捷科存储用户使用手册
- 格式:pdf
- 大小:988.81 KB
- 文档页数:53
SC9000 存储系统用户手册注、小心和警告注: “注”表示帮助您更好地使用该产品的重要信息。
小心: “小心”表示可能会损坏硬件或导致数据丢失,并告诉您如何避免此类问题。
警告: “警告”表示可能会导致财产损失、人身伤害甚至死亡。
© 2015 – 2019 Dell Inc. 或其子公司。
保留所有权利。
Dell、EMC 和其他商标是 Dell Inc. 或其附属机构的商标。
其他商标可能是其各自所有者的商标。
2019 - 01Rev. D关于本指南 (4)修订历史记录 (4)读者对象 (4)联系 Dell™是 Dell Inc. 的商标。
Intel (4)1 关于 SC9000 (5)存储系统概览 (5)SC9000 硬件 (5)前面板功能部件和指示灯 (6)背面板部件和指示灯 (7)SC9000 监测和诊断 (8)LCD 面板功能部件 (8)主屏幕 (9)“设置”菜单 (9)视图菜单 (9)2 装回存储系统组件 (10)安全防范措施 (10)安装安全防范措施 (10)电气安全防范措施 (10)静电放电防范措施 (10)一般安全防范措施 (11)装回前挡板 (11)更换前过程 (12)使用 SupportAssist 发送诊断数据 (12)关闭存储控制器 (12)更换机架导轨 (12)更换后过程 (13)启动存储控制器 (13)使用 SupportAssist 发送诊断数据 (13)启动 Storage Center 硬件 (13)3 技术规格 (14)目录3关于本指南本指南将介绍如何在SC9000 存储系统上执行维修和维护。
修订历史记录说明文件编号:680-100-001读者对象本用户手册中提供的信息面向 Dell EMC 最终用户。
联系 Dell™是 Dell Inc. 的商标。
IntelDell™是 Dell Inc. 的商标。
Intel 提供了几种联机和电话支持与服务选项。
可用的选项因国家/地区和产品而不同,某些服务在您所在的区域可能并不提供。
STORAGE SOLUTIONISM ULTRAFLEX 3600Automated storage systemsStatic storage systemsISM 500ISM ULTRAFLEX 3900ISM 400ISM 2000ISM 1100EFFICIENT STORAGE MANAGEMENT –A DECISIVE FACTOR OF SUCCESSSTORAGE MANAGEMENT SYSTEMSIntelligent and efficient storage management has become an increasingly important factor of success in SMT production processes. It is the only way to ensure optimum output teamed with a more flexible product line. Besides, it is a crucial element on the road to Industry 4.0.JUKI ISM storage management systems facilitate exactly this intelligent and flexible type of warehousing. By minimising the manual expenditure of time, it is possible to shift the focus on value-creating activities. An efficient storage management system saves time and money during the entire production process. Apart from that, it regularly communicates with your ERP/MES system.JUKI STORAGE SOLUTION includes a wide range of different intelligent storage cabinets for your stock of components. STORAGE SOLUTION allows for flexible assembly and modular extension. What is more, it enables the smart integration of existing storage systems.It is JUKI‘s goal to closely cooperate with their customers in order to develop an ideal, customised and intelligent storage concept – regardless of the particular requirements.ADVANTAGES OF JUKI STORAGE SOLUTION2STORAGE SOLUTIONOPTIMISED MATERIAL FLOWFEEDER SETUP WITH STORAGE SYSTEMSRE-STORAGE OF LEFTOVER MATERIAL UPON COMPLETION OF PRODUCTION3STORAGE SOLUTION4STORAGE SOLUTIONISM UltraFlex 3600 ISM UltraFlex 39005STORAGE SOLUTION SOFTWARE WITH MANY ADVANTAGESComprehensive storage managementIncluded in the scope of delivery, the AutoSMD software guarantees comprehensive storage management. The inventory level in-cluding both the available and the allocated quantities can be controlled at all times. Thanks to the order preparation and planning functionality, the required parts as well as the SMD and THT components will be blocked. Thus, those parts will be excluded from planning. Once the minimum stock level has been reached, it is possible to automatically send a request for material to the ERP system. In order to be able to react in time, you can always update your stocks in your ERP/MES systems.EFFICIENT STORAGE THANKS TO INTELLIGENT STORAGE SOFTWAREPaperless order managementThanks to the electronic order planning and inventory removal management, a nnoying material printouts are a thing of the past. The material is made available to theo perator. Material requested by the pick and place machine can be directly retrieved from storage .Connection to ERP/MES systems and production linesThe AutoSMD software can be connected to all known MES/ERP systems, which facilitates the exchange of data at all levels. The entire production chain, including the supply chain, can thus work in a transparent and efficient manner. Since the ISM towers can be used regardless of the brand, they do not necessarily have to be used along with a JUKI production line. Moreover, the material can be automatically entered into an existing ERP/MES system.TraceabilityA comprehensive barcode library enables automatic material recognition upon storage, which reduces the error rate to a significant extent. In order to