ASUSTOR NAS AS5202T

https://www.nascloudworks.com/AS5202T.asp

Memory Upgrades

PW PROTECTED INFO – NETWORK / SETUP

Password Protected Info

NETWORK INFO ↓

https://clickety-clack.click/ip-networking-overview/ – as RuPaul Says

NAS INFO – SET UP INFO ↓

https://clickety-clack.click/asustor-nas-as5202t-setup-screenshots-info – girl you soooo


Non-protected info ↓

  1. Salesey Stuff
  2. Setting Up / Connecting / Manuals
  3. Wordpress Site / Configs / Security / Outside IP
  4. Setting Up Server – Networking – SSH
  5. >Local Ip Configuration – Self Assigning NATS AN IP
  6. Chats with XFinity During Set Up

Mac OS X

After enabling Mac OS X file service, you can access your NAS via any Mac OS X operating system (i.e., Mac OS X v10.7). This file transfer protocol is called AFP (Apple Filing Protocol). You can also use Time Machine to back up data to your NAS.

  • Apple Filing Protocol (AFP): This is the protocol used when transferring files between Mac OS X and local area networks. Go to the Finder and click “Go” in the Finder menu, then select “Connect to Server.” This will bring up the Connect to Server dialog box. Here you can enter the IP address that you want to connect to.
    For example: afp://192.168.1.168
  • Bonjour Service Name: Your NAS will be identified by this name in the Finder.
  • Time Machine Support: Here you can enable Time Machine support and select the shared folder that you wish to back up to. If multiple Mac users wish to access this feature simultaneously, please see NAS 159 – Time Machine: Best Practice for guidance. Reminder: Enabling this feature may prevent your hard disk(s) from going into hibernation.

    About Bonjour

    Bonjour, also known as zero-configuration networking, has been widely used in Apple related products. It will scan your vicinity for other Apple devices and then let you directly connect to them without having to know their actual IP addresses.

    After enabling this service, you will be able to see your NAS in the left hand panel of the Finder under “Shared”. Simply click on your NAS to connect to it.


    Learn More

    NAS 108 – Using NAS with Apple Mac OS X
    NAS 159 – Time Machine: Best Practice


salesey stuff


Set up Video

youtube.com/watch?v=N30Aa_mYHcU


https://www.asustor.com/en/online/College_topic?topic=108

https://www.asustor.com/service/downloads?product_id=61

https://www.asustor.com/service/compatibility


Configurations

apache2.conf /volume0/usr/builtin/etc/apache2/apache2.conf
apc.ini /volume0/usr/builtin/etc/php5/conf.d/apc.ini
iptables.conf
iptables.allow
iptables.deny
/volume0/usr/builtin/etc/iptables/iptables.conf
/volume0/usr/builtin/etc/iptables/iptables.allow
/volume0/usr/builtin/etc/iptables/iptables.deny
my.cnf /volume0/usr/builtin/etc/mysql/my.cnf
php.ini /volume0/usr/builtin/etc/php5/apache2/php.ini
/usr/local/AppCentral/php/etc/php5/apache2/php.ini (PHP 5.5.3 R2)
smb.conf /volume0/usr/builtin/etc/samba/smb.conf

Executable

apache /volume0/usr/builtin/etc/init.d/S54apache2
/volume0/usr/builtin/sbin/apache2
ipkg /opt/bin/ipkg
Use with root
Usage:
ipkg install [package name]
ipkg remove [package name]
iptables /volume0/usr/builtin/sbin/iptables
memecached /volume0/usr/builtin/bin/memcached
mysql /volume0/usr/builtin/etc/init.d/S55mysql
/volume0/usr/builtin/sbin/mysqld
mysql shell /volume0/usr/builtin/bin/mysql
php cli
/volume0/usr/builtin/bin/php

Log Files

apache error /volume0/usr/builtin/var/log/apache2/error_log

Other Files

apache modules /volume0/usr/builtin/etc/apache2/mods-available/
/volume0/usr/builtin/etc/apache2/mods-enabled/
boot auto execute scripts /volume0/usr/builtin/etc/init.d/
/volume0/usr/builtin/etc/script/
php modules /volume0/usr/builtin/lib/php/20090626/
/volume1/.@plugins/AppCentral/php/lib/php/20121212/ (PHP 5.5.3 R2)
/usr/local/AppCentral/php/lib/php/20121212/ (PHP 5.5.3 R2)
session files /tmp
web pages /volume1/Web/
Owner: admin

Notes

  1. When use ssh to login, use ssh root@[IP] or some files won’t be executable or editable.
  2. The web admin must be login with port 8000 by default.

Reference

  1. Asustor ADM

 


info

[3d-flip-book mode=”fullscreen” id=”104272″ class=”noeditus”][/3d-flip-book]

,more info

[3d-flip-book mode=”fullscreen” id=”104289″ class=”noeditus”][/3d-flip-book]

Datasheet_AS5202T_US_ENG

ASUSTOR AS5202T
Do more with 2.5GbE and AS5202T. The #1 cloud storage device for enthusiasts

ASUSTOR AS5202T 2-bay NAS (Diskless)
2 x 2.5″/3.5″ SATA3 HDD or SSD, Intel Celeron J4005 Dual-Core 2.0 GHz (burst up 2.7 GHz), 2GB SO-DIMM DDR4 (Max. 8GB) | #AS5202T


  • Two 2.5 GbE ports with up to 5 Gbps under Link Aggregation
  • Up to 28TB. Store live streams on your NAS
  • Overwhelming 4K experience
  • 2GB DDR4-2400 – 30% faster than DDR3
  • Intel Celeron dual core CPU – 30% faster than previous generation.
  • Three year warranty, best in class

2.0Ghz Dual Core CPU Boosts to 2.7Ghz

The AS5202T utilizes the Intel Gemini Lake Celeron J4005 dual core CPU and is 30% faster than Apollo lake. The Celeron J4005 also doubles the on-chip cache to 4MB, making the AS5202T one of our fastest NAS devices ever.

Upgradeable 2GB DDR4-2400 RAM

The AS5202T comes with two Gigabytes of DDR4 RAM and can be upgraded up to 8GB. DDR4 RAM provides up to 30% greater performance than DDR3 while also lowering energy requirements by 40%.

2x Seagate IronWolf Pro 4TB NAS Internal Hard Drive HDD

Seagate IronWolf Pro 4TB NAS Internal Hard Drive HDD – 3.5 Inch SATA 6Gb/s 7200 RPM 128MB Cache for RAID Network Attached Storage, Data Recovery Service – Frustration Free Packaging (ST4000NE001)
– amazon.com/gp/product/B084ZV8YW8/ref=ppx_yo_dt_b_asin_image_o00_s00?ie=UTF8&psc=1


https://www.asustor.com/getting_start/steps?series=4


3.5-inch hard disks: Place the hard disk into the disk tray, making sure that the mounting holes on the sides of the hard disk and disk tray are lined up. Secure the drive with four screws.


  • IronWolf internal hard drives are the ideal solution for up to 24-bay, multi-user NAS server environments that demand powerhouse performance
  • Store more and work faster with a NAS hard drive that provides 4TB and speeds up to 214MB/s
  • Specifically built for less wear and tear, little to no noise/vibration, no lags or down time, increased file-sharing performance, lower power consumption, and extra data protection—even in the event of power loss
  • Easily monitor NAS drive health using the integrated IronWolf Health Management system, and enjoy long-term reliability with 1. 2M hours MTBF
  • Five-year limited product warranty protection plan and three year Rescue Data Recovery Services included

Overview:

150% Faster with 2.5-Gigabit Ethernet

The AS5202T provides two 2.5-Gigabit Ethernet ports. Enable up to 150% faster performance than Gigabit Ethernet with compatible hardware and up to 5 Gbps using Link Aggregation.*

*Link Aggregation only supported with compatible hardware. Please check beforehand and verify that Link Aggregation is supported on your equipment.

All New Gaming-Inspired Theme for ADM

Take a look at the all new gaming-inspired elements brought to ADM.

Live Streaming With Your NAS

ASUSTOR NAS devices offer live stream records in up to 4K HDR to be saved directly onto a NAS without affecting game performance. For gamers without large hard drive capacities, LAN parties and internet cafés, ADM offers iSCSI to store less demanding titles to play across multiple devices simultaneously.

YouTube and Twitch as cloud platforms are not always reliable with long-term archival of content and videos may be deleted without notice. For that, ASUSTOR provides Takeasy, an app that downloads videos from YouTube and Twitch for archival purposes and can automatically download all public content from a specific channel.

As Much Space as Needed

The AS5202T supports up to 28TB, enabling storage of large live streams and videos. Complement gameplay recordings with a NAS. Not enough? Expand your AS5202T with up to three AS6004U expansion units for a total of 168TB.

Overwhelming 4K HDR Experience

The AS5202T features HDMI 2.0a with 10bit 4K hardware decoding, HEVC decoding and VP9 10bit Profile2 decoding for a smoother experience and lower CPU usage. Use Plex Pass or a third-party player to play 4K HDR videos.

A New Look

Diamond-cut exterior with gaming-inspired elements. ASUSTOR’s AS5202T features a diamond-cut exterior with new gaming-inspired aesthetic. Installation of hard drives is easy with the included toolless caddies while also supporting hot swapping.

Ultra-quiet Operation

The AS52 series devices produce only 19 decibels of noise during system standby, equivalent to the almost inaudible sound of a pin drop. During system operation, only 32 decibels of noise is produced, equivalent to the hushed tones of a quiet library, allowing the AS52/53 series devices to seamlessly and comfortably integrate into any living environment.

24/7 reliability and durability

All ASUSTOR NAS are designed for and are suitable for 24/7 use. ASUSTOR NAS devices have also undergone rigorous tests, such as drop tests and burn tests to test durability in extreme conditions. Heatsinks were added to sensitive components to dissipate heat, helping to maintain the longevity of the device.

Save power to save money

ASUSTOR NAS products are designed and developed around ecologically friendly concepts. When in use, our devices consume far less power than the average computer or server. Furthermore, our advanced power control features allow you to more efficiently manage your NAS device and hard drives. This lowers your electric bill and prolongs the lifespan of your hard drives all at the same time. While in disk hibernation, the AS5202T consumes only 10.5 W of power. Under normal operating conditions it still only consumes 17 W of power.

Cross-Platform Multi-User Access

The ASUSTOR NAS provides seamless cross-platform and multi-user access, allowing you to easily connect to your NAS from Windows, Mac OS X or Unix-like operating systems no matter if you are using a PC, notebook, tablet or smartphone.

  • 4096 Accounts
  • 512 Groups
  • 512 Shared Folders
  • 512 Concurrent Connections

>

Comprehensive Backup Solutions

ASUSTOR’s comprehensive backup solution provides more than twelve backup options, including, but not limited to Amazon S3, Dropbox, Google Drive, and Onedrive. ASUSTOR Backup Plan for Windows as well as Time Machine for macOS provide easy backups for desktop and laptops while MyArchive removable hard drives provide long term storage. Btrfs is now supported and with Snapshot Center, can take snapshots of your information in the event of unintentional modification. Restore previous versions easily with Snapshot Center.

Exclusive MyArchive Cold Backup Technology Unlimited Capacity Expansion

MyArchive cold backup technology turns NAS hard disks into removable storage archives. Directly insert a MyArchive hard disk into the NAS to easily access, backup and share terabytes of content.

Snapshot Center

Snapshot Center is a new feature for ASUSTOR NAS devices to utilize Btrfs and iSCSI volumes to take snapshots of the information inside a NAS. Snapshot Center supports up to 256 snapshots of a volume and can be done every five minutes, creating a backup that can be restored easily if data is damaged or lost.

Software Portainer – Easy Docker Deployments

Even more possibilities for ADM with Portainer for Docker images. With thousands of images, Portainer can download and deploy more types of programs than ever before. Portainer is incredibly user friendly and employs a graphical interface to make docker images easier to deploy than ever.

Effortless Connections to Your NAS

ASUSTOR NAS devices support automatic port forwarding to allow remote connections to the NAS. Automatic port forwarding eliminates the need to manually configure routers. ASUSTOR EZ Connect is an ASUSTOR service that allows customers to easily connect with a customized Cloud ID and access their information while away. ASUSTOR EZ Connect supports Windows with a desktop client while EZ Connect is supported on mobile devices through ASUSTOR’s Ai Series of apps.

Protected From the Inside and Out

Protect your data from loss, damage and attacks with the AS5202T. An ASUSTOR NAS is better protected by running the Linux-based ADM, employing a built-in firewall, ClamAV Antivirus, MyArchive and ADM’s various backup tools help protect ransomware even better.

