Steps to Extract Data from a RAID Disk if NAS Asustor LOCKERSTOR 2 Gen2 Does Not Power On

Has your NAS Asustor LOCKERSTOR 2 Gen2 suddenly lost its network drive and you’re unsure what to do next? Did the RAID array collapse, making your files inaccessible? Is the device throwing errors during startup? Perhaps you accidentally rebuilt the RAID array or several hard drives failed at the same time?

Steps to Extract Data from a RAID Disk if NAS Asustor LOCKERSTOR 2 Gen2 Does Not Power On

Asustor LOCKERSTOR 2 Gen2 NAS Data Recovery in 2025

In this step-by-step tutorial, we’ll show you how to rebuild your RAID and recover data from an LOCKERSTOR 2 Gen2. We’ll walk through the most common causes of failure and demonstrate proven methods to restore files from a lost or degraded RAID array.

Steps to Extract Data from a RAID Disk if NAS Asustor LOCKERSTOR 2 Gen2 Does Not Power On

RAID Recovery™ 2.8
Recover data from damaged RAID arrays inaccessible from a computer.
Download

Why Regular Data Recovery Tools Can’t Restore Files from RAID

Conventional hard drives store user data by writing it sequentially across the disk surface, which means an entire file is typically located on a single drive. In contrast, when data is written to a RAID array, each file is split into multiple fragments. These fragments are then distributed and written in sequence across all the drives in the array. Depending on the configuration, fragment sizes can range from 2 KB to 2 MB, so every file is physically stored across several disks at once.

This approach significantly increases read and write performance — after all, writing two halves of a 1 GB file to two drives simultaneously is much faster than writing the full 1 GB to a single disk. However, this same mechanism makes file recovery far more complex.

Different RAID levels use different methods to distribute and protect data. On top of that, manufacturers like Asustor often add their own proprietary structures and variations. As a result, data can be written to disks in many different formats, and each requires a specific approach during recovery.

How can storage tiering or caching strategies impact data availability and potential loss on NAS Asustor LOCKERSTOR 2 Gen2 devices?

Storage tiering and caching strategies can have a significant impact on data availability and potential loss on NAS Asustor LOCKERSTOR 2 Gen2 devices. Here's how:

  1. Increased Data Availability: Storage tiering and caching strategies can improve data availability by ensuring that frequently accessed or critical data is stored on faster storage tiers or cache. This allows for quicker access to data, reducing latency and improving overall system performance. By prioritizing data based on its importance and access patterns, the chances of data being available when needed are significantly increased.
  2. Reduced Potential Data Loss: By implementing storage tiering and caching strategies, the risk of data loss can be minimized. These strategies often involve redundancy mechanisms such as data mirroring or RAID configurations. In case of a drive failure, the redundant copies of data can be used to rebuild the lost data, ensuring that no data is permanently lost. Additionally, caching strategies can also help mitigate potential data loss by temporarily storing frequently accessed data in cache, reducing the reliance on slower storage devices.
  3. Improved Disaster Recovery: Storage tiering and caching strategies can also play a crucial role in disaster recovery scenarios. By having multiple tiers of storage with different levels of redundancy, data can be protected against various types of disasters, including drive failures, natural disasters, or even human errors. The ability to quickly recover data from redundant copies or cache can significantly reduce the recovery time and minimize the impact of a disaster on data availability.
  4. Performance Optimization: Storage tiering and caching strategies can optimize the performance of NAS devices like Asustor LOCKERSTOR 2 Gen2. By leveraging faster storage tiers or cache, frequently accessed data can be delivered more quickly, improving overall system performance. This can be particularly beneficial in scenarios where multiple users are accessing the NAS simultaneously or when dealing with resource-intensive applications.

However, it's important to note that the effectiveness of storage tiering and caching strategies depends on factors such as the workload, data access patterns, and the specific implementation. It's recommended to carefully plan and configure these strategies based on the specific requirements and characteristics of the data being stored on the NAS device.