allow future error analyses, traceability pictures of each reel are saved at the same time.Monitoring of MSD components MSD components are monitored by the system, the floor time is tracked at package level, and expired material will not be released for orders. Thus, the reject rate relating to components and finished PCBs is reduced significantly.It is possible to integrate an existing storage system – regardless of whether it is another automated storage system or a high-bay warehouse – into the JUKI storage management system. The space required in a high-bay warehouse will be optimised by the dynamic (chaotic) type of warehousing.Inventory removal occurs in a route- optimised way by means of a PDA. Thus, you will save time and minimise human errors during the retrieval process.Integration of existing storage systems6STORAGE SOLUTIONAUTO INCOMING DESKReceiving goods in one stepThe JUKI material auto incoming desk allows receiving goods in one step. All you have to do is place the component reel on the glass plate above the camera. The whole process is a utomated: material recognition, print of the unique ID barcode label and entry into the database. The system registers the components in a straightforward, easy and reliable way. Thus, they can be stored immediately or made available for production.FULLY-AUTOMATED STORAGE SYSTEMISM UltraFlex 3600 and ISM UltraFlex 3900EfficiencyUser interaction is not required during the fully-automated storage or retrieval of up to 54 reels. Meanwhile, the employee can complete other tasks. Besides, automateds torage saves valuable time, time that – in case of traditional shelf warehouses – is otherwise spent for manual commissioning, the search for material as well as fors torage and re-storage.Space-saving solutionUsing the ISM UltraFlex 3600, up to approx. 3,600 7-inch reels may be flexibly stored on a floor space of only 3.6 m 2. Naturally, there are also solutions for 15-inch reels and for the shared storage of 7- and 15-inch reels. Moreover, it is possible to more thand ouble the capacity of the ISM UltraFlex 3600 by adding the ISM UltraFlex 3900 e xtension module.Protected by cases, the component reels are always stored in a clean and safe way. ESD compliance is guaranteed at all times. Moreover, the cases facilitate quick re-storage, which also applies to reels that are damaged or slightly bent out of shape. Maximum storage space optimisation is ensured by the dynamic (chaotic) type of warehousing. Cases with differentheights are stored space-saving in the tower.Cases in storageCases with flexible height adjustment Double caseView into the towerISM UltraFlex 3900 extension moduleBy adding an ISM UltraFlex 3900 module, you will more than double your storage capacity. The ISM UltraFlex 3900 and the ISM UltraFlex 3600 are interconnected by two conveyor belts. Both will then act as a single unit with a total storage capacity of up to 7,500 reels.Error preventionFully-automated storage prevents human allocation errors. All sources of error are eliminated, because all materials are scanned and photographed during storage process. What is more, the internal system software can report stored materials and any missing parts back to the existing ERP system.MSD monitoringThe optional humidity control keeps the humidity inside the system at 5% RH. Delicate MSD components are thus protected against excessive humidity (RH > 5%). Besides, the software records the prevailing humidity throughout the component‘s entire storage cycle. Expired components will be blocked for the production.AUTOMATED STORAGE SYSTEMISM 2000 and ISM 1100Patented multiple pick positionsAutomated storage systems have been developed with the objective of achieving optimum performance when it comes to storage capacity and overall size. Thanks to these systems, reels and trays stored in cases can be stored and retrieved very rapidly. The patented multiple pick positions allow moving up to 27 reels into and out of storage at the same time. This applies to all products available.All models available are listed on the back of this brochure.STATIC STORAGE SYSTEM Array Storage space for different types of componentsJUKI has designed static storage systems for the manual, smartand dynamic (chaotic) storage and retrieval of different materialssuch as reels, JEDEC trays, SMT/THT bars, prepared feeders, PCBs,THT components and much more.All models available are listed on the back of this brochure.7STORAGE SOLUTIONSPECIFICATIONS05/2018_R e v 01Specifications and design subject to change without notice.European Headquarters:JUKI Automation Systems GmbHNeuburger Str. 41, 90451 Nuremberg, Germany phone: +49 911 93 62 66 0 fax: +49 911 93 62 66 26email:*****************。
