ZyXEL Communications NSA-2401 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung ZyXEL Communications NSA-2401 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von ZyXEL Communications NSA-2401, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung ZyXEL Communications NSA-2401 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung ZyXEL Communications NSA-2401. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung ZyXEL Communications NSA-2401 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts ZyXEL Communications NSA-2401
- Den Namen des Produzenten und das Produktionsjahr des Geräts ZyXEL Communications NSA-2401
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts ZyXEL Communications NSA-2401
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von ZyXEL Communications NSA-2401 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von ZyXEL Communications NSA-2401 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service ZyXEL Communications finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von ZyXEL Communications NSA-2401 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts ZyXEL Communications NSA-2401, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von ZyXEL Communications NSA-2401 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    www .zyxel.com NSA-2401 Network S torage Appliance User ’ s Guide V ersion 1.10 3/2009 Edition 1 DEFAULT LOGIN LAN1 IP Address 192.168 .1.3 LAN2 IP Address 192.168.100.3 Username admin Password 1234[...]

  • Seite 2

    [...]

  • Seite 3

    About This User's Guide NSA-2401 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the W eb Configurator . Related Document ation • Quick Start Guide The Quick S tart Guide is designed to help yo u get up and running right away . It contains information on s[...]

  • Seite 4

    Document Conventions NSA-2401 User’s Guide 4 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User ’ s Guide. 1 W arnings tell you about things that could harm you or your device. " Notes tell you other important informati on (for example, other things you may need to configure or helpful tip s) o[...]

  • Seite 5

    Document Conventions NSA-2401 User’s Guide 5 Icons Used in Figures Figures in this User ’ s Guide may use the follo wing generic icons. The NSA icon is not an exact representation of your device. NSA Computer Notebook computer Server Firewall Switch Router[...]

  • Seite 6

    Safety Warnings NSA-2401 User’s Guide 6 Safety Warnings 1 For your safety , be sure to read and follow all warni ng notices and instructions. • Do NOT use this product near water , for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store thin gs on the device.[...]

  • Seite 7

    Safety Warnings NSA-2401 User’s Guide 7 Y our product is marked w ith this symbol, which is known as the WEEE mar k. WEEE stands for W aste Electronics and Electrical Equi pment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately .[...]

  • Seite 8

    Safety Warnings NSA-2401 User’s Guide 8[...]

  • Seite 9

    Contents Overview NSA-2401 User’s Guide 9 Contents Overview Introduction and T utorials .................................................................................. .................. .2 9 Getting to Know Y our NS A .............. ............ ................. ............. ................ ............. ............ ..... .. 31 Introducin[...]

  • Seite 10

    Contents Overview NSA-2401 User’s Guide 10[...]

  • Seite 11

    Table of Contents NSA-2401 User’s Guide 11 Table of Contents About This User's Guide ........................................... ............................................................. .. 3 Document Conventions.................................................................. ......................................... .4 Safety Warnings[...]

  • Seite 12

    Table of Contents NSA-2401 User’s Guide 12 2.6 Administration Screens .................... ... ............. ... .... ... ... ............. ... ... .... ... ............. ... ... ... ... . ... 47 2.6.1 Global Administration Ic ons ............. ................ ............. ............. ................ ............. ... 48 2.6.2 Navigation Pan[...]

  • Seite 13

    Table of Contents NSA-2401 User’s Guide 13 Chapter 4 St atus Screen ............................................................ ..................................................... ...... 1 17 4.1 S tatus Screen ........ ... .... ... ............. ... ... ............. ... .... ... ............. ... ... ... ............. .... ... ....... ......[...]

  • Seite 14

    Table of Contents NSA-2401 User’s Guide 14 7.1.1 What Y ou Can Do in the Network Screen s ............ ............. ................ ............. ........ 159 7.1.2 What Y ou Need to Know About the Network Screens .. ... ... ... .... ... ... ... .... ... ... ... ... .... . 159 7.2 TCP/IP Screen . ... ... ... .... ... ... ... ............. ... .[...]

  • Seite 15

    Table of Contents NSA-2401 User’s Guide 15 9.5 Backup Software Screen .... ... .... ... ............. ... ... ... .... ... ... ............. ... ... .... ... ... ... ............. ... .... . 2 20 Chapter 10 Application Screens .................................................. .......................................................... .2 2 3 10.1[...]

  • Seite 16

    Table of Contents NSA-2401 User’s Guide 16 12.6 External USB Disks .......... ............. .......... ...... ............. ............. ................ ............. ......... .. 255 Chapter 13 Product Sp ecifications ........................................................ ................................................. 257 13.1 Feature T a[...]

  • Seite 17

    List of Figures NSA-2401 User’s Guide 17 List of Figures Figure 1 NSA Overview .. ................. ............. ................ ............. ............. ................ ............. .. ................. 31 Figure 2 NSA Front Panel LEDs .. ............. ................ ............. ................. ................ ............. .......[...]

  • Seite 18

    List of Figure s NSA-2401 User’s Guide 18 Figure 39 Displaying the NSA .. ............. ................ ................ ............. ................ ............. ......... .............. 67 Figure 40 Alternate Met hod for Displaying the NSA ........ ............. ................ ............. ................ ........... .. 67 Figure 41 Con[...]

  • Seite 19

    List of Figures NSA-2401 User’s Guide 19 Figure 82 Protect > Backup > Add Job: S tep 2 . ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... ... .... 94 Figure 83 Protect > Backup > Add Job: S tep 3 . ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... .[...]

  • Seite 20

    List of Figure s NSA-2401 User’s Guide 20 Figure 125 S torage > Internal S torage > Dis k ... ................ ............. ............. ............. ................ ....... .... 1 28 Figure 126 S torage > Internal S torage > Dis k > S. M.A.R.T . (Brief Summary) ................ ................ ..... 130 Figure 127 S torage &g[...]

  • Seite 21

    List of Figures NSA-2401 User’s Guide 21 Figure 168 Protect > Backup > Add: St ep 2 ...... ................ ............. ............. ............. ............. .......... .... 2 04 Figure 169 Protect > Backup > Add Job: Step 3 ...................... ............. ............ ............. ................ .... .2 0 6 Figure 170 P[...]

  • Seite 22

    List of Figure s NSA-2401 User’s Guide 22 Figure 21 1 Windows XP: St art Menu .................. ................ ............. ................ ............. ................ . ....... 2 76 Figure 212 Windows XP: Control Panel ................ ............. ............. ............. ............. ............. ......... ..... 2 76 Figure 213 W[...]

