
1.6.1 Personal safety
High voltages may occur inside computer equipment. Before removing
the enclosure, please turn off the power switch and disconnect the
power cords.
1.6.2 Safety for your data
If you are not using new hard drives for operating Open-E iSCSI, please backup all
important data prior to installation. Adding a hard drive to Open-E iSCSI goes hand
in hand with complete formatting of the hard drive, which can possibly delete
existing data.
1.6.3 ESD precautions
In order to avoid damage to your computer or to Open-E iSCSI, please ensure you
are grounded before opening the PC or the ESD package that contains Open-E
iSCSI. Using grounding straps or mats is the best way to ensure this safety. If you
don't have grounding equipment handy, please make sure you are grounded before
working with Open-E iSCSI, for instance, by touching a heater.
• Avoid unnecessary touching of the components inside the PC
• Please touch Open-E iSCSI only on the edges
Download from Www.Somanuals.com. All Manuals Search And Download.
7
2 Features
2.1 What is iSCSI?
iSCSI (internet SCSI) is a protocol that encapsulates SCSI (Small Computer System
Interface) commands and data in TCP/IP packets for linking storage devices with
servers over common IP infrastructures. By using iSCSI, you can supply high
performance SANs (Storage Area Networks) using standard IP networks like LAN,
MAN, WAN or the Internet.
iSCSI solutions are based on a separate operating system and often also on a special
hardware. Typically, this operating system allows operating iSCSI technology.
iSCSI solutions allow users to add additional disk devices to existing networks quickly,
easily, and cost-efficiently.
iSCSI is a client-server architecture. Clients of an iSCSI interface are called "initiators".
Initiators issue iSCSI "commands" to request services from components, logical units,
of a server known as a "target". The "device server" on the logical unit accepts iSCSI
commands and processes them.
2.2 Description of the functions
Open-E iSCSI is one of the easiest ways of implementing an iSCSI technology in your
network. Through its simple architecture; it is a flash memory with an IDE interface and
Open-E iSCSi as its operating system, Open-E iSCSI can be used with all x86 PCs
containing an IDE controller. Older computers may also be used.
To begin working with Open-E iSCSI, all you need to do is to assign an IP address to
the iSCSI Target, either automatically through an existing DHCP server or by assigning
it manually. All other settings are handled via a web front-end, which can be easily
accessed through the IP address of Open-E iSCSI using the encrypted https protocol.
Open-E iSCSI allows users of client stations to delegate disk devices and aggregation
and form iSCSI Targets and their local mounting from any site in the network.
2.3 Why Open-E iSCSI?
Often, storage in network environments is expanded the following way: File servers
have to be shut down in order to install additional drives. In the next step, they need to
be reconfigured. It is tedious work data often has to be copied manually onto larger
drives, consuming a lot of time and money.
With Open-E iSCSI, you can:
• Consolidated storage and backups for multiple servers.
• Improve data availability and efficiency.
Download from Www.Somanuals.com. All Manuals Search And Download.
8
• Lower costs by centralizing storage management.
• iSCSI also simplifies the installation and on-going management of a SAN versus using
Fibre Channel.
With Open-E iSCSI, you can add storage to your existing network quickly, easily, and
most important cost-efficiently. Expensive hardware is no longer necessary. Take any
computer, a new rack server or an old desktop PC and exchange the system drive for
the Open-E iSCSI flash module. To store data Open-E iSCSI ENTERPRISE uses IDE
(ATA), SATA or SCSI hard drives and hardware RAID controllers.
Within a few minutes, you will have up to several hundred gigabytes available on your
network without much effort or any downtime.
2.4 RAID types
This manual is not intended to replace your RAID controller manual. But we want to
provide you with an overview of common RAID types so that you can make an
informed decision on which type to choose. Depending on whom you ask, RAID
means either Redundant Array of Independent Disks or Redundant Array of
Inexpensive Disks. Both are correct. In essence, you combine the capacity, speed and
security of several disks into one.
RAID 0 forms one large hard disk by concatenating stripes from each member drive.
Stripe size is configurable roughly between 64 KB and 1 MB. The result is a lightning-
fast RAID, but with no added security. One failing drive may ruin the entire RAID.
RAID 1 mirrors hard drives. By writing identical data onto more than one drive, security
is enhanced. A completely defective drive does not cause any loss of data. The
drawback is reduced performance and capacity.
RAID 5 combines data striping from RAID 0 with parity checking, therefore combining
speed and improved security. The loss of one drive is tolerable.
RAID 6 extends RAID 5 by adding an additional parity block, thus it uses block-level
striping with two parity blocks distributed across all member disks. It was not one of
the original RAID levels. The user capacity of a RAID 6 array is N-2, where N is the
total number of drives in the array. RAID 6 does not have a performance penalty for
read operations, but it does have a performance penalty on write operations due to
the overhead associated with the additional parity calculations.
RAID 10 is a combination of RAID 1 and 0, hence the name. Data is written in a striped
and mirrored configuration, providing high performance and robust security.
Download from Www.Somanuals.com. All Manuals Search And Download.
9
3 Hardware installation
3.1 Getting ready
Switch off the computer, remove the power supply, and open the PC's enclosure. In
tower cases, the side parts often can be removed individually (on the backside of the
enclosure you just need to remove a few screws). Many machines have U- or O
shaped covers that have to be pulled off (either towards the front or the back). Should
you need any assistance, please contact your dealer.
Now localize the IDE connectors on your motherboard:
Every motherboard has at least two such ports. To install Open-E iSCSI, you have to
use the first (primary) port.
Often, the labeling on the IDE connectors may be tiny, but it is always there, on each
and every board. Preferably look for “IDE 0” If this connector does not exist, the first
port is called “IDE 1” (with the second connector being 2).
3.2 Installing Open-E iSCSI
If necessary, remove the flat band cable that connects your hard drive with the
controller. Open-E iSCSI should now be carefully inserted into the connector. As IDE
ports can have a notch on one side, you can only insert the connector at the preset
position.
Download from Www.Somanuals.com. All Manuals Search And Download.
10
In the package you will find an adapter cable, which provides Open-E iSCSI with
power. The little white plug corresponds with the matching connector on Open-E
iSCSI. As a final step, the adapter has to be connected to the white power-supply plug
(see photo):
That should conclude the installation! Before putting the enclosure on your computer
again, do not forget to connect your hard drives to the IDE second connector, SATA
connector or to the SATA port on the RAID controller.
Download from Www.Somanuals.com. All Manuals Search And Download.
11
4 Configuration
4.1 The basic configuration of the iSCSI computer
Connect your keyboard and a monitor to the iSCSI computer. You will only need those
devices for the basic configuration or extended maintenance configuration.
You may have to change the function “Halt On: All Errors” in your PC's BIOS,
so that the system starts even without the keyboard. The correct configuration
is “Halt On: All But Keyboard.”
4.2 First-time operation of Open-E iSCSI
Now start your system.
After booting graphical screen is complete, Open-E iSCSI will provide you with
information on the current software version and the network settings:
Welcome to Open-E iSCSI
-----------------------
(Press F1 for Help)
Model:
Version:
Open-E iSCSI ENTERPRISE
1.61.IE00000000.1838
Release date: 2006-05-22
S/N: 1357186427
Network settings:
interface 1:
interface 2:
eth0
eth1
ip: 192.168.0.220/255.255.255.0
ip: 192.168.1.220/255.255.255.0
Https settings:
port
allow from
443
all
Download from Www.Somanuals.com. All Manuals Search And Download.
12
If the network has a DHCP server, Open-E iSCSI should gain access to the IP settings
automatically. If that is the case, you can proceed at 3.5. If your network does not
have a DHCP server, Open-E iSCSI will start with the default settings: IP address
192.168.0.220 and subnet mask 255.255.255.0.
You can change these values again by typing in the following key combination: left
CTRL, left ALT and N. You can select a different IP address now. All other available
functions on of the console will appear after pressing F1 key (see below).
After a connection has been established, all settings can also be changed remotely
via the web browser. If your network requires it, the address of the standard gateway
and the broadcast address can be changed.
−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− Ηelp −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−
You can use below key sequences (C-means ‘Left Ctrl’,A-‘Left Alt’)
C-A-N
C-A-P
C-A-I
C-A-T
C-A-X
C-A-H
F2
– to edit static IP addresses
– to restore default factory administrator settings
– to restore default factory IP configuration
– to run console tools
– to display extended tools
– to display hardware and drivers info
- to display all network interface
– to refresh console info
F5
C-A-S
– to shutdown the system
−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− (100 %) −−−
< EXIT >
−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−
For additional information, please read the chapter “Functions of the console
display.”
4.3 Logging into Open-E iSCSI ENTERPRISE
You can establish a connection to Open-E iSCSI from every network computer. To
establish this connection, use a browser (e.g. Microsoft Internet Explorer) and enter
the IP address or the name of the computer hosting the Open-E iSCSI server into the
For security reasons, Open-E iSCSI uses the encrypted SSL protocol (https).
You will now be asked for verification of the encryption certification. Since Open-E
iSCSI does not allow for creating shares on the Internet but only on the Intranet, there
is no need for global certification by an authorized body. You can accept the
certificate for the session only, but also for all future use.
Now you have to accept the license in order to use the Open-E software and you can
choose the language you want to use.