Live streaming with StreamsGood

Stream shows from your favorite content creators with StreamsGood. StreamsGood connects to accounts on Twitch, YouTube Gaming, Facebook Gaming, Douyu and King Kong and enables streaming from almost any content creator. Download StreamsGood and start streaming and interacting with your favorite streamers today.

Created for the Digital Home

ASUSTOR NAS allows you to enjoy thrilling digital entertainment at any time. Via the built-in HDMI port and various multimedia Apps the NAS can be connected directly to ultra high resolution TVs and players. Enjoy multimedia with family and friends or use the UPnP multimedia server to stream your favorite media to compatible computers and mobile devices.

ASUSTOR Portal

LooksGood

SoundsGood + Hi-Res Player

Photo Gallery

App Central

Unleash the unlimited potential of ASUSTOR NAS. The applications that come pre-installed with each ASUSTOR NAS device are just the beginning. At your convenience, you can browse through and download any applications that pique your interest from App Central. Whether your interests lie in business, website construction or even digital home entertainment, App Central has got you covered. With over 200 unique Apps, App Central provides you with the boundless variety of applications that you require to satisfy your digital lifestyle needs. Explore the unlimited potential of ASUSTOR NAS devices while creating a personalized NAS device for yourself.

Mobile Apps

ASUSTOR’s exclusive EZ Connect technology allows you to connect to your NAS from anywhere with your Mobile device in order to access and share your files. ASUSTOR mobile apps provide pass code lock functions in order to protect your privacy and data. You can also make use of HTTPS connections for even more added security.

First-Class Product Warranty

All ASUSTOR NAS products come with a 3-year warranty. ASUSTOR continues to make customer service a priority in providing the highest standard of after-sales service and technical support.

Specifications:

Specifications
CPU
CPU Model Intel Celeron J4005
CPU Architecture x64 64-bit
CPU Frequency Dual Core 2.0 GHz (burst up 2.7GHz)
Hardware encryption engine integrated Yes
Memory
Memory 2GB SO-DIMM DDR4
Memory Module Pre-installed 2GB (1 x 2GB)
Total Memory Slots 2
Memory Expandable up to 8GB (2 x 4GB)Support mixed capacity
Flash Memory 4GB eMMC
Storage
HDD 2 x SATA3 6Gb/s; 3.5″/2.5″ HDD/SSD1
Maximum Internal Raw Capacity 32 TB (16 TB HDD X 2, Capacity may vary by RAID types)
Maximum Drive Bays with Expansion Unit 14
Maximum Raw Capacity with Expansion Units 224 TB (16 TB HDD X 14, Capacity may vary by RAID types)
External Ports
Expansion USB 3.2 Gen 1 x 3
Network 2.5 Gigabit Ethernet x 2
HDMI Output HDMI 2.0a x1
Others
System Fan 70mm x 1
Infrared Receiver Yes
Power Supply Unit / Adapter 65W x1
Input Power Voltage 100V to 240V AC
Certification FCC, CE, VCCI, BSMI, C-TICK
Operation
Power Consumption 17 W (Operation); 10.5 W (Disk Hibernation); 1.3 W (Sleep Mode)2
Noise Level 18.6dB (HDD idle)
Operation Temperature 5°C~35°C (40°F~95°F)
Humidity 5% to 95% RH
Size and Weight
Size 170(H) x 114(W) x 230(D) mm
Weight 1.6 kg / 3.53 lbs
Package Contents
Package Contents AS5202T UnitQuick Installation GuideAC Power Cord x1AC Power Adapter x1RJ-45 LAN Cable (Cat 5e) x2Flat Head Screw (for 2.5″ HDD) x8

1 Hard disks not included. 2 Test HDD: WD Red 3 TB HDD 3 USB Wi-Fi dongle not included. 4 You must first enable real time transcoding for these files in order to play them. 5 Metadata (e.g. title) may not be able to displayed in iTunes.


Supported OS

  • Windows XP, Vista, 7, 8, 10, Server 2003, Server 2008, Server 2012

  • Mac OS X 10.6 Onwards

  • UNIX, Linux, and BSD

Supported Languages

  • Deutsch, English, Français, Italiano, Nederlands,Русский, 日本語, 한글, 简体中文, 繁體中文, Česká,Polski, Svenska, Dansk, Norsk, Suomi, Português,Türkçe, Español, Magya

Supported Browsers

  • Internet Explore 11 Onwards

  • FireFox

  • Chrome

  • Safari

  • Microsoft Edge

Network Protocols

  • CIFS / SMB, SMB 2.0 / 3.0, AFP, NFS, FTP (Unicode Supported), TFTP, WebDAV, Rsync, SSH, SFTP, iSCSI/IP-SAN, HTTP, HTTPS, Proxy, SNMP, Syslog

File System

  • Internal Disk: EXT4

  • External Disk: FAT32, NTFS, EXT3, EXT4, HFS+, exFAT

Customized Sign In Page

  • 2 Different Template Choices

  • Customizable Title, Imageand Background

  • Image Import Function

Disk Management

  • Scheduled Bad Block Scans

  • Scheduled S.M.A.R.T Scans

Energy Control

  • Configurable Disk Hibernation and Sleep Mode Wait Time

  • Configurable Time Period for Sleep Mode Activation

  • Automatic Sleep

iSCSI Read/Write (5GB file, 1GbE x 1)/IP-SAN

  • Maximum Targets: 256

  • Maximum LUNs: 256

  • Maximum Snapshot Versions of a Single LUN: 256

  • Target Masking

  • LUN Mapping

  • ISO File Mounting

  • Supports MPIO

  • Persistent (SCSI-3) Reservations

Network

  • TCP/IP (IPv4 & IPv6)

  • Link Aggregation: Supports 802.3ad and Six Other Modes for Load Balancing and/or Network Failover

  • Jumbo Frame (MTU)

  • VLAN

  • EZ Connect

  • Wireless Network

  • DDNS and EZ-Router

  • Supports Wake-on-LAN (WOL)

Backup Solutions

  • Rsync (Remote Sync) Backup

  • Cloud Backup

  • FTP Backup

  • External Backup

  • One Touch Backup

System Administration

  • Log Type: System Log, Connection Log, File Access Log

  • Real-time Online User Monitor

  • Real-time System Monitor

  • User Quota

  • Virtual Drive (ISO Mounting, Maximum 16)

  • UPS Support

Network Recycle Bin

  • Share folder-based

  • Maintains original directory structure and file permission

  • On-click restore

  • Supports scheduled emptying

  • Filtering rules

    1. File size

    2. File extension

Access Control

  • Maximum Number of Users: 4096

  • Maximum Number of Groups: 512

  • Maximum Number of Shared Folders: 512

  • Maximum Number of Concurrent Connections: 512

  • Supports Windows Active Directory

  • Supports Windows Active Directory / LDAP

ACL

  • Provides both Windows ACL and Linux ACL permission configuration methods

  • Can enable Windows ACL for specific shared folders

  • Comprehensive support for Windows’ 13 types of advanced permission settings

  • Can view Windows ACL permission settings from within ADM

  • Supports local users and groups

  • Exclusive permission reset function allows users to quickly restore default permissions

Security

  • AES 256-Bit Encryption

  • Firewall: Prevent Unauthorized Access

  • Alert Notifications: E-mail, SMS

  • Encrypted Connections: HTTPS, FTP over SSL/TLS, SSH, SFTP, Rsync over SSH

  • Built-in Hardware Encryption Engine: AS70/64/63//62/61/31/32/10 Series

Network Defender

  • Auto black list

  • Trusted list

  • Black/White list

    • Supports IP/IP range/geolocation

    External Devices

    • Supports USB External Storage Devices

    • USB Wi-Fi Dongle Support

    • Bluetooth Dongle/Speaker Support

    • USB Printer Support

    • USB DAC Support

    • CD ROM Drive/DVD ROM Drive/Blu-Ray ROM

    Pricing Notes:

    • Pricing and product availability subject to change without notice.


Antivirus

  • Scheduled Scans

  • Automatic Virus Definition Updates

  • Quarantine Infected Files

ASUSTOR Portal (HDMI Local Output)

  • Supports Output for 4 Channels of Megapixel IP Camera Video Feeds

  • Support Chrome / Chromium browsers.

  • Downloads from Chrome/Chromium Automatically Saved to the NAS

  • Power Control Settings: Power on, Sleep, Restart and Wake via Remote

  • Customizable ASUSTOR Portal Desktop Wallpaper

  • Add Shortcuts to Favorite Websites

  • Increased TV Compatibility via Overscan and Resolution Settings

  • Max. Resolution: 1080p(HD)/2160p(4k)

  • ASUSTOR Portal comes preloaded with Netflix and Youtube. Users can install the supplementary URL-Pack to get access to even more popular video streaming sites such as Plex, Vimeo and Youku.

  • After installing URL-Pack-Social, users will be able to choose between social media sites such as Facebook, Google+, Hangouts, Pinterest, Twitter, Linkedin, WhatsApp and Instagram.

VirtualBox

  • Virtual Machines are Able to run the Following Operating Systems: Windows, Linux, Solaris, Mac OS X

  • Virtual Machine Import Format: OVF

  • Virtual Machine Export Format: OVF 0.9, OVF 1.0, OVF 2.0

  • Virtual Machine Snapshots

  • Virtual Machine HDMI Audio Output

  • Physical NAS Network Port can be Designated for use by Specific Virtual Machine

Download Center

  • Supports BT(Torrent & Magnet Link), HTTP and FTP Downloads

  • Torrent Search

  • Choose Files Before a BT Task Starts

  • Customizable Download Schedule

  • Bandwidth Control

  • RSS Subscription and Automatic Downloading (Broadcatching)

  • ASUSTOR Download Assistant for Windows & Mac

  • AiDownload for Android with Push Notification

  • Smart Download Function

DataSync for Microsoft OneDrive

  • Each ADM account is able to individually log into a OneDrive account

  • Supports file filter and bandwidth limitation

  • Supported backup methods:

    • Sync

    • Directly upload files to OneDrive from NAS

    • Directly download files from OneDrive to NAS

DropBox

  • Each ADM Account is Able to Individually Log in to One Dropbox Account

  • Supported Backup Methods:

    • Sync

    • Dropbox to NAS

    • NAS to Dropbox

File Explorer

  • Web-based File Management

  • ISO File Mounting

  • Share Links

  • Task Monitor

  • Browse Files on Local PC

  • Thumbnail Previews

  • Data Access via External Optical Drive

  • Supports video playback

FTP Explorer

  • Directory Structure View with Drag & Drop Transfers

  • Task Monitor

  • Stopping of Transmission Task & Resumption of Connection

  • Encrypted Connections: Explicit over TLS, Implicit over TLS

  • FTP Site Manager

  • Bandwidth Control

  • Maximum Simultaneous Transfer Control

Google Drive

  • Each ADM Account is Able to Individually Log in to One Google Account

  • Supported Backup Methods:

    • Sync

    • Directly Upload Files to Google Drive from NAS

    • Directly Download Files from Google Drive to NAS

HiDrive

  • Support OneDrive and OneDrive Business

  • Each ADM Account is Able to Individually Log in to One HiDrive Account

  • Supported Backup Methods:

    • Directly Upload Files to HiDrive from NAS

    • Directly Download Files from HiDrive to NAS

  • Supported Protocols:

    • Rsync

    • FTP

    • FTPS

    • SFTP

    • Rsync + SSH

LooksGood

  • Built-in three main video library categories (Movies, TV Shows, Home Movies) and smart video sorting management

  • Efficient Global Search function allows for searches by keywords followed by the execution of more detailed searches according to the Movies, TV Shows, Home Movies categories and parameters such as actors, director, year, genre, writer, and title

  • Attractive poster wall and thumbnail display

  • Automatic production of video poster thumbnails

  • Centralized management and ability t o configure order of favorites and playlist history

  • System administrator can configur e video library and editing permissions according to user

  • Can configure access permissions to share with friends and family

  • Multimedia conversion function

  • Self-defined smart folder for video conversions

  • Supports digital TV recordings via digital TV dongles

  • Easy streaming with Chromecast and DLNA

  • Support to watch videos in Apple TV via AiVideos tvOS version

iTunes Server

  • For iTunes on Mac & Windows

  • Supports AirPlay

  • Supports iOS Remote Pairing

  • Supported Audio Formats: AIF, M4A (AAC & Apple Loseless), M4P, M4R, MP3, WAV

  • Supported Video Formats: M4V, MOV, MP4

  • Supported Playlist Formats: M3U, WPL

Mail Server

  • Each ADM Account can Become an Independent Email Account

  • Email Activity Monitor (Over 1 Week, 1/3/6 Months)

  • Provides SMTP, IMAP and POP3 Mail Protocols

  • Supports SMTP Relay and Verification

  • SMTP-SSL Secure Connections

  • Spam Filter and Black List Settings

  • Antivirus Scanning for Emails

  • Email Alias Creation and Mapping

  • Monitoring of Mail Queue

  • Mail Service Activity Log

  • Exclusive Email Backup Mechanism

  • Auto-Forwarding and Auto-Response Protocols

Photo Gallery

  • “Album” and “Browse” Viewing Modes

  • Manage Photo Album Access Rights: Public Access, Restricted to Certain Accounts, Album Password

  • Multi-level Folder Structure Support

  • Supports Tagging of Photos

  • Intuitive Sorting and Comprehensive Search Function

  • Adjustable Photo Wall Browsing Scales

  • Automatic Image Rotation

  • One-click Sharing to Social Media (Facebook, Google+, Twitter, Plurk, email)

  • Intuitive Drag and Drop Management

  • Slideshow Viewing Mode

  • Provides Comment Function for Users to Interact with Each Other.

