Asustor AS6212RD Bedienungsanleitung

Asustor Server AS6212RD

Lesen Sie kostenlos die 📖 deutsche Bedienungsanleitung für Asustor AS6212RD (133 Seiten) in der Kategorie Server. Dieser Bedienungsanleitung war für 10 Personen hilfreich und wurde von 2 Benutzern mit durchschnittlich 4.5 Sternen bewertet

Seite 1/133
User Guide
For Network Attached Storage
Ver. 4.0.0514 (For ADM 3.4) 3.
4
Introduction
Thank you for choosing ASUSTOR network attached storage
(NAS).
From cross-platform file sharing to multimedia server applications to App Central, ASUSTOR NAS
provides you with a rich assortment of features, allowing you to explore the unlimited potential of NAS.
ADM: The Amazing Starts Here
Your NAS comes preloaded with , an operating system developed by ASUSTOR Data Master (ADM)
ASUSTOR. Designed around the use of Apps, ADM s intuitive web-based interface allows for easy
organization and a user-friendly experience. This user manual will introduce you to all the rich
assortment of preloaded applications (Apps) on your NAS.
5
Your Ideal Private Cloud
ASUSTOR exclusive EZ Connects TM technology lets you access your NAS from almost anywhere on
the planet. Whether by computer or mobile device you need only an Internet connection to access
your NAS from anywhere and at any time.
Cross-Platform File Sharing
ASUSTOR NAS provides flawless cross-platform file sharing. No matter what operating system you
are using, you can still effortlessly connect to your NAS and access your data.
Embrace the Cloud, Enjoy Peace of Mind
Experience the convenience of cloud computing in a stress free environment. ASUSTOR s ADM
Defender and support for encryption provide the highest standard of security for your system.
7
iSCSI and Virtualization
Seamlessly integrate with any existing IT environments. Enjoy flexible and cost-efficient shared
storage. ASUSTOR NAS supports the use of iSCSI and NFS in addition to being verified as, Citrix and
Hyper-V ready.
Protect Our Planet with ASUSTOR
It is our mission to continue to develop exceptionally energy efficient products. From their inception,
all ASUTOR NAS products are designed and developed around ecologically friendly concepts. Features
such as, Night Mode, disk hibernation, power scheduling and fan control all help you to save power.
Furthermore, each ASUSTOR NAS is fully compliant with EuP standards (EuP 2.0).
8
Enrich Your Mobile Life
Imagine having your photos, media files and important documents always at your fingertips.
ASUSTOR offers an array of mobile applications to make your digital lifestyle complete.
App Central: Unleash the Unlimited Potential of NAS
The Apps that come pre-installed with ASUSTOR NAS are just the beginning. At your convenience,
browse through and download any additional Apps that peak your interest from App Central. Explore
the unlimited potential of ASUSTOR NAS while creating a personalized NAS for yourself.
Online Resources
Forum (English): http://forum.asustor.com
Downloads: http://www.asustor.com/service/downloads
Technical Support: http://support.asustor.com
Terms of Use
All ASUSTOR products have undergone stringent and comprehensive testing. Under normal user
operation and within the warranty period, ASUSTOR will assume responsibility for any hardware failures.
Before using this product, please read the End-User License Agreement (EULA) located at the end of
this user manual.
10
If you already know the IP address for your ASUSTOR NAS on your local area network, you can
directly enter it into your web browser to connect to your NAS. For example:
http://172.16.1.69:8000/
If you are connecting to your ASUSTOR NAS remotely, you can enter your personalized hostname
into your web browser to connect to your NAS. For example: http://john.myasustor.com:8000
Reminder: When connecting remotely, please remember to register your NAS and then
enable Connect under [Settings [ -Connect] [Enable -Connect Service]. EZ ] EZ EZ
After configuring a Cloud ID for your NAS, you will be able to connect to it remotely using your
customized hostname.
11
Searchlight
Developed by ASUSTOR, Searchlight is a rapid search technology that is built into ADM and provides
quick and precise searches allowing you to easily find the files that you need. After logging in to ADM
you will be able to find Searchlight’s magnifying glass icon on the taskbar in the upper right-hand corner
of the screen.
13
Pre-Installed Apps
Pre-installed Apps include the configuration of function and service settings for hard disks and hardware.
You can configure everything from system related settings to user access rights.
Settings
General
Here you can manage the system HTTP port and auto logout settings. Auto logout will logout users if
they remain idle past the specified period of time.
System HTTP Port: This is used to specify the port you wish to use to connect to ADM’s web based
user interface. You can access your NAS by opening a web browser and entering your IP address
followed by a colon and the specified port number.
For example: http://192.168.1.168:8000
Timeout timer: For security concerns, users that remain idle past the specified period of time after
logging on will be automatically logged off.
14
Sign in page: Under Sign In Page Style you will be able to configure the following:
