Instruction/ maintenance manual of the product NSA-2401 ZyXEL Communications
Go to page of 362
www .zyxel.com NSA-2401 Network S torage Appliance User ’ s Guide V ersion 1.10 3/2009 Edition 1 DEFAULT LOGIN LAN1 IP Address 192.168 .1.3 LAN2 IP Address 192.
.
About This User's Guide NSA-2401 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the W eb Configurator . Related Document ation • Quick Start Guide The Quick S tart Guide is designed to help yo u get up and running right away .
Document Conventions NSA-2401 User’s Guide 4 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User ’ s Guide.
Document Conventions NSA-2401 User’s Guide 5 Icons Used in Figures Figures in this User ’ s Guide may use the follo wing generic icons. The NSA icon is not an exact representation of your device.
Safety Warnings NSA-2401 User’s Guide 6 Safety Warnings 1 For your safety , be sure to read and follow all warni ng notices and instructions. • Do NOT use this product near water , for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids.
Safety Warnings NSA-2401 User’s Guide 7 Y our product is marked w ith this symbol, which is known as the WEEE mar k. WEEE stands for W aste Electronics and Electrical Equi pment. It means that used electrical and electronic products should not be mixed with general waste.
Safety Warnings NSA-2401 User’s Guide 8.
Contents Overview NSA-2401 User’s Guide 9 Contents Overview Introduction and T utorials .................................................................................. .................. .2 9 Getting to Know Y our NS A .............. ............
Contents Overview NSA-2401 User’s Guide 10.
Table of Contents NSA-2401 User’s Guide 11 Table of Contents About This User's Guide ........................................... ............................................................. .. 3 Document Conventions............................
Table of Contents NSA-2401 User’s Guide 12 2.6 Administration Screens .................... ... ............. ... .... ... ... ............. ... ... .... ... ............. ... ... ... ... . ... 47 2.6.1 Global Administration Ic ons ............. ....
Table of Contents NSA-2401 User’s Guide 13 Chapter 4 St atus Screen ............................................................ ..................................................... ...... 1 17 4.1 S tatus Screen ........ ... .... ... .............
Table of Contents NSA-2401 User’s Guide 14 7.1.1 What Y ou Can Do in the Network Screen s ............ ............. ................ ............. ........ 159 7.1.2 What Y ou Need to Know About the Network Screens .. ... ... ... .... ... ... ... .
Table of Contents NSA-2401 User’s Guide 15 9.5 Backup Software Screen .... ... .... ... ............. ... ... ... .... ... ... ............. ... ... .... ... ... ... ............. ... .... . 2 20 Chapter 10 Application Screens ......................
Table of Contents NSA-2401 User’s Guide 16 12.6 External USB Disks .......... ............. .......... ...... ............. ............. ................ ............. ......... .. 255 Chapter 13 Product Sp ecifications ............................
List of Figures NSA-2401 User’s Guide 17 List of Figures Figure 1 NSA Overview .. ................. ............. ................ ............. ............. ................ ............. .. ................. 31 Figure 2 NSA Front Panel LEDs .. ..
List of Figure s NSA-2401 User’s Guide 18 Figure 39 Displaying the NSA .. ............. ................ ................ ............. ................ ............. ......... .............. 67 Figure 40 Alternate Met hod for Displaying the NSA ...
List of Figures NSA-2401 User’s Guide 19 Figure 82 Protect > Backup > Add Job: S tep 2 . ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... ... .... 94 Figure 83 Protect > Backup > Add Job: S tep 3 .
List of Figure s NSA-2401 User’s Guide 20 Figure 125 S torage > Internal S torage > Dis k ... ................ ............. ............. ............. ................ ....... .... 1 28 Figure 126 S torage > Internal S torage > Dis k > S.
List of Figures NSA-2401 User’s Guide 21 Figure 168 Protect > Backup > Add: St ep 2 ...... ................ ............. ............. ............. ............. .......... .... 2 04 Figure 169 Protect > Backup > Add Job: Step 3 ......
List of Figure s NSA-2401 User’s Guide 22 Figure 21 1 Windows XP: St art Menu .................. ................ ............. ................ ............. ................ . ....... 2 76 Figure 212 Windows XP: Control Panel ................ ....
List of Figures NSA-2401 User’s Guide 23 Figure 254 Internet Explorer 7: Certificate I mport Wizard ..... ................. ............ ................. ............ ..... 3 02 Figure 255 Internet Explorer 7: Certificate I mport Wizard ..... .....
List of Figure s NSA-2401 User’s Guide 24.
List of Tables NSA-2401 User’s Guide 25 List of Tables T able 1 Dis k Drive LEDs ............. ................. ............ ................. ............. ................ ............. . .................. 32 T able 2 NS A LEDs .................
List of Tables NSA-2401 User’s Guide 26 T able 39 RAID 1 ...... ............. ............. ................ ............. ............. ................ ............. ....... ................... . 153 T able 40 RAID 10 .... ............. ..........
List of Tables NSA-2401 User’s Guide 27 T able 82 Protect > Restore: S tep 4 ...................... ... .... ............. ... ... ... .... ... ... ... ... .... ............. ... ... ...... ..... 2 15 T able 83 Protect > Snapshot > Snapshot Jobs Icons .
List of Tables NSA-2401 User’s Guide 28.
29 P ART I Introduction and Tu t o r i a l s Getting to Know Y our NSA (31) Introducing the W eb Configurator (35).
30.
NSA-2401 User’s Guide 31 C HAPTER 1 Getting to Know Your NSA 1.1 NSA-2401 Overview The NSA (Network Storage Appliance) allows secure storage and management of data on your network. W indows, Apple, or Linux user s can access data on it as if it was on their own computers.
Chapter 1 Getting to Know Your NSA NSA-2401 User’s Guide 32 1.1.1 Front Panel LEDs The front panel LEDs tell you impo rtant information about the NSA. Figure 2 NSA Front Panel LEDs The following table describes the disk drive LEDs. Refer to the Quick Start Guide to see how to install and remove hard drives from the disk trays.
Chapter 1 Getting to Know Your NSA NSA-2401 User’s Guide 33 1.1.2 Power Button Press the power button on the front panel to turn the NSA on and of f. • T o turn the NSA on: press the power button and release it. • T o turn the NSA off, press the power button in and hold it until yo u hear a beep.
Chapter 1 Getting to Know Your NSA NSA-2401 User’s Guide 34.
NSA-2401 User’s Guide 35 C HAPTER 2 Introducing the Web Configurator This chapter describes how to acce ss the NSA W e b Configurator and provides an ove rview of its screens. 2.1 W eb Configurator Overview The W eb Configurator is an HT ML-based manage ment interface that a llows easy NSA setup and management via Inte rnet browser .
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 36 Figure 3 NDU Main Screen From the NDU main page click the icon under Admin to see the W eb Configurat or sc reen login screen. 2.2.2 Web Browser Access Open your browser and type in the IP addr ess of the NSA.
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 37 Figure 5 NSA Login Screen Y ou should see a screen asking you to change your pas sword (highly recommended) as shown next. T ype a new password (and retype it to confirm) and click Apply or click Skip .
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 38 Figure 7 My NSA The icons and language labe l at the top-right of the screen are vi sible from most screens. Use the tabs at the top of the scr een to navigate betwee n the use r-level screens and menus.
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 39 The main My NSA screen displays the shares to which you have access. Figure 8 My NSA Screen The following table describes this screen. T able 4 My NSA Screen LABEL DESCRIPTION My Own Shares These are the shares that you own (a nd manage).
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 40 2.5.1 My NSA Share Browsing Screen Click My NSA and then click a share to open the followi ng screen. Use the My NSA share browsing screens to see and access share contents. • Click a folder ’ s name to go into the folder .
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 41 The following table describes the labels in this screen. Delete Select a folder(s) or file(s) and click this icon to remove the folder(s) or file(s).
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 42 2.5.2 My NSA Share Browsing Move to or Copy to Screen The administrator can select a folder or file in the My NSA sha re browsing sc reens and click the Move to button or the Co py to button to display a share browsing sc reen like the following.
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 43 The following table describes the icons in this screen. The following table describes the labels in the this screen. 2.5.4 My NSA Change Share Properties Screen Use the My NSA Change Share Pr operties screen to configure sh are management details.
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 44 Share Name Det ails Use any character except double quotes (“), single quotes (‘), slashes ( or /), square brackets ([ ]), co.
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 45 Figure 13 My NSA Change Share Properties > Share Access Configuration The following table describes the labels in this screen. 2.5.5 Share and Folder Names The name ca n only contain the followi ng characters: • Alphanumeric (A-z 0-9) and Unicode.
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 46 •. [ p e r i o d s ] • - [dashes] Other limitations include: • All leading and trailing spa ces are removed automatically . • Multiple spaces within names are converted to a single space.
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 47 The following table describes the labels in this screen. 2.6 Administration Screens The A dministration tab displays when you log i n as the administrator . Click Administration in the My NSA screens to open the advanc ed administration screens.
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 48 Figure 15 S tatus 2.6.1 Global Administration Icons The icons and language label at the top-right of the screen ( ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels.
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 49 2.6.2 Navigation Panel The navigation panel o n the left of the W eb Configurator screens ( ) contains screen links. Click a minus (-) link to hide a category’ s scr een links. Certain screen s also contain hyper links that allow you to jump to another screen.
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 50 The following table describes the navigation panel links. T able 14 Screens Summary CATEGORY SUB-LINK FUNCTION S tatus This screen shows system information, the status of the volumes, and the users wh o are currently using the NSA.
