10400880-002 ©2019-20 Overland-Tandberg 7
RDX QuikStation 4 and 8 Product Manual Contents
Setting iSCSI Security .............................................................................................................................................31
Connecting iSCSI Targets with CHAP for Windows ...........................................................................................33
Connecting iSCSI Targets with CHAP for Linux ...................................................................................................34
Connecting iSCSI Targets with CHAP for Mac OS X ..........................................................................................35
Chapter 4: System Configuration
System Settings Overview ..........................................................................................................................................38
Date and Time Configuration ...................................................................................................................................39
Network Configuration ...............................................................................................................................................40
Port Configuration Options ..................................................................................................................................43
Notification Configuration .........................................................................................................................................45
Setting Basic Email Notification ...........................................................................................................................45
Setting SMTP Authentication ................................................................................................................................46
Customizing Email Subject and From Address ...................................................................................................46
User Management ......................................................................................................................................................46
Group Permissions Overview ...............................................................................................................................47
Adding Users to a Group ......................................................................................................................................47
Removing Users from a Group .............................................................................................................................48
Editing User Information ........................................................................................................................................48
Recovering the Built-In Administrator Password ................................................................................................49
Convert Device Type .................................................................................................................................................53
Options for RDX QuikStation ......................................................................................................................................53
System Options ......................................................................................................................................................54
Setting Removable Disk Options .........................................................................................................................54
Setting the Auto-Insert Option .............................................................................................................................56
Configure Remote Access (SSH) .........................................................................................................................58
Chapter 5: Logical Device Management
Logical Device Type Overview .................................................................................................................................61
Select the Logical Device Type ................................................................................................................................62
RDX Targets ..................................................................................................................................................................63
RDX Individual Dock Drives ..................................................................................................................................64
RDX Logical Volume .............................................................................................................................................64
Logical Volumes ..........................................................................................................................................................66
Creating a Logical Volume .................................................................................................................................67
Importing a Logical Volume ................................................................................................................................67
Expanding a Logical Volume ..............................................................................................................................68
Erasing a Logical Volume .....................................................................................................................................69
Exporting the Logical Volume .............................................................................................................................70
Protected Volumes .....................................................................................................................................................71
RDX Protected Volume ........................................................................................................................................71
Creating a Protected Volume .............................................................................................................................73
Importing a Protected Volume ...........................................................................................................................73
Expanding a Protected Volume .........................................................................................................................74
Expanding a Fixed Logical Volume File System for a Window Host ................................................................75
Expanding a Removable Logical Volume File for a Windows Host ................................................................77
Erasing a Protected Volume ................................................................................................................................78
Exporting the Protected Volume .........................................................................................................................78
Recovering a Degraded Protected Volume .....................................................................................................79
Disk Autoloader ...........................................................................................................................................................81
View Logical Properties for Autoloaders ............................................................................................................82