with LifeLine 4.0
User Guide
?? 2013 LenovoEMC, Ltd. All rights reserved.
Lenovo and the Lenovo logo are registered trademarks of Lenovo in the United States, other countries, or both. The EMC logo is a registered trademark of EMC Corporation in the United States and/or other countries. LenovoEMC and LifeLine are registered trademarks or trademarks of LenovoEMC, Ltd. in the United States, other countries, or both. Windows is a trademark of the Microsoft group of companies. Mac is a trademark of Apple Inc., registered in the United States and other countries. Linux?? is the registered trademark of Linus Torvalds in the U.S. and other countries. Certain other product names, brand names, and company names may be trademarks or designations of their respective owners.
CONTENTS
iii
iv
v
vi
vii
viii
ix
x
CHAPTER 1
Setting up Your
Setting up Your
Setup Overview
Setup with your
You then can install client software that includes:
???LenovoEMC Storage Manager
???Twonky Media Server for media aggregation
LenovoEMC Storage Manager is a management tool that helps you discover your
From LenovoEMC Setup, you can optionally create a Personal Cloud or begin using your
By default, the
2 Setup Overview
Setting up Your
Set up my
If your
Discovering with LenovoEMC Storage Manager
You can install LenovoEMC Storage Manager from the Setup Portal, which helps you discover your ix4- 300d on your network.
Discovering the
You can access your
???Windows 7 and Vista ??? Click Start, Computer, Network. You should see your
???Windows XP ??? If you have not enabled UPnP Discovery, click Start, Help and Support. In the Help and Support browser, search for UPnP and follow the steps from ???Install the UPnP framework???. After UPnP is enabled, open Windows Explorer and in the Folders view, expand My Network Places. You should see your
???Mac ??? Browse to your
Setting up Your
Setup Page
The Setup page opens when you first access the
4 Setup Page
Setting up Your
Network Connection
Connecting the
First, check the package contents.
Verify that the box contains the following items:
1.
2.Power Adapter and Cord
3.Quick Start Guide
4. Ethernet Cable
Package contents may vary.
Setting up Your
Connecting the
Initial Setup
If you have purchased more than one
1.Use the included network cable to connect the
2.Connect the included power adapter to the back of the
3.Your
4.From a computer on your network, open a web browser and go to http://setup.lenovoemc.com to set up your
You can access the ix4300d Management Console directly by entering the IP address or model name of your
.local after the name in the browser (for example,
5.OPTIONAL: if desired, install the LenovoEMC Storage Manager and Media Aggregation software.
If you install LenovoEMC Storage Manager, its icon will appear in the System Tray (Windows) or Menu Bar (Mac). The LenovoEMC Storage Manager will automatically scan your network and connect to available Shares.
If you receive a message from your operating system's firewall alerting you of network activity, be sure to unblock communications.
Mac Users: Shares on the
PC Users: Shares on the
Network Settings
The Network page of your
Manually Configuring Your Network
If you are comfortable with network technology and want to configure the network, refer to Manually Configuring Network Settings.
Bonded NICs
If your
6
Connecting the
Setting up Your
Enabling Jumbo Frames for Each NIC
You can enable jumbo frames for each NIC in your
Jumbo frame support should only be enabled if you are sure your network is
VLAN
Each NIC in your
Manually Configuring Network Settings
There are various settings in the network setup that you can manually configure.
1.Click Modify network settings.
2.Uncheck Automatically configure DNS, WINS, and all IP addresses (DHCP).
3.DNS Servers ??? enter the IP addresses of the DNS (Domain Name System) servers. DNS is used for translating the domain name to IP addresses.
4.WINS Servers ??? enter the IP addresses of the WINS server.
5.From the Bonding Mode
???Transmission Load Balance ??? increases bandwidth by distributing the load across multiple NICs.
???Link Aggregation ??? increases bandwidth by distributing the load across multiple ports in a switch. Link Aggregation requires an 802.3ad compatible switch.
???Failover ??? provides recovery from a failure, so if one NIC should fail, your system still has network connectivity with the other NIC.
6.To connect your
7.Click Apply to save your settings.
8.If a DHCP server is unavailable for a network interface card (NIC), the device could
9.You can change the following settings in the Information section:
???IP Address ??? the static IP address of the
???Subnet Mask ??? the subnet that the IP address belongs to. The default value is 255.255.255.0.
???Gateway ??? enter the gateway IP address in this field.
10.Click Apply to save your settings.
Connecting
7
the
Setting up Your
VLAN: For information on adding a NIC to a VLAN (Virtual LAN), refer to VLAN Settings.
Bonding NICs: For information on bonding multiple network interface cards (NICs), refer to Bonding NICs.
Bonding NICs
Bonding network interface cards (NICs) is a way to provide redundancy for your
You can bond two or more network interface cards (NICs) in your
Use the following procedure to bond NICs.
1.On the Network page, expand the NIC number and then expand the Bond Network Interface section.
2.Check the checkboxes next to the NICs that you want to bond to the selected NIC. For example, if you selected NIC 1, and your configuration includes four NICs, you could bond NIC 1 to NIC 2, 3, and/or 4.
3.Click Apply to save your settings.
4.The section updates and displays the NICs that are bonded to the selected NIC.
Unbonding NICs
1.To unbond a NIC, uncheck the box next to the bonded NIC.
2.Click Apply to save your settings.
VLAN Settings
A VLAN (Virtual Local Area Network) is a network of devices that are joined into one broadcast domain, even if the devices are not physically connected to each other. VLANs are useful for creating smaller networks within a larger LAN; for example, a legal department in a company might be on its own VLAN because it has sensitive documents that only certain personnel should have access to. The smaller networks that VLANs create do not require any additional physical resources, such as additional cabling. Your
VLAN is configured for each NIC, but it is not supported on bonded NICs. If a NIC is bonded, you must unbind it first to configure it for a VLAN.
Adding a VLAN
1.To add a VLAN, expand the VLAN Settings section of a NIC.
2.Click Add VLAN.
3.Enter a VLAN ID value between 2 and 4094. You can enter up to 4 VLAN IDs for each NIC. A VLAN can obtain its network settings from DHCP, or you can uncheck DHCP and enter the IP address, subnet mask, and gateway manually.
4.Refer to Network Settings on page 6 for information about jumbo frames.
8
Connecting the
Setting up Your
5.Click Apply to save your changes.
Deleting a VLAN
In the VLAN Settings section click Delete to delete the VLAN.
Connecting
9
the
Setting up Your
Naming Your
You can provide a meaningful name for your
Change any of these by editing the text fields. Click Apply to save your changes.
???Device Name: Enter a name for the
???Device Descriptive Name: Enter a descriptive name for the
???Workgroup Name: Enter a workgroup name for the
Renaming the
Setting up Active Directory
If your
10 Naming Your
Setting up Your
Configuring Your
If you have an existing Active Directory user organization, you can incorporate it into the ix4300d Management Console. Your
When you configure Active Directory, you enable security on your
1.To configure Active Directory, manually add the
2.Configure the
3.Provide the following connectivity information:
???Domain Name ??? the actual name of your Active Directory domain, for example, sohoad.com.
???Preferred Server ??? the actual name or IP address of your Active Directory Server, for example,
???Netbios Name ??? An optional value that is automatically set to the first part of the Domain Name. For example, if you Domain Name is testdomain.emc.com, the Netbios Name is testdomain. You can edit this name or leave it blank.
???Organizational Unit ??? an optional predefined subset of directory objects within an Active Directory domain.
???Administrator Username ??? the Active Directory username with domain administrator privilege.
???Administrator Password ??? the Active Directory password for the specified Active Directory username.
???Users/Groups Refresh Interval ??? how often the
???Local Network Encryption (SSL) ??? enforces encryption on your local network.
???Remote Network Encryption (SSL) ??? enforces encryption outside your local network, such as through the internet. Choices for both encryption types are Not required and Always (encryption is always enforced). Always encrypting communication is safest, but can impact performance.
???Enable trusted domains ??? enables your
4.Click Apply to save your settings.
Setting up Your
Enabling Active Directory Trusted Domains
By enabling Active Directory trusted domains on your
Now that you have enabled access to all trusted domains, you can add users and groups from those trusted domains to your
12 Configuring Your
Setting up Your
Customizing the Access to Features on Your
An administrator user can customize the look of the ix4300d Management Console using Feature Selection (FS). Using FS, an admin can enable the display of certain features and disable others. In addition, an admin can provide
Access permission to a feature can be given only to
Enabling the Display of Features
1.Open the Feature Selection page.
All the features of your
2.To enable a feature, expand the desired feature name, and click the switch to On. For example, to enable Amazon S3, expand the Amazon S3 feature, and click the switch to On.
3.To disable a feature, click the switch to Off.
You can set the display of applications on the Feature Selection page, provided an application has that capability. For more information on installing features, refer to the Application Manager.
Enabling Access Permissions to Features
You can configure access permissions for
1.If not already enabled, enable security on your
2.Open the Feature Selection page.
3.To enable access to an enabled feature, expand the desired feature name, and click Add access permissions.
4.In the
5.Click Apply to save your changes.
The list of users with access is displayed under the feature. To remove user access, uncheck the access box next to the user, and click Apply to save your changes.
You can enable access permissions for applications on the Feature Selection page, provided an application has that capability. For more information on installing features, refer to the Application Manager.
Setting up Your
14 Customizing the Access to Features on Your
Setting up Your
Obtaining Alerts About Your
You can configure your
???Destination Email Addresses ??? enter a valid email address or addresses. This email address provides a destination for messages sent by the
???Check Send a test email message to confirm that email notification is working properly.
???Check Configure custom SMTP settings only if your network blocks SMTP traffic, requiring additional credentials, such as a corporate firewall.
Most users will not need to check this option. If checked, enter the following additional information to identify your SMTP server:
???Email Server (SMTP) ??? enter the address of your SMTP server.
???Sender Email Address ??? enter an email address for the
???Email Login ??? enter the username used to log into the email account you entered above.
???Email Password ??? enter the password for the email account.
???Confirm Password ??? confirm the password for the email account. It must match the password provided above.
If your email application uses a SPAM blocker, it is recommended that you add a sender email address to your safe list. If you do not define additional credentials, the default sender email is: sohostorage@emc.com
Click Apply to save your changes.
Setting up Your
Tracing Events on Your
The Event Log page displays only the 1000 most recent events logged to the
The following icons indicate the severity of each status message:
???INFORMATION
Identifies that a change has been made to the state of your
???WARNING
Identifies that there is a problem with your
???ERROR
Identifies an urgent problem with your
You can sort the displayed list by Date, User, or Event by clicking the column headers.
Downloading the complete event log file
Click Download to download a
The downloaded file contains 5 columns: Number, Date, User, Severity, Message.
16 Tracing Events on Your
Setting up Your
Obtaining System Status for Your
The System Status page displays space usage information and status information about your
???Blink the lights
???Restart
???Shut down
Space Usage
The Space Usage section graphically represents the amount of space used by Shares on the
Control Panel
The Control Panel displays commands for the
???Blink the lights
To help identify a specific
???Restart
Restart the
???Shut down
Shut down the
Before shutting down the
Device Information
The Device Information section displays various hardware, software, and status details.
Status
The Status Information section displays changes to or issues with your
The following types of messages can display:
Setting up Your
Using Your
You can set the date and time used on your
When an Active Directory Domain is in use, the storage device synchronizes time with the domain controller.
1.To change time zones, select a Time Zone from the
???Internet Time Server ??? By default, Automatically synchronize with an internet time server and Use the default time server are selected. To specify a time server, select Specify the time server and type the URL of the internet time server you wish to use in the text box that displays.
???Manual ??? Select Manually set date and time. To set the current date and time, click the appropriate icon for calendar and clock settings.
2.Click Apply to save your changes.
18 Using Your
Setting up Your
Setting the Display Language for Your
You can set the display language for your
The Languages page allows you to change the language used in email notification messages and on the display screen.
The language used by the ix4300d Management Console is based on the preferences configured in your browser. You can change the language used in this program by modifying your browser's preferred language settings.
Click Apply to save your changes.
Setting up Your
Printing Documents
Printing documents from your
To attach a printer, simply plug a supported printer's USB cable to a USB port on the
For best results, use a printer without
20 Printing Documents
Setting up Your
Setting up Personal Cloud, Security, and File Sharing
After you have configured some basic features of your
You can set up a Personal Cloud to allow invited users access to content on your
You can enable security so you can secure Shares, create users, and allow selected features to be enabled. With security enabled, you can create users and set access privileges for those users to limit data access on secured Shares. For more information on security, refer to What Is Security and Do I Need It?
It is recommended to set up file sharing so that content can be added to your
CHAPTER 2
Sharing Files
Sharing Files
Sharing Overview
Your
File sharing is accomplished by creating Shares; setting up security, which includes creating users; setting up media services; and configuring Active Folders.
Interfaces for Sharing
Your
???ix4300d Management Console
You manage the creation of Shares through the ix4300d Management Console.