Download from Www.Somanuals.com. All Manuals Search And Download.
13
Page with the software agreement and available language option will be
shown after first launching Open-E iSCSI. Later you can change the language
using Language Settings, which are located in server through Setup.
After accepting license agreement you can log into Open-E iSCSI Target using the
standard password “ancom” (this can be changed later). In order to start working, you
can now set all parameters.
Password checking is case-sensitive. If you cannot log into Open-E iSCSI,
please check the status of the Shift and Caps Lock keys.
Download from Www.Somanuals.com. All Manuals Search And Download.
14
4.4 Create RAID Units
Use the RAID manager to build a disk array, when a hardware RAID controller is
installed in Open-E iSCSI. To create disk arrays utilize 3ware RAID manager (3DM or
3DM2) for RAID controllers series 7000/8000/9000. Use an ICP console for INTEL /
ICP Vortex RAID controllers. For any additional information refer to a RAID controller
user manual. You can use also storage devices connected to a Fibre Channel.
If the hardware RAID controller is not installed, you can use software RAID, select
“RAID| FC” in the menu and then “S/W RAID”.
You will find a list of any available disk drives (units).
To create a disk array, please mark any selected unit(s) and choose the appropriate
RAID from the “destination”. Created RAID units appear as RAID 0, 1, 5 and 6.
After clicking “create” button, the status will change to “in use” with additional
information describing the kind of a disk array (e.g. MD0 is RAID 1)
Download from Www.Somanuals.com. All Manuals Search And Download.
15
4.5 Adding Disk Units
Please select “setup” Æ “target manager” and then “volumes” on the left page. After
selecting “volumes” you will find a list of all logical units. To add a new unit to the
iSCSI, please click “Add”. After the initializing procedure, the status of the unit will
change from the “Add” button into “in use, vg0”.
Please note that you can expand the storage capacity by adding new disk drives. In
the “Unit Manager” Function Open-E iSCSI will show both “in use” and “new units”. In
order to add a new unit to the Volume Group (vg0), please simply click 'Add' after
which Open-E iSCSI page will be restarted (see below).
4.6 Creating iSCSI targets volume
Next, by clicking on the branch “vg0” you can add disk volume to new “targets volume
(tgv)” and snapshot or increase size on existing tgv's and snapshot (you can't
decrease tgv size and snapshot). To set needed tgv size just use scrollbar, next to it
on the right side it shows the available size to use (see below).
Download from Www.Somanuals.com. All Manuals Search And Download.
16
Here you can also set the snapshots number, and add them to the particular „targets
volume”.
Download from Www.Somanuals.com. All Manuals Search And Download.
17
After creating “tgv” and “snapshots” click on the branch “targets” in Target Volume
Manager Function, where you add “targets volumes” only in the premises of one vg0.
Next, by clickling “CHAP user” on the branch, you can management the name and
secure access to “tgv” by giving CHAP user name and password (password must
consist from 12 to 16 characters if you use Microsoft iSCSI Initiator).
4.7 Configuring end user workstation
For iSCSI technology to work correctly on end-user computers, you need to install
iSCSI Initiator software (if it is not provided with the operating system). For Microsoft
Windows 2000/XP/2003 systems, it is an option and the Microsoft iSCSI Initiator is
available to download from the web.
Correct software configuration depends on installing individual “target volumes” by
adding another disk letter in the system (in Windows XP and 2003) or as subfolder the
same as with folders in UNIX system. All these functions are available via
“administrative tools” Æ disks management.
Download from Www.Somanuals.com. All Manuals Search And Download.
18
How to connect iSCSI in Windows 2000/XP/2003:
a. First, you have to install the iSCSI Initiator package. You must be logged in as
administrator to install the Microsoft iSCSI Software Initiator package,
b. Next, launch iSCSI Initiator software,
c. If you set passwords on iSCSI and Target Access, press on branch “Initiator Setting”
in “Initiator CHAP secret”, enter your passwords, and after entering each click “Save”
button (your passwords is “Target secret”),
d. In branch: “Target Portals” click button “Add”, then enter your Open-E iSCSI IP
address,
e. Next click “Advanced…” button, and mark “CHAP logon information”, next give User
name and Target secret and then click “O.K.” button,
f. In the branch “Available Targets” you will see name of available iSCSI targets e.g.
“iqn.2005.05:iscsi.target0”,
g. Click “Log On” button, and if you entered password, you have to do the same as in
point “e”, then press “O.K.” button, then the chosen target status will change for
“Connected”
h. Next choose settings Æ control panel Æ administrative tools Æ computer management
Æ disk management,
i. Now all available iSCSI TARGET drives will be displayed. In order to use them you
have to format them and mount to the system as a next disk letter.
Microsoft iSCSI Initiator ver. 1.06 does not support dynamic disk. Target
password must consist of minimum 12 and maximum 16 alphanumeric
characters. Please read Manual and Release Notes of Microsoft iSCSI
Initiator for more details, which you can also find on Microsoft website.
Please do not ignore time settings on Open-E iSCSI and client station. Those
settings must be the same. Time can be synchronized in the menu Web
Interface “setup” Æ “server” in Function “Clock settings”
Download from Www.Somanuals.com. All Manuals Search And Download.
19
5 Description of functions
5.1 Functions of the console display
While Open-E iSCSI can be fully administered remotely through a secure Web
interface, some of the functions you can access on the console. Open-E iSCSI
constantly displays following basic parameters:
• IP address
• Https settings
CTRL+ALT+n
If you press the left CTRL key + the left ALT key + n, you will be asked for the new IP
address and the subnet mask. The DHCP server will be shut down.
CTRL+ALT+p
If you press the left CTRL key + the left ALT key + p, the access restrictions are lifted
by entering the administrator password (in addition, there is a reset to the standard
https port 443).
CTRL+ALT+i
By pressing a combination of left CTRL key + left ALT key +i, you can reset the
original IP address (192.168.0.220) and the subnet settings (255.255.255.0). In this
process, the DHCP server support is turned on.
CTRL+ALT+t
By pressing a combination of left CTRL key, left ALT key and t, you can run Console
Tools. The menu will appear, with choice of following functions: Ping, DHCP Ping,
Hardware info, Memory info, Time configuration, DNS configuration, Language
settings, Modify driver option and Boot option.
CTRL+ALT+x
By pressing the left CTRL key, left ALT key and x, it will display extended tools.
CTRL+ALT+r
By pressing the left CTRL key, left ALT key and r, it will display CLI Management Tools
for ICP Vortex.
This function appears in Help Console only when an ICP Vortex hardware
RAID controller is installed in the iSCSI system. In order to get additional
information read the user manual of ICP Vortex RAID controller manufacturer.
CTRL+ALT+h
By pressing the left CTRL key, left ALT key and h, it will display hardware and driver
information.
Download from Www.Somanuals.com. All Manuals Search And Download.
20
F1, F2 and F5
Function key F1 is available to display help information while F5 will reset the console
display to default. If you press F2 key all network interface information will be
displayed.
Shutting down and restarting
With Ctrl + ALT + DEL the Open-E iSCSI host computer will be shut down and restart,
while CTRL + ALT + S shut it down. Please be careful with this option when users are
connected.
5.2 Functions of Open-E iSCSI via browser access
On the following pages, we will thoroughly describe every function of Open-E iSCSI.
The functions are divided by menu options, which are located at the top part of the
screen.
5.2.1 Setup
In this menu option, you fill find the following sub-functions: server, network,
administrator, hardware and target manager.
5.2.1.1 Server
This is a key component of the setup menu, as some of the most crucial
parameters are defined here.
Function „Server name“
Select a server name, which will be used to identify iSCSI target names.
Download from Www.Somanuals.com. All Manuals Search And Download.
22
Function “IP address”
Here you can set TCP/IP parameters for selected NIC.
You can activate or deactivate network interface by setting "Activate" checkbox.
You can use static or dynamic(DHCP) network interface configuration.
If you want to dynamically get DNS address, select "get DNS".
When using static configuration of network interface, enter address IP, netmask,
broadcast and gateway.
If you set new IP address, during activation, you will lose your connection to the
server and you will have to log in again. In the URL entry line of your browser,
please enter the new IP address.
If you do not get access, please try the console to set new IP address. In order to
access servers in another subnet, you need to enter the address of a router as
Gateway.
In case you use NTP server to maintain proper time & date, please
make sure you have proper Gateway and DNS settings.
Function “IPSEC”
IPSEC provides strong authentication and encryption for the connections. It
makes it nearly impossible to eavesdrop or forge the transmitted data.
Encrypted data transmission imposes considerable overhead and
depending on the amount data transmitted can impact the performance
significantly.
Function “Bonding”
Bonding allows for load-balancing or fail-over for the incoming and outgoing
connections.
In order to take advantage of bonding more than one ethernet NIC need
to be plugged into the box.
set bonding
Allows you to add new, remove or view settings of the existing bond group.
mode
Specifies one of the bonding policies:
• balance-rr
Transmissions are received and sent out sequentially on each bonded slave
interface. This mode provides fault tolerance and load balancing.
• active-backup
Only one slave in the bond is active. Another bonded slave interface is only used
if the active bonded slave interface fails. This mode provides fault tolerance.
• balance-xor
Download from Www.Somanuals.com. All Manuals Search And Download.