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 51 2.6.3 Main Window The W eb Configurator ’ s ma in win dow () shows the screen you select in the navigation panel. It is discussed in the rest of this document. The St a t u s screen is the first administration screen to dis play .
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 52 2.7 NSA RESET Button Use the RESET button on the front panel of th e NSA to reset either just the NSA’ s admin password and IP address settings or the whole fact ory default conf iguratio n file.
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 53 Figure 17 Reset and Reload T imeline " The NSA automatically restart s to co mplete reloading t he factory default configuration file.
Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 54.
NSA-2401 User’s Guide 55 C HAPTER 3 Tutorials 3.1 Overview These tutorials show you how to perform the followin g common tasks: • How to Configure Sharing : page 55 • How to Use Shares : page 61.
Chapter 3 Tutorials NSA-2401 User’s Guide 56 1 Log into the W eb Configurator using your administrator Use rname and Password . Figure 18 Administrator Login 2 In the My NSA screen, click Administration .
Chapter 3 Tutorials NSA-2401 User’s Guide 57 3 Once the W eb Configurator workspace appears, click Sharing > Users to open the user account manage ment area. Figure 20 Sharing > Users 4 Click Add Account to open the Create a New Acc o u n t screen.
Chapter 3 Tutorials NSA-2401 User’s Guide 58 • Enter an account name and password. • Set how many megabytes of sto rage the account can use in each of the NSA ’ s volumes. Y ou can set a different quota fo r each volume. A value of “0” MB means unlimited storage.
Chapter 3 Tutorials NSA-2401 User’s Guide 59 2 Specify a name for the gro up. Select Gonzo and click Add Selected User(s) to include Gonzo in the group. Click Apply . Figure 23 Sharing > Group s > Add Share 3.2.3 Setting Up Shares Y ou’ve crea ted accounts for Gonzo and Kermit and now you want to create a share for ea ch of them.
Chapter 3 Tutorials NSA-2401 User’s Guide 60 2 Specify a name for the share and select the volume it should be on. Select Kermit as the owner and set the Share Access to Advance d and click Edit . Figure 25 Sharing > Shares > Add Share 3 Include Senior -Management under Full and click Apply .
Chapter 3 Tutorials NSA-2401 User’s Guide 61 4 Back in the Edit Shares screen, click Apply . Figure 27 Sharing > Shares > Add Share Now that you have created Kermit’ s share, yo u can go through th e steps again to create another share for Gonzo.
Chapter 3 Tutorials NSA-2401 User’s Guide 62 3 Enter Gonzo’ s username and password and click OK . Figure 29 Entering the Share Usernam e and Password 4 Now Gonzo can use the share like a drive on his computer . Click File > New > Folder and create a folder named “Strategy”.
Chapter 3 Tutorials NSA-2401 User’s Guide 63 1 Open Firefox and enter http://192.168.1.35 to open the login scr een. Enter Gonzo’ s username and pas sword and clicks Login .
Chapter 3 Tutorials NSA-2401 User’s Guide 64 3 Open the St r a t e g y share. Figure 34 Gonzo Sha re Screen.
Chapter 3 Tutorials NSA-2401 User’s Guide 65 4 Click Upload . Figure 35 S trategy Folder Screen 5 Browse to the 2010-2014-Pl ans.doc file and click Apply . Figure 36 Upload Files Screen 3.4 How to Find the NSA in OS X Here’ s how to find the NSA-2401 OS X.
Chapter 3 Tutorials NSA-2401 User’s Guide 66 1 Click the Finder icon in the dock. Figure 37 Opening the Finder 2 Select All under Shared in the sidebar .
Chapter 3 Tutorials NSA-2401 User’s Guide 67 3 Click the triangle beside th e NS A’ s name to disp lay the shares that Gonzo can use. Figure 39 Displaying the NSA Alternatively , yo u can also conn ect directly to the NSA from the Go Menu in the Finder .
Chapter 3 Tutorials NSA-2401 User’s Guide 68 4 When the Connect to Server dialog box opens, type smb:// and the IP address of your NSA-2401 or click Browse to find it in your network. Click Connect . Figure 41 Connecting to the NSA 5 Once connected, you c an now access the NS A from the finder or directly from the desktop.
Chapter 3 Tutorials NSA-2401 User’s Guide 69 3.5.1.1 Customizing the NSA’ s Certificate 1 Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit . Figure 42 Maintenance > SSL 2 Next, let’ s modify the certificate by changing the Common Name to this NSA’ s IP address of 192.
Chapter 3 Tutorials NSA-2401 User’s Guide 70 3 The NSA restarts its network services and returns you to the login screen. Figure 44 Maintenance > SSL > Edit a Self-Signed Certificate.
Chapter 3 Tutorials NSA-2401 User’s Guide 71 3.5.1.2 Downloading and Inst alling the NSA’ s Customized Certificate 1 Log in and return to Maintenance > SSL . Under Modify the Existing Certificate , click Download . Figure 45 Maintenance > SSL 2 Save the file to your computer .
Chapter 3 Tutorials NSA-2401 User’s Guide 72 3 Find the certificate file on yo ur computer and double-click it. Figure 47 Downloading the NSA’s Certificate 4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in W indows.
Chapter 3 Tutorials NSA-2401 User’s Guide 73 5 In the Certificate Import Wizard , click Nex t . Figure 49 Certificate I mport Wizar d: Welcome 6 Leave Automatically select certificate store based on the type of certificate selected and click Next .
Chapter 3 Tutorials NSA-2401 User’s Guide 74 7 In the Completing the Ce rtificate Import W izard screen, click Finish . Figure 51 Certificate I mport Wizar d: Finish 8 If you are presented with anot her Security W arning , click Ye s .
Chapter 3 Tutorials NSA-2401 User’s Guide 75 3.5.1.3 T urn on the NSA’ s W eb Security Now that you have customized the NSA’ s certific ate and installed it in your computer , you can turn on security for your W eb Configurator sessions. This example uses Firefox 3.
Chapter 3 Tutorials NSA-2401 User’s Guide 76 2 A warning screen pops up if ap plying your change may disconnect some users. Click Apply to continue. Figure 55 Maintenance > SSL > Force HTTPS W a rning 3 The NSA logs you out and autom atically redirects your formerly non-s ecure (HTTP) connection to a secure (HTTPS) connection.
Chapter 3 Tutorials NSA-2401 User’s Guide 77 4 Click Add Exception . Figure 57 Firefox: Secure Connection Failed 5 Click Get Certificate . Figure 58 Firefox: Add Secu rity Exception.
Chapter 3 Tutorials NSA-2401 User’s Guide 78 6 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate.
Chapter 3 Tutorials NSA-2401 User’s Guide 79 7 The SHA1 fingerprint must match the NSA’ s certificate you downloaded from the NSA to your computer . (Double -click the NSA’ s ce rtificate file and then click Details and look at the Thumbprint ).
Chapter 3 Tutorials NSA-2401 User’s Guide 80 8 If the certificate fingerprints match, click Confirm Security Exception , otherwise click Cancel . Figure 61 Firefox: Add Secu rity Exception.
Chapter 3 Tutorials NSA-2401 User’s Guide 81 9 The login screen displays. Figure 62 HTTPS Login Now , anyone who connects to the NSA’ s W eb Configurator scr eens will automatically do so by HTTPs.
Chapter 3 Tutorials NSA-2401 User’s Guide 82 1 Open FileZilla and click File > Site Manager > New Site . • Configure the Host field with the NSA’ s address. • Set the Servertype to FTPES - FTP over explicit TLS/ SSL . • Configure the account name and password.
Chapter 3 Tutorials NSA-2401 User’s Guide 83 2 A security warning screen displays. The SHA1 fingerprint must match the NSA’ s certificate you downloaded from the NSA to your computer . (Double-click the NSA’ s certificate file and then click Details and look at the Thum bprint ).
Chapter 3 Tutorials NSA-2401 User’s Guide 84 2 Set the Share Access to Advanced and click Edit . Figure 66 Sharing > Shares > Edit Share 3 Move Senior -Management and Kermit to Read Only . Click Apply in this screen and again in the edit screen.
Chapter 3 Tutorials NSA-2401 User’s Guide 85 3.5.3.2 Setting the ACL to Deny Access to a File Now you need to stop Kermit from accessing the 2010-2014-Plans file. 1 Select the Gonzo share, and click ACL Pr operties . Figure 68 Sharing > Shares 2 Click New ACL .
Chapter 3 Tutorials NSA-2401 User’s Guide 86 3 Open the St r a t e g y folder . Figure 70 Sharing > Shares > ACL Configura tio n > New ACL 4 Select the 2010-2014-Plans.
Chapter 3 Tutorials NSA-2401 User’s Guide 87 5 Move Gonzo to Deny . Figure 72 Sharing > Shares > ACL Configuratio n > New ACL > Str ategy > Set ACL.
Chapter 3 Tutorials NSA-2401 User’s Guide 88 6 A Restricted File icon appears beside the 20 10-2014-Plans.doc file. Click Close . Figure 73 Sharing > Shares > ACL Configuratio n > New ACL > Str ategy 7 This screen lists the St r a t e g y share’ s ACLs.
Chapter 3 Tutorials NSA-2401 User’s Guide 89 3.6 Power Resume T o keep the NSA opera ting as mu ch of the time as possible, do the following to have the NSA automatically restart when the power comes back on after a power failure. Click Maintenance > Power Management .