???LenovoEMC Storage Manager
Optionally installed on your local computer, LenovoEMC Storage Manager discovers any
???Home Page
The Home page serves as a
name or IP address directly in your browser. If security is enabled and you are an administrator user, you can access the ix4300d Management Console from the Home page by clicking .
23 Sharing Overview
Sharing Files
Shares
What are Shares and How Do I Organize Content with Them?
Shares are folders that contain all types of content, including documents, pictures, and music files. Shares can be unsecured, which means that anyone who has access to your network can access the content in these Shares. Shares can also be secured, which means access to content in them is limited to select users and groups.
All Shares on the
Share Information
The Information section displays the Share name, graphically displays the space usage of the Share, and allows you to view the content using the
To view the content of a Share, click View Content to open the Content Viewer.
To learn how to modify your Share information, refer to Managing Shares on next page.
Access Permissions
The Access Permissions section contains a list of users who currently have access to that Share. Access Permissions displays when the
To learn how to modify Access Permissions on a Share, refer to Managing Shares on next page.
Active Folders
Follow the link to the Active Folder options for information on configuring each:
???Flickr
???Photo Resize
???Torrents
???YouTube
Adding Shares
1.From the ix4300d Management Console, click Shares.
2.To add a new Share, click Add a Share. Type a name for the Share. All Shares must have a name. Names cannot exceed 32 characters. The following are not valid Share names: global, homes, printers.
3.Click Create. To modify an existing Share, click the Share row to expand the Share.
Shares 24
Sharing Files
Managing Shares
You can change Share information, change access permissions, make a Share an Active Folder, use Share volumes, and modify a Share volume.
If available, you can also enable NFS secured access.
Changing Share Information
1.Modify the existing name for the Share.
2.Choose whether to enable media sharing. When Media sharing is enabled, the media server scans this Share for any media content and makes it available to anyone with access to your network,
even if this Share is secured. If you do not want media content made available to anyone, do not check this option. When Media sharing search is enabled, displays in the Properties for that Share.
3.To view the content of a Share, click the View Content link to open the Content Viewer.
4.Click Apply to save your changes.
Changing Access Permissions
You should enable security on your
1.Expand Access Permissions to change user permissions to a Share. If your
secured by default, so they will be accessible only by administrator users unless additional access permissions are set. A security icon displays in the Share's properties if that Share is secured.
2.Check Allow users to change file level security to allow file and folder permissions to be set through other programs, such as Windows Explorer, independent of the
3.To limit access to this Share to a specific set of users, click Add access permissions and choose one or more users from the
4.In the Access Permissions section, check Read, Write, or both to set access to this Share for each user. To remove a user, leave both Read and Write unchecked for that user. If you grant Read and Write permissions to Everyone, the list of users is also cleared since all users will have access to this Share. If you have created groups, you can also limit access for them in this way.
5.Click Apply to save your changes.
25 Shares
Sharing Files
Enabling NFS Secured Access
1.To enable NFS, first click the switch on from the Protocols page.
2.On the Shares page, select a secure Share and expand the NFS section. You cannot apply a rule to an unsecured Share.
3.Click Add an NFS rule to add a Host Name for the rule. Rules are added to specify the hosts that are allowed to access Shares using NFS. Use this table to add NFS rules to specify access for hosts. For example, *.cs.foo.com matches all hosts in the domain cs.foo.com. To export a Share to all hosts on an IP address or local network simultaneously, specify an IP address and netmask pair as address/netmask where the netmask can be in
4.When the rule is added, read access is automatically set to the Share. Select Write to allow users to write to that Share. Use and to modify the rule priority for NFS access.
5.Click Apply to save your changes.
Making a Share an Active Folder
1.You can optionally enable Active Folders on a Share to allow you to associate this Share with a specific feature that will happen automatically when files are copied to the Share. For example, you can enable a Share as a social media active folder to upload a file to a social media site. Refer to Sharing Content with Social Media Overview. You can only set one Active Folder option per Share.
2.Expand the Active Folder section and check Enable. Select one of the following Active Folder options and follow the link for details on configuring each:
???Flickr
???Photo Resize
???Torrents
???YouTube
3.Click Apply to save your changes.
Deleting Shares
To delete a Share:
1.From the ix4300d Management Console, click Shares.
2.To delete an existing Share, click to expand the Share.
3.In the Information section, click Delete to delete the Share.
4.In the Delete Share confirmation
5.If you do not wish to delete the Share, click Cancel to return to the Shares page.
Shares 26
Sharing Files
Using Protocols to Share Files
What Are Protocols and How Do I Use Them to Share Files?
Your
The
???Apple Filing Protocol / Time Machine
???Bluetooth
???FTP
???TFTP
???NFS
???rsync
???SNMP
???WebDAV
???Windows DFS
AFP File Sharing for Macs
The Apple Filing Protocol (AFP) enables Apple file sharing, which is the preferred method for Mac users to access Shares. When AFP is enabled, you can use Time Machine to back up a Mac client computer to your
AFP is on by default. If AFP has been disabled, click the switch on to
Bluetooth File Sharing
Once a Bluetooth adapter is detected, files can be uploaded from a Bluetooth device to a configurable destination Share on the
Configuring Bluetooth settings
1.To enable Bluetooth, click the switch on.
2.Once Bluetooth Transfer is enabled, check the Enable security checkbox to require Bluetooth users to supply a unique PIN that they have defined before allowing them to transfer files to the destination Share on the
If you have enabled security, you must define a unique PIN number, which will be supplied by devices attempting to upload data using Bluetooth.
3.To set the destination Share, click .
4.Click Apply to save your settings.
27 Using Protocols to Share Files
Sharing Files
To change any Bluetooth settings, click .
FTP File Sharing
On the Protocols page, click the switch to turn on FTP (File Transfer Protocol) and allow access to your
Click to select either FTP or secure FTP (SFTP) or both. You must enable security to apply SFTP. If you select and enable SFTP, you cannot have the secure rsync protocol enabled.
When you turn on FTP, you can send files to your
NFS File Sharing
On the Protocols page, click the switch to turn on NFS (Network File System). This protocol allows remote hosts to mount file systems over a network and interact with them as though they were mounted locally to your
Select an option to choose how users on client computers are mapped to the
Set the squashing options for NFS:
???To have all users, including root, map as guest, select Treat client users as guest (all_ squash). All files are owned by user guest, and all users accessing the
???To have all users map as themselves but root maps as guest, select Allow full access for client users other than root (root_squash).
???To have all users map as themselves, including root, select Allow all client users full access.
If the
???System security - This uses Linux system security.
???Kerberos security - Kerberos is a protocol that uses secret key cryptography for authentication between client and server applications.
???All - Combines system security and Kerberos security.
Once enabled, add NFS access rules for each secure Share from the Managing Shares page. NFS provides another protocol for sharing storage data with Linux hosts. When NFS is enabled, you can configure rules for
Rules can be added to secure Shares to specify the hosts that are allowed to access Shares using NFS. For example, *.cs.foo.com matches all hosts in the domain cs.foo.com. To export a Share to all hosts on an IP address or local network simultaneously, specify an IP address and netmask pair as address/netmask where the netmask can be in
To change any NFS settings, click .
Sharing Files
Access to Shares through NFS and User Permissions
When you access your
rsync: Synchronizing Files with Another Storage Device or Other Computers
When you turn on this protocol, you can enable the
If you enable the
Configuring rsync server settings
1.To enable rsync server, click the switch on.
2.To create a secure user account, check Configure secure rsync credentials.
3.The username is preset as rsync. You can change this to a more meaningful user account name. Enter a password and confirm it for the rsync user account name. When you create a secure rsync user account on the
4.By default, rsync uses TCP port 873 for accepting requests. You can change this value to a different port number, if desired.
5.Click Apply to save your settings.
To change any rsync server settings, click . You cannot enable rsync server if you have already enabled SFTP.
TFTP
On the Protocols page, click the switch to turn on TFTP (Trivial File Transfer Protocol) and allow access to your
Monitoring Your Device with an SNMP Management Tool
SNMP (Simple Network Management Protocol) provides information about the state of the
SNMP should be disabled unless you are specifically providing information to a management system that requires this information.
Configuring SNMP settings
1.To enable SNMP, click the switch on.
29 Using Protocols to Share Files
Sharing Files
2.Enter a unique username and password to define the community.
3.Confirm your password.
4.Enter the IP address of the host in the Trap Receivers text box. To grant access to multiple receivers, list all of them in the text box, separating each entry with a space.
5.Click Apply to save your settings.
To change any SNMP settings, click .
SNMP Traps
A
Traps include:
???A drive may have either failed or been removed
???Multiple drives may have either failed or been removed
???The device encountered a file system corruption
SNMP MIB File for the
The management information base (MIB) file is a database of various device object types, which a manager can change. Examples of MIB objects are:
deviceName ??? the name of the LenovoEMC storage device
diskName ??? the name of drives on the LenovoEMC storage device
conTable ??? a table for the connected client count
raidStatus ??? a description of the RAID status. Values are Normal, Rebuilding, Degraded, RebuildFS, and Faulted.
The MIB file is available for downloading by entering the following URL in your browser:
http://<devicename>/manage/mibs/lenovoemcmib.txt
Managing File Sharing with Web Access (http/https)
The Web Access protocol enables or disables the link to the Content Viewer from the Shares page. When the Content Viewer is disabled, you cannot browse any Share content.
If you disable the Web Access protocol, you also disable the display of the home page on your
WebDAV: Managing Files Using HTTP or HTTPS
WebDAV
Sharing Files
If your
Configuring WebDAV settings
1.To enable WebDAV, click the switch on.
2.To enable WebDAV for HTTP, check Enable WebDAV Over HTTP.
3.To enable WebDAV for HTTPS, check Enable WebDAV Over HTTPS.
4.Click Apply to save your settings.
Windows DFS: Creating a Distributed Windows File System
Windows DFS (Distributed File System) organizes Shares and files on a network, such that they appear to be all in one directory tree on a single
Windows DFS terms
There are several terms to understand with Windows DFS.
???Namespace: A virtual Share containing other folders that are located on different devices throughout a network.
???DFS root: An object that consolidates all the folders in your network and makes them available through a single entry point. An example of a DFS root is \\DeviceName\DFSRootName.
???DFS link: A folder under the DFS root.
Configuring Windows DFS settings
To enable Windows DFS, click the switch on.
1.Enter a DFS root name. The DFS root name is the starting point of a DFS namespace. After entering a DFS root name, you add DFS links, which map to folders on other devices.
2.Click Click to add a DFS link target to begin adding DFS links.
3.Enter the DFS link name, which includes the name of the host and Share to which you are linking.
4.Click Apply to save your settings, or click Cancel to discard your changes.
Windows File Sharing
Windows File Sharing allows you to work in Workgroup mode, using ix4300d Management Console to create users and manage access. To enable Windows File Sharing, click the switch on.
31 Using Protocols to Share Files
Sharing Files
Sharing Content through the Home Page
Sharing Your Content with the World
When you set up the Home Page of your
You can manage the look of the Home Page by using the Home Page Settings page. This page allows you to display the slideshow, display unsecured Shares, name the Home Page, and turn the Home Page on or off.
1.From the ix4300d Management Console, click Home Page Settings.
2.Click the slider switch to On to enable the Home Page on your
3.Select Default home page settings.
4.Enter a title for the Home Page. This title displays in the top banner of the Home Page when users access the
5.Check Display Shares to display unsecured Shares. When you select to display Shares, the user sees all unsecured Shares on the
6.Check Display slideshows to display picture slideshows that are in folders on the
7.Click Apply to save your changes, or click Cancel to discard your changes.
Deleting a Slideshow
To delete a slideshow from the list of available slideshows, click . After you delete a slideshow, you can configure a different one.
Custom Home Page Content
For information on custom home page content, refer to Adding a Custom Home Page below
Adding a Custom Home Page
You can customize the look of the home page of your
You add your custom html content to a Share on your
Applying the Customized Home Page
1.Click the Home Page Settings feature from the ix4300d Management Console.
2.On the Home Page Settings page, select Customized home page settings.
3.In the Home Page Name field, enter the name of the start page of your custom home page. By default, the name is index.html.
Sharing Content through the Home Page 32
Sharing Files
4.Specify the destination Share where the start page and your html content exists on your
You cannot access the destination Share through the WebDAV interface. Access through WebDAV is permanently disabled.
5.Select the Share name and click Apply.
6.Click Apply to save your settings.
When you apply a custom home page for your
IP address/manage/management.html
33 Sharing Content through the Home Page
Sharing Files
Automatically Sending Content to Multiple People at Once
You can send content to multiple people at once using an email distribution active folder. You can configure a Share as an Email Active Folder so that when you add files to that Share, they are automatically sent to the recipients on the email distribution list. To configure a Share as an Email Active Folder, access Shares from the ix4300d Management Console, select or create a Share, and expand the Active Folders section to enable and configure email distribution.