  • Seite 23

    List of Figures NSA-2401 User’s Guide 23 Figure 254 Internet Explorer 7: Certificate I mport Wizard ..... ................. ............ ................. ............ ..... 3 02 Figure 255 Internet Explorer 7: Certificate I mport Wizard ..... ................. ............ ................. ............ ..... 3 02 Figure 256 Internet Explorer 7:[...]

  • Seite 24

    List of Figure s NSA-2401 User’s Guide 24[...]

  • Seite 25

    List of Tables NSA-2401 User’s Guide 25 List of Tables T able 1 Dis k Drive LEDs ............. ................. ............ ................. ............. ................ ............. . .................. 32 T able 2 NS A LEDs ................... ............. ................ ............. ................ ............. ................ ...[...]

  • Seite 26

    List of Tables NSA-2401 User’s Guide 26 T able 39 RAID 1 ...... ............. ............. ................ ............. ............. ................ ............. ....... ................... . 153 T able 40 RAID 10 .... ............. ............. ................ ............. ............. ................ ............. ........ ..........[...]

  • Seite 27

    List of Tables NSA-2401 User’s Guide 27 T able 82 Protect > Restore: S tep 4 ...................... ... .... ............. ... ... ... .... ... ... ... ... .... ............. ... ... ...... ..... 2 15 T able 83 Protect > Snapshot > Snapshot Jobs Icons .............. ................ ................ ............. .............. 21 7 T ab[...]

  • Seite 28

    List of Tables NSA-2401 User’s Guide 28[...]

  • Seite 29

    29 P ART I Introduction and Tu t o r i a l s Getting to Know Y our NSA (31) Introducing the W eb Configurator (35)[...]

  • Seite 30

    30[...]

  • Seite 31

    NSA-2401 User’s Guide 31 C HAPTER 1 Getting to Know Your NSA 1.1 NSA-2401 Overview The NSA (Network Storage Appliance) allows secure storage and management of data on your network. W indows, Apple, or Linux user s can access data on it as if it was on their own computers. The NSA’ s two Gigabit Ethernet po rts can connect to two different LANs.[...]

  • Seite 32

    Chapter 1 Getting to Know Your NSA NSA-2401 User’s Guide 32 1.1.1 Front Panel LEDs The front panel LEDs tell you impo rtant information about the NSA. Figure 2 NSA Front Panel LEDs The following table describes the disk drive LEDs. Refer to the Quick Start Guide to see how to install and remove hard drives from the disk trays. The following table[...]

  • Seite 33

    Chapter 1 Getting to Know Your NSA NSA-2401 User’s Guide 33 1.1.2 Power Button Press the power button on the front panel to turn the NSA on and of f. • T o turn the NSA on: press the power button and release it. • T o turn the NSA off, press the power button in and hold it until yo u hear a beep. Then release the button. The SYS light blinks [...]

  • Seite 34

    Chapter 1 Getting to Know Your NSA NSA-2401 User’s Guide 34[...]

  • Seite 35

    NSA-2401 User’s Guide 35 C HAPTER 2 Introducing the Web Configurator This chapter describes how to acce ss the NSA W e b Configurator and provides an ove rview of its screens. 2.1 W eb Configurator Overview The W eb Configurator is an HT ML-based manage ment interface that a llows easy NSA setup and management via Inte rnet browser . Use Internet[...]

  • Seite 36

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 36 Figure 3 NDU Main Screen From the NDU main page click the icon under Admin to see the W eb Configurat or sc reen login screen. 2.2.2 Web Browser Access Open your browser and type in the IP addr ess of the NSA. If the NSA does not get IP addresses from a DHCP server , the default[...]

  • Seite 37

    Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 37 Figure 5 NSA Login Screen Y ou should see a screen asking you to change your pas sword (highly recommended) as shown next. T ype a new password (and retype it to confirm) and click Apply or click Skip . Figure 6 Change Password Screen " The Web Configurator session automati [...]

  • Seite 38

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 38 Figure 7 My NSA The icons and language labe l at the top-right of the screen are vi sible from most screens. Use the tabs at the top of the scr een to navigate betwee n the use r-level screens and menus. The following table describes the ‘global’ ic ons and tabs in the user [...]

  • Seite 39

    Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 39 The main My NSA screen displays the shares to which you have access. Figure 8 My NSA Screen The following table describes this screen. T able 4 My NSA Screen LABEL DESCRIPTION My Own Shares These are the shares that you own (a nd manage). The share icons are folder shaped. Click [...]

  • Seite 40

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 40 2.5.1 My NSA Share Browsing Screen Click My NSA and then click a share to open the followi ng screen. Use the My NSA share browsing screens to see and access share contents. • Click a folder ’ s name to go into the folder . • Click a file’ s name to be able to save the f[...]

  • Seite 41

    Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 41 The following table describes the labels in this screen. Delete Select a folder(s) or file(s) and click this icon to remove the folder(s) or file(s). Move The administrator can select a folder or file and click this button to move i t to another location w ithin this share o r an[...]

  • Seite 42

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 42 2.5.2 My NSA Share Browsing Move to or Copy to Screen The administrator can select a folder or file in the My NSA sha re browsing sc reens and click the Move to button or the Co py to button to display a share browsing sc reen like the following. Use the share browsing screen to[...]

  • Seite 43

    Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 43 The following table describes the icons in this screen. The following table describes the labels in the this screen. 2.5.4 My NSA Change Share Properties Screen Use the My NSA Change Share Pr operties screen to configure sh are management details. Click My NSA and a share’ s Co[...]

  • Seite 44

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 44 Share Name Det ails Use any character except double quotes (“), single quotes (‘), slashes ( or /), square brackets ([ ]), colons (:), semi-colons (;), angle brackets (< >), the plus si gn (+), semi-colons (;), commas (,), question marks (?), asterisks (*), and the eq[...]

  • Seite 45

    Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 45 Figure 13 My NSA Change Share Properties > Share Access Configuration The following table describes the labels in this screen. 2.5.5 Share and Folder Names The name ca n only contain the followi ng characters: • Alphanumeric (A-z 0-9) and Unicode. The NSA allows FTP access t[...]

  • Seite 46

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 46 •. [ p e r i o d s ] • - [dashes] Other limitations include: • All leading and trailing spa ces are removed automatically . • Multiple spaces within names are converted to a single space. • Share names m ust b e unique (they cann ot be the same as other sha re names). [...]

  • Seite 47

    Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 47 The following table describes the labels in this screen. 2.6 Administration Screens The A dministration tab displays when you log i n as the administrator . Click Administration in the My NSA screens to open the advanc ed administration screens. The first time you access the admi[...]

  • Seite 48

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 48 Figure 15 S tatus 2.6.1 Global Administration Icons The icons and language label at the top-right of the screen ( ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels. 1 2 3 4 T able 13 Global Labels and Icons LAB[...]