Chapter 3 Tutorials NSA-2401 User’s Guide 90 3.7.1 Creating a Snap shot Job Here’ s an example of configurin g hour ly snapshots for a volume. 1 Click Pr otect > Snapshot > Add Job .
Chapter 3 Tutorials NSA-2401 User’s Guide 91 2 Enter a name for the job, select the volume of which to take snapsh ots, set the number of snapshot images to keep (2 in this example).
Chapter 3 Tutorials NSA-2401 User’s Guide 92 For example, Gonzo accide ntly overwrote his 2009-Plan .doc file. Use W indows Explorer to browse to the Gonzo sh are.
Chapter 3 Tutorials NSA-2401 User’s Guide 93 2 Name the backup job and select Synchronization . Gonzo wants only his current set of files in the remote NSA’ s folder , so you select Mirror to make the tar get folder identical to the source folder .
Chapter 3 Tutorials NSA-2401 User’s Guide 94 3 Select the folder that needs to be mirrored (the Gonzo share’ s S trategic-Pa rtners folder in this example) and Remote . • Enter the other NSA’ s addre ss and administrator password. • Click Show target content to display the remote NSA’ s contents.
Chapter 3 Tutorials NSA-2401 User’s Guide 95 4 Click OK in the warnin g dialog box. Figure 83 Protect > Backup > Add Job: S tep 3 5 For this example, as s um e the connection to the German branch of fice is a good one and not many files need to be backed up so leave the c ompression off.
Chapter 3 Tutorials NSA-2401 User’s Guide 96 6 Schedule the backup to occur ev ery morning at 3:00 and click Done . Figure 85 Protect > Backup > Add Job: S tep 4 Y ou do not need to use a special restore proc ess to use the files a synchronization backup creates.
Chapter 3 Tutorials NSA-2401 User’s Guide 97 2 Identify the backup job and select Archive . New files are often added to the shares tha t you need to back up and existing files are not frequently changed so select Incremental . The NSA does a full backup first and later only copies source files that are new and/or mo dified since the last backup.
Chapter 3 Tutorials NSA-2401 User’s Guide 98 3 Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’ s address, us ername, password, and share name. If you want to make sure the rem ote NSA is rea chable, click T est Connection .
Chapter 3 Tutorials NSA-2401 User’s Guide 99 4 In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the targ et NSA so you can leave the encryption off, too. Have the NSA keep 3 back ups. Figure 89 Protect > Backup > Add Job: S tep 3 5 Set the frequency to We e k l y .
Chapter 3 Tutorials NSA-2401 User’s Guide 100 1 Click Pr otect > Backup screen, select a bac kup job and click Restore Archive . Figure 91 Protect > Backup 2 Select which backup to use and click Next .
Chapter 3 Tutorials NSA-2401 User’s Guide 101 3 Select the Gonzo share and click Next . Figure 93 Protect > Backup > Restore Archive: S tep 2 4 Select the original location and click Done .
Chapter 3 Tutorials NSA-2401 User’s Guide 102 5 The NSA restores the files into the Gonzo share. When it finishes you can access the files. Figure 95 Protect > Backup > Restore Archive: Progress 3.
Chapter 3 Tutorials NSA-2401 User’s Guide 103 2 Select the backup job and backup time and click Next . Figure 97 Protect > Restore: S tep 2 3 Select everything in the Gonzo sh are except the recycle folder .
Chapter 3 Tutorials NSA-2401 User’s Guide 104 4 Specify where you want to put the files. Browse to “/Gonzo”. Click Done . Figure 99 Protect > Restore: S tep 4 The NSA restores the files and you can use them again. 3.8 Printer Server T utorial Do the following to configure the NSA to allow computers on your network to share a printer .
Chapter 3 Tutorials NSA-2401 User’s Guide 105 3 T urn on the printer . The NSA detects it after a few moments. 4 On your computer , open your CIFS file sharing program (Win dows Explorer for example) and browse to the NSA. Double-click the printer ’ s icon.
Chapter 3 Tutorials NSA-2401 User’s Guide 106 Figure 104 Applications > Print Server After the driver installation finish es, the computer is ready to use the printer .
Chapter 3 Tutorials NSA-2401 User’s Guide 107 3.9.1 Connecting External USB Hard Drives The easiest way to increase the NSA’ s storage ca pacity is to connect an external USB hard drive. External USB hard drives are great fo r providing storage ca pacity for scheduled backups and snapshots of internal volumes.
Chapter 3 Tutorials NSA-2401 User’s Guide 108 " If the new hard drives have any data you want to keep, back it up to another location before you install them. A dding these hard drives to a disk array formats them so all dat a st ored on them will be lost.
Chapter 3 Tutorials NSA-2401 User’s Guide 109 4 Select RAID5 Reshape and click Apply . Figure 1 10 S torage > Internal S torage > RAID > Add Disk 5 After the NSA finishes adding the disk to the array , click the Disk tab. The new disk displays the same Ty p e and RAID Array as the other disks in the array .
Chapter 3 Tutorials NSA-2401 User’s Guide 11 0 1 Click the Vo l u m e tab. Select a volume and click Edit . Figure 1 12 S torage > Internal S torage > V olume 2 Increase the size and click Apply . Figure 1 13 S torage > Internal S torage > V olume > Edit 3 Repeat these steps for other volumes that need more storage capacity .
Chapter 3 Tutorials NSA-2401 User’s Guide 111 1 Click S torage > Internal S torage > Disk to list the installed disks. Select a disk to replace first (disk 1 in this example) and click Eject . Figure 1 14 S torage > Internal S torage > Disk 2 Click Apply .
Chapter 3 Tutorials NSA-2401 User’s Guide 11 2 5 Open the administration screens. In the St a t u s screen the RAID array shows up as degraded. Figure 1 17 S tatus: RAID Degrad ed 6 Install the new hard drive. In this example it’ s in disk drive bay 2.
Chapter 3 Tutorials NSA-2401 User’s Guide 11 3 9 The RAID’ s status displays as Recovering . Figure 120 S torage > Int ernal S tor age > RAID After the recovery finishes and the status shows up as Healthy , reboot the NSA.
Chapter 3 Tutorials NSA-2401 User’s Guide 11 4.
11 5 P ART II W eb Configurator St atus Screen (1 17) System Setting Screen (121) Storage Screens (125) Network Screens (159) Sharing Screens (173) Protect Screens (197) Application Screens (223) Main.
11 6.
NSA-2401 User’s Guide 11 7 C HAPTER 4 Status Screen 4.1 St atus Screen The St a t u s screen is the first screen you see after you l og into the W eb Configurator (and complete the wizard for the first time). It provid es an overview of your NSA ’ s status, settings and activity .
Chapter 4 Status Screen NSA-2401 User’s Guide 11 8 The following table describes the icons in this screen. The following table describes the labels in this screen. T able 16 Status Icons ICON DESCRIPTION Refresh Click this icon to refresh the data for the field or value with which it is associated.
Chapter 4 Status Screen NSA-2401 User’s Guide 11 9 CPU T e mperature This displays the current temperature near the NSA ’s CPU. The NSA generates an emergency log if the temperature goe s ou t of the normal operating range. If the temperature goes even higher , th e NSA shuts down automatically to avoid damag e from overheating.
Chapter 4 Status Screen NSA-2401 User’s Guide 120 External V olume This displays the volumes created on USB hard drives connected to the NSA. USB ports are numbered in the order that you connect USB devices. S tatus This shows whether the external (USB) volume is Healthy , Locked , Unlocked, or Down .
NSA-2401 User’s Guide 121 C HAPTER 5 System Setting Screen 5.1 Date/T ime Use the NSA System Setting > Date/Time screen to set up the time on your NSA. T o open this screen, click System Setting > Date/T ime in the navigation bar of the W eb Configurator .
Chapter 5 S ystem Setting Screen NSA-2401 User’s Guide 122 5.1.1 T i m e Lag T ime lag occurs when the time on the NSA falls behind the time on the time server . This may happen if: New T ime (hh:mm:ss) This field displays the last upda ted time from the time server or the last time configured manually .
Chapter 5 System Setting Screen NSA-2401 User’s Guide 123 • The time server is no longer reachable. • The NSA is shut do wn often. The NSA intern al battery keeps time when the NSA is shut down and this may cause possible variance. • A power surge occurs.
Chapter 5 S ystem Setting Screen NSA-2401 User’s Guide 124.