How to Set Up an Email Distribution Active Folder
Email Distribution lets you email your files to friends and family right from your ix4300d Management Console. Use Email Distribution to share files with an email list. To prevent email distribution list spamming, the
Refer to Managing Shares on page 25 for more information on managing Shares and Active Folders.
Configuring an Email Distribution Active Folder
1.From the ix4300d Management Console, click Shares.
2.Select a Share to use as an Email Distribution Active Folder, and click to expand the Active Folder section.
3.Check Enable.
4.Select Email Distribution from the
5.Include an email address in the Sender Email Address text box. Distribution is sent from this email address.
6.You can add multiple email addresses in the Email To: text box by separating them with commas, spaces, or semicolons.
7.Add a subject and email message for your recipients.
8.Check Send the file as an attachment, Send a link to the file, or both.
9.Click Apply to save your changes.
10.Once configured, all files in this Share are sent by email to your recipients. Click View Transfer History to see the transfer activity from this Share to your account.
Sharing Files
Sharing Content Using Social Media: Overview
If you have an account with social media services such as Facebook, Flickr, or YouTube, you can share content on your
If you have configured a Personal Cloud on your
Note that an Active Folder can only be associated with one social media account. For example, if you want Active Folders for your Facebook and YouTube accounts, create two Active Folders, and assign one Active Folder to Facebook, and one to YouTube. Using this example, any photos you add to your Facebook Active Folder are automatically uploaded to your Facebook page, and any movies you add to your YouTube Active Folder are automatically uploaded to your YouTube page. Not only is this a fast and easy way to share content, but uploading content to your social media sites provides an additional backup of your content, as the content is stored both on your
35 Sharing Content Using Social Media: Overview
Sharing Files
Managing Your Content
You manage content on your
The Content Viewer is divided into two panes. The left pane lists the Shares on the
To delete multiple files simultaneously, hold the Ctrl key on your keyboard and select each file, or drag your mouse over the filenames. Share content can be sorted, and you can switch between a list view and a thumbnail view of the files. When you are looking at content in a list view and you hover your mouse over an image, a thumbnail view of the image displays next to your mouse. If all the content cannot fit on one page, there are pagination controls that allow you to continue browsing the content.
Sharing Files
Transferring Content to and from Your
You can transfer content to and from your
While a Copy Job copies all data from one NAS device to another, it does not copy permissions or access rights from one NAS device to another.
All saved Copy Jobs display on the Copy Jobs page. From there, you can manually start and stop a Copy Job, view Copy Job information, modify a Copy Job, check its last run status, and, if applicable, view when the Copy Job is next scheduled to run.
When defining a Copy Job, you can copy data from or to any of the following:
???Any NAS device automatically discovered on the same subnet as your
???Any NAS device that you manually add to the subnet using the LenovoEMC Storage Manager
???Any external storage device, such as a USB device, connected to your
???A Windows computer that is automatically discovered on the same subnet as your
When selecting what data to copy on the source storage device, you can choose a specific folder or all folders. You can also copy from a folder on an external storage device mounted to your
When selecting the destination device, you can copy files to the
You can manually start or stop a Copy Job by clicking start or stop buttons on the Copy Jobs page. You can schedule a Copy Job to run automatically at a set day and time.
Copy Jobs Limitations
???Copy Jobs does not establish a continuous replication or mirroring relationship between the source and destination devices. You should not set up Copy Jobs for disaster recovery.
???Copy Jobs does not support transferring content from iSCSI drives.
37 Transferring Content to and from Your
Sharing Files
Getting Content from a USB External Storage Device
You can transfer content to your
Safely removing external storage
Click to safely remove the external storage. A confirmation dialog will display. Click Yes to remove the external storage. When the external storage has been removed from the External Storage table, it is safe to remove, and you may unplug it from the
Sharing Files
One touch transfer of content is created on the QuikTransfer page. On the QuikTransfer page, you can set the default destination Share for any automatically created QuikTransfer Copy Jobs.
QuikTransfer automatically copies all files from any USB external storage device plugged into your ix4- 300d Network Storageto the destination Share when the QuikTransfer button is pressed.
Setting QuikTransfer
1.Select a destination folder for the default QuikTransfer Copy Job by clicking and selecting a folder in the file browser. The file browser provides a way to select a Share and all its folders, or just some of the folders under a Share.
2.Click Apply to save your setting.
39
CHAPTER 3
iSCSI: Creating
Area Networks (SAN)
iSCSI: Creating
iSCSI Overview
The iSCSI page allows you to create iSCSI drives on your
Only one client computer can connect to an iSCSI drive at a time, so iSCSI drives are not for shared data. If your business is clustering clients, then a cluster can access iSCSI drives. Also, you must create a list of users who can access an iSCSI drive. These are not users who have access to other features on your
41 iSCSI Overview
iSCSI: Creating
Adding iSCSI Drives
To add an iSCSI drive:
1.From the ix4300d Management Console, click iSCSI.
2.When the iSCSI page opens, click the switch to enable the feature.
3.Click Add an iSCSI drive.
4.Enter a name for the iSCSI drive.
5.Enter a size for the iSCSI drive. The size must be smaller than the free space available on your
6.Click Create to create the iSCSI drive.
Enabling iSCSI Drives
1.Click Settings to begin configuring an iSCSI drive.
2.To set the discovery of the iSCSI drive using iSNS, check Enable discovery with iSNS.
3.Choose one of the following options:
???Use local iSNS server ??? the device acts as an iSNS server for the iSCSI drives.
???Use external iSNS server ??? you supply the IP address or host name of the external iSNS server for the iSCSI drives.
4.To enable the Challenge Handshake Authentication Protocol (CHAP), check Enable
5.Enter an initiator secret (password) for Device Secret and then enter it again in the confirm box.
6.Click Apply to save your changes.
Connecting to iSCSI Drives
You can connect iSCSI drives on your
Attempting to connect two iSCSI initiators to the same iSCSI drive at the same time may result in data corruption or drive damage. The ix4300d Management Console prevents you from connecting two iSCSI initiators to the same iSCSI drive at the same time, but if you connect to an iSCSI drive using native tools, you may encounter this issue. You can use the Connected Clients section to view a list of client computers connected to your
iSCSI: Creating
Managing iSCSI Drives
Adding CHAP User Access to an iSCSI Drive
After you add an iSCSI drive, you create a list of CHAP users that have access to an iSCSI drive. These users are independent from the users you create on your
iSCSI drive.
1.On the iSCSI page, expand an iSCSI drive, and expand iSCSI CHAP Users to add user access to an iSCSI drive.
2.Click Add a CHAP user and enter a CHAP username and password.
3.Click Create. Continue adding as many users as needed to access the drive.
4.To delete a user, expand the user section and click Delete.
43 Managing iSCSI Drives
iSCSI: Creating
Deleting iSCSI Drives
To delete an iSCSI drive:
1.From the ix4300d Management Console, click iSCSI.
2.Click the iSCSI name to expand the iSCSI drive.
3.In the iSCSI Information section, click Delete to delete the iSCSI drive.
4.Click Yes in the confirmation
5.If you do not wish to delete the iSCSI drive, click Cancel to return to the iSCSI page.
CHAPTER 4
Drive Management
Drive Management 45
Drive Management
Managing Drives
The Drive Management page provides settings for managing storage and lets you apply global settings for drives on your
Setting Write Caching
Select a value for disk write caching.
Write caching is a mechanism that attempts to separate the fast processing speed of the
With write caching disabled, every write to drive causes the
While write caching does improve performance, there are some risks. The system responds that the data is written to drive when in fact it has only been written to cache. Should the
This is because cache memory is volatile. If you lose power, the contents of the cache are lost. Therefore, if there were any pending writes in the cache that were not written to the drive, they will be lost forever. Using a UPS (Uninterrupted Power Supply) can mitigate the risk associated with write caching, which is why it is recommended to only enable this feature when a UPS is connected.
Applying Global Drive Management Settings
1.Click Settings.
2.To change the protection, choose a value from the
???Mirror (RAID 1)
Uses half of the storage space for protection, leaving half for actual data.
???Mirror Stripe (RAID 10)
Uses half of the storage space for protection, leaving half for actual data.
???Parity (RAID 5)
Uses the space corresponding to one
???Striped (RAID 0)
Distributes data across several drives in a way that gives improved speed at any given instant.
???None
Turns off data protection and leaves your data vulnerable to data loss.
3.Select a value for disk write caching.
4.Check Enable periodic consistency check to enable a monthly parity or mirror consistency check. The check helps to prevent a single drive failure from becoming a
5.Click Apply to save your changes.
46 Managing Drives
Drive Management
Drive Status
An image on the Drive Management page provides information on the drive status of your
CHAPTER 5
Backing up and Restoring Your Content
Backing up and Restoring Your Content
Backup and Restore Overview
Your
To back up content to and restore content from your
???Time Machine
???Copy Jobs
To back up and restore your
???Copy Jobs
???Avamar
???Amazon S3
???LenovoEMC Personal Cloud features
Backup of Data through RAID Protection
The drives in your
While RAID technology provides fault tolerance, it is not a true backup. It is strongly recommended to always have another copy of your data that is not stored on the
For more information, refer to Understanding How Your Content Is Stored.
49 Backup and Restore Overview
Backing up and Restoring Your Content
Backing up to and Restoring from Your
Backing up Macs with Time Machine
You can use Time Machine to back up a Mac client computer to the
1.Connect your Mac to your
2.Mount the Backup Share from the
If you want to create a new Share for Time Machine backups, you can do so using the ix4300d Management Console. Mount the Share you want to use before proceeding to the next step.
3.Select System Preferences... from the Apple Menu.
4.Select Time Machine (listed under System).
5.Click ON to enable Time Machine.
6.From the list of available drives, choose the desired Share on your
7.Time Machine will automatically create the sparsebundle image under the selected Share and begin backing up your computer to your network storage device. After the initial backup, Time Machine backs up files every hour.
Time Machine uses a single destination drive for backups. If you have previously set up another drive for Time Machine backups and want to change to use the
One touch transfer of content is created on the QuikTransfer page. On the QuikTransfer page, you can set the default destination Share for any automatically created QuikTransfer Copy Jobs.
QuikTransfer automatically copies all files from any USB external storage device plugged into your ix4- 300d Network Storageto the destination Share when the QuikTransfer button is pressed.
Setting QuikTransfer
1.Select a destination folder for the default QuikTransfer Copy Job by clicking and selecting a folder in the file browser. The file browser provides a way to select a Share and all its folders, or just some of the folders under a Share.
2.Click Apply to save your setting.
Backing up and Restoring Your Content
Copy Jobs Overview
You can back up content to and from your
For more information, refer to Backing up Your
51 Backing up to and Restoring from Your
Backing up and Restoring Your Content
Backing up Your
Copy Jobs
Transferring Content to and from Your
You can transfer content to and from your
While a Copy Job copies all data from one NAS device to another, it does not copy permissions or access rights from one NAS device to another.
All saved Copy Jobs display on the Copy Jobs page. From there, you can manually start and stop a Copy Job, view Copy Job information, modify a Copy Job, check its last run status, and, if applicable, view when the Copy Job is next scheduled to run.
When defining a Copy Job, you can copy data from or to any of the following:
???Any NAS device automatically discovered on the same subnet as your
???Any NAS device that you manually add to the subnet using the LenovoEMC Storage Manager
???Any external storage device, such as a USB device, connected to your
???A Windows computer that is automatically discovered on the same subnet as your
When selecting what data to copy on the source storage device, you can choose a specific folder or all folders. You can also copy from a folder on an external storage device mounted to your
When selecting the destination device, you can copy files to the
You can manually start or stop a Copy Job by clicking start or stop buttons on the Copy Jobs page. You can schedule a Copy Job to run automatically at a set day and time.
Copy Jobs Limitations
???Copy Jobs does not establish a continuous replication or mirroring relationship between the source and destination devices. You should not set up Copy Jobs for disaster recovery.
???Copy Jobs does not support transferring content from iSCSI drives.
Adding Copy Jobs
The page describes how to:
Backing up and Restoring Your Content
Adding Copy Jobs
1.On the Copy Jobs page, click . A Copy Job is added to the top of the list and the Information section displays.
2.Enter a name for the Copy Job.
3.The Overwrite Setting determines what happens to files in the destination location if they have the same name as those in the source location. Select one of the following values from the Overwrite Setting
???Overwrite and don't delete ??? Files in the destination location are overwritten with files from the source location. Any files in the destination location that are not in the source location are preserved.
???Overwrite and delete ??? Files in the destination location are overwritten with files from the source location. Any files in the destination location that are not in the source location are deleted. The destination location becomes an exact copy of the source location.
???Don't overwrite ??? Only files in the source location that are not in the destination location are copied. No files are overwritten in the destination location.
From: Settings
1.In the From: section, click to select a source location. This is the location of the files you want to copy. In the dialog, enter the Device Name or IP address in the text box, or select a device from the list. If a connected device is not listed, click the Refresh button.
2.Click OK to save your selection or click Cancel.