23
Transmit based on [(source MAC address XOR'd with destination MAC address)
modulo slave count]. This selects the same slave for each destination MAC
address. This mode provides load balancing and fault tolerance. This mode
provides fault tolerance and load balancing.
• broadcast
Transmits everything on all slave interfaces.
This mode provides fault tolerance.
• 802.3ad
IEEE 802.3ad Dynamic link aggregation. Creates aggregation groups that share
the same speed and duplex settings. Utilizes all slaves in the active aggregator
according to the 802.3ad specification. Require: a switch that supports IEEE
802.3ad Dynamic link aggregation.
• balance-tlb
Channel bonding that does not require any special switch support. The outgoing
traffic is distributed according to the current load (computed relative to the
speed) on each slave. Incoming traffic is received by the current slave. If the
receiving slave fails, another slave takes over the MAC address of the failed
receiving slave. This mode provides fault tolerance and load balancing.
• balance-alb
Adaptive load balancing: includes balance-tlb plus receive load balancing (rlb)
for IPV4 traffic, and does not require any special switch support. The receive load
balancing is achieved by ARP negotiation. The bonding driver intercepts the ARP
Replies sent by the local system on their way out and overwrites the source
hardware address with the unique hardware address of one of the slaves in the
bond such that different peers use different hardware addresses for the server.
mii
Specifies the MII link monitoring frequency in milliseconds. This determines how
often the link state of each slave is inspected for link failures. A value of zero
disables MII link monitoring. A value of 100 is a good starting point. The
use_carrier option, below, affects how the link state is determined. See the High
Availability section for additional information. The default value is 0.
primary
A string (eth0, eth2, etc) specifying which slave is the primary device. The
specified device will always be the active slave while it is available. Only when the
primary is off-line will alternate devices be used. This is useful when one slave is
preferred over another, e.g., when one slave has higher throughput than another.
The primary option is only valid for active-backup mode.
5.2.1.3 Administrator
In this section you may change parameters of administrator’s access, enabling
e-mail notification, downloading SLL Certificate for your browser and defining
power button action.
Download from Www.Somanuals.com. All Manuals Search And Download.
24
Function “Administrator Password”
Using this function, you can change the password for Open-E iSCSI
administrator.
For security reasons, please make sure you change the standard password and
select a new one.
Password-checking is case-sensitive. For security reasons, the
password you enter will not be displayed. Please check the status of the
Shift and Caps Lock keys.
Function “Administrator Access”
Use this function to restrict access to the server administration.
• Set port: you can change https port (default 443)
• IP address: you can assign IP addresses (separated by a semicolon) that are
allowed to access the Open-E iSCSI Web administration. This field left blank
means no restriction.
• Lock console without password: disables access to the console
• Lock console with password: to get access to the console you need to type in a
password. Note that this password should be exactly 8 characters long and
include only 1-4 digits.
•
Unlock console: the unrestricted access to the console
Download from Www.Somanuals.com. All Manuals Search And Download.
25
Please exercise caution with this function when all computers in the
network have assigned IP addresses via DHCP: any current IP can be
replaced by a new one only after the lease ends. Please use Lock
console feature carefully in case of any erroneous IP address settings
you will not be able to reset default administrator access from the
console. To restore default settings you have to re-update software in
the Open-E iSCSI module or contact technical support.
Function “E-mail notification”
In case of significant events, critical errors, warnings, etc., system can send an
email to the administrator. Please enter administrator email address.
When SMTP server receiving mail, uses the monitoring function of IP
numbers, it compares IP number from SMTP server (for example open-
e.com) with IP number of a computer from which email was sent. This
email may be treated as “spam” and will not be accepted. To avoid the
above problem, use different SMTP server then the computer currently
uses. The best solution for a correct email distribution is to use your
local mail server.
Download from Www.Somanuals.com. All Manuals Search And Download.
26
Function “SSL Certificate Authority”
If you want to install Certificate Authority (CA) to your web browser, click on the
SSLCert.crt link. Download CA on Desktop, click on it and "Install Certificate".
Browser will show you a warning that CA is not trusted and it is normal. Following
the instructions, you will install CA to your web server.
If you want to delete or view CA go to: Tools->Internet Preferences->
Content->Certificates->Trusted Root Certification Authorities and
OPEN-E GMBH which should be there.
Function “USE SNMP”
Simple Network Management Protocol (SNMP) is a protocol for monitoring a
network and computer equipment.
With SNMP you can get a lot of information:
• ethernet traffic,
• memory info,
• usage of CPU,
• system load,
• running processes
• uptime,
• MAC addresses of network card.
System location and system contact are only for your information, for example
when you connect from SNMP client, you will see your location and name.
This function enables you change the access over the SNMP protocol in version
2 or 3.
SNMP in version 2 does not have encrypted transmission and authentication is
only by community.
SNMP in version 3 has encrypted transmission and authentication by community,
login and password.
The community you are setting can be max up to 20 characters and password
min 8 characters.
Links to SNMP clients:
For better security use only SNMP 3 version ! This version provides
login, password and encrypted transmission.
How to retrieve information from SNMP?
From Linux:
• snmpwalk - Æ it is command-line tool from snmp-package.
Download from Www.Somanuals.com. All Manuals Search And Download.
27
You can get information by:
snmpwalk -v 3 -u public -l AuthNOPriv -A MD5 -A public123 adres_ip
SysUpTime
- v 3
--> use only 3 version
- u public --> community name
- A MD5 --> encrypted by MD5
- A public123
address_IP
SysUpTime
--> password
--> IP of iSCSI server
--> OID with system uptime information
To use SNMP from command line you have to know OID's, for example:
• ssCpu (processor load), mem (memory info), Location.
But it is not the best choice to retrieve info from command line. You have to
install SNMP client, so you can easily read any information you want.
From MS Windows you can use following Windows Clients: PRTG, MIB Browser
Professional, SNMP MIB Query Manager and INFTRAF.
If you can't retrieve information from SNMP client, you can check
iSCSI_ip/check_sys/index.html. There are SystemLoad, CPU, Memory,
Swap, Uptime.
Function: Remote access
Using this function, you can administrate console tools remotely by ssh protocol
(secure shell). Default user is 'cli' and you cannot change it, but password can be
change.
Allow IP:
Set port:
Password:
You can assign IP addresses (separated by a semicolon) that
are granted to iSCSI remote access. The field left blank means
no restriction.
Default port is 22222 for security reasons, because high ports
are invisible for port scanners. You can change it only from
range 1024-65535 except ports already used.
Length of password is minimum 8 characters. Be sure to use
strong passwords.
Confirm pass.: Please retype your new password.
Password cannot contain:
• characters: ' " ` ^ & $ # [ ] \/ | *
• spaces.
To connect to iSCSI from Linux/MacOSX systems use:
ssh -2 -p 22222 -l cli address_ip
• option: -2 is a version of ssh protocol used for connection.
Download from Www.Somanuals.com. All Manuals Search And Download.
28
• option: -p is a port for Remote Access.
• option: -l is a user (In our product the user must be "cli").
• option: address_ip is a address of server you want to connect to.
You will be ask for a password you entered on server for Remote Access.
To connect to server from Microsoft Windows, download free ssh client Putty
• In Host Name (or IP address) field please enter IP address of the server
• In Port field please enter the same port as in the server GUI (default 22222)
• In Protocol please choose SSH
• In Category: Connection -> Data -> Auto-login-username please enter: "cli"
• In Terminal -> Keyboard -> The Function Keys and keypad please select
"VT100+"
• Go back to Category Session, enter session name in field Saved Sessions and
click on "Save" button.
• Then click on new saved session, click "Open" and enter the "password". (In
case you did not enter Auto-login-username, it will prompt for username, so
please enter: "cli")
5.2.1.4 Hardware
Function: “UPS configuration”
In the function you can select a UPS device desired (Uninterrupted Power
Supply). For the connection of the UPS device to the Open-E iSCSI, the USB port
is most frequently used.
In the settings you can select the UPS model, cable type, connection port and
the length of the time out. The time-out defines the time between a power failure
and the moment the system will shut down. UPS support in mode “Single”
Download from Www.Somanuals.com. All Manuals Search And Download.
29
means that Open-E iSCSI is the only system attached to this UPS and that there
is no action necessary to do remote shutdown for other systems in the network.
Single means, that Open-E iSCSI is the only system attached to this UPS and
that there is no action necessary to do remote shutdown for other systems in the
network.
Master means, that Open-E iSCSI is connected to the UPS and sends a signal
through the network to shutdown other systems in the network.
Slave means, that Open-E iSCSI is reacting on a "power down-signal" from an
UPS master.
During a power failure you cannot log into the Open-E iSCSI. Users,
who are connected to the Open-E iSCSI server during the UPS-time
continue to have full access to all files on the iSCSI target.
Function “Clock settings”
Here you define an NTP server (Network Time Protocol) to synchronize your
Open-E iSCSI with a time server on the Internet.
Time and date display are static. What is shown are the time and date
at which the setup menu was accessed.
Download from Www.Somanuals.com. All Manuals Search And Download.
30
Function “Set time”
With this function, date and time can be entered manually. Alternatively, take the
route via an NTP server, which has to be defined in the previous function.
Function “Power button settings”
In this section you specify which action will be performed in case of power button
is pressed Options:
• no action (none option),
• restart computer (reboot option),
• power off computer (halt option).