S torageTek T10000C Security GuideE57790-01October 2014StorageTek T10000C Security GuideE57790-01Copyright © 2014, Oracle and/or its affiliates. All rights reserved.Primary Author: Dave HostetterContributing Author:Contributor:This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.ContentsPreface (v)Audience (v)Documentation Accessibility (v)1OverviewProduct Overview..................................................................................................................................... 1-1 Capacity and Performance of T10000C................................................................................................. 1-1 Security....................................................................................................................................................... 1-1 General Security Principles.................................................................................................................... 1-1 Keep Software Up To Date............................................................................................................... 1-1 Restrict Network Access................................................................................................................... 1-2 Keep Up To Date on Latest Security Information......................................................................... 1-2 2Secure InstallationUnderstand Your Environment............................................................................................................. 2-1 Which resources need to be protected?.......................................................................................... 2-1 From whom are the resources being protected?............................................................................ 2-1 What will happen if the protections on strategic resources fail?................................................ 2-1 Securing the Tape Drive......................................................................................................................... 2-1 Installing Virtual Operator Panel (VOP) application....................................................................... 2-2 Post Installation Configuration............................................................................................................. 2-2 Assign the user (admin) password.................................................................................................. 2-2 Enforce password management....................................................................................................... 2-2 3Security FeaturesA Secure Deployment ChecklistB ReferencesiiiivPrefaceThis document describes the security features of Oracle’s StorageTek T10000C. AudienceThis guide is intended for anyone involved with using security features and secureinstallation and configuration of StorageTek T10000C.Documentation AccessibilityFor information about Oracle's commitment to accessibility, visit the OracleAccessibility Program website at/pls/topic/lookup?ctx=acc&id=docacc.Access to Oracle SupportOracle customers have access to electronic support through My Oracle Support. Forinformation, visit /pls/topic/lookup?ctx=acc&id=info orvisit /pls/topic/lookup?ctx=acc&id=trs if you are hearingimpaired.vvi1Overview This section gives an overview of StorageTek T10000C tape drive and explains thegeneral principles of tape drive security.Product OverviewThe T10000C Enterprise tape drive attaches to open systems SCSI over Fibre Channelprotocol and mainframe over FICON protocol. The T10000C