  • Seite 49

    Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 49 2.6.2 Navigation Panel The navigation panel o n the left of the W eb Configurator screens ( ) contains screen links. Click a minus (-) link to hide a category’ s scr een links. Certain screen s also contain hyper links that allow you to jump to another screen. Click the St a t [...]

  • Seite 50

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 50 The following table describes the navigation panel links. T able 14 Screens Summary CATEGORY SUB-LINK FUNCTION S tatus This screen shows system information, the status of the volumes, and the users wh o are currently using the NSA. System Setting Date/T ime Cho ose a time zone a[...]

  • Seite 51

    Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 51 2.6.3 Main Window The W eb Configurator ’ s ma in win dow () shows the screen you select in the navigation panel. It is discussed in the rest of this document. The St a t u s screen is the first administration screen to dis play . See Chapter 4 on page 1 17 for more informat io[...]

  • Seite 52

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 52 2.7 NSA RESET Button Use the RESET button on the front panel of th e NSA to reset either just the NSA’ s admin password and IP address settings or the whole fact ory default conf iguratio n file. Use an object such as an unfolded paper clip to press the RESET button. " Id[...]

  • Seite 53

    Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide 53 Figure 17 Reset and Reload T imeline " The NSA automatically restart s to co mplete reloading t he factory default configuration file. 02 1 0 Beep Beep Beep Release Release to reset to reload and restart Seconds Press button[...]

  • Seite 54

    Chapter 2 Introducing the Web Configur ator NSA-2401 User’s Guide 54[...]

  • Seite 55

    NSA-2401 User’s Guide 55 C HAPTER 3 Tutorials 3.1 Overview These tutorials show you how to perform the followin g common tasks: • How to Configure Sharing : page 55 • How to Use Shares : page 61 • How to Find the NSA in OS X : page 65 • How to Configure Security : page 68 • Power Resume : page 89 • How to Use Backups and Snapshots : p[...]

  • Seite 56

    Chapter 3 Tutorials NSA-2401 User’s Guide 56 1 Log into the W eb Configurator using your administrator Use rname and Password . Figure 18 Administrator Login 2 In the My NSA screen, click Administration . Figure 19 My NSA[...]

  • Seite 57

    Chapter 3 Tutorials NSA-2401 User’s Guide 57 3 Once the W eb Configurator workspace appears, click Sharing > Users to open the user account manage ment area. Figure 20 Sharing > Users 4 Click Add Account to open the Create a New Acc o u n t screen. Figure 21 Sharing > Users > Create a New Account[...]

  • Seite 58

    Chapter 3 Tutorials NSA-2401 User’s Guide 58 • Enter an account name and password. • Set how many megabytes of sto rage the account can use in each of the NSA ’ s volumes. Y ou can set a different quota fo r each volume. A value of “0” MB means unlimited storage. • Enter the user ’ s e-mail address and any deta ils or identifying in[...]

  • Seite 59

    Chapter 3 Tutorials NSA-2401 User’s Guide 59 2 Specify a name for the gro up. Select Gonzo and click Add Selected User(s) to include Gonzo in the group. Click Apply . Figure 23 Sharing > Group s > Add Share 3.2.3 Setting Up Shares Y ou’ve crea ted accounts for Gonzo and Kermit and now you want to create a share for ea ch of them. Y ou als[...]

  • Seite 60

    Chapter 3 Tutorials NSA-2401 User’s Guide 60 2 Specify a name for the share and select the volume it should be on. Select Kermit as the owner and set the Share Access to Advance d and click Edit . Figure 25 Sharing > Shares > Add Share 3 Include Senior -Management under Full and click Apply . This way both Kermit and the senior managers hav[...]

  • Seite 61

    Chapter 3 Tutorials NSA-2401 User’s Guide 61 4 Back in the Edit Shares screen, click Apply . Figure 27 Sharing > Shares > Add Share Now that you have created Kermit’ s share, yo u can go through th e steps again to create another share for Gonzo. For Gonzo’ s share, set the Share Access to Keep it private to owner . 3.3 How to Use Share[...]

  • Seite 62

    Chapter 3 Tutorials NSA-2401 User’s Guide 62 3 Enter Gonzo’ s username and password and click OK . Figure 29 Entering the Share Usernam e and Password 4 Now Gonzo can use the share like a drive on his computer . Click File > New > Folder and create a folder named “Strategy”. Figure 30 Creating a Folder 5 Copy and paste the 20 09-Plan.[...]

  • Seite 63

    Chapter 3 Tutorials NSA-2401 User’s Guide 63 1 Open Firefox and enter http://192.168.1.35 to open the login scr een. Enter Gonzo’ s username and pas sword and clicks Login . Figure 32 User Login 2 Click the Gonzo share. Figure 33 Gonzo’s My NSA Scree ns[...]

  • Seite 64

    Chapter 3 Tutorials NSA-2401 User’s Guide 64 3 Open the St r a t e g y share. Figure 34 Gonzo Sha re Screen[...]

  • Seite 65

    Chapter 3 Tutorials NSA-2401 User’s Guide 65 4 Click Upload . Figure 35 S trategy Folder Screen 5 Browse to the 2010-2014-Pl ans.doc file and click Apply . Figure 36 Upload Files Screen 3.4 How to Find the NSA in OS X Here’ s how to find the NSA-2401 OS X. Th is example uses Mac OS X 10.5 (Leopard).[...]

  • Seite 66

    Chapter 3 Tutorials NSA-2401 User’s Guide 66 1 Click the Finder icon in the dock. Figure 37 Opening the Finder 2 Select All under Shared in the sidebar . An entry for the NSA appears in the Network list. Figure 38 Displaying the NSA[...]

  • Seite 67

    Chapter 3 Tutorials NSA-2401 User’s Guide 67 3 Click the triangle beside th e NS A’ s name to disp lay the shares that Gonzo can use. Figure 39 Displaying the NSA Alternatively , yo u can also conn ect directly to the NSA from the Go Menu in the Finder . Simply click Go > Connect to Server . Figure 40 Alternate Method for Displaying the NSA[...]

  • Seite 68

    Chapter 3 Tutorials NSA-2401 User’s Guide 68 4 When the Connect to Server dialog box opens, type smb:// and the IP address of your NSA-2401 or click Browse to find it in your network. Click Connect . Figure 41 Connecting to the NSA 5 Once connected, you c an now access the NS A from the finder or directly from the desktop. 3.5 How to Configure Se[...]

  • Seite 69

    Chapter 3 Tutorials NSA-2401 User’s Guide 69 3.5.1.1 Customizing the NSA’ s Certificate 1 Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit . Figure 42 Maintenance > SSL 2 Next, let’ s modify the certificate by changing the Common Name to this NSA’ s IP address of 192.168.1 .35, the Organization [...]