Function “Motherboard info”
With this function you can check info about your motherboard.
5.2.1.5 Target Manager
Function “Unit Manager”
After clicking on the branch “volumes” in the left part of page you will find a list of
all available units with entire disk size. In order to integrate available units into the
volume group, just use the “add” button, after which the unit will combined into
one volume group.
Download from Www.Somanuals.com. All Manuals Search And Download.
31
Next, the page will be reloaded, and status field will show your units as “in use”
and with new group e.g. “vg0”. The Volume Group is the equivalent of a physical
disk from the system point of view. It is also possible to combine two (or more)
units into one Volume Group by choosing one of actually existing groups like
“vg0”, or by choosing “new” option, which will create new group “vg1” after
using “add” button.
Function: Disks Localizer
This function helps find disks in cage in your iSCSI server.
If you connect hard drives to hardware RAID controller then you may not be able
to determine which unit is which disk using S.M.A.R.T. tool or hardware RAID
management tool (depends on manufacturer of RAID controller).
When you click on "start" button then appropriate disk will start reading and you
can determine which disk is it by watching "disk-activity LEDs". For proper
operation of this function there should be no other activity on hard drives.
Localization will stop automatically after one minute if you will not stop it
manually (by unsetting appropriate checkbox and hitting apply button).
Using this function during normal operation is highly not recommended
and will cause slowing down your server.
When the added unit is integrated, it cannot be remove in Web
Interface. You need to use extended tools in console.
You can only add units with capacity greater than 5 GB, smaller units
are not supported.
Function “Units Assigned”
Here listed units are assigned to current volume group.
Function “iSCSI Volume Manager”
Using this function you can create new iSCSI target volumes inside one Volume
Group. The iSCSI Volume is the equivalent of partitions, which are available for
client stations. You can increase capacity of existing Logical Volume.
Download from Www.Somanuals.com. All Manuals Search And Download.
32
Depending on needed capacity administrator can add more capacity to
particular Logical Volume. Using iSCSI Volume Manager Function you can add
disk space to new LV and “snapshot” or increase size on existing iSCSI Volume
and snapshot (you can’t decrease the size). To set needed iSCSI Volume size
use scrollbar on the right side, it shows size available for use. In order to set the
precise iSCSI Logical Volume size use left or right keyboard cursor key.
This function can be also used to reserve disk space for “swap”.
The SWAP is additional disk space used by the system to temporally release
some amount of used RAM memory. So you can reserve some shared disk
space for the system SWAP memory. We have added a lot of new features in
our latest release that consume additional memory, so in some cases e.g.
512MB of RAM would not be enough and some processes like SWAP would not
function without additional RAM.
Function “Number of snapshots”
Here you can define number of snapshots for the server.
Please take into account that changing the amount of snapshots will
automatically reset all the settings in function Snapshot definition.
Download from Www.Somanuals.com. All Manuals Search And Download.
33
Function “Snapshot definition”
This feature takes so-called snapshots of the file system. The Snapshot function
of Open-E iSCSI enables the system administrator to freeze the data content of
the targets volume at a period of time, this function is transparent to the user.
From this moment on, the users work on a virtual data volume, all changes to the
volume are stored in a different partition. The storage of all changes is
independent of the file-system Open-E iSCSi uses on block-level. Only when the
snapshot is deleted / removed the changes are permanently transferred to the
actual data volume. Through a separate share, which is only available for the
administrator, a complete backup of the dataset can be done. With the snapshot
technology even a database can be backed up while the users are working on it.
Snapshots can be activated / deactivated manually or automatically.
In the schedule options "Begin time" and "End time" and day of week are used for
automatic snapshots: this is the time of automatic activation and deactivation
(syntax is “him”). When snapshot start is set, the snapshot will be deactivated
and activated again at the given time.
Alternatively, snapshots can be taken manually in the Maintenance->Snapshot
menu even if snapshots are automatically created under “Snapshot Definition”.
The button remove all can by useful for removing all snapshots at one time.
Download from Www.Somanuals.com. All Manuals Search And Download.
34
Function “Create new target”
To create a target assign a name or leave the "Target Default Name" option
checked. Target name can contain alphanumeric characters: ' . ' ' : ' - '
A target name is considered case-insensitive. Every character entered will be
converted to low-case. No spaces and no underscores are permitted.
The server name will be used as a part of the default target name
In this function you can create new targets, which will be seen in client stations
as logical disks. You can change the name of any target.
After creating new target (see below) there will be created a new branch:
“target0”
Function: CHAP User Target Access
Add CHAP users that are granted to access to this target.
You can use following keyboard keys in the lists (first set focus to
desired list):
o
o
o
o
Home: jump to the first
End: jump to the last
Shift + arrow key: for multi-select
letter key: jump to the first position starting with pressed key
If you enable CHAP user access authentication but will not select any users to
have access, then nobody will have access to the Target.
Additionally you can set password required to establish connection of iSCSI
Initiator to iSCSI Target Server.
To do this please use the function iSCSI Access Password situated in setup ->
target manager -> targets.
The Microsoft iSCSI software initiator requires using password from 12
to 16 alphanumerical characters.
Download from Www.Somanuals.com. All Manuals Search And Download.
35
Function “Target Volume Manager”
By using this function you can add available target volumes in premises of one
target. In case of defining more than one target – free volumes will be available in
actually edited volume. Analogically as with SCSI devices, it is possible to define
LUN address device.
Function “Target IP Access”
You can assign network classes or specify individual IP addresses that have
permission to access the target. Entries should be delimited by commas. When
no entries are present everyone is permitted to access the target. Specifying at
least one entry excludes all the clients that do not match it from accessing the
target.
Please note that already active sessions to the target will persist regardless of the
newly applied settings. You can ensure that the settings are in force immediately
after you apply them by going to maintenance->shutdown->Connection reset
and resetting the connections manually. Keep in mind that all the unsaved client
data might be lost.
Download from Www.Somanuals.com. All Manuals Search And Download.
36
Function “Target Rename”
This function provides a new target name.
Function “Target Remove”
Removing target removes all the volumes from the target.
Please note that the data stored on the volumes are not automatically
removed. You can assign the volumes to different targets and still see
the data. Please remove the data prior to removing target in order to
prevent leakage of sensitive or classified information.
Function: CHAP User Target Snapshot Access
Add CHAP users that are granted to access the Target Snapshot.
You can use following keyboard keys in the lists (first set focus to
desired list):
o Home: jump to the first
o End: jump to the last
o Shift + arrow key: for multi-select
o letter key: jump to the first position starting with pressed key
If you enable CHAP user access authentication but will not select any users to
have access, then nobody will have access to the Snapshot.
Additionally you can set password required to establish connection of iSCSI
Initiator to iSCSI Target Server.
Download from Www.Somanuals.com. All Manuals Search And Download.
37
Function: Target Snapshot Access
You can assign network classes or specify individual IP addresses that are
permitted or denied to access the snapshot. Entries should be delimited by
commas. When no entries are present in Denied access or Allowed access fields
everyone is permitted to access the snapshot. Specifying at least one entry in
Allowed access field excludes all the clients that doesn't match it from accessing
the snapshot. When you specify at least one entry in Denied access field, every
CHAP user or CHAP users from network class address are denied form
accessing the snapshot. When you specify any IP address in Allowed access
field, CHAP users form that address are allowed to access the snapshot even if
the same address has been specified in Denied access field. If you enter only
Allowed access field then Denied access field will be automatically entered with
0.0.0.0/0 entry.
Please note that already active sessions to the snapshots will persist
regardless of the newly applied settings. You can ensure that the
settings are forced immediately after you apply them by going to
maintenance->shutdown->connection reset and resetting the
connections manually. Keep in mind that all the unsaved client data
might be lost.
There is possibility of entering network class address in two ways:
• 192.168.2.0/255.255.255.0 - normal form
• 192.168.2.0/24 - short form.
When You enter network class address in normal form, it will be automatically
converted to short form.
Examples:
Denied access: 0.0.0.0/0
Allowed access: 192.168.2.30/0, 192.168.3.45
This settings deny access form every IP address or network class address, only
addresses in Allowed access field are granted for accessing the snapshot.
Denied access: 192.168.0.0/16
Allowed access: 192.168.2.30, 192.168.10.230, 192.168.30.0/24
This settings deny access to any IP addresses form network 192.168.0.0/16.
Grant access for IP addresses 192.168.2.30, 192.168.10.230, all IP addresses
from network 192.168.30.0/24 and all IP addresses that have not been denied in
Denied access field.
Function “Snapshot rename”
With this function you will provide a new name for the snapshot target.
Function: Create new CHAP user
To create CHAP user enter name, password, retype password
and press create button.
Download from Www.Somanuals.com. All Manuals Search And Download.
38
CHAP user name cannot:
o contain characters: ~ ! @ # $ ^ & ( ) + [ ] { } * ; : ' " ., % | < > ? / \
= `
o begin or end with a space.
Password cannot:
o contain characters: ' " `
o spaces.
o The length of the password must be within 12 - 16 characters.
If CHAP users forget their password, there is no way to retrieve it. You can only
set a new password. do this please use the function iSCSI Access Password
situated in setup -> target manager -> targets.
Function: Edit CHAP user
To change CHAP user password enter and confirm password, and press "apply"
button.
Password cannot:
o contain characters: ' " `
o spaces.
