ZyXEL Communications NSA-2400 Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 202 Seiten
- 4.61 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Network Card
ZyXEL Communications G-4100
25 Seiten 1.01 mb -
Network Card
ZyXEL Communications ZyXEL G-200
11 Seiten 0.54 mb -
Network Card
ZyXEL Communications 50
322 Seiten 4.39 mb -
Network Card
ZyXEL Communications ZyXEL ZyAIR AG-320
90 Seiten 2.19 mb -
Network Card
ZyXEL Communications P-870M-I
2 Seiten 0.16 mb -
Network Card
ZyXEL Communications 401
66 Seiten 1.49 mb -
Network Card
ZyXEL Communications Powerline Ethernet Multiplug Center PLA491
71 Seiten 1.08 mb -
Network Card
ZyXEL Communications P-660R-T Series
302 Seiten 11 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung ZyXEL Communications NSA-2400 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von ZyXEL Communications NSA-2400, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung ZyXEL Communications NSA-2400 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung ZyXEL Communications NSA-2400. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung ZyXEL Communications NSA-2400 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts ZyXEL Communications NSA-2400
- Den Namen des Produzenten und das Produktionsjahr des Geräts ZyXEL Communications NSA-2400
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts ZyXEL Communications NSA-2400
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von ZyXEL Communications NSA-2400 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von ZyXEL Communications NSA-2400 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service ZyXEL Communications finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von ZyXEL Communications NSA-2400 zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts ZyXEL Communications NSA-2400, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von ZyXEL Communications NSA-2400 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
www .zyxel.com NSA-2400 Network S torage Appliance User ’ s Guide V ersion 1.00 12/2006 Edition 2[...]
-
Seite 2
[...]
-
Seite 3
About This User's Guide NSA-2400 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for peop le who want to configure the Product Name [shor t] using the web configurator . Y ou should have at least a ba sic knowledge of TCP/IP networking c oncepts and topology . Related Document ation • Quick Start Guide[...]
-
Seite 4
Document Conventions NSA-2400 User’s Guide 4 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User ’ s Guide. 1 W arnings tell you about things that could harm you or your device. " Notes tell you other important informati on (for example, other things you may need to configure or helpful tip s) o[...]
-
Seite 5
Document Conventions NSA-2400 User’s Guide 5 Icons Used in Figures Figures in this User ’ s Guide may use the follo wing generic icons. The NSA icon is not an exact representation of your device. NSA Computer Notebook computer Server DSLAM Firewall T elephon e Switch Router[...]
-
Seite 6
Safety Warnings NSA-2400 User’s Guide 6 Safety Warnings 1 For your safety , be sure to read and follow all warni ng notices and instructions. • Do NOT use this product near water , for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store thin gs on the device.[...]
-
Seite 7
Safety Warnings NSA-2400 User’s Guide 7[...]
-
Seite 8
Safety Warnings NSA-2400 User’s Guide 8[...]
-
Seite 9
Contents Overview NSA-2400 User’s Guide 9 Contents Overview Introduction .......................................... ........................................................................ .......... 23 Getting to Know Y our NSA-2400 .............. ................ .................... ................ ................... .......... 25 Introducin[...]
-
Seite 10
Contents Overview NSA-2400 User’s Guide 10[...]
-
Seite 11
Table of Contents NSA-2400 User’s Guide 11 Table of Contents About This User's Guide ................................ ........................................................................ .. 3 Document Conventions.................................................................. ......................................... .4 Safety Warnings[...]
-
Seite 12
Table of Contents NSA-2400 User’s Guide 12 Chapter 3 St atus Screens ................................................ ................................................................. ....... 43 3.1 S tatus Overview Sc reen ............ ................ ................ ................ ................ ................... ..... .. 43 3.2 Active [...]
-
Seite 13
Table of Contents NSA-2400 User’s Guide 13 5.2.2 DHCP ........ ................... ................ ................. ................ ................ ................ ........ ..... 72 5.2.3 Windows/CIFS ............................. ................. ................ ................ ................ ............. 7 2 5.2.4 FTP ........... ...[...]
-
Seite 14
Table of Contents NSA-2400 User’s Guide 14 7.4 RAID ... ................ ................ ................ ................ ................. ................ ................ .. ............ 100 7.4.1 JBOD ............ .................... ................ ................ ................ ................ ................ .... .... 101 7.4.2 RA[...]
-
Seite 15
Table of Contents NSA-2400 User’s Guide 15 9.3.1 How T o Reset the NSA .......... ................ ................ ................ .................... .............. 1 27 9.4 Users Cannot Access The NSA-2400 ............. .................... ................ ................... ........... 131 9.5 Backups and Snapshots ............ ..........[...]
-
Seite 16
Table of Contents NSA-2400 User’s Guide 16[...]
-
Seite 17
List of Figures NSA-2400 User’s Guide 17 List of Figures Figure 1 Example Application ................... ....... ......... ................. ................ ................ .............. ........ ....... 26 Figure 2 NSA-2400 Front Panel LEDs .................. .................... ................ ................... ................ ... ....[...]
-
Seite 18
List of Figure s NSA-2400 User’s Guide 18 Figure 39 Protect > Snapshot > Schedule ...................... ................ ................... .................... ......... ....... 91 Figure 40 Protect > Snapshot > Run Now ........ ................ .................... ................ ................... ....... ...... 91 Figure 41 P[...]
-
Seite 19
List of Figures NSA-2400 User’s Guide 19 Figure 82 Red Hat 9.0: Restart Et hernet Card .................. ................ ................ ................. .............. ... 160 Figure 83 Red Hat 9.0: Checking TC P/I P Properties .................. ................... ................ ................ ..... 16 0[...]
-
Seite 20
List of Figure s NSA-2400 User’s Guide 20[...]
-
Seite 21
List of Tables NSA-2400 User’s Guide 21 List of Tables T able 1 Disk Drive Leds ........... ................ .................... ................ ................... ................ .... ................... 27 T able 2 NSA-2400 LEDs .... ................... ................ ................ .................... ................ ............. ..[...]
-
Seite 22
List of Tables NSA-2400 User’s Guide 22 T able 39 RAID 0 ................... ................ ................ ................ ................. ................... ....... ................... . 102 T able 40 RAID 1 ................... ................ ................ ................ ................. ................... ....... ..............[...]
-
Seite 23
23 P ART I Introduction Getting to Know Y our NSA-2400 (25) Introducing the W eb Configurator (2 9)[...]
-
Seite 24
24[...]
-
Seite 25
NSA-2400 User’s Guide 25 C HAPTER 1 Getting to Know Your NSA-2400 This chapter introduces the main features and ap plications of th e NSA-2400 (Network Storage Appliance). 1.1 NSA-2400 Overview The NSA-2400 is a dev ice for storing and sharing d ata that connects directly to your ne twork via a Gigabit Ethernet port. Its SA T A-I (Serial Advanced[...]
-
Seite 26
Chapter 1 Getting to Know Your NSA-2400 NSA-2400 User’s Guide 26 Figure 1 Example Applic ation 1.1.1 Front Panel LEDs The front panel LEDs tell you import ant information about the NSA-2400. Figure 2 NSA-2400 Front Panel LEDs The following table describes the disk drive LEDs. Refer to the Quick Start Guide to see how to install and remove hard dr[...]
-
Seite 27
Chapter 1 G etting to Know Your NSA-2400 NSA-2400 User’s Guide 27 This table describes the LEDs related to the hard disks. The following table describes the LEDs related to the NSA-2400 itself. T able 1 Disk Driv e Leds LED COLOR ST AT US DESCRIPTION PWR Green Off The hard disk driv e tray is empty or not connected prope rly . On The hard disk dr[...]