tape drive transfers datato and from a host and stores it on a removable magnetic media. The T10000C tapedrive is intended primarily to provide high reliability, high capacity back up, archive,and data processing capabilities for enterprise customers that demand high duty cycleand reliability. The product provides optional data encryption. The customer has theoption to enable the encryption feature. The tape drive product was enhanced forcapacity and native tape speed. In addition, data management features were alsoadded along the way.Capacity and Performance of T10000CThe T10000C tape drive has 5TB capacity and 240 MB per second native tape speed.SecurityThe T10000C tape drive is designed and documented for use within a controlledhardware environment. Tape drives are always located inside a controlled data centerand they are typically located inside of a tape library. In some cases, the customer willuse a rack mount version but that is rare. The controlled data center is also inside a firewall that is protected by the customer's own security policies. This will give the bestfunctionality and protection from compromise, both from the internet in general andfrom the internal entity operating the tape drive.General Security PrinciplesThe following principles are fundamental to using any product securely.Keep Software Up To DateOne of the principles of good security practice is to keep all software versions andpatches up to date. Throughout this document, the following software level isassumed:T10000C 3.XX.1XXOverview1-1General Security PrinciplesRestrict Network AccessKeep the tape drive behind a data center firewall. The firewall provides assurance thataccess to these systems is restricted to a known network route, which can bemonitored and restricted, if necessary. As an alternative, a firewall router substitutesfor multiple, independent firewalls. Identifying the hosts allowed to attach to the tapedrive and blocking all other hosts is recommended where possible.Keep Up To Date on Latest Security InformationOracle continually improves its software and documentation. Check this documentevery release for revisions.1-2StorageTek T10000C Security Guide2Secure Installation 2-1Secure InstallationThis section outlines the planning and implementation process for a secure installation and configuration, describes several recommended deployment topologies for the systems, and explains how to secure a tape library.Understand Your EnvironmentTo better understand security needs, the following questions must be asked:Which resources need to be protected?Many resources in the production environment can be protected. Consider the resources needing protection when deciding the level of security that you must provide.From whom are the resources being protected?The tape drive must be protected from everyone on the Internet. But should the tape drive be protected from the employees on the intranet in your enterprise?What will happen if the protections on strategic resources fail?In some cases, a fault in a security scheme is easily detected and considered nothing more than an inconvenience. In other cases, a fault might cause great damage to companies or individual clients that use the tape drive. Understanding the security ramifications of each resource will help protect it properly.Securing the Tape DriveBy default, the tape drive uses ports listed in the following table. The firewall should be configured to allow traffic to use these ports and that any unused ports are blocked. The tape drives support IPv6 and IPv4.Table 2–1Network ports used PortT10000C 22 tcp - SSH VOPX 22 tcp - SFTP X161 udp - SNMPV1 Tape Drive agent requests - inbound stateful X162 udp - SNMPV1 Tape Drive traps and inform notifications - outbound stateless for traps, outbound stateful for inform XInstalling Virtual Operator Panel (VOP) application2-2StorageTek T10000C Security Guide Ports 21 and 23 will be disabled for our customers for T10000C. If a customer requires access to a non-secure TELNET or non-secure FTP or both, then a VOP configuration option is available.Installing Virtual Operator Panel (VOP) applicationVOP