  • Supports a Wide Range of Image Formats: JPG/JPEG, GIF, PNG, BMP, TIFF, RAW

  • Supports Video Playback

RADIUS Server

  • Centralized management of wireless network certification

  • Using WPA-Enterprise or WPA2-Enterprise encryption

  • Must be combined with a wireless router that supports RADIUS authentication

SNMP Server

  • Supports SNMP v1, v2c, v3 and trap

  • ASUSTOR NAS MIB provided

Syslog server

  • Supports standard syslog protocol

  • Graphical log monitoring by time and device

  • Supports TCP and UDP

  • Auto log archiving

  • User-defined email notification

Surveillance Center

  • Up to 64 channels in 720p on single live view display

  • On-screen camera controls including camera PTZ, manual recordings, take snapshots, configure camera settings and open Maps

  • Up to 4 channels of synchronous and non-synchronous playback with audio

  • Intelligent video analytics including motion detection and foreign object detection

  • Supported Browsers: Windows Internet Explorer, Microsoft Edge, Firefox, Mac Safari, Mac Firefox ESR

  • Event notification supports SMS, E-mail, and mobile push notification

  • Automated event action rules

  • Role-based access control

  • RTSP streaming server (video and audio)

  • AiSecure mobile app for iOS and Android with Push notification

  • ONVIF™ 2.4, Profile S certified

  • CMS Lite supports connect up to 128 IP Cameras from 32 NAS

  • Two different camera license packages are offered: single channel and 4 channels.

  • Maximum IP Cam (4 Free Licenses; Additional Licenses to be Purchased)

  • Minimum PC Client Requirements

    • CPU: i5/i7 or above

    • RAM: DDR3 4G or above

    • Operating system Windows 7 and onward, Mac OS X

    • Windows browsers: Firefox 32-bit, IE11 32-bit onwards (excluding Microsoft Edge)

    • Mac browsers: Safari 7.0, Firefox

    • Display resolution: 1280×800 pixels or higher for best user experience

    • Network interface: Gigabit x1

    • Independent graphics card is highly recommend

SoundsGood

  • Import Personal/Public Music Collection

  • Personal/Public Music Collection Permission Control

  • Playlist Editor

  • ID3 Tag Editor

  • Local Speaker Support: USB

  • Supported Audio Formats for Browser: MP3, WAV, Ogg

  • Supported Audio Formats for Transcoding Through Browser: AIFF, Flac

  • Supported Audio Formats for Local Speaker: MP3, WAV, Ogg, AIFF, Flac

  • ASUS DAC Support

Takeasy

  • Download from YouTube, Vimeo, Twitch and More

  • Selectable Video Type and Quality

  • Automatic Downloads with YouTube or Twitch Subscriptions

  • Preview Downloads in Progress

  • Online Playback

UPnP Media Server

  • Supports PS3 and other Digital Media Player Capable Devices

  • Supports On-The-Fly Transcoding for Most RAW Images and Audio(OGG, FLAC)

  • Supported Image Formats: BMP, GIF, ICO, JPG, PNG, PSD, TIF, RAW Image⁴ (3FR, ARW, CR2, CRW, DCR, DNG, ERF, KDC, MEF, MOS, MRW, NEF, NRW, ORF, PEF, RAF, RAW, RW2, SR2, X3F)

VPN Client

  • Supported VPN Protocols: PPTP, OpenVPN, L2TP/IPsec

  • Transmission Package Monitor

  • PPTP Authentication: PAP, CHAP, MS CHAP, MS CHAP2

  • PPTP Encryption: No MPPE, MPPE (40, 128 bit), Maximum MPPE (128 bit)

  • OpenVPN Port Control

  • OpenVPN Link Compression

VPN Server

  • Supported VPN Protocols: PPTP, OpenVPN, and L2TP/IPsec

  • View Current Connections & Ability to Disconnect Suspicious Connections

  • Comprehensive Connection Log

Pricing Notes:

  • Pricing and product availability subject to change without notice.


Setting up – Connecting – Manuals

Configure OS X Settings for Xfinity Internet

Access Xfinity Internet services with a Mac.
Configure the Internet Settings on Your Mac
From the Apple menu, select System Preferences.
On the System Preferences window, select the Network icon.
On the left pane, select your Ethernet card.
If the right pane is grayed out, click the Lock icon in the bottom left corner to log in with administrator credentials.
Click the TCP/IP tab; then from the Configure IPv4 menu, select Using DHCP.
Select the Apply Now button. At this point, your computer should obtain an IP address and all the other settings from the Comcast DHCP server. You should be able to surf the web, send and receive email, etc.

Still Unable to Connect?
Select the PPPoE tab and make sure that Connect using PPPoE is not selected.
Select the Proxies tab and make sure that none of the proxies are selected. Note: You may or may not select Use Passive FTP Mode (PASV); it does not affect your Internet connection or ability to go online. However, once you are connected, if you have trouble connecting to an FTP site, you may opt to change your selection at that time.

Your Internet settings are now configured correctly to connect to the Xfinity Internet service. Click Apply Now and you should be able to surf the web, send and receive email, etc.

Newer Macbook devices do not have a built-in Ethernet adapter. If using a third-party USB3-to-Ethernet or USBC-to-Ethernet adapter, you may have to download a driver from the manufacturer’s website before the adapters can work properly. Official Thunderbolt-to-Ethernet adapters sold by Apple do not need a driver.

VPN

https://itenterpriser.com/how-to/how-to-make-your-asustor-nas-more-secure

https://nas2u.my/v2/nas-news/230

https://cybernews.com/resources/nas-security-guide/

Connection articles

http://see.spiffy-nas-ty.space/

https://www.asustor.com/en/online/College_topic?topic=105

Learn how to access the TCP/IP settings on your NAS and test it for connectivity.

https://www.asustor.com/en/online/College_topic?topic=221

A course about connecting your ASUSTOR NAS to the Internet using EZ-Connect.

https://www.asustor.com/en/knowledge?id=10

Networking

https://www.asustor.com/online/online_help?id=4

https://www.asustor.com/en/knowledge/detail/?id=&group_id=1002

Why can’t I connect to my NAS over the Internet via myasustor.com?


This, or any other website that you access via your web browser, or even your mail server, have a public IP that you don’t really see when you call it, because you prefer to call hostnames for reasons of clarity.

Even your router – the device connecting your LAN to the internet – has a WAN IP adress.

You can see your WAN IP in your router, or use web services.

Routers connect to the internet while protecting your LAN

Routers are designed to block unwanted incoming connections. They offer – over DHCPLAN IP addresses to your local devices. You can however choose to open independent ports and allow forwarding from/to specific private adresses if required.

port forwarding
In computer networking, port forwarding or port mapping is an application of network address translation that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.


Updated pw for phpmyadmin added to newly created config.inc.php – then updated in wp_config so site can open.


PRIVATE PAGE – SET UP INFO

setupinfo – pw required


OK – reset home network – reset the nas

now nas has IP of 10.0.0.143 – which matches up with the mac – 10.0.0.194 – so yay!

now just can’t screw up anything in there.

https://internet.xfinity.com/ – better than regular sign in to see what’s up in network.

see settings for lan 1 / lan 2 – and other machines on network – pw required



Unable to detect any ASUSTOR NAS. Please ensure that:

1. The ASUSTOR NAS and your PC are under the same network segment.

This means that all devices are connected to the same router and are on the same subnet. Each device can communicate with every other with no restrictions at the network level.

https://www.blackhillsinfosec.com/home-network-design-part-2

255.255.255.0 – router: 10.0.0.1 – same for wifi / ethernet

2. Your firewall or antivirus is not be blocking the ASUSTOR NAS


Adding a static IP to NAS

How to give NAS a static IP

https://robferguson.org/blog/2016/11/12/enable-ssh-scp-sftp-and-configure-a-static-ip-address-on-your-synology-nas/

In this post, I’ll walk you through the steps I followed when enabling SSH, SCP/SFTP and configuring a static IP address on my Synology NAS.

Enabling Services

Login to the Synology DiskStation Manager (DSM) from your web browser (you can find the IP address on your router’s status page):

http://<IP-ADDRESS>:5000/

And, navigate to the Control Panel:

Enable SSH

Click on ‘Terminal & SNMP’ and check the box next to Enable SSH service:

Enable SCP/SFTP

In the Control Panel click on ‘File Services’ then click the ‘FTP’ tab and check the box next to Enable SFTP service:

Enable the User Home Service

When remoting (SSHing) into your NAS, you might see a warning message like the following:

Could not chdir to home directory /var/services/homes/rob: No such file or directory

To prevent this error, you need to enable the User Home Service.

In the Control Panel click ‘User’ then click the ‘Advanced’ tab and check the box next to Enable user home service:

Configure a static IP address

In the Control Panel click on ‘Network’ then click the ‘Network Interface’ tab, select ‘LAN’ and check the box next to Use manual configuration:

Now, we can update the hosts file (on the computer you wish to log in from):

sudo nano /etc/hosts

as follows:

...
192.168.1.100 nas-1
...

And, update the SSH configuration file:

sudo nano ~/.ssh/config

as follows:

...
Host nas
     HostName nas-1
     Port     22
     User     rob
...

To test the new settings, open a terminal window and login:

ssh nas

We can setup SSH passwordless authentication by copying the public key (on the computer you wish to log in from) to the remote host:

ssh-copy-id -i ~/.ssh/id_rsa.pub -p <PORT> rob@nas-1

I also had to fix the default permissions on the NAS user’s (rob) home directories:

sudo chmod 755 /var/services/homes/rob
sudo chmod 700 /var/services/homes/rob/.ssh
sudo chmod 644 /var/services/homes/rob/.ssh/authorized_keys

To test the new settings, open a terminal window and login:

ssh nas

Shutdown your NAS

You can shutdown your NAS by pressing and holding the power button (on the front panel) until you hear a beep sound. You can also shutdown your NAS by selecting the ‘Shutdown’ option on the Synology DiskStation Manager’s ‘Options’ menu.

References:


ADVICE FROM INSTRUCTIONS

Q: Why can’t I detect my ASUSTOR NAS using ASUSTOR Control Center?
A: If you are having trouble detecting your NAS using ASUSTOR Control Center, please do
the following:

1. Please check your network connection:
Make sure that your computer and your NAS are part of the same local area network.
Check to see if the network LED indicator is lit. If you find that it is not lit, try connecting your Ethernet cable
to the other network port or try using a different Ethernet cable.
2. Please first disable any firewalls that may be running on your computer. Then try scanning for your NAS
again using ASUSTOR Control Center.
3. If you still cannot detect your NAS, please connect your NAS to your computer using the provided RJ-45
network cable and change your computer’s IP settings.
Select [Start] [Control Panel] [Network and Sharing Center]



How To Fix NAS Connection Failure In macOS Catalina!



File Permissions for Shared Folders

https://www.asustor.com/online/online_help?id=39

Shared Folders

Here you can manage your shared folders and set up their access rights in relation to users and user groups. Shared folders allow your NAS to become a file server. They are fundamental in sharing files with the outside world. Consequently, correctly setting up their access rights is very important in the management of your data.

