Depending on the bonding mode selected, it can also increase bandwidth. See Manually Configuring Network Settings for information on bonding mode options and how to change the bonding mode. A VLAN Virtual Local Area Network is a network of devices that are joined into one broadcast domain, even if the devices are not physically connected to each other.
VLANs are useful for creating smaller networks within a larger LAN; for example, a legal department in a company might be on its own VLAN because it has sensitive documents that only certain personnel should have access to. The smaller networks that VLANs create do not require any additional physical resources, such as additional cabling.
Refer to Network Settings on page 6 for information about jumbo frames. Click Apply to save your changes. You can provide a meaningful name for your ixd using the Device Identification page. Change any of these by editing the text fields. Use a name that will help you identify it on your network.
This name can provide additional detail that identifies the device. If you leave this field blank, the default device name is used. The workgroup name identifies a group of computers that share information with each other. Change the workgroup name only if you explicitly define a workgroup on your network. Most users won't need to change the workgroup name, unless they have explicitly defined a different workgroup on their other computers.
Refer to Configuring Your ixd for Active Directory. If you have an existing Active Directory user organization, you can incorporate it into the ixd Management Console.
Your ixd can work in a high availability environment, which means it can work with multiple AD servers should one server fail or go offline. When you configure Active Directory, you enable security on your ixd. On the Network page, uncheck Automatically configure all network settings, type the IP address of your DNS Server in the text box, and click Apply to save your settings.
Configure the ixd to join the Active Directory domain. On the Device Identification page, select Active Directory if you already have an existing AD user organization that you want to incorporate into the ixd. Provide the following connectivity information:. For example, if you Domain Name is testdomain. You can edit this name or leave it blank. Choices for both encryption types are Not required and Always encryption is always enforced.
Always encrypting communication is safest, but can impact performance. By enabling Active Directory trusted domains on your ixd, you enable the importing of users and groups from other trusted domains to your ixd device.
Those users and groups from other domains will then have access to features on your ixd, including accessing folders and documents in Shares, and joining any Personal Cloud of which the device is a member. Now that you have enabled access to all trusted domains, you can add users and groups from those trusted domains to your ixd.
Using FS, an admin can enable the display of certain features and disable others. In addition, an admin can provide non-administrator users access to certain features by setting permissions for those users. Access permission to a feature can be given only to non-administrator users, since admin users always have access to all features.
Setting access permissions for non-admin users requires that security is enabled on your ixd Network Storage and an administrator user is created. Open the Feature Selection page. All the features of your ixd display on the page with a status that indicates whether the feature is enabled or disabled.
To enable a feature, expand the desired feature name, and click the switch to On. To disable a feature, click the switch to Off.
You can set the display of applications on the Feature Selection page, provided an application has that capability. For more information on installing features, refer to the Application Manager. You can configure access permissions for non-administrator users with certain features. Expand the feature on the Feature Selection page to determine if it supports feature access permissions. If not already enabled, enable security on your ixd and create users and groups.
To enable access to an enabled feature, expand the desired feature name, and click Add access permissions. In the pop-up window, select one or more users to provide them access. If you have created groups, you can also limit access for them in this way.
The list of users with access is displayed under the feature. To remove user access, uncheck the access box next to the user, and click Apply to save your changes. You can enable access permissions for applications on the Feature Selection page, provided an application has that capability.
Non-administrator users can log in to a ixd with feature access enabled. When these non-admin users access a ixd, they first see the Login screen where they enter their login credentials. After logging in, the ixd Management Console displays with those features to which a non-admin user has access. You can configure your ixd to send email alerts when problems are detected.
This is done through the email notification feature. Email notification provides a destination for emails sent by the ixd when problems are detected. To provide a destination email address, enter the following information:. This email address provides a destination for messages sent by the ixd when problems are detected by the system. You can add multiple email addresses by separating them with commas, spaces or semicolons. Most users will not need to check this option.
If checked, enter the following additional information to identify your SMTP server:. It must match the password provided above. If your email application uses a SPAM blocker, it is recommended that you add a sender email address to your safe list.
If you do not define additional credentials, the default sender email is: sohostorage emc. The Event Log page displays only the most recent events logged to the ixd.
A complete event log, however, is available for download. Identifies that a change has been made to the state of your ixd device, usually by a user, such as attaching a peripheral.