3.The Protocol
???Windows File Sharing ??? The default value in the menu is Windows File Sharing and in most cases you should accept the default value. For more information, refer to Windows File Sharing on page 31.
???rsync ??? The rsync protocol can provide faster copying, but may not be available on all devices. If you are able to select the rsync protocol, and you want the rsync Copy Job to be secure, select the Use secure rsync (SSH) option. Enter the rsync username and password for the rsync server to or from which you are copying. The rsync username and password is set up on a different device than the device on which you are creating the Copy Job. For more information on creating an rsync user, refer to rsync: Synchronizing Files with Another Storage Device or Other Computers on page 29.
4.Enter a valid username and password, if applicable, for the device to provide access to its folders.
5.To select a specific folder, click to select a source location for the What to copy: section. In the Copy dialog box, select all Shares or a folder, and select one of the following options for the Copy Job from the
???The selected folder and its contents ??? copies the selected folder and its contents. If the destination is a folder, a new folder will be created for each source folder. If the destination is Top Level, a new
53 Backing up Your
Backing up and Restoring Your Content
???Only the contents of the selected folder ??? copies the contents of the selected folder; not the folder itself. If the destination is a folder, the files and folders in the selected folder are copied directly to it (the source folder name is not copied). If the destination is Top Level, a new
6.By selecting Shares, you choose to copy All Shares, in which all files on the
7.Click OK to save your selection or click Cancel.
8.Click Apply to save your changes.
To: Settings
1.In the To: section, click to select a destination location. This is the location where you want your files copied. In the dialog, enter the Device Name or IP address in the text box. Or, from the
2.Click OK to save your selection or click Cancel.
3.The Protocol
???Windows File Sharing ??? The default value in the menu is Windows File Sharing and in most cases you should accept the default value. For more information, refer to Windows File Sharing on page 31.
???rsync ??? The rsync protocol can provide faster copying but, may not be available on all devices. If you are able to select the rsync protocol, and you want the rsync Copy Job to be secure, select the Use secure rsync (SSH) option. Enter the rsync username and password for the rsync server you are copying from or to. The rsync username and password is set up on a different device than the device on which you are creating the Copy Job. For more information on creating an rsync user, refer to rsync: Synchronizing Files with Another Storage Device or Other Computers on page 29.
4.Enter a valid username and password, if applicable, for the device to provide access to its folders.
5.To select a specific folder, click to select a destination location for the Copy to here: section. In the Copy to here dialog, select a Share or a folder from a Share to copy your files.
6.Click OK to save your selection or click Cancel.
7.Click Apply to save your changes.
Setting a Schedule
1.To set a schedule, expand the Schedule section.
2.In the Schedule section, select Enable Schedule for Copy Job.
3.Select the days you want the Copy Job to run, or select All Days to run the Copy Job every day.
4.Click to select a start time. Click Done to save your time selection.
5.Click Apply to save your changes. The new Copy Job displays on the Copy Jobs page.
Backing up and Restoring Your Content
Managing Copy Jobs
From the Copy Jobs page, you can add, start, stop, delete, or monitor Copy Jobs.
After you have added Copy Jobs, the Copy Jobs page displays a list of Copy Jobs. The information section includes the name of each Copy Job, date and time it last ran, and its next scheduled time.
From the Copy Jobs list, you can perform the following actions:
Modifying Copy Jobs
1.In the list on the Copy Jobs page, find the Copy Job you want to modify, and click it to expand the
Information section.
2.Refer to From: Settings on page 53 for information about revising the Copy Job fields.
Deleting Copy Jobs
1.In the list on the Copy Jobs page, find the Copy Job you want to delete.
2.Click from the Actions column of the table to delete the Copy Job. The Delete Copy Job
3.If you are sure that you want to delete the Copy Job, click Yes.
If you do not wish to delete the Copy Job, click Cancel to return to the Copy Jobs page.
Restoring Files with Copy Jobs
To restore files with Copy Jobs, create a new Copy Job that reverses the
Refer to From: Settings on page 53 for detailed information on Copy Job settings.
Backing up with Mozy Backup
The Mozy online backup service allows you to create a Mozy account, connect your
Enabling Mozy Account Information
1.On the Mozy Backup page, click the switch on.
Note: If you do not have a Mozy account, click the link to open an account.
2.Enter a valid email address, password, license key, and country for your Mozy account.
3.To upgrade your Mozy account, click the link.
4.Click Apply to save your changes.
Selecting Folders to Back Up
5.Expand the Backup section and select the Shares and folders to back up in the tree. The tree provides a way to select a Share and all its folders, or just some of the folders under a Share.
6.Click Apply to save your changes.
7.To create a scheduled backup, click Backup schedule settings.
55 Backing up Your
Backing up and Restoring Your Content
8.In the Mozy Backup Settings dialog box, select one of the following:
???Automatic Backup ??? to generate an automatic backup anytime you add a new file or change an existing file to your selected Shares or folders.
???Scheduled Backup ??? to set up a scheduled backup.
9.If you are creating a scheduled backup, select the days you want the backup to run.
???Enter the start or stop times for the backup, or click to select the times.
???To prevent performance degradation on your
???To schedule the time that the backup will run at the selected speed, enter start and stop times.
10.Click Apply to save your changes.
11.Click Apply to save the selected Shares and folders to back up.
12.After a backup has completed, click View log to see which files have been successfully backed up by Mozy.
Restoring Files with Mozy Backup
To restore folders and files with Mozy Backup:
1.Click the link to restore any files and folders you back up to your Mozy account.
2.Select the desired backup from the Backup Date:
The file browser provides a way to select a Share and all its folders, or just some of the folders under a Share.
3.Click Apply to save your changes.
The Restore section displays a table with the status of a restore, either one in progress or one that has failed. To delete the restore task, click and confirm the deletion. When the restore finishes, the table status clears.
Registering with Avamar for Backup and Restore
Avamar is backup and recovery server software that uses deduplication to eliminate redundant copies of data, reducing the required storage space. For example, your
When you enable Avamar on your
Registering Your
1.On the Avamar page, click the switch on. The Avamar Settings
2.In the Avamar Settings
Backing up and Restoring Your Content
???Server Address ??? the Avamar server IP address or hostname.
???Client Domain ??? the registered domain name from the Avamar server.
Backing up with Amazon S3
The Amazon S3 online storage service allows you to back up your
Enabling the Amazon S3 Feature
1.On the Amazon S3 page, click the switch on.
If you do not have an Amazon S3 account, click the link to create an account.
2.Enter a valid access key, secret key, and bucket name from your Amazon S3 account information.
You can create a bucket at account setup, or you can enter a new bucket for your
3.Select an existing Share on your
4.Click Apply to save your changes.
Backing up Files to the Amazon S3 Cloud
After you copy files to the selected Share on your
Restoring Files with Amazon S3
When you want to restore files from the Amazon S3 cloud service to your
Backing up with LenovoEMC Personal Cloud
You can back up content on your
Refer to LenovoEMC Personal Cloud help for additional information.
Restoring Files with Personal Cloud
You can restore content on your
Refer to LenovoEMC Personal Cloud help for additional information.
57 Backing up Your
CHAPTER 6
Securing Your
Securing Your
What Is Security and Do I Need It?
Security is an optional feature you can enable on your
To secure your
???First enable security and create an administrator user.
???Create users.
???Create groups.
???Secure any existing or new Shares.
???Secure any existing or new iSCSI drives.
59 What Is Security and Do I Need It?
Securing Your
Enabling Security and Creating an Administrator User
With security turned on, only administrator users can view or change settings on the
1.On the Security page, click the switch on.
2.When you turn security on, you will be asked to create an administrator user. Provide a username and password, and then confirm your password.
3.Encryption is always available when you access your
When security is turned on, browser communications with the
4.If you have your own security certificate, you can load it by selecting Use an imported certificate and browsing to the certificate to load it.
5.Click Apply to save your changes.
6.Click here to learn how to create users.
7.Click here to learn how to secure any existing or new Shares.
Disabling Security
Disabling security will cause all defined users to be deleted.
If you are using other features on your
1.On the Security page, click the switch off.
2.Disabling security will cause all defined users and groups to be deleted. Check the box to disable security.
3.Click Apply to save your changes.
Security is disabled.
Securing Your
Limiting Access to Your Content by Creating Users
When you create users, you are selecting the specific people that have access to your
61 Limiting Access to Your Content by Creating Users
Securing Your
Users
Users and Groups Overview
When security is enabled, the Users & Groups page displays all users and groups on the
The table displays the Usernames and Descriptive Name of each user and group. Click in a row of the table to view or modify details about a user or group.
Adding Users
To add a user:
1.Navigate to the Users & Groups page.
2.Before you can create or modify users, you must have security enabled on your
3.To add a new user, click Add a user.
4.Enter the following information:
???Username ??? enter the username of the user to be created. This is the username for logging into the
???Descriptive Name ??? add a descriptive name to identify the user. For example, if you created a user with a Username of jsmith, you may want to add the Descriptive Name Joe Smith.
???Password ??? create a password for the user. The password should be at least 8 to 12 characters, and spaces are not allowed. The maximum password length is 32 characters.
???Confirm Password ??? confirm the password. If the text in this field does not match the text in the Password field, an error will be returned.
???Quota Size ??? set a quota size by entering a value in gigabytes. This limits the amount of storage space this user can have. To have no quota, leave this field blank.
???Administrator ??? check this box to allow this user to manage the
Note: An administrator does not have default access to all Shares. Access to Shares must be granted explicitly to all users, including administrators.
???Add a secured Share for this user ??? check this box to create a secured Share for this user. This Share will have the new user's name, and allows access only to that user.
Users 62
Securing Your
???Send a Personal Cloud invitation ??? click this link to invite a user to join your Personal Cloud on the
???Allow this user to add trusted devices to my Personal Cloud ??? check this box to allow a user to join a trusted device to a Personal Cloud. A trusted device is a machine, either a computer or another
5.Click Create.
Managing Users
The page describes how to:
???Set Quotas
Changing User Information
1.Modify the following information:
???Username ??? enter the username of the user to be created. This will be the username provided when logging into the
???Descriptive Name ??? add a descriptive name to identify the user. For example, if you created a user with a Username of jsmith, you may want to add the Descriptive Name Joe Smith.
???Password ??? create a password for the user. The password should be between 8 and 12 characters, and spaces are not allowed.
???Confirm Password ??? confirm the password. If the text in this field does not match the text in the Password field, an error will be returned.
???Send a Personal Cloud invitation ??? click this link to invite a user to join your Personal Cloud on the
???Allow this user to add trusted devices to my Personal Cloud ??? check this box to allow a user to join a trusted device to a Personal Cloud. A trusted device is a machine, either a computer or another
63 Users
Securing Your
???Quota Size ??? set a quota size by entering a value in gigabytes. To have no quota, leave this field blank.
???Administrator ??? check this box if you would like to allow this user to manage the
An administrator does not inherently have access to all Shares. Access to Shares must be granted explicitly to administrators, as with other users.
2.Click Apply.
Changing Access Permissions
1.Expand Access Permissions to change Share access permissions for the selected user.
2.To give this user access to a specific set of Shares, click Add access permissions.
3.In the Add Access Permissions
4.Uncheck Read or both Read and Write to limit or deny access permission to each Share for this user.
5.Click Apply to save your changes. When both Read and Write are unchecked, the Share is removed from the list.
Setting Quotas
You can limit the amount of space allocated to one or more users by applying quotas.
1.Click Quota Settings to enable quotas, and set a default quota for each user.
2.In the Quota Settings
3.If desired, enter a Default Quota. This quota applies to new users only.
4.Check Set default quota for all users to apply the default quota to all users.
5.Click Apply to save your changes.
6.To set individual user quotas, expand the Information section for a user and enter a value in Quota size. If you leave the box blank, there is no quota for that user.
7.Click Apply to save your changes.
Deleting Users
To delete a user:
1.From the ix4300d Management Console, click Users.
2.To delete an existing user, click the username to expand the user.
3.In the User Information section, click Delete.
4.In the Delete User
5.The user is removed from the user list.
Users 64
Securing Your
Groups
Groups Overview
Groups consist of one or more users, and administrators can grant each group rights to Shares on the ix4- 300d Network Storage. Users can belong to more than one group. The Groups page enables administrators to create one or more groups, and grant each group rights to Shares on the
Refer to the Security page to enable security permissions and create an administrator account, if you have not done so already.
By default, there are no groups defined. Once an administrator defines one or more groups, the Groups functionality is dynamically available when creating, modifying, and viewing users, Shares, and groups.
How Access Rights Are Granted Using Groups in Workgroup Mode
When groups are defined in Workgroup mode, a user's access rights are the most rights granted to the user and all groups to which the user belongs. For example, assume 3 Shares exist (SF1, SF2, and SF3), two users (UserA and UserB), and three groups (Group1, Group2, Group3). When created, UserA was not granted access rights to any Share, and UserB was granted Read rights to SF3. Group1 has Read/Write rights to SF1, Group2 has Read/Write rights to SF2, and Group3 has Read/Write rights to SF3. If UserA is added to Group1, UserB is added to Group2, and Group1 is added to Group3, the table below shows the resulting access rights for each user and group defined:
Adding Groups
1.On the Groups page, click Add a group. The Information section opens.