  • Invisible in “Network” or “My Network Places”: This setting only applies if you are using Microsoft Windows. When you enable this setting, your NAS will cease to automatically appear in “Network” or in “My Network Places”. Please note that enabling this setting will not affect the connection to your NAS in any way.
  • Empty Recycle Bin: Click this button to empty all contents in this shared folder’s Recycle Bin immediately.
  • Encrypt this shared folder: Here you can choose whether or not you want to encrypt your shared folder and whether or not you want to auto-mount it at system startup. Should you choose to encrypt your folder, after the system restarts, you will have to manually enter the password or import the encryption key for the folder in order to access it. Encrypted folders are normally used for the storage of critical or confidential data. Should you lose your NAS you still needn’t worry about your data leaking out and falling into the wrong hands.
  • Convert to the new ASUSTOR encryption mechanism: This option will only appear under “Edit” for encrypted folders that have been encrypted using ASUSTOR’s previous encryption mechanism. Converting to the new encryption mechanism will require extra volume space in order to temporarily store all the files originally in the folder. This required space is the total capacity of all the files in the shared folder.
  • Export/import encrypted key: Selecting “Export encrypted key” will download the encrypted key to your computer. When you need to mount an encrypted folder, you can select “Enter Password” or “Import encrypted key” to mount the shared folder and begin accessing it. Reminder: You can choose to enable or disable encryption for folders even after they have been created. Encryption is available for use with all shared folders and is not just limited to system default folders. The access speed for encrypted folders will normally be slower than for unencrypted folders.
    Warning:

    1. When choosing to use encrypted shared folders, please make it a point to remember your password. Should you forget your password, the data in the shared folder will become unrecoverable.
    2. Older versions of ADM are unable to read the contents of shared folder encrypted using the new encryption mechanism introduced in ADM 2.4.0. If you wish to downgrade your firmware to 2.3.1 or an older version, please first decrypt any shared folders that have been encrypted using the new encryption mechanism before you begin downgrading.

  • NFS Privileges: Here you can set NFS privileges for individual folders after first enabling NFS service.

About Shared Folders

After initialization, the system will automatically create a shared folder “public”. By default, all users can access the files in this folder. Additionally, the system will automatically create a personal folder for each user (using the user’s account name) that by default, can only be accessed by the mentioned user.

Windows ACL: Here you can choose to enable or disable Windows ACL for specified shared folders.

About Windows ACL

  1. After enabling Windows ACL for a shared folder, the shared folder and all subfolders and files contained within it can be assigned user or group permissions.
  2. The following shared folders do not support Windows ACL permissions: Home, User Homes, PhotoGallery, Web, Surveillance, MyArchive, Network Recycle Bin, virtual devices, external devices (USB hard drives, optical drives).
  3. After enabling Windows ACL you will be able to use ADM’s File Explorer or Microsoft Windows Explorer to configure permissions. After disabling Windows ACL you will only be able to configure permissions from within ADM’s File Explorer.
  4. If you enable Windows ACL and then later decide to disable it, all file and folders will be re-assigned with Read & Write permissions for all users.
  5. No matter if you are using Windows ACL or not, users will still require shared folder and file permissions in order to access files.
  • Folder – Access Rights: Shared folders access rights are the first level of access rights that will be examined. You can edit them here.

Permission Mapping Table

Deny Access Read & Write Read Only No Settings
Deny Access Deny Access Deny Access Deny Access Deny Access
Read & Write Deny Access Read & Write Read & Write Read & Write
Read Only Deny Access Read & Write Read Only Read Only
No Settings Deny Access Read & Write Read Only Deny Access

WORDPRESS – SITE INSTALLED – CONFIG SECURITY – TRY FOR URL

Security for WP site – breakdown for overall NAS – URL ISSSUES

After enabling this, users on the NAS only need to create a www folder within the Home folder and upload their Web page to it in order to have their own dedicated URL. They can connect to their Web page using the following URL: http://NAS IP/~username.

TRY DDNS

– maybe if I can get it online – I can figure out what’s wrong

Installed phpmyadmin – new db – get wp running

Updated default user and pw for phpmyadmin – updated wp_config to match

– new database –
create – name it – use unicode: “utf8_general ci”

Wordpress installed

SECURITY: UNDERSTANDING CHANGES

https://www.tipsandtricks-hq.com/wordpress-security-and-firewall-plugin#advanced_features_note

Updated login rights / Registration / Change prefix for wp

File Permissions Updated


original file permissions

updated file permissions

Allow / Disallow Editing

– can be added / removed from the wp_config file as you need it to be – so when I’m working on it – I just switch it in wp_config then when I’m done – make them un-editable again –

https://wordpress.org/support/article/editing-wp-config-php/#disable-the-plugin-and-theme-editor

Occasionally you may wish to disable the plugin or theme editor to prevent overzealous users from being able to edit sensitive files and potentially crash the site. Disabling these also provides an additional layer of security if a hacker gains access to a well-privileged user account.

Disable Plugin and Theme Update and Installation #Disable Plugin and Theme Update and Installation<br>
define( ‘DISALLOW_FILE_MODS’, true );

This will block users being able to use the plugin and theme installation/update functionality from the WordPress admin area. Setting this constant also disables the Plugin and Theme editor (i.e. you don’t need to set DISALLOW_FILE_MODS and DISALLOW_FILE_EDIT, as on its own DISALLOW_FILE_MODS will have the same effect).

Disalow Editor

define( ‘DISALLOW_FILE_EDIT’, true );

Note: The functionality of some plugins may be affected by the use of current_user_can(‘edit_plugins’) in their code. Plugin authors should avoid checking for this capability, or at least check if this constant is set and display an appropriate error message. Be aware that if a plugin is not working this may be the cause.


disallow – files such as readme.html, license.txt and wp-config-sample – etc. + turn off error display / reporting

the nas itself has a blacklist – country blocking etc. – some of this is in the wp


PRE-FIREWALL HTACCESS

FireWall – all in one security – should be good for thsi small site

This setting will implement the following basic firewall protection mechanisms on your site:

  1. Protect your htaccess file by denying access to it.
  2. Disable the server signature.
  3. Limit file upload size (10MB).
  4. Protect your wp-config.php file by denying access to it.

The above firewall features will be applied via your .htaccess file and should not affect your site’s overall functionality.

You are still advised to take a backup of your active .htaccess file just in case.

>

xmlrpc.php – should disable – have to 2x check

I turned this down to pinback only – woocommerce (jetpack) was not working correctly)

Had to turn xmlrp compleely back on 100% for woocommerce to work – items to show up in cart

Jetpack needs it (woocommerce) WPiOS etc.

https://kinsta.com/blog/xmlrpc-php/

Configure XML-RPC and REST API Activation with a Plugin
https://wordpress.org/plugins/rest-xmlrpc-data-checker/

– so you can control / see what they are up to –
If you want more fine-grained control of how both xmlrpc.php and the REST API are configured on your site, you can install the REST XML-RPC Data Checker plugin.

Once you’ve installed and activated this plugin, go to Settings > REST XML-RPC Data Checker and click the XML-RPC tab.

If you use Jetpack or WP iOS or other apps which need WP XML-RPC functionality then check this. This will enable protection against WordPress pingback vulnerabilities. -More Info
NOTE: If you use Jetpack or the Wordpress iOS or other apps then you should enable this feature but leave the “Completely Block Access To XMLRPC” checkbox unchecked.

The feature will still allow XMLRPC functionality on your site but will disable the pingback methods.

This feature will also remove the “X-Pingback” header if it is present.

OR USE “Disable Pingback Functionality From XMLRPC” checkbox. – if can’t block it all

htaccess – basic firewall

htaccess-basic-firewall

More Firewall

  • Listing of directory contents – w/o an index.php file you can browse dirctories – plugin wants – “AllowOverride” of the Indexes directive must be enabled in your httpd.conf file. –

    Can you just add index.php to folders with out it?
    No, they should not. If a plugin has vulnerabilities just because someone might see its directory structure it is broken. These bugs should be fixed.
    Security through obscurity is a bug for itself.

    It’s up to the site owner to allow or forbid directory browsing.

    A second issue is performance: WordPress scans all PHP files in a plugin’s root directory to find plugin headers. This allows you to have multiple plugins under the same directory, eg /wp-content/plugins/wpse-examples/.

    It also means that unused PHP files in that directory are wasting time and memory when WordPress is searching for plugins. One file will not do much harm, but imagine this is getting a common practice. You are creating a real problem in an attempt to fix a fictional.

    trace and track

    HTTP Trace attack (XST) can be used to return header requests and grab cookies and other information.
    This hacking technique is usually used together with cross site scripting attacks (XSS).
    Disabling trace and track on your site will help prevent HTTP Trace attacks.

    forbid proxy comment posting

    This setting will deny any requests that use a proxy server when posting comments.
    By forbidding proxy comments you are in effect eliminating some SPAM and other proxy requests.


    htaccess with additional firewall

    htaccess-additional-firewall

    6G Blacklist / Firewall settings

    Check this if you want to apply the 6G Blacklist firewall protection from perishablepress.com to your site.
    This setting will implement the 6G security firewall protection mechanisms on your site which include the following things:

    1. Block forbidden characters commonly used in exploitative attacks.
    2. Block malicious encoded URL characters such as the “.css(” string.
    3. Guard against the common patterns and specific exploits in the root portion of targeted URLs.
    4. Stop attackers from manipulating query strings by disallowing illicit characters.
    5. ….and much more.

    The 6G Blacklist is a simple, flexible blacklist that helps reduce the number of malicious URL requests that hit your website.

    The added advantage of applying the 6G firewall to your site is that it has been tested and confirmed by the people at PerishablePress.com to be an optimal and least disruptive set of .htaccess security rules for general WP sites running on an Apache server or similar.

    Therefore the 6G firewall rules should not have any impact on your site’s general functionality but if you wish you can take a backup of your .htaccess file before proceeding.

    htaccess-with-6G-added

    Internet BOTS (google)

    Internet Bot Settings
    What is an Internet Bot?

    A bot is a piece of software which runs on the Internet and performs automatic tasks. For example when Google indexes your pages it uses automatic bots to achieve this task.

    A lot of bots are legitimate and non-malicous but not all bots are good and often you will find some which try to impersonate legitimate bots such as “Googlebot” but in reality they have nohing to do with Google at all.

    Although most of the bots out there are relatively harmless sometimes website owners want to have more control over which bots they allow into their site.

    This feature allows you to block bots which are impersonating as a Googlebot but actually aren’t. (In other words they are fake Google bots)

    Googlebots have a unique indentity which cannot easily be forged and this feature will indentify any fake Google bots and block them from reading your site’s pages.

    Attention: Sometimes non-malicious Internet organizations might have bots which impersonate as a “Googlebot”.

    Just be aware that if you activate this feature the plugin will block all bots which use the “Googlebot” string in their User Agent information but are NOT officially from Google (irrespective whether they are malicious or not).

    All other bots from other organizations such as “Yahoo”, “Bing” etc will not be affected by this feature.


    Block Fake Googlebots: Check this if you want to block all fake Googlebots. -More Info
    This feature will check if the User Agent information of a bot contains the string “Googlebot”.

    It will then perform a few tests to verify if the bot is legitimately from Google and if so it will allow the bot to proceed.

    If the bot fails the checks then the plugin will mark it as being a fake Googlebot and it will block it

    htaccess with bots

    htaccess-with6G-bots-extrafirewall

    A Hotlink is where someone displays an image on their site which is actually located on your site by using a direct link to the source of the image on your server.
    Due to the fact that the image being displayed on the other person’s site is coming from your server, this can cause leaking of bandwidth and resources for you because your server has to present this image for the people viewing it on someone elses’s site.

    This feature will prevent people from directly hotlinking images from your site’s pages by writing some directives in your .htaccess file.

    htaccess-extrafire-6G-bots-nohotlink

    404 Blocking

    A 404 or Not Found error occurs when somebody tries to access a non-existent page on your website.
    Typically, most 404 errors happen quite innocently when people have mis-typed a URL or used an old link to page which doesn’t exist anymore.
    However, in some cases you may find many repeated 404 errors which occur in a relatively short space of time and from the same IP address which are all attempting to access a variety of non-existent page URLs.

    Such behaviour can mean that a hacker might be trying to find a particular page or URL for sinister reasons.

    This feature allows you to monitor all 404 events which occur on your site, and it also gives you the option of blocking IP addresses for a configured length of time.
    If you want to temporarily block or blacklist an IP address, simply click the “Temp Block” or “Blacklist IP” link for the applicable IP entry in the “404 Event Logs” table below.

    Enable 404 IP Detection and Lockout:

    Check this if you want to enable the lockout of selected IP addresses.
    When you enable this checkbox, all 404 events on your site will be logged in the table below. You can monitor these events and select some IP addresses listed in the table below and block them for a specified amount of time. All IP addresses you select to be blocked from the “404 Event Logs” table section will be unable to access your site during the time specified.

    Time Length of 404 Lockout (min): 60
    Set the length of time for which a blocked IP address will be prevented from visiting your site
    You can lock any IP address which is recorded in the “404 Event Logs” table section below.
    To temporarily lock an IP address, hover over the ID column and click the “Temp Block” link for the applicable IP entry.