NSA-2401 User’s Guide 125 C HAPTER 6 Storage Screens 6.1 St orage Screens Overview Use the storage screens to work with disks, RAIDs, and volumes to manage the NSA’ s storage. 6.1.1 What Y ou Can Do in the S torage Screen s •U s e t h e Internal S torage screens ( Section 6.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 126 Encrypted V olumes When you create a volume you can encrypt it us ing either a manually entered password or a USB key . Others cannot read the data even if they take the physi cal drive. Encrypting a volume does not af fect how the volume’ s user s use it.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 127 6.2 Internal St orage St atus Screen Click S torage > Internal S torage > S tatus to display the following screen. This screen displays general information about the disks in stalled in the NSA and th e dis k array s and volumes created on them.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 128 6.3 Disk Y ou can view information on the NS A internal disks in this screen. Disk Replacement Restrictions See the Quick S tart Guide for information on replacing disks in the NSA.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 129 The following table describes the icons in this screen. The following table describes the labels in this screen. 6.3.2 S.M.A.R.T Screen Click S torage > Internal S torage > Disk to display the disk summary screen.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 130 Figure 126 S torage > Int ernal S tor age > Dis k > S.M.A.R.T . (Brief Summary) The following table describes this screen. T able 22 S torag e > Internal S torage > Disk > S.M.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 131 6.3.2.1 S.M.A.R.T Full Summary Set the Device Info Format field to Full Summary to display advanced details about the drive and its status. Click a column’ s heading cell to sort the table entries by that column’ s criteria.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 132 6.4 Arrays RAID (Redundant Array of Independent Disks) or JBOD is the storage method that the NSA uses. The storage method you use depend s on how many disks you have and how many volumes you want to create.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 133 For example if you originally have two disks co nfigured in a RAID 1 array , and you then b uy two more disks and want to config u re all four at.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 134 Three Disks Choose a combination of JBOD and/or RAID 0 or RAID 1 for the reasons already outlined. W ith three disks you could create: • up to three JBOD arrays • one RAID 1 array with a hot-spare.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 135 • Down when an array is down and cannot be fixe d. The array cannot be used and the data is lost. Replace the faulty disk(s) and recreate the array , volumes, and sharing confi guration. If an array is down, users can no longer transfer files to/from the array’ s shares.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 136 The following table describes the icons in this screen. T able 25 S torag e > Inter nal S torag e > RAID Ic ons ICON DESCRIPTION Wizards Click this icon to open the Disk Setup Wizard to create a new disk array or volume.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 137 Resync Speed When a disk array is resynchronizing, you can select it and click this icon to set how fast the NSA resynchronizes the disk array . A screen displays. Select the how fast the NSA should re-synchronize the array .
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 138 The following table describes the labels in this screen. 6.5.1 Creating a New RAID Click the Create icon in the RAID screen as shown in Figure 128 on page 135 to create a new RAID array .
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 139 The following table describes this screen. 6.6 Internal V olume Screen Click S torage > Internal S torage > V olume to display the internal volume summary screen as shown. Use this screen to mana ge the NSA’ s internal volumes.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 140 Figure 130 S torage > I nternal S tor age > V olum e The following table describes the icons in this screen. T able 28 S torag e > Inter nal S torag e > V olume Icons ICON DESCRIPTION Wizards Click this icon to open the Disk Setup Wizard to create a new disk array or volume.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 141 The following table describes the labels in this screen. Lock If an encrypted volume is unlocked, you can select it and c lick this icon to lock it. No one will be able to use the volume until an admi nistrato r unlocks it.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 142 6.6.1 Creating or Edit ing an Internal V olume Click S torage > Internal S torage > V olume > Cr eate to display the internal volume creation screen as shown next. Y ou can also sel ect an existing internal volume and click the Edit icon.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 143 6.6.2 USB Key Creation When you cre ate a volume encrypted by a USB key , click the Create USB Drive butt on to open a series of screens for creating a volu me encryption password and storing it on a connected USB device.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 144 Figure 132 Selecting the USB Device The following table describes this screen. 6.6.2.2 Creating a Duplicate USB Ke y (Strongly Recommended) Use these screens to create extra copies of yo ur USB key in case one is lost, damage d, or stolen.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 145 Figure 134 Creating a Duplicate USB Key: Eject 3 Insert a different USB key and click Next . Figure 135 Creating a Duplicate USB Key: Insert Afte.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 146 The following table describes the icons in this screen. The following table describes the labels in this screen. T able 32 S torag e > External S torage > Disk Icons ICON DESCRIPTION Eject Select a USB-connected device and click thi s icon to be able to remove the device.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 147 6.8 External V olume Screen Click S torage > External S torage > V olume to display the exte rnal (USB-connected) volume summa ry screen as sho wn next. Use this screen to manage the NSA’ s external storage volumes.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 148 The following table describes the labels in this screen. Lock If an encrypted volume is unlocked, you can select it and c lick this icon to lock it. No one will be able to use the volume until an admi nistrato r unlocks it.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 149 6.8.1 Creating or Editing an External V olume " Creating a volume on a US B device formats it. All dat a on the USB device is lost. Click S torage > External S torage > V olume > Create to display the external (USB- connected) volume creation screen as shown next .
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 150 File System Select the file syst em you want the new volume to use. If you plan to also use the USB device wi th another com puter, it is recomme nded that you select the file system that the other computer uses.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 151 6.9 T echnical Reference This section contains background on JBOD an d the RAID levels used on the NSAand lists some common S.M.A.R.T . attributes. 6.9.1 Storage T ermin olog y These are some terms that you need to know in order to understand storage systems.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 152 lost. Parity protection is used with striping, and the “n” pieces of data are typically the blocks or bytes distributed across the drives in the array .
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 153 6.9.3 RAID 0 RAID 0 spreads data even ly across two or more disks (data striping) with no mirroring nor parity for data redundancy , so if on e disk fail s the entire array will be lost. The major benefit of RAID 0 is performance.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 154 RAID 1 capacity is limited to the size of the sm allest disk in the RAID array . For example, if you have two disks of sizes 1 50 GB and 200 GB respectively in one RA ID 1 array , then the maximum capacity is 150 GB and th e remaining space (50 GB) is unused.
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 155 6.9.6 RAID 5 RAID 5 provides the best balance of capac ity and performance while providing data redundancy . It provides redund ancy by striping data across three disks and keep s the parity information (AP) on the fourth disk (in each st ripe).
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 156 6.9.8 RAID and Dat a Protection If a hard disk fails and you’re us ing a RAID 1, RAID 10, or RAID 5 array then your data will still be available (but at degraded speeds until you replace the hard disk that failed and re- synchronize the array).
Chapter 6 Storage Scr eens NSA-2401 User’s Guide 157 12 Device Power Cycle Count This is the number of times the ha rd drive has gone throu gh a full power on and power off. 13 Soft Read Error Rate Low This is the number of uncorrected read errors the hard drive has reported.
Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 158 207 S pin High Current This is the quantity of high cu rrent used to spin up the drive. 208 S pin Buzz This is the number of buzz routines to sp in up the drive. Whe n the arm holding the rea d/write heads is stuck, the motor driving it tries to oscillate the arm to free it.
NSA-2401 User’s Guide 159 C HAPTER 7 Network Screens This chapter discusses the network scree ns. 7.1 Network Screens Overview Use the network screens to conf igure the NSA’ s network settings so computers can access it. 7.1.1 What Y o u Can Do in the Network Screens • Use the TCP/IP screen ( Section 7.
Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 160 DHCP DHCP (Dynamic Host Configuration Protocol , RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP config uration at start-up from a server . Y ou can configure the NSA as a DHCP client which means it is set to receive an IP address from a DHCP serve r .
Chapter 7 Network Screens NSA-2401 User’s Guide 161 Figure 140 Fault T olerance T eaming Mode Load Balancing : This distributes the traf fic load across LAN1 and LAN2 . LAN1 and LAN2 are on the same subnet with the same IP address. It also includes backup functionality (fault tolerance).
Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 162 " If you enable jumbo frames on the NSA in a net work that does not support them, you will lose access to the NSA. If this occu rs, you will have to restore the factory default conf iguration.
Chapter 7 Network Screens NSA-2401 User’s Guide 163 Figure 144 Network > TCP/IP The following table describes the labels in this screen. T able 43 Network > TCP/IP LABEL DESCRIPTION T e aming Mode Select how to use the NSA’s two Gigabit Ethernet interfaces.
Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 164 7.3 Windows/CIFS Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup or domain. " CIFS is always enabled on the NSA.
Chapter 7 Network Screens NSA-2401 User’s Guide 165 " The NSA automatically restar t s its network services af ter you apply changes in the TCP/IP or Windows/CIFS screens. Workgroup Security Mode A workgroup is a group of computers on a network that can share files.
Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 166 Figure 145 Active Directory Example Application 7.3.1 Windows/CIFS Screen Click Network > W indows/CIFS to display this screen.
Chapter 7 Network Screens NSA-2401 User’s Guide 167 Figure 147 Network > Windows/CIFS (Doma in) The following table describes the labels in these screens. T able 44 Network > Windows/CIFS LABEL DESCRIPTION Server I dentifi cation Server Name Enter a name to identify your NSA on the network in th is field.
Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 168 7.4 NFS Screen Click Network > N FS to display the NFS screen. Configur e this screen to let computers use NFS to access the NSA. Figure 148 Network > NFS The following table describes the icons in this screen.
Chapter 7 Network Screens NSA-2401 User’s Guide 169 The following table describes the labels in this screen. 7.4.1 Add or Edit NFS Share Screen Click Network > NFS > Add NFS Sh are (or Edit NFS Shar e ) to display the screen where you can configure a share for systems to use NFS to access.
Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 170 The following table describes the labels in this screen. Share Name Det ails Use any character except double quotes (“), single quotes (‘),.
Chapter 7 Network Screens NSA-2401 User’s Guide 171 The following table describes the labels in this screen. T able 48 Network > NFS > NFS S ession LABEL DESCRIPTION T ype This shows that this is an NFS connection to the NSA. NFS Share Path This displays the complete location of the NFS shar e in the NSA.
Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 172.
NSA-2401 User’s Guide 173 C HAPTER 8 Sharing Screens 8.1 Overview Use the NSA ’ s Sharing screens to manage user accounts , groups of users, and shares. 8.1.1 What Y ou Can Do In The Sharing Screens • Create and manage user accounts. See Section 8.
Chapter 8 Sharing Screens NSA-2401 User’s Guide 174 Share A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the W indows concept of a shared folder . Y ou must have an internal v olu me b efore you can create shares.
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 175 Conflicting Share Access and ACL Settings If the share’ s access permissions and the access pe rmissions defined in the ACL dif fe r , the NSA applies whichever is more restrictive.
