Ix2 Network Storage: User Guide
Ix2 Network Storage: User Guide
Ix2 Network Storage: User Guide
User Guide
CONTENTS
Setup Overview
Setup Page
Network Connection
5
6
Network Settings
8
8
9
10
11
11
11
12
13
14
14
15
Space Usage
15
Control Panel
15
Device Information
15
16
17
Printing Documents
18
19
Sharing Files
Sharing Overview
Interfaces for Sharing
20
21
21
iii
Shares
What are Shares and How Do I Organize Content with Them?
22
Adding Shares
22
Managing Shares
23
Deleting Shares
24
25
25
25
25
26
26
27
TFTP
27
27
28
28
29
29
30
30
30
32
32
33
34
Transferring Content to and from Your ix2 Network Storage with Copy Jobs
35
35
36
36
37
iSCSI Overview
38
39
39
39
iv
22
40
40
41
Drive Management
42
Managing Drives
43
43
43
Drive Status
44
45
46
46
47
47
47
48
48
From: Settings
49
To: Settings
50
Setting a Schedule
50
51
52
52
53
53
53
53
54
55
56
Disabling Security
56
57
Users
58
58
Adding Users
58
Managing Users
59
Deleting Users
60
Groups
Groups Overview
61
Adding Groups
61
Managing Groups
61
Deleting Groups
62
63
63
63
64
Managing Your ix2 Network Storage with Local and Active Directory Users
65
Managing Your ix2 Network Storage with Local and Active Directory Users
65
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the
World
67
68
68
Is My Content Secure?
69
70
71
72
72
73
73
73
74
75
76
76
76
77
78
79
80
vi
61
81
82
83
Flickr
84
YouTube
85
86
Media Management
Media Management Overview
Scanning for media content
87
88
88
89
90
90
91
91
92
93
93
93
Photos
94
Photos Overview
94
Streaming Pictures
94
94
94
95
95
Music
96
Music Overview
96
Streaming Music
96
Torrents
97
Torrent Overview
97
97
97
97
98
98
100
100
Streaming Movies
100
Video Surveillance
100
vii
Name
101
Space
101
Model
101
Action
101
105
Application Installation
106
Application Manager
107
107
Adding applications
107
Removing applications
107
108
Software Updates
109
109
109
111
112
112
112
Hardware Management
About the ix2 Network Storage Components
113
114
Front Panel
114
Rear Panel
115
Energy Saving
viii
104
116
116
Brightness
116
Factory Reset
117
UPS Management
118
Troubleshooting Routers
119
119
120
120
120
Additional Support
122
123
Support
124
Legal
125
Safety Information
126
Open Source
127
Warranty Information
128
128
128
Regulatory Information
129
129
Canadian Verification
129
130
130
130
India RoHS
130
130
131
131
131
132
ix
CHAPTER 1
Setting up Your ix2 Network
Storage
Setup Overview
Setup with your ix2 Network Storage is easy. Remove it from the box, connect it to your network switch or
hub, and then power it up. Launch a web browser and enter the setup URL identified in the Quick Start
Guide. LenovoEMC Setup launches and displays a message that your ix2 is online and ready to use.
You then can install client software that includes:
LenovoEMC Storage Manager is a management tool that helps you discover your ix2 on your network to
simplify access to content on your ix2 from your computer. It also allows you to add your computer as a
trusted device to a LenovoEMC Personal Cloud. Refer to LenovoEMC Storage Manager online help for
additional information. Twonky Media Server consolidates all media files on devices on your network and
presents them in a unified view.
From LenovoEMC Setup, you can optionally create a Personal Cloud or begin using your ix2 by clicking
Manage My Device.
By default, the ix2 will attempt to acquire an IP address from DHCP, If there is not a DHCP
server available on the network, the ix2 will use an IP address in the self-assigned APIPA range
(169.254.x.x).
Setup Overview
Windows 7 and Vista Click Start, Computer, Network. You should see your ix2 listed under
Other Devices. You can then double-click the device icon to access the ix2 Management
Console.
Windows XP If you have not enabled UPnP Discovery, click Start, Help and Support. In the
Help and Support browser, search for UPnP and follow the steps from Install the UPnP
framework. After UPnP is enabled, open Windows Explorer and in the Folders view, expand My
Network Places. You should see your ix2 listed. You can then double-click the device icon to
access the ix2 Management Console.
Mac Browse to your ix2 through Finder, Shared, All and use Go, Connect to Server to
connect to Shares on your ix2.
Setup Page
The Setup page opens when you first access the ix2 Network Storage from the Home Page or the
LenovoEMC Storage Manager. On this page, you can configure some basic device features by clicking the
appropriate link. The current setting of the feature displays above the link. You can also configure all
features shown on the Setup page by accessing the specific features directly.
Setup Page
Network Connection
Connecting the ix2 Network Storage to Your Network
First, check the package contents.
Verify that the box contains the following items:
1.
2.
3.
4.
Ethernet Cable
Network Connection
Use the included network cable to connect the ix2 to your network router, switch or directly to a
computer.
2.
Connect the included power adapter to the back of the ix2 and a power socket or Uninterruptible
Power Supply (UPS).
3.
4.
5.
OPTIONAL: if desired, install the LenovoEMC Storage Manager and Media Aggregation software.
If you install LenovoEMC Storage Manager, its icon will appear in the System Tray (Windows) or
Menu Bar (Mac). The LenovoEMC Storage Manager will automatically scan your network and
connect to available Shares.
If you receive a message from your operating system's firewall alerting you of network activity, be
sure to unblock communications.
Mac Users: Shares on the ix2 will mount and appear on the Mac Desktop.
PC Users: Shares on the ix2 will automatically be assigned a drive letter and will be available in
the Network Drives section under My Computer.
Network Settings
The Network page of your ix2 is where you make changes to set up network connectivity. The Network
page displays your current network settings and enables those settings to be modified. On this page, you
can identify your DNS servers and WINS servers and how your system's IP address is determined. Most
system IP addresses and other network settings can normally be configured automatically.
Connecting
the ix2
Jumbo frame support should only be enabled if you are sure your network is jumbo-frame compatible and
all network devices have been configured to support jumbo frames. It is recommended that you confirm all
network interface cards (NICs) are configured to support jumbo frames before enabling this feature.
Click
2.
3.
DNS Servers enter the IP addresses of the DNS (Domain Name System) servers. DNS is
used for translating the domain name to IP addresses.
4.
5.
To connect your ix2 to a proxy server, check Use proxy settings and enter proxy IP address, port
number, and the proxy username and password.
6.
7.
If a DHCP server is unavailable for a network interface card (NIC), the device could auto-assign
an IP address, or you can uncheck the Automatically acquire network address (DHCP)
checkbox found in the Information section of a NIC.
8.
9.
IP Address the static IP address of the ix2. Use an available IP address in the range used
by the LAN.
Subnet Mask the subnet that the IP address belongs to. The default value is 255.255.255.0.
Connecting
the ix2
Device Name: Enter a name for the ix2 device. Use a name that will help you identify it on your
network.
Device Descriptive Name: Enter a descriptive name for the ix2 device. This name can provide
additional detail that identifies the device. If you leave this field blank, the default device name is
used.
Workgroup Name: Enter a workgroup name for the ix2 device if you need to change the default
name. The workgroup name identifies a group of computers that share information with each
other. Change the workgroup name only if you explicitly define a workgroup on your network.
Most users won't need to change the workgroup name, unless they have explicitly defined a
different workgroup on their other computers.
Renaming the ix2 will require a device restart.
To configure Active Directory, manually add the ix2 to your DNS server. Set the ix2 DNS setting
to point to your DNS server. On the Network page, uncheck Automatically configure all
network settings, type the IP address of your DNS Server in the text box, and click Apply to
save your settings.
2.
Configure the ix2 to join the Active Directory domain. On the Device Identification page, select
Active Directory if you already have an existing AD user organization that you want to
incorporate into the ix2.
3.
4.
Domain Name the actual name of your Active Directory domain, for example, sohoad.com.
Preferred Server the actual name or IP address of your Active Directory Server, for
example, ad-server.sohoad.com or 10.14.50.12.
Netbios Name An optional value that is automatically set to the first part of the Domain
Name. For example, if you Domain Name is testdomain.emc.com, the Netbios Name is
testdomain. You can edit this name or leave it blank.
Administrator Password the Active Directory password for the specified Active Directory
username.
Users/Groups Refresh Interval how often the ix2 should refresh the list of available users
and groups from the Active Directory server.
Remote Network Encryption (SSL) enforces encryption outside your local network, such
as through the internet. Choices for both encryption types are Not required and Always
(encryption is always enforced). Always encrypting communication is safest, but can impact
performance.
Enable trusted domains enables your ix2 to allow access to other domains.
10
2.
To enable a feature, expand the desired feature name, and click the switch to On. For example, to
enable Amazon S3, expand the Amazon S3 feature, and click the switch to On.
3.
If not already enabled, enable security on your ix2 and create users and groups.
2.
3.
To enable access to an enabled feature, expand the desired feature name, and click
access permissions.
4.
In the pop-up window, select one or more users to provide them access. If you have created
groups, you can also limit access for them in this way.
5.
Add
The list of users with access is displayed under the feature. To remove user access, uncheck the
access box next to the user, and click Apply to save your changes.
You can enable access permissions for applications on the Feature Selection page, provided an
application has that capability. For more information on installing features, refer to the Application
Manager.
11
12
Destination Email Addresses enter a valid email address or addresses. This email address
provides a destination for messages sent by the ix2 when problems are detected by the system.