The length of the password must be within 12 - 16 characters.
Function: Delete CHAP user
Click "remove" button to remove the CHAP user form the system.
Download from Www.Somanuals.com. All Manuals Search And Download.
39
Using snapshot with Open-E iSCSI
Usage snapshot facility heavily depends on the initiator of software support for
dynamic units* and the partition scheme which you use on the operating system
where you attach the targets. The most common error is if on the client side that
uses an LVM/LVM2 (Linux) scheme or Microsoft's Dynamic Disks which connect
to the snapshot and original volume from the same client malfunctions. This is
due to the fact that normally an LVM volume bares special metadata which is
used as the identify information and since a snapshot simply doubles those
metadata it can confuse your partitioning software (for example logical volume
manager sees two identical volumes).
In order to take proper advantage of Open-E iSCSI Target's snapshot technology
the volumes your Open-E iSCSI Target exports should be imported in your
operating system as Basic Volume (Windows) and you should not incorporate
them as logical volumes in LVM/LVM2 (on Linux) if you plan to use snapshots
and access them from the same machine at the same time.
If you plan to take snapshots and import them alongside the original volume -
access them from the same client. Below is instruction how to import a target in a
Microsoft basic volume:
a. Create target volumes (tgv),
b. Create a target in Open-E iSCSI,
c. Add chosen volumes to the target.
d. In MS iSCSI Initiator add Open-E iSCSI Target as an iSCSI portal in the MS iSCSI
Initiator console,
e. Log onto the target,
f. Open the computer management,
g. Select the disk management,
h. Add the volumes as basic disks,
i. On Open-E iSCSI Target create snapshots: setup Æ target manager and reserve
desired space for snapshots (reserve about 5-20% of total space for the
snapshots). Determine number of snapshots, assigned to the volumes and
distribute the reserved space as needed. To activate a snapshot go Maintenance
Æ Snapshot.
j. Follow the steps e-h to log and attach the snapshot target.
*) Currently iSCSI Microsoft Initiator ver1.06 does not support dynamic volumes.
The best solution to use snapshots without decreasing Open-E iSCSI
performance is to assign separate RAID. This RAID will be optimized for
a writing speed (e.g. few disks in RAID 0 only for snapshots). Follow the
steps below:
a. Add RAID chosen for data as NEW (Vg0) in the menu WebGui: setup Æ target
manager Æ Volumes,
b. Create one or more Tgv’s. At this point, there is no free space reserved for
snapshots,
c. Add the second RAID to existing Vg0, intended for snapshots, (RAID previously
configured as RAID 0),
d. Now only reserve all available space for snapshots.
Download from Www.Somanuals.com. All Manuals Search And Download.
40
e. The above procedure will greatly decrease the overload of a disk intended for
data and will cut down the performance drop off in Open-E iSCSI with a
snapshot turned on.
5.2.2 Maintenance
This page accessed with the Maintenance tab contains settings and functions
pertaining to general management operations.
5.2.2.1 Shutdown
Function “System Shutdown“
When using this function, you can shut down the Open-E iSCSI.
The Open-E iSCSI can only be turned on again manually.
Function “Schedule for shutdown“
Here you can set more specific information like the time and day of a week for
the shutdown.
Function “System Restart”
This function is self-explanatory: It allows restarting the system.
Download from Www.Somanuals.com. All Manuals Search And Download.
41
Function “Connection reset”
It might be necessary to restart the iSCSI daemon to inform client about specific
setting changes, e.g. resize of the volumes.
All current connections with iSCSI initiators will be terminated
immediately. It may cause loss of unsaved data files.
If your client does not reestablish the connections automatically you will
have to do it manually from the clients.
5.2.2.2 Snapshot
Here you can instantly create and remove snapshots. This can be useful if you
need to make considerable changes to your data while you do not know if these
changes are supposed to be permanent.
5.2.2.3 Miscellaneous
The next menu option is “miscellaneous” This function allows you to save
settings, to retrieve them, and to remove them. To use those functions you must
have had pen drive (USB Flash Memory) connected to USB port.
Download from Www.Somanuals.com. All Manuals Search And Download.
42
5.2.2.4 Software Update
This function allows you to update the system software. There are two ways of
updating Open-E iSCSI software.
During updating from share please follow this steps:
In resources menu create share "update" with default path.
1. .Copy update file into update folder.
2. .Press Update button.
3. .Confirm update when you will be asked.
Some updates need a system restart. In this case you will be informed
about needed restart in confirmation message.
Download from Www.Somanuals.com. All Manuals Search And Download.
43
During update from CD please follow this steps:
1. Write down the actual NAS server IP address and NAS server name. After having
updated NAS, please re-enter both.
2. Write down authorization settings. Before Updating, please save “User”,
“Groups”, “Shares” and
3. Under Menu: “Maintenance -> Resources Misc -> Save resources”.
4. Download and save NAS Server Logs: Menu status -> hardware in Function
Logs click on “Download”, then save on your local HDD.
5. The ISO-Files which include in update file must be burned on a CD with your
favorite Burning software. (For example: Nero Burning ROM - option: “Burn
Image”, etc.)
6. In order to re-flash the module, please install CD-ROM as Secondary-Master and
DOM (disk-on-module) as Primary-Master.
USB CD-ROM can be used as well.
7. Set the BIOS to boot from CD-ROM drive.
8. Boot from the ISO-CD and wait until prompt: “Update complete, Please Remove
CD and restart”
9. After re-fleshing, please reset the BIOS to boot from Primary-master HDD.
Updating the system may take about 10 minutes.
Please remember that making an update is activity that cannot be
stopped in any way. We strongly recommend to update system
when UPS is connected.
Function: Update downloader
With this function you can check if there is new update available and download it.
Download from Www.Somanuals.com. All Manuals Search And Download.
44
e.com. You also have to remember to setup correct DNS and Gateway address
in “setup” -> “network menu”.
5.2.2.5 S.M.A.R.T.
Function: S.M.A.R.T. e-mail notification
This function allows you to check S.M.A.R.T. status of hard disks and send it to
e-mail address.
S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) is a monitoring
system for computer hard disks to detect and report on various indicators of
reliability, in the hope of anticipating failures.
In order to enable S.M.A.R.T. e-mail notification, you have to first enable E-mail
notification function in setup -> administrator menu, then enable S.M.A.R.T. in
Console tools at special options (press F1 on console to find out keyboard
shortcuts).
When S.M.A.R.T. is enabled you will see all detected hard drives with information
about unit number, size and serial number.
Select the checkbox of unit, form which you want to receive S.M.A.R.T. status
and press "apply". If everything is ok, then status will be PASSED, in another case
FAILED.
It will be possible to enable S.M.A.R.T. when all hard disks support it and
it is enabled in BIOS settings.
5.2.3 Status
This function provides you with a quick overview of the most important system
parameters of your Open-E iSCSI. The corresponding sub-functions are network,
hardware and S.M.A.R.T.
Download from Www.Somanuals.com. All Manuals Search And Download.
45
5.2.3.1 Network
This function provides information on the IP address, Open-E iSCSI date and
time and iSCSI status connections.
5.2.3.2 Hardware
The “Hardware” option provides you with information on storage and network
controllers and the drivers (e.g. network driver and IDE driver). In addition, you
may also download the latest Open-E iSCSI log files, remove them, check
memory (RAM) usage and motherboard info..
Download from Www.Somanuals.com. All Manuals Search And Download.
46
Download from Www.Somanuals.com. All Manuals Search And Download.
47
5.2.3.3 S.M.A.R.T.
Through the S.M.A.R.T. system, modern hard disk drives incorporate a suite of
advanced diagnostics that monitor the internal operations of a drive and provide
an early warning for many types of potential problems. When a potential problem
is detected, the drive can be repaired or replaced before any data is lost or
damaged.
Here you can find a tree with hard drives for which you can view S.M.A.R.T.
information.
It is possible to view information about separate hard drives or a summary for all
drives in the system.
• To view S.M.A.R.T. information for a hard drive - please click on appropriate drive
name.
• To view summary please click on "all units"
Function: S.M.A.R.T. unit’s health status
This function allows you to check S.M.A.R.T. status of hard disks. S.M.A.R.T.
(Self-Monitoring, Analysis, and Reporting Technology) is a monitoring system for
computer hard disks to detect and report on various indicators of reliability, in the
hope of anticipating failures.
To enable S.M.A.R.T. checks you need to use console tools and enable it in
"special options"
It will be possible to enable S.M.A.R.T. when all hard disks support it
and it is enabled in BIOS settings.
When S.M.A.R.T. is enabled you will see all detected hard drives with information
if specified drive has passed health checks. To view more information and/or do
more advanced test click on drive in drives tree on left side.
Download from Www.Somanuals.com. All Manuals Search And Download.
48
Function: S.M.A.R.T. info
This function allows you to view S.M.A.R.T. parameters which this disk is able to
return.
In the upper part of this function you can see elementary parameters of hard
drive such as device model or serial number. Below there is a table with
S.M.A.R.T. attributes. In first column you will find an attribute name, in second -
minimum threshold value of this parameter, then current value, next worst value
and after the status.
If the value of this attribute ever exceeds the worst of this value then the
status will be "failed". If value of attribute is on the edge of the worst
value then the status can be "pre-failed". On some hard drives part of
the attributes can be displayed as "Unknown Attribute". This can
happen when the manufacturer of that hard drive have done some
modifications in S.M.A.R.T. and these changes are not yet supported by
our software.