-
Seite 28
Chapter 1 Getting to Know Your NSA-2400 NSA-2400 User’s Guide 28[...]
-
Seite 29
NSA-2400 User’s Guide 29 C HAPTER 2 Introducing the Web Configurator This chapter describes how to access the NS A-2400 web configurator and provides an overview of its screens. 2.1 W eb Configurator Overview The web configu rator is an HTML-based manage ment interface that allo ws easy NSA-2400 setup and management via Internet browser . Use Int[...]
-
Seite 30
Chapter 2 Introducing the Web Configur ator NSA-2400 User’s Guide 30 Figure 3 NDU Main Screen From the NDU main page click the icon under Admin to s ee the web configurator screen login screen. 2.2.2 Web Browser Access Open your browser and type in the IP address of the NSA-2400; 192.168.1.3 is the default IP address if one has not been assigned [...]
-
Seite 31
Chapter 2 Introducing the Web Configurator NSA-2400 User’s Guide 31 Figure 5 NSA-2400 Login Scre en If another admin is already logg ed in, you may force them to log out in the next screen. Figure 6 Administrator Already Logged In Y ou should see a screen asking you to change your password (highly recommended) as shown next. T ype a new password [...]
-
Seite 32
Chapter 2 Introducing the Web Configur ator NSA-2400 User’s Guide 32 Figure 7 Change Password Screen 1 If this is your first time to log into the NSA-2400, you will see a screen asking you to launch the setup wizard. Run the wizard to set up the b asic NSA-2400 settings. See the Quick Start Guide for informa tion on the wizard screens. Figure 8 L[...]
-
Seite 33
Chapter 2 Introducing the Web Configurator NSA-2400 User’s Guide 33 Figure 9 NSA-2400 S tatus Screen " The web configurator managem ent session automatically ti mes out if it is left idle for 15 minutes. Simply log back in to the NSA-2400 if this happens to you. 2.5 Global NSA-2400 Icons The icons and language label at the top-right of the s[...]
-
Seite 34
Chapter 2 Introducing the Web Configur ator NSA-2400 User’s Guide 34 2.5.1 Navigation Panel The navigation panel on t he left of the scr een ( ) contains screen links. Click a link to display sub-links. The sub-links are the same as the screen tabs ( ), so you can either click a screen tab or a sub link to go to the same screen. There is no sub-l[...]
-
Seite 35
Chapter 2 Introducing the Web Configurator NSA-2400 User’s Guide 35 2.5.2 St atus Messages At the bottom of the screen the message text box () displays status message s as you configure the NSA-240 0. Network Overview This screen displ ays NSA-2400 IP address, CIFS and FTP information. TCP/IP Use this screen to assign a dynamic or static IP addre[...]
-
Seite 36
Chapter 2 Introducing the Web Configur ator NSA-2400 User’s Guide 36 2.5.3 Common Screen Icons The following table explains some icons that appear in several configuration screens. T able 5 Common Configuration Screen Icon s ICON DESCRIPTION Click the Edit icon to go to a screen where you c an change the configu ration settings of an entry . Clic[...]
-
Seite 37
Chapter 2 Introducing the Web Configurator NSA-2400 User’s Guide 37 2.6 Forgot Y our Password If you for get your password, you could have the NSA-2400 e-mail your password to you if you configured your e-mail address and mail server on the NSA-2 400. Alternatively , if you didn’t configure an e-mail address, then you will have to reset the NSA[...]
-
Seite 38
Chapter 2 Introducing the Web Configur ator NSA-2400 User’s Guide 38 Figure 12 Generate Pa ssword Click login to go to the NSA-2400 screen and en ter the new e-mailed password there. Y o u should change this password and then write down your new password and put it in a safe place. Log in W ith New Password 2.6.2 Reset the NSA-2400 Alternatively [...]
-
Seite 39
Chapter 2 Introducing the Web Configurator NSA-2400 User’s Guide 39 2 The NSA-2400 automatically restarts to complete the reset.[...]
-
Seite 40
Chapter 2 Introducing the Web Configur ator NSA-2400 User’s Guide 40[...]
-
Seite 41
41 P ART II S t atus, Sharing and Network S tatus Screens (43) Sharing Screens (51) Network Screens (71)[...]
-
Seite 42
42[...]
-
Seite 43
NSA-2400 User’s Guide 43 C HAPTER 3 Status Screens This chapter introduces the St a t u s screens of the NSA. 3.1 St atus Overview Screen The S tatus Overview screen is the first main web configur ator screen you see after you log in (and complete the wizard the first time). T o view the status screens, clic k the St a t u s icon on the top-left [...]
-
Seite 44
Chapter 3 Sta tus Screens NSA-2400 User’s Guide 44 CPU Usage This displays CPU usage by all cu rrent processes since the last update. If too many users are using the NSA then the NSA may appear sluggish. CPU T emperature This displays the current temp er ature of the NSA CPU. If the temperature is not within range (about 0 O to 85 O C) the NSA ma[...]
-
Seite 45
Chapter 3 Status Screens NSA-2400 User’s Guide 45 3.2 Active Sessions Screen The Active Sessions screen shows how many users are currently co nnectin g to the NSA via CIFS and FTP (not web configurator). Figure 13 S tatus > Active Sessions The following table describes the labels in this screen. 3.2.1 Session Example (Windows) Open windows exp[...]
-
Seite 46
Chapter 3 Sta tus Screens NSA-2400 User’s Guide 46 3.3 System Log The following screen displays all NSA logs. Ther e are at most 128 entries in the log. Older logs are removed by the system. Y ou cannot download the log file via FTP or CIFS. See the User Guide appendices for example log messages. Figure 15 S tatus > System Log The following ta[...]
-
Seite 47
Chapter 3 Status Screens NSA-2400 User’s Guide 47 The following table shows information on log categories. The following table shows inform ation on log severity levels Le vels range from 0 to 6 with 0 being the most severe level log and 6 being an informational log only . Log levels are not displayed in the logs and are for your reference only .[...]
-
Seite 48
Chapter 3 Sta tus Screens NSA-2400 User’s Guide 48 3.4 System Info Use this screen to view detailed NSA system and hardware information. Figure 16 System Info The following table describes the labels in this screen. Ta b l e 1 1 System Info LABEL DESCRIPTION System Name This displays the name which helps you find the NSA on the network. Click the[...]
-
Seite 49
Chapter 3 Status Screens NSA-2400 User’s Guide 49 MAC Address This displays the NSA ’s unique physical hardware address (MAC). Y ou need the MAC address to register the product at myZyXEL.com. Customer support may also request it for troubleshooting purposes. UPS Info This field displays whether an Uninteruptable Power Supply (UPS) is being use[...]
-
Seite 50
Chapter 3 Sta tus Screens NSA-2400 User’s Guide 50[...]
-
Seite 51
NSA-2400 User’s Guide 51 C HAPTER 4 Sharing Screens This chapter introduces the Sharing screens of the NSA. 4.1 Sharing Introduction Use the Sharing screens to: • Create and manage user accounts. Users are pe ople who have access rights to the NSA and can store files there for later retrieval. • Create and manage groups . A group is a set of [...]
-
Seite 52
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 52 A conflict users is a local user that has the same user name as that of a user on a domain controller . For example, if you first create lo cal users and groups on the NSA (in Wo r k g r o u p mode) and later you chang e to domain mode wher e you create (or there are already) identical users and[...]
-
Seite 53
Chapter 4 S haring Screen s NSA-2400 User’s Guide 53 The table below shows the actual accessibility of th e above shares for the conflict users (local and domain u1) both when they have the same and when they have different passwords. 4.2.2 Sharing Overview Screen Click the Sharing link in the Navigation panel to ac cess the Sharing > Overvi e[...]