Identifies that there is a problem with your ixd device that requires your attention, but your device will continue to operate normally for now. Identifies an urgent problem with your ixd device that may result in data loss and requires your immediate attention. You can sort the displayed list by Date, User, or Event by clicking the column headers.
Click Download to download a comma-separated event log file. A new page is opened with a link to the event log file. Click the event log file link to download or open the file. The System Status page displays space usage information and status information about your ixd Network Storage. It also provides a control panel that enables you to:. The Space Usage section graphically represents the amount of space used by Shares on the ixd.
The exact space used displays in a ToolTip when you mouse over each Share. To help identify a specific ixdwhen there is more than one device configured on your network, blink the lights on the front of the ixdby clicking:.
Before shutting down the ixd, be sure you have access to the physical device to turn it on. It is recommended that you always use the power button to shut down the device. The Device Information section displays various hardware, software, and status details.
The Status Information section displays changes to or issues with your ixd. If an issue requires user action to resolve, such as a warning or error message, the ixd Management Console displays a link in the status message. Identifies that a change has been made to the state of your ixd, usually by a. Identifies that there is a problem with your ixd that requires your attention, but.
Identifies an urgent problem with your ixd that may result in data loss and. You can set the date and time used on your ixd, so that it can appear to be in one time zone, when it actually may be in a different one. This can help your users have the correct date and time if they live and work in a location different from your ixd.
You can set the date, time, and time zone through the Date and Time feature. When an Active Directory Domain is in use, the storage device synchronizes time with the domain controller. To change time zones, select a Time Zone from the drop-down menu, and then select how time will be set for the ixd:. To specify a time server, select Specify the time server and type the URL of the internet time server you wish to use in the text box that displays.
To set the current date and time, click the appropriate icon for calendar and clock settings. The Languages page allows you to change the language used in email notification messages and on the display screen. The language used by the ixd Management Console is based on the preferences configured in your browser. You can change the language used in this program by modifying your browser's preferred language settings. Printing documents from your ixd Network Storage is simple after you have attached a compatible printer to the ixd.
The Printers page displays a table of printers that are attached to the ixd. The table contains for each printer the name, model, status, and number of documents waiting. Once attached, the printer will appear in the table.
When the cable is unplugged, the printer will be removed from the table. For best results, use a printer without multi-function features for example, scanner, copier, fax, modem. After you have configured some basic features of your ixd Network Storage, you may also want to set up a LenovoEMC Personal Cloud, security, or file sharing. You can set up a Personal Cloud to allow invited users access to content on your ixd.
This content can be in private Shares that are exclusive to the users who join the Personal Cloud, which adds an additional layer of security. In addition, you may want to join other trusted devices to the Personal Cloud, so that content on those devices can be made available to Personal Cloud users. For more information about Personal Cloud, refer to the Personal Cloud overview. You can enable security so you can secure Shares, create users, and allow selected features to be enabled.
With security enabled, you can create users and set access privileges for those users to limit data access on secured Shares. It is recommended to set up file sharing so that content can be added to your ixd, and that content can be made available in a wide variety of ways, including content features such as Active Folders and media sharing.
For more information, refer to the Sharing Overview. Your ixd Network Storage is set up for storing, retrieving, and accessing files among users, client computers, and applications. File sharing is accomplished by creating Shares; setting up security, which includes creating users; setting up media services; and configuring Active Folders. Optionally installed on your local computer, LenovoEMC Storage Manager discovers any LifeLine-based network storage devices on your subnet, maps device Shares to computers, and provides local access to your content.
It provides access to Shares through your computer's file management program, such as Windows Explorer or Mac Finder, allowing you to drag and drop many files between your computer and your ixd device. The Home page serves as a web-accessible interface to your ixd device. The Home page content is configured using the ixd Management Console.
The Home page displays any unsecured Shares. It can also display secured Shares accessible only to users who log in to the ixd device. You can access the Home page of your ixd device by entering the device. If security is enabled and you are an administrator user, you can access the ixd Management Console from the Home page by clicking. Shares are folders that contain all types of content, including documents, pictures, and music files.
Shares can be unsecured, which means that anyone who has access to your network can access the content in these Shares. Shares can also be secured, which means access to content in them is limited to select users and groups. All Shares on the ixd are displayed on the Shares page. The Shares page displays a table that contains folders, connected drives, and any cloud storage to which your ixd is connected. The Properties column displays the features that are enabled for each Share.