    404 Lockout Redirect URL:http://127.0.0.1
    blocked visitor will be automatically redirected to this URL.

    Brute Force – Rename login page – REPLACED by cookie _ secret word

    An effective Brute Force prevention technique is to change the default WordPress login page URL.

    Normally if you wanted to login to WordPress you would type your site’s home URL followed by wp-login.php.

    This feature allows you to change the login URL by setting your own slug and renaming the last portion of the login URL which contains the wp-login.php to any string that you like.

    By doing this, malicious bots and hackers will not be able to access your login page because they will not know the correct login page URL.

    You may also be interested in the following alternative brute force prevention features:

    Cookie Based Brute Force Prevention

    Login Page White List

    A Brute Force Attack is when a hacker tries many combinations of usernames and passwords until they succeed in guessing the right combination.
    Due to the fact that at any one time there may be many concurrent login attempts occurring on your site via malicious automated robots, this also has a negative impact on your server’s memory and performance.

    The features in this tab will stop the majority of Brute Force Login Attacks at the .htaccess level thus providing even better protection for your WP login page and also reducing the load on your server because the system does not have to run PHP code to process the login attempts.

    Even though this feature should not have any impact on your site’s general functionality you are strongly encouraged to take a backup of your .htaccess file before proceeding.
    If this feature is not used correctly, you can get locked out of your site. A backed up .htaccess file will come in handy if that happens.

    To learn more about how to use this feature please watch the following video tutorial.

    Advanced 0/20

    This feature can lock you out of admin if it doesn’t work correctly on your site. You must read this message before activating this feature.

    Enable Brute Force Attack Prevention:
    Secret Word: – created

    Choose a secret word consisting of alphanumeric characters which you can use to access your special URL. Your are highly encouraged to choose a word which will be difficult to guess.
    Re-direct URL:
    http://127.0.0.1

    Specify a URL to redirect a hacker to when they try to access your WordPress login page.

    My Site Has Posts Or Pages Which Are Password Protected:
    Check this if you are using the native WordPress password protection feature for some or all of your blog posts or pages.

    My Site Has a Theme or Plugins Which Use AJAX:
    Check this if your site uses AJAX functionality.

    Before using this feature you are required to perform a cookie test first. This is to make sure that your browser cookie is working correctly and that you won’t lock yourself out.

    htaccess-extrafire-6G-bots-nohotlink-404-brutecookie

    Captcha

    Skipping for this install

    Login Whitelist

    IPs added

    Enter one or more IP addresses or IP ranges you wish to include in your whitelist. Only the addresses specified here will have access to the WordPress login page. -More Info
    Each IP address must be on a new line.

    To specify an IPv4 range use a wildcard “*” character. Acceptable ways to use wildcards is shown in the examples below:

    Example 1: 195.47.89.*

    Example 2: 195.47.*.*

    Example 3: 195.*.*.*

    Or you can enter an IPv6 address (NOTE: ranges/wildcards are currently not supported for ipv6)

    Example 4: 4102:0:3ea6:79fd:b:46f8:230f:bb05

    Example 5: 2205:0:1ca2:810d::


    Honeypot on login – enabled

    This feature allows you to add a special hidden “honeypot” field on the WordPress login page. This will only be visible to robots and not humans.
    Since robots usually fill in every input field from a login form, they will also submit a value for the special hidden honeypot field.
    The way honeypots work is that a hidden field is placed somewhere inside a form which only robots will submit. If that field contains a value when the form is submitted then a robot has most likely submitted the form and it is consequently dealt with.
    Therefore, if the plugin detects that this field has a value when the login form is submitted, then the robot which is attempting to login to your site will be redirected to its localhost address – http://127.0.0.1.


    htaccess-extrafire-6G-bots-nohotlink-404-brutecookie-honey.txt

    SPAM

    – not comment captcha

    – block spambots

    A large portion of WordPress blog comment SPAM is mainly produced by automated bots and not necessarily by humans.
    This feature will greatly minimize the useless and unecessary traffic and load on your server resulting from SPAM comments by blocking all comment requests which do not originate from your domain.
    In other words, if the comment was not submitted by a human who physically submitted the comment on your site, the request will be blocked.

    This feature will implement a firewall rule to block all comment attempts which do not originate from your domain.

    A legitimate comment is one which is submitted by a human who physically fills out the comment form and clicks the submit button. For such events, the HTTP_REFERRER is always set to your own domain.

    A comment submitted by a spambot is done by directly calling the comments.php file, which usually means that the HTTP_REFERRER value is not your domain and often times empty.

    This feature will check and block comment requests which are not referred by your domain thus greatly reducing your overall blog SPAM and PHP requests done by the server to process these comments.


    all site features still seem to be working

    http://169.254.1.3/wordpress/checkout/

    Autoblock sammers / sammer list


    This feature allows you to automatically and permanently block IP addresses which have exceeded a certain number of comments labelled as SPAM.

    Comments are usually labelled as SPAM either by the Akismet plugin or manually by the WP administrator when they mark a comment as “spam” from the WordPress Comments menu.

    NOTE: This feature does NOT use the .htaccess file to permanently block the IP addresses so it should be compatible with all web servers running WordPress.

    Enable Auto Block of SPAM Comment IPs: Check this box if you want this plugin to automatically block IP addresses which submit SPAM comments.
    Minimum number of SPAM comments:1


    Specify the minimum number of SPAM comments for an IP address before it is permanently blocked.

    Example 1: Setting this value to “1” will block ALL IP addresses which were used to submit at least one SPAM comment.

    Example 2: Setting this value to “5” will block only those IP addresses which were used to submit 5 SPAM comments or more on your site.

    list of spam comments

    This section displays a list of the IP addresses of the people or bots who have left SPAM comments on your site.

    This information can be handy for identifying the most persistent IP addresses or ranges used by spammers.

    By inspecting the IP address data coming from spammers you will be in a better position to determine which addresses or address ranges you should block by adding them to the permanent block list.

    To add one or more of the IP addresses displayed in the table below to your blacklist, simply click the “Block” link for the individual row or select more than one address using the checkboxes and then choose the “block” option from the Bulk Actions dropdown list and click the “Apply” button.

    Buddy press / BBPress not used


    Security

    ADM Defender

    ADM Defender can protect your NAS from malicious Internet attacks, ensuring the security of your system.

    • Firewall: Here you can block specific IP addresses or only allow specific IP addresses to access your NAS.
    • Trusted List: The IP(s) specified in the trusted list will not be blocked by the black list or after multiple failed login attempts.
    • Auto Black List: After enabling this function, the client IP address will be blocked if there are too many unsuccessful login attempts within the specified time period.
    • Black and White List: The Black and White list can be defined using IP address, range, and geolocation. If you wish to define the Black and White list using geolocation, please first install the Geo IP Database App.
    About the Black and White List

    The Black and White List can protect you from malicious attacks and prevent hackers from trying to access your NAS. Supported protocols are as follows:

    • ADM system login (HTTP & HTTPS)
    • Windows File Service (CIFS/SAMBA)
    • Apple Filing Protocol (AFP)
    • File Transfer Protocol (FTP)
    • Secure Shell (SSH)

    File Detection Scan


    If given an opportunity hackers can insert their code or files into your system which they can then use to carry out malicious acts on your site.
    Being informed of any changes in your files can be a good way to quickly prevent a hacker from causing damage to your website.
    In general, WordPress core and plugin files and file types such as “.php” or “.js” should not change often and when they do, it is important that you are made aware when a change occurs and which file was affected.
    The “File Change Detection Feature” will notify you of any file change which occurs on your system, including the addition and deletion of files by performing a regular automated or manual scan of your system’s files.
    This feature also allows you to exclude certain files or folders from the scan in cases where you know that they change often as part of their normal operation. (For example log files and certain caching plugin files may change often and hence you may choose to exclude such files from the file change detection scan)

    To perform a manual file change detection scan click on the button below.
    Click the button below to view the saved file change results from the last scan.

    1st scan

    The following files were changed on your host.
    File File Size File Modified
    /volume1/Web/wordpress/wp-content/uploads/wp-file-manager-pro/fm_backup/.htaccess 13 2020-10-25 02:40:27
    /volume1/Web/wordpress/wp-content/uploads/wp-file-manager-pro/fm_backup/index.html 0 2020-10-25 02:40:27
    /volume1/Web/wordpress/wp-content/aiowps_backups/aiowps_fcd_data_mx2p1n4pnw 2927606 2020-10-25 02:40:00

    File manager pro

    had several sites that were compromised during the past week because of the file manager plugin vulnerability. On sites where I have fully deactivated and deleted the plugin, I am seeing that files in the: wp-content/uploads/wp-file-manager-pro/fm_backup/ directory still exist and are being updated. (Especially: index.html)
    If the plugin has been removed is it ok to delete these directories? And why would the index.html file be updated once the plugin is removed?

    Viewing 1 replies (of 1 total)
    Plugin Authormndpsingh287 (@mndpsingh287)
    1 month, 2 weeks ago
    Hi @edash22

    Firstly, we truly apologize for the inconvenience this has caused you.

    Yes, you can remove these directories if you don’t need them. This directory contains the backups of your wp-content directory that you have created with File Manager. The file index.html is a direct directory access protector file. You can delete it as well.

    If you need any further assistance we can schedule a call for personalized support on your issue. Reach out to us at https://filemanagerpro.io/contact.

    https://app.malcare.com/ | http://see.spiffy-nas-ty.space/ – better luck with outer IP

    – this may not work because of the setup – inability for the NAS to reach public IP


    http://see.spiffy-nas-ty.space/ vs http://169.254.1.3/wordpress/product/all-purpose-balm/

    all site functions work with IP – checkout etc. are not correct with see.spiffy-nas-ty.space

    Must be a better way to ust the url – so that it does not get screwy

    Hosting Site | Configuring SSH | SFTP

    Asustor – Knowledgebase

    https://www.asustor.com/en/knowledge?id=1


    Hosting Site

    https://www.asustor.com/en/knowledge/detail/?id=&group_id=111

    No matter if it is a personal blog, company website, or e-commerce website, ASUSTOR NAS’s Web Server function lets you host your very own website
    right on the NAS. Furthermore, you can use App Central to download Apps for
    content management, database management, bulletin board systems and more,
    allowing you to easily set up all different types of websites in just minutes.

    To host your website on your NAS, please
    follow the instructions below:

    1. Select [Services] -> [Web Server]. Select the [Enable Web server] checkbox found under the Web Server heading and then click [Apply].

    2. In order to check that the setting has been successfully applied, enter the ASUSTOR NAS’s IP address into a Web browser and connect to it. You should be able to see the “Congratulations!”
    page as shown in the graphic below. This page is located in the ASUSTOR NAS’s “Web”
    shared folder. In order to host a website on the ASUSTOR NAS, you must upload
    it to the “Web” shared folder of the NAS.

    3. Now click on the Virtual Host tab and then click on the button.

    4. The Virtual Host window will
    now appear. Fill out the required fields and then click [OK] once you are done. Your website should now be successfully hosted on the NAS.

    *Please note that if
    you need to fine tune the Web server on the NAS, you can use terminal service
    to connect to the NAS and configure .ini for apache server or php. Please refer
    to following link for instructions on connecting to the NAS’s terminal service:

    http://support.asustor.com/index.php?/Default/Knowledgebase/Article/View/190/22/how-to-ssh-into-my-asustor-nas

    SSH into Asustor NAS

    http://support.asustor.com/index.php?/Default/Knowledgebase/Article/View/190/22/how-to-ssh-into-my-asustor-nas


    Please follow below steps to ssh into your ASUSTOR NAS.

     

    1. Enable SSH on the NAS.

        Login ADM -> Services -> Terminal -> SSH -> Enable SSH service.

    2. Download PuTTY which is a free implementation of Telnet and SSH  for Windows and Unix platforms, along with an xterm terminal emulator.

        http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html

    3. Open Putty SSH and then type in your NAS IP address.

      

    4. Login as “root” and the SSH password for root is same as your “admin” account’s password.

    (Please note that only root account is allowed to ssh into NAS.)


    Hosting multiple websites with Virtual Host

    [3d-flip-book mode=”fullscreen” id=”107882″ ][/3d-flip-book]



    Local Ip Configuration – Self Assigning NATS AN IP

    covers network settings more thoroughly

    [3d-flip-book mode=”fullscreen” id=”105191″ ][/3d-flip-book]


    Beginner Guide to Networking

    NAS 105 – Networking: A Beginner’s Guide
    [3d-flip-book mode=”fullscreen” id=”105193″ ][/3d-flip-book]

    NAS 307 – Networking: Link Aggregation

    [3d-flip-book mode=”fullscreen” id=”105195″ ][/3d-flip-book]



    <p≥https://www.asustor.com/online/online_help?id=4

    Network

    Note: This function may differ depending on the NAS model in use. Here you can configure the server name, LAN and Wi-Fi settings. Other settings include IP address, DNS server and default gateway.