-
Seite 54
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 54 4.3 Users Use this screen to create and mana ge users who ca n store files on the NSA. Number of Users in Limbo This field displays the numbe r of users who were once on the domain controller but the NSA (in Domain mode) is currently unable to determine if the user still exists on the domain con[...]
-
Seite 55
Chapter 4 S haring Screen s NSA-2400 User’s Guide 55 4.3.1 User Icons The following table describes the user icons. 4.3.2 Users Summary Screen Click the Sharing link in the Navigation panel and then click the Users link or the Users tab to access the Sharing > Users screen. Figure 18 Sharing > Users The following table describes the labels [...]
-
Seite 56
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 56 4.4 Adding a New User Use this screen to add local users. Domain user s must be added on the domain server . Click the Add a Ne w Local User button in the screen shown previously to create a new NSA user account with NSA acce ss password. 4.4.1 User Names Enter a user name from one to 32 charact[...]
-
Seite 57
Chapter 4 S haring Screen s NSA-2400 User’s Guide 57 4.4.2 Add a New User Screen Figure 19 Add a New User The following table describes the labels in this screen. T able 16 Add a New User LABEL DESCRIPTION New User Information Enabled Y o u must select this check box in order for this user to be able to access the NSA. User Name T ype a user name[...]
-
Seite 58
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 58 " User-group membership edits ar e also updated in the corresponding Sharing > Group s > Edit Grou p screen. 4.4.3 User Password Management Non-admin users ma y change their passwords thems elves by logging into the NSA web configurator using the username and password as defined in th[...]
-
Seite 59
Chapter 4 S haring Screen s NSA-2400 User’s Guide 59 " Non-admin users do not see other web c onfigurator screens. 4.5 Group s Use this screen to create and mana ge groups. A group is a set of users. 4.5.1 Group I cons The following group icons display under St a t u s in the Group S ummary screen. 4.5.2 Group s Summary Screen Click the Shar[...]
-
Seite 60
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 60 The following table describes the labels in this screen. See T able 17 on page 59 for icon details. 4.6 Adding a New Group Click the Add a New Local Grou p button in the scree n shown pr eviously to create a new group with specified NSA access rights. 4.6.1 Group Names Enter a group name from on[...]
-
Seite 61
Chapter 4 S haring Screen s NSA-2400 User’s Guide 61 • nobody •l p •r o o t • tty •u t m 4.6.2 Add A New Group Screen Figure 22 Add a New Group The following table describes the labels in this screen. T able 19 Add Group LABEL DESCRIPTION New Group Informatio n Group Name T ype a group na me from 1 to 16 single-byte ASCII characte rs. T[...]
-
Seite 62
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 62 " Group-user membership edits are also updated in the corresponding Sharing > Users > Edit User screen. 4.7 Shares Use this screen to create and manage shares. A share is a set of users/groups access permissions mapped to a spec ific folder on a vo lume. It is equivalent to the W indo[...]
-
Seite 63
Chapter 4 S haring Screen s NSA-2400 User’s Guide 63 Figure 23 Sharing > Shares The following table describes the labels in this screen. See T able 20 on page 62 for icon details. 4.8 Adding a New Share Click the Add a New Share button in the screen shown previously to create a ne w shared folder with optional access password. 4.8.1 Share Name[...]
-
Seite 64
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 64 • All leading and trailing spa ces are removed automatically . • Multiple spaces within names are converted to a single space. • Share names m ust be unique (they cannot b e the same as other share na mes). • Share names cannot use names reserved for “a utomatic shares” of external U[...]
-
Seite 65
Chapter 4 S haring Screen s NSA-2400 User’s Guide 65 • Y ou cannot have an empty folder name, that is, two consecutive slashes (for example, '/ My//Corner/') • Each individual folder in the path (that is, the content between the slashes) cannot exceed 255 characte rs 4.8.3 Share Comments Share comments are optional, so they can be b[...]
-
Seite 66
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 66 4.8.6 Add A New Share Screen Figure 24 Add a New Share The following table describes the labels in this screen. T able 22 Add Share LABEL DESCRIPTION New Share Information Enabled Y ou must select th is check box in order fo r a user or group to be able to access this share on the NSA. Share Nam[...]
-
Seite 67
Chapter 4 S haring Screen s NSA-2400 User’s Guide 67 V olume Y ou should have alrea dy created volumes (a single accessible storage area with a single file system) on the NSA. Path T ype the location of the share on the NSA using forward slashes as branch separators. See Section 4.8. 2 on page 64 for more information on share pa ths. Comment T yp[...]
-
Seite 68
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 68 The following screen is an example of the default public share. Note th at for anonymous CIF S users, no login is required (see Section 4.8.4 on page 65 for more information). Remove Selected Select users and/or groups (you can select multiple users by holding th e [Ctrl] key while you click) fr[...]
-
Seite 69
Chapter 4 S haring Screen s NSA-2400 User’s Guide 69 Figure 25 Public Share[...]
-
Seite 70
Chapter 4 Shari ng Screens NSA-2400 User’s Guide 70[...]
-
Seite 71
NSA-2400 User’s Guide 71 C HAPTER 5 Network Screens This chapter discusses the network scree ns. 5.1 Network Screens This section gives an overview of the various features included in the network configuration screens. Use the network screens to: • V iew the network information • Configure your TCP/IP in formation and DNS server address. • [...]
-
Seite 72
Chapter 5 Network Scr eens NSA-2400 User’s Guide 72 5.2.2 DHCP DHCP (Dynamic Host Configuration Protocol , RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP config uration at start-up from a server . Y ou can configure the NSA as a DHCP client which means it is set to receive an IP address from a DHCP serve r . The NDU can help yo[...]
-
Seite 73
Chapter 5 Network Screens NSA-2400 User’s Guide 73 The following table describes the labels in this screen. 5.4 TCP/IP Screen Use the Network > TCP/IP screen to an NSA dynamic or static IP address, subnet mask, default gateway and DN S servers. " The NSA automatically restart s after you apply changes in the TCP /IP or Windows/CIFS screen[...]
-
Seite 74
Chapter 5 Network Scr eens NSA-2400 User’s Guide 74 Figure 27 NSA Rebooting Click the Network link in the Navigation panel and then click the TCP/IP link or the TCP/IP tab to access the Network > TCP/IP screen. Figure 28 Network > TCP/IP The following table describes the labels in this screen. T able 24 Network > TCP/IP LABEL DESCRIPTION[...]
-
Seite 75
Chapter 5 Network Screens NSA-2400 User’s Guide 75 5.5 Windows/CIFS Use this screen to configure your CIFS settings. In this screen you can set your server name, your WINS server , and specify if your NSA is a part of a workgroup o r domain. " CIFS cannot be disabled on the NSA. " The NSA automatically restart s after you apply changes [...]
-
Seite 76
Chapter 5 Network Scr eens NSA-2400 User’s Guide 76 5.5.2 Windows Domain Security Mode A domain is a group of computers that are part of a network and share a common direc tory database. On the NSA, use Windows Domain Security Mode if yo u want centralized management of shared resource s, services and user on a centralized W indows-based domain c[...]
-
Seite 77
Chapter 5 Network Screens NSA-2400 User’s Guide 77 Figure 30 Network > Windows/CIFS_ Domain The following table describes the labels in these screens. T able 25 Network > Windows/CIFS LABEL DESCRIPTION Server Name Server Name Enter a name to identify your NSA on the network in this field. The NSA restarts af te r you change the NSA. WINS Y [...]