You can add multiple email addresses by separating them with commas, spaces or semicolons.
Check Send a test email message to confirm that email notification is working properly.
Check Configure custom SMTP settings only if your network blocks SMTP traffic, requiring
additional credentials, such as a corporate firewall.
Most users will not need to check this option. If checked, enter the following additional information
to identify your SMTP server:
Sender Email Address enter an email address for the ix2 to use as the From address when
it creates messages.
Email Login enter the username used to log into the email account you entered above.
Confirm Password confirm the password for the email account. It must match the
password provided above.
If your email application uses a SPAM blocker, it is recommended that you add a sender email
address to your safe list. If you do not define additional credentials, the default sender email is:
sohostorage@emc.com
Click Apply to save your changes.
13
INFORMATION
Identifies that a change has been made to the state of your ix2 device, usually by a user, such as
attaching a peripheral.
WARNING
Identifies that there is a problem with your ix2 device that requires your attention, but your device
will continue to operate normally for now.
ERROR
Identifies an urgent problem with your ix2 device that may result in data loss and requires your
immediate attention.
You can sort the displayed list by Date, User, or Event by clicking the column headers.
14
Restart
Shut down
Space Usage
The Space Usage section graphically represents the amount of space used by Shares on the ix2. The
exact space used displays in a ToolTip when you mouse over each Share.
Control Panel
The Control Panel displays commands for the ix2:
Restart
Restart the ix2.
Shut down
Shut down the ix2.
Before shutting down the ix2, be sure you have access to the physical device to turn it on. It is
recommended that you always use the power button to shut down the device.
Device Information
The Device Information section displays various hardware, software, and status details.
Status
The Status Information section displays changes to or issues with your ix2. If an issue requires user action
to resolve, such as a warning or error message, the ix2 Management Console displays a link in the status
message.
The following types of messages can display:
INFORMATION
Identifies that a change has been made to the state of your ix2, usually by a user,
such as attaching a peripheral.
WARNING
Identifies that there is a problem with your ix2 that requires your attention, but your
device will continue to operate normally for now.
ERROR
Identifies an urgent problem with your ix2 that may result in data loss and requires
your immediate attention.
15
2.
16
To change time zones, select a Time Zone from the drop-down menu, and then select how time
will be set for the ix2:
Internet Time Server By default, Automatically synchronize with an internet time server
and Use the default time server are selected. To specify a time server, select Specify the time
server and type the URL of the internet time server you wish to use in the text box that
displays.
Manual Select Manually set date and time. To set the current date and time, click the
appropriate icon for calendar and clock settings.
17
Printing Documents
Printing documents from your ix2 Network Storage is simple after you have attached a compatible printer
to the ix2. The Printers page displays a table of printers that are attached to the ix2. The table contains for
each printer the name, model, status, and number of documents waiting.
To attach a printer, simply plug a supported printer's USB cable to a USB port on the ix2. Once attached,
the printer will appear in the table. When the cable is unplugged, the printer will be removed from the table.
For best results, use a printer without multi-function features (for example, scanner, copier, fax,
modem).
18
Printing Documents
19
CHAPTER 2
Sharing Files
Sharing Files
20
Sharing Files
Sharing Overview
Your ix2 Network Storage is set up for storing, retrieving, and accessing files among users, client
computers, and applications.
File sharing is accomplished by creating Shares; setting up security, which includes creating
users; setting up media services; and configuring Active Folders.
Home Page
The Home page serves as a web-accessible interface to your ix2 device. The Home page content
is configured using the ix2 Management Console. The Home page displays any unsecured
Shares. It can also display secured Shares accessible only to users who log in to the ix2 device.
You can access the Home page of your ix2 device by entering the device name or IP address
directly in your browser. If security is enabled and you are an administrator user, you can access
the ix2 Management Console from the Home page by clicking
21
Sharing Overview
Sharing Files
Shares
What are Shares and How Do I Organize Content with Them?
Shares are folders that contain all types of content, including documents, pictures, and music files. Shares
can be unsecured, which means that anyone who has access to your network can access the content in
these Shares. Shares can also be secured, which means access to content in them is limited to select
users and groups.
All Shares on the ix2 are displayed on the Shares page. The Shares page displays a table that contains
folders, connected drives, and any cloud storage to which your ix2 is connected. The Properties column
displays the features that are enabled for each Share.
Share Information
The Information section displays the Share name, graphically displays the space usage of the Share, and
allows you to view the content using the web-based content viewer.
To view the content of a Share, click View Content to open the Content Viewer.
To learn how to modify your Share information, refer to Managing Shares on next page.
Access Permissions
The Access Permissions section contains a list of users who currently have access to that Share. Access
Permissions displays when the ix2 is secured, otherwise the section is not shown. If "Everyone" has
access to a Share, it means content on the Share can be viewed by anyone with access to your network
without needing to log into the ix2.
To learn how to modify Access Permissions on a Share, refer to Managing Shares on next page.
Active Folders
Follow the link to the Active Folder options for information on configuring each:
Email Distribution
Flickr
Photo Resize
Torrents
YouTube
Adding Shares
1.
2.
3.
Click Create. To modify an existing Share, click the Share row to expand the Share.
Shares
22
Sharing Files
Managing Shares
You can change Share information, change access permissions, make a Share an Active Folder, use
Share volumes, and modify a Share volume.
If available, you can also enable NFS secured access.
3. To view the content of a Share, click the View Content link to open the Content Viewer.
4. Click Apply to save your changes.
2. Check Allow users to change file level security to allow file and folder permissions to be set
through other programs, such as Windows Explorer, independent of the ix2. Setting this option
allows users to put additional access restrictions on individual files and folders.
3. To limit access to this Share to a specific set of users, click
Add access permissions and
choose one or more users from the pop-up window. If you have created groups, you can also limit
access for them in this way.
4. In the Access Permissions section, check Read, Write, or both to set access to this Share for
each user. To remove a user, leave both Read and Write unchecked for that user. If you grant Read
and Write permissions to Everyone, the list of users is also cleared since all users will have access
to this Share. If you have created groups, you can also limit access for them in this way.
5. Click Apply to save your changes.
23
Shares
Sharing Files
and
Email Distribution
Flickr
Photo Resize
Torrents
YouTube
Deleting Shares
To delete a Share:
1.
2.
3.
4.
5.
If you do not wish to delete the Share, click Cancel to return to the Shares page.
Shares
24
Sharing Files
Bluetooth
FTP
TFTP
NFS
rsync
SNMP
WebDAV
Windows DFS
2.
Once Bluetooth Transfer is enabled, check the Enable security checkbox to require Bluetooth
users to supply a unique PIN that they have defined before allowing them to transfer files to the
destination Share on the ix2.
If you have enabled security, you must define a unique PIN number, which will be supplied by
devices attempting to upload data using Bluetooth.
25
3.
4.
Sharing Files
To have all users, including root, map as guest, select Treat client users as guest (all_
squash). All files are owned by user guest, and all users accessing the ix2 have the same
access rights. If you have enabled Active Directory on your ix2, only this option is available for
mapping client computers.
To have all users map as themselves but root maps as guest, select Allow full access for client
users other than root (root_squash).
To have all users map as themselves, including root, select Allow all client users full access.
If the ix2 is using Active Directory mode, you see the following NFS version 4 security settings:
Kerberos security - Kerberos is a protocol that uses secret key cryptography for authentication
between client and server applications.
Once enabled, add NFS access rules for each secure Share from the Managing Shares page. NFS
provides another protocol for sharing storage data with Linux hosts. When NFS is enabled, you can
configure rules for host-based access to secure Shares.
Rules can be added to secure Shares to specify the hosts that are allowed to access Shares using NFS.
For example, *.cs.foo.com matches all hosts in the domain cs.foo.com. To export a Share to all hosts on
an IP address or local network simultaneously, specify an IP address and netmask pair as
address/netmask where the netmask can be in dotted-decimal format, or as a contiguous mask length. For
example, either /255.255.252.0 or /22 will result in identical local networks.
To change any NFS settings, click
26
Sharing Files
2.
3.
The username is preset as rsync. You can change this to a more meaningful user account name.
Enter a password and confirm it for the rsync user account name. When you create a secure
rsync user account on the ix2, you allow other devices to securely copy to or from it.
4.
By default, rsync uses TCP port 873 for accepting requests. You can change this value to a
different port number, if desired.
5.
TFTP
On the Protocols page, click the switch to turn on TFTP (Trivial File Transfer Protocol) and allow access to
your ix2 Network Storage. When you turn TFTP on, you can send files to your ix2 using FTP.
27
1.
2.
Sharing Files
3.
4.
Enter the IP address of the host in the Trap Receivers text box. To grant access to multiple
receivers, list all of them in the text box, separating each entry with a space.
5.
SNMP Traps
A ix2 can provide various traps to a manager. These traps provide information on the current state of the
ix2.
Traps include:
28
Sharing Files
"webdav" to access your device. Your ix2 has a remote access password only if the device is not
secured and a Personal Cloud was created on it.
2.
3.
4.
Namespace: A virtual Share containing other folders that are located on different devices
throughout a network.
DFS root: An object that consolidates all the folders in your network and makes them available
through a single entry point. An example of a DFS root is \\DeviceName\DFSRootName.
Enter a DFS root name. The DFS root name is the starting point of a DFS namespace.
After entering a DFS root name, you add DFS links, which map to folders on other devices.
2.
Click
3.
Enter the DFS link name, which includes the name of the host and Share to which you are linking.
4.
Click Apply to save your settings, or click Cancel to discard your changes.
