User manual
70
Clone a snapshot: This action allows you to clone a snapshot into a new volume or LUN.
To clone a snapshot, first select a snapshot, click "Clone", enter an alias for the new
volume, and select the folders to share after cloning. If the snapshot cloned is a LUN
snapshot, you can map it to an iSCSI target.
Set up snapshot schedules: Click "Schedule", select "Enable schedule", specify the time,
frequency, and retention period. The system will take the chosen volume’s snapshot by
schedule. For Smart Snapshot, the system will only take a new snapshot if there are new
changes made in the selected volume.
Snapshot Global Settings
Click "Global Settings" in the top-right of the Snapshot Manager window, and there is one
global setting:
Make snapshot directory (@Recently-Snapshot) visible: Mount a snapshot volume as a
directory of a shared folder and set the snapshot volumes to be read-only in File Station.
The snapshot directory will appear as "@Snapshot".
Click "Global Settings" in the top-right of the Storage Manager window, and there is one
global setting:
When reaching snapshot limitation: Choose the policy to handle snapshots when the
snapshot limitation is reached. There are two choices.
o
Overwrite the oldest snapshot: When the number of snapshots reaches the limitation
(256 per LUN, 1024 total) the oldest snapshot will be deleted in order to continue
taking new snapshots for data protection.
o
Stop making snapshot: When the number of snapshots reaches the limitation (256 per
LUN, 1024 total), no more new and scheduled snapshots will be taken until older
snapshot are deleted. This option will prevent the deletion of older snapshots without
administrators’ consent.
Note:
The "When reaching snapshot limitation" setting uses the number of snapshots, not
the space used for snapshots. For more details, please refer to the Setting Snapshot
Reservation section.
Encryption
The disk volumes on the NAS can be encrypted with 256-bit AES encryption to protect
against data breaches. Encrypted disk volumes can only be mounted for normal read/write
access with an authorized password. The encryption feature protects confidential data from
unauthorized access even if the hard drives or the entire NAS were stolen.










