3
Working with RAID Arrays .................................................................34
Using JBOD ....................................................................................................34
Changing RAID Mode ...................................................................................35
Configuring a Hot Spare ...............................................................................36
RMM (RAID Mode Manager) .........................................................................37
RAID Scanning...............................................................................................38
Adding an External Hard Drive .........................................................39
Dismounting Drives ...........................................................................40
Checking Drives .................................................................................40
S.M.A.R.T. ............................................................................................41
Formatting Drives ..............................................................................42
Encrypting Drives ...............................................................................44
Media Cartridges ................................................................................44
Erase Data on the TeraStation Completely .......................................44
Disk Quotas ........................................................................................45
Quotas for Users ............................................................................................46
Quotas for Groups ........................................................................................46
Size Limits ......................................................................................................47
Using the TeraStation as an iSCSI Device .........................................50
Introduction ..................................................................................................50
Creating and Expanding Volumes ...............................................................53
Disconnecting Volumes ................................................................................54
Setting Access Restrictions ..........................................................................55
Hard Drive Replacement ...................................................................57
Hard Drive Replacement Examples .............................................................58