-
Seite 78
Chapter 5 Network Scr eens NSA-2400 User’s Guide 78 5.6 FTP Screen Use this screen to configure y our NS A FTP settings. In this scre en you can enable or disable FTP , set a connection limit, idle timeout, and enable or disable anonymous FTP access. See Section 5.2.4 on page 72 for more details on FTP . Figure 31 Network > FTP The following t[...]
-
Seite 79
79 P ART III Protect, S torage and Maintenance Protect Screens (81) Storage Screens (95) Maintenance Screens (1 13)[...]
-
Seite 80
80[...]
-
Seite 81
NSA-2400 User’s Guide 81 C HAPTER 6 Protect Screens This chapter compares the different ways of protectin g data on the NSA-2400 and explains how to use the Protect screens to create and schedule snapshots and external backups. 6.1 Protection Methods There are a variety of ways to protect your da ta on the NSA-2400. Below is a summary table of wh[...]
-
Seite 82
Chapter 6 Protect Scre ens NSA-2400 User’s Guide 82 " Configuration File Backup and Restorati on does not affect da t a (your files and folders), volumes on the NSA. 6.1.2 Genie Backup Manager Use the Genie Backup Manager to transfer data from your computer to the NSA. Y ou could use Genie Backup Manager to back up from one NSA to another NS[...]
-
Seite 83
Chapter 6 Prote ct Screens NSA-2400 User’s Guide 83 4 A snapshot just takes up as much space as it needs (within the reserved space). Reserved snapshot space can be decreas ed later , but not increased, so it's better to start off with a (not too) big reserved space. 5 If the disk associated with a volume fails, th en all snapshots in that v[...]
-
Seite 84
Chapter 6 Protect Scre ens NSA-2400 User’s Guide 84 " NSA backup can only be done to another NAS with the same firmware version or an external USB disk that was fo rmatted as 'Backup' volume type. The NSA does not check if enough space is available before backup commences. The NSA first starts transferring files and if not enough s[...]
-
Seite 85
Chapter 6 Prote ct Screens NSA-2400 User’s Guide 85 Figure 32 Protect > Overview 6.3 Backup Summary Click the Backup link in the Navigation panel to access the Protec t > Backup summary screen that shows a list of all backups created and scheduled. Y ou can also edit or delete an existing backup or create a new one from here. Figure 33 Prot[...]
-
Seite 86
Chapter 6 Protect Scre ens NSA-2400 User’s Guide 86 6.3.1 Schedule Backup s Click the schedule icon in the Action column in the Protect > Backup screen to schedule that backup. (Y ou can also do this in the Protect > Scheduler screen, but if you do it in the Pro tect > Backup screen, then specific related bac k up information is already [...]
-
Seite 87
Chapter 6 Prote ct Screens NSA-2400 User’s Guide 87 Figure 36 Protect > Backup > Edit The following table describes the labels in this screen. T able 29 Protect > Backup > Edit LABEL DESCRIPTION Backup Job Name: This is a required field that uniquely ide ntifies the backup. T ype from one to 32 characters. All characters a re allowed [...]
-
Seite 88
Chapter 6 Protect Scre ens NSA-2400 User’s Guide 88 6.3.3 Restoring Backup s Click the Restore button in the Protect > Backu p sc reen to replace existing files with files saved previously . Modify Click Modify and then browse to the files and shares that you want to back up. Advanced Settings Backup Method: A Nor mal backup is a complete copy[...]
-
Seite 89
Chapter 6 Prote ct Screens NSA-2400 User’s Guide 89 Figure 37 Protect > Backup > Restore The following table describes the labels in this screen. 6.3.4 Snap shot Summary Click the Protect link in the Navigation panel, then click the Snaps hot sublink to access the Protect > Snapshot summary screen. T able 30 Protect > Backup > Rest[...]
-
Seite 90
Chapter 6 Protect Scre ens NSA-2400 User’s Guide 90 Figure 38 Protect > Snapshot The following table describes the labels in this screen. 6.3.5 Schedule Snapshot s Click the schedule icon in the Action column in the Protect > Snapshot screen to schedule that snapshot. (Y ou can also do this in the Protect > Scheduler screen, but if you d[...]
-
Seite 91
Chapter 6 Prote ct Screens NSA-2400 User’s Guide 91 Figure 39 Protect > Snapshot > Schedule See the Protect > Sc heduler screen ( Section 6.4 on page 93 ) in this User ’ s Guide for more information on these fields. Click the Run Now icon in the Action column in the Protect > Snapshot screen to immediately perform that snapshot. A s[...]
-
Seite 92
Chapter 6 Protect Scre ens NSA-2400 User’s Guide 92 6.3.7 Purging Snap shots Click the Purge Policy button in the Protect > Snapshot screen to define a rule for automatically deleting snapshots. Purge policies apply to all snapshots, unlik e backup pur ge policies which apply onl y to specific backups. Purge policies always run before new snap[...]
-
Seite 93
Chapter 6 Prote ct Screens NSA-2400 User’s Guide 93 6.4 Scheduler Screens Use these screens to automatica lly run backups or snapshots at the configured times. It is recommended you schedule large backups for times when your network is not busy , such as at night. If two events are configur ed to run at the same time, then one must wait until the[...]
-
Seite 94
Chapter 6 Protect Scre ens NSA-2400 User’s Guide 94 Figure 44 Protect > Scheduler > Create/Edit The following table describes the labels in this screen. T able 35 Protect > Scheduler > Create/Edit LABEL DESCRIPTION Edit a Scheduler Job T ype: Select whether the schedule is for a backup or snapshot. Backup is selected in this screen Li[...]
-
Seite 95
NSA-2400 User’s Guide 95 C HAPTER 7 Storage Screens This chapter covers storage systems, volumes and disks on the NSA-2400. 7.1 St orage Introduction Use the S torag e screens to create and manage NSA-2400 volumes (internal and external), disks and reserve snapshot space. • See Section 7.3 on pa ge 97 for more inform ation on volum es. • See [...]
-
Seite 96
Chapter 7 Stora ge Screens NSA-2400 User’s Guide 96 Figure 45 S torage > Overview The following table describes the labels in this screen. T able 36 S torag e > Overview LABEL DESCRIPTION Internal/External V olume These tables display info rmation on all internal vo lumes (created on NSA internal disk drives) and externa l volumes (created [...]
-
Seite 97
Chapter 7 Storage Scr eens NSA-2400 User’s Guide 97 7.3 V olumes and RAID A volume is a storage area on a disk or disks. Y ou can create volumes on the internal disks and external disks attached to the USB port(s). Y ou can spread a volume across internal disks but not between internal and external disks. RAID (Redundant Array of Independent Disk[...]
-
Seite 98
Chapter 7 Stora ge Screens NSA-2400 User’s Guide 98 7.3.1 Choosing A S torage Method For a V olume The following is a guide to help you choose a storage method for the various number of disks supported on the NSA-2400. Se e Section 7.4 on page 100 for theoretical background on JBOD and the RAID levels used on the NSA-2400. T y pical applications [...]
-
Seite 99
Chapter 7 Storage Scr eens NSA-2400 User’s Guide 99 • Choose RAID 5 if yo u need more disk space available for data and if up to one disk failure is acceptab le. RAID 5 uses 75% of the available space for your data. All data can be recovered if one dis k fails. If two disks fail then, all data in the volume is lost. If one disk fails, the volum[...]
-
Seite 100
Chapter 7 Stora ge Screens NSA-2400 User’s Guide 100 7.3.3 Resynchronizing a RAID 1 or 5 V olume Resynchronizing a RAID 1 or 5 V olume is done block-by-block, so th e time it takes depends more on the size of your hard drive(s) than the amount of data you have on them. " Y ou should not restart the NSA while the NSA is resych ronizing a volu[...]