29
Sharing Files
2.
Click the slider switch to On to enable the Home Page on your ix2.
3.
4.
Enter a title for the Home Page. This title displays in the top banner of the Home Page when users
access the ix2. If you leave this field blank, the default device name is used.
5.
Check Display Shares to display unsecured Shares. When you select to display Shares, the
user sees all unsecured Shares on the ix2.
6.
Check Display slideshows to display picture slideshows that are in folders on the ix2. Click
Manage slideshows to configure any slideshows you want to display. The slideshow location
can be any folder attached to the ix2, including a USB drive or DFS location.
7.
Click Apply to save your changes, or click Cancel to discard your changes.
Deleting a Slideshow
To delete a slideshow from the list of available slideshows, click
can configure a different one.
Click the Home Page Settings feature from the ix2 Management Console.
2.
On the Home Page Settings page, select Customized home page settings.
3.
In the Home Page Name field, enter the name of the start page of your custom home page. By
default, the name is index.html.
30
Sharing Files
4.
Specify the destination Share where the start page and your html content exists on your ix2 by
clicking
You cannot access the destination Share through the WebDAV interface. Access through
WebDAV is permanently disabled.
5.
6.
31
Sharing Files
2.
Select a Share to use as an Email Distribution Active Folder, and click to expand the Active
Folder section.
3.
Check Enable.
4.
5.
Include an email address in the Sender Email Address text box. Distribution is sent from this
email address.
6.
You can add multiple email addresses in the Email To: text box by separating them with commas,
spaces, or semicolons.
7.
8.
Check Send the file as an attachment, Send a link to the file, or both.
9.
10. Once configured, all files in this Share are sent by email to your recipients. Click View Transfer
History to see the transfer activity from this Share to your account.
32
Sharing Files
33
Sharing Files
34
Sharing Files
Any NAS device automatically discovered on the same subnet as your ix2
Any NAS device that you manually add to the subnet using the LenovoEMC Storage Manager
Any external storage device, such as a USB device, connected to your ix2
A Windows computer that is automatically discovered on the same subnet as your ix2
When selecting what data to copy on the source storage device, you can choose a specific folder or all
folders. You can also copy from a folder on an external storage device mounted to your ix2.
When selecting the destination device, you can copy files to the top-level folder on the destination device
(the default option), or to an existing folder on this device, which adds the copied files into folders.
You can manually start or stop a Copy Job by clicking start or stop buttons on the Copy Jobs page. You
can schedule a Copy Job to run automatically at a set day and time.
35
Copy Jobs does not establish a continuous replication or mirroring relationship between the
source and destination devices. You should not set up Copy Jobs for disaster recovery.
Copy Jobs does not support transferring content from iSCSI drives.
Transferring Content to and from Your ix2 Network Storage with Copy Jobs
Sharing Files
36
CHAPTER 3
iSCSI: Creating IP-Based Storage
Area Networks (SAN)
37
iSCSI Overview
The iSCSI page allows you to create iSCSI drives on your ix2 Network Storage and allows the
LenovoEMC Storage Manager to communicate with those drives over a network. An iSCSI drive provides
a single place for all your storage, which you can divide as needed to support all computers in your
enterprise business. iSCSI is useful for transmitting large blocks of data over a network at a high speed.
Only one client computer can connect to an iSCSI drive at a time, so iSCSI drives are not for shared data.
If your business is clustering clients, then a cluster can access iSCSI drives. Also, you must create a list
of users who can access an iSCSI drive. These are not users who have access to other features on your
ix2.
38
iSCSI Overview
2.
When the iSCSI page opens, click the switch to enable the feature.
3.
Click
4.
5.
Enter a size for the iSCSI drive. The size must be smaller than the free space available on your
ix2.
6.
2.
To set the discovery of the iSCSI drive using iSNS, check Enable discovery with iSNS.
3.
Use local iSNS server the device acts as an iSNS server for the iSCSI drives.
Use external iSNS server you supply the IP address or host name of the external iSNS
server for the iSCSI drives.
4.
To enable the Challenge Handshake Authentication Protocol (CHAP), check Enable two-way
authentication (Mutual CHAP). With Mutual CHAP enabled, the client performs an additional
check to confirm that it is using the correct device.
5.
Enter an initiator secret (password) for Device Secret and then enter it again in the confirm box.
6.
39
40
1.
On the iSCSI page, expand an iSCSI drive, and expand iSCSI CHAP Users to add user access
to an iSCSI drive.
2.
Click
3.
Click Create. Continue adding as many users as needed to access the drive.
4.
2.
3.
In the iSCSI Information section, click Delete to delete the iSCSI drive.
4.
5.
If you do not wish to delete the iSCSI drive, click Cancel to return to the iSCSI page.
41
CHAPTER 4
Drive Management
Drive Management
42
Drive Management
Managing Drives
The Drive Management page shows drive model and size information.
The Drive Management page provides settings for managing storage and lets you apply global settings for
drives on your ix2 Network Storage.
43
1.
Click
Settings.
2.
Mirror (RAID 1)
Uses half of the storage space for protection, leaving half for actual data.
Striped (RAID 0)
Distributes data across several drives in a way that gives improved speed at any given
instant.
None
Turns off data protection and leaves your data vulnerable to data loss.
3.
4.
Check Enable periodic consistency check to enable a monthly parity or mirror consistency
check. The check helps to prevent a single drive failure from becoming a two-drive failure,
resulting in data loss. The check runs for several hours and can affect performance of the ix2. If
you do not want to run the check, uncheck this option.
5.
Managing Drives
Drive Management
Drive Status
An image on the Drive Management page provides information on the drive status of your ix2. The image
displays the physical layout of drives and the drive slot numbers. If you hover your mouse over a drive in
the image, the ToolTip displays the drive model, size, and status, including if the drive is failing.
Managing Drives
44
CHAPTER 5
Backing up and Restoring Your
Content
45
Time Machine
Copy Jobs
To back up and restore your ix2, you can use the following features and applications:
Copy Jobs
Avamar
Amazon S3
46
Connect your Mac to your ix2 using Apple File Protocol (AFP). You can do this using LenovoEMC
Storage Manager for Mac or Bonjour.
2.
3.
4.
5.
6.
From the list of available drives, choose the desired Share on your ix2, then click Use for
Backup.
7.
Time Machine will automatically create the sparsebundle image under the selected Share and
begin backing up your computer to your network storage device. After the initial backup, Time
Machine backs up files every hour.
Time Machine uses a single destination drive for backups. If you have previously set up another
drive for Time Machine backups and want to change to use the ix2 network device, click Select
Disk, then choose the desired Share on your ix2.
47
Any NAS device automatically discovered on the same subnet as your ix2
Any NAS device that you manually add to the subnet using the LenovoEMC Storage Manager
Any external storage device, such as a USB device, connected to your ix2
A Windows computer that is automatically discovered on the same subnet as your ix2
When selecting what data to copy on the source storage device, you can choose a specific folder or all
folders. You can also copy from a folder on an external storage device mounted to your ix2.
When selecting the destination device, you can copy files to the top-level folder on the destination device
(the default option), or to an existing folder on this device, which adds the copied files into folders.
You can manually start or stop a Copy Job by clicking start or stop buttons on the Copy Jobs page. You
can schedule a Copy Job to run automatically at a set day and time.
Copy Jobs does not establish a continuous replication or mirroring relationship between the
source and destination devices. You should not set up Copy Jobs for disaster recovery.
Copy Jobs does not support transferring content from iSCSI drives.
48
Set To Information
Set a Schedule
. A Copy Job is added to the top of the list and the Information
Overwrite and don't delete Files in the destination location are overwritten with files from
the source location. Any files in the destination location that are not in the source location are
preserved.
Overwrite and delete Files in the destination location are overwritten with files from the
source location. Any files in the destination location that are not in the source location are
deleted. The destination location becomes an exact copy of the source location.
Don't overwrite Only files in the source location that are not in the destination location are
copied. No files are overwritten in the destination location.
From: Settings
Windows File Sharing The default value in the menu is Windows File Sharing and in most
cases you should accept the default value. For more information, refer to Windows File
Sharing on page 29.
rsync The rsync protocol can provide faster copying, but may not be available on all
devices. If you are able to select the rsync protocol, and you want the rsync Copy Job to be
secure, select the Use secure rsync (SSH) option. Enter the rsync username and password
for the rsync server to or from which you are copying. The rsync username and password is
set up on a different device than the device on which you are creating the Copy Job. For more
information on creating an rsync user, refer to rsync: Synchronizing Files with Another Storage
Device or Other Computers on page 27.
4. Enter a valid username and password, if applicable, for the device to provide access to its folders.
5. To select a specific folder, click
to select a source location for the What to copy: section. In
the Copy dialog box, select all Shares or a folder, and select one of the following options for the
Copy Job from the drop-down menu:
The selected folder and its contents copies the selected folder and its contents. If the
destination is a folder, a new folder will be created for each source folder. If the destination is
Top Level, a new top-level folder is created on the destination device for each source folder.
49
Only the contents of the selected folder copies the contents of the selected folder; not
the folder itself. If the destination is a folder, the files and folders in the selected folder are
copied directly to it (the source folder name is not copied). If the destination is Top Level, a
new top-level folder is created on the destination device for each folder in the source folder.
6. By selecting Shares, you choose to copy All Shares, in which all files on the ix2 are copied. Any
files not contained in a folder are not copied. If the destination is a folder, a new folder will be
created for each source folder. If the destination is Top Level, a new top-level folder is created on
the destination device for each source folder.