How to Remove Hard Disks from Your NAS and Connect Them to a PC

Although the NAS LOCKERSTOR 2 Gen2 can be accessed over the network, you still need to remove its hard disks and connect them directly to a Windows PC. Only then can the recovery software properly scan and analyze the drives. Follow these steps:

  1. Power off the NAS and disconnect it from the power source.

    WARNING! Before removing any drives, carefully read the device manual. Improper actions may damage both the NAS enclosure and the hard disks in the RAID array.

  2. Remove the hard disks one by one, gently sliding each drive out of its slot. Remember that hard disks are highly sensitive: any impact or drop can cause serious physical damage.

  3. Label each hard disk according to its position inside the NAS. The order of the drives is crucial for correct RAID reconstruction.

  4. Connect the drives to your computer. In this video, we explain which ports you can use to connect hard disks and what to do if your PC does not have enough free connectors.

    Go to view
    How to Order Remote Data Recovery

    How to Order Remote Data Recovery

Step-by-Step Data Recovery with Hetman RAID Recovery

Hetman Raid Recovery

This program restores data from damaged RAID arrays and is fully compatible with Asustor LOCKERSTOR 2 Gen2. Each hard disk in the array contains technical metadata describing how files were written. When launched, Hetman RAID Recovery analyzes this metadata, automatically reconstructs the damaged array, and provides access to its contents. After that, you can browse the recovered disk and save your files. The program can also restore files that were accidentally deleted from the network drive.

Go to view
How to recover data from a Asustor

How to recover data from a Asustor

LOCKERSTOR 2 Gen2 has 2 HDD slots, and it supports the following array types:

  • RAID 0;
  • RAID 1;
  • JBOD;

NAS supports:

  • Ext2;
  • Ext3;
  • Ext4;

How to Safely Recover Data from Disk Images

This utility allows you to create a complete copy of a disk and work with the disk image instead of the physical drive. This approach helps protect your data from:

  • Overwriting during the recovery process;
  • Additional data loss caused by bad sectors;
  • User errors.

To create a disk image, follow these steps:

  1. Ensure you have enough free space to store the image. Its size will typically match the size of the original disk.

  2. In the main window, select the target disk and choose Tools - Save Disk. You can also select multiple disks if needed.

  3. When the Image Creation Wizard opens, select whether you want to save the entire disk or only a specific region. Adjust the settings and click Next.

    Hetman RAID Recovery: Image Creation Wizard
  4. Choose the directory where the image will be saved. You may select any available disk connected to your PC or upload the image via FTP.

    Hetman RAID Recovery: Choose a disk or save the image via FTP

Where Are the User’s Files Actually Stored?

The Asustor LOCKERSTOR 2 Gen2 network-attached storage keeps OS Linux operating system files on a separate RAID 1 (mirrored) array. Usually, all NAS systems create several volumes on every hard disk, and the first of them takes up to 2 Gb of space. This is where operating system files are stored. Other volumes are united into a RAID array where user’s data is written.

RAID Recovery Software: Detailed Comparison

Product Operating system RAID controller support Supported file systems Virtual RAID controller support Data recovery from damaged RAID File preview
Hetman RAID Recovery Windows, Linux, MacOS Yes, over 100 controllers FAT, exFAT, NTFS, ReFS, APFS, HFS+, Ext4, Ext3, Ext2, ReiserFS, Btrfs, VMFS, Hikvision, XFS, UFS, ZFS Yes Yes Yes
DiskInternals RAID Recovery Windows Yes, over 10 controllers FAT, NTFS, Ext2/3/4, HFS+ No Yes Yes
R-Studio Windows, Mac, Linux Yes, over 20 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
UFS Explorer RAID Recovery Windows, Mac, Linux Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
EaseUS Data Recovery Windows Yes, over 20 controllers FAT, NTFS, Ext2/3/4, HFS+ No Yes Yes
ReclaiMe Free RAID Recovery Windows Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes

Feedback

We will be happy to answer your questions!