Sign In Page Title: The text entered here will be displayed on the sign in page.
Sign In Page Background Image: Here you can change the background image of the sign in
page. The image formats currently supported are: JPG
Sign In Page Customized Image: Here you can choose to enable or disable the sign in page
customized image. Using the crop function you can configure the position and size of the customized
image. The image formats currently supported are: JPG
Network
Note: This function may differ depending on the NAS model in use.
Here you can configure the server name, LAN and Wi-Fi settings. Other settings include IP address,
DNS server and default gateway.
23
Warning: Push notifications are transmitted to your device from Apple/Google’s push
notification servers. A poor Internet connection or abnormalities in Apple/Google’s push
notification service could potentially prevent AiMaster from correctly receiving notifications.
ADM Defender
ADM Defender can protect your NAS from malicious Internet attacks, ensuring the security of your
system.
Firewall: Here you can block specific IP addresses or only allow specific IP addresses to access your
NAS.
Trusted List: The IP(s) specified in the trusted list will not be blocked by the black list or after
multiple failed login attempts.
24
Auto Black List: After enabling this function, the client IP address will be blocked if there are too
many unsuccessful login attempts within the specified time period.
Black and White List: The Black and White list can be defined using IP address, range, and
geolocation. If you wish to define the Black and White list using geolocation, please first install the
Geo IP Database App.
About the Black and White List
The Black and White List can protect you from malicious attacks and prevent hackers from trying to
access your NAS. Supported protocols are as follows:
ADM system login (HTTP & HTTPS)
Windows File Service (CIFS/SAMBA)
Apple Filing Protocol (AFP)
File Transfer Protocol (FTP)
Secure Shell (SSH)
Certificate Manager
Using Certificate Manager, you can import a valid certificate to establish an SSL connection. All
communication data (including identity credentials and transmitted information) among your NAS
and all clients will be automatically encrypted over the SSL connection. This helps prevent the data
from being eavesdropped on or modified over Internet. SSL applicable services on ASUSTOR NAS
include:
ADM management connections (HTTPS)
Web server connections (HTTPS)
FTP server connections (FTPS)
Mail server connections (POP3s, IMAPs)
25
The Certificate Manager in ASUSTOR NAS can directly connect to Let’s Encrypt to generate a valid
certificate and install it automatically. This helps you to enhance NAS security with an SSL connection
in a fast and easy way at zero cost. Moreover, before the Let’s Encrypt issued certificate expires,
Certificate Manager can be configured to perform an automatic renewal.
See More
NAS 324 - Using HTTPS to Secure NAS Communication
ADM Update
Here you can obtain the latest version of ADM to ensure system stability and to upgrade software
features.
Live Update: After enabling Live Update, the system will notify you of any available updates when
you log in to ADM.
Set automatic scheduled updates: After enabling this option, the system will automatically check
for available updates for Apps during the configured time. If updates are available, the system will
automatically proceed to download and install them.
Note: If, during ASUSTOR App upgrades, the system shuts down or the upgrades are
interrupted due to unknown causes, the system will attempt the upgrades again at the next
scheduled time.
Manual Update: You can go to ASUSTOR’s official website http://www.asustor.com to download
the latest version of ADM.
Network Recycle Bin
In order to enable the Network Recycle Bin for specific shared folders, please select Access Control”
> “Shared Folders”, and then select the desired shared folder. Next, click on the “Edit” button to
configure it.
26
The configurations made on the Recycle Bin” and Empty Recycle Bin” tabs will be applied to all
enabled Network Recycle Bins.
About Network Recycle Bin
After enabling Network Recycle Bin, all files deleted via the following protocols will be moved to the
Recycle Bin.
Windows File Service (CIFS/SAMBA)
Apple Filing Protocol (AFP)
File Transfer Protocol (FTP)
File Explorer
WebDAV
Energy Saver
Energy Saver can help you to reduce power consumption when your NAS is inactive or being lightly
used.
27
EZ-Connect
Here you can configure all the necessary settings for remote access.
EZ-Connect: Here you can obtain a Cloud ID for your NAS. By entering the Cloud ID into
ASUSTOR client applications, you can access your NAS without having to enter the host/IP
information.
Internet Passthrough: When your internal network environment contains multiple routers, you
will be unable to use your Cloud ID to connect to your NAS. This function can help you to create a
connection between the Internet and your NAS, allowing you to connect smoothly.
Manually Connect
30
Reminder: A valid ASUSTOR ID is required for downloading any apps from the App Central or
applying Cloud ID service.
Services
Here you can configure network related services such as FTP server, Web server and MySQL server.