Button "view errors" provide you ability to view S.M.A.R.T. log of that drive which
is generated automatically.
Download from Www.Somanuals.com. All Manuals Search And Download.
49
Function: S.M.A.R.T. test
This function allows you to perform short and long tests of the hard drive. You will
be informed about progress of the test. After the test finishes please click on
"results" button to view test log.
Performing a test is not recommended during normal (daily) usage of that hard
drive.
On some motherboards and controllers S.M.A.R.T. tests can not be
performed.
5.2.4 RAID | FC
In this place you can manage hardware RAID controllers, Fibre Channel or create
disk array using software RAID.
5.2.4.1 H/W Raid
Please note that the RAID controller should be supported by the Open-E
software. If a 3ware controller is installed you can click on RAID in the menu and
the 3ware web base will start automatically.
Function: “3ware administrations”
This function will reset the 3DM password to factory default. (Default 3DM/3DM2
password: 3ware)
It is important to realize the need for time synchronization between an
Open-E NAS/iSCSI box and the client browser you use to access the
configuration panel. Since access to 3ware configuration utility expires
after a certain time period (after period of inactivity). Open-E iSCSI/NAS
must be in the same time zone as client station, if the difference
becomes too large you'll loose authorization token to early or your
authorization will be invalid immediately.
Download from Www.Somanuals.com. All Manuals Search And Download.
50
5.2.4.2 Fibre Channel
When a fibre channel controller is detected you will find utilities and options
specific to that hardware.
Function: QLOGIC administration
If a QLA23xx series controller is installed, you can use commandline tool in the
Console Tools (press CTRL+ALT+F).
The QLA23xx controller allows for remote administration. To access the
configuration daemon download the client application SANsurfer from
homepage provided by QLOGIC. Install it on your system and configure to
access this server. Follow the online instructions to configure. If in doubt consult
documentation manual. Make sure you have the essential information handy (Ip
address of your server, username and password).
5.2.4.3 S/W Raid
Here you will find functions with which you can create software RAID units.
Function: Create new S/W RAID unit
In this function you can create software RAIDs from free (not used) units. If you
want to create RAIDs form used units, you need first to Delete content of units in
console, be aware this would ERASE all data form units.
To create a RAID select units, then from ListBox select what type of RAID it will
be, then select desired Chunk size. After setting all demanded parameters press
“create” button.
Allow to create degraded mode - it allows to create RAID1 with one unit, RAID5
with two units or RAID6 with three units, even if minimal number of units is not
meet.
Chunk size - its a minimal portion of data that is written at a time.
Download from Www.Somanuals.com. All Manuals Search And Download.
51
Available RAIDS:
RAID 0: it is stripe array and requires, minimum 2 units. In RAID 0 You can set
the Chunksize 4k - 256k. The destination size of the RAID Array will be
sum of each drive size in array.
RAID 1: mirror array requires 2 units. Destination size will be equal:
(SINGLE)UNIT_SIZE, where (SINGLE) UNIT_SIZE is the size of the
smallest unit in array.
RAID 5: stripe + parity algorithm array (required, minimum 3 units - with the
same capacity). You can choose from the ListBoxes: (layout)parity-
algorithm [left/right] [symmetric/asymmetric]. DESTINATION SIZE:
(NR_OF_UNITS-1)*(SINGLE)UNIT_SIZE, where (SINGLE) UNIT_SIZE is
the size of the smallest unit in array.
RAID 6: stripe + parity algorithm array (required, minimum 4 units - with the
same capacity). You can choose from the ListBoxes: (layout)parity-
algorithm [left/right] [symmetric/asymmetric]. DESTINATION SIZE:
(NR_OF_UNITS-2)*(SINGLE)UNIT_SIZE, where (SINGLE) UNIT_SIZE is
the size of the smallest unit in array..
The (layout) parity-algorithm in RAID 5 and 6 is described below.
To remove RAID, if previously added to Volume Group please enter Console Tool
and first delete Volume Group of the RAID. Then the Remove button will be
enabled. Otherwise simply press Remove button.
You can add spare units to RAID1, RAID5 and RAID6 arrays.
Please remember that after creation of an RAID, in Function: 'Info' will be shown
progress of Synchronization. Till end of this process all actions done on this array
will be performed a bit slower.
Download from Www.Somanuals.com. All Manuals Search And Download.
52
RAID 5 (layout) parity-algorithm
It is possible to set one of four algorithms of placement data blocks and parity
blocks in matrix. Our default option is left-symmetric, which is the best for large
reads. Other recommended value is left-asymmetric.
Left-Asymmetric Algorithm
Left-Symmetric Algorithm
Unit
S0
0
3
6
Unit
S1
1
Unit
S2
2
Unit
S3
Parity
5
8
11
Unit
S0
0
4
8
Unit
S1
1
Unit
S2
2
Parity
6
10
Unit
S3
Parity
3
7
11
4
Parity
5
Parity
9
13
7
Parity
9
13
Parity
12
10
14
Parity
12
Parity
14
Parity
Right-Asymmetric Algorithm
Right-Symmetric Algorithm
Unit
S0
Parity
3
Unit
S1
0
Parity
7
10
Unit
S2
1
Unit
S3
2
5
8
Unit
S0
Parity
5
Unit
S1
0
Parity
8
10
Unit
S2
1
Unit
S3
2
4
6
4
3
6
9
Parity
11
13
7
9
Parity
11
13
Parity
14
Parity
14
Parity
12
Parity
12
RAID 6 (layout) parity-algorithm
It is possible to set one from four algorithms of placement data blocks and parity
blocks in matrix. Our default option is left-symmetric which is the best for large
reads. Other recommended value is left-asymmetric.
Left-Asymmetric Algorithm
Left-Symmetric Algorithm
Unit
S0
0
Unit
S1
1
Unit
S2
Parity Parity
Unit
S3
Unit
S0
0
Unit
S1
1
Unit
S2
Parity Parity
Unit
S3
2
Parity Parity
3
5
3
Parity Parity
2
5
Parity Parity
Parity
8
4
7
Parity Parity
Parity
8
4
7
6
9
Parity
6
9
Parity
Parity Parity
Parity Parity
Right-Asymmetric Algorithm
Right-Symmetric Algorithm
Unit
S0
Parity Parity
Unit
S1
Unit
S2
0
Unit
S3
1
Unit
S0
Parity Parity
Unit
S1
Unit
S2
0
Unit
S3
1
2
4
Parity Parity
3
3
4
Parity Parity
2
5
6
9
Parity Parity
Parity
Parity Parity
5
6
Parity Parity
Parity
8
7
Parity
Parity Parity
7
8
Parity
9
Download from Www.Somanuals.com. All Manuals Search And Download.
53
Function: “S/W RAID E-mail notification “
It is possible to send notification by e-mail about events on software RAID arrays
(e.g. rebuild started, rebuild finished, span is active). In order to do so please
check Send array events.
In order to “Send array events” you must enable E-mail notification in
“setup” Æ “administrator”.
• If you check "Include resyncing/recovering progress" - you will be informed
about progress of resync/rebuild if it is currently running. An e-mail will be send
for every 20 % completed.
• If you check "Include array status" - to every event will be added the status of
event-related array.
After choice Raid Levels and by clicking “apply” button appear in field “Status”
“in use” (see below)
By clicking on the branch “MD0” appears new page, with Functions Manager,
Info and Software RAID unit remove.
Download from Www.Somanuals.com. All Manuals Search And Download.
54
Function: „Manager“
In this function you can manage RAID array
Available operations:
RAID 0:
Construction of this RAID does not allowed to manage it anyway. Every unit must
not be Failed. If any would be the whole array would be destroyed.
RAID 1:
• To set unit as a Faulty one mark proper checkbox (in the column F) and click on
Apply button.
• To delete any unit form an array mark proper checkbox (in the column R) and
click on Remove button.
RAID 5:
• To set unit as a Faulty one mark proper checkbox (in the column F) and click on
Apply button.
• To delete any unit form an array mark proper checkbox (in the column R) and
click on Remove button.
RAID 6:
• To set unit as a Faulty one mark proper checkbox (in the column F) and click on
Apply button.
• To delete any unit form an array mark proper checkbox (in the column R) and
click on Remove button.
RAIDs notation:
• PR - priority in array - describes priority of unit that will be added to array if
another is set to Faulty.
• F - faulty - unit can be turned off from array
• R - hot remove - unit can be removed form array without shutting down the
system.
• ST - describes state of unit in array, which can be:
o
o
o
A - This means that Unit is active in array
* - Number of Unit that belongs to the array
S - Spare or spare rebuilding - this means that unit is free and can be
added to the array or is free and currently is rebuilding.
Limitations:
• There is no possibility to set any unit as faulty if the matrix is degraded or during
resync/rebuild.
• While using RAID 1 and RAID 5 there is possibility to set only one disk from
active as faulty. This regulation is not valid for Spare units in array.
Only one disk form Active in Array can be set as Faulty or Removed
Download from Www.Somanuals.com. All Manuals Search And Download.
55
Function: „Info“
From this function you can obtain information like Creation Time, RAID Level,
Array and Device Size, Update Time and state
During syncing or rebuilding of array it is recommended to preform as
few disk operations as possible. Status of syncing/rebuilding will be
showed "live" - without need to refresh page manually.