Comments (3)

  • Hetman Software: Data Recovery
    Hetman Software: Data Recovery 9.08.2022 12:31 #
    If you want to ask a question about data recovery, from NAS LOCKERSTOR 2 Gen2, feel free to leave a comment!
  • Monty Blackett-Ord
    Monty Blackett-Ord 11.09.2023 20:53 #
    Is it possible to recover data from a NAS Asustor LOCKERSTOR 2 Gen2 device that has been affected by a hardware malfunction or component failure?
    • Hetman Software
      Hetman Software 11.09.2023 21:00 #

      Yes, it is possible to recover data from a NAS Asustor LOCKERSTOR 2 Gen2 device that has been affected by a hardware malfunction or component failure. However, the success of data recovery depends on the extent of the damage and the specific circumstances of the failure.

      In case of a hardware malfunction or component failure, it is recommended to contact a professional data recovery service with experience in NAS devices. They have specialized tools and expertise to recover data from faulty NAS devices.

      The data recovery process typically involves repairing or replacing the faulty hardware component, extracting the data from the storage drives, and then transferring it to a new storage medium. It is important to note that data recovery from a faulty NAS device can be a complex and time-consuming process, and there is no guarantee of 100% success.

Post comment
User
Your email address will not be published. Required fields are marked *

Vladimir Artiukh

Author: Vladimir Artiukh, Technical Writer

Vladimir Artiukh is a technical writer for Hetman Software, as well as the voice and face of their English-speaking YouTube channel, Hetman Software: Data Recovery for Windows. He handles tutorials, how-tos, and detailed reviews on how the company’s tools work with all kinds of data storage devices.

Oleg Afonin

Editor: Oleg Afonin, Technical Writer

Oleg Afonin is an expert in mobile forensics, data recovery and computer systems. He often attends large data security conferences, and writes several blogs for such resources as xaker.ru, Elcomsoft and Habr. In addition to his online activities, Oleg’s articles are also published in professional magazines. Also, Oleg Afonin is the co-author of a well-known book, Mobile Forensics - Advanced Investigative Strategies.

Share

Questions and answers

  • The additional hard drive compatible with the Asustor LOCKERSTOR 2 Gen2 NAS system should have the following key features and specifications:

    1. Form Factor: The additional hard drive should be a 3.5-inch SATA hard drive, as the LOCKERSTOR 2 Gen2 NAS system supports this form factor.
    2. Capacity: The LOCKERSTOR 2 Gen2 NAS system supports various hard drive capacities, so the additional hard drive can be chosen based on the desired storage capacity. It is recommended to choose a hard drive with a capacity that meets your storage needs.
    3. Interface: The hard drive should have a SATA interface, as it is compatible with the LOCKERSTOR 2 Gen2 NAS system.
    4. RPM: The rotational speed of the hard drive, measured in revolutions per minute (RPM), can vary. Higher RPM generally indicates faster data transfer speeds. It is recommended to choose a hard drive with a higher RPM for better performance.
    5. Cache: The cache size of the hard drive can affect its performance. Larger cache sizes generally result in faster data access. It is advisable to choose a hard drive with a larger cache size for improved performance.
    6. NAS Compatibility: Ensure that the additional hard drive is specifically designed for NAS systems and is compatible with the Asustor LOCKERSTOR 2 Gen2 NAS system. This ensures optimal performance and reliability in a network storage environment.

    It is always recommended to refer to the manufacturer's specifications and compatibility list for the Asustor LOCKERSTOR 2 Gen2 NAS system to ensure compatibility and optimal performance with the additional hard drive.

  • How does the process of adding an additional hard drive to the Asustor LOCKERSTOR 2 Gen2 NAS system work, and what are the necessary steps to ensure proper installation and configuration?

    The Asustor LOCKERSTOR 2 Gen2 NAS device offers the following file access levels:

    1. Administrator: The highest level of access with full control over the NAS device, including file management, user management, and system settings.
    2. User: Standard user level access with the ability to read, write, and manage their own files and folders.
    3. Group: Users can be assigned to specific groups, which grants them access to shared files and folders within that group.
    4. Guest: Limited access for guests or anonymous users, usually with read-only permissions to specific files or folders.
    5. Public: Files and folders with public access can be accessed by anyone on the network, without the need for authentication.
    6. Private: Files and folders with private access can only be accessed by authorized users with proper credentials.