Windows
After enabling Windows File Service, you can access your NAS via any Windows operating system
(i.e., Windows 7). Windows File Service is also known as CIFS or SAMBA. If you are using Windows
Active Directory (hereafter referred to as “AD”), you can add your NAS to your AD domain.
Workgroup: This is the workgroup on your local area network that your NAS belongs to.
WINS server: Microsoft Windows Internet Name Service (WINS) is a NetBIOS name- - -to IP
address mapping service. Window users will locate the system more easily on TCP/IP networks if
the system has been configured to register with a WINS server.
Max protocol for Windows File Service: Here you can set the highest SMB level that will be
supported by your ASUSTOR NAS depending on your network environment.
SMB 3: SMB 3 has been supported since Windows 8 and Windows Server 2012. It is the enhanced
version of SMB 2.
SMB 2: SMB (Server Message Block) 2 has been supported since Windows Vista and is the
enhanced version of SMB. SMB 2 adds the ability to compound multiple SMB actions into a single
request to reduce the number of network packets and enhance performance.
Local Master Browser: After enabling this option, your NAS will, from your local area network,
collect the names of all other computers in its workgroup.
Reminder: Enabling this feature may prevent your hard disk(s) from going into hibernation.
Allow only NTLMv2 authentication: NTLMv2 stands for NT LAN Manager version 2. When this
option is enabled, login to the shared folders by Microsoft Networking will only be allowed using
31
NTLMv2 authentication. If the option is disabled, NTLM (NT LAN Manager) will be used by default
and NTLMv2 can be negotiated by the client. The default setting is disabled.
Disable Opportunistic Locking: For networks that require multiple users concurrently accessing
the same file such as database, it is suggested to disable Opportunistic Locking. To prevent one
file being edited by multiple users simultaneously, such mechanism should be implemented in the
document processing software (for example, Microsoft Office programs).
Enable debug logging: When this option is enabled, detailed logs will be stored for debugging
purposes. Enabling this option affects system performance.
About Windows Active Directory
After successfully adding your NAS to your AD domain, you can then configure access rights using
the Domain Users, Domain Groups and Shared Folders settings found in the Access Control system
app (see section 3.4 Access Control). AD users can then use their own AD accounts to log in and
access the NAS.
S M EE ORE
NAS 102 - Introduction to File Transfer Protocols
NAS 106 Using NAS with Microsoft Windows
NAS 206 Using NAS with Windows Active Directory
Mac OS X
After enabling Mac OS X file service, you can access your NAS via any Mac OS X operating system (i.e.,
Mac OS X v10.7). This file transfer protocol is called AFP (Apple Filing Protocol). You can also use
Time Machine to back up data to your NAS.
Apple Filing Protocol (AFP): This is the protocol used when transferring files between Mac OS X
and local area networks. Go to the Finder and click “Go” in the Finder menu, then select “Connect
32
to Server.” This will bring up the Connect to Server dialog box. Here you can enter the IP address
that you want to connect to.
For example afp://192.168.1.168
Bonjour Service Name: Your NAS will be identified by this name in the Finder.
Time Machine Support: Here you can enable Time Machine support and select the shared folder
that you wish to back up to. If multiple Mac users wish to access this feature simultaneously, please
see NAS 159 Time Machine: Best Practice for guidance.
About Bonjour
Bonjour, also known as zero-configuration networking, has been widely used in Apple related
products. It will scan your vicinity for other Apple devices and then let you directly connect to them
without having to know their actual IP addresse s.
After enabling this service, you will be able to see your NAS in the left hand panel of the Finder under
“Shared”. Simply click on your NAS to connect to it.
See More
NAS 102 - Introduction to File Transfer Protocols
NAS 108 Using NAS with Apple Mac OS X
NAS 159 Time Machine: Best Practice
NFS
After enabling NFS, you will be able to access your NAS via UNIX or Linux operating systems.
35
About Passive FTP
Passive mode FTP can be used to overcome the problem of active mode FTP being blocked by
firewalls. Passive FTP makes the FTP client establish all connections to the FTP server, as opposed to
the web host supplying the return port. Firewalls typically allow passive FTP connections without
requiring additional configuration information.
See More
NAS 102 - Introduction to File Transfer Protocols
WebDAV
After enabling WebDAV you can access your NAS via HTTP or HTTPS protocol by using a Web browser
or other client programs.
37
Virtual Host: You can use this feature to simultaneously host several websites on your NAS.
Enable personal website: After enabling this, each NAS user can have their own dedicated
personal website. Before using this, you must first create a www folder within the Home folder and
then upload the associated files for your personal website to the www folder. Afterwards, you will
