D-Link DSN-6020 User Manual

D-Link DSN-6020 User Manual

10gbe iscsi to sata ii / sas raid ip san storage
Hide thumbs Also See for DSN-6020:
Table of Contents

Advertisement

D-Link iSCSI IP SAN storage
10GbE iSCSI to SATA II / SAS
RAID IP SAN storage
DSN-6410 & DSN-6410 with DSN-640
User Manual
Version 1.0
1

Advertisement

Table of Contents
loading

Summary of Contents for D-Link DSN-6020

  • Page 1 D-Link iSCSI IP SAN storage 10GbE iSCSI to SATA II / SAS RAID IP SAN storage DSN-6410 & DSN-6410 with DSN-640 User Manual Version 1.0...
  • Page 2: About This Manual

    About this manual This manual is the introduction of D-Link DSN-64x0 IP SAN storage and it aims to help users know the operations of the disk array system easily. Information contained in this manual has been reviewed for accuracy, but not for product warranty because of the various environments / OS / settings.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1 Overview ..............6 Features ..................6 1.1.1 Highlights ........................7 RAID concepts ................8 1.2.1 Terminology ....................... 8 1.2.2 RAID levels ......................10 1.2.3 Volume relationship ....................11 iSCSI concepts ................12 IP SAN storage specifications ............13 1.4.1 Technical specifications ...................
  • Page 4 4.4.1 Physical disk ......................54 4.4.2 RAID group ......................57 4.4.3 Virtual disk ....................... 60 4.4.4 Snapshot ........................65 4.4.5 Logical unit ......................68 4.4.6 Example ........................69 Enclosure management .............. 74 4.5.1 Hardware monitor ....................75 4.5.2 UPS .......................... 76 4.5.3 SES ..........................
  • Page 5 Event notifications ..............125 Appendix Certification list ................. 133 Microsoft iSCSI initiator ............. 136 From Single controller to Dual Controller ……………………. 142...
  • Page 6: Chapter 1 Overview

    Chapter 1 Overview 1.1 Features D-LINK DSN-6000 series IP SAN storage provides non-stop service with a high degree of fault tolerance by using D-LINK RAID technology and advanced array management features. DSN-6410 & 6410w/640 IP SAN storage connects to the host system by iSCSI interface.
  • Page 7: Highlights

    1.1.1 Highlights D-LINK DSN-6410 & 6410w/640 feature highlights • Host 4 x 10GbE iSCSI ports (DSN-6410 with DSN-640) Interface 2 x 10GbE iSCSI ports (DSN-6410) Drive 12 x SAS or SATA II Interface RAID Dual-active RAID controllers (DSN-6410 with DSN-640)
  • Page 8: Raid Concepts

    1.2 RAID concepts RAID is the abbreviation of “Redundant Array of Independent Disks”. The basic idea of RAID is to combine multiple drives together to form one large logical drive. This RAID drive obtains performance, capacity and reliability than a single drive. The operating system detects the RAID drive as a single storage device.
  • Page 9 both data cache and accessed physical disks. Write-Back cache-write policy. A caching technique in which the completion of a write request is signaled as soon as the data is in cache and actual writing to non-volatile media occurs at a later time.
  • Page 10: Raid Levels

    MPIO Multi-Path Input/Output. MC/S Multiple Connections per Session Maximum Transmission Unit. Challenge Handshake Authentication Protocol. An optional CHAP security mechanism to control access to an iSCSI storage system over the iSCSI data ports. iSNS Internet Storage Name Service. Part 3: Dual controller •...
  • Page 11: Volume Relationship

    1.2.3 Volume relationship The below graphic is the volume structure which D-LINK has designed. It describes the relationship of RAID components. One RG (RAID group) consists of a set of VDs (Virtual Disk) and owns one RAID level attribute. Each RG can be divided into several VDs. The VDs in one RG share the same RAID level, but may have different volume capacity.
  • Page 12: Iscsi Concepts

    1.3 iSCSI concepts iSCSI (Internet SCSI) is a protocol which encapsulates SCSI (Small Computer System Interface) commands and data in TCP/IP packets for linking storage devices with servers over common IP infrastructures. iSCSI provides high performance SANs over standard IP networks like LAN, WAN or the Internet.
  • Page 13: Ip San Storage Specifications

    initiators use standard TCP/IP stack and Ethernet hardware, while iSCSI HBA(s) use their own iSCSI and TCP/IP stacks on board. Hardware iSCSI HBA(s) provide its own initiator tool. Please refer to the vendors’ HBA user manual. Microsoft, Linux, Solaris and Mac provide iSCSI initiator driver. Please contact D- LINK for the latest certification list.
  • Page 14 Write-through or write-back cache policy for different application usage Multiple RAID volumes support Configurable RAID stripe size Online volume expansion Instant RAID volume availability 10. Auto volume rebuilding 11. On-line volume migration with no system down-time Advanced data protection • D-Link writeable snapshot...
  • Page 15 S.E.S. inband management UPS management via dedicated serial port Fan speed monitors Redundant power supply monitors Voltage monitors Thermal sensors for both RAID controller and enclosure Status monitors for D-LINK SAS JBODs Management interface • Management UI via serial console ...
  • Page 16: Fcc And Ce Statements

    Host access control: Read-Write and Read-Only Up to 128 sessions per controller One logic volume can be shared by as many as 16 hosts OS support • Windows  Linux  Solaris   Drive support • SATA II (optional) SCSI-3 compliant Multiple IO transaction processing Tagged command queuing...
  • Page 17 This device has been shown to be in compliance with and was tested in accordance with the measurement procedures specified in the Standards and Specifications listed below and as indicated in the measurement report number: xxxxxxxx-E Technical Standard: EMC DIRECTIVE 2004/108/EC (EN55022 / EN55024) UL statement FCC statement...
  • Page 18 Reliable Earthing - Reliable earthing of rack-mounted equipment should be maintained. Particular attention should be given to supply connections other than direct connections to the branch circuit (e.g. use of power strips). Caution The main purpose of the handles is for rack mount use only. Do not use the handles to carry or transport the systems.
  • Page 19: Chapter 2 Installation