2.From the Information section, give the new group a name.
3.To add users to the group, click Add users. Select a user or users to include in the group. Select the checkbox in the title bar to add all listed users.
4.Click Apply to save your changes.
Managing Groups
The page describes how to:
65 Groups
Securing Your
Removing a User from the Group
1.Open a group to display users belonging to it.
2.To remove a user from the group, click the next to that user. When the Remove user
Changing Access Permissions
1.To refresh the list of users, click above the table.
2.Expand Access Permissions to change group permissions to a secured Share. If iSCSI is enabled, you can also change group permissions to secured iSCSI drives.
3.To add permissions to a Share, click Add access permissions.
4.From the Add Access Permissions
5.Click Apply to save your changes.
6.In the table listing the Shares, check Read or Write for each Share. If iSCSI is enabled, check Read or Write for each iSCSI drive. The group can have full access by checking both Read and Write. To grant only read access, check only Read.
NOTE: A group must have read access at a minimum. A group cannot have only write access.
7.Uncheck Read to remove all access to a Share and remove the Share from the table. If iSCSI is enabled, uncheck Read to remove all access to an iSCSI drive and remove the iSCSI drive from the table.
8.Click Apply to save your changes.
9.If NFS is enabled, the GID field is visible. The GID value must be the same on both the Linux client and the
Deleting Groups
To delete a group:
1.From the ix4300d Management Console, click Groups.
2.To delete an existing group, click to expand the group.
3.In the Information section, click Delete to delete the group.
4.In the Delete Group confirmation
5.If you do not wish to delete the group, click Cancel to return to the Groups page.
Groups 66
Securing Your
Using Active Directory Domain to Manage Users and Groups
Active Directory Users and Groups Overview
On the Users and Groups page, administrator users can import users and groups from an Active Directory (AD) server and grant them access rights to Shares on the
Managing Users and Groups with Active Directory
The page describes how to:
???Import Users and Groups from Active Directory
???Synchronize with the Active Directory Controller
???Set Quotas
Importing Users and Groups from Active Directory
1.Click Import Users and Groups from Active Directory.
2.The
3.Select the checkbox next to a user or group to import that user or group to your
4.Click Apply to save your changes.
Synchronizing with the Active Directory Controller
You can poll the Active Directory controller at any time to check for new users and groups on the controller, so you can add them to your
??? Click Synchronize with the Active Directory Controller.
Changing Access Permissions
Expand Access Permissions to change user or group permissions to a secured Share. When the
67 Using Active Directory Domain to Manage Users and Groups
Securing Your
1.To add permissions to a Share, click Add access permissions.
2.From the Add Access Permissions
3.Click Apply to save your changes.
4.In the table listing the Shares, check Read or Write for each Share. A user or group can have full access by checking both Read and Write. To grant only read access, check only Read.
A user or group must have read access at a minimum. A user or group cannot have only write access.
5.Uncheck Read to remove all access to a Share and remove the Share from the table.
6.Click Apply to save your changes.
7.If NFS is enabled, the GID field is visible. The GID value must be the same on both the Linux client and the
Setting Quotas
1.Click Quota settings to enable quotas and set a default quota. Quotas are only set for individual users, and not groups.
2.In the Quota Settings dialog, click Enable quotas to turn on quotas for each user. Quotas can be set for each user individually or set as a default value.
3.Enter a Default Quota in gigabytes. When you set a default quota, this becomes the quota size for all new users.
4.Check Set default quota for all users to globally set the same quota size to all users. You may overwrite this default value for individual users by setting their quota size separately in the user's Information section.
5.Click Apply to save your changes.
Deleting Active Directory Users and Groups
To delete a user or a group:
1.From the ix4300d Management Console, click Users and Groups to open the Users & Groups page.
2.To delete an existing user or group, click to expand that user or group.
3.In the Information section, click Delete. Deleting a user or group does not delete any Shares to which the user or group has access. Click the checkbox if you want to Delete all Shares that only this user can access.
4.In the confirmation
5.If you do not wish to delete a user or group, click No to return to the Users & Groups page.
Using Active Directory Domain to Manage Users and Groups 68
Securing Your
Managing Your
Managing Your
You can configure your
This topic assumes you have already created an administrator user and enabled security on your
Enabling Active Directory after Creating Users in Workgroup Mode
After you create users in Workgroup mode, you can switch your
1.On the Device Identification page, select Active Directory.
2.Configure your AD settings. See Configuring your
3.Click Apply.
After changing to AD mode, you are required to log back in to the
Logging in to Your
When an administrator logs in to the
1.At the Login screen, choose what type of user is logging in from the Active Directory Domain drop- down:
???to log in as a local user, choose the device name from the
???to log in as an Active Directory user, choose the Active Directory domain name from the drop- down menu and enter the username and password
2.Click Login.
69 Managing Your
Securing Your
Creating Local Users and Groups in Active Directory Mode
After an AD or local administrator logs in to the
1.On the Users and Groups page, click Add users and groups...
2.In the Import Users and Groups from Active Directory page, under Local, click Users to create a local user or Groups to create a group. You can add AD members to any local groups you create.
3.Enter the necessary credentials for the user or the group name, and click Create.
Creating Share Permissions for AD Users and Local Users
You can create access permissions for both AD and local users on any new or existing Shares on your ix4- 300d. For more information, see adding Shares and managing Shares.
Switching to Workgroup Mode from Active Directory
You can switch your
1.On the Device Identification page, select Workgroup.
2.Click Apply.
After changing to Workgroup mode, if there are any administrator users on your
If you had not enabled security on your
CHAPTER 7
Personal Cloud: Accessing Your
LenovoEMC Personal Cloud
From Anywhere in the World
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World 71
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
What Is LenovoEMC Personal Cloud ?
LenovoEMC Personal Cloud turns your
LenovoEMC Personal Cloud Key Terms
The following are a few key terms to help get you started with a Personal Cloud:
???LenovoEMC Personal Cloud??? This is a setting configured on your ix4300d Management Console that allows you to securely share storage and media capabilities with computers around the world.
???Web Access ??? You can use Personal Cloud information to access your
???My Personal Cloud ??? When you are the administrator of your
???Other Personal Cloud ??? If you want to have your
???Joining LenovoEMC Personal Cloud as a Trusted Device ??? To connect your computer or your
An administrator should complete the following tasks to set up or join a Personal Cloud:
???Creating LenovoEMC Personal Cloud
???Inviting People onto Your LenovoEMC Personal Cloud on page 78
72 What Is LenovoEMC Personal Cloud ?
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Is My Content Secure?
Your content is always secure using LenovoEMC Personal Cloud. If you create a Personal Cloud with security disabled, you are required to enter a password when accessing your
People added to your Personal Cloud as users are not required to own or have access to your ix4- 300d. The process of adding someone as a Personal Cloud user grants them access to your Personal Cloud from any computer.
Is My Content Secure? 73
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
LenovoEMC Personal Cloud Setup Overview
You can create LenovoEMC Personal Cloud in one of two ways:
???Follow the LenovoEMC Personal Cloud setup through Setup Portal
???Create the LenovoEMC Personal Cloud through the ix4300d Management Console
Creating a LenovoEMC Personal Cloud starts with providing a name for your Personal Cloud and an email address associated with it. After creating the Personal Cloud, you can use the Personal Cloud Quick Setup wizard to perform common tasks associated with the LenovoEMC Personal Cloud: adding Shares, inviting people to join the Personal Cloud, and setting up Copy Jobs through the Personal Cloud.
74 LenovoEMC Personal Cloud Setup Overview
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Creating LenovoEMC Personal Cloud
Before you can work with your LenovoEMC Personal Cloud, you first create a Personal Cloud and configure the settings.
After your Personal Cloud is ready and connected to the internet as indicated by the status images, you can invite people to join your Personal Cloud. When you invite people to join your Personal Cloud, you add them as users on your
If you have content on your
This procedure assumes you did not create a Personal Cloud using the initial LenovoEMC, Ltd. Setup portal. If you have already created a Personal Cloud, you do not have to follow this procedure.
1.On the LenovoEMC Personal Cloud page, expand the Configure section.
2.Click the My Personal Cloud button to open the portal that lets you create your Personal Cloud.
After you click the My Personal Cloud button, a new website containing the portal opens. You create a Personal Cloud on this website. After you create the Personal Cloud, you return to the ix4300d Management Console.
3.If your
After completing these steps, the Personal Cloud Quick Setup Wizard opens, so you can create Shares, invite users, or configure Copy Jobs. You can use the Quick Setup Wizard or close it and begin using your Personal Cloud.
Creating LenovoEMC Personal Cloud 75
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Configuring Router Port Forwarding for Personal Cloud
In most cases, your
When you have selected a port value to forward for Personal Cloud, click Settings on the Personal Cloud page, and enter your selected port number in the Personal Cloud settings dialog box. If you have more than one Personal Cloud, you can enter a range of port values for your Personal Clouds. The range of port values is
Router Port Forwarding
Some routers have a UPnP option. If you have a UPnP router, enabling this option allows the
Port forwarding must be configured for both the network router on which the Personal Cloud is configured, and any remote network from which trusted devices are accessing the Personal Cloud.
The following steps are generic router settings. If you have never logged into your router before, you must consult the manufacturer???s documentation to find specific details such as default IP address, default administrator account, and password.
1.Log in to your router by entering its IP address in the browser???s URL field from your computer. If prompted, enter administrator account name and password.
2.Navigate to the Port Forwarding configuration page. This is often related to Port Mapping, Application, Virtual Server, or Gaming configuration options.
3.Type in the desired application or service name. This is typically a blank or
4.Enter a port number for the Personal Cloud service in the range
5.Repeat the previous step, using port 443 to enable https communication with your
6.Enter the IP address of your
7.Save the changed settings.
8.Reboot the router if required.
76 Configuring Router Port Forwarding for Personal Cloud
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Configuring Your LenovoEMC Personal Cloud
As a LenovoEMC Personal Cloud administrator, you can manage various settings on your Personal Cloud to ensure that it functions as efficiently as possible. Settings include specifying an email address when sending invitations. When data is traveling through the Personal Cloud, you can control the security of that information by specifying a Secure Communication level. Note that data stored on your
Enabling Internet Access to the
You can grant internet users, including LenovoEMC Link users, secure access to the web interface and unrestricted access to media content on your
Changing Personal Cloud Settings
1.In the Configure section of the Personal Cloud page, click Settings.
2.In the Personal Cloud Settings dialog box, configure the following:
???Administration Email Address ??? This is the sender email address used on the email invitations.
???Port Number ??? Your router forwards this specific port for your Personal Cloud. This value is automatically filled in, and you do not have to change it, unless you have more than one Personal Cloud on your network. Refer to Configuring Router Port Forwarding for Personal Cloud for more information.
???Secure Communication ??? This setting controls the security of information traveling through the Personal Cloud.
You can also specify a Secure Communication level setting with LenovoEMC Storage Manager. The Secure Communication setting for the ix4300d Management Console sets the minimum value. You cannot specify a setting lower than this value using LenovoEMC Storage Manager. For information on using LenovoEMC Storage Manager, refer to its online help.
???Enable unrestricted access to media content??? This setting makes all media files in media- enabled Shares available to anyone on the internet accessing your
3.Click Apply to save your changes.
Configuring Your LenovoEMC Personal Cloud 77
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Inviting People onto Your LenovoEMC Personal Cloud
When you invite people to join your LenovoEMC Personal Cloud, you are actually selecting from existing users on your
1.From either the Personal Cloud Quick Setup dialog box or the LenovoEMC Personal Cloud page, click Invite Users.
You can also send an invitation to join a Personal Cloud when you are adding users. Refer to Adding Users on page 62 for more information.
2.In the Invite Users dialog box, select the name of an existing user or click Create New User to add a new user. If security has not been enabled, you are prompted to enable security and create an administrator user.
3.If the email address field is not already completed, enter an email address for the user.
4.Click Apply to send the invitation.
78 Inviting People onto Your LenovoEMC Personal Cloud
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Joining a Trusted Device to LenovoEMC Personal Cloud
You can join your
You cannot join your trusted device to a Personal Cloud if you have not been added as a user on the Personal Cloud.
1.On the Personal Cloud page, select the Other Personal Cloud command to join another LenovoEMC Personal Cloud.
2.In the Add Trusted Device to Personal Cloud dialog box, enter the Personal Cloud name, username, and password you received in the email invitation.
3.Enter a descriptive name for your trusted device in the Description field.
4.Click Apply.
After applying this information, you are automatically connected to the Personal Cloud.
Joining a Trusted Device to LenovoEMC Personal Cloud 79
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Managing Trusted Devices on a Personal Cloud
As LenovoEMC Personal Cloudadministrator, you can manage trusted devices on your Personal Cloud. Trusted devices can be disconnected, or you can completely delete a trusted device from the Personal Cloud.