be able to connect to the site using the NAS IP (or DDNS URL) followed by adding ~username. For
example: http://192.168.1.100/~admin or cloudid.myasustor.com/~admin.
See More
NAS 321 Hosting Multiple Websites with a Virtual Host
38
MariaDB
ADM comes pre-installed with MariaDB, which you can use for website databases.
Reminder: You can manage your MariaDB server with phpMyAdmin which can be
downloaded and installed from App Central.
Reset Password: If you happen to forget your MariaDB login password, you can reset the
password for the “root” account (The default password is “admin”). This is also the default
administrator account.
Reinitialize Database: Here you can reinitialize your entire MariaDB database. Upon
reinitialization, all of your MariaDB databases will be erased.
About MariaDB
For the MariaDB administrator account, the default username is “root” and the default password is
“admin”. For security reasons, please remember to change the password for this account.
Terminal
You can enable SSH service if you wish to manage your NAS over Secure Shell (SSH). If you wish to
transfer data to your NAS through SFTP (Secure FTP) you can enable that here as well.
Note: For security reasons, SSH only allows the “admin” account or the “root” account to
log in. The passwords for both these accounts are identical.
43
In order to provide optimal storage space utilization and data protection, ADM supports multiple
RAID levels allowing you to select the appropriate level for your needs. The following volume types
levels are all supported by ADM:
Non-RAID Volume Types
Single: Only uses a single disk in the creation of storage space. This configuration does not offer any
type of data protection.
JBOD: An acronym for “just a bunch of disks”, JBOD uses a combination of two or more disks to
create storage space. The total storage capacity is the capacities of all the disks added together. The
advantage of this configuration is that it allows you to use different sized disks together and provides
a large amount of storage space. The downside is that it does not offer any sort of data protection.
RAID Volume Types
RAID 0: Uses a combination of two or more disks to create storage space. The total storage capacity
is the capacities of all the disks added together. The advantage of this configuration is that it allows
you to use different sized disks together and provides a large amount of storage space. Also, data in
RAID 0 volumes is accessed in parallel which provides improved performance. The downside is that
RAID 0 does not offer any sort of data protection.
RAID 1: In RAID 1 your data is written identically on two disks, thereby producing a “mirrored set”.
Exactly the same data is stored on the two disks at all times. RAID 1 protects your data from loss
should one of your disks fail. RAID 1’s advantage is that it offers protection for your data by
providing data redundancy. The downside of this configuration is that when combining two disks of
differing sizes, the total storage space will be equal to the size of the smaller disk. Therefore, you will
be unable to use a portion of the larger disk.
Total available storage space = (size of smaller disk) * (1)
RAID 5: Combines three or more disks to create a storage space that is able to support one failed
disk. Should one of your disks fail, your data will still be protected from loss. In the event of disk
failure, simply replace the failed disk with a new one. The new disk will automatically be
accommodated into the RAID 5 configuration. The advantage of using RAID 5 is that is that it
provides data protection through data redundancy. The downside to using RAID 5 is that when
combining disks of differing sizes, the total storage space will be calculated based on the size of the
smallest disk.
Total available storage space = (size of smallest disk) * (total number of disks – 1)
RAID 6: Combines four of more disks to create a storage space that is able to support two failed
disks. Should two of your disks fail, your data will still be protected from loss. In the event of disk
failure, simply replace the failed disks with new ones. The new disks will automatically be
accommodated into the RAID 6 configuration. The advantage of using RAID 6 is that it is able to
provide superior data protection through data redundancy. The downside to using RAID 6 is that
when combining disks of differing sizes, the total storage space will be calculated based on the size of
the smallest disk.
Total available storage space = (size of smallest disk) * (total number of disks – 2)
48
Note: When enabling mutual CHAP authentication, the authentication password used by
the server and client cannot be the sam e.
Mutual CHAP Authentication: Mutual CHAP authentication requires both the target and the
initiator to have usernames and passwords. When establishing a connection, the target and the
initiator will have to authenticate each other using their respective credentials.
LUN Pool: Here you can check on the status of all iSCSI LUNs and assign corresponding iSCSI
targets.
iSNS Server: iSNS (Internet Storage Name Service) iSCSI management. Here, you can register
iSCSI targets with the iSNS Server, for convenient centralized management.