    Chapter 2 Installation 2.1 Package contents The package contains the following items: DSN-6410 & 6410w/640 IP SAN storage (x1) HDD trays (x12) Power cords (x4) RS-232 cables (x2), one is for console, the other is for UPS. CD (x1) Rail kit (x1 set) Keys, screws for drives and rail kit (x1 packet) SFP and 5 Meter cable 2.2 Before installation...
  • Page 20: Front Led Lights

    The drives can be installed into any slot in the enclosure. Slot numbering will be reflected in web UI. Tips It is advisable to install at least one drive in slots 1 ~ 4. System event logs are saved to drives in these slots; If no drives are fitted the event logs will be lost in the event of a system reboot.
  • Page 21: Install Drives

    2.3.3 Install drives Note : Skip this section if you purchased a solution populated with drives. To install SAS or SATA drives with no Bridge Board use the front mounting holes: To install SATA drives with Bridge Board (DSN-654), fit the Bridge Board first Then install the drive using the rear mounting holes:...
  • Page 22: Rear View

        Figure 2.3.3.3 HDD tray description: • HDD power LED:  Green  HDD is inserted and good.  Off  No HDD.  HDD access LED:  Blue blinking  HDD is accessing.  Off  No HDD. ...
  • Page 23 Controller 2. (only on DSN-6410 with DSN-640)  Controller 1.  Power supply unit (PSU1).  Fan module (FAN1 / FAN2).  Power supply unit (PSU2).  Fan module (FAN3 / FAN4). ...
  • Page 24        Figure 2.3.4.3 (DSN-6410 SFP+) Connector, LED and button description: • 10GbE ports (x2).  Link LED: Orange  Asserted when a 1G link is established and  maintained. Blue  Asserted when a 10G link is establish and ...
  • Page 25: Install Battery Backup Module

    BBM Status Button:  When the system power is off, press the BBM status button,  if the BBM LED is Green, then the BBM still has power to keep data on the cache. If not, then the BBM power is ran out and cannot keep the data on the cache anymore.
  • Page 26: Deployment

    2.5 Deployment Please refer to the following topology and have all the connections ready. Figure 2.5.1 (DSN-6410 with DSN-640) Figure 2.5.2 (DSN-6410) Setup the hardware connection before power on servers. Connect console cable, management port cable, and iSCSI data port cables in advance.
  • Page 27 In addition, installing an iSNS server is recommended for dual controller system. Power on the DSN-6410 or DSN-6410w/DSN-640 and the DSN-6020 (optional) first, and then power on hosts and iSNS server. Host server is suggested to logon the target twice (both controller 1 and controller 2), and then MPIO should be setup automatically.
  • Page 28 Figure 2.5.4 Using RS-232 cable for console (back color, phone jack to DB9 female) to connect from controller to management PC directly. Using RS-232 cable for UPS (gray color, phone jack to DB9 male) to connect from controller to APC Smart UPS serial cable (DB9 female side), and then connect the serial cable to APC Smart UPS.
  • Page 29: Chapter 3 Quick Setup

    3.1.1 Serial console Use console cable (NULL modem cable) to connect from console port of D-LINK IP SAN storage to RS 232 port of management PC. Please refer to figure 2.3.1. The console settings are on the following: Baud rate: 115200, 8 data bit, no parity, 1 stop bit, and no flow control.
  • Page 30: Web Ui

    3.1.3 Web UI D-LINK IP SAN storage supports graphic user interface (GUI) to operate. Be sure to connect the LAN cable. The default IP setting is DHCP; open the browser and enter: http://192.168.0.32 And then it will pop up a dialog for authentication.
  • Page 31 Indicator description: • RAID light: Green  RAID works well.  Red  RAID fails.  Temperature light: Green  Temperature is normal.  Red  Temperature is abnormal.  Voltage light: Green  voltage is normal.  Red  voltage is abnormal. ...
  • Page 32: How To Use The System Quickly

    Mute alarm beeper. Tips If the status indicators in Internet Explorer (IE) are displayed in gray, but not in blinking red, please enable “Internet Options”  “Advanced”  “Play animations in webpages” options in IE. The default value is enabled, but some applications will disable it. 3.2 How to use the system quickly The following methods will describe the quick guide to use this IP SAN storage.
  • Page 33 Figure 3.2.1.2 Step2: Confirm the management port IP address and DNS, and then click “Next”. Figure 3.2.1.3 Step 3: Set up the data port IP and click “Next”.
  • Page 34 Figure 3.2.1.4 Step 4: Set up the RAID level and volume size and click “Next”. Figure 3.2.1.5 Step 5: Check all items, and click “Finish”.
  • Page 35: Volume Creation Wizard

    Figure 3.2.1.6 Step 6: Done. 3.2.2 Volume creation wizard “Volume create wizard” has a smarter policy. When the system is inserted with some HDDs. “Volume create wizard” lists all possibilities and sizes in different RAID levels, it will use all available HDDs for RAID level depends on which user chooses. When system has different sizes of HDDs, e.g., 8*200G and 8*80G, it lists all possibilities and combination in different RAID level and different sizes.
  • Page 36 Figure 3.2.2.1 Step 2: Please select the combination of the RG capacity, or “Use default algorithm” for maximum RG capacity. After RG size is chosen, click “Next”. Figure 3.2.2.2...
  • Page 37 Step 3: Decide VD size. User can enter a number less or equal to the default number. Then click “Next”. Figure 3.2.2.3 Step 4: Confirmation page. Click “Finish” if all setups are correct. Then a VD will be created. Step 5: Done. The system is available now. Figure 3.2.2.4 (Figure 3.2.2.4: A virtual disk of RAID 0 is created and is named by system itself.)
  • Page 38: Chapter 4 Configuration