  • Seite 70

    Chapter 3 Tutorials NSA-2401 User’s Guide 70 3 The NSA restarts its network services and returns you to the login screen. Figure 44 Maintenance > SSL > Edit a Self-Signed Certificate[...]

  • Seite 71

    Chapter 3 Tutorials NSA-2401 User’s Guide 71 3.5.1.2 Downloading and Inst alling the NSA’ s Customized Certificate 1 Log in and return to Maintenance > SSL . Under Modify the Existing Certificate , click Download . Figure 45 Maintenance > SSL 2 Save the file to your computer . Figure 46 Downloading the NSA’s Certificate[...]

  • Seite 72

    Chapter 3 Tutorials NSA-2401 User’s Guide 72 3 Find the certificate file on yo ur computer and double-click it. Figure 47 Downloading the NSA’s Certificate 4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in W indows. See Appendix C on page 299 for other exam ples. In the Certificate di[...]

  • Seite 73

    Chapter 3 Tutorials NSA-2401 User’s Guide 73 5 In the Certificate Import Wizard , click Nex t . Figure 49 Certificate I mport Wizar d: Welcome 6 Leave Automatically select certificate store based on the type of certificate selected and click Next . Figure 50 Certificate I mport Wiza rd: Certificate S tore[...]

  • Seite 74

    Chapter 3 Tutorials NSA-2401 User’s Guide 74 7 In the Completing the Ce rtificate Import W izard screen, click Finish . Figure 51 Certificate I mport Wizar d: Finish 8 If you are presented with anot her Security W arning , click Ye s . Figure 52 Security W arning 9 Finally , click OK when presented with the successf ul certificate installation me[...]

  • Seite 75

    Chapter 3 Tutorials NSA-2401 User’s Guide 75 3.5.1.3 T urn on the NSA’ s W eb Security Now that you have customized the NSA’ s certific ate and installed it in your computer , you can turn on security for your W eb Configurator sessions. This example uses Firefox 3.0. See Appendix C on pa ge 299 for more informat ion on browsers and c ertific[...]

  • Seite 76

    Chapter 3 Tutorials NSA-2401 User’s Guide 76 2 A warning screen pops up if ap plying your change may disconnect some users. Click Apply to continue. Figure 55 Maintenance > SSL > Force HTTPS W a rning 3 The NSA logs you out and autom atically redirects your formerly non-s ecure (HTTP) connection to a secure (HTTPS) connection. Y our browser[...]

  • Seite 77

    Chapter 3 Tutorials NSA-2401 User’s Guide 77 4 Click Add Exception . Figure 57 Firefox: Secure Connection Failed 5 Click Get Certificate . Figure 58 Firefox: Add Secu rity Exception[...]

  • Seite 78

    Chapter 3 Tutorials NSA-2401 User’s Guide 78 6 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click Vie w . Figure 59 Firefox: Add Secu rity Exception[...]

  • Seite 79

    Chapter 3 Tutorials NSA-2401 User’s Guide 79 7 The SHA1 fingerprint must match the NSA’ s certificate you downloaded from the NSA to your computer . (Double -click the NSA’ s ce rtificate file and then click Details and look at the Thumbprint ). Click Close . Figure 60 Firefox: Add Secu rity Exception[...]

  • Seite 80

    Chapter 3 Tutorials NSA-2401 User’s Guide 80 8 If the certificate fingerprints match, click Confirm Security Exception , otherwise click Cancel . Figure 61 Firefox: Add Secu rity Exception[...]

  • Seite 81

    Chapter 3 Tutorials NSA-2401 User’s Guide 81 9 The login screen displays. Figure 62 HTTPS Login Now , anyone who connects to the NSA’ s W eb Configurator scr eens will automatically do so by HTTPs. Use a secure method to let your users know the corre ct fingerprint for the NSA’ s certificate so they can check it before adding a security excep[...]

  • Seite 82

    Chapter 3 Tutorials NSA-2401 User’s Guide 82 1 Open FileZilla and click File > Site Manager > New Site . • Configure the Host field with the NSA’ s address. • Set the Servertype to FTPES - FTP over explicit TLS/ SSL . • Configure the account name and password. • Click Connect. Figure 63 FileZilla Site Manager[...]

  • Seite 83

    Chapter 3 Tutorials NSA-2401 User’s Guide 83 2 A security warning screen displays. The SHA1 fingerprint must match the NSA’ s certificate you downloaded from the NSA to your computer . (Double-click the NSA’ s certificate file and then click Details and look at the Thum bprint ). If they match, click OK . Figure 64 FileZilla Unknown Certifica[...]

  • Seite 84

    Chapter 3 Tutorials NSA-2401 User’s Guide 84 2 Set the Share Access to Advanced and click Edit . Figure 66 Sharing > Shares > Edit Share 3 Move Senior -Management and Kermit to Read Only . Click Apply in this screen and again in the edit screen. Figure 67 Share Access Configuratio n[...]

  • Seite 85

    Chapter 3 Tutorials NSA-2401 User’s Guide 85 3.5.3.2 Setting the ACL to Deny Access to a File Now you need to stop Kermit from accessing the 2010-2014-Plans file. 1 Select the Gonzo share, and click ACL Pr operties . Figure 68 Sharing > Shares 2 Click New ACL . Figure 69 Sharing > Shares > ACL Configuratio n[...]

  • Seite 86

    Chapter 3 Tutorials NSA-2401 User’s Guide 86 3 Open the St r a t e g y folder . Figure 70 Sharing > Shares > ACL Configura tio n > New ACL 4 Select the 2010-2014-Plans.doc file and click Set ACL . Figure 71 Sharing > Shares > ACL Configuratio n > New ACL > Str ategy[...]

  • Seite 87

    Chapter 3 Tutorials NSA-2401 User’s Guide 87 5 Move Gonzo to Deny . Figure 72 Sharing > Shares > ACL Configuratio n > New ACL > Str ategy > Set ACL[...]

  • Seite 88

    Chapter 3 Tutorials NSA-2401 User’s Guide 88 6 A Restricted File icon appears beside the 20 10-2014-Plans.doc file. Click Close . Figure 73 Sharing > Shares > ACL Configuratio n > New ACL > Str ategy 7 This screen lists the St r a t e g y share’ s ACLs. Click Close . Figure 74 Sharing > Shares > ACL Configuratio n > New ACL[...]

  • Seite 89

    Chapter 3 Tutorials NSA-2401 User’s Guide 89 3.6 Power Resume T o keep the NSA opera ting as mu ch of the time as possible, do the following to have the NSA automatically restart when the power comes back on after a power failure. Click Maintenance > Power Management . Select Always Power On and click Apply . Figure 75 Maintenance > Power M[...]