The Information section displays the Share name, graphically displays the space usage of the Share, and allows you to view the content using the web-based content viewer. To learn how to modify your Share information, refer to Managing Shares on next page. The Access Permissions section contains a list of users who currently have access to that Share. Access Permissions displays when the ixd is secured , otherwise the section is not shown.
If "Everyone" has access to a Share, it means content on the Share can be viewed by anyone with access to your network without needing to log into the ixd. Follow the link to the Active Folder options for information on configuring each:. From the ixd Management Console, click Shares. To add a new Share, click Add a Share. Type a name for the Share. All Shares must have a name. Names cannot exceed 32 characters. The following are not valid Share names: global, homes, printers.
Click Create. To modify an existing Share, click the Share row to expand the Share. You can change Share information, change access permissions, make a Share an Active Folder, use Share volumes, and modify a Share volume.
Modify the existing name for the Share. Choose whether to enable media sharing. When Media sharing is enabled, the media server scans this Share for any media content and makes it available to anyone with access to your network,. If you do not want media content made available to anyone, do not check this option. When Media sharing search is enabled, displays in the Properties for that Share. You should enable security on your ixd before changing access permissions.
Expand Access Permissions to change user permissions to a Share. If your ixd is not secured, all Shares that you create are unsecured, and anyone with access to your network has read and write permissions to a Share. If your ixd is secured, all existing administrator users have read and write permissions to a Share. New Shares created on a secured device will be.
A security icon displays in the Share's properties if that Share is secured. Check Allow users to change file level security to allow file and folder permissions to be set through other programs, such as Windows Explorer, independent of the ixd. Setting this option allows users to put additional access restrictions on individual files and folders. To limit access to this Share to a specific set of users, click Add access permissions and choose one or more users from the pop-up window.
In the Access Permissions section, check Read, Write, or both to set access to this Share for each user.
To remove a user, leave both Read and Write unchecked for that user. If you grant Read and Write permissions to Everyone, the list of users is also cleared since all users will have access to this Share. To enable NFS , first click the switch on from the Protocols page. You cannot apply a rule to an unsecured Share. Rules are added to specify the hosts that are allowed to access Shares using NFS.
Use this table to add NFS rules to specify access for hosts. When the rule is added, read access is automatically set to the Share. Select Write to allow users to write to that Share. Use and to modify the rule priority for NFS access. You can optionally enable Active Folders on a Share to allow you to associate this Share with a specific feature that will happen automatically when files are copied to the Share.
For example, you can enable a Share as a social media active folder to upload a file to a social media site. You can only set one Active Folder option per Share. Expand the Active Folder section and check Enable. Select one of the following Active Folder options and follow the link for details on configuring each:.
To delete an existing Share, click to expand the Share. In the Information section, click Delete to delete the Share. In the Delete Share confirmation pop-up window, click Yes.
If you do not wish to delete the Share, click Cancel to return to the Shares page. Your ixd Network Storage uses communication protocols to mount file systems and allow files to be transferred between client computers and the ixd. See Backing up Macs with Time Machine for detailed instructions.
AFP is on by default. If AFP has been disabled, click the switch on to re-enable it. Once a Bluetooth adapter is detected, files can be uploaded from a Bluetooth device to a configurable destination Share on the ixd.
To enable Bluetooth, click the switch on. Once Bluetooth Transfer is enabled, check the Enable security checkbox to require Bluetooth users to supply a unique PIN that they have defined before allowing them to transfer files to the destination Share on the ixd. If you have enabled security , you must define a unique PIN number, which will be supplied by devices attempting to upload data using Bluetooth.
To set the destination Share, click. To change any Bluetooth settings, click. You must enable security to apply SFTP. If you select and enable SFTP, you cannot have the secure rsync protocol enabled. This protocol allows remote hosts to mount file systems over a network and interact with them as though they were mounted locally to your ixd. Select an option to choose how users on client computers are mapped to the ixd:. All files are owned by user guest, and all users accessing the ixd have the same access rights.
If you have enabled Active Directory on your ixd, only this option is available for mapping client computers. If the ixd is using Active Directory mode, you see the following NFS version 4 security settings:. NFS provides another protocol for sharing storage data with Linux hosts. When NFS is enabled, you can configure rules for host-based access to secure Shares.