should only be installed on systems that are within the same protected network infrastructure as the tape drive. Customer access controls should be enforced on the systems where VOP is installed to assure restricted access to the tape drive. See Table 2–1 for ports used by VOP .Refer to the following VOP user guide for web launch VOP install instructions./technetwork/documentation/tape-storage-curr-187744.h tml#vopPost Installation ConfigurationThis section documents security configuration changes that must be made after installation.Assign the user (admin) password.The customer admin account password should be changed by the customer at the site and is owned by the customer. The password security meets Oracle standards. An infinite number of passwords is available for use over the life of the tape drive. If the admin password is forgotten, it can be reset. The first password is the default password sent with the tape drive.Enforce password managementBasic password management rules, such as password length, and complexity must be applied to the administrator password.The password management rules require at least one of each of the following rules.■Must be between 8 and 16 characters long ■Lower case (a-z)■Upper case (A-Z)■Decimal digit (0-9)23 tcp - TELNET21 tcp - FTP9842 tcp - EPT3331 OKM - challenge and root CA serviceX 3332 OKM – Enrollment. Cyber strength is AES256X 3334 OKM – Encryption key exchange. Cyber strength is AES256X 3335 OKM – Cluster discovery. Cyber strength is AES256X Table 2–1(Cont.)Network ports usedPortT10000CPost Installation Configuration ■Special characters (.?;:"{}[]()!@#$%&, ...)Secure Installation2-3Post Installation Configuration2-4StorageTek T10000C Security Guide3Security FeaturesThis section outlines the specific security mechanisms offered by the product.The T10000C tape drive communicates on a secure channel to the Oracle Key Management System. The T10000C will communicate SSH and SFTP to the Virtual Operator Panel and TELNET and FTP will be disabled for our customers. These should not be the only line of security to protect the Tape Drive. Ideally, the Tape Drives should be in a physically secured data center that also has a secured network that only allows access from the servers utilizing its functionality. These servers and applications running on them should also be secured. In addition, the customer has the option to elevate the security of the tape drive to yet another level. One of the options is to encrypt their data.Security Features3-13-2StorageTek T10000C Security GuideA Secure Deployment ChecklistThe following security checklist includes guidelines that help secure the tape drive:1.Enforce password management.2.Enforce access controls.3.Restrict network access.a. A firewall should be implemented.b.The firewall must not be compromised.c.System access should be monitored.work IP addresses should be checked.4.Contact your Oracle Services, Oracle Tape Library Engineering, or accountrepresentative if you come across vulnerabilities in Oracle tape drives.Secure Deployment Checklist A-1A-2StorageTek T10000C Security GuideBReferencesYou can access the VOP User Guide from:/technetwork/documentation/tape-storage-curr-187744.h tml#vopReferences B-1B-2StorageTek T10000C Security Guide。
Thecus 1U4500R1U4500S 用户手册版权和商标公告Thecus和Thecus产品的其他名字的注册商标为Thecus科技有限公司。
Microsoft, Windows,和Windows标志的注册商标为微软公司。
Apple, iTunes和Apple OS X的注册商标为苹果电脑公司。
所有其他商标和品牌名称都是他们各自的所有人的财产。
如未经通知,说明书以改版为准。
版权(C) 2007 Thecus 科技公司。
版权所有关于这份手册这份手册里的所有信息已经很被仔细地核实,以确保它的正确性。
如果发生错误,请给我们反馈。
在未通知的情况下,Thecus科技公司对这份手册内容的修改保留权利。
产品名称: Thecus 1U4500手册版本: 1.0出厂日期2007年1月有限担保Thecus科技公司担保Thecus 1U4500的所有部件在他们离开工厂之前都经过全面地测试,还有必须在一般使用的情况下能正常地运作。
一旦发生任何系统故障,如果产品在保修期内,在正常使用的情况下出现故障,Thecus科技公司,当地代表和经销商有责任对客户进行免费保修。
Thecus科技公司不对任何由产品引起的任何数据损坏或损失负责任。
强烈推荐用户进行必要的备份操作。
安全警告对于您的安全方面,请阅读并按照下面的安全警告。
请在安装您的1U4500.之前全面地阅读这份手册。
你的1U4500是一复杂的电子设备。
不要在任何情况下尝试修理它。
在发生故障的情况下,立即关掉电源,然后到合格的服务中心修理。
对于细节方面联系你的经销商。
不要在电源线上放置任何东西。
不要把电线放在任何可以被踏着走的地方。
谨慎地放好连接电缆,避免他们受到踩踏。
在温度为0°C 和40°C 之间,伴随着20% – 85%的相对湿度,你的1U4500可以正常运作。
在极端的环境条件下使用1U4500可能会损坏它。
确保给1U4500正确地供电(AC 100V ~ 240V, 50/60 Hz,3A). 把1U4500插到不正确的电源会被损坏。