  • Seite 90

    Chapter 3 Tutorials NSA-2401 User’s Guide 90 3.7.1 Creating a Snap shot Job Here’ s an example of configurin g hour ly snapshots for a volume. 1 Click Pr otect > Snapshot > Add Job . Figure 76 Protect > Snapshot[...]

  • Seite 91

    Chapter 3 Tutorials NSA-2401 User’s Guide 91 2 Enter a name for the job, select the volume of which to take snapsh ots, set the number of snapshot images to keep (2 in this example). For the fre quency , set it to occur every hour . Click Apply . " It’s strongly recommended to set the maximum amount of snapshot s setting as low as possible[...]

  • Seite 92

    Chapter 3 Tutorials NSA-2401 User’s Guide 92 For example, Gonzo accide ntly overwrote his 2009-Plan .doc file. Use W indows Explorer to browse to the Gonzo sh are. (The Quick Start Guide covers how to map a share to a W indows network drive). Figure 79 Using a Snap shot Image • There is a snap-share folder with a folder for each snap-sho t of v[...]

  • Seite 93

    Chapter 3 Tutorials NSA-2401 User’s Guide 93 2 Name the backup job and select Synchronization . Gonzo wants only his current set of files in the remote NSA’ s folder , so you select Mirror to make the tar get folder identical to the source folder . The NSA deletes any other files in the target folder . Figure 81 Protect > Backup > Add Job[...]

  • Seite 94

    Chapter 3 Tutorials NSA-2401 User’s Guide 94 3 Select the folder that needs to be mirrored (the Gonzo share’ s S trategic-Pa rtners folder in this example) and Remote . • Enter the other NSA’ s addre ss and administrator password. • Click Show target content to display the remote NSA’ s contents. • Select the destination on the remote[...]

  • Seite 95

    Chapter 3 Tutorials NSA-2401 User’s Guide 95 4 Click OK in the warnin g dialog box. Figure 83 Protect > Backup > Add Job: S tep 3 5 For this example, as s um e the connection to the German branch of fice is a good one and not many files need to be backed up so leave the c ompression off. • T urn on the encryption to protect these sens iti[...]

  • Seite 96

    Chapter 3 Tutorials NSA-2401 User’s Guide 96 6 Schedule the backup to occur ev ery morning at 3:00 and click Done . Figure 85 Protect > Backup > Add Job: S tep 4 Y ou do not need to use a special restore proc ess to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA ’ s Backups share ca[...]

  • Seite 97

    Chapter 3 Tutorials NSA-2401 User’s Guide 97 2 Identify the backup job and select Archive . New files are often added to the shares tha t you need to back up and existing files are not frequently changed so select Incremental . The NSA does a full backup first and later only copies source files that are new and/or mo dified since the last backup.[...]

  • Seite 98

    Chapter 3 Tutorials NSA-2401 User’s Guide 98 3 Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’ s address, us ername, password, and share name. If you want to make sure the rem ote NSA is rea chable, click T est Connection . Figure 88 Protect > Backup > Add Job: S tep 2[...]

  • Seite 99

    Chapter 3 Tutorials NSA-2401 User’s Guide 99 4 In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the targ et NSA so you can leave the encryption off, too. Have the NSA keep 3 back ups. Figure 89 Protect > Backup > Add Job: S tep 3 5 Set the frequency to We e k l y . Schedule the ba[...]

  • Seite 100

    Chapter 3 Tutorials NSA-2401 User’s Guide 100 1 Click Pr otect > Backup screen, select a bac kup job and click Restore Archive . Figure 91 Protect > Backup 2 Select which backup to use and click Next . Figure 92 Protect > Backup > Restore Archive: S tep 1[...]

  • Seite 101

    Chapter 3 Tutorials NSA-2401 User’s Guide 101 3 Select the Gonzo share and click Next . Figure 93 Protect > Backup > Restore Archive: S tep 2 4 Select the original location and click Done . Figure 94 Protect > Backup > Restore Archive: S tep 3[...]

  • Seite 102

    Chapter 3 Tutorials NSA-2401 User’s Guide 102 5 The NSA restores the files into the Gonzo share. When it finishes you can access the files. Figure 95 Protect > Backup > Restore Archive: Progress 3.7.7 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot resto[...]

  • Seite 103

    Chapter 3 Tutorials NSA-2401 User’s Guide 103 2 Select the backup job and backup time and click Next . Figure 97 Protect > Restore: S tep 2 3 Select everything in the Gonzo sh are except the recycle folder . Click Next . Figure 98 Protect > Restore: S tep 3[...]

  • Seite 104

    Chapter 3 Tutorials NSA-2401 User’s Guide 104 4 Specify where you want to put the files. Browse to “/Gonzo”. Click Done . Figure 99 Protect > Restore: S tep 4 The NSA restores the files and you can use them again. 3.8 Printer Server T utorial Do the following to configure the NSA to allow computers on your network to share a printer . See [...]

  • Seite 105

    Chapter 3 Tutorials NSA-2401 User’s Guide 105 3 T urn on the printer . The NSA detects it after a few moments. 4 On your computer , open your CIFS file sharing program (Win dows Explorer for example) and browse to the NSA. Double-click the printer ’ s icon. Figure 101 Printer Connected to NSA: Windows Explor er 5 If you get a warning screen, cl[...]

  • Seite 106

    Chapter 3 Tutorials NSA-2401 User’s Guide 106 Figure 104 Applications > Print Server After the driver installation finish es, the computer is ready to use the printer . Select the printer in an application to use it to print. Browse to the NSA using a CIFS program (like W indows Explorer) and double-click the printer ’ s icon to open the pri[...]

  • Seite 107

    Chapter 3 Tutorials NSA-2401 User’s Guide 107 3.9.1 Connecting External USB Hard Drives The easiest way to increase the NSA’ s storage ca pacity is to connect an external USB hard drive. External USB hard drives are great fo r providing storage ca pacity for scheduled backups and snapshots of internal volumes. (External volu mes can be the dest[...]

  • Seite 108

    Chapter 3 Tutorials NSA-2401 User’s Guide 108 " If the new hard drives have any data you want to keep, back it up to another location before you install them. A dding these hard drives to a disk array formats them so all dat a st ored on them will be lost. 1 See the Quick Start Guide for details on installing hard dr ives in the NS A’ s ba[...]

  • Seite 109

    Chapter 3 Tutorials NSA-2401 User’s Guide 109 4 Select RAID5 Reshape and click Apply . Figure 1 10 S torage > Internal S torage > RAID > Add Disk 5 After the NSA finishes adding the disk to the array , click the Disk tab. The new disk displays the same Ty p e and RAID Array as the other disks in the array . Figure 1 1 1 S torage > Int[...]