Chapter 8 Sharing Screens NSA-2401 User’s Guide 176 The following table describes the labels in this screen. Edit User Select a user account from the list, then click this icon to edit their account name, group membership , password, and volume quota.
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 177 8.2.0.1 Conflict Users A conflict user is a local user that has the sa me user name as that of a user on a domain controller .
Chapter 8 Sharing Screens NSA-2401 User’s Guide 178 8.2.1 Create a New Account & C hange Accoun t Properties T o create an account, click Sharing > Users > Add User . T o edit an existing local user account, click Sharing > Users > Edit User .
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 179 8.2.1.1 Account Names Enter an account name from 1 to 14 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characte rs are not allow ed as the first character .
Chapter 8 Sharing Screens NSA-2401 User’s Guide 180 •a d m i n 8.2.1.2 Account Password Management Non-admin users ma y ch ange their passwords th ems elves by logging into the NSA W eb Configurator using the username and password as defined in the Create New Account screen.
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 181 " Non-admin user accounts cannot access the administrator W eb Configurator screens and cannot browse s hares assigned to other users. 8.2.2 V iew User Information T o view a user account’ s information, select it from the Sharing > U sers list and then click User Info .
Chapter 8 Sharing Screens NSA-2401 User’s Guide 182 8.3 Group s Click Sharing > Gr oups to open this screen whe re you can create and manage groups. A group is a collection of user accounts. Figure 156 Sharing > Grou ps The following table describes the icons in this screen.
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 183 The following table describes the labels in this screen. Delete Selected Group s Select a group from the list, then click this icon to remove it. Y ou ca n only delete local user g roups, not domain groups.
Chapter 8 Sharing Screens NSA-2401 User’s Guide 184 8.3.1 Add a New Local Group & Cha n ge Group Properties T o create a local group, click Sharing > Groups > Add Gr oup . T o edit an existing local group, click Sharing > Groups > Edit Group .
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 185 8.3.1.1 Group Names Enter a group name fro m 1 to 16 characters. Th e first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characte rs are not allowed a s the first character .
Chapter 8 Sharing Screens NSA-2401 User’s Guide 186 8.4 Shares Click Sharing > Shar e s to open this scre en where you can create and manage shares.
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 187 The following table describes the labels in this screen. Delete Share Select a share from the list, then click this icon to remove it. DFS Click this icon to open the DFS Links scre en. See Secti on 8.
Chapter 8 Sharing Screens NSA-2401 User’s Guide 188 8.4.1 Create a New Share & Edit a Share T o create a local group, click Sharing > Shares > Add Shar e . T o edit an existing local group, click Sharing > Share s > Edit Share . The share creation and share editing scr eens are identical in appearance.
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 189 8.4.1.1 Share Access Con figuration This screen allows you to assign permissions to a share. Figure 160 Sharing > Shares > Create a New Share > Share Access Configuration The following table describes the labels in this screen.
Chapter 8 Sharing Screens NSA-2401 User’s Guide 190 8.4.2 ACL Configuration Click Sharing > Shar e s , select a share , and clic k ACL Properties screen to open the Access Control List (ACL) screen. Use this screen to display and configure ACL settings .
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 191 The following table describes the labels in this screen. 8.4.2.1 New ACL Configuration This screen allows you to create a new ACL configuration. Figure 162 Sharing > Shares > ACL Configuration > Ne w ACL Configuration The following table describes the icons in this screen.
Chapter 8 Sharing Screens NSA-2401 User’s Guide 192 The following table describes the labels in this screen. 8.4.2.2 ACL Permissions Use this screen to set who can access the selected folder or file.
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 193 The following table describes the labels in this screen. 8.4.2.3 EVER YONE & ANONYMOUS Share Access Rights W ith an EVER YONE access right, you still need to log in. Every local user with an account on the NSA can access this share using their u sername and password.
Chapter 8 Sharing Screens NSA-2401 User’s Guide 194 8.4.3 Recycle Bin Click Sharing > Shar es > Recycle Bin to open the following screen . Use this screen to set up how the share recycle bin is managed. Figure 164 Sharing > Shares > Configuration The following table describes the labels in this screen.
Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 195 The following table describes the labels in this screen. T able 66 Sharing > Shares > DF S LABEL DESCRIPTION Link Name Enter a name for the new DFS link. The text may consist of letters, numerals and any printable character found on a typical English langua ge keyboard.
Chapter 8 Sharing Screens NSA-2401 User’s Guide 196.
NSA-2401 User’s Guide 197 C HAPTER 9 Protect Screens 9.1 Protection Methods Overview This chapter introduces d ifferent ways of protecting data on the NSA and explains how to u se the Pr otect screens to cre ate and schedule snapshots and backups. There are a variety of ways to protect your data on the NSA.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 198 9.1.1 What Y ou Can Do in the Protect Screens •U s e t h e Backup screens ( Section 9.2 on page 20 0 ) to back up data and restore ba ckup files by archive backup jo b. • Use the Rest ore screens ( Section 9.
Chapter 9 Protect Screens NSA-2401 User’s Guide 199 T o use a snapshot to restore files, use the MyNSA screens, CIFS (W indows Explorer), or FTP to browse to the snapshot imag e folder . The snapshot folder c ontains images name d after the folders and files in the volume at the time of t he backup.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 200 Finding Out More See Chapter 6 on pa ge 125 for more information on RAID. See Section 3.7 on page 8 9 for backup and snapshot tutorials.
Chapter 9 Protect Screens NSA-2401 User’s Guide 201 Figure 166 Protect > Backup The following table describes the icons in this screen. T able 68 Protect > Backup Ic ons ICON DESCRIPTION Add Job Click this icon to create a new backup job (se e also Section 9.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 202 The following table describes the labels in this screen. 9.2.2 Creating a Backup Job In the Protect > Backup screen, click the Add Job icon to create a new back up job.
Chapter 9 Protect Screens NSA-2401 User’s Guide 203 The following table describes the labels in this screen. T able 70 Protect > Backup > Add Job: S tep 1 LABEL DESCRIPTION Job Name This is a required field that uniq uely identifies the backup.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 204 9.2.2.1 Creating a Backup Job: S tep 2 Figure 168 Protect > Backup > Add: S tep 2.
Chapter 9 Protect Screens NSA-2401 User’s Guide 205 The following table describes the labels in this screen. T able 71 Protect > Backup > Add Job: S tep 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 206 9.2.2.2 Creating a Backup Job: S tep 3 Figure 169 Protect > Backup > Add Job: S tep 3 The following table describes the labels in this screen.
Chapter 9 Protect Screens NSA-2401 User’s Guide 207 9.2.2.3 Creating a Backup Job: S tep 4 Figure 170 Protect > Backu p > Add Job: S tep 4 The following table describes the labels in this screen. Purge Poli cy Select a pol icy for deleting archive backups.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 208 9.2.3 Editing a Backup Job In the Pr otect > Backup screen, selec t a backup job an d click the Edit Job icon to chan ge its settings. Figure 171 Protect > Backup > Edit Job: S tep 1 The following table describes the labels in this screen.
Chapter 9 Protect Screens NSA-2401 User’s Guide 209 9.2.3.1 Editing a Backup Job: S tep 2 Figure 172 Protect > Backup > Edit Job: S tep 2 The following table describes the labels in this screen.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 210 Figure 173 Protect > Backup > Restor e Archive: S tep 1 The following table describes the labels in this screen. T able 76 Protect > Backup > Restore Archive: S tep 1 LABEL DESCRIPTION Job Name This is the name that identifies the backup job.
Chapter 9 Protect Screens NSA-2401 User’s Guide 21 1 9.2.4.1 Restoring a Backup: S tep 2 Figure 174 Protect > Backup > Restor e Archive: S tep 2 The following table describes the labels in this screen.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 212 The following table describes the labels in this screen. 9.3 Restoring by Backup Files Click Pr otect > Restore to open the Restore scree ns.
Chapter 9 Protect Screens NSA-2401 User’s Guide 213 9.3.1 Protect > Restore: St ep 2 Figure 177 Protect > Resto re: S tep 2 The following table describes the labels in this screen. T able 80 Protect > Restore: S tep 2 LABEL DESCRIPTION Select Restor e Point Select to which backup job and backu p time you want to return .
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 214 9.3.2 Protect > Restore: St ep 3 Figure 178 Protect > Resto re: S tep 3 The following table describes the labels in this screen. T able 81 Protect > Restore: S tep 3 LABEL DESCRIPTION Folder Chooser Select the folders you want to restore.
Chapter 9 Protect Screens NSA-2401 User’s Guide 215 9.3.3 Protect > Restore: St ep 4 Figure 179 Protect > Resto re: S tep 4 The following table describes the labels in this screen. 9.4 Snap shot s Import ant Notes on Snap shots 1 Snapshots can only be taken on internal volumes.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 216 " The snapshot capture fails if deleting all previous snaps hots does not leave enough space for the new snap shot. T o ta ke the snapshot, make more free space on the disk array by recreating a volume with a smaller capacity or upgrading the disk array to a larger storage capacity .
Chapter 9 Protect Screens NSA-2401 User’s Guide 217 The following table describes the icons in this screen. T able 83 Protect > Snapsho t > Snapshot Jobs Icons ICON DESCRIPTION Add Job Click this icon to create a new snapshot job (see also Section 9.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 218 The following table describes the labels in this screen. 9.4.1 Creating/Editing Snap shots In the Protect > Snapshot screen, click the Cr eate Job icon to open the following screen. Use this screen to create a new snapshot job.