THINK SECURITY GUIDEINSIDE THIS GUIDE TOCLOUD-BASED STORAGE:THE FORECASTUNDER A CLOUD OF SUSPICIONEVERY CLOUD HAS A SILVER LINING THINK ABOUT IT. WE DO.THE KASPERSKY LAB TEAMNowadays we can almost always access the internet – you could be out walking in the countryside, eating in a restaurant, even while taking a bath we can take advantage of the online world.Living in a digital age has its advantages. But this ever growing connectivity makes it easierfor cybercriminals to come up with new ways of targeting us and wreaking havoc with our digital lives – no matter where we are. Cloud-based storage is just one digital revolution that makes accessing our information on location easier. With the number and nature of cyber threats growing and changing all the time, it is easy to see why some find it hard to trust or feel safe using this new and emerging technology.It is human nature to be cautious and avoid change, but being too sceptical could stop you from getting the most from this valuable service.THE FORECASTTo many of us, a cloud is an object that floats in the sky and often comes with a weather warning. Yet, with many people saying we are moving into a ‘cloud controlled era’, the age old question remains: how can you trust something you do not understand?Cloud-based storage is, in the most basic of terms, a network of servers, on the internet,that each have different functions and provide different services – wherever and whenever you need them. Large companies such as Google and Amazon already provide most of their services through Cloud technology.More and more people are using Cloud-based storage for online backup and storage solutions – sometimes unknowingly. For instance, when you upload photos to social network sites, like Facebook or Instagram, you are instantly uploading it to the Cloud.The efficiency, security and popularity of Cloud-based storage continue to rise – and for good reason. Imagine if your laptop and hard drive, along with your valuable digital memories, were lost, stolen or damaged. What would you do? Using the Cloud to store your data allows you to create an invisible back up copy of these files and folders. Be it pictures from your holidays, music files or books, Cloud storage provides a convenient and cost-effective substitute to an external hard drive.UNDER A CLOUD OF SUSPICIONLike any new technology the Cloud is no different – while it has its advantages there will also be potential security threats.Like anyone who uses services online or stores information virtually on the Internet, those who use Cloud-based services are subject to emerging security threats more than ever before.When Cloud services are compromised, those who don’t protect their passwords and keep access to their accounts secure often suffer most. Irrespective of how trustworthy the Cloud is it makes sense to keep your passwords private.Don’t use just real words, even from a foreign language or written backwards, there are tools on the Internet that will crack these in seconds.Don’t choose an obvious password such as your name or date of birth – this is as bad as leaving your house key under the doormat. The most common passwords are patterns on the keyboard (‘qwerty’, ‘123456’), users’ first names, the F-word and ‘Password’ – these are as bad as just leaving your front door open!If you want, use a passphrase made up of a series of words or symbols – ‘Iliveat10HighStreet’ – or something silly but fun – ‘HFUNEX?NoIFN10EX (Have you any eggs? No, I haven’t any eggs’).The good news is there are ways of taking advantage of all the positive things Cloud technology brings, while taking steps to secure your data and protect your privacy too.In truth, no matter how vigilant we are, we will never fully control all situations and circumstances thatcan harm and affect our data. However , you can be proactive. Using a trustworthy online backup system and internet security will keep you on track in protecting your digital life.Other articles and links related to Cloud Based Storage •Choosing an Antivirus Solution •Internet Safety: Protect Yourself Online •Kaspersky Anti-Virus Software。