  • Seite 110

    Chapter 3 Tutorials NSA-2401 User’s Guide 11 0 1 Click the Vo l u m e tab. Select a volume and click Edit . Figure 1 12 S torage > Internal S torage > V olume 2 Increase the size and click Apply . Figure 1 13 S torage > Internal S torage > V olume > Edit 3 Repeat these steps for other volumes that need more storage capacity . 3.9.4[...]

  • Seite 111

    Chapter 3 Tutorials NSA-2401 User’s Guide 111 1 Click S torage > Internal S torage > Disk to list the installed disks. Select a disk to replace first (disk 1 in this example) and click Eject . Figure 1 14 S torage > Internal S torage > Disk 2 Click Apply . Figure 1 15 S torage > Intern al S torage > Disk > Eject 3 Remove the [...]

  • Seite 112

    Chapter 3 Tutorials NSA-2401 User’s Guide 11 2 5 Open the administration screens. In the St a t u s screen the RAID array shows up as degraded. Figure 1 17 S tatus: RAID Degrad ed 6 Install the new hard drive. In this example it’ s in disk drive bay 2. 7 The NSA automat ically repairs a degraded RAID if you insert an empty disk without an exist[...]

  • Seite 113

    Chapter 3 Tutorials NSA-2401 User’s Guide 11 3 9 The RAID’ s status displays as Recovering . Figure 120 S torage > Int ernal S tor age > RAID After the recovery finishes and the status shows up as Healthy , reboot the NSA. Then you can use the same process to migrate any (or all) of the RAID’ s drive as long as you replace them one-by-o[...]

  • Seite 114

    Chapter 3 Tutorials NSA-2401 User’s Guide 11 4[...]

  • Seite 115

    11 5 P ART II W eb Configurator St atus Screen (1 17) System Setting Screen (121) Storage Screens (125) Network Screens (159) Sharing Screens (173) Protect Screens (197) Application Screens (223) Maintenance Screens (229)[...]

  • Seite 116

    11 6[...]

  • Seite 117

    NSA-2401 User’s Guide 11 7 C HAPTER 4 Status Screen 4.1 St atus Screen The St a t u s screen is the first screen you see after you l og into the W eb Configurator (and complete the wizard for the first time). It provid es an overview of your NSA ’ s status, settings and activity . Once you leave the screen, you can return to it by clicking the [...]

  • Seite 118

    Chapter 4 Status Screen NSA-2401 User’s Guide 11 8 The following table describes the icons in this screen. The following table describes the labels in this screen. T able 16 Status Icons ICON DESCRIPTION Refresh Click this icon to refresh the data for the field or value with which it is associated. Edit Click this icon to op en the configurat ion[...]

  • Seite 119

    Chapter 4 Status Screen NSA-2401 User’s Guide 11 9 CPU T e mperature This displays the current temperature near the NSA ’s CPU. The NSA generates an emergency log if the temperature goe s ou t of the normal operating range. If the temperature goes even higher , th e NSA shuts down automatically to avoid damag e from overheating. If th e NSA ove[...]

  • Seite 120

    Chapter 4 Status Screen NSA-2401 User’s Guide 120 External V olume This displays the volumes created on USB hard drives connected to the NSA. USB ports are numbered in the order that you connect USB devices. S tatus This shows whether the external (USB) volume is Healthy , Locked , Unlocked, or Down . Name This shows the NSA-generated name for an[...]

  • Seite 121

    NSA-2401 User’s Guide 121 C HAPTER 5 System Setting Screen 5.1 Date/T ime Use the NSA System Setting > Date/Time screen to set up the time on your NSA. T o open this screen, click System Setting > Date/T ime in the navigation bar of the W eb Configurator . Choose a time zone and/or allow the NS A to synchronize w ith a time server . Figure [...]

  • Seite 122

    Chapter 5 S ystem Setting Screen NSA-2401 User’s Guide 122 5.1.1 T i m e Lag T ime lag occurs when the time on the NSA falls behind the time on the time server . This may happen if: New T ime (hh:mm:ss) This field displays the last upda ted time from the time server or the last time configured manually . When you set Date Time Setup to Manual , e[...]

  • Seite 123

    Chapter 5 System Setting Screen NSA-2401 User’s Guide 123 • The time server is no longer reachable. • The NSA is shut do wn often. The NSA intern al battery keeps time when the NSA is shut down and this may cause possible variance. • A power surge occurs. The NSA gives no warning if time lag occurs . Y ou should re-synchronize the time afte[...]

  • Seite 124

    Chapter 5 S ystem Setting Screen NSA-2401 User’s Guide 124[...]

  • Seite 125

    NSA-2401 User’s Guide 125 C HAPTER 6 Storage Screens 6.1 St orage Screens Overview Use the storage screens to work with disks, RAIDs, and volumes to manage the NSA’ s storage. 6.1.1 What Y ou Can Do in the S torage Screen s •U s e t h e Internal S torage screens ( Section 6.2 o n page 12 7 through Section 6.6.1 on page 142 ) to view and confi[...]

  • Seite 126

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 126 Encrypted V olumes When you create a volume you can encrypt it us ing either a manually entered password or a USB key . Others cannot read the data even if they take the physi cal drive. Encrypting a volume does not af fect how the volume’ s user s use it. The NSA automatically encrypts da[...]

  • Seite 127

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 127 6.2 Internal St orage St atus Screen Click S torage > Internal S torage > S tatus to display the following screen. This screen displays general information about the disks in stalled in the NSA and th e dis k array s and volumes created on them. Figure 124 S torage > I nternal S t orag[...]

  • Seite 128

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 128 6.3 Disk Y ou can view information on the NS A internal disks in this screen. Disk Replacement Restrictions See the Quick S tart Guide for information on replacing disks in the NSA. When replacing a disk in a degraded or down RAID array , the new disk must be at least the same size or bigger[...]

  • Seite 129

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 129 The following table describes the icons in this screen. The following table describes the labels in this screen. 6.3.2 S.M.A.R.T Screen Click S torage > Internal S torage > Disk to display the disk summary screen. Select a disk and click the S.M.A.R.T . icon to display the following scree[...]

  • Seite 130

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 130 Figure 126 S torage > Int ernal S tor age > Dis k > S.M.A.R.T . (Brief Summary) The following table describes this screen. T able 22 S torag e > Internal S torage > Disk > S.M.A.R .T . (Brief Summary) LABEL/ICON DESCRIPTION Device Info Format Select Brie f Summary to displa[...]

  • Seite 131

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 131 6.3.2.1 S.M.A.R.T Full Summary Set the Device Info Format field to Full Summary to display advanced details about the drive and its status. Click a column’ s heading cell to sort the table entries by that column’ s criteria. Click the heading cell again to reverse the sort order . Figure 12[...]