Function: „Software RAID unit remove“
This function allows you to remove Software RAID unit (MD[nr]).
This function is available only when no Logical Volume is created on
appropriate MD[nr] and unit is not resyncing. If you want to remove
software RAID unit with Logical Volume please use console Extended
tools (press F1 on console to find out keyboard shortcuts) and remove
Logical Volume first.
5.2.5 Help
When accessing Help - “Software License” you can read the license for software
included in Open-E iSCSI ENTERPRISE.
You can download a PDF version of this manual. In order to read the manual, you
need a PDF viewer such as the Acrobat Reader (http://www.adobe.com).
Download from Www.Somanuals.com. All Manuals Search And Download.
56
By clicking on “Registration” in the “Help” menu you can register yourself at
“About Open-E iSCSI ENTERPRISE” indicates which system version you are
currently working with. In addition you find contact information regarding Open-E
iSCSI Target; for instance how you can reach Open-E’s technical hotline if you
should have problems or questions.
You log out by closing the browser window.
Download from Www.Somanuals.com. All Manuals Search And Download.
57
6 Troubleshooting Guide
Here is a list of common error messages and their meanings as well as corresponding
tips on how to resolve the underlying problem. If your error message is not listed here
please contact Open-E's support and service team (see section “help” above). Our
staff will help you find a solution.
Open-E iSCSI does not boot, keyboard LEDs are flashing
This problem arises when you installed Open-E iSCSI into the secondary IDE slot by
mistake. Open-E iSCSI is configured for and will only run in the primary IDE connector.
Shut down the computer, remove Open-E iSCSI from secondary and place it into
primary IDE slot. That should solve the problem.
Error: values are not valid
You have entered an invalid parameter. IP addresses have the form aaa.bbb.ccc.ddd:
All four parameters range between 0 and 255 and are always separated by periods.
Error: passwords do not match
Make sure that you type the same password in each entry field. For safety reasons,
the passwords are not displayed. Type slowly. Check the status of the Shift, Caps
Lock, Control, and Alt-keys.
Error: No pendrive detected
You instructed Open-E iSCSI to perform a systems update, but did not supply a valid
Open-E iSCSI update file. Download the latest Open-E iSCSI update file from the
them to USB port. Please spell upgrade lower case. Finally, press update button.
Error: invalid administrator password
Administrator password cannot begin or end with a space. Spaces are not legitimate
characters at the beginning and end of a password. Maybe you inadvertently hit the
space bar during password entry. Reenter your password.
Download from Www.Somanuals.com. All Manuals Search And Download.
58
7 Appendix A
Open-E Software License agreement
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE
AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. OPEN-E GMBH AND/OR
ITS SUBSIDIARIES ("OPEN-E") IS WILLING TO LICENSE THE SOFTWARE TO YOU AS
THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING
THE SOFTWARE (REFERENCED BELOW AS "YOU OR YOUR") ONLY ON THE
CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT.
THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND OPEN-E. BY
OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE "AGREE" OR
"YES" BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR
LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS
AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK
ON THE "I DO NOT AGREE", "NO" BUTTON, OR OTHERWISE INDICATE REFUSAL,
MAKE NO FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL PRODUCT
WITH PROOF OF PURCHASE TO THE DEALER FROM WHOM IT WAS ACQUIRED
WITHIN NINETY (90) DAYS OF PURCHASE, AND YOUR MONEY WILL BE REFUNDED.
The terms of this software license agreement, do not apply to the Free Software
Programs distributed with Open-E software. Instead, those programs are covered by
other licenses, including the GNU General Public License.
A copy of the GPL along with the other applicable Free Software Licenses, can be found
in Appendix B.
Ownership and Copyright
The Open-E software is non-exclusive licensed and sold to you for use only as
permitted by this License Agreement. Open-E GmbH reserves any rights not expressly
granted to you. Copying of the software is prohibited by law unless specifically
authorized in writing by Open-E GmbH. You may not use copy, modify, sell, lease,
sublease or otherwise transfer Open-E software in whole or in part.
Intellectual Property Rights
The Open-E software contains intellectual property rights, and in order to protect them,
you may not decompile, reverse engineer, disassemble or otherwise reduce the Open-E
software to a human perceivable form.
Termination
This license will be automatically terminated without notice from Open-E GmbH if you
fail to comply with any term or condition of this agreement. If you do not agree to be
bound by these terms and conditions, you may not use the Open-E or any of its
software components.
Download from Www.Somanuals.com. All Manuals Search And Download.
59
Disclaimer of Warranties
Open-E software are licensed "as is" without warrantee of any kind. Open-E GmbH
hereby disclaims all warranties express and implied, relating to Open-E , the installation
utilities and the embedded software including, without limitation, any implied warrantee
of merchantability, fitness for a particular purpose or non-infringement.
Limitation of Liability
In no event will Open-E GmbH liability under this agreement exceed the price that you
paid for your Open-E software. Furthermore, in no event will Open-E GmbH be liable for
any lost profits, lost data, cost of procurement of substitute goods or services, or any
special consequential, incidental, indirect or punitive damages arising out of or under
this agreement.
The limitation of liability set forth in this paragraph will apply, whether or not Open-E
GmbH was advised of the possibility of the loss, liability or damages and
notwithstanding any failure of essential purpose of any limited remedy.
Waiver
No delay or failure of Open-E GmbH to exercise any right under neither this agreement
nor any partial exercise thereof shall be deemed to constitute a waiver or any rights
granted hereunder or under law.
Unlawful Provisions
If any provision of the agreement is held to be unenforceable for any reason, all other
provisions of this agreement shall nevertheless be deemed valid and enforceable to the
fullest extent possible.
Entire Agreement
This agreement constitutes the sole and exclusive agreement between the parties
concerning the subject matter hereof.
LIMITED WARRANTY
Open-E warrants that the media on which the software is distributed will be free from
defects for a period of ninety (90) days from the date of delivery of the software to you.
Your sole remedy in the event of a breach of this warranty is that Open-E will, at its
option, replace any defective media returned to Open-E within the warranty period, or
refund the money you paid for the software. Open-E does not warrant that the software
will meet your requirements, that operation of the software will be uninterrupted, or that
the software will be error-free.
Authorized Service
Only an authorized service representative can service Open-E software. Failure to
comply with this requirement will void the warranty.
Applicable Law
This agreement shall be governed by German law. You agree to jurisdiction and venue
in the courts located in Munich, Germany for all claims, disputes and litigation arising
under or related to this agreement.
Download from Www.Somanuals.com. All Manuals Search And Download.
60
8 Appendix B
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies of this license document,
but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and
change it. By contrast, the GNU General Public License is intended to guarantee your
freedom to share and change free software to make sure the software is free for all its
users. This General Public License applies to most of the Free Software Foundation's
software and to any other program whose authors commit to using it. (Some other Free
Software Foundation software is covered by the GNU Library General Public License
instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General
Public Licenses are designed to make sure that you have the freedom to distribute
copies of free software (and charge for this service if you wish), that you receive source
code or can get it if you want it, that you can change the software or use pieces of it in
new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you
these rights or to ask you to surrender the rights. These restrictions translate to certain
responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you
must give the recipients all the rights that you have. You must make sure that they, too,
receive or can get the source code. And you must show them these terms so they
know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this
license which gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone
understands that there is no warranty for this free software. If the software is modified
by someone else and passed on, we want its recipients to know that what they have is
not the original, so that any problems introduced by others will not reflect on the original
authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid
the danger that redistributors of a free program will individually obtain patent licenses, in
effect making the program proprietary. To prevent this, we have made it clear that any
patent must be licensed for everyone's free use or not licensed at all.
Download from Www.Somanuals.com. All Manuals Search And Download.
61
The precise terms and conditions for copying, distribution and modification follow.
GNU GENERAL PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND
MODIFICATION
0. This License Agreement applies to any software library or other program which
contains a notice placed by the copyright holder or other authorized party saying it
may be distributed under the terms of this Lesser General Public License (also called
"this License"). Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be
conveniently linked with application programs (which use some of those functions and
data) to form executables.
The "Library", below, refers to any such software library or work which has been
distributed under these terms. A "work based on the Library" means either the Library
or any derivative work under copyright law: that is to say, a work containing the Library
or a portion of it, either verbatim or with modifications and/or translated
straightforwardly into another language. (Hereinafter, translation is included without
limitation in the term "modification".)
"Source code" for a work means the preferred form of the work for making
modifications to it. For a library, complete source code means all the source code for
all modules it contains, plus any associated interface definition files, plus the scripts
used to control compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this
License; they are outside its scope. The act of running a program using the Library is
not restricted, and output from such a program is covered only if its contents
constitute a work based on the Library (independent of the use of the Library in a tool
for writing it). Whether that is true depends on what the Library does and what the
program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code
as you receive it, in any medium, provided that you conspicuously and appropriately
publish on each copy an appropriate copyright notice and disclaimer of warranty;
keep intact all the notices that refer to this License and to the absence of any
warranty; and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your
option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a
work based on the Library, and copy and distribute such modifications or work under
the terms of Section 1 above, provided that you also meet all of these conditions:
a) The modified work must itself be a software library.