See More
NAS 308 – Introduction to iSCSI
iSCSI LUN
This tab allows you to create/remove, mount/unmount iSCSI LUNs, and create/manage LUN
snapshots.
MyArchive
Note: This function may differ depending on the NAS model in use.
49
MyArchive is a function designed especially for data management and sharing, giving you added
flexibility when using multiple hard disks for data backup or exchange. When MyArchive hard disks
have been inserted into the MyArchive disk bay, you will immediately be able to access the data on the
hard disk.
MyArchive Hard Disk: Users will need to first convert hard disks into MyArchive hard disks before
being able to use the MyArchive function.
File System: Supported file systems are as follows:
EXT4: for use with Linux
NTFS: for use with Windows
HFS+: for use with Mac OS X
Alias name: Here you can define tags for MyArchive disks. This allows users to quickly determine
the contents of MyArchive disks from within ADM File Explorer when multiple disks are mounted
simultaneously.
MyArchive Encryption: Here you can choose whether or not you want to encrypt this MyArchive
and whether or not you want to auto-mount it at system startup. Should you choose to encrypt this
MyArchive, after the system restarts, you will have to manually enter the password for the MyArchive
in order to access it. Encrypted MyArchives are normally used for the storage of critical or
confidential data. Should you lose your NAS you still needn't worry about your data leaking out and
falling into the wrong hands.
Reminder: The MyArchive encryption function only supports the EXT4 file system.
See More
NAS 255 – Using MyArchive
Video - MyArchive
Accessories: Hard Disk Tray
58
Edit: Edit the information of the snapshot.
Remove: Remove selected snapshot. With the Shift key, you can select multiple snapshots to remove.
70
1. Open a new file with a text editor.
2. Enter a user's information in the following order and separate them by semicolon (;)
• Username
• Password
• Description
• Email
• Quota (GB) (this setting will be applied to all existing volumes)
• Group (if you want to add the user to multiple groups, use comma to separate the group names)
3. Go to the next line and repeat step 2 until you have input all the users. Each line indicates one
user's information.
4. Save the file in UTF-8 encoding.
Method 2. Use Microsoft Excel:
1. Open a new file with Excel.
2. Enter users' information in the following order and separate them by column in a single row:
• Username
• Password
• Description
• Email
• Quota (GB) (this setting will be applied to all existing volumes)
• Group (if you want to add the user to multiple groups, use comma to separate the group names)
3. Go to the next row and repeat step 2 until you have input all the users. Each row indicates one
user's information.
4. Save the file in UTF-8 encoding and in csv format.
Note
All fields are optional except username and password.
• Uploaded file cannot exceed 1MB
• Uploaded file content cannot be null
• The maximum row numbers in the uploaded file cannot exceed 4000
About Local Users
After initialization, the system will automatically create user accounts for “admin” and “guest”.
“admin” is the default administrator account and possesses a majority of the access rights. If you
wish, you can change the access rights and password for this account. “guest” is the default guest
account which is only suitable for use with CIFS/SAMBA and AFP. This account does not possess login
and authentication rights, so you cannot change its password.
See More
Appendix 7.1 – Permission Mapping Table
Local Groups
71
Here you can manage (add, edit or remove) the local groups in the system and assign access rights
for shared folders.
Reminder: If you have a relatively large number of users on the system, you can
conveniently assign access rights by user group instead of assigning access rights for each
user one by one.
Within ADM, a single users access rights with regards to shared folders will depend on the users
existing access rights and on the access rights of the group that the user belongs to. Both sets of
access rights will be checked against each other in order to determine priority (please see Appendix
7.1). For convenience, the system provides a preview mode which allows you to first preview any
changes that you make to access rights.
About Local Groups
After initialization, the system will automatically create two user groups, “administrators” and
“users”. “administrators” is the default administrator group. If a user is added to this group, they will
possess a majority of the administrator access rights. The “admin” account belongs to the
“administrators” group by default and cannot be removed from it.
See More
Appendix 7.1 – Permission Mapping Table
Domain Users
Here you can view all AD user accounts and manage their access rights to shared folders once your
NAS has been successfully added to an AD domain.


Produktspezifikationen

Marke: Asustor
Kategorie: Server
Modell: AS6212RD

Brauchst du Hilfe?

Wenn Sie Hilfe mit Asustor AS6212RD benötigen, stellen Sie unten eine Frage und andere Benutzer werden Ihnen antworten




Bedienungsanleitung Server Asustor

Bedienungsanleitung Server

Neueste Bedienungsanleitung für -Kategorien-