    • Server Name: An online name for your NAS.
    • Default Gateway: The default gateway that you wish to use.
    • DNS Server: Here you can set the DNS server that you wish to use. Should you choose to obtain your IP address via DHCP the system will automatically obtain the available DNS servers for you. If you choose to manually enter an IP address then you will have to manually enter a DNS server as well.
      Reminder: Using an invalid DNS server will affect some network related functions. (i.e., Download Center). If you are uncertain about how to proceed, please choose to obtain your IP address automatically.
    • Sign In Page: Under Sign In Page Style you will be able to configure the following
      • Lease time (hr): Enter a value (1-720) to set the DHCP lease time (in hours) for IP addresses assigned to DHCP clients.
      • Primary/Secondary DNS: Enter the Primary/Secondary DNS address for DHCP clients.
      • Domain Name: Set the domain name for the DHCP server.
      • Subnet List: You can add subnets here.
      • DHCP Client List: Here you can check the list of DHCP clients and their network configurations (e.g. MAC address, IP address, hostname, and the amount of time left before the DHCP lease expires).
      • DHCP Reservations: If you want a client to always receive the same IP address during DHCP lease renewal, you can add the client to the DHCP reservation list.
    • Proxy: Here you can enable proxy server connections, allowing the NAS to connect to the internet via a proxy server.
      • Proxy Server: The address of the proxy server you wish to connect to. (Supports HTTP and HTTPS
      • Port: The communications port of the proxy server.
      • Proxy Server: The address of the proxy server you wish to connect to. (Supports HTTP and HTTPS
    • PPPoE
      • If you are using DSL or a cable modem to connect to the Internet and your Internet service provider uses PPPoE (Point to Point Protocol over Ethernet), you can go to [Settings] > [Network] > [PPPoE] and enter your account information to allow the system to connect to the Internet without having to go through a router. If you wish to get more information about PPPoE, please contact your Internet service provider or network administrator.
    • VPN
      • Here you can let your ASUSTOR NAS become a VPN client, and via PPTP or Open VPN, connect to a VPN server to access a virtual private network. ASUSTOR NAS supports the use of different connection settings files, allowing you to connect to the VPN server of your choice. The ASUSTOR VPN client currently supports the two most common connection protocols: PPTP and OpenVPN.
    • Link Aggregation
      • Link aggregation (a.k.a. trunking, bonding or teaming) combines two or more network connections into one. To use link aggregation, your Ethernet cables must be connected to the same network switch and your network switch must support link aggregation.

    Dynamic DNS for NAS

    1. YDNS
    https://ydns.io/
    Based out of Germany, YDNS is a freeDdynamic DNS provider that only asks for you to sign up with your email address and password before you start using it. Unless you’re using a custom domain name, you’re restricted to using the “ydns.eu” domain, but for many people that will suffice.


    DHCP / ETHERNET CONNECTION ARTICLES
    • https://support.apple.com/lv-lv/guide/mac-help/mh21939/mac
    • https://support.apple.com/guide/mac-help/use-dhcp-or-a-manual-ip-address-on-mac-mchlp2718/mac


    https://www.synology.com/en-us/knowledgebase/DSM/help/DSM/AdminCenter/connection_routerconf




    Comcast Connected Devices

    http://10.0.0.1/connected_devices_computers.php

    Change the IP address assignment method for Online Devices.

    If DHCP is selected, the Gateway’s DHCP server will automatically assign the IP address.

    If Reserved IP is selected, the IP address will be fixed without DHCP operation and you’ll need to manually enter the IP address. The IP address must be within the DHCP IP address pool. To find your IP address range, go to Gateway > Connection > Local IP Network.

    Reserved IP addresses can be assigned to any device that acts as a server or that requires a fixed IP address.

    Gateway > Connection > Local IP Configuration

    Manage your home network settings.

    Gateway address: Enter the IP address of the Gateway.

    Subnet Mask: The subnet mask is associated with the IP address. Select the appropriate subnet mask based on the number of devices that will be connected to your network.

    DHCP Beginning and Ending Addresses: The DHCP server in the Gateway allows the router to manage IP address assignment for the connected devices.

    DHCP Lease time: The lease time is the length of time the Gateway offers an IP address to a connected device. The lease is renewed while it is connected to the network. After the time expires, the IP address is freed and may be assigned to any new device that connects to the Gateway.

    Managing your home network settings is now easier than ever. Visit xfinity.com/myxfi to view and manage your list of connected/offline devices. You can block access to your home network for any device, among many other features and settings.

    CURRENT SETTINGS

    spiffy-nas-ty

    IPv4 Address
    10.0.0.143
    Local Link IPv6 Address
    fe80::264b:feff:fe83:466b
    MAC Address
    24:4B:FE:83:46:6B

    10.0.0.2 – 10.0.0.253

    Lease 2 days

    NAS – Network Panel In Settings

    Assign IP



    ddns – ezrouter

    How to set up a static IP Address

    https://www.pcmag.com/how-to/how-to-set-up-a-static-ip-address

    When you have a lot of devices on your network—computers, , and —it can be annoying to constantly look up their IP addresses when you need to access them remotely. Make your life easier with a set of unchanging, static IP addresses for those machines.

    Your router assigns IP addresses to devices on your network using , or Dynamic Host Configuration Protocol. As you connect new devices to the network, they’ll be assigned the next IP address in the pool, and if a device hasn’t connected in a few days, its IP address will “expire” so it can be assigned to something else.

    For everyday use, this is perfectly fine, and you’ll never even notice it happening in the background. But if you regularly , to turn your computer on from across the house, or perform other advanced networking tasks, DHCP can become an annoyance.

    It’s hard to remember which IP address is assigned to which device, and if they ever expire, you have to look it up all over again. That’s where a static IP address comes in handy.

    Understanding Static IP Addresses

    Instead of letting your router assign whatever IP address is free at any given time, you can assign specific IP addresses to the devices you access frequently. For example, I have my home server set to 192.168.1.10, my main desktop to 192.168.1.11, and so on—easy to remember, sequential, and unchanging.

    You can assign these static IP addresses on the device itself—using, say, Windows’ network settings on each computer—or you can do it at the router level. Doing it at the router level is called assigning a DHCP reservation, though many people (and even some routers) still refer to it as a “static IP address.”

    DHCP reservations allow you to easily set everything up in one place with all your computers left at their default settings. Your computer will ask for an IP address via DHCP, and your router will assign it the one you’ve reserved, with your computer being none the wiser.

    How to Set Up a DHCP Reservation

    To set up a DHCP reservation, —usually by typing its IP address in your browser’s navigation bar—and log in. (If you’re using a mesh Wi-Fi system with an app instead of a config page, you’ll find these settings in the app.)

    The location is different for every config page, but you’re looking for something called “DHCP reservations,” “static IP addresses,” or something similar—on my Asus router, it’s in the LAN settings category.

    To assign a reservation, you’ll need the MAC address of the device in question. This is a unique string of characters that identifies a particular network adapter, and you can usually find it in your router’s list of connected devices. Make sure you’re getting the MAC address for the correct network adapter—if you have both Ethernet and Wi-Fi on your computer, you’ll have one MAC address for each.

    On your router’s config page, enter an easy-to-remember label for the device (like “Whitson’s Desktop PC”), the MAC address, and your desired IP address. Save your changes, and repeat the process for any other IP addresses you want to reserve.

    From then on, those devices should have your reserved IP addresses assigned to them, and you’ll never have to look them up again.


    Using NAS as a VPN server

    https://www.asustor.com/en/online/College_topic?topic=323

    COURSE OBJECTIVES

    Upon
    completion of this course you should be able to

    1. Be able to use your ASUSTOR NAS as a VPN
    server and connect to it using Windows and Mac.


    PREQUISITES

    Course Prerequisites:

    None

    Students are
    expected to have a working knowledge of:

    N/A


    OUTLINE

    1.1 Enabling and configuring PPTP
    connections

    1.2 Enabling and configuring OpenVPN
    connections

    1.3 Enabling
    and configuring L2TP connections

    2.1.1 Connecting using
    Windows 7

    2.1.3 Connecting
    using a Mac

    2.2.1 Connecting using
    Windows 7

    2.2.2 Connecting using
    a Mac

    2.3 Configuring the gateway and routing for the
    VPN client

    2.3.1 Configurations
    using Windows 7

    2.3.3 Configurations
    using a Mac

    2.4 Connecting to your VPN server via L2TP/Ipsec


    1. Configuring Your VPN Server

    In the following example, we wil configure
    ASUSTOR NAS’s VPN Server.

    Before you begin, log in to ADM from your
    Web browser and then search for and install
    [VPN Server] from [App
    Central]
    .

    1.1 Enabling and configuring PPTP connections


    STEP
    1

    Enabling
    PPTP service: You can use the toggle found under
    [PPTP] to enable PPTP service.


    STEP
    2

    Adding
    a new user: Select
    [Privilege] [User] → [Add]. In the graphic
    below, we have chosen to add the account “vpn” as an example. After you have
    chosen the user that wish to add, click on
    [Save].


    Select the [PPTP] checkbox and then click on [Apply]. Now, the “vpn” user account
    will be able to utilize PPTP connections.


    STEP
    3

    Configuring
    advanced settings: Select
    [Settings] → [PPTP]. Here, you will be
    able to configure settings for
    [Dynamic
    IP address]
    , [Max. client number], [Authentication], [Max. MTU], [Max. MRU] and [DNS server].
    Make sure to click on
    [Apply] after
    you have made any changes to the settings.


    1.2 Enabling and configuring OpenVPN connections

    STEP
    1

    Enabling
    OpenVPN service: You can use the toggle found under
    [OpenVPN] to enable OpenVPN service.


    STEP
    2

    Adding
    a new user: Select
    [Privilege] → [User] → [Add]. In the graphic
    below, we have chosen to add the account “vpn” as an example. After you have
    chosen the user that wish to add, click on
    [Save].


    Select the [OpenVPN] checkbox and then click on [Apply]. Now, the “vpn” user account
    will be able to utilize PPTP connections.


    STEP
    3

    Configuring
    advanced settings: Select
    [Settings] → [OpenVPN]. Here, you will be
    able to configure settings for
    [Dynamic
    IP address]
    , [Transmission Protocol], [Port], [Max. client number], [Checksum
    (Digest)]
    , [Encryption (Cipher)], [DNS server], [Redirect gateway] and [VPN
    link compression]
    . Make sure to click on [Apply] after you have made any changes to the settings.


    Note: Click on the [Download
    configuration file]
    button to download the configuration file for
    OpenVPN clients. You must import this file to your VPN client in order to
    successfully create OpenVPN connections.


    1.3 Enabling and configuring L2TP connections

    STEP 1

    Enabling L2TP service: Enable XL2TP service by using the provided toggle button.


    STEP 2

    Add new users: Select [Privilege] > [User] > [Add]. In this example we add the user “vpn” by selecting its checkbox and then clicking on [Save].




    For the added user, select the [XL2TP] checkbox and then click on [Apply]. This will allow the user to use XL2TP connections.

    STEP 3

    Modifying advanced settings: Click on [Settings] >[XL2TP]. Here you will be able to configure settings such as the dynamic IP address, max client number, max MTU, DNS server and key. Make sure to click on [Apply] once you are done modifying the settings.


    2. Connecting to Your VPN
    Server Using Windows and Mac
    2.1 Connecting to your VPN server via
    PPTP

    2.1.1 Connecting using Windows 7

    STEP
    1

    Select [Control
    Panel] →
    [All
    Control Panel Items] →
    [Network and Sharing Center] → [Set
    up a new connection or network]
    .


    STEP
    2

    Select [Connect
    to a workplace] →
    [Next].


    STEP
    3

    Select [No, create a new connection] → [Next].


    STEP
    4

    Select [Use my Internet connection (VPN)].


    STEP
    5

    Enter
    the IP address of your ASUSTOR NAS into the
    [Internet address] field and then click on [Next].


    STEP 6

    Enter a username and password in the appropriate fields and then click
    on
    [Connect]. You will now be able
    to access your ASUSTOR NAS through Windows.


    Note: If you are unable to connect to your
    VPN server, please ensure that your VPN settings are identical to your VPN
    server settings.