Chapter 9 Protect Screens NSA-2401 User’s Guide 219 The following table describes the labels in this screen. 9.4.2 Snap shot Images Click Pr otect > Snapshot > Snapshot Images tab to open the fo llowing screen. Click a column’ s heading cell to sort the table entries by that column’ s criteria.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 220 The following table describes the icons in this screen. The following table describes the labels in this screen. 9.5 Backup Sof tware Screen Click Pr otect > Backup Software to open the Backup Softwar e screen.
Chapter 9 Protect Screens NSA-2401 User’s Guide 221 Figure 183 Protect > Backup Software.
Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 222.
NSA-2401 User’s Guide 223 C HAPTER 10 Application Screens 10.1 Overview This chapter introduces the NSA Application screens. 10.1.1 What Y ou Can Do In The Application Screens • Configure settings for FTP file transfers to/from the NSA. See Section 10.
Chapter 10 App licat ion Scre en s NSA-2401 User’s Guide 224 Print Server A print server is a device or software that pr ovides users on a network with shared access to one or more printers. The print server acts as a buf fer, holding the informat ion to be printed out until the printer becomes free.
Chapter 10 Application Screens NSA-2401 User’s Guide 225 Figure 185 Applications > FTP The following table describes the labels in this screen. T able 88 Applications > FTP LABEL DESCRIPTION Enable FTP Select this to allow users to connect to the NSA via FTP .
Chapter 10 App licat ion Scre en s NSA-2401 User’s Guide 226 10.3 Print Server Click Applications > Pri nt Server to open this screen. Use this screen to view and manage the NSA’ s list of printers and print jobs. Figure 186 Applications > Print Server The following table describes the labels in this screen.
Chapter 10 Application Screens NSA-2401 User’s Guide 227 The following table describes the labels in this screen. 10.4 Copy Button Click Applications > Copy Button to open this screen. Use the COPY button on the front panel of the NSA to copy files between a USB fl ash drive or externally connected hard disk and a share in the NSA.
Chapter 10 App licat ion Scre en s NSA-2401 User’s Guide 228 Figure 189 Applications > Copy Button > Edit The following table describes the icons in this screen.
NSA-2401 User’s Guide 229 C HAPTER 11 Maintenance Screens 1 1.1 Overview This chapter introduces the NSA Maintenance screens. 1 1.1.1 What Y ou Can Do In The Maintenance Screens • V iew the NSA system logs. See Section 11.2 on page 230 for details.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 230 Finding Out More See Section 3.5 on page 6 8 for tutorials on configuring security . See Section 3.6 on page 8 9 for a tutorial on power resume. 1 1.2 Log Click Maintenance > Log to open a screen that displays all NSA activity logs.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 231 The following table describes the labels in this screen. 1 1.2.0.1 Log Classes The NSA keep s detailed records of all activity that occurs on it . These records, or logs, are organized according to “class”.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 232 1 1.2.1 Search Click the Maintenance > Log > Search icon to display the search filters. Figure 193 Maintenance > Log > Search Filters The following table describes the labels in this screen.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 233 The following table describes the labels in this screen. 1 1.2.3 Log Buzzer Priority Configuration Click Maintenance > Log > Log Config > Buzzer Priority to open a screen where you can configure the audible buzzer ’ s settings.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 234 Figure 196 Maintenance > Log > Log Report Configuration > Mail Setting The following table describes the labels in this screen. 1 1.2.4.2 Report Setting This screen lets you configur e which types of lo gs are e-mailed during alerts and reports.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 235 Figure 197 Maintenance > Log > Log Report Configuration > Repo rt Setting The following table describes the labels in this screen.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 236 1 1.2.4.3 Syslog Server Setting This screen lets you set up the NSA to upload log files to a syslog server . Figure 198 Maintenance > L o g > Log Report Configuration > Syslog Server Setting The following table describes the labels in this screen.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 237 1 1.3 Configuration Click Maintenance > Configuration to open a screen where you can backup and restore the NSA configuration settings or restore th e device to its factory default settings.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 238 1 1.3.1 Restoring the Configuration File When restoring a previously saved configuration file, you are presented with a warning screen if any users are connected. Figure 200 Maintenance > Configur ation > Restore The following table describes the labels in this screen.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 239 Figure 201 Maintenance > Configur ation > Restore > Restarting 1 1.4 SSL Click Maintenance > SSL to open this screen, where you ca n turn on HTTPS, create a pu blic key certificate, or upload a public key ce rt ific ate that was issued by a known certificate authority .
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 240 The following table describes the labels in this screen. 1 1.4.0.1 Editing a Self-Signed Certificate or Creating a Certificate Signi ng Reque.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 241 Figure 203 Maintenance > SSL > Edit a Self-Signed Certificate The following table describes the labels in this screen. 1 1.5 Firmware Upgrade Click Maintenance > FW Upgrade to open this screen, wh ere you can upgrade the NSA firmware.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 242 1 The SYS LED blinks orange w hen firmware is being up loaded to the NSA. Do not turn off or reset th e NSA while the firmware update is in progress! Figure 204 Maintenance > FW Upgrade The following table describes the labels in this screen.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 243 Figure 205 Maintenance > Power Ma nagement The following table describes the labels in this screen.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 244 1 1.6.1 Power Control Schedule Click Maintenance > Power Management > Edit to open this screen, where you can configure power control schedules to have the NS A turn on, turn off, or reboot at specified times.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 245 The following table describes the labels in this screen. 1 1.7 Shut down Click Maintenance > Shutdown to open the shutdown scree n.
Chapter 11 Maintenance Screens NSA-2401 User’s Guide 246 Figure 207 Maintenance > Shut down The following table describes the labels in this screen. When you cli ck the Restart button a pop-up screen app e ars asking you to confirm th e action. Click Apply to continue or Ca ncel to abort the process.
247 P ART III T roubleshooting and S pecifications T roubleshooting (249) Product Specification s (257).
248.
NSA-2401 User’s Guide 249 C HAPTER 12 Troubleshooting 12.1 T roubleshooting Overview This chapter offers some sugg estions to solve problems you might encounter .
Chapter 12 Tro u blesh oo tin g NSA-2401 User’s Guide 250 After replacing the disk, go to the S torage > Internal S torage > RAID screen. If the array’ s status is not Resynching , select the array and click the Repair icon. V The NSA SYS LED is orange or is flashing orange.
Chapter 12 Troubleshooting NSA-2401 User’s Guide 251 • Make sure the Ethernet cable is connected pr operly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it’ s connected directly to a computer , make sure that the computer network card is working (p ing 127.
Chapter 12 Tro u blesh oo tin g NSA-2401 User’s Guide 252 • Confirm that the computer running the NDU has a network connection. See the section on the NSA’ s LAN connection for related information. • The computer running the NDU can only discover NSAs in the same subnet.
Chapter 12 Troubleshooting NSA-2401 User’s Guide 253 12.4 Users Cannot Access the NSA V A local user cannot access a share • Check that the NSA is turne d on and connecte d to the network. The local us er should try to ping the NSA or u se the NDU to discover it.
Chapter 12 Tro u blesh oo tin g NSA-2401 User’s Guide 254 • Leave the domain and re-join it. V A domain user can’t access a share. In addition to the checks listed previously for lo cal users, check that th e domain controller is turned on and co nnected to the network.
Chapter 12 Troubleshooting NSA-2401 User’s Guide 255 Y ou may need to manually delete some prev ious snapshot s to make more space. If you still cannot take the snapshot yo u may need to recreate the volu me with a larger amount of space reserved for snapshots.
Chapter 12 Tro u blesh oo tin g NSA-2401 User’s Guide 256.
NSA-2401 User’s Guide 257 C HAPTER 13 Product Specifications See also the Getting to Know Y our NSA chapte r for a general overview of the key features. 13.1 Feature T ables These are the main external physical features. These are some of the main firmware features of the NSA.
Chapter 13 Product Specifications NSA-2401 User’s Guide 258 Disk Quota Use the disk quota feature to st op one user(s) from using up all disk capacity by setting a limit on how much storage space he/she may use. User Passwords Config ure a password for an individual Use r to restrict access to the NSA.
Chapter 13 Product Specifications NSA-2401 User’s Guide 259 13.2 S pecification T ables The NSA hardwa re sp e cif i cations are shown in the following table. UPS Integration Connect an APC Un interr uptible Power Supply (UPS) with a USB connection to the NSA.
Chapter 13 Product Specifications NSA-2401 User’s Guide 260 The NSA firmware specif ications are shown in the following table Reset Button Reset the NSA or restore the fact ory default configuration.
Chapter 13 Product Specifications NSA-2401 User’s Guide 261 13.3 Power Consumption The NSA-2400 was tested using the specified po wer sources with the external power adapter and with four hard drives installed. " This table is a laborato ry test of NSA-2400 power consumption for your reference only .
Chapter 13 Product Specifications NSA-2401 User’s Guide 262.
263 P ART IV Appendices and Index Log Messages (265) Setting Up Y our Computer ’ s IP Address (275) Importing Certificates (299) Open Source Licences (323) Legal Information (353) Index (355).
264.
NSA-2401 User’s Guide 265 A PPENDIX A Log Messages This appendix shows some NSA log messages. Log Messages T able 1 14 Log Messag e s FEATURE SEVERITY MESSAGE ARGUMENT(S) Action Log INFO [ClientIP][.
Appendix A Log Messa ge s NSA-2401 User’s Guide 266 CIFS - share NOTICE Purge all files in recycle-bin folder in share: {0}. Share Name CIFS - share INFO Expire recycle-bin finish for share {0}, pro.