  • Seite 132

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 132 6.4 Arrays RAID (Redundant Array of Independent Disks) or JBOD is the storage method that the NSA uses. The storage method you use depend s on how many disks you have and how many volumes you want to create. It’ s important that yo u consider this carefully as all data is deleted when you [...]

  • Seite 133

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 133 For example if you originally have two disks co nfigured in a RAID 1 array , and you then b uy two more disks and want to config u re all four at RAID 5, you should first back up all your data on those disks (see the Genie B ackup Manager utility on the in cluded CD) and then restore your data [...]

  • Seite 134

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 134 Three Disks Choose a combination of JBOD and/or RAID 0 or RAID 1 for the reasons already outlined. W ith three disks you could create: • up to three JBOD arrays • one RAID 1 array with a hot-spare. • one single-disk JBOD array and one two-disk RAID 0 or one two-disk RAID 1 array • on[...]

  • Seite 135

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 135 • Down when an array is down and cannot be fixe d. The array cannot be used and the data is lost. Replace the faulty disk(s) and recreate the array , volumes, and sharing confi guration. If an array is down, users can no longer transfer files to/from the array’ s shares. If an array is degr[...]

  • Seite 136

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 136 The following table describes the icons in this screen. T able 25 S torag e > Inter nal S torag e > RAID Ic ons ICON DESCRIPTION Wizards Click this icon to open the Disk Setup Wizard to create a new disk array or volume. Create If you have disk space available for a new disk a rray , t[...]

  • Seite 137

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 137 Resync Speed When a disk array is resynchronizing, you can select it and click this icon to set how fast the NSA resynchronizes the disk array . A screen displays. Select the how fast the NSA should re-synchronize the array . The faster the resynchronization, the slower the performance fo r use[...]

  • Seite 138

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 138 The following table describes the labels in this screen. 6.5.1 Creating a New RAID Click the Create icon in the RAID screen as shown in Figure 128 on page 135 to create a new RAID array . Figure 129 S torage > Internal S torage > RAID > Create Sort Click a column’s heading cell to[...]

  • Seite 139

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 139 The following table describes this screen. 6.6 Internal V olume Screen Click S torage > Internal S torage > V olume to display the internal volume summary screen as shown. Use this screen to mana ge the NSA’ s internal volumes. The NSA has the following classifica tions for the status o[...]

  • Seite 140

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 140 Figure 130 S torage > I nternal S tor age > V olum e The following table describes the icons in this screen. T able 28 S torag e > Inter nal S torag e > V olume Icons ICON DESCRIPTION Wizards Click this icon to open the Disk Setup Wizard to create a new disk array or volume. Crea[...]

  • Seite 141

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 141 The following table describes the labels in this screen. Lock If an encrypted volume is unlocked, you can select it and c lick this icon to lock it. No one will be able to use the volume until an admi nistrato r unlocks it. Note: At start up, if a USB key is in serted, the NSA automatically unl[...]

  • Seite 142

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 142 6.6.1 Creating or Edit ing an Internal V olume Click S torage > Internal S torage > V olume > Cr eate to display the internal volume creation screen as shown next. Y ou can also sel ect an existing internal volume and click the Edit icon. Use this screen to add or edit internal stor[...]

  • Seite 143

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 143 6.6.2 USB Key Creation When you cre ate a volume encrypted by a USB key , click the Create USB Drive butt on to open a series of screens for creating a volu me encryption password and storing it on a connected USB device. 6.6.2.1 Selecting the USB Device When you cli ck the Create USB Drive but[...]

  • Seite 144

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 144 Figure 132 Selecting the USB Device The following table describes this screen. 6.6.2.2 Creating a Duplicate USB Ke y (Strongly Recommended) Use these screens to create extra copies of yo ur USB key in case one is lost, damage d, or stolen. W ithout a USB key , you ca nnot access the volume i[...]

  • Seite 145

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 145 Figure 134 Creating a Duplicate USB Key: Eject 3 Insert a different USB key and click Next . Figure 135 Creating a Duplicate USB Key: Insert After the duplicate USB key creation completes, you return to the firs t USB key duplication screen (see Figure 133 on page 144 ) so you can ma ke another[...]

  • Seite 146

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 146 The following table describes the icons in this screen. The following table describes the labels in this screen. T able 32 S torag e > External S torage > Disk Icons ICON DESCRIPTION Eject Select a USB-connected device and click thi s icon to be able to remove the device. Locate Select[...]

  • Seite 147

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 147 6.8 External V olume Screen Click S torage > External S torage > V olume to display the exte rnal (USB-connected) volume summa ry screen as sho wn next. Use this screen to manage the NSA’ s external storage volumes. Th e NSA automatically creates volumes when you connect an exte rnal di[...]

  • Seite 148

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 148 The following table describes the labels in this screen. Lock If an encrypted volume is unlocked, you can select it and c lick this icon to lock it. No one will be able to use the volume until an admi nistrato r unlocks it. Note that if the volume was encrypted using a USB key and the USB ke[...]

  • Seite 149

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 149 6.8.1 Creating or Editing an External V olume " Creating a volume on a US B device formats it. All dat a on the USB device is lost. Click S torage > External S torage > V olume > Create to display the external (USB- connected) volume creation screen as shown next . Y ou can also s[...]

  • Seite 150

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 150 File System Select the file syst em you want the new volume to use. If you plan to also use the USB device wi th another com puter, it is recomme nded that you select the file system that the other computer uses. Windows f ile systems fat32 : Newer , and more efficient than F A T16. Supp ort[...]

  • Seite 151

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 151 6.9 T echnical Reference This section contains background on JBOD an d the RAID levels used on the NSAand lists some common S.M.A.R.T . attributes. 6.9.1 Storage T ermin olog y These are some terms that you need to know in order to understand storage systems. •M i r r o r i n g In a RAID syst[...]

  • Seite 152

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 152 lost. Parity protection is used with striping, and the “n” pieces of data are typically the blocks or bytes distributed across the drives in the array . The parity information can either be stored on a separate, dedicated drive, or be mixed with the data across all the drives in the arra[...]

  • Seite 153

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 153 6.9.3 RAID 0 RAID 0 spreads data even ly across two or more disks (data striping) with no mirroring nor parity for data redundancy , so if on e disk fail s the entire array will be lost. The major benefit of RAID 0 is performance. The following figure shows tw o disk s in a single RAID 0 array [...]

  • Seite 154

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 154 RAID 1 capacity is limited to the size of the sm allest disk in the RAID array . For example, if you have two disks of sizes 1 50 GB and 200 GB respectively in one RA ID 1 array , then the maximum capacity is 150 GB and th e remaining space (50 GB) is unused. T ypical applications for RAID 1[...]