Download from Www.Somanuals.com. All Manuals Search And Download.
62
b) You must cause the files modified to carry prominent notices stating that you
changed the files and the date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties
under the terms of this License.
d) If a facility in the modified Library refers to a function or a table of data to be supplied
by an application program that uses the facility, other than as an argument passed
when the facility is invoked, then you must make a good faith effort to ensure that, in
the event an application does not supply such function or table, the facility still
operates, and performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is
entirely well-defined independent of the application. Therefore, Subsection 2d
requires that any application-supplied function or table used by this function must be
optional: if the application does not supply it, the square root function must still
compute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections of
that work are not derived from the Library, and can be reasonably considered
independent and separate works in themselves, then this License, and its terms, do
not apply to those sections when you distribute them as separate works. But when
you distribute the same sections as part of a whole which is a work based on the
Library, the distribution of the whole must be on the terms of this License, whose
permissions for other licensees extend to the entire whole, and thus to each and every
part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work
written entirely by you; rather, the intent is to exercise the right to control the
distribution of derivative or collective works based on the Library.
In addition, mere aggregation of another work not based on the Library with the
Library (or with a work based on the Library) on a volume of a storage or distribution
medium does not bring the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of
this License to a given copy of the Library. To do this, you must alter all the notices
that refer to this License, so that they refer to the ordinary GNU General Public
License, version 2, instead of to this License. (If a newer version than version 2 of the
ordinary GNU General Public License has appeared, then you can specify that version
instead if you wish.) Do not make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the
ordinary GNU General Public License applies to all subsequent copies and derivative
works made from that copy.
This option is useful when you wish to copy part of the code of the Library into a
program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under
Section 2) in object code or executable form under the terms of Sections 1 and 2
Download from Www.Somanuals.com. All Manuals Search And Download.
63
above provided that you accompany it with the complete corresponding machine-
readable source code, which must be distributed under the terms of Sections 1 and 2
above on a medium customarily used for software interchange.
If distribution of object code is made by offering access to copy from a designated
place, then offering equivalent access to copy the source code from the same place
satisfies the requirement to distribute the source code, even though third parties are
not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to
work with the Library by being compiled or linked with it, is called a "work that uses the
Library". Such a work, in isolation, is not a derivative work of the Library, and therefore
falls outside the scope of this License.
However, linking a "work that uses the Library" with the Library creates an executable
that is a derivative of the Library (because it contains portions of the Library), rather
than a "work that uses the library". The executable is therefore covered by this
License.
Section 6 states terms for distribution of such executables.
When a "work that uses the Library" uses material from a header file that is part of the
Library, the object code for the work may be a derivative work of the Library even
though the source code is not. Whether this is true is especially significant if the work
can be linked without the Library, or if the work is itself a library. The threshold for this
to be true is not precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and
accessors, and small macros and small inline functions (ten lines or less in length),
then the use of the object file is unrestricted, regardless of whether it is legally a
derivative work. (Executables containing this object code plus portions of the Library
will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code
for the work under the terms of Section 6.
Any executables containing that work also fall under Section 6, whether or not they are
linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a "work that
uses the Library" with the Library to produce a work containing portions of the Library,
and distribute that work under terms of your choice, provided that the terms permit
modification of the work for the customer's own use and reverse engineering for
debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it
and that the Library and its use are covered by this License. You must supply a copy
of this License. If the work during execution displays copyright notices, you must
include the copyright notice for the Library among them, as well as a reference
directing the user to the copy of this License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source
code for the Library including whatever changes were used in the work (which must
Download from Www.Somanuals.com. All Manuals Search And Download.
64
be distributed under Sections 1 and 2 above); and, if the work is an executable linked
with the Library, with the complete machine-readable "work that uses the Library", as
object code and/or source code, so that the user can modify the Library and then
relink to produce a modified executable containing the modified Library. (It is
understood that the user who changes the contents of definitions files in the Library
will not necessarily be able to recompile the application to use the modified
definitions).
b) Use a suitable shared library mechanism for linking with the Library. A suitable
mechanism is one that (1) uses at run time a copy of the library already present on
the user's computer system, rather than copying library functions into the executable,
and (2) will operate properly with a modified version of the library, if the user installs
one, as long as the modified version is interface-compatible with the version that the
work was made with.
c) Accompany the work with a written offer, valid for at least three years, to give the
same user the materials specified in Subsection 6a, above, for a charge no more
than the cost of performing this distribution.
d) If distribution of the work is made by offering access to copy from a designated
place, offer equivalent access to copy the above specified materials from the same
place.
e) Verify that the user has already received a copy of these materials or that you have
already sent this user a copy.
For an executable, the required form of the "work that uses the Library" must include
any data and utility programs needed for reproducing the executable from it.
However, as a special exception, the materials to be distributed need not include
anything that is normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on which the
executable runs, unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other
proprietary libraries that do not normally accompany the operating system. Such a
contradiction means you cannot use both them and the Library together in an
executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a
single library together with other library facilities not covered by this License, and
distribute such a combined library, provided that the separate distribution of the work
based on the Library and of the other library facilities is otherwise permitted, and
provided that you do these two things:
a) Accompany the combined library with a copy of the same work based on the Library,
uncombined with any other library facilities. This must be distributed under the terms
of the Sections above.
Download from Www.Somanuals.com. All Manuals Search And Download.
65
b) Give prominent notice with the combined library of the fact that part of it is a work
based on the Library, and explaining where to find the accompanying uncombined
form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as
expressly provided under this License. Any attempt otherwise to copy, modify,
sublicense, link with, or distribute the Library is void, and will automatically terminate
your rights under this License. However, parties who have received copies, or rights,
from you under this License will not have their licenses terminated so long as such
parties remain in full compliance.
9. You are not required to accept this License, since you have not signed it. However,
nothing else grants you permission to modify or distribute the Library or its derivative
works. These actions are prohibited by law if you do not accept this License.
Therefore, by modifying or distributing the Library (or any work based on the Library),
you indicate your acceptance of this License to do so, and all its terms and conditions
for copying, distributing or modifying the Library or works based on it.
10. .Each time you redistribute the Library (or any work based on the Library), the recipient
automatically receives a license from the original licensor to copy, distribute, link with
or modify the Library subject to these terms and conditions. You may not impose any
further restrictions on the recipients' exercise of the rights granted herein. You are not
responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for
any other reason (not limited to patent issues), conditions are imposed on you
(whether by court order, agreement or otherwise) that contradict the conditions of this
License, they do not excuse you from the conditions of this License. If you cannot
distribute so as to satisfy simultaneously your obligations under this License and any
other pertinent obligations, then as a consequence you may not distribute the Library
at all. For example, if a patent license would not permit royalty-free redistribution of
the Library by all those who receive copies directly or indirectly through you, then the
only way you could satisfy both it and this License would be to refrain entirely from
distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular
circumstance, the balance of the section is intended to apply, and the section as a
whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other
property right claims or to contest validity of any such claims; this section has the sole
purpose of protecting the integrity of the free software distribution system which is
implemented by public license practices. Many people have made generous
contributions to the wide range of software distributed through that system in reliance
on consistent application of that system; it is up to the author/donor to decide if he or
she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a
consequence of the rest of this License.
Download from Www.Somanuals.com. All Manuals Search And Download.
66
12. If the distribution and/or use of the Library is restricted in certain countries either by
patents or by copyrighted interfaces, the original copyright holder who places the
Library under this License may add an explicit geographical distribution limitation
excluding those countries, so that distribution is permitted only in or among countries
not thus excluded. In such case, this License incorporates the limitation as if written in
the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser
General Public License from time to time. Such new versions will be similar in spirit to
the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Library specifies a
version number of this License which applies to it and "any later version", you have the
option of following the terms and conditions either of that version or of any later
version published by the Free Software Foundation. If the Library does not specify a
license version number, you may choose any version ever published by the Free
Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose
distribution conditions are incompatible with these, write to the author to ask for
permission. For software which is copyrighted by the Free Software Foundation, write
to the Free Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of all derivatives
of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS
AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE
TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE
THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR
A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
END OF TERMS AND CONDITIONS
Download from Www.Somanuals.com. All Manuals Search And Download.
67
How to Apply These Terms to Your New Libraries
If you develop a new library, and you want it to be of the greatest possible use to the
public, we recommend making it free software that everyone can redistribute and
change. You can do so by permitting redistribution under these terms (or,
alternatively, under the terms of the ordinary General Public License).
To apply these terms, attach the following notices to the library. It is safest to attach
them to the start of each source file to most effectively convey the exclusion of
warranty; and each file should have at least the "copyright" line and a pointer to where
the full notice is found.
<one line to give the library's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This library is free software; you can redistribute it and/or modify it under the
terms of the GNU Lesser General Public License as published by the Free
Software Foundation; either version 2.1 of the License, or (at your option) any
later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
License for more details.
You should have received a copy of the GNU Lesser General Public License
along with this library; if not, write to the Free Software Foundation,
Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Also add information on how to contact you by electronic and paper mail.
You should also get your employer (if you work as a programmer) or your school, if
any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample;
alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a
library for tweaking knobs) written by James Random Hacker.
<signature of Ty Coon>, 1 April 1990
Ty Coon, President of Vice
That's all there is to it!
Download from Www.Somanuals.com. All Manuals Search And Download.
|