    Chapter 4 Configuration 4.1 Web UI management interface hierarchy The below table is the hierarchy of web GUI. System configuration System setting  System name / Date and time / System indication Network MAC address / Address / DNS / Port ...
  • Page 39: System Configuration

    Maintenance System  System information information Event log  Download / Mute / Clear Upgrade  Browse the firmware to upgrade Firmware Synchronize the slave controller’s firmware version with the  master’s synchronization Reset to factory  Sure to reset to factory default? default Import and Import/Export / Import file...
  • Page 40: Network Setting

    Figure 4.2.1.1 Check “Change date and time” to set up the current date, time, and time zone before using or synchronize time from NTP (Network Time Protocol) server. Click “Confirm” in System indication to turn on the system indication LED. Click again to turn off. 4.2.2 Network setting “Network setting”...
  • Page 41: Login Setting

    Figure 4.2.2.1 4.2.3 Login setting “Login setting” can set single admin, auto logout time and admin / user password. The single admin is to prevent multiple users access the same system in the same time. Auto logout: The options are (1) Disabled; (2) 5 minutes; (3) 30 minutes; (4) 1 hour. The system will log out automatically when user is inactive for a period of time.
  • Page 42: Mail Setting

    Figure 4.2.3.1 Check “Change admin password” or “Change user password” to change admin or user password. The maximum length of password is 12 characters. 4.2.4 Mail setting “Mail setting” can enter 3 mail addresses for receiving the event notification. Some mail servers would check “Mail-from address”...
  • Page 43: Notification Setting

    Figure 4.2.4.1 4.2.5 Notification setting “Notification setting” can set up SNMP trap for alerting via SNMP, pop-up message via Windows messenger (not MSN), alert via syslog protocol, and event log filter for web UI and LCM notifications.
  • Page 44 Figure 4.2.5.1 “SNMP” allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and default setting enables ERROR and WARNING event log in SNMP. There are many SNMP tools. The following web sites are for your reference: SNMPc: http://www.snmpc.com/ Net-SNMP:...
  • Page 45: Iscsi Configuration

    Most UNIX systems build in syslog daemon. “Event log filter” setting can enable event log display on “Pop up events” and “LCM”. 4.3 iSCSI configuration “iSCSI configuration” is designed for setting up the “Entity Property”, “NIC”, “Node”, “Session”, and “CHAP account”. Figure 4.3.1 4.3.1 “NIC”...
  • Page 46 Figure 4.3.1.2 Default gateway: • Default gateway can be changed by checking the gray button of LAN port, click “Become default gateway”. There can be only one default gateway. MTU / Jumbo frame: • MTU (Maximum Transmission Unit) size can be enabled by checking the gray button of LAN port, click “Enable jumbo frame”.
  • Page 47 LACP packets to the peer. The advantages of LACP are (1) increases the bandwidth. (2) failover when link status fails on a port. Trunking / LACP setting can be changed by clicking the button “Aggregation”. Figure 4.3.1.3 (Figure 4.3.1.3: There are 2 iSCSI data ports on each controller, select at least two NICs for link aggregation.) Figure 4.3.1.4 For example, LAN1 and LAN2 are set as Trunking mode.
  • Page 48: Entity Property

    Figure 4.3.1.5 (Figure 4.3.1.5 shows a user can ping host from the target to make sure the data port connection is well.) 4.3.2 Entity property “Entity property” can view the entity name of the system, and setup “iSNS IP” for iSNS (Internet Storage Name Service).
  • Page 49 Figure 4.3.3.1 CHAP: • CHAP is the abbreviation of Challenge Handshake Authentication Protocol. CHAP is a strong authentication method used in point-to-point for user login. It’s a type of authentication in which the authentication server sends the client a key to be used for encrypting the username and password.
  • Page 50 Figure 4.3.3.3 Go to “/ iSCSI configuration / CHAP account” page to create CHAP account. Please refer to next section for more detail. Check the gray button of “OP.” column, click “User”. Select CHAP user(s) which will be used. It’s a multi option; it can be one or more. If choosing none, CHAP can not work.
  • Page 51: Session

    Rename alias: • User can create an alias to one device node. Check the gray button of “OP.” column next to one device node. Select “Rename alias”. Create an alias for that device node. Click “OK” to confirm. An alias appears at the end of that device node. Figure 4.3.3.6 Figure 4.3.3.7 Tips...
  • Page 52: Chap Account

    DataSeginOrder(Data Sequence in Order) DataPDUInOrder(Data PDU in Order) 10. Detail of Authentication status and Source IP: port number. Figure 4.3.4.1 (Figure 4.3.4.1: iSCSI Session.) Check the gray button of session number, click “List connection”. It can list all connection(s) of the session. Figure 4.3.4.2 (Figure 4.3.4.2: iSCSI Connection.) 4.3.5...
  • Page 53: Volume Configuration

    Figure 4.3.5.1 Click “OK”. Figure 4.3.5.2 Click “Delete” to delete CHAP account. 4.4 Volume configuration “Volume configuration” is designed for setting up the volume configuration which includes “Physical disk”, “RAID group”, “Virtual disk”, “Snapshot”, “Logical unit”, and “Replication”. Figure 4.4.1...
  • Page 54: Physical Disk