Disconnecting Trusted Devices
Click My Personal Cloud, and expand the trusted device section of the page.
To disconnect a trusted device from the Personal Cloud, disable the trusted device by clicking the switch to Disabled, and click Yes in the confirmation
Deleting Trusted Devices
To delete a trusted device from the Personal Cloud, click next to the device's name. The trusted device is deleted and can only be added again by a user with trusted device privileges.
1.On the Personal Cloud page, expand the Trusted Devices section.
2.Click next to the trusted device you want to remove from the Personal Cloud.
3.Confirm the deletion.
80 Managing Trusted Devices on a Personal Cloud
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Using Copy Jobs with a LenovoEMC Personal Cloud
You can create Copy Jobs that can transfer data from one trusted device to another through the Personal Cloud. When you add a trusted device to your Personal Cloud, a Copy Jobs icon displays next to that device in the trusted device table. Clicking the Copy Jobs button opens the Copy Jobs page to help you configure a Copy Job between the
Using Copy Jobs with a LenovoEMC Personal Cloud 81
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Disabling or Deleting Your LenovoEMC Personal Cloud
When you disable your Personal Cloud, you are eliminating access to your Personal Cloud without deleting the account information you created when you set up the Personal Cloud. Later, if you want to reenable your Personal Cloud, you can without reentering all the account information. To completely stop the Personal Cloud and eliminate any account information with it, delete it. If you delete your Personal Cloud and later decide you want to recreate it, you must start the creation process again and
To disable a Personal Cloud, click Disable.
To delete a Personal Cloud, click Settings and then click Delete in the Personal Cloud Settings dialog box.
82 Disabling or Deleting Your LenovoEMC Personal Cloud
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Accessing Content Using Your LenovoEMC Personal
Cloud
You can share content by inviting users to your Personal Cloud. The data in Shares can be made accessible to all users of the Cloud, or access can be restricted to a specific set of users by setting access permissions to Shares. Access permissions control whether users are only allowed to read files in Shares, or if they can also write (upload) files to Shares.
Accessing Content Using Your LenovoEMC Personal Cloud 83
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Informing Users What to Do with LenovoEMC Personal Cloud
Personal Cloud enables users to access your
84 Informing Users What to Do with LenovoEMC Personal Cloud
CHAPTER 8
Sharing Content Using Social
Media
Sharing Content Using Social Media
Sharing Content Using Social Media: Overview
If you have an account with social media services such as Facebook, Flickr, or YouTube, you can share content on your
If you have configured a Personal Cloud on your
Note that an Active Folder can only be associated with one social media account. For example, if you want Active Folders for your Facebook and YouTube accounts, create two Active Folders, and assign one Active Folder to Facebook, and one to YouTube. Using this example, any photos you add to your Facebook Active Folder are automatically uploaded to your Facebook page, and any movies you add to your YouTube Active Folder are automatically uploaded to your YouTube page. Not only is this a fast and easy way to share content, but uploading content to your social media sites provides an additional backup of your content, as the content is stored both on your
86 Sharing Content Using Social Media: Overview
Sharing Content Using Social Media
Facebook is a social network to connect with friends and family. You can configure a Share as a Facebook Active Folder so that photos and movies added to that Share are automatically uploaded to your Facebook account.
Refer to Managing Shares on page 25 for more information on managing Shares and Active Folders.
If you do not have a Facebook account, go to the Facebook website to open an account.
Configuring a Facebook Active Folder
1.From the ix4300d Management Console, click Shares.
2.Select a Share to use as a Facebook Active Folder, and click to expand the Active Folder section.
3.Check Enable.
4.Select Facebook from the
5.Click Configure Facebook account access to configure your Facebook account. You will be taken to a Facebook page to configure your account. Follow the instructions provided by Facebook.
6.Check Delete files after upload to delete images or movies from the Share once they are transferred to your Facebook account.
7.Images can also be resized prior to upload. Check 800x600, 1024x768, or enter a custom resolution for resizing images.
8.Click Apply to save your changes.
Once configured, all your images in this Active Folder will upload to your Facebook account.
9.Click View Transfer History to see the transfer activity from this Share to your account.
Facebook 87
Sharing Content Using Social Media
Flickr
Flickr is a photo sharing network for sharing photos with friends and family. You can configure a Share as a Flickr Active Folder so that images and albums added to that Share are automatically uploaded to your Flickr account.
Refer to Managing Shares on page 25 for more information on managing Shares and Active Folders.
If you do not have a Flickr account, go to the Flickr website to open an account.
Configuring a Flickr Active Folder
1.From the ix4300d Management Console, click Shares.
2.Select a Share to use as a Flickr Active Folder, and click to expand the Active Folder section.
3.Check Enable.
4.Select Flickr from the
5.Click Configure Flickr account access to configure your Flickr account. You are taken to a Flickr page to configure your account. Follow the instructions provided by Flickr.
6.Check Delete files after upload to delete images from the Share once they are transferred to your Flickr account.
7.Click Apply to save your changes.
8.Once configured, all images added to this Active Folder are uploaded to your Flickr account. Click View Transfer History to see the transfer activity from this Share to your account.
88 Flickr
Sharing Content Using Social Media
YouTube
YouTube is a social media site to share video content. You can configure a Share as a YouTube Active Folder so that videos added to that Share are automatically uploaded to your YouTube account.
Refer to Managing Shares on page 25 for more information on managing Shares and Active Folders.
If you do not have a YouTube account, go to the YouTube website to open an account.
Configuring a YouTube Active Folder
From the ix4300d Management Console, click Shares.
1.Select a Share to use as a YouTube Active Folder, and click to expand the Active Folder section.
2.Check Enable.
3.Select YouTube from the
4.Check Delete files after upload to delete videos from the Share once they are transferred to your YouTube account.
5.Click Apply to save your changes.
Once configured, all videos added to this Active Folder automatically upload to your YouTube account.
6.Click View Transfer History to see the transfer activity from this Share to your account.
YouTube 89
Sharing Content Using Social Media
Share Content through LenovoEMC Personal Cloud
You can share your multimedia content with friends and family through a LenovoEMC Personal Cloud. Refer to the LenovoEMC Personal Cloud section for more information.
90 Share Content through LenovoEMC Personal Cloud
CHAPTER 9
Media Management
Media Management 91
Media Management
Media Management Overview
The
Scanning for media content
The Media Server automatically scans for media content on a regular basis. However, you can click Scan now at any time to force the media server to perform an immediate scan for media content. This is especially useful after you have created new folders with media sharing enabled and copied a large amount of media content to them.
92 Media Management Overview
Media Management
Media Services Capabilities and Limitations
One important consideration when using the media server is that it can share media content on your ix4- 300d with anyone on the internet. When media sharing is enabled, internet users, including those users on mobile devices running the LenovoEMC Link, can access media content on your
When you enable internet access to your media content, all media content is available to any user on the internet, regardless of any security you may have applied to a media file. All your pictures, movies, and music are available to anyone accessing your
Media Management
Sharing Media Content over the Internet
There are two methods for sharing media content on your
Enabling Internet Access from the Media Server Page
You can only enable internet access from the Media Server page if you have already created and configured a Personal Cloud. If a Personal Cloud is not set up, you do not see the Enable internet access option.
1.On the Media Server page, click Settings.
2.In the dialog box, check Enable internet access.
3.Click Apply to save your changes.
4.In the confirmation dialog box, check Check this box to continue.
5.Click OK to save your selection or click Cancel.
To access media content, internet users enter a
For additional information on enabling internet access, refer to Media Services Capabilities and Limitations.
94 Sharing Media Content over the Internet
Media Management
Media Aggregation
If you have multiple Digital Living Network Alliance (DLNA) servers in your network that have media content, you can combine all media content into one view by enabling aggregation on your
Enabling Media Aggregation
1.On the Media Server page, click Settings.
2.Check Enable media aggregation.
This enables aggregation for media servers already discovered in your network.
3.Choose the default aggregation setting.
The default aggregation setting sets the default value for media servers as they are added to your network.
The default aggregation settings are as follows:
???None ??? Media aggregation is off.
???Show Common View ??? This enables media aggregation and allows all media content from computers on the network to be played back by a DLNA player. All your movies, music, and pictures are linked from various computers and can be played back from one view. All aggregated media files remain on their original device, and can only be played while that device is powered on and connected to the network.
???Copy Files ??? This enables media aggregation and automatically copies all media content from computers, both networked and local, to your
???Copy on Request ??? This enables media aggregation but does not automatically copy all media content from computers, both networked and local, to your
When you enable media aggregation, the media server restarts, and any media you are currently streaming stops playing. You can begin streaming your media after the media server has restarted.
Media Management
Social Media Sharing
You can share media content, such as movies and pictures, using social media sites like Facebook, Flickr, or YouTube. Refer to the Sharing Content Using Social Media section for more information.
96 Social Media Sharing
Media Management
Streaming Music, Movies, and Pictures
The Media Server supports playback of videos, music and pictures from any UPnP AV (Universal Plug and Play Audio Visual) network media players, such as Playstation3, Windows Media Player, or Xbox 360.
You can play back all your media files from your individual home computers by enabling media aggregation on your
???iTunes
???Xbox 360
The procedures shown below are intended as examples. Your media player or version may operate differently. It is recommended that you refer to your media player documentation for instructions on how to add a network device.
Example: Setting up iTunes
1.Locate the source directory of your iTunes media content.
2.Drag, or copy, your existing media content to a Share that has media sharing enabled.
3.When you open the iTunes Library, iTunes will display all of the media content from the
Example: Setting up Xbox 360
1.Connect your Xbox 360 to your TV and to the same local network as your
2.Navigate to the Media Tab in Xbox 360 and select a
3.Select Computer from the options menu.
4.Click Yes, Continue when asked if you have downloaded and installed media sharing software on your computer, since the
5.Select
Media Management
Photos
Photos Overview
Your
Your
???Stream pictures that are in Shares with media sharing enabled
???Display pictures on the Home Page in a slideshow
???Automatically resize pictures
???Transfer pictures from your digital camera
???Upload pictures to social media sites like Flickr or Facebook
Streaming Pictures
The
Scanning for Pictures
The Media Server automatically scans for media content on a regular basis. However, you can click Scan now at any time to force the media server to perform an immediate scan for pictures. This is especially useful after you have created new folders with media sharing enabled and copied a large amount of media content to them.
Creating a Slideshow on the Device Home Page
Your
On the Home Page Settings feature page, check Display slideshows to display picture slideshows from folders on the
Automatically Resizing Your Photos
A Photo Resize Active Folder automatically changes the size of photos in that Share to a set size. You can choose to keep the original photos added to this Share, while a resized copy is created. The resized photos are saved to a folder on the Share named by the photo size you choose, such as 800x600. To configure a Share as a Photo Resize Active Folder, access Shares from the ix4300d Management Console, select a Share, and expand the Active Folders section to enable and configure it.
Refer to Managing Shares on page 25 for more information on managing Shares and Active Folders.
Configuring a Photo Resize Active Folder
1.From the ix4300d Management Console, click Shares.
2.Select a Share to use as a Photo Resize Active Folder, and click to expand the Active Folder section.
3.Check Enable.
98 Photos
Media Management
4.Select Photo Resize from the
5.You can set a size for your pictures. Select 640x480, 800x600, 1024x768, or enter a Custom Resolution for resizing images. The resized photos are saved to a folder on the Share named by the photo size you choose, such as 800x600.
6.You can keep a copy of the original by selecting Keep the original files after resizing.
7.To add a watermark to your photo, select Add a watermark to the photos. Click the Watermark file icon to apply a watermark image to your file.
8.Click Apply to save your changes.
9.Once configured, all photos added to this Active Folder are resized to your settings. Click View Content to see the files in this Share.
Getting Pictures from Your Camera
The Picture Transfer Protocol (PTP) allows pictures to be automatically copied from a USB camera connected directly to the
1.Open the Picture Transfer page, click the switch on.
2.Optionally, if you want to automatically delete the pictures from your camera once they have been safely copied to your LenovoEMC storage device, check Remove Copied Pictures From Camera to automatically delete the pictures from your camera once they have been safely copied to your
3.Click to open the Select Folder
Getting Pictures from Your Camera
The Picture Transfer Protocol (PTP) allows pictures to be automatically copied from a USB camera connected directly to the
1.Open the Picture Transfer page, click the switch on.
2.Optionally, if you want to automatically delete the pictures from your camera once they have been safely copied to your LenovoEMC storage device, check Remove Copied Pictures From Camera to automatically delete the pictures from your camera once they have been safely copied to your
3.Click to open the Select Folder
Photos 99
Media Management
Music
Music Overview
If you have music files in
Streaming Music
The
Scanning for Music
The Media Server automatically scans for media content on a regular basis. However, you can click Scan now at any time to force the media server to perform an immediate scan for media content. This is especially useful after you have created new folders with media sharing enabled and copied a large amount of media content to them.