-
Seite 101
Chapter 7 Storage Scr eens NSA-2400 User’s Guide 101 In mirroring 50% of t h e drives in the arra y are reserved for duplicate data. Parity is another way to allow data recove ry in the event of disk failu re using calculations rather than duplicating the data . If you have ‘n’ pieces of data, parity computes an extra piece of data. The’n+1[...]
-
Seite 102
Chapter 7 Stora ge Screens NSA-2400 User’s Guide 102 7.4.2 RAID 0 RAID 0 spreads data even ly across two or more disks (data striping) with no mirroring nor parity for data redundancy , so if one disk fails the entire volume will be lost. The major benefit of RAID 0 is performance. The following figure sh ows two disks in a single RAID 0 volume. [...]
-
Seite 103
Chapter 7 Storage Scr eens NSA-2400 User’s Guide 103 " When you use RAID 1 on the NSA-2400, you MUST use disks 1 and 2 in one RAID volume and/or disks 3 and 4 in the other; y ou cannot have disks 1 and 3 in the same RAID volume for example. RAID 1 capacity is limited to the size of the sm allest disk in the RAID array . For example, if you h[...]
-
Seite 104
Chapter 7 Stora ge Screens NSA-2400 User’s Guide 104 7.4.5 RAID 5 RAID 5 provides the best balance of capac ity and performance while providing data redundancy . It provides redundancy by striping data across three disk s and keeps the parity information (AP) on the fourth disk (in each st ripe). In case of disk failure, data can be recovered fro[...]
-
Seite 105
Chapter 7 Storage Scr eens NSA-2400 User’s Guide 105 7.4.7 RAID and Dat a Protection If a hard disk fails and you’re us ing a RAID 1, RAID 10, or RAID 5 volume then your data will still be available (but at degraded speeds until you replace the hard disk that failed and resynchronize the volume). However , RAID can not protect against file corr[...]
-
Seite 106
Chapter 7 Stora ge Screens NSA-2400 User’s Guide 106 Y ou see the following warning screens before you remove, scan or expand a volume. Figure 47 Remove, Scan Or Expand A V olume 7.6 Creating a New Internal V olume Click the Create a New Internal V olume button in the Vo l u m e screen a s shown in Figure 46 on page 105 to create a new NSA intern[...]
-
Seite 107
Chapter 7 Storage Scr eens NSA-2400 User’s Guide 107 Figure 48 Create a Ne w Internal V olume The following table describes the labels in this screen. T able 44 Create a New Internal Volume LABEL DESCRIPTION V olume Informatio n V olume Name Internal volume names are pre-defined . Y ou cannot change them. Snapshot S pace T ype what percentage of [...]
-
Seite 108
Chapter 7 Stora ge Screens NSA-2400 User’s Guide 108 7.7 Disk Y ou can view information on th e NSA internal disks and external disks attached to the USB port(s) in this screen. 7.7.1 Maintenance Mode If you have no internal NSA volum es (disks), then the NSA is in Maintenance Mode . When the NSA is in this mode you ca nnot create users, groups o[...]
-
Seite 109
Chapter 7 Storage Scr eens NSA-2400 User’s Guide 109 " The NSA does not repair a disk automatically when yo u replace it; you must click Rep air . 7.7.4 Disk Replacemen t and V olume Labels When you create a volume, the NSA wr ites the volume label to the disk. " Deleting a volume removes volume label information on its disk(s). It is r[...]
-
Seite 110
Chapter 7 Stora ge Screens NSA-2400 User’s Guide 11 0 10 The original volume sho u ld be visible in the web co nfigurator and the previously conflicting volume should be shown as an available disk. 11 Go to S torage > V olume and create a new volume on the available disk. 12 Once the new volume is successfu lly created, restore your backup dat[...]
-
Seite 111
Chapter 7 Storage Scr eens NSA-2400 User’s Guide 111 V olume This field shows which volume the disk belongs to. It shows No V olume if it does not (yet) belong to a volume. Disk Configuration This shows the volume stor age system to which the disk belongs. See Section 7.3 on page 97 and Section 7.4 on page 100 for more information on storage syst[...]
-
Seite 112
Chapter 7 Stora ge Screens NSA-2400 User’s Guide 11 2[...]
-
Seite 113
NSA-2400 User’s Guide 11 3 C HAPTER 8 Maintenance Screens This chapter discusses the Maintenance screens. 8.1 Maintenance Overview Use the maintenance screens to: • V iew system information • Set the NSA-2400 date and time • V iew logs and configure where e-mail logs should be sent via e-mail • Change your password and con figure HTTPS ?[...]
-
Seite 114
Chapter 8 Maintenan ce Screens NSA-2400 User’s Guide 11 4 8.1.2 Maintenance Overview Screen Figure 50 Maintenance > Overview The following table describes the labels in this screen. T able 46 Maintenance > Overview LABEL DESCRIPTION Date & T ime Current T ime This field disp lays the time of your NSA-2400 . The time is updated periodica[...]
-
Seite 115
Chapter 8 Maintena nce Screens NSA-2400 User’s Guide 11 5 8.2 Date/T ime Use this screen to select a time zone and a tim e server from which your NSA-2400 can get the time and date. This time is then us ed in NSA-2400 logs and alerts. 8.2.1 T i me Lag T ime lag occurs when the time on the NSA-2400 falls behind the time on the time server . This m[...]
-
Seite 116
Chapter 8 Maintenan ce Screens NSA-2400 User’s Guide 11 6 8.2.4 Date/Ti me Screen Click the Maintenance link in the Navigation pa nel and t hen click the Date/Time link or the Date/Time tab to access the Maintenance > Date/T ime screen. Figure 51 Maintenance > Date/T ime The following table describes the labels in this screen. 8.3 Log Alert[...]
-
Seite 117
Chapter 8 Maintena nce Screens NSA-2400 User’s Guide 11 7 Click the Maintenance link in the navigati on pa nel and then click the Log Alert link or the Log Alert tab to access the Maintenance > Log Alert screen. Figure 52 Maintenance > Log Aler t The following table describes the labels in this screen. T able 49 Maintenance > Log Alert L[...]
-
Seite 118
Chapter 8 Maintenan ce Screens NSA-2400 User’s Guide 11 8 8.4 Security Use this screen to change the admin password and elect to allow only HTTPS web connections to the NSA-2400. 8.4.1 Introduction to HTTPS HTTPS (HyperT ext T ransfer Protocol over Secure Socket Layer , or HTTP over SSL) is a web protocol that encrypts and decrypts web pages. Sec[...]
-
Seite 119
Chapter 8 Maintena nce Screens NSA-2400 User’s Guide 11 9 Figure 53 Maintenance > Security The following table describes the labels in this screen. 8.5 Configuration Use the Configuration screen to back up or restore the NSA-2400 configuration settings and enable or disable the ha rdware reset button. 8.5.1 Configuration Screen Click the Maint[...]
-
Seite 120
Chapter 8 Maintenan ce Screens NSA-2400 User’s Guide 120 Figure 54 Maintenance > Config uration The following table describes the labels in this screen. T able 51 Maintenance > Configuration LABEL DESCRIPTION Backup Current Configuration Settings Backup Click Backup to save the curre nt configuration of the NSA-2400 to your computer . A pop[...]
-
Seite 121
Chapter 8 Maintena nce Screens NSA-2400 User’s Guide 121 8.6 Firmware Upgrade Use this screen to upgrade the NSA-2400 firm ware. Y ou should first have downloaded the latest firmware files from the ZyXEL website. 8.6.1 Firmware Upgrade Screen Click the Maintenance link in the Navigation pa nel and t hen click the FW Upgrade link or the FW Upgrade[...]