7. Click OK to save your selection or click Cancel.
8. Click Apply to save your changes.
To: Settings
Windows File Sharing The default value in the menu is Windows File Sharing and in most
cases you should accept the default value. For more information, refer to Windows File
Sharing on page 29.
rsync The rsync protocol can provide faster copying but, may not be available on all
devices. If you are able to select the rsync protocol, and you want the rsync Copy Job to be
secure, select the Use secure rsync (SSH) option. Enter the rsync username and password
for the rsync server you are copying from or to. The rsync username and password is set up on
a different device than the device on which you are creating the Copy Job. For more
information on creating an rsync user, refer to rsync: Synchronizing Files with Another Storage
Device or Other Computers on page 27.
4. Enter a valid username and password, if applicable, for the device to provide access to its folders.
5. To select a specific folder, click
to select a destination location for the Copy to here: section.
In the Copy to here dialog, select a Share or a folder from a Share to copy your files.
6. Click OK to save your selection or click Cancel.
7. Click Apply to save your changes.
Setting a Schedule
5. Click Apply to save your changes. The new Copy Job displays on the Copy Jobs page.
50
In the list on the Copy Jobs page, find the Copy Job you want to modify, and click it to expand the
Information section.
2.
Refer to From: Settings on page 49 for information about revising the Copy Job fields.
In the list on the Copy Jobs page, find the Copy Job you want to delete.
2.
Click
from the Actions column of the table to delete the Copy Job.
If you are sure that you want to delete the Copy Job, click Yes.
If you do not wish to delete the Copy Job, click Cancel to return to the Copy Jobs page.
2.
Enter a valid email address, password, license key, and country for your Mozy account.
3.
4.
Expand the Backup section and select the Shares and folders to back up in the tree. The tree
provides a way to select a Share and all its folders, or just some of the folders under a Share.
6.
7.
51
8.
9.
In the Mozy Backup Settings dialog box, select one of the following:
Automatic Backup to generate an automatic backup anytime you add a new file or change
an existing file to your selected Shares or folders.
If you are creating a scheduled backup, select the days you want the backup to run.
To prevent performance degradation on your ix2, select a speed limit for the backup.
To schedule the time that the backup will run at the selected speed, enter start and stop times.
Click the link to restore any files and folders you back up to your Mozy account.
2.
Select the desired backup from the Backup Date: drop-down menu, either the latest backup or a
previous one.
The file browser provides a way to select a Share and all its folders, or just some of the folders
under a Share.
3.
2.
52
In the Avamar Settings pop-up window, enter the following information and click Apply to save
your settings:
Backing up Your ix2 Network Storage
Client Domain the registered domain name from the Avamar server.
2.
Enter a valid access key, secret key, and bucket name from your Amazon S3 account
information.
You can create a bucket at account setup, or you can enter a new bucket for your ix2. Your
content lives in this bucket on your Amazon S3 account.
3.
Select an existing Share on your ix2 in which to copy files that are then backed up to Amazon S3.
4.
53
CHAPTER 6
Securing Your ix2 Network
Storage and Contents
54
55
Create users.
Create groups.
2.
When you turn security on, you will be asked to create an administrator user. Provide a username
and password, and then confirm your password.
3.
Encryption is always available when you access your ix2 using https. By setting local encryption,
you enforce encryption on your local network. By setting remote encryption, you enforce
encryption outside your local network, such as through the internet. Choices for both encryption
types are Not required, Passwords only (passwords are encrypted through https), and Always
(encryption is always enforced). Always encrypting communication is safest, but can impact
performance.
When security is turned on, browser communications with the ix2 are encrypted. Therefore, each
computer that attempts to access the ix2 may encounter a security warning, which can be safely
ignored. In addition, you may be asked to accept a signed certificate for the ix2 , which you should
accept. If you change the device name at a later date, these warnings may appear again.
4.
If you have your own security certificate, you can load it by selecting Use an imported
certificate and browsing to the certificate to load it.
5.
6.
7.
Disabling Security
Disabling security will cause all defined users to be deleted.
If you are using other features on your ix2 that require security, you cannot disable security until
those features are also disabled.
1.
2.
Disabling security will cause all defined users and groups to be deleted. Check the box to disable
security.
3.
Security is disabled.
56
57
Users
Users and Groups Overview
When security is enabled, the Users & Groups page displays all users and groups on the ix2 Network
Storage and enables administrators to add and modify users and groups.
Non-administrator users can be added to limit access to Share content. Additional administrator users can
be added to allow specific users to configure the ix2.
The table displays the Usernames and Descriptive Name of each user and group. Click in a row of the
table to view or modify details about a user or group.
Adding Users
To add a user:
1.
2.
Before you can create or modify users, you must have security enabled on your ix2 Network
Storageix2. If security is already enabled, you are ready to add users. If not, a pop-up window
appears for enabling security and create an administrator user to manage your secured ix2.
3.
4.
Add a user.
Username enter the username of the user to be created. This is the username for logging
into the ix2. There is a maximum of 32 characters, and spaces are not allowed. The following
are not valid usernames: root, daemon, bin, sys, sync, mail, proxy, www-data, backup,
operator, sshd, postfix, nobody, unuser, guest, and rsync.
Descriptive Name add a descriptive name to identify the user. For example, if you created
a user with a Username of jsmith, you may want to add the Descriptive Name Joe Smith.
Password create a password for the user. The password should be at least 8 to 12
characters, and spaces are not allowed. The maximum password length is 32 characters.
Confirm Password confirm the password. If the text in this field does not match the text in
the Password field, an error will be returned.
Quota Size set a quota size by entering a value in gigabytes. This limits the amount of
storage space this user can have. To have no quota, leave this field blank.
Administrator check this box to allow this user to manage the ix2.
Note: An administrator does not have default access to all Shares. Access to Shares must be
granted explicitly to all users, including administrators.
Add a secured Share for this user check this box to create a secured Share for this user.
This Share will have the new user's name, and allows access only to that user.
Send a Personal Cloud invitation click this link to invite a user to join your Personal Cloud
on the ix2. This opens the Send a Personal Cloud Invitation dialog box where you create an
Users
58
invitation by entering a user's email address along with any additional comments. A user then
receives the invitation, which contains the Personal Cloud name and username and
password. A user enters that information from LenovoEMC Storage Manager. For more
information on this, refer to the online help with LenovoEMC Storage Manager. You see this
option only if a Personal Cloud has been created on the ix2.
5.
Allow this user to add trusted devices to my Personal Cloud check this box to allow a
user to join a trusted device to a Personal Cloud. A trusted device is a machine, either a
computer or another ix2, that belongs to an added user. Only trusted devices that belong to
users that have been added to the ix2 can join the LenovoEMC Personal Cloud. This option
displays only if a Personal Cloud has been created on the ix2.
Click Create.
Managing Users
The page describes how to:
Set Quotas
59
Username enter the username of the user to be created. This will be the username provided
when logging into the ix2 Network Storage. There is a maximum of 32 characters, and spaces
are not allowed. The following are not valid usernames: root, daemon, bin, sys, sync, mail,
proxy, www-data, backup, operator, sshd, postfix, nobody, unuser, guest, and rsync.
Descriptive Name add a descriptive name to identify the user. For example, if you created
a user with a Username of jsmith, you may want to add the Descriptive Name Joe Smith.
Password create a password for the user. The password should be between 8 and 12
characters, and spaces are not allowed.
Confirm Password confirm the password. If the text in this field does not match the text in
the Password field, an error will be returned.
Send a Personal Cloud invitation click this link to invite a user to join your Personal Cloud
on the ix2. This opens the Send a Personal Cloud Invitation dialog box where you create an
invitation by entering a user's email address along with any additional comments. A user then
receives the invitation, which contains the Personal Cloud name and username and
password. A user enters that information from LenovoEMC Storage Manager. For more
information on this, refer to the online help with LenovoEMC Storage Manager. You see this
option only if a Personal Cloud has been created on the ix2.
Allow this user to add trusted devices to my Personal Cloud check this box to allow a
user to join a trusted device to a Personal Cloud. A trusted device is a machine, either a
computer or another ix2, that belongs to an added user. Only trusted devices that belong to
users that have been added to the ix2 can join the LenovoEMC Personal Cloud. You see this
option only if a Personal Cloud has been created on the ix2.
Users
Quota Size set a quota size by entering a value in gigabytes. To have no quota, leave this
field blank.
Administrator check this box if you would like to allow this user to manage the ix2.
An administrator does not inherently have access to all Shares. Access to Shares must be
granted explicitly to administrators, as with other users.
2.
Click Apply.
Setting Quotas
You can limit the amount of space allocated to one or more users by applying quotas.
1. Click
Quota Settings to enable quotas, and set a default quota for each user.
2. In the Quota Settings pop-up window, check Enable quotas to turn on quotas for each user.
3. If desired, enter a Default Quota. This quota applies to new users only.
4. Check Set default quota for all users to apply the default quota to all users.
5. Click Apply to save your changes.
6. To set individual user quotas, expand the Information section for a user and enter a value in Quota
size. If you leave the box blank, there is no quota for that user.
7. Click Apply to save your changes.
Deleting Users
To delete a user:
1.
2.
3.
4.
5.
Users
60
Groups
Groups Overview
Groups consist of one or more users, and administrators can grant each group rights to Shares on the ix2
Network Storage. Users can belong to more than one group. The Groups page enables administrators to
create one or more groups, and grant each group rights to Shares on the ix2. Security must be enabled
before you can create groups.
Refer to the Security page to enable security permissions and create an administrator account, if
you have not done so already.