Rules can be added to secure Shares to specify the hosts that are allowed to access Shares using NFS. To change any NFS settings, click. When you access your ixd through NFS, the access permissions to content on the ixd are controlled by Host-Based Access Control rules on your client computer, not by user access permissions on your ixd.
This means that any valid user on the Linux computer who has access to the host the storage device can access Shares on the ixd, even if not given specific user permission to those Shares on the device. When you turn on this protocol, you can enable the ixd Network Storage as an rsync server. If you enable the ixd as an rsync server, you can optionally set up a user account on the ixd for secure rsync Copy Jobs. To enable rsync server, click the switch on. To create a secure user account, check Configure secure rsync credentials.
The username is preset as rsync. You can change this to a more meaningful user account name. Enter a password and confirm it for the rsync user account name. When you create a secure rsync user account on the ixd, you allow other devices to securely copy to or from it. By default, rsync uses TCP port for accepting requests. Remove guards only when necessary and replace them when the maintenance requiring their removal is complete.
Always use the greatest care when working near moving parts. Do not attempt to override the governor or idler by pushing on the throttle control rods while the engine is running. To prevent accidentally starting gasoline engines while turning the engine or welding generator during maintenance work, disconnect the spark plug wires, distributor cap or magneto wire as appropriate.
To avoid scalding, do not remove the radiator pressure cap when the engine is hot. Welding current creates EMF fields around welding cables and welding machines. EMF fields may interfere with some pacemakers, and welders having a pacemaker should consult their physician before welding.
Exposure to EMF fields in welding may have other health effects which are now not known. All welders should use the following procedures in order to minimize exposure to EMF fields from the welding circuit:.
Route the electrode and work cables together - Secure them with tape when possible. Do not place your body between the electrode and work cables.
If the electrode cable is on your right side, the work cable should also be on your right side. Connect the work cable to the workpiece as close as possible to the area being welded. Wear dry, hole-free. Insulate yourself from work and ground using dry insulation. Make certain the insulation is large enough to cover your full area of physical contact with work and ground. In addition to the normal safety precautions, if welding must be performed under electrically hazardous conditions in damp locations or while wearing wet clothing; on metal structures such as floors, gratings or scaffolds; when in cramped positions such as sitting, kneeling or lying, if there is a high risk of unavoidable or accidental contact with the workpiece or ground use the following equipment:.
Always be sure the work cable makes a good electrical connection with the metal being welded. The connection should be as close as possible to the area being welded. Maintain the electrode holder, work clamp, welding cable and welding machine in good, safe operating condition. Replace damaged insulation. When working above floor level, use a safety belt to protect yourself from a fall should you get a shock. Use a shield with the proper filter and cover plates to protect your eyes from sparks and the rays of the arc when welding or observing open arc welding.
I standards. Use suitable clothing made from durable flame-resistant material to protect your skin and that of your helpers from the arc rays. Avoid breathing these fumes and gases. When welding, keep your head out of the fume. When welding with electrodes which require special ventilation such as stainless or hard facing see instructions on container or MSDS or on lead or cadmium plated steel and other metals or coatings which produce highly toxic fumes, keep exposure as low as possible and below Threshold Limit Values TLV using local exhaust or mechanical ventilation.
In confined spaces or in some circumstances, outdoors, a respirator may be required. Additional precautions are also required when welding on galvanized steel.
Do not weld in locations near chlorinated hydrocarbon vapors coming from degreasing, cleaning or spraying operations. The heat and rays of the arc can react with solvent vapors to form phosgene, a highly toxic gas, and other irritating products. Shielding gases used for arc welding can displace air and cause injury or death. Always use enough ventilation, especially in confined areas, to insure breathing air is safe.
MSDS forms are available from your welding distributor or from the manufacturer. If this is not possible, cover them to prevent the welding sparks from starting a fire. Remember that welding sparks and hot. Avoid welding near hydraulic lines. Have a fire extinguisher readily available. Where compressed gases are to be used at the job site, special precautions should be used to prevent hazardous situations.
When not welding, make certain no part of the electrode circuit is touching the work or ground. Accidental contact can cause overheating and create a fire hazard. Do not heat, cut or weld tanks, drums or containers until the proper steps have been taken to insure that such procedures will not cause flammable or toxic vapors from substances inside. Vent hollow castings or containers before heating, cutting or welding. They may explode.