    For example, in the graphic below, we check
    that the [Type of VPN] is Point to Point Tunneling Protocol (PPTP),
    that the [Data encryption] method is PAP or MS-CHAP v2 and that they have been allowed under the [Allow these protocols] radio button.


    2.1.2 Connecting using Windows 10


    STEP
    1

    Click the [Network] icon on the bottom right-hand
    side of the system tray and select
    [Network
    Settings]
    .




    STEP
    2

    Select [VPN] from the left panel, and click [Add a VPN connection].




    STEP
    3

    Select Windows (built-in) in [VPN
    Provider]
    field. Type in the name for this VPN connection and enter the IP address of your ASUSTOR NAS into the [Server name or address] field. Choose PPTP as the [VPN Type], enter the username/password in the
    appropriate fields, and click
    [Save].


    STEP
    4

    Now you can see that the
    newly created VPN connection has appeared. To specify the authentication protocol,
    please click
    [Change adapter options].



    Right click on the VPN
    connection and select
    [Properties].




    STEP
    5

    Select the [Security] tab, check the [Allow these protocols] option, then
    choose the same protocol (PAP or MS-CHAP v2) as the VPN server on your ASUSTOR
    NAS. Click
    [OK] to save the
    settings.




    STEP
    6

    To establish the VPN
    connection, go to the Windows
    [NETWORK
    & INTERNET]
    > [VPN] page,
    select an existing VPN profile and click
    [Connect].



    2.1.3 Connecting using a Mac


    STEP 1

    From the Apple menu, select [System Preferences…].


    STEP 2

    Select [Network].


    STEP
    3

    Click on the [ + ] button and then select [VPN] for Interface, [PPTP] for VPN Type,
    fill in the Service Name as “
    VPN (PPTP)
    and then click on
    [Create].


    STEP
    4

    Enter your [Server Address] and [Account
    Name]
    , select “None” for [Encryption] and then click on [Connect]. Please ensure that your VPN
    client settings and VPN server settings are identical.


    STEP 5

    Enter the name and password for
    your VPN server and then click on
    [OK].


    STEP
    6

    You should now be successfully connected and should be able to access
    your ASUSTOR NAS using your Mac. You can disconnect the connection at any time
    by clicking on the [Disconnect] button.




    2.2 Connecting to your VPN server via OpenVPN
    2.2.1 Connecting using Windows 7

    STEP
    1

    Download and
    install the OpenVPN program from the OpenVPN website.


    STEP
    2

    Extract the OpenVPN configuration file that you
    have downloaded from your ASUSTOR NAS’s VPN server (see section 3.2). Open the
    [asustor.ovpn] file, change the IP
    address for the VPN server and then save the changes. In the graphic below, we
    have changed the IP address of the VPN server to 172.16.2.102.


    STEP
    3

    Copy the [asustor.ovpn] and [ca.crt] files to the (C:Program
    FilesOpenVPNconfig)
    folder.


    STEP
    4

    Open [OpenVPN GUI].

    You
    should now be able to see the
    [OpenVPN
    GUI]
    icon in your system tray. Double-click on it.


    STEP
    5

    Enter the username and
    password for your ASUSTOR NAS VPN server and then click on
    [OK].


    STEP
    6

    After
    successfully connecting, you should be able to see that the OpenVPN GUI icon in
    your system tray has turned green. You should now be able to access your
    ASUSTOR NAS using Windows.




    2.2.2 Connecting using a Mac

    STEP
    1

    Download tunnelblick.

    STEP
    2

    Install [Tunnelblick].


    After
    installation, click on
    [Launch].


    STEP
    3

    Click
    on
    [I have configuration files].


    If
    you have already download the configuration file from your ASUSTOR NAS’s VPN
    server, click on
    [OpenVPN
    Configuration(s)]
    .


    You should now be able to
    see the newly created
    [Empty Tunnelblick
    VPN Configuration]
    folder on your desktop. Copy the configuration file from
    your ASUSTOR NAS’s VPN server to this folder.


    Open
    the
    [asustor.ovpn] file and then
    change the IP address for your ASUSTOR NAS VPN server.


    After
    saving the changes to the file, change the name of the folder to “
    ASUSTORVPN.tblk”.


    Tunnelblick
    VPN configurations should have now been installed successfully.


    STEP
    4

    From
    the Mac menu bar, click on the
    [Tunnelblick] icon and then select [Connect
    ASUSTORVPN]
    .



    STEP
    5

    After
    successfully connecting, you will be able to see the connection status and time
    in the menu bar as shown in the graphic below.




    2.3 Configuring the gateway and routing for the VPN client
    When
    using a VPN client, the system will automatically forward your VPN server’s default gateway.
    Under these circumstances, you will not be able to connect to the Internet.
    Therefore, we must change the VPN gateway and routing in order to connect to
    the Internet.
    2.3.1 Configurations using Windows 7

    STEP
    1

    Right-click
    on your VPN connection and then select [Properties].
    Select [Internet
    Protocol Version 4 (TCP/IPv4)]
    and
    then click on [Properties].


    STEP
    2

    Click
    on
    [Advanced…].




    STEP
    3

    Uncheck
    the
    [Use default gateway on remote
    network]
    checkbox.


    2.3.2 Configurations using Windows 10

    STEP
    1

    Click the
    Windows icon on the bottom left-hand side of the taskbar, select [All apps] from
    the list, and scroll down to find [Windows Powershell].
    Click on it to execute the program.




    STEP
    2

    Issue
    theGet-VpnConnectioncommand
    to list the information of your existing VPN connections.

    By
    default, the value of the SplitTunneling parameter is False, which means all
    network traffic of this VPN client will be forwarded to the VPN server’s
    gateway.




    STEP
    3

    Issue the Set-VpnConnection
    -Name
    “ASUSTOR VPN” -SplitTunneling $True”
    command to change the value of the SplitTunneling parameter to True.

    Note: The “ASUSTOR NAS” string in the example above
    must be replaced to your own VPN connection name.


    STEP
    4

    Issue the Get-VpnConnection command again to verify that the change has been made successfully.


    2.3.3 Configurations using a Mac

    STEP
    1

    Open [Terminal] and
    then enter the command ifconfig-a. You
    will now be able to see your VPN server’s IP address. Note that the Mac operating
    system only provides this gateway for connecting to a VPN server and cannot
    connect to the Internet. Therefore, we will have to manually enter the IP
    address for the ASUSTOR NAS.


    STEP
    2

    Please
    replace either 10.0.1.6 or 10.0.1.5 with the IP address of the ASUSTOR NAS.
    Executing the commands below will allow you to connect to the Internet.

    sudo route
    add –net 172.16.1.216/16 10.0.1.6

    OR

    sudo route
    add –net 172.16.1.216/16 10.0.1.5


    2.4 Connecting to your VPN server via L2TP/IPsec

    2.4.1 Connecting using Windows 7

    If you are using an ASUS router, please manually open port 500 under port forwarding. From the router configuration interface, select [WAN]  [Virtual Server / Port Forwarding] tab  [Port Forwarding List]. Add a new item to the Port Forwarding list by entering the following information:

    Service Name: A name of your choice
    Port Range: 500
    Local IP: Your NAS’s IP address
    Local Port: 500
    Protocol: UDP

    Click on the [Add] button after you have entered all the information. Port 500 should now be opened.

    STEP 1
    In Windows, go to [Control Panel] > [All Control Panel Items] > [Network and Sharing Center] and then click on [Set up a new connection or network].

    STEP 2
    Select [Connect to a workplace] then click [Next].

    STEP 3
    Select [No, create a new connection] and then click [Next].

    STEP 4
    Select [Use my Internet connection (VPN)]

    STEP 5
    In the [Internet address:] field enter your ASUSTOR NAS’s IP address or domain address.

    STEP 6
    Enter your [User name] and [Password] and then click on [Connect]. You will now be able to access the local network resources on your ASUSTOR NAS via Windows.

    Note: If you are unable to connect to the VPN Server, please ensure that the [VPN Settings] and [VPN Server] settings are identical.
    Using the graphic below as an example, we check that the [Type of VPN] is L2TP/IPSec, that the data encryption method is either PAP or MS-CHAP v2 and that [Allow these protocols] radio button has been selected.


    STEP 7
    Click on [Start] and run “regedit”.

    STEP 8
    Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent and then right click and select [New] > [DWORD (32 bit) Value].

    STEP 9
    For the Value name enter “AssumeUDPEncapsulationContextOnSendRule”and set the Value data to “2” and then click [OK]. Restart your computer.

    STEP 10
    After restarting your computer, go to [Control Panel] > [Network and Internet] > [Network Connections] to see that your new connection is successful.

    2.4.2 Connecting using Windows 10


    If you are using an ASUS router, please manually open port 500 under port forwarding. From the router configuration interface, select [WAN] > [Virtual Server / Port Forwarding] tab > [Port Forwarding List]. Add a new item to the Port Forwarding list by entering the following information:

    Service Name: A name of your choice
    Port Range: 500
    Local IP: Your NAS’s IP address
    Local Port: 500
    Protocol: UDP

    Click on the [Add] button after you have entered all the information. Port 500 should now be opened.

    STEP 1
    Click on the [Network] icon in the system tray and then click on [Open Network and Sharing Center].

    STEP 2
    Click on [Set up a new connection or network].

    STEP 3
    Select [Connect to a workplace] then click [Next].

    STEP 4
    Click on [Use my Internet connection (VPN)].

    STEP 5
    Enter the Internet address, Destination name and then select the [Allow other people to use this connection] checkbox. Click on [Create] once you are done.

    STEP 6
    Click on [Change adapter settings]. Right-click on the VPN connection that you have just created and select [Properties]. Click on the [Security] tab and change the [Type of VPN] to L2TP/IPsec. Click on [Advanced settings], make sure the [Use preshared key for authentication] radio button is selected and then enter your key (Your key can be found from the ADM interface by selecting [VPN Server] > [Settings] > [L2TP]). Click on [OK] once you are done.

    STEP 7
    Click on [Start] and run “regedit”.

    STEP 8
    Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent and then right click and select [New] > [DWORD (32 bit) Value].

    STEP 9
    For the Value name enter “AssumeUDPEncapsulationContextOnSendRule”and set the Value data to “2” and then click [OK]. Restart your computer.

    2.4.3 Connecting using a Mac
    If you are using an ASUS router, please manually open port 500 under port forwarding. From the router configuration interface, select [WAN] > [Virtual Server / Port Forwarding] tab > [Port Forwarding List]. Add a new item to the Port Forwarding list by entering the following information:

    Service Name: A name of your choice
    Port Range: 500
    Local IP: Your NAS’s IP address
    Local Port: 500
    Protocol: UDP

    Click on the [Add] button after you have entered all the information. Port 500 should now be opened.

    STEP 1
    Click on the [Apple] icon and then select [System Preferences…].

    STEP 2
    Click on [Network].

    STEP 3
    Click on the + button, select [VPN] for “Interface:”, [L2TP Over IpSec] for “VPN Type”, enter a Service Name and then click on [Create].

    STEP 4
    Enter your [Server Address] and [Account Name]. Click on [Authentication Settings…] and enter the User Account Password and Shared Secret (The Shared Secret is the key that can be found from the ADM interface by selecting [VPN Server] > [Settings] >[XL2TP]).

    Click [OK] and then click on [Connect].

    STEP 5
    Enter the VPN Server account name and password and then click on [OK].

    STEP 6
    After successfully connecting, you will be able to access the resources on your ASUSTOR NAS local network. If you wish to disconnect the VPN connection, you can click on the [Disconnect] button.

    2.4.4 Connecting using an Android device

    STEP 1
    Select [Settings]>[More] > [VPN].

    STEP 2
    Click on [Add VPN profile], enter a name of your choice, select [L2TP/IPSEC PSK] for “Type” and enter your NAS’s IP address or URL into the [Server Address] field. Choose an encryption method and then select [Save] to complete configurations.

    STEP 3
    Select the created VPN profile. After entering the username and password, select [Connect] to create the VPN connection.

    After creating the connection, selecting the profile again will allow you to view the associated information for the connection.



    2.4.5 Connecting using an iOS device

    The configurations in the following example were done using an iPhone 6.

    STEP 1
    In iOS, select [Settings] >[General] > [VPN].

    STEP 2
    Select [Add a VPN configuration…] and then enter the following information:
    Type: L2TP
    Description: A description of your choice
    Server: Your NAS’s IP address or URL
    Account: Your account name
    Password: The password for the account
    Secret: They key that can be found in ADM interface by selecting [VPN Server]> [Settings]>[XL2TP]

    Once you have finished entering the information select [Done].