By default, there are no groups defined. Once an administrator defines one or more groups, the Groups
functionality is dynamically available when creating, modifying, and viewing users, Shares, and groups.
Member of Group
Access Rights
UserA
Group1, Group3
UserB
Group2
Group1
Group3
Group2
none
SF2 - Read/Write
Group3
none
SF3 - Read/Write
Adding Groups
1.
2.
3.
4.
Managing Groups
The page describes how to:
61
4. From the Add Access Permissions pop-up window, select a Share or Shares for the group to
access. If iSCSI is enabled, select iSCSI drives for the group to access. Select the checkbox in the
title bar to select all the Shares listed. If iSCSI is enabled, select the checkbox in the title bar to also
select all the iSCSI drives listed.
5. Click Apply to save your changes.
6. In the table listing the Shares, check Read or Write for each Share. If iSCSI is enabled, check
Read or Write for each iSCSI drive. The group can have full access by checking both Read and
Write. To grant only read access, check only Read.
NOTE: A group must have read access at a minimum. A group cannot have only write access.
7. Uncheck Read to remove all access to a Share and remove the Share from the table. If iSCSI is
enabled, uncheck Read to remove all access to an iSCSI drive and remove the iSCSI drive from
the table.
8. Click Apply to save your changes.
9. If NFS is enabled, the GID field is visible. The GID value must be the same on both the Linux client
and the ix2 Network Storagefor the client to access files. To modify the GID, type a new GID value.
Deleting Groups
To delete a group:
1.
2.
3.
4.
5.
If you do not wish to delete the group, click Cancel to return to the Groups page.
Groups
62
Set Quotas
2. The pop-up window for Import Users and Groups from Active Directory is searchable, and you
can sort by name, descriptive name, or type. You can filter the list of users and groups by selecting
a specific user or group from the domain tree.
3. Select the checkbox next to a user or group to import that user or group to your ix2 Network Storage
from your Active Directory domain. Select the checkbox in the title bar to select all the users and
groups in your Active Directory domain.
4. Click Apply to save your changes.
Click
63
2. From the Add Access Permissions pop-up window, select a Share or Shares for the user or group
to access. Select the checkbox in the title bar to select all the Shares listed.
3. Click Apply to save your changes.
4. In the table listing the Shares, check Read or Write for each Share. A user or group can have full
access by checking both Read and Write. To grant only read access, check only Read.
A user or group must have read access at a minimum. A user or group cannot have only write
access.
5. Uncheck Read to remove all access to a Share and remove the Share from the table.
6. Click Apply to save your changes.
7. If NFS is enabled, the GID field is visible. The GID value must be the same on both the Linux client
and the ix2 for the client to access files. To modify the GID, type a new GID value.
Setting Quotas
1. Click
Quota settings to enable quotas and set a default quota. Quotas are only set for
individual users, and not groups.
2. In the Quota Settings dialog, click Enable quotas to turn on quotas for each user. Quotas can be
set for each user individually or set as a default value.
3. Enter a Default Quota in gigabytes. When you set a default quota, this becomes the quota size for
all new users.
4. Check Set default quota for all users to globally set the same quota size to all users. You may
overwrite this default value for individual users by setting their quota size separately in the user's
Information section.
5. Click Apply to save your changes.
From the ix2 Management Console, click Users and Groups to open the Users & Groups page.
2.
3.
In the Information section, click Delete. Deleting a user or group does not delete any Shares to
which the user or group has access. Click the checkbox if you want to Delete all Shares that
only this user can access.
4.
5.
If you do not wish to delete a user or group, click No to return to the Users & Groups page.
64
to log in as a local user, choose the device name from the drop-down menu and enter the
username and password
to log in as an Active Directory user, choose the Active Directory domain name from the dropdown menu and enter the username and password
2. Click Login.
2. In the Import Users and Groups from Active Directory page, under Local, click Users to create a
local user or Groups to create a group. You can add AD members to any local groups you create.
3. Enter the necessary credentials for the user or the group name, and click Create.
65
Managing Your ix2 Network Storage with Local and Active Directory Users
Managing Your ix2 Network Storage with Local and Active Directory Users
66
CHAPTER 7
Personal Cloud: Accessing Your
LenovoEMC Personal Cloud
From Anywhere in the World
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
67
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
LenovoEMC Personal Cloud This is a setting configured on your ix2 Management Console
that allows you to securely share storage and media capabilities with computers around the world.
Web Access You can use Personal Cloud information to access your ix2 from the web. Enter
myCloudName.mylenovoemc.com in a web browser, and when prompted, enter a valid username
and password for your ix2. You can also use the LenovoEMC Link, which is an application that
runs on mobile devices, by entering the Personal Cloud name and then a valid username and
password. For more information on the LenovoEMC Link, refer to its documentation.
My Personal Cloud When you are the administrator of your ix2, you can create a Personal
Cloud through the ix2 Management Console and then invite people to join it. You create and
manage the Personal Cloud on your ix2 Management Console through the My Personal Cloud
configuration option. The Personal Cloud that you administer is called My Personal Cloud.
Other Personal Cloud If you want to have your ix2 join that Personal Cloud instead of
administering your own, select the option for Other Personal Cloud. Enter the Personal Cloud
name, username and password you received when you were invited to join your ix2 as a Trusted
Device on the other Personal Cloud.
Joining LenovoEMC Personal Cloud as a Trusted Device To connect your computer or your
ix2 as a trusted device to a Personal Cloud, you use the username and password given to you for
that Personal Cloud. The person managing the Personal Cloud has to create you as a user on the
device hosting the Personal Cloud and give you permission to add trusted devices. You can
connect your ix2 to only one Personal Cloud at any given time, so you must select between either
My Personal Cloud or Other Personal Cloud.
An administrator should complete the following tasks to set up or join a Personal Cloud:
68
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Is My Content Secure?
Your content is always secure using LenovoEMC Personal Cloud. If you create a Personal Cloud with
security disabled, you are required to enter a password when accessing your ix2 remotely. Enabling
security allows you to share your ix2 with the people you choose. For example, you have photos of your
new baby you want to share with your sister, your brother, and your sister-in-law. To share your baby
photos with these family members, create a Personal Cloud, and then invite your sister, your brother, and
your sister-in-law to join your Personal Cloud. Your ix2 Network Storage provides an easy way to send
email invitations and instructions to the people you select as Personal Cloud users. In this way, your
content is never exposed and remains private. It is visible only to the individuals you invite to be Personal
Cloud users. Content of the Personal Cloud is determined by you as the Personal Cloud owner. Refer to
the help topic links below for more information on Personal Cloud.
People added to your Personal Cloud as users are not required to own or have access to your ix2.
The process of adding someone as a Personal Cloud user grants them access to your Personal
Cloud from any computer.
Is My Content Secure?
69
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
Create the LenovoEMC Personal Cloud through the ix2 Management Console
Creating a LenovoEMC Personal Cloud starts with providing a name for your Personal Cloud and an email
address associated with it. After creating the Personal Cloud, you can use the Personal Cloud Quick
Setup wizard to perform common tasks associated with the LenovoEMC Personal Cloud: adding Shares,
inviting people to join the Personal Cloud, and setting up Copy Jobs through the Personal Cloud.
70
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
2.
Click the My Personal Cloud button to open the portal that lets you create your Personal Cloud.
After you click the My Personal Cloud button, a new website containing the portal opens. You
create a Personal Cloud on this website. After you create the Personal Cloud, you return to the ix2
Management Console.
3.
If your ix2 is not secured, you are prompted to create a remote access password. This is a
password that anyone not on your local network must enter to access your device.
After completing these steps, the Personal Cloud Quick Setup Wizard opens, so you can create
Shares, invite users, or configure Copy Jobs. You can use the Quick Setup Wizard or close it and
begin using your Personal Cloud.
71
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
72
1.
Log in to your router by entering its IP address in the browsers URL field from your computer. If
prompted, enter administrator account name and password.
2.
Navigate to the Port Forwarding configuration page. This is often related to Port Mapping,
Application, Virtual Server, or Gaming configuration options.
3.
Type in the desired application or service name. This is typically a blank or drop-down field where
you can type or choose a user-specified application or service name for the port you are
forwarding. Create a new entry with a value like LenovoEMC Personal Cloud in this field.
4.
Enter a port number for the Personal Cloud service in the range 50500-50599 in both the port start
and port end fields. Port number 50500 is the default. It should not be necessary to change this
value, but if you do, choose the next available port; for example, 50501. If you decide to choose a
port in the higher range, note that the Media Server uses the same range of ports, numbering
backwards from 50599.
5.
Repeat the previous step, using port 443 to enable https communication with your ix2.
6.
Enter the IP address of your ix2 which contains the Personal Cloud. The IP address displays on
the System Status page when you log into the device's web interface.
7.
8.
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
2.
Administration Email Address This is the sender email address used on the email
invitations.
Port Number Your router forwards this specific port for your Personal Cloud. This value is
automatically filled in, and you do not have to change it, unless you have more than one
Personal Cloud on your network. Refer to Configuring Router Port Forwarding for Personal
Cloud for more information.
Secure Communication This setting controls the security of information traveling through
the Personal Cloud.
You can also specify a Secure Communication level setting with LenovoEMC Storage
Manager. The Secure Communication setting for the ix2 Management Console sets the
minimum value. You cannot specify a setting lower than this value using LenovoEMC Storage
Manager. For information on using LenovoEMC Storage Manager, refer to its online help.
3.
Enable unrestricted access to media content This setting makes all media files in mediaenabled Shares available to anyone on the internet accessing your ix2, even if those media
files are in secured Shares. For more information on making a Share media-enabled, refer to
changing Share information.