Sparks and spatter are thrown from the welding arc. Wear oil free protective garments such as leather gloves, heavy shirt, cuffless trousers, high shoes and a cap over your hair. Wear ear plugs when welding out of position or in confined places.
Connect the work cable to the work as close to the welding area as practical. Work cables connected to the building framework or other locations away from the welding area increase the possibility of the welding current passing through lifting chains, crane cables or other alternate circuits.
This can create fire hazards or overheat lifting chains or cables until they fail. All hoses, fittings, etc. Always keep cylinders in an upright position securely chained to an undercarriage or fixed support. Keep your head and face away from the cylinder valve outlet when opening the cylinder valve. Valve protection caps should always be in place and hand tight except when the cylinder is in use or connected for use.
Turn off input power using the disconnect switch at the fuse box before working on the equipment. Install equipment in accordance with the U. Ground the equipment in accordance with the U. Porter des gants secs et sans trous pour isoler les mains. Assurer une ventilation suffisante dans la zone de soudage.
We want you to take pride in operating this Lincoln Electric Company product. When this equipment is shipped, title passes to the purchaser upon receipt by the carrier. Consequently, Claims for material damaged in shipment must be made by the purchaser against the transportation company at the time the shipment is received. Please record your equipment identification information below for future reference. This information can be found on your machine nameplate.
Whenever you request replacement parts or information on this equipment, always supply the information you have recorded above. The code number is especially important when identifying the correct replacement parts. Please complete the form and submit your registration. Read this Operators Manual completely before attempting to use this equipment. Save this manual and keep it handy for quick reference. Pay particular attention to the safety instructions we have provided for your protection.
The level of seriousness to be applied to each is explained below:. This statement appears where the information must be followed exactly to avoid serious personal injury or loss of life.
This statement appears where the information must be followed to avoid minor personal injury or damage to this equipment. Technical Specifications General Description Design Features Pre-Operation Installation Safety Precautions Exhaust Spark Arrester Machine Grounding Lift Bail Polarity Control and Cable Sizes Pre-Operation Service Cooling System Engine Break-in, Battery Charging Engine Operation Starting The Perkins Engine Stopping the engine Welder Operation Duty Cycle Control of Welding Current Idler Operation Auxiliary Power Optional Features Field Installed General Instructions Commutator and Brushes Idler Maintenance Purging Air from Fuel System Engine Service Chart Welder Troubleshooting Electronic Idler Troubleshooting Guide Engine Troubleshooting Guide Wiring Diagram Classic D Connection Diagram Dimension Print Parts List With the addition of the optional.
The Wire Feed Module is factory installed on the K In the event of sudden low oil pressure or high coolant temperature, the engine immediately shuts down. The Classic D has a current range of DC amps with output ratings as follows:. The Classic D uses the Perkins industrial water-cooled diesel engine. Both the engine and the welder controls are located on one recessed panel at the exciter end of the machine.
The control panel also contains an engine temperature gauge, a battery charging ammeter, an oil pressure gauge, two three prong grounding type receptacles and four circuit breakers for auxiliary power. All Copper Windings - For long life and dependable operation. Engine Idler - The Classic D is equipped with an electronic automatic engine idler. It automatically increases and decreases engine speed when starting and stopping welding or using auxiliary power.
A built-in time delay permits changing electrodes before the engine slows to its low idle speed. Auxiliary Power - 3. The output terminals are placed at the side of the machines so that they are protected by the door. Cranking System - A 12 volt electric starter is standard. Muffler - A muffler and stainless steel exhaust outlet elbow are standard. Engine Hour Meter - A meter to record hours of operation.
Engine Protection - The system shuts the engine down in the event of sudden low oil pressure or high coolant temperature. A warning light on the control panel will indicate such a fault. To reset the engine for restarting, turn the ignition switch off then on. Some federal, state or local laws may require that engines be equipped with exhaust spark arresters when they are operated in certain locations where unarrested sparks may present a fire hazard.
The standard muffler included with this welder does not qualify as a spark arrester. When required by local regulations, a suitable spark arrester must be installed and properly maintained.
Code, the frame of this portable generator is not required to be grounded and is permitted to serve as the grounding means for cord connected equipment plugged into its receptacle.
Some state, local, or other codes or unusual operating circumstances may require the machine frame to be grounded. It is recommended that you determine the extent to which such requirements may apply to your particular situation and follow them explicitly.
A machine grounding stud marked with the symbol is provided on the welding generator frame foot.
0コメント