    4.4.1 Physical disk “Physical disk” can view the status of hard drives in the system. The followings are operational steps: Check the gray button next to the number of slot, it will show the functions which can be executed. Active function can be selected, and inactive functions show up in gray color and cannot be selected.
  • Page 55 Figure 4.4.1.3 (Figure 4.4.1.3: Physical disks in slot 1,2,3 are created for a RG named “RG-R5”. Slot 4 is set as dedicated spare disk of the RG named “RG-R5”. The others are free disks.) Step 4: The unit of size can be changed from (GB) to (MB). It will display the capacity of hard drive in MB.
  • Page 56 “Failed”  the hard drive is failed.  “Error Alert”  S.M.A.R.T. error alert.  “Read Errors”  the hard drive has unrecoverable read  errors. Usage The usage of hard drive: “RAID disk”  This hard drive has been set to ...
  • Page 57: Raid Group

    Set Dedicated Set a hard drive to dedicated spare of the selected RG. spares Upgrade Upgrade hard drive firmware. Disk Scrub Scrub the hard drive. Turn on/off the Turn on the indication LED of the hard drive. Click again to turn indication LED off.
  • Page 58 Step 2: Confirm page. Click “OK” if all setups are correct. Figure 4.4.2.2 (Figure 4.4.2.2: There is a RAID 0 with 4 physical disks, named “RG-R0”. The second RAID group is a RAID 5 with 3 physical disks, named “RG-R5”.) Step 3: Done.
  • Page 59 Health The health of RAID group: “Good”  the RAID group is good.  “Failed”  the RAID group fails.  “Degraded”  the RAID group is not healthy and not  completed. The reason could be lack of disk(s) or have failed disk RAID The RAID level of the RAID group.
  • Page 60: Virtual Disk

    property Write cache: “Enabled”  Enable disk write cache. (Default)  “Disabled”  Disable disk write cache.  Standby: “Disabled”  Disable auto spin-down. (Default)  “30 sec / 1 min / 5 min / 30 min”  Enable hard drive ...
  • Page 61 Figure 4.4.3.1 Caution If shutdown or reboot the system when creating VD, the erase process will stop. Step 2: Confirm page. Click “OK” if all setups are correct. Figure 4.4.3.2 (Figure 4.4.3.2: Create a VD named “VD-01”, from “RG-R0”. The second VD is named “VD-02”, it’s initializing.) Step 3: Done.
  • Page 62 VD column description: • The button includes the functions which can be executed. Name Virtual disk name. Size (GB) Total capacity of the virtual disk. The unit can be displayed in (MB) GB or MB. Write The right of virtual disk: “WT”...
  • Page 63 Clone The target name of virtual disk. Schedule The clone schedule of virtual disk: Health The health of virtual disk: “Optimal”  the virtual disk is working well and there is  no failed disk in the RG. “Degraded”  At least one disk from the RG of the Virtual ...
  • Page 64 / … / 100. Delete Delete the virtual disk. Set property Change the VD name, right, priority, bg rate and read ahead. Right: “WT”  Write Through.  “WB”  Write Back. (Default)  “RO”  Read Only.  Priority: “HI”...
  • Page 65: Snapshot

    Stop clone Stop clone function. Schedule Set clone function by schedule. clone Set snapshot Set snapshot space for taking snapshot. Please refer to next space chapter for more detail. Cleanup Clean all snapshots of a VD and release the snapshot space. snapshot Take Take a snapshot on the virtual disk.
  • Page 66 Figure 4.4.4.2 (Figure 4.4.4.2: “VD-01” snapshot space has been created, snapshot space is 15GB, and used 1GB for saving snapshot index.) Step 3: Take a snapshot. In “/ Volume configuration / Snapshot”, click “Take snapshot”. It will link to next page. Enter a snapshot name. Figure 4.4.4.3 Step 4: Expose the snapshot VD.
  • Page 67 Step 5: Attach a LUN to a snapshot VD. Please refer to the next section for attaching a LUN. Step 6: Done. Snapshot VD can be used. Snapshot column description: • The button includes the functions which can be executed. Name Snapshot VD name.
  • Page 68: Logical Unit

    Delete Delete the snapshot VD. Attach Attach a LUN. Detach Detach a LUN. List LUN List attached LUN(s). 4.4.5 Logical unit “Logical unit” can view, create, and modify the status of attached logical unit number(s) of each VD. User can attach LUN by clicking the “Attach”. “Host” must enter with an iSCSI node name for access control, or fill-in wildcard “*”, which means every host can access the volume.
  • Page 69: Example

    LUN operation description: • Attach Attach a logical unit number to a virtual disk. Detach Detach a logical unit number from a virtual disk. The matching rules of access control are followed from the LUN’ created time; the earlier created LUN is prior to the matching rules. For example: there are 2 LUN rules for the same VD, one is “*”, LUN 0;...
  • Page 70 Figure 4.4.6.1 Select “/ Volume configuration / RAID group”. Click “Create“. Input a RG Name, choose a RAID level from the list, click “Select PD“ to choose the RAID physical disks, then click “OK“. Check the setting. Click “OK“ if all setups are correct. Done.
  • Page 71 Figure 4.4.6.3 Select “/ Volume configuration / Virtual disk”. Click “Create”. Input a VD name, choose a RG Name and enter a size for this VD; decide the stripe height, block size, read / write mode, bg rate, and set priority, finally click “OK”. Done.
  • Page 72 Figure 4.4.6.5 Select a VD. Input “Host” IQN, which is an iSCSI node name for access control, or fill-in wildcard “*”, which means every host can access to this volume. Choose LUN and permission, and then click “OK”. Done. Figure 4.4.6.6 Tips The matching rules of access control are from the LUNs’...
  • Page 73 Figure 4.4.6.7 (Figure 4.4.6.7: Slot 4 is set as a global spare disk.) Step 5: Done. Delete VDs, RG, please follow the below steps. Step 6: Detach a LUN from the VD. In “/ Volume configuration / Logical unit”, Figure 4.4.6.8 Check the gray button next to the LUN;...
  • Page 74: Enclosure Management

