Typical setup procedure, Step 1: network setup, Step 2: raid creation – Thecus Technology M3800 User Manual

Page 19: Step 3: create local users or setup authentication, Step 4: create folders and set up acls

Advertising
background image


19

Typical Setup Procedure

From the Web Administration Interface, you can begin to setup your M3800 for

se on your network. Setting up the M3800 typically follows the five steps

For more on how to use the Web Administration Interface, see Chapter 4:

Web Administration Interface

.

the Web Administration Interface, you can configure the network settings of

e M3800 for your network. You can access the Network menu from the menu

For details on how to configure your network settings, refer to Chapter 4:

Network Management

.

g and build their

AID volume. You can access RAID settings from the menu bar of the Web

or more information on configuring RAID, see Chapter 4: System

Don’t know which RAID level to use? Find out more about the different RAID

nce the RAID is ready, you can begin to create local users for the M3800, or

or more on managing users, go to Chapter 4: System Management >

User

or more information on configuring Active Directory, see Chapter 4: System

For information about the benefits of Active Directory, see

Appendix D: Active

sers are introduced into your network, you can begin to create various

lders on the M3800 and control user access to each using Folder Access Control

ore information on managing folders, see Chapter 4: System Management >

To find out about configuring Folder Access Control Lists, see Chapter 4: System
Management > Folder Management >

Folder Access Control List (ACL)

.

u
outlined below.

System Management >

Step 1: Network Setup

From
th

bar.

System Management >

Step 2: RAID Creation

Next, administrators can configure their preferred RAID settin
R
Administration Interface by navigating to Storage > RAID.


F

Management >

RAID Configuration

.

levels from

Appendix C: RAID Basics

.

Step 3: Create Local Users or Setup Authentication

O
choose to setup authentication protocols such as Active Directory (AD).

F

and Group Management

.


F

Management > User and Group Management >

ADS/NT Configuration

.

Directory Basics

.

Step 4: Create Folders and Set Up ACLs

Once u

fo
Lists.


M

Folder Management

.

Advertising