-
Seite 122
Chapter 8 Maintenan ce Screens NSA-2400 User’s Guide 122 The following table describes the labels in this screen. 8.7 Shut down Use this screen to turn of f the NSA-2400 or perform a software restart. A software restart is faster than turning the NSA-2400 off and then turning it on ag ain. Before shutting down or restarting, check the System S ta[...]
-
Seite 123
Chapter 8 Maintena nce Screens NSA-2400 User’s Guide 123 Figure 57 Maintenance > Shut down > Confirm Restart When you cli ck the Shutdown button a pop-up screen will ap pear asking you to confirm. Click OK to continue or Cancel to quit the shutdown. Figure 58 Maintenance > Shut down > Confirm Shutdown[...]
-
Seite 124
Chapter 8 Maintenan ce Screens NSA-2400 User’s Guide 124[...]
-
Seite 125
NSA-2400 User’s Guide 125 C HAPTER 9 Troubleshooting 9.1 T roubleshooting Overview This chapter offers some sugg estions to solve problems you might encounter . The potential problems are divided into the following categories. • Power , Hardware Connections, and LEDs • NSA-2400 Login and Access • How T o Reset the NSA • Users Cannot Acces[...]
-
Seite 126
Chapter 9 Troub leshooting NSA-2400 User’s Guide 126 " Do not remove or install hard driv es while the NSA-2400 is turned on.. The NSA-2400 must be turned off before you remove or inst all hard drive(s). After replacing the disk, turn o n the NSA-2400, go to the S torage > Disk screen and click the Repair icon next to the n ew disk. If th[...]
-
Seite 127
Chapter 9 Troubleshooting NSA-2400 User’s Guide 127 V The disk drive ALM LED is on. • The hard disk has a problem. What you have to do is turn the NSA-24 00 off and replace the faulty disk. See your Quick Start Guide fo r information on replacing a disk and also Section 7.7.3 on page 108 . After replacing the disk, turn on the NSA-240 0, go to [...]
-
Seite 128
Chapter 9 Troub leshooting NSA-2400 User’s Guide 128 " Y ou will not lose your dat a nor NSA-2400 configurati ons but the IP address, subnet mask and admin password are all returned to the factory default s. 9.3.1.1 Procedure T o Use The Reset Button 1 Press and hold the RESET button until you hear a be ep, and then release it. 2 The NSA aut[...]
-
Seite 129
Chapter 9 Troubleshooting NSA-2400 User’s Guide 129 Figure 60 Generate Pa ssword 3 Click login to go to the NSA screen and enter the new e-mailed password there. Y ou should change this password and then write down your new password and put it in a safe place. Figure 61 Log in With New Password • If you didn’ t configure an e-mail address, th[...]
-
Seite 130
Chapter 9 Troub leshooting NSA-2400 User’s Guide 130 V My NSA-2400 is in Maintenance Mode. If you deleted the default volume an d didn’t cr eate anoth e r volume, or you do n’t have an internal hard disk installed, you will see a Mainten ance Mode screen. In Maintenance Mode , you MUST create an internal volume bef ore you can use the NSA-240[...]
-
Seite 131
Chapter 9 Troubleshooting NSA-2400 User’s Guide 131 9.4 Users Cannot Access The NSA-2400 V A local user cannot access a share • Check that the NSA is turne d on and connecte d to the network. The local user should try to ping the NSA or u se the NDU to discover it. • The local user should check that he en tered his login name and password cor[...]
-
Seite 132
Chapter 9 Troub leshooting NSA-2400 User’s Guide 132 " The NSA-2400 time and date must be the same as the time and date on the external domain controll er if the NSA is using one to import us ers and group. 9.5 Backup s and Snap shot s V I cannot make a backup. • Check the logs to find th e reason why the backup failed. • Check that the [...]
-
Seite 133
Chapter 9 Troubleshooting NSA-2400 User’s Guide 133 9.6 External USB Disks V My external USB disk is read-only . If your USB disk was formatted as NTFS, then it can be read-only by the NSA-2400 ((it may show REGULAR meaning that the NSA can read the vo lume but the volume wasn’t created on the NSA). T o solve this proble m, re-format your USB d[...]
-
Seite 134
Chapter 9 Troub leshooting NSA-2400 User’s Guide 134[...]
-
Seite 135
135 P ART IV Appendices and Index Product Specification s (137) Log Messages (143) Setting up Y o ur Computer ’ s IP Address (147) Open Source Licences (161) Legal Information (191) Customer Support (193) Index (197)[...]
-
Seite 136
136[...]
-
Seite 137
NSA-2400 User’s Guide 137 A PPENDIX A Product S pecifications See also the Getting to Know Y our NSA chapte r for a general overview of the key features. Feature T ables Physical Features These are the main external physical features. Firmware Features These are some of the main firmware features of the NSA. T able 54 Physical Features USB Ports [...]
-
Seite 138
Appendix A Product Specifications NSA-2400 User’s Guide 138 RAID File S torage Use RAID 0 if you want pure write speed and/o r maximum capacity for your disks, and/or you have oth er means of protecting your data. Use RAID 1 if you have an even num ber of disks and want to mirror primary data to ano ther disk(s). Use RAID 5 if you have four disks[...]
-
Seite 139
Appendix A Product Specifications NSA-2400 User’s Guide 139 S pecification T ables The NSA-2400 hardware specifications are shown in the following table. The NSA-2400 firmware sp ecifications are shown in the following table T able 55 NSA-2400 Hardware Specifications IP Address 192.168.1.3 if the NSA c annot get an IP address from a DHCP server .[...]
-
Seite 140
Appendix A Product Specifications NSA-2400 User’s Guide 140 Power Consumption The NSA-2400 was tested using the specified po wer sources with the external power adapter and with four hard drives installed. " This table is a laborato ry test of NSA-2400 power consumption for your reference only . File Manageme nt Distributed File System (DFS)[...]
-
Seite 141
Appendix A Product Specifications NSA-2400 User’s Guide 141 This is the external power adaptor pinout specification Figure 62 Power Adaptor Pino ut.[...]
-
Seite 142
Appendix A Product Specifications NSA-2400 User’s Guide 142[...]
-
Seite 143
NSA-2400 User’s Guide 143 A PPENDIX B Log Messages This appendix shows some NSA-2400 log messages. Log Messages T able 58 Log Messages SEVERITY MESSAGE ARGUMENT(S) SECURITY INFO User {0} successfully log in from {1} User name IP INFO User {0} attempted to log in from {1} User name IP INFO User {0} changed password User name CRIT Admin password ch[...]
-
Seite 144
Appendix B Log Messa ges NSA-2400 User’s Guide 144 W ARNING Failed log in attempt from user {0} at {1} User name IP ERROR Failed to mount shares for user {0} User name TCPIP INFO IP changed to {0} IP INFO Changed to {0} IP Dynamic/S tatic INFO DHCP server assigned IP to {0} IP ERROR Failed to obtain dynamic IP . Revert to 192.168.1.3 INFO Set ser[...]
-
Seite 145
Appendix B Log Messages NSA-2400 User’s Guide 145 INFO Scanning external d isk {0} cancelled Disk name ERROR Failed to cancel scanning external disk {0} Disk name INFO RAID resyn c completed CRIT {0} on server {1} [{2}] failed. Please check. Disk name Hostname IP SYSTEM INFO Set system time to {0} Date/time INFO Change time zone to {0} T ime zone[...]
-
Seite 146
Appendix B Log Messa ges NSA-2400 User’s Guide 146[...]