    STEP 3
    After completing the VPN profile you can select the status toggle to activate the VPN connection.


    iSCSI with your NAS

    https://www.qnap.com/en/how-to/tutorial/article/how-to-create-and-use-the-iscsi-target-service-on-a-qnap-nas/


    https://clickety-clack.click/img/whitepaper_ipbridge_xtendsan_iscsi_macosx.pdf

    [3d-flip-book mode=”fullscreen” id=”108117″ ][/3d-flip-book]


    https://www.asustor.com/en/online/College_topic?topic=308

    COURSE OBJECTIVES

    Upon completion of this course you should be able to:

    1. Have a basic understanding of iSCSI

    2. Be able to use the iSCSI service with your ASUSTOR NAS

    PREREQUISITES

    Course Prerequisites:

    None

    Students are expected to have a working knowledge of:

    N/A


    1. Introduction to iSCSI

    1.1 What is iSCSI?

    iSCSI, (Internet Small Computer System Interface), is an Internet Protocol (IP)-based storage networking standard for linking data storage facilities. It
    offers high expandability and low implementation costs. Through existing network infrastructure and iSCSI you can use your NAS to expand existing storage
    space or have it act as a backup destination.

    iSCSI consists of two ends, a target and an initiator. The initiator (on your computer) functions as an iSCSI client and is used to search for iSCSI hosts
    and to set up targets. Targets are storage resources that are located on an iSCSI server. An iSCSI target is often a dedicated network-connected hard disk
    storage device (ASUSTOR NAS).

    Note: A single target should not be simultaneously connected to multiple clients or initiators.

    2. Using the iSCSI service with your computer

    In the following example we will take you through the process of creating an iSCSI volume on the ASUSTOR NAS and then connecting to it using a PC.

    2.1 Creating an iSCSI target and LUN

    STEP 1

    Open [Storage Manager]. Click on [Create] button under the iSCSI section.

    STEP 2

    The Create New iSCSI Device window will now appear. Select the [An iSCSI target with one LUN] radio button and click [Next].

    STEP 3

    Enter a name for your Target and then click [Next].

    STEP 4

    Select the [No authentication required] radio button and click [Next].

    In our example we have chosen not to use authentication. However, if you wish to verify a user’s identity you can choose to use CHAP authentication. If
    you choose to use CHAP authentication, a CHAP password must first be entered from the initiator for verification before it can connect to the target.

    STEP 5

    Select the [Create a new iSCSI LUN] radio button. Fill in a name for your LUN and select a size for it. Once, you’re done click [Next].

    Note: A LUN (logical unit number) represents an individually addressable (logical) SCSI device that is part of a physical SCSI device (target). In an
    iSCSI environment, LUNs are essentially numbered disk drives. An initiator negotiates with a target to establish connectivity to a LUN. LUNs represent
    slices of your hard disks.

    STEP 6

    Look over a final summary of your settings. Once you’re done, confirm these settings by clicking [Finish].

    STEP 7

    You will now be able to see the new target that you have created.

    You will be able to see the LUN that you have created in the iSCSI LUN section.

    2.2 Connecting to the target using the iSCSI initiator

    STEP 1

    In Windows, click [Start] and then click on [Control Panel].

    STEP 2

    Select [Administrative Tools].

    STEP 3

    Double-click on [iSCSI Initiator].

    STEP 4

    Under the Targets tab enter the IP address of your NAS into the [Target:] field and then click on [Quick Connect…].

    STEP 5

    You will now see the Quick Connect dialog box and that your target has been connected to. Click on [Done].

    STEP 6

    Once again, you will see that the target has been connected to under the [Discovered targets] heading. Click on [OK].

    2.3 Initializing the new disk volume

    STEP 1

    In Windows click [Start]. Then right-click on [Computer] and select [Manage].

    STEP 2

    The Computer Management window will now appear. Click on [Disk Management] under [Storage] in the left hand panel. The Initialize Disk
    dialog box will now appear. Make sure the disk is selected and then click [OK] to initialize it.

    STEP 3

    You will now see that the new disk is online but unallocated. Right-click on it and select [New Simple Volume…].

    STEP 4

    The New Simple Volume Wizard will now appear. Follow the steps provided by the wizard to complete the creation of the new disk volume.

    STEP 5

    This is what the information for the disk should look like once the new volume has been created.

    STEP 6

    The new volume is now ready for use. It will appear as a hard disk drive as in the picture below. You can use it as if it were a hard drive on your
    computer and any data that you store on it will be saved to the ASUSTOR NAS.

    Note: Please remember that a single target should not be simultaneously connected to multiple clients or initiators.

    3. Using iSCSI LUN Snapshots

    A snapshot of an iSCSI LUN is a point-in-time, read-only copy of an iSCSI LUN. It saves a significant amount of time and storage capacity when compared
    with traditional LUN backups. Each individual LUN supports up to 256 snapshot versions. In the following example we will show you how to create and restore
    an iSCSI LUN snapshot.

    3.1 Manually creating an iSCSI LUN snapshot

    STEP 1

    Open [Storage Manager]. Go to the [iSCSI LUN] tab, select a LUN that supports snapshots, click on [LUN Snapshot] and then choose [Create].

    STEP 2

    Click [Next] to proceed.

    STEP 3

    Now you will be able to configure the snapshot name, description (optional), and snapshot lock status. If the snapshot is locked, it cannot be removed
    manually or automatically. Click [Finish] to complete creation of the snapshot.

    Upon completion, you will see the newly created snapshot in the LUN Snapshot table as shown in the graphic below.

    3.2 Scheduled creation of iSCSI LUN snapshots

    STEP 1

    Open [Storage Manager]. Go to the [iSCSI LUN] tab, select a LUN that supports snapshots, click on [LUN Snapshot] and then choose [Schedule].

    STEP 2

    Define the schedule in accordance with your own requirements and then click [OK] when you are done.

    STEP 3

    You will now be able to see the schedule details in the [Snapshot Manager].

    3.3 Restoring from an iSCSI LUN snapshot

    STEP 1

    Open [Storage Manager]. Go to the [iSCSI LUN] tab, select a LUN that has existing snapshot(s), click on [LUN Snapshot] and then choose [Management].

    STEP 2

    Select the snapshot you want to restore, click on [Action] and then choose [Restore].

    STEP 3

    You will be provided with some extra settings before starting the restoration. You can configure the settings according to your requirements. After you
    click [OK], the iSCSI LUN will be rolled back with the selected snapshot.


    iSCSI with your NAS

    https://www.qnap.com/en/how-to/tutorial/article/how-to-create-and-use-the-iscsi-target-service-on-a-qnap-nas/


    https://clickety-clack.click/img/whitepaper_ipbridge_xtendsan_iscsi_macosx.pdf

    [3d-flip-book mode=”fullscreen” id=”108117″ ][/3d-flip-book]


    https://www.asustor.com/en/online/College_topic?topic=308

    COURSE OBJECTIVES

    Upon completion of this course you should be able to:

    1. Have a basic understanding of iSCSI

    2. Be able to use the iSCSI service with your ASUSTOR NAS

    PREREQUISITES

    Course Prerequisites:

    None

    Students are expected to have a working knowledge of:

    N/A


    1. Introduction to iSCSI

    1.1 What is iSCSI?

    iSCSI, (Internet Small Computer System Interface), is an Internet Protocol (IP)-based storage networking standard for linking data storage facilities. It
    offers high expandability and low implementation costs. Through existing network infrastructure and iSCSI you can use your NAS to expand existing storage
    space or have it act as a backup destination.

    iSCSI consists of two ends, a target and an initiator. The initiator (on your computer) functions as an iSCSI client and is used to search for iSCSI hosts
    and to set up targets. Targets are storage resources that are located on an iSCSI server. An iSCSI target is often a dedicated network-connected hard disk
    storage device (ASUSTOR NAS).

    Note: A single target should not be simultaneously connected to multiple clients or initiators.

    2. Using the iSCSI service with your computer

    In the following example we will take you through the process of creating an iSCSI volume on the ASUSTOR NAS and then connecting to it using a PC.

    2.1 Creating an iSCSI target and LUN

    STEP 1

    Open [Storage Manager]. Click on [Create] button under the iSCSI section.

    STEP 2

    The Create New iSCSI Device window will now appear. Select the [An iSCSI target with one LUN] radio button and click [Next].

    STEP 3

    Enter a name for your Target and then click [Next].

    STEP 4

    Select the [No authentication required] radio button and click [Next].

    In our example we have chosen not to use authentication. However, if you wish to verify a user’s identity you can choose to use CHAP authentication. If
    you choose to use CHAP authentication, a CHAP password must first be entered from the initiator for verification before it can connect to the target.

    STEP 5

    Select the [Create a new iSCSI LUN] radio button. Fill in a name for your LUN and select a size for it. Once, you’re done click [Next].

    Note: A LUN (logical unit number) represents an individually addressable (logical) SCSI device that is part of a physical SCSI device (target). In an
    iSCSI environment, LUNs are essentially numbered disk drives. An initiator negotiates with a target to establish connectivity to a LUN. LUNs represent
    slices of your hard disks.

    STEP 6

    Look over a final summary of your settings. Once you’re done, confirm these settings by clicking [Finish].

    STEP 7

    You will now be able to see the new target that you have created.

    You will be able to see the LUN that you have created in the iSCSI LUN section.

    2.2 Connecting to the target using the iSCSI initiator

    STEP 1

    In Windows, click [Start] and then click on [Control Panel].

    STEP 2

    Select [Administrative Tools].

    STEP 3

    Double-click on [iSCSI Initiator].

    STEP 4

    Under the Targets tab enter the IP address of your NAS into the [Target:] field and then click on [Quick Connect…].

    STEP 5

    You will now see the Quick Connect dialog box and that your target has been connected to. Click on [Done].

    STEP 6

    Once again, you will see that the target has been connected to under the [Discovered targets] heading. Click on [OK].

    2.3 Initializing the new disk volume

    STEP 1

    In Windows click [Start]. Then right-click on [Computer] and select [Manage].

    STEP 2

    The Computer Management window will now appear. Click on [Disk Management] under [Storage] in the left hand panel. The Initialize Disk
    dialog box will now appear. Make sure the disk is selected and then click [OK] to initialize it.

    STEP 3

    You will now see that the new disk is online but unallocated. Right-click on it and select [New Simple Volume…].

    STEP 4

    The New Simple Volume Wizard will now appear. Follow the steps provided by the wizard to complete the creation of the new disk volume.

    STEP 5

    This is what the information for the disk should look like once the new volume has been created.

    STEP 6

    The new volume is now ready for use. It will appear as a hard disk drive as in the picture below. You can use it as if it were a hard drive on your
    computer and any data that you store on it will be saved to the ASUSTOR NAS.

    Note: Please remember that a single target should not be simultaneously connected to multiple clients or initiators.

    3. Using iSCSI LUN Snapshots

    A snapshot of an iSCSI LUN is a point-in-time, read-only copy of an iSCSI LUN. It saves a significant amount of time and storage capacity when compared
    with traditional LUN backups. Each individual LUN supports up to 256 snapshot versions. In the following example we will show you how to create and restore
    an iSCSI LUN snapshot.

    3.1 Manually creating an iSCSI LUN snapshot

    STEP 1

    Open [Storage Manager]. Go to the [iSCSI LUN] tab, select a LUN that supports snapshots, click on [LUN Snapshot] and then choose [Create].

    STEP 2

    Click [Next] to proceed.

    STEP 3

    Now you will be able to configure the snapshot name, description (optional), and snapshot lock status. If the snapshot is locked, it cannot be removed
    manually or automatically. Click [Finish] to complete creation of the snapshot.

    Upon completion, you will see the newly created snapshot in the LUN Snapshot table as shown in the graphic below.

    3.2 Scheduled creation of iSCSI LUN snapshots

    STEP 1

    Open [Storage Manager]. Go to the [iSCSI LUN] tab, select a LUN that supports snapshots, click on [LUN Snapshot] and then choose [Schedule].

    STEP 2

    Define the schedule in accordance with your own requirements and then click [OK] when you are done.

    STEP 3

    You will now be able to see the schedule details in the [Snapshot Manager].

    3.3 Restoring from an iSCSI LUN snapshot

    STEP 1

    Open [Storage Manager]. Go to the [iSCSI LUN] tab, select a LUN that has existing snapshot(s), click on [LUN Snapshot] and then choose [Management].

    STEP 2

    Select the snapshot you want to restore, click on [Action] and then choose [Restore].

    STEP 3

    You will be provided with some extra settings before starting the restoration. You can configure the settings according to your requirements. After you
    click [OK], the iSCSI LUN will be rolled back with the selected snapshot.


    Chats with Comcast during setup

    Asustor chats with comcast during setup →

Scroll to Top