    These access levels can be customized and configured by the administrator according to the specific requirements and security policies of the NAS device.

  • How can I configure file access levels on the Asustor LOCKERSTOR 2 Gen2 NAS?

    To configure file access levels on the Asustor LOCKERSTOR 2 Gen2 NAS, you can follow these steps:

    1. Log in to the Asustor NAS web interface using your admin credentials. Open a web browser and enter the IP address of your NAS.
    2. Once logged in, go to the "Access Control" section. It is usually located under the "Settings" or "Control Panel" menu.
    3. In the "Access Control" section, you will find options to manage user accounts, groups, and shared folders. Click on "User" or "User Management" to create or modify user accounts.
    4. Create a new user account or select an existing user account to modify its access levels. Specify the username, password, and other details as required.
    5. After creating or selecting a user account, you can assign access rights to shared folders. Go to the "Shared Folders" or "Shared Folder Permissions" section.
    6. In the shared folder permissions, select the folder you want to modify access levels for. Click on the "Edit" or "Permissions" button.
    7. In the permissions settings, you can assign read, write, or execute permissions to the user account or group. You can also set permissions for other users or groups if required.
    8. Save the changes and repeat the process for other user accounts or shared folders as needed.

    Note: The exact steps and options may vary slightly depending on the firmware version of your Asustor NAS. It is recommended to refer to the user manual or documentation provided by Asustor for detailed instructions specific to your device.

  • What are the security implications and best practices for setting file access levels on the Asustor LOCKERSTOR 2 Gen2 NAS?

    Setting file access levels on the Asustor LOCKERSTOR 2 Gen2 NAS is crucial for maintaining data security. Here are some security implications and best practices to consider:

    Security Implications:

    1. Unauthorized Access: Incorrect access levels can allow unauthorized users to access sensitive files, leading to data breaches or unauthorized modifications.
    2. Data Loss: Inadequate access controls can result in accidental or intentional deletion or modification of critical files, leading to data loss.
    3. Malware Attacks: Insufficient access levels can make the NAS vulnerable to malware attacks, as attackers may gain access and infect the system or spread malware to other devices.
    4. Privilege Escalation: Misconfigured access levels may allow users to escalate their privileges, granting them unauthorized administrative access to the NAS.

    Best Practices:

    1. Principle of Least Privilege: Assign access levels based on the principle of least privilege, granting users only the permissions necessary to perform their tasks. Regularly review and update access levels as required.
    2. User Authentication: Implement strong user authentication mechanisms, such as complex passwords, two-factor authentication, or biometric authentication, to ensure only authorized users can access the NAS.
    3. Role-Based Access Control (RBAC): Utilize RBAC to assign access levels based on user roles and responsibilities. This simplifies access management and reduces the risk of granting unnecessary privileges.
    4. Regular Updates: Keep the NAS firmware and security patches up to date to address any known vulnerabilities and ensure the system is protected against emerging threats.
    5. Network Segmentation: Place the NAS on a separate network segment or VLAN to isolate it from other devices and minimize the risk of lateral movement in case of a security breach.
    6. Regular Backups: Create regular backups of critical files stored on the NAS and store them separately. This helps mitigate the impact of data loss or ransomware attacks.
    7. Encryption: Enable encryption for sensitive files and data stored on the NAS. This ensures that even if unauthorized access occurs, the data remains unreadable.
    8. Audit Logs: Enable and regularly review audit logs to monitor access attempts, identify suspicious activities, and detect any potential security breaches.
    9. Training and Awareness: Educate users about the importance of file access security, password hygiene, and safe browsing practices to minimize the risk of social engineering attacks or unintentional security breaches.

    By following these best practices, you can enhance the security of your Asustor LOCKERSTOR 2 Gen2 NAS and protect your data from potential threats.