73
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
From either the Personal Cloud Quick Setup dialog box or the LenovoEMC Personal Cloud page,
click Invite Users.
You can also send an invitation to join a Personal Cloud when you are adding users. Refer to
Adding Users on page 58 for more information.
74
2.
In the Invite Users dialog box, select the name of an existing user or click Create New User to
add a new user. If security has not been enabled, you are prompted to enable security and create
an administrator user.
3.
If the email address field is not already completed, enter an email address for the user.
4.
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
On the Personal Cloud page, select the Other Personal Cloud command to join another
LenovoEMC Personal Cloud.
2.
In the Add Trusted Device to Personal Cloud dialog box, enter the Personal Cloud name,
username, and password you received in the email invitation.
3.
Enter a descriptive name for your trusted device in the Description field.
4.
Click Apply.
After applying this information, you are automatically connected to the Personal Cloud.
75
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
76
1.
2.
Click
3.
next to the trusted device you want to remove from the Personal Cloud.
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
77
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
78
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
79
Personal Cloud: Accessing Your LenovoEMC Personal Cloud From Anywhere in the World
80
CHAPTER 8
Sharing Content Using Social
Media
81
82
Facebook
Facebook is a social network to connect with friends and family. You can configure a Share as a Facebook
Active Folder so that photos and movies added to that Share are automatically uploaded to your Facebook
account.
Refer to Managing Shares on page 23 for more information on managing Shares and Active Folders.
If you do not have a Facebook account, go to the Facebook website to open an account.
2.
Select a Share to use as a Facebook Active Folder, and click to expand the Active Folder section.
3.
Check Enable.
4.
5.
Click Configure Facebook account access to configure your Facebook account. You will be
taken to a Facebook page to configure your account. Follow the instructions provided by
Facebook.
6.
Check Delete files after upload to delete images or movies from the Share once they are
transferred to your Facebook account.
7.
Images can also be resized prior to upload. Check 800x600, 1024x768, or enter a custom
resolution for resizing images.
8.
9.
Click View Transfer History to see the transfer activity from this Share to your account.
83
Flickr
Flickr is a photo sharing network for sharing photos with friends and family. You can configure a Share as a
Flickr Active Folder so that images and albums added to that Share are automatically uploaded to your
Flickr account.
Refer to Managing Shares on page 23 for more information on managing Shares and Active Folders.
If you do not have a Flickr account, go to the Flickr website to open an account.
84
1.
2.
Select a Share to use as a Flickr Active Folder, and click to expand the Active Folder section.
3.
Check Enable.
4.
5.
Click Configure Flickr account access to configure your Flickr account. You are taken to a
Flickr page to configure your account. Follow the instructions provided by Flickr.
6.
Check Delete files after upload to delete images from the Share once they are transferred to
your Flickr account.
7.
8.
Once configured, all images added to this Active Folder are uploaded to your Flickr account. Click
View Transfer History to see the transfer activity from this Share to your account.
Flickr
YouTube
YouTube is a social media site to share video content. You can configure a Share as a YouTube Active
Folder so that videos added to that Share are automatically uploaded to your YouTube account.
Refer to Managing Shares on page 23 for more information on managing Shares and Active Folders.
If you do not have a YouTube account, go to the YouTube website to open an account.
Select a Share to use as a YouTube Active Folder, and click to expand the Active Folder section.
2.
Check Enable.
3.
4.
Check Delete files after upload to delete videos from the Share once they are transferred to your
YouTube account.
5.
6.
Click View Transfer History to see the transfer activity from this Share to your account.
YouTube
85
86
CHAPTER 9
Media Management
Media Management
87
Media Management
88
Media Management
89
Media Management
Settings.
2.
3.
4.
5.
To access media content, internet users enter a non-secure IP address in their browser along with the port
number 50599 used to access the media server, for example, http://72.xx.xxx.104:50599, where "x" is the
IP value for your network. When a user enters this IP address, the Twonky Server page on the ix2
displays. Refer to the Support section of the Twonky Server page for information on using the server.
LenovoEMC Link users can access media content directly from the ix2. Refer to your LenovoEMC Link
documentation for details.
For additional information on enabling internet access, refer to Media Services Capabilities and
Limitations.
90
Media Management
Media Aggregation
If you have multiple Digital Living Network Alliance (DLNA) servers in your network that have media
content, you can combine all media content into one view by enabling aggregation on your ix2. When you
enable aggregation, all media content on DLNA servers is available for playback using a DLNA player,
such as Playstation3, Windows Media Player, or Xbox 360. In addition, you can optionally copy all
media content from your network servers to your ix2.
2.
Settings.
This enables aggregation for media servers already discovered in your network.
3.
Show Common View This enables media aggregation and allows all media content from
computers on the network to be played back by a DLNA player. All your movies, music, and
pictures are linked from various computers and can be played back from one view. All aggregated
media files remain on their original device, and can only be played while that device is powered on
and connected to the network.
Copy Files This enables media aggregation and automatically copies all media content from
computers, both networked and local, to your ix2. All your movies, music, and pictures from
various computers can be played back from one view, and they are copied into Shares on your
ix2. Because all media files are copied to the ix2, they can be played even if the original device
they were on is powered off or not connected to the network.
Copy on Request This enables media aggregation but does not automatically copy all media
content from computers, both networked and local, to your ix2. Computers on the network will
have to enable media aggregation individually and then media files are copied to the ix2. If a
computer is running the LenovoEMC Storage Manager, media aggregation is automatically
enabled.
When you enable media aggregation, the media server restarts, and any media you are currently
streaming stops playing. You can begin streaming your media after the media server has
restarted.
Media Aggregation
91
Media Management
92
Media Management
iTunes
Xbox 360
The procedures shown below are intended as examples. Your media player or version may
operate differently. It is recommended that you refer to your media player documentation for
instructions on how to add a network device.
2.
Drag, or copy, your existing media content to a Share that has media sharing enabled.
3.
When you open the iTunes Library, iTunes will display all of the media content from the ix2.
Connect your Xbox 360 to your TV and to the same local network as your ix2.
2.
Navigate to the Media Tab in Xbox 360 and select a media-enabled Share.
3.
4.
Click Yes, Continue when asked if you have downloaded and installed media sharing software
on your computer, since the ix2 device comes preconfigured with this software.
5.
Select ix2 from the list of names. You should now see all the unsecured media content on your
device.
93
Media Management
Photos
Photos Overview
Your ix2 has multiple ways to manage your pictures.
Your ix2 can:
Streaming Pictures
The ix2has a built-in media server that, when turned on, can scan for pictures in specific folders that have
media sharing enabled. Any pictures contained in these specific folders will then be accessible to any user
on your network with a media player. For information on enabling a folder as a media folder, refer to
Managing Shares on page 23.
94
1.
2.
Select a Share to use as a Photo Resize Active Folder, and click to expand the Active Folder
section.
3.
Check Enable.
Photos
Media Management
4.
5.
You can set a size for your pictures. Select 640x480, 800x600, 1024x768, or enter a Custom
Resolution for resizing images. The resized photos are saved to a folder on the Share named by
the photo size you choose, such as 800x600.
6.
You can keep a copy of the original by selecting Keep the original files after resizing.
7.
To add a watermark to your photo, select Add a watermark to the photos. Click the Watermark
file icon to apply a watermark image to your file.
8.
9.
Once configured, all photos added to this Active Folder are resized to your settings. Click View
Content to see the files in this Share.
2.
Optionally, if you want to automatically delete the pictures from your camera once they have been
safely copied to your LenovoEMC storage device, check Remove Copied Pictures From
Camera to automatically delete the pictures from your camera once they have been safely copied
to your ix2.
3.
Click
to open the Select Folder pop-up window, and select a Share as the destination for
your pictures.
2.
Optionally, if you want to automatically delete the pictures from your camera once they have been
safely copied to your LenovoEMC storage device, check Remove Copied Pictures From
Camera to automatically delete the pictures from your camera once they have been safely copied
to your ix2.
3.
Click
to open the Select Folder pop-up window, and select a Share as the destination for
your pictures.
Photos
95
Media Management
Music
Music Overview
If you have music files in media-sharing enabled folders on your ix2, those music files can be streamed by
a DLNA player running on a computer on the network.
Streaming Music
The ix2 has a built-in media server that, when turned on, scans for music in specific folders that have
media sharing enabled. Any music contained in these specific folders is then accessible to any user on
your network with a media player. For information on enabling a folder as a media folder, refer to Managing
Shares on page 23.
96
Music
Media Management
Torrents
Torrent Overview
Torrent downloads allow you to share files using a peer-to-peer file sharing protocol. With torrent download
enabled, you can download files using the torrent protocol to your ix2and then those files can be uploaded
by other torrent users.
After you have added torrent jobs to your torrent share, the torrent download page displays a table of torrent
jobs, showing both downloads and files available for upload. Multiple torrent files can download
simultaneously. The table information includes the name of the file, its size, download or upload status,
and amount of time remaining for the torrent job to complete.
2.
Click
3.
In the Torrent Download Settings dialog box, enter a value for Maximum Download Speed. This
sets the rate at which files are downloaded to your device. The maximum download speed you
can enter is 2 MB/s.
4.
This sets the speed at which other users can upload a file unprompted from your device. The
upload speed can affect device performance, so it is recommended that you choose a value that
does not strain the performance of your device and impact other work on it. The maximum upload
speed you can enter is 1GB/s.
5.
Set a Port value used by torrent peers to upload files from your ix2.