    To delete a RAID group, please follow the procedures: Select “/ Volume configuration / RAID group”. Select a RG which all its VD are deleted, otherwise the this RG cannot be deleted. Check the gray button next to the RG number click “Delete”. There will pop up a confirmation page, click “OK”.
  • Page 75: Hardware Monitor

    4.5.1 Hardware monitor “Hardware monitor” can view the information of current voltages and temperatures. Figure 4.5.1.1...
  • Page 76: Ups

    If “Auto shutdown” is checked, the system will shutdown automatically when voltage or temperature is out of the normal range. For better data protection, please check “Auto Shutdown”. For better protection and avoiding single short period of high temperature triggering auto shutdown, the system use multiple condition judgments to trigger auto shutdown, below are the details of when the Auto shutdown will be triggered.
  • Page 77 Figure 4.5.2.2 (Figure 4.5.2.2: With Smart-UPS.) UPS column description: • Select UPS Type. Choose Smart-UPS for APC, None for other UPS Type vendors or no UPS. When below the setting level, system will shutdown. Setting Shutdown level to “0” will disable UPS. Battery Level (%) If power failure occurs, and system power can not recover, the...
  • Page 78: Ses

    Battery Current power percentage of battery level. Level (%) 4.5.3 SES represents SCSI Enclosure Services, one of the enclosure management standards. “SES configuration” can enable or disable the management of SES. Figure 4.5.3.1 (Figure 4.5.1.1: Enable SES in LUN 0, and can be accessed from every host) The SES client software is available at the following web site: SANtools: http://www.santools.com/...
  • Page 79: System Maintenance

    Figure 4.5.4.1 (SAS drives & SATA drives) 4.6 System maintenance “Maintenance” allows the operations of system functions which include “System information” to show the system version and details, “Event log” to view system event logs to record critical events, “Upgrade” to the latest firmware, “Firmware synchronization”...
  • Page 80: Event Log

    Status description: • Normal Dual controllers are in normal stage. Degraded One controller fails or has been plugged out. Lockdown The firmware of two controllers is different or the size of memory of two controllers is different. Single Single controller mode. 4.6.2 Event log “Event log”...
  • Page 81 The event log is displayed in reverse order which means the latest event log is on the first / top page. The event logs are actually saved in the first four hard drives; each hard drive has one copy of event log. For one system, there are four copies of event logs to make sure users can check event log any time when there are failed disks.
  • Page 82: Upgrade

    4.6.3 Upgrade “Upgrade” can upgrade controller firmware, JBOD firmware, change operation mode, and activate Replication license. Figure 4.6.3.1 Please prepare new controller firmware file named “xxxx.bin” in local hard drive, then click “Browse” to select the file. Click “Confirm”, it will pop up a warning message, click “OK”...
  • Page 83: Reset To Factory Default

    master ones no matter what the firmware version of slave controller is newer or older than master. In normal status, the firmware versions in controller 1 and 2 are the same as below figure. Figure 4.6.4.1 4.6.5 Reset to factory default “Reset to factory default”...
  • Page 84: Reboot And Shutdown

    Import: Import all system configurations excluding volume configuration. Export: Export all configurations to a file. Caution “Import” will import all system configurations excluding volume configuration; the current configurations will be replaced. 4.6.7 Reboot and shutdown “Reboot and shutdown” can “Reboot” and “Shutdown” the system. Before power off, it’s better to execute “Shutdown”...
  • Page 85: Mute

    For security reason, please use “Logout” to exit the web UI. To re-login the system, please enter username and password again. 4.7.3 Mute Click “Mute” to stop the alarm when error occurs.
  • Page 86: Chapter 5 Advanced Operations

    But rebuilding in the same failed disk may impact customer data if the status of disk is unstable. D-LINK suggests all customers not to rebuild in the failed disk for better data protection.
  • Page 87 Rebuild operation description: • RAID 0 Disk striping. No protection for data. RG fails if any hard drive fails or unplugs. RAID 1 Disk mirroring over 2 disks. RAID 1 allows one hard drive fails or unplugging. Need one new hard drive to insert to the system and rebuild to be completed.
  • Page 88: Rg Migration

    5.2 RG migration To migrate the RAID level, please follow below procedures. Select “/ Volume configuration / RAID group”. Check the gray button next to the RG number; click “Migrate”. Change the RAID level by clicking the down arrow to “RAID 5”. There will be a pup- up which indicates that HDD is not enough to support the new setting of RAID level, click “Select PD”...
  • Page 89: Vd Extension

    5.3 VD extension To extend VD size, please follow the procedures. Select “/ Volume configuration / Virtual disk”. Check the gray button next to the VD number; click “Extend”. Change the size. The size must be larger than the original, and then click “OK” to start extension.
  • Page 90: Create Snapshot Volume

    any unfortunate reason it might be (e.g. virus attack, data corruption, human errors and so on). Snap VD is allocated within the same RG in which the snapshot is taken, we suggest to reserve 20% of RG size or more for snapshot space. Please refer to the following figure for snapshot concept.
  • Page 91: Auto Snapshot

    Figure 5.4.1.1 Check the gray button next to the Snapshot VD number; click “Expose”. Enter a capacity for snapshot VD. If size is zero, the exposed snapshot VD is read only. Otherwise, the exposed snapshot VD can be read / written, and the size is the maximum capacity for writing.
  • Page 92: Rollback