Appendix A Log Messages NSA-2401 User’s Guide 267 Network NOTICE Network interface {0} link down NFS I N FO Enable NFS: SUCCESS NFS CRIT Enable NFS: F AILED NFS INFO Disable NFS: SUCCESS NFS CRIT Di.
Appendix A Log Messa ge s NSA-2401 User’s Guide 268 Snapshot INFO Expand Snapshot Image {0}(Increased Size={1}MB): SUCCESS Snapshot Image Name Size Snapshot CRIT Expand Snapshot Image {0}(Increased .
Appendix A Log Messages NSA-2401 User’s Guide 269 S torage - RAID CRIT S tart Rep airing De graded Raid: FA I L E D S torage - RAID CRIT Modify Rebuild Priority to high/ normal/low : F AILED S torag.
Appendix A Log Messa ge s NSA-2401 User’s Guide 270 S torage - Vo l u m e INFO Unlock Inte rnal V olume: SUCCESS S torage - Vo l u m e INFO Change Internal Crypto V olu me Password Prompt to [{0}]: .
Appendix A Log Messages NSA-2401 User’s Guide 271 S torage - Vo l u m e CRIT Create USB Key: F AILED S torage - Vo l u m e CRIT Duplicate USB Key: F AILED S torage - Vo l u m e CRIT Rename Internal .
Appendix A Log Messa ge s NSA-2401 User’s Guide 272 System EMERG T emperature exceeds the upper bound and may cause damage.System is going to shutdown. System INFO T emperature is back to normal. System EMERG Fan speed is too low and may cause damage System ERR Fan speed is lower than normal speed.
Appendix A Log Messages NSA-2401 User’s Guide 273 System - Ti m e INFO Daylight saving is disa bled System - Ti m e INFO Daylight saving is en abled Web INFO USER {0} ({1}) login WEB success User Na.
Appendix A Log Messa ge s NSA-2401 User’s Guide 274.
NSA-2401 User’s Guide 275 A PPENDIX B Setting Up Y our Computer ’ s IP Address " Y our specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 276 Windows XP/NT/2000 The following example uses the defa ult Wi ndows XP display theme b ut can also apply to W indows 2000 and W indows NT . 1 Click St a r t > Control Panel .
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 277 3 Right-click Local Area Connection and then select Properties . Figure 213 Windows XP: Control Panel > Network Conn ections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties .
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 278 5 The Internet Protocol TCP/IP Pr operties window o pens. Figure 215 Windows XP: Internet Protocol (TCP/IP) Propert ies 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically .
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 279 Windows V ist a This section shows screens from W indows V ista Professional. 1 Click St a r t > Control Panel . Figure 216 Windows V ista: S tart Menu 2 In the Control Panel , click the Network and Intern et icon.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 280 4 Click Manage network connections . Figure 219 Windows V ista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties .
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 281 6 Select Internet Protocol V ersion 4 (TCP/IPv4) and then select Properties .
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 282 7 The Internet Protocol V ersion 4 (TCP/IPv4) Properties window opens. Figure 222 Windows V ista: Internet Protocol V ersion 4 (TCP/IPv4) Prope rties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically .
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 283 Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences . Figure 223 Mac OS X 10.4: Apple Menu 2 In the System Prefer ences window , click the Network icon.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 284 3 When the Ne twork preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configur e.
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 285 5 For statically assigned settings, do the following: •F r o m t h e Configure IPv4 list, select Manually . •I n t h e IP Addr e ss field, type your IP address. •I n t h e Subnet Mask field, type your subnet mask.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 286 Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences . Figure 229 Mac OS X 10.5: Apple Menu 2 In System Prefer ences , click the Network icon.
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 287 3 When the Ne twork preferences pane opens, select Ethernet from the list of available connection types. Figure 231 Mac OS X 10.5: Network Preference s > Ethernet 4 From the Configure list, select Us ing DHCP for dynamically assigned settings.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 288 Figure 232 Mac OS X 10.5: Network Preference s > Ethernet 6 Click Apply and close the window .
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 289 Linux: Ubuntu 8 (GNOME) This section shows you how to co nfigure your computer ’ s TCP/IP settings in the GNU Object Model Environment (GNOME) us ing the Ubuntu 8 Linux distribution.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 290 3 In the Authenticate window , enter your admin acc ou nt name and pa ssword then click the Authenticate button.
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 291 5 The Pr operties dialog box opens. Figure 238 Ubuntu 8: Network Settings > Properties •I n t h e Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 292 V erifying Settings Check your TCP/IP properties by clicking System > Administration > Network T ools , and then selecting the appropriate Network device from the Devices tab.
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 293 Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’ s TCP/IP settings in the K Desktop Environment (KDE) using the op enSUSE 10.3 Linux distributio n.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 294 3 When the Y aST Control Center window opens, select Network Devices and then click the Network C ard icon.
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 295 5 When the Network Card Setup windo w op ens, click the Address tab Figure 245 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dy namic IP address.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 296 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server in formation in the fields provided. Figure 246 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 297 V erifying Settings Click the KNetwork Manager icon on the Ta s k b a r to check your TCP/IP properties. From the Options sub-menu, select Show Connecti on Information . Figure 247 openSUSE 10.
Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 298.
NSA-2401 User’s Guide 299 A PPENDIX C Importing Certificates This appendix shows you how to import pub lic key certificates into your web browser . Public key certificates are used by web browsers to ensure that a secure web site is legitimate.
Appendix C Importing Certificates NSA-2401 User’s Guide 300 Internet Explorer The following examp l e us es M icr osoft Intern et Explorer 7 on W indows XP Professional; however , they can also apply to In ternet Explorer on W indows V ista.
Appendix C Importing Certificates NSA-2401 User’s Guide 301 4 In the Certificate dialog box, click Install Certificate . Figure 252 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard , click Nex t .
Appendix C Importing Certificates NSA-2401 User’s Guide 302 6 If you want Internet Expl orer to Automatically select certificate store based on the type of certificate , click Next again and then go to step 9.
Appendix C Importing Certificates NSA-2401 User’s Guide 303 9 In the Completing the Ce rtificate Import W izard screen, click Finish . Figure 257 Internet Explorer 7: Certificate Import Wizar d 10 If you are presented with another Security W arning , click Ye s .
Appendix C Importing Certificates NSA-2401 User’s Guide 304 11 Finally , click OK when presented with the successf ul certificate installation message.
Appendix C Importing Certificates NSA-2401 User’s Guide 305 Inst allin g a St and-Alone Certific ate File in Internet Explorer Rather than browsing to a ZyXEL W eb Config urator and installing a public key certificate when prompted, you ca n install a stand-alone certificate file if one has been issued to you.
Appendix C Importing Certificates NSA-2401 User’s Guide 306 Removing a Certificate in Internet Explorer This section shows yo u how to remove a pub lic key certificate in Internet Explorer 7. 1 Open Internet Explorer and click To o l s > Internet Options .
Appendix C Importing Certificates NSA-2401 User’s Guide 307 3 In the Certificates dialog box, click the T rusted Root Certificates Authorities tab, select the certificate that you wa nt to delete, and then click Remove . Figure 265 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Ye s .
Appendix C Importing Certificates NSA-2401 User’s Guide 308 Firefox The following example uses Mo zilla Firefox 2 on W indows XP Professional; however , the screens can also apply to Firefox 2 on all platforms.
Appendix C Importing Certificates NSA-2401 User’s Guide 309 Inst allin g a St and-Alone Ce rtificate File in Firefox Rather than browsing to a ZyXEL W eb Config urator and installing a public key certificate when prompted, you ca n install a stand-alone certificate file if one has been issued to you.
Appendix C Importing Certificates NSA-2401 User’s Guide 310 3 In the Certificate Manager dialo g box, click W eb Sites > Import . Figure 272 Firefox 2: Certificate Manager 4 Use the Select File dialog box to locate the certificate and then click Open .
Appendix C Importing Certificates NSA-2401 User’s Guide 31 1 Removing a Certificate in Firefox This section shows yo u how to remove a public key certificate in Firefox 2. 1 Open Firefox and click T ools > Options . Figure 274 Firefox 2: T ools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates .
Appendix C Importing Certificates NSA-2401 User’s Guide 312 3 In the Certificate Manager dialog box, select the W eb Sites tab, select the certificate that you want to remove, and then click Delete . Figure 276 Firefox 2: Certificate Manager 4 In the Delete W eb Site Certificates dialog box, click OK .
Appendix C Importing Certificates NSA-2401 User’s Guide 313 Opera The following example uses Opera 9 on W indow s XP Professional; however , the sc reens ca n apply to Opera 9 on all platforms.
Appendix C Importing Certificates NSA-2401 User’s Guide 314 Inst allin g a St and-Alone Ce rtificate File in Opera Rather than browsing to a ZyXEL W eb Config urator and installing a public key certificate when prompted, you ca n install a stand-alone certificate file if one has been issued to you.
Appendix C Importing Certificates NSA-2401 User’s Guide 315 3 In the Certificates Manager , click Authorities > Import . Figure 282 Opera 9 : Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix C Importing Certificates NSA-2401 User’s Guide 316 5 In the Install authority certificate dialog box, click Instal l . Figure 284 Opera 9: Install authority certificate 6 Next, click OK .
Appendix C Importing Certificates NSA-2401 User’s Guide 317 Removing a Certificate in Opera This section shows yo u how to remove a public key certificate in Opera 9. 1 Open Opera and click To o l s > Pr eferences . Figure 286 Opera 9: T ools Menu 2 In Prefer ences , Advanced > Security > Manage certificates .