The port value should be a number between 6881 and 6999, and your router must be configured to
allow port forwarding on the same port. Refer to Configuring your router for torrent downloads for
more information on how to do this.
6.
2.
Click the
3.
97
Media Management
Device IP Address
192.168.1.1
Port name
HTTP
Port number
Set to the same port value set on the Torrent Download page.
Protocol
TCP
1.
2.
Select a Share to use as a Torrent Active Folder, and click to expand the Active Folder section.
3.
Check Enable.
4.
5.
Click General torrent settings to set up Torrent settings. Refer to Enabling Torrent Downloads
on previous page for more information on configuring your Torrent downloads.
6.
7.
2.
Expand the Share that is enabled as a Torrent Active Folder. Any Share can be enabled as a
Torrent Active Folder. For information on enabling a Torrent Active Folder, refer to Configuring a
Torrent Active Folder above.
3.
Copy the downloaded torrent file to the Torrent Active Folder Share. The torrent file immediately
starts to download to the Share. An administrator user can monitor its download progress on the
Torrent Download page. All users can monitor the download progress through the Content Viewer
on the Torrent Share.
98
Torrents
Media Management
Torrents
99
Media Management
Videos
Video Capabilities Overview
Your ix2 Network Storage has multiple ways to manage your videos.
Your ix2 can:
Upload videos that are added to Shares associated with social media sites
Streaming Movies
The ix2 Network Storage has a built-in media server that, when turned on, scans for movies in specific
folders that have media sharing enabled. Any movies contained in these specific folders are accessible to
any user on your network with a media player. For information on enabling a folder as a media folder, refer
to Managing Shares on page 23.
Video Surveillance
Video Surveillance Overview
The Video Surveillance page lets you add and configure cameras connected to your ix2 Network Storage,
view live video, and see video alerts. The page has three primary links:
Add Video Camera Manually adds a video camera to your ix2 if it is not automatically
discovered. Refer to Adding a Video Camera.
Video Wall Displays live video from all video cameras configured with your ix2. The video from
all cameras is displayed in a grid.
Alerts Displays alert messages about the video surveillance feature. Refer to the camera
configuration pages for camera status information.
100
Videos
Media Management
Name
This section displays the video camera's IP address, name, login username, and the destination folder for
the video recording files. Additionally, using the Camera Configuration link, you can modify the video
camera software configuration settings using the video camera's native software. It also displays an icon
that indicates the current state of the video camera. The possible states are:
The video camera is no longer connected to the network.
The video camera is no longer connected to the network, but a recording schedule is set for it. You
should delete this video camera if it is no longer on the network, or fix the network connection so it
can record as scheduled.
The video camera is connected to the network and is currently recording. There is no schedule for
this recording, since it was started manually. The recording must therefore be stopped manually.
The video camera is connected to the network, a recording schedule is set, and the camera is
currently recording.
The video camera is connected to the network and a recording schedule is set for it, but it is not
currently recording.
The video camera is connected to the network, but no recording schedule is set.
Space
The Space column identifies how much disk space is currently used by the video files in the destination
folder for this video camera.
Model
This column lists the model information for this video camera.
Action
For each video camera, you can perform the following actions:
Click either
to manually start recording or
to stop recording. These buttons are
available only for video cameras that are currently connected and accessible on the network. Use
the manual start and stop record buttons to start recording at any point and to stop a recording
until the next scheduled start time.
NOTE: During recording, if you want to change the camera resolution and frame rate, you must
stop recording, change the values on the camera's configuration page, and then start the
recording again.
Click
to open a live view from your video camera. You may be prompted to supply the
username and password for the video camera.
Videos
101
Media Management
2.
In the Video Camera Information section, enter the following about your video camera:
If your video camera is automatically discovered, information like Name and Manufacturer are
already filled in for that video camera. These settings can be modified. If you modify these
settings, you must make the same changes to the associated settings on your camera's
configuration page.
3.
Name
IP Address
HTTP Port: A camera that is automatically discovered will periodically receive configuration
values, including the HTTP port number, from the actual camera. If you change the HTTP port
number on a camera's configuration page, but do not change it on the Video Surveillance page,
that camera will be offline on the Video Surveillance page until the camera receives the
updated value. If you manually add a camera and change its HTTP port number on the
camera's configuration page, the camera displays as offline on the Video Surveillance page.
Delete the camera and add it again, using the updated HTTP port value.
RTSP Port
4.
5.
Click Apply to save your changes. Click Cancel to discard your unchanged settings.
The video camera displays in the table. For additional setup, refer to the sections on Retention Policy and
Scheduling.
102
Media Management
2.
Select the days you want to record, or All Days for the entire week.
3.
4.
Videos
103
CHAPTER 10
Adding Applications to Your ix2
Network Storage
104
Application Overview
You can install supported applications on your ix2 using the Application Manager page. For each
application installed you may have the option to uninstall, start, and stop the application.
105
Application Overview
Application Installation
Certain applications on your ix2 must be installed before you can use them. When you click on an
uninstalled application in the ix2 Management Console, you open the feature page of the application. To
install the application, click the install link. The application is downloaded to the ix2, and you can start the
application from the Application Manager page.
You can also download applications from www.LifeLineApps.com.
Application Installation
106
Application Manager
The Application Manager page allows you to add applications to your ix2 from an installation file located on
your computer. For each application installed you may have the option to uninstall, start, and stop the
application. This page shows the applications which came preinstalled with your ix2; as well as
applications that you have manually installed.
Only valid applications built using the LenovoEMC SDK can be installed on your ix2.
to start it again.
Adding applications
1.
Click the Add application link. The Add application window displays.
2.
Enter the path and name of the application file, or click Browse, and select the application file
located on your computer.
3.
Removing applications
When available, click
107
Application Manager
CHAPTER 11
Upgrading Your ix2 Network
Storage
108
Software Updates
The Software Updates page identifies the ix2 software status and provides the ability to update the
software for the ix2.
In the table listing the current software installed on your ix2, click
check for updates.
2.
The Status column will state whether the software is up to date or if an update is available. To
copy an update file to your ix2, click
ix2.
3.
If multiple updates are ready, you may install all the updates at the same time. Click
Apply
all pending updates to install the available updates. The software updates are applied to your
ix2.
4.
Once the software is installed, the ix2 will reboot. If you are applying multiple updates, you only
need to reboot once. Do not power down the ix2 during this time.
5.
Do not shut down the ix2 during the update process as this can damage the ix2. The ix2 will be
temporarily inaccessible during the software update. Be sure no critical files are being accessed.
In the table listing the current software installed on your ix2, click
check for updates.
2.
If an update is available, the Status column will state that a software update is available with a
link. Download the update file to your local computer.
3.
4.
In the Add Software pop-up window, if an update is available, there will be a link to download the
appropriate update for your ix2. Click the link, follow the instructions on the download site page,
and download the software update to your local computer.
Add Software.
Once downloaded, click Browse to select the update, and then click Upload to continue.
5.
When the update is uploaded to the ix2, the Status column will say Ready to apply.
6.
Click
Apply all pending updates to apply the update or updates. The software updates will
be applied to your ix2. If you want to remove the update without applying changes, click
the Action column.
in
The ix2 restarts once the software is installed. You should not power down the ix2 during the
installation process as this can damage the ix2. If multiple updates are ready, all of them will be
applied, requiring only one reboot.
The ix2 will be temporarily inaccessible during the software update. Be sure no critical files are
109
Software Updates
being accessed.
Software Updates
110
CHAPTER 12
Backing up and Recovering Your
ix2 Network Storage Settings
111
2.
Save the configuration file to an external device, such as your computer or a USB drive. You can
save as many configuration backups as you want.
112
1.
2.
In the Restore Configuration dialog box, click Browse to locate a previously saved configuration
backup stored on your computer or USB device.
3.
Restore settings overwrites any existing settings, such as device identification and Share
names. When you select this option, existing data on the ix2 is not deleted, and the
configuration restore operation starts automatically after you click Apply in the Restore
Configuration dialog box.
Restore settings and drive configuration deletes all data, users, and settings from the
target ix2. If you select this option, a confirmation dialog box displays and informs you that
restoring the configuration will delete all data and overwrite any existing users or settings on
the target ix2. Check Check this box to continue to confirm this dialog box or click Cancel to
stop the configuration restore process.
4.
Click Apply to save your changes. After you click Apply, the restore process starts.
5.
If your source ix2 had Active Directory enabled, you are prompted to enter the administrator name
and password of an account that has the rights to join the domain.
6.
Click OK.
CHAPTER 13
Hardware Management
Hardware Management
113
Hardware Management
Front Panel
Flashing Red System or drive error. System software will indicate error.
2. Drive Activity Indicator Displays the current drive status of the ix2.
114
Hardware Management
Rear Panel
115
Hardware Management
Energy Saving
The Energy Saving page provides power settings for the ix2.
Brightness
To adjust the brightness of the lights on the ix2, set the Indicator Brightness to High, Medium, or Low.
116
Energy Saving
Hardware Management
Factory Reset
Factory Reset returns the ix2 to its original state. This feature is useful if you give your ix2 to someone
else.
Factory Reset provides two options for returning your ix2 to its original state:
Quickly delete all data permanently deletes all record of existing or deleted data, users, and
passwords.
Securely delete all data this option takes significantly longer, but provides an added security
benefit by permanently erasing all data on the drives to prevent recovery of existing or deleted
data, users, and passwords. The secure delete operation renders all data irrecoverable.
You can use the factory reset feature only to erase the drives internal to the ix2. You cannot use
this feature to reset any external storage devices that may be connected.