    Figure 5.4.2.1 (Figure 5.4.2.1: It will take snapshots every month, and keep the last 32 snapshot copies.) Tips Daily snapshot will be taken at every 00:00. Weekly snapshot will be taken every Sunday 00:00. Monthly snapshot will be taken every first day of month 00:00.
  • Page 93: Snapshot Constraint

    5.4.4 Snapshot constraint D-LINK snapshot function applies Copy-on-Write technique on UDV/VD and provides a quick and efficient backup methodology. When taking a snapshot, it does not copy any data at first time until a request of data modification comes in. The snapshot copies the original data to snapshot space and then overwrites the original data with new changes.
  • Page 94 On Linux and UNIX platform, a command named sync can be used to make the operating system flush data from write caching into disk. For Windows platform, Microsoft also provides a tool – sync, which can do exactly the same thing as the sync command in Linux/UNIX.
  • Page 95: Disk Roaming

    When a snapshot has been rollbacked, the other snapshots which are earlier than it will also be removed. But the rest snapshots will be kept after rollback. If a snapshot has been deleted, the other snapshots which are earlier than it will also be deleted. The space occupied by these snapshots will be released after deleting.
  • Page 96 Figure 5.6.1 Create two virtual disks (VD) “SourceVD_R5” and “TargetVD_R6”. The raid type of backup target needs to be set as “BACKUP”. Figure 5.6.2 Here are the objects, a Source VD and a Target VD. Before starting clone process, it needs to deploy the VD Clone rule first.
  • Page 97 Figure 5.6.4 Snapshot space:  Figure 5.6.5 This setting is the ratio of source VD and snapshot space. The default ratio is 2 to 1. It means when the clone process is starting, the system will automatically use the free RG space to create a snapshot space which capacity is double the source VD. Threshold: (The setting will be effective after enabling schedule clone) ...
  • Page 98 Caution The default snapshot space allocated by the IP SAN storage is two times the size of source virtual disk. That is the best value of D-LINK’s suggestion. If user sets snapshot space by manually and lower than the default value, user should take the risk if the snapshot space is not enough and VD clone job will fail.
  • Page 99 Figure 5.6.9 Now, the clone target “TargetVD_R6” has been set. Figure 5.6.10 Click “Start clone”, the clone process will start. Figure 5.6.11 The default setting will create a snapshot space automatically which the capacity is double size of the VD space. Before starting clone, system will initiate the snapshot space.
  • Page 100 Figure 5.6.12 10. After initiating the snapshot space, it will start cloning. Figure 5.6.13 11. Click “Schedule clone” to set up the clone by schedule. Figure 5.6.14 12. There are “Set Clone schedule” and “Clear Clone schedule” in this page. Please remember that “Threshold”...
  • Page 101 Figure 5.6.15 Run out of snapshot space while VD clone • While the clone is processing, the increment data of this VD is over the snapshot space. The clone will complete, but the clone snapshot will fail. Next time, when trying to start clone, it will get a warning message “This is not enough of snapshot space for the operation”.
  • Page 102 VD Clone Schedule clone Check threshold Manually start every hour clone by user Run out of Run out of snapshot space snapshot space Auto delete old Manually release clone snapshot snapshot space Auto restart an Restart clone hour later by user Start clone process with fully copy...
  • Page 103: Sas Jbod Expansion

    5.7.1 Connecting JBOD D-LINK controller suports SAS JBOD expansion to connect extra SAS dual JBOD controller. When connecting to a dual JBOD which can be detected, it will be displayed in “Show PD for:” of “/ Volume configuration / Physical disk”. For example, Local, JBOD 1 (D- LINK DSN-6020), JBOD 2 (D-LINK DSN-6020), …etc.
  • Page 104 Figure 5.7.1.2 Figure 5.7.1.3 “/ Enclosure management / S.M.A.R.T.” can display S.M.A.R.T. information of all PDs, including Local and all SAS JBODs. Figure 5.7.1.4 (Figure 5.7.1.4: Disk S.M.A.R.T. information of JBOD 1, although S.M.A.R.T. supports SATA disk only.)
  • Page 105: Upgrade Firmware Of Jbod

    The following table is the maximum JBOD numbers and maximum HDD numbers with different chassises can be cascaded. Dual controllers +Dual JBOD RAID Storage System DSN-6120 DSN-6020 no. Max HDD no. 5.7.2 Upgrade firmware of JBOD To upgrade the firmware of JBOD, please follow the procedures.
  • Page 106: Mpio And Mc/S

    5.8 MPIO and MC/S These features come from iSCSi initiator. They can be setup from iSCSI initiator to establish redundant paths for sending I/O from the initiator to the target. MPIO: In Microsoft Windows server base system, Microsoft MPIO driver allows initiators to login multiple sessions to the same target and aggregate the duplicate devices into a single device.
  • Page 107 Figure 5.8.2 Difference: MC/S is implemented on iSCSI level, while MPIO is implemented on the higher level. Hence, all MPIO infrastructures are shared among all SCSI transports, including Fiber Channel, SAS, etc. MPIO is the most common usage across all OS vendors. The primary difference between these two is which level the redundancy is maintained.
  • Page 108: Trunking And Lacp

    LACP packets to the peer. Theoretically, LACP port can be defined as active or passive. D-LINK IP SAN Storage implements it as active mode which means that LACP port sends LACP protocol packets automatically. Please notice that using the same configurations between D-LINK controller and gigabit switch.
  • Page 109: Dual Controllers (Only For Dsn-6410 With Dsn-640)

    Figure 5.9.2 Caution Before using trunking or LACP, he gigabit switch must support trunking or LACP and enabled. Otherwise, host can not connect the link with storage device. 5.10 Dual controllers (only for DSN-6410 with DSN-640) 5.10.1 Perform I/O Please refer to the following topology and have all the connections ready. To perform I/O on dual controllers, server/host should setup MPIO.
  • Page 110: Ownership