存储服务器 操作手册目录第一章存储服务器的功能........................................................................................................- 2 -1.1功能概述........................................................................................................................- 2 -1.2性能概述........................................................................................................................- 2 -1.3运行环境........................................................................................................................- 3 - 第二章存储服务器的使用........................................................................................................- 4 -2.1运行前的准备................................................................................................................- 4 -2.1.1磁盘的组织.........................................................................................................- 4 -2.1.2原始数据库文件.................................................................................................- 4 -2.1.3 确认运行环境....................................................................................................- 5 -2.2服务器操作说明............................................................................................................- 5 -2.2.1首次运行.............................................................................................................- 5 -2.2.2主界面说明.........................................................................................................- 6 -2.2.3启动服务器.........................................................................................................- 7 -2.2.4停止服务器.........................................................................................................- 8 -2.2.5系统配置.............................................................................................................- 8 -2.2.6退出.....................................................................................................................- 8 -2.2.7配置录像计划.....................................................................................................- 8 -2.2.8未录通道日志记录功能.....................................................................................- 9 - 第三章存储服务器的数据库备份..........................................................................................- 10 -3.1 数据库的备份还原.....................................................................................................- 10 -3.2存储服务器的重新安装..............................................................................................- 11 -第一章存储服务器的功能1.1功能概述存储服务器软件实现对监控录像数据的统一保存,它通过直接连接设备或者通过流媒体服务器获取视频数据流,并以数据块的方式保存在预分配的磁盘空间中,通过磁盘数据的索引文件保存录像数据信息。
HC-9200系列产品本系列产品包括HC-9208 HC-9310声明:感谢您选用本公司产品,本手册所描述的内容不代表本公司的承诺,本公司保留对此手册更改的权利且不另行通知。
本公司只对本产品品质负责,对于因使用不当造成的直接或其它的间接损失,本公司不承担责任。
本手册中涉及的其它商标所有权由相应产品厂家拥有。
目录第一章产品介绍 (1)1.1 产品简介 (1)1.2 产品特点 (1)1.3 产品外观 (2)1.4 结构说明 (3)1.4.1指示灯说明 (3)第二章HC-9200系列硬件安装说明 (5)2.1 硬盘安装说明 (5)2.2 扩展卡的安装说明 (5)第三章扩展卡驱动安装说明 (6)3.1 HC-9200系列的BIOS (6)3.1.1 不带RAID功能的BIOS (6)3.1.2 带RAID功能的BIOS(标配) (6)3.1.3 更新BIOS方法 (6)3.2 Win2000驱动的安装 (7)3.2.1 无RAID功能的驱动安装 (7)3.2.2 带RAID功能的驱动安装 (8)3.3 Windows 2000下移除HC-9200 (9)3.4 MAC OS下驱动程序安装 (10)第四章磁盘管理 (13)4.1 HC-9200的磁盘管理(无RAID功能 (13)4.2 HC-9200的磁盘管理(带RAID功能 (13)4.2.1 安装RAID管理软件 (13)4.2.2 SATARAID 5 管理 (13)4.2.3 0通道、1通道的显示 (14)4.2.4 SATA Raid5 Manager配置说明 (14)4.2.5 创建RAID 5 (16)4.2.6 删除RAID 5 (19)4.2.7 恢复RAID 5中的数据 (20)4.3 在MAC OS下的磁盘管理 (22)4.4 HC-9200的安装和磁盘管理 (23)第五章磁盘阵列说明 (24)5.1 RAID 0 (24)5.2 RAID 1 (25)5.3 RAID 0+1 (25)5.4 RAID 5 (26)5.5其他RAID (27)第六章LED功能概述 (27)6.1功能概述 (27)6.2按键说明 (27)6.3功能详述 (28)6.4动画效果显示 (28)6.5按键操作 (28)第七章注意事项 (29)附录(一)产品速率测试情况 (30)附录(二)传输速率的对比 (30)第一章产品介绍1.1 产品简介HC-9200系列产品是采用Serial ATA II接口的新一代磁盘阵列系统,本系列产品具有大容量、易使用、便维护等特点。
Dell PowerEdge M1000e 机柜用户手册管制型号: BMX01注、小心和警告注: “注”表示可以帮助您更好地使用计算机的重要信息。
小心: “小心”表示可能会损坏硬件或导致数据丢失,并说明如何避免此类问题。
警告: “警告”表示可能会造成财产损失、人身伤害甚至死亡。
© 2013 Dell Inc. 保留所有权利。
本文中使用的商标: Dell™、Dell 徽标、Dell Boomi™、Dell Precision™、 OptiPlex™、Latitude™、PowerEdge™、PowerVault™、PowerConnect™、OpenManage™、EqualLogic™、Compellent™、KACE™、FlexAddress™、Force10™、Venue™和 Vostro™是 Dell Inc. 的商标。
Intel®、Pentium®、Xeon®、Core®和 Celeron®是 Intel Corporation 在美国和其他国家或地区的注册商标。