1.
2.
From the After Reset drop-down menu, choose to Restart or Power off the ix2 after the factory
reset completes.
3.
Click Apply.
4.
In the pop-up confirmation, click Yes to perform the factory reset. After the factory reset
completes, the ix2 powers down or restarts depending on your selection.
When you quickly delete or securely delete all data on your ix2, any installed applications, as
listed on the Application Manager page, are also deleted. Go to www.lifelineapps.com to
download and reinstall your applications. In addition, you should visit the LenovoEMC support
web site for specific information on reinstalling applications that came preloaded with your ix2.
Factory Reset
117
Hardware Management
UPS Management
The LenovoEMC UPS Management page allows you to monitor the status of an attached Uninterruptible
Power Supply.
If your ix2 is connected to a UPS battery backup unit, it is listed on this page. The battery status of the
backup unit is also indicated, displaying how much of a charge is left in the battery. To monitor the battery
status of your UPS unit, connect your ix2 to it with a USB cable.
If the ix2 is running from the UPS battery, it automatically shuts down to preserve data as the battery
charge gets low.
118
UPS Management
Hardware Management
Troubleshooting Routers
If you encounter a problem while connecting or using your ix2, check the topics listed below for possible
solutions.
If you have properly set port forwarding on your router and remote access still does not work, you may
have multiple routers on your network. In this situation, you will most likely have two NAT (Network
Address Translation) firewalls.
1.
One of the easiest ways to identify this issue is to log in to the router to which the ix2 is
connected.
2.
Once you have logged in, go to the page that shows the router's WAN IP address, usually Status
or Network Info.
3.
If the WAN IP address begins with 192.168, 10, or 172, you may have a NAT Firewall between
the router and internet connection.
There are several options for resolving double NAT situations. The sections below explore the pros and
cons of each resolution:
These instructions will refer to the router that is connected directly to the internet as the Primary
Router. The cascaded router or router to which your ix2 is connected is referred to as the
Secondary Router.
2.
Navigate to the settings page for DMZ or Default Server. Refer to the documentation that came
with your router for information on where this feature is found.
3.
4.
Your secondary router is no longer behind your primary router's firewall. If port forwarding is correctly
configured, remote access should now be working properly. Moving your secondary router into the DMZ
should not have any effect on the security of the network, since it is still protected by the secondary
router's firewall.
Troubleshooting Routers
119
Hardware Management
Increase the length of the DHCP lease: Your router attempts to remember all DHCP clients and
assigns them the same IP address every time they request an IP address; however, the router
forgets clients if they do not request an IP address for a certain amount of time. Your router has a
setting for the duration of the validity of the DHCP lease. If your network requires DHCP, this
may be a good solution; however, it is not always guaranteed to work. Occasionally updating your
router's port forwarding settings may be required.
Use Static DHCP: Some routers allow you to assign Static IP addresses through the DHCP
system based on the MAC address of the device. This ensures that the ix2 always gets the same
IP address, and your port forwarding settings are always correct. Static DHCP allows you to
leave your ix2 in DHCP mode. Refer to your router's documentation for more information on
configuring DHCP settings.
Use a Manual IP Address: Changing the Manual IP address reduces the reliance of your ix2 on
the DHCP server; however, you must perform additional configuration for it to work properly.
1.
120
Log in to your router and write down the DHCP range it is using.
Troubleshooting Routers
Hardware Management
2.
Refer to your router's documentation for more information on configuring DHCP settings.
3.
Navigate to the IP address settings interface page on your ix2 . For more information, check
the Network Settings section of this manual.
4.
Enter a new IP address that is outside of your router's DHCP range. For example, if your
router is distributing IP addresses in the range of 192.168.14.2 through 192.168.14.50, you
must assign the ix2 a number between 192.168.14.51 and 192.168.14.255. Make sure you are
assigning the ix2 an IP address that is not in use by another device.
5.
Enter a subnet mask. The subnet mask describes the size of your network. For most
networks this is 255.255.255.0 which allows for 256 network devices. If you are on a larger
network or are using the self-assigned APIPA range (169.254.x.x), you must use a
255.255.0.0 or larger subnet mask.
6.
For best results, enter the IP address(es) for your DNS Server(s).
7.
8.
Enter a gateway address. In most cases, this is the IP address of your router.
9.
If necessary, update your router's port forwarding information with the new static DHCP IP
address.
Troubleshooting Routers
121
Additional Support
Additional Support
122
Additional Support
Advanced online support options, such as 1-on-1 live chat and email
Support options available may vary depending on your region and language of choice. LenovoEMC's
specific customer support policies (including fees for services) and procedures change as technology and
market conditions dictate. To obtain information about LenovoEMC's current policies, select the Support
Policy link from the top banner on the web support site or write to:
LenovoEMC Customer Service
4059 South 1900 West
Roy, UT 84067, USA
123
Additional Support
Support
The Support feature opens the LenovoEMC web site where you can get more information about your ix2.
The Support page provides access to content for learning more about using and supporting your ix2.
Refer to the LenovoEMC Support site for more information.
Support
124
Legal
Legal
125
Legal
Safety Information
Observe the following guidelines when using your ix2 Network Storage:
Unplug the ix2 before cleaning. Do not use liquid or aerosol cleaners. Use a damp cloth for
cleaning.
Do not use the ix2 near water. Do not spill liquid on or into the ix2.
Openings in the ix2 are provided for fans and air ventilation and should not be blocked or covered.
Make sure the ix2 has ample ventilation (at least 6 inches or 127 mm) in front and behind the unit.
There is a danger of explosion if the coin cell lithium battery is incorrectly replaced. Replace only
with the same or equivalent type recommended by the equipment manufacturer. Dispose of used
batteries according to local, state, regional, and federal regulations.
Under any of the following conditions, unplug the ix2 from the wall outlet and contact technical support:
126
The device does not function properly when the operating instructions are followed.
Safety Information
Legal
Open Source
The software included in this product contains copyrighted software that is licensed under open source
agreements. Components of this software covered under GPL or other open source licenses are fully
documented as to license and redistribution requirements in the ReadMe file available with the source
code. The corresponding source code package is available for download from the LenovoEMC web site at
http://support.lenovoemc.com. To locate the download page for open source code, select your network
storage product and your operating system. Scroll down the page to the search field and enter open
source. In addition, you can also obtain a copy of the applicable open source code on CD by sending a
money order or check for $10 (USD) to:
LenovoEMC, Ltd. ATTN: Source Code 4059 South 1900 West Roy, UT 84067 USA
Please include the model name for your network storage product with the request.
Open Source
127
Legal
Warranty Information
Limited Warranty Notice
Lenovo Network Storage products are covered by the terms of the Lenovo Limited Warranty, version L5050010-02 08/2011. Read the Lenovo Limited Warranty (LLW) at http://www.lenovo.com/warranty/llw_02/.
You can view the LLW in a number of languages from this Web site. If you cannot view the LLW from the
Web site, contact your local Lenovo office or reseller to obtain a printed version of the LLW.
Warranty Period
The warranty period for ix2 Network Storage products is 3 years for product purchased in all regions.
Applicable Types of Warranty Service (as described in the Lenovo Limited Warranty):
1. Customer Replaceable Unit (CRU) Service
7. Product Exchange Service
For network storage products, coverage for product exchange transportation may differ by region. For
additional information on this coverage, please contact a local Lenovo service provider.
For a full explanation of the types of warranty service, refer to the full warranty available at
http://www.lenovo.com/warranty/llw_02/.
NOTE: Lenovo Network Storage products are manufactured solely to standard commercial grade levels of
reliability and are not intended for use in any systems that require the products to conform to the higher
grades of reliability, such as critical safety systems, life-support systems, medical devices, nuclear
facilities, military devices, satellites, or aviation equipment. Lenovo shall not be liable for any damages
incurred if Lenovo products are used in such capacities, and no warranty shall apply.
128
Warranty Information
Legal
Regulatory Information
This topic provides regulatory information for various countries.
Manufacturer/Responsible Party
LenovoEMC, Ltd., 4059 South 1900 West, Roy, UT 84067
EU Representative
Lenovo, Einsteinova 21, 851 01 Bratislava, Slovakia
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) this device may not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
Canadian Verification
This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment
Regulations (ICES-003, Class B).
Regulatory Information
129
Legal
The WEEE marking on Lenovo products applies to countries with WEEE and e-waste regulations (for
example, European Directive 2002/96/EC, India E-Waste Management & Handling Rules, 2011).
Appliances are labeled in accordance with local regulations concerning waste electrical and electronic
equipment (WEEE). These regulations determine the framework for the return and recycling of used
appliances as applicable within each geography. This label is applied to various products to indicate that
the product is not to be thrown away, but rather put in the established collection systems for reclaiming
these end-of-life products.
Country-specific information is available at http://www.lenovo.com/recycling.
India RoHS
RoHS compliant as per E-Waste (Management & Handling) Rules, 2011.
130
Regulatory Information
Legal
Regulatory Information
131
Legal
Lenovo and the Lenovo logo are registered trademarks of Lenovo in the United States, other countries, or
both. The EMC logo is a registered trademark of EMC Corporation in the United States and/or other
countries. LenovoEMC and LifeLine are registered trademarks or trademarks of LenovoEMC, Ltd. in the
United States, other countries, or both. Windows is a trademark of the Microsoft group of companies. Mac
is a trademark of Apple Inc., registered in the United States and other countries. Linux is the registered
trademark of Linus Torvalds in the U.S. and other countries. Certain other product names, brand names,
and company names may be trademarks or designations of their respective owners.
132