    Figure 5.10.1.1 5.10.2 Ownership When creating RG, it will be assigned with a prefered owner, the default owner is controller 1. To change the RG ownership, please follow the procedures. Select “/ Volume configuration / RAID group”. Check the gray button next to the RG name; click “Set preferred owner”. The ownership of the RG will be switched to the other controller.
  • Page 111: Controller Status

    Figure 5.10.2.2 (Figure 5.10.2.2: The RG ownership is changed to the other controller.) 5.10.3 Controller status There are four statuses described on the following. It can be found in “/ System maintenance / System information”. Normal: Dual controller mode. Both of controllers are functional. Degraded: Dual controller mode.
  • Page 112: Replication

    5.11 Replication Replication function will help users to replicate data easily through LAN or WAN from one IP SAN storage to another. The procedures of Replication are on the following: 1. Copy all data from source VD to target VD at the beginning (full copy). 2.
  • Page 113 3. If you want the replication port to be on special VLAN section, you may assign VLAN ID to the replication port. The setting will automatically duplicate to the other controller. Create backup virtual disk on the target IP SAN storage •...
  • Page 114 Figure 5.11.4 Create replication job on the source IP SAN storage • 1. If the license key is activated on the IP SAN storage correctly, a new Replication tab will be added on the Web UI. Click “Create” to create a new replication job. Figure 5.11.5 2.
  • Page 115 Figure 5.11.7 4. The Replication uses standard iSCSI protocol for data replication. User has to log on the iSCSI node to create the iSCSI connection for the data transmission. Enter the CHAP information if necessary and select the target node to log no. Click “Next” to continue.
  • Page 116 Figure 5.11.9 6. A new replication job is created and listed on the Replication page. Figure 5.11.10 Run the replication job • 1. Click the “OP.” button on the replication job to open operation menu. Click “Start” to run the replication job. Figure 5.11.11 2.
  • Page 117 Figure 5.11.12 3. User can monitor the replication job from the “Status” information and the progress is expressed by percentage. Figure 5.11.13 Create multi-path on the replication job • 1. Click the “Create multi-path” in the operation menu of the replication job. Figure 5.11.14 2.
  • Page 118 Figure 5.11.15 3. Select the iSCSI node to log on and click “Next”. Figure 5.11.16 4. Choose the same target virtual disk and click “Next”.
  • Page 119 Figure 5.11.17 5. A new target will be added in this replication job as a redundancy path. Figure 5.11.18 Configure the replication job to run by schedule • 1. Click “Schedule” in the operation menu of the replication job. Figure 5.11.19...
  • Page 120 Configure the snapshot space • The Replication uses Snapshot technique of D-LINK, to help user to replicate the data without stop accessing to the source virtual disk. If the snapshot space is not configured on the source virtual disk in advance, the IP SAN storage will allocate snapshot space for the source virtual disk automatically when the replication job is created.
  • Page 121 Figure 5.11.21 There are three settings in the Replication configuration menu, Figure 5.11.22 “Snapshot space” specifies the ratio of snapshot space allocated to the source virtual disk automatically when the snapshot space is not configured in advance. The default ratio is 2 to 1.
  • Page 122: Vlan

    5.12 VLAN VLAN (Virtual Local Area Network) is a logical grouping mechanism implemented on switch device using software rather than a hardware solution. VLANs are collections of switching ports that comprise a single broadcast domain. It allows network traffic to flow more efficiently within these logical subgroups.
  • Page 123 Figure 5.12.2 4. VLAN ID 66 for LAN2 is set properly. Figure 5.12.3 Assign VLAN ID to LAG(Trunking or LACP) • 1. After creating LAG, press “OP” button next to the LAG, and select “Set VLAN ID”. Figure 5.12.4 2. Put in the VLAN ID and click ok. VLAN ID of LAG 0 is properly set.
  • Page 124 Figure 5.12.5 3. If iSCSI ports are assigned with VLAN ID before creating aggregation takes place, aggregation will remove VLAN ID. You need to repeat step 1 and step 2 to set VLAN ID for the aggregation group. Assign VLAN ID to replication port •...
  • Page 125: Chapter 6 Troubleshooting

    Chapter 6 Troubleshooting 6.1 System buzzer The system buzzer features are listed below: The system buzzer alarms 1 second when system boots up successfully. The system buzzer alarms continuously when there is error occurred. The alarm will be stopped after error resolved or be muted. The alarm will be muted automatically when the error is resolved.
  • Page 126 ERROR SATA PRD mem fail Failed to init SATA PRD memory manager ERROR SATA revision id fail Failed to get SATA revision id ERROR SATA set reg fail Failed to set SATA register ERROR SATA init fail Core failed to initialize the SATA adapter ERROR SATA diag fail SATA Adapter diagnostics failed...
  • Page 127 RMS events • Level Type Description INFO Console Login <username> login from <IP or serial console> via Console INFO Console Logout <username> logout from <IP or serial console> via Console INFO Web Login <username> login from <IP> via Web UI INFO Web Logout <username>...
  • Page 128 ERROR VD move failed Failed to complete move of VD <name>. INFO RG activated RG <name> has been manually activated. INFO RG deactivated RG <name> has been manually deactivated. INFO VD rewrite started Rewrite at LBA <address> of VD <name> starts. INFO VD rewrite finished Rewrite at LBA <address>...
  • Page 129 INFO VD erase started VD <name> starts erasing process. Snapshot events • Level Type Description WARNING Snap mem Failed to allocate snapshot memory for VD <name>. WARNING Snap space Failed to allocate snapshot space for VD <name>. overflow WARNING Snap threshold The snapshot space threshold of VD <name>...
  • Page 130 INFO PD upgrade started JBOD <name> PD [<string>] starts upgrading firmware process. INFO PD upgrade JBOD <name> PD [<string>] finished upgrading firmware finished process. WARNING PD upgrade failed JBOD <name> PD [<string>] upgrade firmware failed. INFO PD freed JBOD <name> PD <slot> has been freed from RG <name>. INFO PD inserted JBOD <name>...
  • Page 131 System maintenance events • Level Type Description INFO System shutdown System shutdown. INFO System reboot System reboot. INFO System console System shutdown from <string> via Console UI shutdown INFO System web System shutdown from <string> via Web UI shutdown INFO System button System shutdown via power button shutdown...
  • Page 132 Level Type Description INFO VD clone started VD <name> starts cloning process. INFO VD clone finished VD <name> finished cloning process. WARNING VD clone failed The cloning in VD <name> failed. INFO VD clone aborted The cloning in VD <name> was aborted. INFO VD clone set The clone of VD <name>...
  • Page 133: Appendix