-
Seite 147
NSA-2400 User’s Guide 147 A PPENDIX C Setting up Y our Computer ’ s IP Address All computers must have a 10M or 100M Et hernet adapter card and TCP/IP installed. W indows 95/98/Me/NT/2000/XP , Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your com[...]
-
Seite 148
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 148 Figure 63 WIndows 95/98/Me: Network: Co nfiguration Inst alling Components The Network window Configuration tab displays a list of installed components. Y ou need a network adapter , the TCP/IP protocol and Client for Microsoft Netwo rks. If you need the adapter: 1 In th[...]
-
Seite 149
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 149 Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically . • If you have a static IP address, sel[...]
-
Seite 150
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 150 Figure 65 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know you r gateway’ s IP addr ess, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add . 5[...]
-
Seite 151
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 151 Figure 66 Windows XP : S tart Menu 2 In the Control Panel , double-click Network Connections ( Network and Dial-up Connections in W indow s 2000/NT). Figure 67 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Pr operties .[...]
-
Seite 152
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 152 Figure 68 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the Genera l tab in W in XP) and then click Properties . Figure 69 Windows XP: Loca l Area Connection Properties 5 The Internet Protocol TCP/IP Pr operties win[...]
-
Seite 153
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 153 Figure 70 Windows XP: Internet Protocol (TCP/IP) Prope rties 6 If you do not know your gateway's IP ad dress, remove any previously installed gateways in the IP Settings tab and click OK . Do one or more of the fo llowing if you want to configure additi onal IP addr[...]
-
Seite 154
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 154 Figure 71 Windows XP : Advanced TCP/ IP Properties 7 In the Internet Protocol TCP/IP Pr operties window (the General tab in W indow s XP): • Click Obtain DNS server address automatically if yo u do not know your DNS server IP address(es). • If you know your DNS serve[...]
-
Seite 155
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 155 Figure 72 Windows XP: Internet Protocol (TCP/IP) Prope rties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window . 9 Click Close ( OK in W i ndows 2000/NT) to close the Local Area Connection Properties window . 10 Close the Network Connections w indow ( [...]
-
Seite 156
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 156 Figure 73 Macintosh OS X: Apple Menu 2 Click Network i n the icon bar . • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure list.[...]
-
Seite 157
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 157 V erifying Settings Check your TCP/IP properties in the Network window . Linux This section shows you how to configure your computer’ s TCP/IP settings in Red Hat Linux 9.0. Procedure, screens an d file location may vary depe nding on your Linux distribution and releas[...]
-
Seite 158
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 158 Figure 76 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dyna mic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address, click S tatically set IP Addresses and fill in th[...]
-
Seite 159
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 159 Figure 78 Red Hat 9.0: KDE: Networ k Configuration: Activate 7 After the network card restart proc ess is complete, make sure the St a t u s is Active in the Network Configuration screen. Using Configuration Files Follow the steps below to edit the network co nfiguration[...]
-
Seite 160
Appendix C Setting up Your Computer’s IP Address NSA-2400 User’s Guide 160 Figure 81 Red Hat 9.0: DNS Settings in resolv .conf 3 After you edit and save the configuration files, you must restar t the network card. Enter ./network restart in the /etc/rc.d/init.d directory . The following figure shows an example. Figure 82 Red Hat 9.0: Rest art E[...]
-
Seite 161
NSA-2400 User’s Guide 161 A PPENDIX D Open Source Licences Notice Information herein is subject to change withou t notice. Companies, name s, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical , for any purpos e, except the express [...]
-
Seite 162
Appendix D Open Source Licences NSA-2400 User’s Guide 162 “Derivative W orks” shall mean any work, whether in Source or Object form, that is based on (or derived from) the W ork and for which the edit orial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship . For the purposes of [...]
-
Seite 163
Appendix D Open So urce Licences NSA-2400 User’s Guide 163 distributed as part of the Derivative W orks; within the Source form or documentation, if provided along with the Derivative W orks; or , within a display genera ted by the Derivative W o rks, if and wherever such third-party no tices n ormally appear . The contents of the NOTICE file are[...]
-
Seite 164
Appendix D Open Source Licences NSA-2400 User’s Guide 164 Redistribution and use in source and binary fo rms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source co de must retain the above copyright notice, this li st of conditions and the following disclaimer . Redistributions in[...]
-
Seite 165
Appendix D Open So urce Licences NSA-2400 User’s Guide 165 The licenses for most software ar e de signed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your free dom to share and change free software--to make su re the software is free for all its users. This license, the L[...]
-
Seite 166
Appendix D Open Source Licences NSA-2400 User’s Guide 166 W e ca ll this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Pu blic License. It also provides other free software developers Less of an advant age over competing non-free programs. Thes e disadvan tages ar[...]
-
Seite 167
Appendix D Open So urce Licences NSA-2400 User’s Guide 167 1. Y ou may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuou sly and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that[...]
-
Seite 168
Appendix D Open Source Licences NSA-2400 User’s Guide 168 compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library , but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a [...]
-
Seite 169
Appendix D Open So urce Licences NSA-2400 User’s Guide 169 required form of the “work that uses the Librar y” must include any data and utility programs needed for reproducing the executable from it. Howeve r , as a special exception, the materia ls to be distributed need not include an ything that is normally distributed (in either source or[...]
-
Seite 170
Appendix D Open Source Licences NSA-2400 User’s Guide 170 contest validity of any such claims; this sec tion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have mad e generous contributions to the wide range of software distributed through tha[...]
-
Seite 171
Appendix D Open So urce Licences NSA-2400 User’s Guide 171 END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, auto fs, device-mapper , evms, exim. Lm_sensors, mdadm, pam_mount, raid tools, samba, sg_utils, smartmontool s, vsftpd, xfsprogs and Linux kernel software under GPL license. GNU GENERAL PUBLIC LICENSE V ersion 2 , June 199[...]
-
Seite 172
Appendix D Open Source Licences NSA-2400 User’s Guide 172 0. This License ap plies to any program or othe r work which contains a notice pla ced by the copyright holder saying it may be distributed under the terms of this Ge neral Public License. The “Program”, belo w , refers to any such prog ram or work, and a “work based on the Program?[...]
-
Seite 173
Appendix D Open So urce Licences NSA-2400 User’s Guide 173 3. Y ou may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sec tions 1 and 2 above provided that you also do one of the following: a) Accompany it with the comple te corresponding machine-readab le source code,[...]
-
Seite 174
Appendix D Open Source Licences NSA-2400 User’s Guide 174 directly or indirectly through you, then the on ly way you could satisfy both it and this License would be to refrain entirely from di stribution of the Program. If any portion of this section is held invalid or unenforce able under any particul ar circumstance, the balance of the se ction[...]
-
Seite 175
Appendix D Open So urce Licences NSA-2400 User’s Guide 175 INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DA T A OR DA T A BEING RENDERED INACCURA TE OR LOSSES SUST AINED BY YOU OR THIRD P AR TIES OR A F AILURE OF THE PROGRAM TO OPERA TE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER P AR TY HAS BEEN ADVISED OF THE POS[...]
-
Seite 176
Appendix D Open Source Licences NSA-2400 User’s Guide 176 Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays unde r a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-s tyle Open Source l[...]
-
Seite 177
Appendix D Open So urce Licences NSA-2400 User’s Guide 177 Original SSLeay License -------------------------------- Copyright (C) 1995-1998 Eric Y oung (e ay@cryptsoft.com) A ll rights reserved. This package is an SSL implementation written by Eric Y oung (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’ s SSL.[...]