Appendix C Importing Certificates NSA-2401 User’s Guide 318 3 In the Certificates manager , select the Authorities tab, select the certificate that you want to remove, and then click Delete .
Appendix C Importing Certificates NSA-2401 User’s Guide 319 Konqueror The following examp le uses Konqueror 3.5 on openSUSE 10. 3, however the screens apply to Konqueror 3.
Appendix C Importing Certificates NSA-2401 User’s Guide 320 Inst alling a St and-Alone Ce rtificate File in Konqueror Rather than browsing to a ZyXEL W eb Config urator and installing a public key certificate when prompted, you ca n install a stand-alone certificate file if one has been issued to you.
Appendix C Importing Certificates NSA-2401 User’s Guide 321 Removing a Certificate in Konqueror This section shows yo u how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settin g s > Configure Konquer or . Figure 295 Konqueror 3.
Appendix C Importing Certificates NSA-2401 User’s Guide 322.
NSA-2401 User’s Guide 323 A PPENDIX D Open Source Licences Notice Information herein is subject to change withou t notice. Companies, name s, and data used in examples herein are fictitious unless otherwise noted.
Appendix D Open Source Licences NSA-2401 User’s Guide 324 “Derivative W orks” shall mean any work, whether in Source or Object form, that is based on (or derived from) the W ork and for which the edit orial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship .
Appendix D Open Source Licences NSA-2401 User’s Guide 325 distributed as part of the Derivative W orks; within the Source form or do cumentation, if provided along with the Derivative W orks; or , within a display genera ted by the Derivative W orks, if and wherever such third-party no tices n ormally appear .
Appendix D Open Source Licences NSA-2401 User’s Guide 326 Redistribution and use in source and binary fo rms, with or without modification, are permi tted provided that the following conditions are met: Redistributions of source co de must retain the above copyright notice, this li st of conditions and the following disclaimer .
Appendix D Open Source Licences NSA-2401 User’s Guide 327 The licenses for most software ar e de signed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your free dom to share and change free software--to make su re the software is free for all its users.
Appendix D Open Source Licences NSA-2401 User’s Guide 328 W e call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Pu blic License. It also provides other free software developers Less of an advant age over competing non-free programs.
Appendix D Open Source Licences NSA-2401 User’s Guide 329 1. Y ou may copy and distribute verbatim copies of the Library's comple te source code as you receive it, in any medium, provided that .
Appendix D Open Source Licences NSA-2401 User’s Guide 330 compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library , but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”.
Appendix D Open Source Licences NSA-2401 User’s Guide 331 required form of the “work that uses the Librar y” must include any data and utility programs needed for reproducing the executable from it.
Appendix D Open Source Licences NSA-2401 User’s Guide 332 contest validity of any such claims; this sec tion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
Appendix D Open Source Licences NSA-2401 User’s Guide 333 END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, auto fs, device-mapper , evms, exim. Lm_sensors, mdadm, pam_mount, raid tools, samba, sg_utils, smartmontool s, vsftpd, xfsprogs and Linux kernel software under GPL license.
Appendix D Open Source Licences NSA-2401 User’s Guide 334 0. This License ap plies to any program or othe r work which contains a notice pla ced by the copyright holder saying it may be distributed under the terms of this Ge neral Public License.
Appendix D Open Source Licences NSA-2401 User’s Guide 335 3. Y ou may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Se.
Appendix D Open Source Licences NSA-2401 User’s Guide 336 directly or indirectly through you, then the on ly way you could satisfy both it and this License would be to refrain entirely from di stribution of the Program.
Appendix D Open Source Licences NSA-2401 User’s Guide 337 INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DA T A OR DA T A BEING RENDERED INACCURA TE OR LOSSES SUST AINED BY YOU O.
Appendix D Open Source Licences NSA-2401 User’s Guide 338 Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays unde r a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit.
Appendix D Open Source Licences NSA-2401 User’s Guide 339 Original SSLeay License -------------------------------- Copyright (C) 1995-1998 Eric Y oung (e ay@cryptsoft.com) A ll ri ghts reserved. This package is an SSL implementation written by Eric Y oung (eay@cryptsoft.
Appendix D Open Source Licences NSA-2401 User’s Guide 340 This Product include mod _ ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California.
Appendix D Open Source Licences NSA-2401 User’s Guide 341 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number .
Appendix D Open Source Licences NSA-2401 User’s Guide 342 1.2. “Contributor V ersion” means the combina tion of the Original Code, prior Modifications used by a Contributor , and th e Modifications made by that pa rticular Contributor .
Appendix D Open Source Licences NSA-2401 User’s Guide 343 The Initial Developer hereby grants Y ou a wo rld-wide, royalty-free, non-exclusive license, subject to third party intellectual property cl.
Appendix D Open Source Licences NSA-2401 User’s Guide 344 Any Modification which Y ou create or to which Y ou contribute must be made available in Source Code form under the terms of this Licen se e.
Appendix D Open Source Licences NSA-2401 User’s Guide 345 Contributor . Y ou must make it absolutely clear than any such warranty , support, indemnity or liability obligation is of fered by Y ou alo.
Appendix D Open Source Licences NSA-2401 User’s Guide 346 Once Covered Code has bee n published under a particu lar version of the License, Y ou may always continue to use it under the terms of that version. Y ou may also choose to use su ch Covered Code under the terms of any sub sequent version of the License published by Netscape.
Appendix D Open Source Licences NSA-2401 User’s Guide 347 any software, hardware, or device , other than such Participant's Contributor V ersion, directly or indirectly infringes any patent, then any ri ghts granted to Y ou by such Participant under Sections 2.
Appendix D Open Source Licences NSA-2401 User’s Guide 348 As between Initial Developer and the Contri butors, each party is responsible for claims and damages arising, directly or indirectly , out o.
Appendix D Open Source Licences NSA-2401 User’s Guide 349 The above copy righ t notic e an d t his permis sio n notice shall be included in all copies or substantial portions of the Software.
Appendix D Open Source Licences NSA-2401 User’s Guide 350 4.Restrictions Y ou may not publish, display , disclose, sell, re nt, lease, modify , store, loan, distribute, or create derivative works of the Software, or any part thereof.
Appendix D Open Source Licences NSA-2401 User’s Guide 351 DOCUMENT A TION OR OTHER WISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME ST A TES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMIT A TION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENT AL DAMAGES, THE ABOVE LIMIT A TION MA Y NOT APPL Y TO YOU.
Appendix D Open Source Licences NSA-2401 User’s Guide 352.
NSA-2401 User’s Guide 353 A PPENDIX E Legal Information Copyright Copyright © 2009 by ZyXEL Communications Corporation. The contents of this publication may not be reprod uced in any part or as a w.
Appendix E Leg al In fo rm at ion NSA-2401 User’s Guide 354 Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Vie wing Ce rtifi cations 1 Go to http://www .zyxel.com . 2 Select your product on the ZyXEL home pag e to go to that product's page.
Index NSA-2401 User’s Guide 355 Index A about icon 48 access configuration 44 , 189 Access Control List, see ACL accessing share contents 40 account names 179 ACL 85 , 174 , 175 , 19 0 Active Direct.
Index NSA-2401 User’s Guide 356 copied files folder format 33 COPY button 33 , 227 folder format 33 LED 33 share 227 COPY LED troubleshootin g 255 copying 33 , 42 copyright 48 , 353 CPU temperature .
Index NSA-2401 User’s Guide 357 NTFS 150 ReiserFS 150 scan 147 unlock 148 XFS 150 F factory defaults 52 fan speed 11 9 FAT 1 6 150 FAT 3 2 150 FCC interf er ence statement 35 3 file access 85 browsi.
Index NSA-2401 User’s Guide 358 logout 38 , 49 user 52 web help 38 idle timeout 225 hard drive 243 in conflict 173 internal file system 174 hard drives 39 IP address, default 36 J JavaScript 35 JBOD.
Index NSA-2401 User’s Guide 359 NAS 174 navigation panel 49 NDU 35 troubleshooting discovery 252 network connection test 164 protocols 260 security 260 Network-Attached S torage, see NAS NFS 168 sha.
Index NSA-2401 User’s Guide 360 down 135 healthy 134 summary 135 three disks 134 two disks 133 recycle bin 194 Redundant Array of Indepen dent Disks, see RAID ReiserFS 150 related documentation 3 re.
Index NSA-2401 User’s Guide 361 synchronization 203 tutorial 92 syntax conventions 4 SYS LED 33 troubleshootin g 249 syslog server 229 , 236 system management 261 system setting 121 T TCP/IP 162 tea.
Index NSA-2401 User’s Guide 362 locked 126 , 139 name restrictions 45 passwor d 142 , 149 RAID 1 153 scan 140 status 134 summary 139 unlock 140 , 141 , 146 unlocked 126 , 139 USB key 142 , 143 , 149.
An important point after buying a device ZyXEL Communications NSA-2401 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought ZyXEL Communications NSA-2401 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data ZyXEL Communications NSA-2401 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, ZyXEL Communications NSA-2401 you will learn all the available features of the product, as well as information on its operation. The information that you get ZyXEL Communications NSA-2401 will certainly help you make a decision on the purchase.
If you already are a holder of ZyXEL Communications NSA-2401, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime ZyXEL Communications NSA-2401.
However, one of the most important roles played by the user manual is to help in solving problems with ZyXEL Communications NSA-2401. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device ZyXEL Communications NSA-2401 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center