100 Music
Media Management
Torrents
Torrent Overview
Torrent downloads allow you to share files using a
After you have added torrent jobs to your torrent share, the torrent download page displays a table of torrent jobs, showing both downloads and files available for upload. Multiple torrent files can download simultaneously. The table information includes the name of the file, its size, download or upload status, and amount of time remaining for the torrent job to complete.
Enabling Torrent Downloads
1.On the Torrent Download page, click the switch on.
2.Click Settings to modify the torrent download and upload settings.
3.In the Torrent Download Settings dialog box, enter a value for Maximum Download Speed. This sets the rate at which files are downloaded to your device. The maximum download speed you can enter is 2 MB/s.
4.Enter a value for Maximum Upload Speed.
This sets the speed at which other users can upload a file unprompted from your device. The upload speed can affect device performance, so it is recommended that you choose a value that does not strain the performance of your device and impact other work on it. The maximum upload speed you can enter is 1GB/s.
5.Set a Port value used by torrent peers to upload files from your
The port value should be a number between 6881 and 6999, and your router must be configured to allow port forwarding on the same port. Refer to Configuring your router for torrent downloads for more information on how to do this.
6.Click Apply to save your changes.
Deleting torrent jobs
1.On the Torrent Download page, select a torrent you want to delete.
2.Click the under the Action column to delete the torrent.
3.Click Yes to delete the torrent.
Configuring Your Router for Torrent Downloads
You must manually configure your router to forward a specific port to your
Port Information Used to Configure Your Router
The following information may be required to manually configure your router:
Forward the port to your
Torrents 101
Media Management
???Device IP Address 192.168.1.1
???Port name
HTTP
???Port number
Set to the same port value set on the Torrent Download page.
???Protocol
TCP
Torrent Active Folders
Sharing Torrent Downloads with Other Peers
Torrent downloads allow you to share files using a
Refer to Managing Shares on page 25 for more information on managing Shares and Active Folders.
Configuring a Torrent Active Folder
1.From the ix4300d Management Console, click Shares.
2.Select a Share to use as a Torrent Active Folder, and click to expand the Active Folder section.
3.Check Enable.
4.Select Torrent from the
5.Click General torrent settings to set up Torrent settings. Refer to Enabling Torrent Downloads on previous page for more information on configuring your Torrent downloads.
6.Click Apply to save your changes.
7.Click View Content to see the files in this Share.
Adding Torrent Files to Your
1.Open the Shares page.
2.Expand the Share that is enabled as a Torrent Active Folder. Any Share can be enabled as a Torrent Active Folder. For information on enabling a Torrent Active Folder, refer to Configuring a Torrent Active Folder above.
3.Copy the downloaded torrent file to the Torrent Active Folder Share. The torrent file immediately starts to download to the Share. An administrator user can monitor its download progress on the Torrent Download page. All users can monitor the download progress through the Content Viewer on the Torrent Share.
Managing Torrent Downloads
In the Content Viewer, you can perform the following actions on torrents:
???Pause or resume a torrent job. Click to pause a torrent download. When a torrent download is paused, you can resume the download by clicking .
102 Torrents
Media Management
??? Delete a torrent job. Click to delete the torrent download.
Torrents 103
Media Management
Videos
Video Capabilities Overview
Your
Your
???Stream movies that are in Shares with media sharing enabled
???Upload videos that are added to Shares associated with social media sites
Streaming Movies
The
Scanning for Movies
The Media Server automatically scans for media content on a regular basis. However, you can click Scan now at any time to force the media server to perform an immediate scan for movies. This is especially useful after you have created new folders with media sharing enabled and copied a large amount of media content to them.
Video Surveillance
Video Surveillance Overview
The Video Surveillance page lets you add and configure cameras connected to your
???Add Video Camera ??? Manually adds a video camera to your
???Video Wall ??? Displays live video from all video cameras configured with your
???Alerts ??? Displays alert messages about the video surveillance feature. Refer to the camera configuration pages for camera status information.
Video Surveillance features
The Video Surveillance page displays the Name, Space, and Model information of each video camera connected to the
When no supported cameras are connected to your network, this page will be empty.
104 Videos
Media Management
Name
This section displays the video camera's IP address, name, login username, and the destination folder for the video recording files. Additionally, using the Camera Configuration link, you can modify the video camera software configuration settings using the video camera's native software. It also displays an icon that indicates the current state of the video camera. The possible states are:
The video camera is no longer connected to the network.
The video camera is no longer connected to the network, but a recording schedule is set for it. You should delete this video camera if it is no longer on the network, or fix the network connection so it can record as scheduled.
The video camera is connected to the network and is currently recording. There is no schedule for this recording, since it was started manually. The recording must therefore be stopped manually.
The video camera is connected to the network, a recording schedule is set, and the camera is currently recording.
The video camera is connected to the network and a recording schedule is set for it, but it is not currently recording.
The video camera is connected to the network, but no recording schedule is set.
Space
The Space column identifies how much disk space is currently used by the video files in the destination folder for this video camera.
Model
This column lists the model information for this video camera.
Action
For each video camera, you can perform the following actions:
???Click either to manually start recording or to stop recording. These buttons are available only for video cameras that are currently connected and accessible on the network. Use the manual start and stop record buttons to start recording at any point and to stop a recording until the next scheduled start time.
NOTE: During recording, if you want to change the camera resolution and frame rate, you must stop recording, change the values on the camera's configuration page, and then start the recording again.
???Click to open a live view from your video camera. You may be prompted to supply the username and password for the video camera.
Adding a Video Camera
You can use the Video Surveillance page to manually add supported video cameras if they are not discovered automatically on your
If your video camera is already listed, you can modify its settings. To manually add a video camera, reference the instructions below.
Videos 105
Media Management
Manually Adding a Video Camera
Follow the instructions below to add your video camera, set a retention policy for your saved recordings, and schedule your video surveillance recordings.
1.On the Video Surveillance page, click Add Video Camera.
2.In the Video Camera Information section, enter the following about your video camera:
If your video camera is automatically discovered, information like Name and Manufacturer are already filled in for that video camera. These settings can be modified. If you modify these settings, you must make the same changes to the associated settings on your camera's configuration page.
???Name
???Camera Login Password
???IP Address
???HTTP Port: A camera that is automatically discovered will periodically receive configuration values, including the HTTP port number, from the actual camera. If you change the HTTP port number on a camera's configuration page, but do not change it on the Video Surveillance page, that camera will be offline on the Video Surveillance page until the camera receives the updated value. If you manually add a camera and change its HTTP port number on the camera's configuration page, the camera displays as offline on the Video Surveillance page. Delete the camera and add it again, using the updated HTTP port value.
???RTSP Port
3.Select a Destination Folder for the video camera recordings.
Recorded video files are saved to this folder, and the
4.Click Camera Configuration to link your video camera's software.
If you want to change the camera resolution and frame rate, you must change them on your camera's configuration page.
5.Click Apply to save your changes. Click Cancel to discard your unchanged settings.
The video camera displays in the table. For additional setup, refer to the sections on Retention Policy and Scheduling.
Managing Video Cameras
You can set a retention policy on your recordings and also schedule when to record.
Setting a Retention Policy
Setting the retention policy determines how much recorded video you keep on your
???Maximum days to save recordings
???Maximum space for recordings
106 Videos
Media Management
Click Apply to save your changes.
If you select Maximum days to save recordings, enter a value in days. If you select Maximum space for recordings, enter a value in gigabytes. Setting this value too high may consume all available space, while setting this value too low may cause recordings to be deleted sooner than you would like. The maximum space cannot exceed 90% of the total space on the
Scheduling the Recordings
Schedule the days and time periods you want your video camera to record.
1.Select Schedule Recording to enable the recording scheduler.
2.Select the days you want to record, or All Days for the entire week.
3.Choose the Start and Stop times for your recording.
4.Click Apply to save your changes.
Once your video camera is set, click in the Action column to begin recording. To stop recording, click
. For a live view from your video camera, click . The live view displays even when the video camera is not recording.
Deleting Video Cameras
To delete a video camera, expand the Information section of the camera and click Delete.
Videos 107
CHAPTER 10
Adding Applications to Your ix4- 300d Network Storage
Adding Applications to Your
Adding Applications to Your
Application Overview
You can install supported applications on your
109 Application Overview
Adding Applications to Your
Application Installation
Certain applications on your
You can also download applications from www.LifeLineApps.com.
Application Installation 110
Adding Applications to Your
Application Manager
The Application Manager page allows you to add applications to your
Only valid applications built using the LenovoEMC SDK can be installed on your
Starting or stopping an application
When available, click in the Action column to stop an application. Click to start it again.
Adding applications
1.Click the Add application link. The Add application window displays.
2.Enter the path and name of the application file, or click Browse, and select the application file located on your computer.
3.Click Upload to install the application.
Removing applications
When available, click in the Action column to uninstall an application.
111 Application Manager
CHAPTER 11
Upgrading Your
Upgrading Your
Upgrading Your
Software Updates
The Software Updates page identifies the
1.In the table listing the current software installed on your
2.The Status column will state whether the software is up to date or if an update is available. To copy an update file to your
3.If multiple updates are ready, you may install all the updates at the same time. Click Apply all pending updates to install the available updates. The software updates are applied to your
4.Once the software is installed, the
5.If you want to remove the update without applying changes, click in the Action column.
Do not shut down the
Manual update process: installing a device software update
1.In the table listing the current software installed on your
2.If an update is available, the Status column will state that a software update is available with a link. Download the update file to your local computer.
3.To retrieve the update, click Add Software.
4.In the Add Software
Once downloaded, click Browse to select the update, and then click Upload to continue.
5.When the update is uploaded to the
6.Click Apply all pending updates to apply the update or updates. The software updates will be applied to your
in the Action column.
The
113 Software Updates
Upgrading Your
The
Software Updates 114
CHAPTER 12
Backing up and Recovering Your
Backing up and Recovering Your
Backing up and Recovering Your
Backing Up Your
The Configuration Backup and Restore page allows you to back up and restore system configuration information. Backing up a configuration saves various system properties, including users, groups, device identification, and Share names and permissions. Configuration information is saved to a file, and you can save as many versions of the file as you want. After backing up the configuration, you can restore it to your
Configuration Backup and Restore does not back up or restore any data files on your
Backing up Device Configuration
1.On the Configuration Backup and Restore page, click Back up configuration to select a name and location for your configuration backup.
2.Save the configuration file to an external device, such as your computer or a USB drive. You can save as many configuration backups as you want.
Restoring a Configuration Backup
1.On the Configuration Backup and Restore page, click Restore configuration to select a saved configuration backup.
2.In the Restore Configuration dialog box, click Browse to locate a previously saved configuration backup stored on your computer or USB device.
3.Select one of the following options:
???Restore settings ??? overwrites any existing settings, such as device identification and Share names. When you select this option, existing data on the
???Restore settings and drive configuration ??? deletes all data, users, and settings from the target
4.Click Apply to save your changes. After you click Apply, the restore process starts.
5.If your source
6.Click OK.
116 Backing Up Your
CHAPTER 13
Hardware Management
Hardware Management 117
Hardware Management
About the
This topic describes the front and rear panel components of the
Front Panel
Status Indicators, Buttons and Ports
1.LCD display ??? Scroll through the display screen to view the device name, free disk space, IP address, and date and time. You can initiate a QuikTransfer Copy Job from the LCD and view or dismiss any errors or warnings on the
2.Display control buttons ??? Press to scroll the display screen; select options and functions shown on the display.
3.Status indicators ???
???System Status: Off when the system is functioning normally. Flashes blue during RAID rebuild. Flashes red if there is a system or drive error. Use the LCD display or the device console to view details.
???Disk Activity: Flashes blue during disk activity. Flashes red if there is a drive error or degraded drive mode. Off if both drives are removed.
???Power: Flashes white during system startup. Glows solid white when the
4.Power button ??? Press and release to power the
Holding the power button for 4 seconds will result in a forced shutdown and could cause data loss if data transfers are in process.
5. USB 3.0 connector ??? Supports devices such as USB storage devices and printers.
118 About the
Hardware Management
Drive Bay Access
The
Power down the StorCenter and disconnect the power cord before installing or replacing hard disk drives. Replace the cover before restoring power.
Refer to the list of qualified hard disks on the LenovoEMC support site at www.iomega.com/support before adding new drives.
About the
Hardware Management
Rear Panel
1.USB 2.0 connectors ??? Supports devices such as USB storage devices and printers.
2.Gigabit Ethernet Ports ???
3.Reset Button ??? Hold the Reset button for four seconds to reset security and network settings. This allows you to regain access if network settings are incorrect or you???ve forgotten your password.
The reset button does not initiate a full factory reset. To perform a full factory reset, select Factory Reset from the System page in the ix4300d Management Console.
4.Power Connector ??? Plug the power cable into this connector.