AMD®和 AMD Opteron™、AMD Phenom™以及 AMD Sempron™是 Advanced Micro Devices, Inc.的注册商标或商标。
Microsoft®、Windows®、Windows Server®、Internet Explorer®、MS-DOS®、Windows Vista®和 Active Directory®是 Microsoft Corporation 在美国和/或其他国家或地区的商标或注册商标。
Red Hat®和 Red Hat® Enterprise Linux®是 Red Hat、Inc. 在美国和/或其他国家或地区的注册商标。
LaCie Rugged USB-C 使用手冊© 2016 Seagate Technology LLC.版權所有。
Seagate、Seagate Technology、Wave 標誌和 FreeAgent 均為 Seagate Technology LLC. 或其子公司之一的商標或註冊商標。
其他商標或註冊商標均為其個別擁有者的財產。
意指硬碟機容量時,1 gigabyte 或 GB 等於十億位元組,而 1 terabyte 或 TB 相當於一兆位元組。
此外,列出的某些容量是用於格式化和其他功能,因此並不適用於資料儲存。
各種應用的使用量範例僅供參考。
實際數據將因各種因素不同而有所差異,包括檔案大小、檔案格式、特性和應用軟體。
Seagate 得隨時變更產品供應項目或規格,恕不另行通知。
Seagate Technology LLC47488 Kato RoadFremont, CA 94538USASeagate Technology NL B.V.Koolhovenlaan 11119 NB Schiphol-Rijk荷蘭Seagate Technology NL B.V. (英國分公司)Jubilee House, Globe Park, 3rd Ave,Marlow SL7 1EYUKSeagate Singapore International Headquarters Pte.Ltd.90 Woodlands Avenue 7Singapore 737911按一下此處存取該文件最新線上版本。
您也可以找到最新內容,以及可擴展圖像、簡易導覽和搜尋功能。
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Contents1簡介盒裝內容最低系統要求2連接線和接頭USB 3.1 (USB-C) 連接線3進行連接步驟 1 - 連接 USB 連接線步驟 2 - LaCie Setup Assistant 4使用 iPad USB-C 5格式化和磁碟分割(可選)關於檔案系統格式格式化說明6從電腦上安全地移除 Rugged USB-C Mac Windows 7常見問題所有使用者. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 連接埠. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 作業系統. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 最低可用磁碟空間. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 啟動 LaCie Setup Assistant - Mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 啟動 LaCie Setup Assistant - Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LaCie Setup Assistant 步驟. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 透過 Finder 視窗退出. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 透過桌面退出. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 問題:檔案傳輸速度過慢。
捷科医药物流管理系统(SCM)V3.0用户手册江苏捷科软件技术有限公司2011年12月31日目录1.基本操作 (6)1.1 主界面结构 (6) (6)1.2 操作分类 (7)1.2.1基础信息类 (7)1.2.2业务单据类 (10)1.2.3查询类 (10)1.2.4导出类 (12)1.2.5 快捷键类 (12)1.2.6【批选】操作 (13)2.基础信息 (14)2.1 基础档案 (14)2.2 档案维护 (15)3.物价管理 (16)功能摘要: (16)3.1 零售批发调价单 (16)4.采购管理 (17)功能摘要: (17)4.1 经营设置 (17)4.1.1同行销价录入单 (17)4.1.2推荐品种设置 (17)4.1.3促销品种设置 (17)4.1.4限量限价品种设置 (17)4.1.5商品销售区域设置 (17)4.2 购进管理 (18)4.2.1采购分析 (18)4.2.2采购合同 (19)4.2.3采购合同取消单 (21)4.2.4ABC价格设置 (21)4.2.5库存变价单 (21)4.3 付款申请 (21)4.3.1付款结算申请单(自动付款单) (21)4.4采购审批 (22)4.4.1购进审批 (22)4.4.2付款审批 (22)4.5 采购退货 (22)4.5.1采购退货申请单 (22)4.5.2直接采购退货 (24)5.销售管理 (24)功能摘要: (24)5.1 销售订单 (25)5.1.1销售订单 (25)5.1.2销价调整单 (26)5.1.3销售取消单 (26)5.2 销售退货 (26)5.2.1直接销售退货单(出库红冲) (26)5.2.2销售退货申请单 (27)5.2.3销售退货审批单 (28)5.2.4非原单销售退回 (28)5.2.5非原单销售退回审批 (29)6.报价管理 (29)6.1.1报价单 (29)6.1.2 报价确认单 (30)6.1.3 报价取消单 (31)6.1.4 报价销售单 (32)6.1.5 报价销售取消单 (32)7.网上订单 (33)7.1.1 网上订单 (33)7.1.2网上订单取消单 (34)7.1.3网上销售单 (34)7.1.4网上销售取消单 (35)8.请货销售 (36)8.1.1请货审批单 (36)8.1.2请货销售单 (36)8.1.3请货销售取消单 (37)8.1.4请货销售缺货导出 (38)8.1.5客商外部接口对照表 (38)8.1.6商品外部接口对照表 (38)9.记账中心 (39)9.1 采购记账 (39)9.1.1采购记账单 (39)9.1.2采购退货记账单 (40)9.1.3采价调整单 (40)9.1.4入库冲补差价 (42)9.2 销售记账 (42)9.2.1销售记账单 (42)9.2.2销售退货记账单 (43)9.2.3销价调整审核单 (43)10.发票管理 (44)10.1 采购发票 (44)10.1.1采购发票录入 (44)10.1.2在途商品组票 (45)10.1.3在途商品组票审批 (46)10.2 销售发票 (47)10.2.1销售换票 (47)11.财务结算 (47)11.1.1采购预付付款单 (47)11.1.2预付款到货核销单 (48)11.1.3预付款到货核销应付余额付款单 (49)11.1.4财务付款单 (49)11.2 销售结算 (50)11.2.1销售预收单 (50)11.2.2销售结算单 (51)12.仓储管理 (51)12.1 验收管理 (51)12.1.1采购验收单 (51)12.1.2直接验收入库单 (53)12.1.3采购入库货位分配 (53)12.1.4销售退货验收单 (54)12.2 收发货管理 (55)12.2.1直接出库单 (55)12.3 出库复核 (55)12.3.1条码出库复核 (55)12.4 移库管理 (56)12.4.1手动移库单 (56)12.4.2采退移库单 (57)12.5 日常操作 (58)12.5.1盘点申请单 (58)12.5.2盘点审批单 (58)12.5.3报损申请单 (58)13.物流配送 (59)13.1 理货运输 (59)13.1.1理货确认单 (59)13.2 送货协议 (60)13.2.1临时协议 (60)13.2.2正式协议 (61)14.客服管理 (61)14.1 赠品发放 (61)15.期初管理 (62)15.1 客商期初单 (62)15.2 商品期初单 (62)15.3 供应商期初单 (63)16.GSP管理 (64)功能摘要 (64)16.1 首营药品审批表 (64)16.2 药品购进记录 (65)16.3 药品质量验收记录 (66)16.4 药品在库养护记录 (66)16.5 重点药品养护记录 (66)16.7 近效期药品催销表 (68)16.8 库房温湿度记录 (68)17.查询统计 (69)功能摘要 (69)17.1 基础信息查询 (69)17.2 价格查询 (70)17.3 库存查询 (70)17.3.1今日商品库存查询 (70)17.3.2商品入出流水查询 (70)17.3.3商品进销存阶段查询 (71)17.3.4商品进销存明细查询 (71)17.4 台账查询 (71)17.5 GSP查询 (71)17.6 报警查询 (71)业务管理1.基本操作在本系统中,有些模块的操作方法是相同或者相似的,本章主要介绍一些常用的操作窗口,将共性的操作加以归纳,希望您在阅读完本章内容后能够掌握系统的基本操作。