    Appendix A. Certification list iSCSI Initiator (Software) • Software/Release Number Microsoft Microsoft iSCSI Software Initiator Release v2.08 Windows System Requirements: Windows 2000 Server with SP4 Windows Server 2003 with SP2 Windows Server 2008 with SP2 Linux The iSCSI Initiators are different for different Linux Kernels. For Red Hat Enterprise Linux 3 (Kernel 2.4), install linux-iscsi-3.6.3.tar For Red Hat Enterprise Linux 4 (Kernel 2.6), use the build-in iSCSI initiator iscsi-initiator-utils-4.0.3.0-4 in kernel 2.6.9...
  • Page 134 D-Link All D-Link Managed Gigabit Switches Avago AFBR-703SDZ (10 Gb/s SFP transceiver, 850nm) Finisar FTLX8571D3BCV (10 Gb/s SFP transceiver, 850nm) 10GbE Switch • Vendor Model Dell PowerConnect 8024F (24x SFP+ 10Gb with 4x Combo Ports of 10GBASE-T) ProCurve 2910al-24G J9145A (4x 10GbE J9149A CX4 Ports, 24x 10/100/1000...
  • Page 135 Vendor Model Hitachi Deskstar 7K250, HDS722580VLSA80, 80GB, 7200RPM, SATA, 8M Hitachi Deskstar E7K500, HDS725050KLA360, 500GB, 7200RPM, SATA II, 16M Hitachi Deskstar 7K80, HDS728040PLA320, 40GB, 7200RPM, SATA II, 2M Hitachi Deskstar T7K500, HDT725032VLA360, 320GB, 7200RPM, SATA II, 16M Hitachi Deskstar P7K500, HDP725050GLA360, 500GB, 7200RPM, SATA II, 16M (F/W: K2A0AD1A) Hitachi Deskstar E7K1000, HDE721010SLA330, 1TB, 7200RPM, SATA 3.0Gb/s, 32MB,...
  • Page 136: Microsoft Iscsi Initiator

    Vendor Model Seagate Constellation, ST9500530NS, 500GB, 7200RPM, SATA 3.0Gb/s, 32M (F/W: SN02) B. Microsoft iSCSI initiator Here is the step by step to setup Microsoft iSCSI Initiator. Please visit Microsoft website for latest iSCSI initiator. This example is based on Microsoft Windows Server 2008 R2. Connect •...
  • Page 137 Figure B.2 Figure B.3 It can connect to an iSCSI disk now. MPIO • If running MPIO, please continue. Click “Discovery” tab to connect the second path. Click “Discover Portal”. Input IP address or DNS name of the target.
  • Page 138 Figure B.4 Figure B.5 Click “OK”. Figure B.6 Figure B.7...
  • Page 139 Click “Targets” tab, select the second path, and then click “Connect”. 10. Enable “Enable multi-path” checkbox. Then click “OK”. 11. Done, it can connect to an iSCSI disk with MPIO. MC/S • 12. If running MC/S, please continue. 13. Select one target name, click “Properties…”. 14.
  • Page 140 Figure B.10 Figure B.11 17. Select Initiator IP and Target portal IP, and then click “OK”. 18. Click “Connect”. 19. Click “OK”. Figure B.12 Figure B.13 20. Done.
  • Page 141 Disconnect • 21. Select the target name, click “Disconnect”, and then click “Yes”. Figure B.14 22. Done, the iSCSI device disconnect successfully.
  • Page 142: From Single Controller To Dual Controller

    C. From single controller to dual controllers This SOP applies to upgrading from the DSN-6410 to DSN-6410 with DSN-640. Before you do this, please make sure that the DSN-6410 is properly installed according to the manuals, especially the HDD trays. If you are using hard drives, you need to use HDD trays with either multiplexer board or bridge board to install your HDDs in order to...
  • Page 143 Please follow the steps below to upgrade to dual controller mode. Step 1 Go to “Maintenance\System”. Copy the IP SAN storage serial number. Step 2 Go to “Maintenance\Upgrade” and paste the serial number into “Controller Mode” section. Select “Dual” as operation mode.
  • Page 144 Step 3 Click “confirm”. The system will ask you to shutdown. Please shutdown IP SAN storage. Click Ok.
  • Page 145 Go to “Maintenance\Reboot and shutdown”. Click “Shutdown” to shutdown the system. Click Ok.
  • Page 146 Step 4 Power off the DSN-6410. Insert the second controller to the IP SAN storage. And then power on the system. The IP SAN storage should now become in dual controller mode as the DSN-6410 with DSN-640. You may go to “Maintenance\System information” to check out. The IP SAN storage is running in dual controller mode now.

This manual is also suitable for:

Dsn-640Dsn-6410Dsn-654Dsn-6420Dsn-6410w/640

Table of Contents