5.Security Lock ??? Connect security cable to protect your
Default Settings
???IP Address ??? If not DHCP server is found on your network, the
???Device Name ??? The default name for your
???Default Shares ??? Backups, Documents, Movies, Music, Pictures
120 About the
Hardware Management
Energy Saving
The Energy Saving page provides power settings for the
Power Down Drives
Click the Power Down Drives
Brightness
To adjust the brightness of the lights on the
Energy Saving 121
Hardware Management
Factory Reset
Factory Reset returns the
Factory Reset provides two options for returning your
???Quickly delete all data ??? permanently deletes all record of existing or deleted data, users, and passwords.
???Securely delete all data ??? this option takes significantly longer, but provides an added security benefit by permanently erasing all data on the drives to prevent recovery of existing or deleted data, users, and passwords. The secure delete operation renders all data irrecoverable.
You can use the factory reset feature only to erase the drives internal to the
1.Choose one of the following options:
???Quickly delete all data
???Securely delete all data
2.From the After Reset
3.Click Apply.
4.In the
When you quickly delete or securely delete all data on your
122 Factory Reset
Hardware Management
UPS Management
The LenovoEMC UPS Management page allows you to monitor the status of an attached Uninterruptible Power Supply.
If your
If the
UPS Management 123
Hardware Management
Troubleshooting Routers
If you encounter a problem while connecting or using your
If you have properly set port forwarding on your router and remote access still does not work, you may have multiple routers on your network. In this situation, you will most likely have two NAT (Network Address Translation) firewalls.
1.One of the easiest ways to identify this issue is to log in to the router to which the
2.Once you have logged in, go to the page that shows the router's WAN IP address, usually Status or Network Info.
3.If the WAN IP address begins with 192.168, 10, or 172, you may have a NAT Firewall between the router and internet connection.
There are several options for resolving double NAT situations. The sections below explore the pros and cons of each resolution:
These instructions will refer to the router that is connected directly to the internet as the Primary Router. The cascaded router or router to which your
???Use the primary router's DMZ
???Port forward the primary router to the secondary router
???Put the secondary router in bridging mode
???Put the primary router in bridging mode
Enabling the DMZ
Most routers have a feature called DMZ or Default Server. DMZ stands for Demilitarized Zone, Data Management Zone, Demarcation Done, or Perimeter Network. The DMZ allows you to enter an IP address that will exist outside the router's NAT Firewall.
This is the easiest way to configure your network to handle double NAT situations; however, it is dependent upon DMZ functionality within your primary router.
To enable the DMZ:
1.Log in to the primary router.
2.Navigate to the settings page for DMZ or Default Server. Refer to the documentation that came with your router for information on where this feature is found.
3.Enter the secondary router's IP address.
4.Save your settings.
Your secondary router is no longer behind your primary router's firewall. If port forwarding is correctly configured, remote access should now be working properly. Moving your secondary router into the DMZ should not have any effect on the security of the network, since it is still protected by the secondary router's firewall.
124 Troubleshooting Routers
Hardware Management
Configuring Port Forwarding on Double NAT Networks
If for some reason the network configuration cannot be changed and your setup requires the double NAT, you must perform the port forwarding steps twice. On the primary router, set the port forwarding to the cascaded router's external IP address. On the cascaded router, set the port forwarding to the
Bridging the Secondary Router
Make sure that the primary router (usually the one connected to or acting as the DSL/Cable modem) is the only one with DHCP (Dynamic Host Configuration Protocol) and NAT (Network Address Translation) enabled. The secondary should be changed to bridging mode. Ensure that the secondary router connects to the primary router using a standard port rather than the port labeled Uplink or internet. This turns your secondary router into a switch; however, you can still enable its Wireless Access Point if so equipped.
Refer to the documentation that came with your router for configuration information and settings.
Bridging the Primary Router
If none of the above options are available, you must enable transparent bridging on your primary router. This may require contacting your ISP (Internet Service Provider) to configure the DSL or Cable Modem/NAT into bridge mode, which then disables the first NAT/Firewall. After this first firewall in the modem is disabled, the secondary router handles all the network traffic, Port Forwarding, and allows Remote Access to work.
You should not attempt bridging without help from the ISP. If bridge mode is attempted by the customer and not configured properly, it can render the customer's internet connection inoperable. Primary router bridging may also require special configuration information and settings on the secondary router.
If you configured your
To resolve this problem, try one of the following processes:
???Increase the length of the DHCP lease: Your router attempts to remember all DHCP clients and assigns them the same IP address every time they request an IP address; however, the router forgets clients if they do not request an IP address for a certain amount of time. Your router has a setting for the duration of the validity of the DHCP lease. If your network requires DHCP, this may be a good solution; however, it is not always guaranteed to work. Occasionally updating your router's port forwarding settings may be required.
???Use Static DHCP: Some routers allow you to assign Static IP addresses through the DHCP system based on the MAC address of the device. This ensures that the
???Use a Manual IP Address: Changing the Manual IP address reduces the reliance of your
1.Log in to your router and write down the DHCP range it is using.
Troubleshooting Routers 125
Hardware Management
2.Refer to your router's documentation for more information on configuring DHCP settings.
3.Navigate to the IP address settings interface page on your
4.Enter a new IP address that is outside of your router's DHCP range. For example, if your router is distributing IP addresses in the range of 192.168.14.2 through 192.168.14.50, you must assign the
5.Enter a subnet mask. The subnet mask describes the size of your network. For most networks this is 255.255.255.0 which allows for 256 network devices. If you are on a larger network or are using the
6.For best results, enter the IP address(es) for your DNS Server(s).
7.If necessary, enter the IP address(es) for your WINS server(s).
8.Enter a gateway address. In most cases, this is the IP address of your router.
9.If necessary, update your router's port forwarding information with the new static DHCP IP address.
126 Troubleshooting Routers
Additional Support
Additional Support
127
Additional Support
How to Get Help
LenovoEMC is committed to providing excellent customer support. To meet this goal, Lenovo Customer Support offers a variety of support options designed to meet the needs of a wide range of users. For complete information on the support options available for your product, visit the web support site at http://support.lenovoemc.com.
Here's just some of what is available on LenovoEMC's
???Answers to frequently asked questions (FAQs)
???Online help pages with troubleshooting or basic how to information
???
???Advanced online support options, such as
???Electronic copies of product manuals
???Information on telephone support options
???Information on advanced technical service options, such as data recovery
???Warranty information and product return instructions
Support options available may vary depending on your region and language of choice. LenovoEMC's specific customer support policies (including fees for services) and procedures change as technology and market conditions dictate. To obtain information about LenovoEMC's current policies, select the Support Policy link from the top banner on the web support site or write to:
LenovoEMC Customer Service
4059 South 1900 West
Roy, UT 84067, USA
128 How to Get Help
Additional Support
Support
The Support feature opens the LenovoEMC web site where you can get more information about your ix4- 300d. The Support page provides access to content for learning more about using and supporting your ix4- 300d.
Refer to the LenovoEMC Support site for more information.
Support 129
Legal
Legal
130
Legal
Safety Information
Observe the following guidelines when using your
???Follow all instructions marked on the
???Use only the power supply provided with the
???Unplug the
???Do not use the
???Do not place the
???Do not place the
???Openings in the
???Do not walk on the power cord or allow anything to rest on it.
???There is a danger of explosion if the coin cell lithium battery is incorrectly replaced. Replace only with the same or equivalent type recommended by the equipment manufacturer. Dispose of used batteries according to local, state, regional, and federal regulations.
???Power down the
Under any of the following conditions, unplug the
???The power cord or plug is damaged.
???Liquid has been spilled into the device.
???The device does not function properly when the operating instructions are followed.
???The device was dropped or the exterior enclosure is damaged.
131 Safety Information
Legal
Open Source
The software included in this product contains copyrighted software that is licensed under open source agreements. Components of this software covered under GPL or other open source licenses are fully documented as to license and redistribution requirements in the ReadMe file available with the source code. The corresponding source code package is available for download from the LenovoEMC web site at http://support.lenovoemc.com. To locate the download page for open source code, select your network storage product and your operating system. Scroll down the page to the search field and enter ???open source???. In addition, you can also obtain a copy of the applicable open source code on CD by sending a money order or check for $10 (USD) to:
LenovoEMC, Ltd. ??? ATTN: Source Code ??? 4059 South 1900 West ??? Roy, UT 84067 USA
Please include the model name for your network storage product with the request.
Open Source 132
Legal
Warranty Information
Limited Warranty Notice
Lenovo Network Storage products are covered by the terms of the Lenovo Limited Warranty, version L505-
Warranty Period
The warranty period for
Applicable Types of Warranty Service (as described in the Lenovo Limited Warranty):
1. Customer Replaceable Unit (???CRU???) Service
7. Product Exchange Service
For network storage products, coverage for product exchange transportation may differ by region. For additional information on this coverage, please contact a local Lenovo service provider.
For a full explanation of the types of warranty service, refer to the full warranty available at http://www.lenovo.com/warranty/llw_02/.
NOTE: Lenovo Network Storage products are manufactured solely to standard commercial grade levels of reliability and are not intended for use in any systems that require the products to conform to the higher grades of reliability, such as critical safety systems,
Limited Warranty for Iomega Products
Iomega network storage products are covered by a limited 3 year warranty. Iomega warranties are now serviced by Lenovo Customer Support. See the LenovoEMC web support site at http://support.lenovoemc.com for complete warranty terms and conditions.
133 Warranty Information
Legal
Regulatory Information
This topic provides regulatory information for various countries.
Manufacturer/Responsible Party
LenovoEMC, Ltd., 4059 South 1900 West, Roy, UT 84067
EU Representative
Lenovo, Einsteinova 21, 851 01 Bratislava, Slovakia
Federal Communications Commission (FCC) Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
???Reorient or relocate the receiving antenna.
???Increase the separation between the equipment and receiver.
???Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
???Consult an authorized dealer or service representative for help.
Lenovo is not responsible for any radio or television interference caused by using other than specified or recommended cables and connectors or by unauthorized changes or modifications to this equipment. Unauthorized changes or modifications could void the user???s authority to operate the equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
Canadian Verification
This Class B digital apparatus meets all requirements of the Canadian
Regulatory Information 134
Legal
European Union - Compliance to the Electromagnetic Compatibility Directive
This product is in conformity with the protection requirements of EU Council Directive 2004/108/EC on the approximation of the laws of the Member States relating to electromagnetic compatibility. Lenovo cannot accept responsibility for any failure to satisfy the protection requirements resulting from a non- recommended modification of the product, including the installation of option cards from other manufacturers.
This product has been tested and found to comply with the limits for Class B Information Technology Equipment according to European Standard EN 55022. The limits for Class B equipment were derived for typical residential environments to provide reasonable protection against interference with licensed communication devices.
The Declaration of Conformity is available at http://support.lenovoemc.com/ce.
Important WEEE Information
The WEEE marking on Lenovo products applies to countries with WEEE and
European Union RoHS
Lenovo products sold in the European Union, on or after January 3, 2013, meet the requirements of the European Union Directive 2011/65/EU; The Restriction of the Use of Certain Hazardous Substances in Electrical and Electronic Equipment (RoHS).
For more information about Lenovo progress on RoHS, go to:
http://www.lenovo.com/social_responsibility/us/en/RoHS_Communication.pdf
India RoHS
RoHS compliant as per
Lithium Battery ??? California Perchlorate Information
This product contains a CR coin cell lithium battery which contains perchlorate
See www.dtsc.ca.gov/hazardouswaste/perchlorate.
135 Regulatory Information
Legal
Polyvinyl Chloride (PVC) Cable and Cord Notice
WARNING: Handling the cord on this product or cords associated with accessories sold with this product will expose you to lead, a chemical known to the State of California to cause cancer, and birth defects or other reproductive harm. Wash hands after handling.
Recycling and environmental information
Lenovo encourages owners of information technology (IT) equipment to responsibly recycle their equipment when it is no longer needed. Lenovo offers a variety of programs and services to assist equipment owners in recycling their IT products. For information on recycling Lenovo and LenovoEMC products, go to: http://www.lenovo.com/recycling.
Dispose of the coin cell lithium battery as required by local ordinances or regulations.
Export classification notice
This product is subject to the United States Export Administration Regulations (EAR) and has an Export Classification Control Number (ECCN) of 5A992.c It can be
Regulatory Information 136
Legal
Copyright and Trademark Information
?? 2013 LenovoEMC, Ltd. All rights reserved.
Lenovo and the Lenovo logo are registered trademarks of Lenovo in the United States, other countries, or both. The EMC logo is a registered trademark of EMC Corporation in the United States and/or other countries. LenovoEMC and LifeLine are registered trademarks or trademarks of LenovoEMC, Ltd. in the United States, other countries, or both. Windows is a trademark of the Microsoft group of companies. Mac is a trademark of Apple Inc., registered in the United States and other countries. Linux?? is the registered trademark of Linus Torvalds in the U.S. and other countries. Certain other product names, brand names, and company names may be trademarks or designations of their respective owners.
137 Copyright and Trademark Information