-
Seite 178
Appendix D Open Source Licences NSA-2400 User’s Guide 178 This Product include mod _ ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights rese rved. Redistribution and us e in source and binary forms, with or without modification, are permitte d provided that th[...]
-
Seite 179
Appendix D Open So urce Licences NSA-2400 User’s Guide 179 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number . Once covered code has been published unde r a particular version of th e license, you may always c ontinue to use it under the terms of t[...]
-
Seite 180
Appendix D Open Source Licences NSA-2400 User’s Guide 180 1.2. “Contributor V ersion” means the combina tion of the Original Code, prior Modifications used by a Contributor , and th e Modifications made by that partic ular Contributor . 1.3. “Covered Code” means the Original Code or Modifications or th e combination of the Original Code a[...]
-
Seite 181
Appendix D Open So urce Licences NSA-2400 User’s Guide 181 The Initial Developer hereby grants Y ou a wo rld-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify , display , perfor[...]
-
Seite 182
Appendix D Open Source Licences NSA-2400 User’s Guide 182 Any Modification which Y ou create or to which Y ou contribute must be made available in Source Code form under the terms of this Licen se either on the same media as an Executable version or via an accepted Electronic Distribu tion Mechanism to anyone to whom you made an Executable versio[...]
-
Seite 183
Appendix D Open So urce Licences NSA-2400 User’s Guide 183 Contributor . Y ou must make it absolutely clear than any such warranty , support, indemnity or liability obligation is of fered by Y ou alone, and Y ou hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contri[...]
-
Seite 184
Appendix D Open Source Licences NSA-2400 User’s Guide 184 Once Covered Code has been published under a particul ar version of the License, Y ou may always continue to use it under the terms of that version. Y ou may also choose to use such Covered Code under the terms of any sub sequent version of the License published by Netscape. No one other t[...]
-
Seite 185
Appendix D Open So urce Licences NSA-2400 User’s Guide 185 any software, hardware, or device , other than such Participant's Contributor V ersion, directly or indirectly infringes any patent, then any ri ghts granted to Y ou by such Participant under Sections 2.1(b) and 2.2 (b) are revoked effective as of the date Y ou first made, used, sold[...]
-
Seite 186
Appendix D Open Source Licences NSA-2400 User’s Guide 186 As between Initial Developer and the Contri butors, each party is responsible for claims and damages arising, directly or indirectly , out of its utilization of rights under this License and Y ou agree to work with Initial De veloper and Contributors to dist ribute such responsibility on a[...]
-
Seite 187
Appendix D Open So urce Licences NSA-2400 User’s Guide 187 The above copy right notice and this permission not ice shall be included in all copies or substantial portions of the Software. THE SOFTW ARE IS PROVIDED “AS IS”, WITHOUT W ARRANTY OF ANY KIND , EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED T O THE W A RRANTIES OF MERCHANT ABILITY , [...]
-
Seite 188
Appendix D Open Source Licences NSA-2400 User’s Guide 188 4.Restrictions Y ou may not publish, display , disclose, sell, re nt, lease, modify , store, loan, distribute, or create derivative works of the Software, or any part thereof. Y ou may not assign, sublicense, convey or otherwise transfer , pledge as secur ity or otherwise encumber the righ[...]
-
Seite 189
Appendix D Open So urce Licences NSA-2400 User’s Guide 189 DOCUMENT A TIO N OR OTHER WISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME ST A TES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMIT A TION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENT AL DAMAGES, THE ABOVE LIMIT A TION MA Y NOT APPL Y TO YOU. 8.Expo[...]
-
Seite 190
Appendix D Open Source Licences NSA-2400 User’s Guide 190[...]
-
Seite 191
NSA-2400 User’s Guide 191 A PPENDIX E Legal Information Copyright Copyright © 2006 by ZyXEL Communications Corporation. The contents of this publication may not be reprod uced in any part or as a whole, transcribed, stored in a retrieval system, tran slated into any language, or transmitted in any form or by any means, el ectronic, mechanical , [...]
-
Seite 192
Appendix E Legal In formation NSA-2400 User’s Guide 192 This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Vie wing Certifications 1 Go to http://www .zyxel.com . 2 Select your product on the ZyXEL home pag e to go to that product's page. 3 Select[...]
-
Seite 193
NSA-2400 User’s Guide 193 A PPENDIX F Customer Support Please have the following information r eady when you contact customer support. Required Information • Product model and serial number . • W arranty Information. • Date that you received your de vice. • Brief description of the problem and the steps you took to solv e it. Corporate He[...]
-
Seite 194
Appendix F Custom er Support NSA-2400 User’s Guide 194 Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk • T elephone: +45-39-55-07-00 • Fax: +45-39-55-07-07 • W eb Site: www .zyxel.dk • Re g ul a r Ma i l: ZyXEL Communicati ons A/ S, Columbusvej, 2860 Soebor g, Denmark Finland • Support E-mail: support@zyxel[...]
-
Seite 195
Appendix F Customer Support NSA-2400 User’s Guide 195 • T elephone: +7-3272-590-698 • Fax: +7-327 2-590-689 • W eb Site: www .zyxel.kz • Re g u la r Ma i l: ZyXEL Kazakhstan, 43, Dostyk ave.,Office 414, Dost yk Business Centre, 050010, Almaty , Republic of Kazakhstan North America • Support E-mail: support@zyxel.com • Sales E-mail: sa[...]
-
Seite 196
Appendix F Custom er Support NSA-2400 User’s Guide 196 • W eb Site: www .zyxel.es • Re g ul a r M ai l : ZyXEL Communications, Arte, 21 5ª planta, 28033 Madrid, Spain Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • T elephone: +46-31-744-7700 • Fax: +46-31-744-7701 • W eb Site : www .zyxel.se • Re g ul [...]
-
Seite 197
Index NSA-2400 User’s Guide 197 Index A access rights 51 active sessions 44 , 45 anonmyous 65 anonymous FTP 73 ANONYMOUS CIFS 65 , 13 1 ANONYMOUS FTP 65 , 131 anonymous FTP access 78 apac he license 161 auto shares 54 B backups creating 86 purge settings 88 restoring 88 run now 86 schedule 86 C certifications 139 , 19 1 notices 191 viewing 192 ch[...]
-
Seite 198
Index NSA-2400 User’s Guide 198 F FAT 1 6 108 FAT 3 2 108 FCC interf erence statemen t 191 file storage system 139 File T ransfer Pr otocol (FTP) 72 firmware specifications 139 firmware upgrade 121 firmware version 44 , 83 , 11 4 FTP connection limit 78 FTP settings 78 G Genie Backup Manager 138 port conflict 82 Gigabit Ethernet 137 global NSA Ic[...]
-
Seite 199
Index NSA-2400 User’s Guide 199 network security 140 non-admin users 58 NSA backup volume types 83 NSA Discovery Utility (NDU) 138 NSA-2400 26 , 27 NTFS 108 NTP time servers 11 5 O open source licences 161 Open SSL License 175 , 176 OpenLDAP 175 OpenLDAP Public License 175 operating humidity 139 operating temperature 139 outgoing mail server (SMT[...]
-
Seite 200
Index NSA-2400 User’s Guide 200 syntax conventions 4 system info 48 system logs 46 system management 140 T temperature 44 time ou t 33 time se rver 11 4 time serve r address 11 6 time zone 11 6 troubleshooting backups 132 domain user share access 131 external disks 133 forgot password 127 LED indicators 125 ALM 127 DIAG 126 LAN 127 PWR 126 SYS 12[...]
-
Seite 201
Index NSA-2400 User’s Guide 201[...]
-
Seite 202
Index NSA-2400 User’s Guide 202[...]