  • Seite 155

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 155 6.9.6 RAID 5 RAID 5 provides the best balance of capac ity and performance while providing data redundancy . It provides redund ancy by striping data across three disks and keep s the parity information (AP) on the fourth disk (in each st ripe). In case of disk failure, data can be recovered fr[...]

  • Seite 156

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 156 6.9.8 RAID and Dat a Protection If a hard disk fails and you’re us ing a RAID 1, RAID 10, or RAID 5 array then your data will still be available (but at degraded speeds until you replace the hard disk that failed and re- synchronize the array). Ho wever , RAID cannot pr otect against file [...]

  • Seite 157

    Chapter 6 Storage Scr eens NSA-2401 User’s Guide 157 12 Device Power Cycle Count This is the number of times the ha rd drive has gone throu gh a full power on and power off. 13 Soft Read Error Rate Low This is the number of uncorrected read errors the hard drive has reported. If this is not zero, back up your data. 190 Airflow T emperature Low Th[...]

  • Seite 158

    Chapter 6 Sto ra ge Scre en s NSA-2401 User’s Guide 158 207 S pin High Current This is the quantity of high cu rrent used to spin up the drive. 208 S pin Buzz This is the number of buzz routines to sp in up the drive. Whe n the arm holding the rea d/write heads is stuck, the motor driving it tries to oscillate the arm to free it. This causes an a[...]

  • Seite 159

    NSA-2401 User’s Guide 159 C HAPTER 7 Network Screens This chapter discusses the network scree ns. 7.1 Network Screens Overview Use the network screens to conf igure the NSA’ s network settings so computers can access it. 7.1.1 What Y o u Can Do in the Network Screens • Use the TCP/IP screen ( Section 7.2 on page 1 60 ) to configure th e NSA?[...]

  • Seite 160

    Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 160 DHCP DHCP (Dynamic Host Configuration Protocol , RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP config uration at start-up from a server . Y ou can configure the NSA as a DHCP client which means it is set to receive an IP address from a DHCP serve r . The NDU can help you d[...]

  • Seite 161

    Chapter 7 Network Screens NSA-2401 User’s Guide 161 Figure 140 Fault T olerance T eaming Mode Load Balancing : This distributes the traf fic load across LAN1 and LAN2 . LAN1 and LAN2 are on the same subnet with the same IP address. It also includes backup functionality (fault tolerance). Figure 141 Load Balancing T eaming Mod e Link Aggr egation [...]

  • Seite 162

    Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 162 " If you enable jumbo frames on the NSA in a net work that does not support them, you will lose access to the NSA. If this occu rs, you will have to restore the factory default conf iguration. Use the RESET button or the W eb Configurator . In the following example, the NSA has jumbo fra[...]

  • Seite 163

    Chapter 7 Network Screens NSA-2401 User’s Guide 163 Figure 144 Network > TCP/IP The following table describes the labels in this screen. T able 43 Network > TCP/IP LABEL DESCRIPTION T e aming Mode Select how to use the NSA’s two Gigabit Ethernet interfaces. St and Alon e : Select this option to use a separate IP address on each of the two[...]

  • Seite 164

    Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 164 7.3 Windows/CIFS Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup or domain. " CIFS is always enabled on the NSA. S tatic Select the Stat i c checkbox for the NSA to use fixed TCP/IP info rma tio[...]

  • Seite 165

    Chapter 7 Network Screens NSA-2401 User’s Guide 165 " The NSA automatically restar t s its network services af ter you apply changes in the TCP/IP or Windows/CIFS screens. Workgroup Security Mode A workgroup is a group of computers on a network that can share files. On th e NSA, use W orkgroup Security Mode if the user na mes and passwords f[...]

  • Seite 166

    Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 166 Figure 145 Active Directory Example Application 7.3.1 Windows/CIFS Screen Click Network > W indows/CIFS to display this screen. Figure 146 Network > Windows/CIFS (W orkgroup) LAN1 USB1 USB2 AD S1 S2 U1 U2 U3[...]

  • Seite 167

    Chapter 7 Network Screens NSA-2401 User’s Guide 167 Figure 147 Network > Windows/CIFS (Doma in) The following table describes the labels in these screens. T able 44 Network > Windows/CIFS LABEL DESCRIPTION Server I dentifi cation Server Name Enter a name to identify your NSA on the network in th is field. By default the NSA uses “NSA” a[...]

  • Seite 168

    Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 168 7.4 NFS Screen Click Network > N FS to display the NFS screen. Configur e this screen to let computers use NFS to access the NSA. Figure 148 Network > NFS The following table describes the icons in this screen. Windows Domain Administrator Password T ype a password associated with the W[...]

  • Seite 169

    Chapter 7 Network Screens NSA-2401 User’s Guide 169 The following table describes the labels in this screen. 7.4.1 Add or Edit NFS Share Screen Click Network > NFS > Add NFS Sh are (or Edit NFS Shar e ) to display the screen where you can configure a share for systems to use NFS to access. Figure 149 Network > NFS > Add NFS Share Edit[...]

  • Seite 170

    Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 170 The following table describes the labels in this screen. Share Name Det ails Use any character except double quotes (“), single quotes (‘), slashes ( or /), square brackets ([ ]), colons (:), semi-colons (;), angle brackets (< >), the plus si gn (+), semi-colons (;), commas (,), qu[...]

  • Seite 171

    Chapter 7 Network Screens NSA-2401 User’s Guide 171 The following table describes the labels in this screen. T able 48 Network > NFS > NFS S ession LABEL DESCRIPTION T ype This shows that this is an NFS connection to the NSA. NFS Share Path This displays the complete location of the NFS shar e in the NSA. Username This displays the name of [...]

  • Seite 172

    Chapter 7 Net wo rk Scree ns NSA-2401 User’s Guide 172[...]

  • Seite 173

    NSA-2401 User’s Guide 173 C HAPTER 8 Sharing Screens 8.1 Overview Use the NSA ’ s Sharing screens to manage user accounts , groups of users, and shares. 8.1.1 What Y ou Can Do In The Sharing Screens • Create and manage user accounts. See Section 8.2 on page 175 for details. • Create and manage group s. See Section 8.3 on page 18 2 for detai[...]

  • Seite 174

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 174 Share A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the W indows concept of a shared folder . Y ou must have an internal v olu me b efore you can create shares. Vo l u m e A volume is a storage area on a single disk or spread across a number [...]

  • Seite 175

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 175 Conflicting Share Access and ACL Settings If the share’ s access permissions and the access pe rmissions defined in the ACL dif fe r , the NSA applies whichever is more restrictive. For example, if the share allows a user access but the ACL setting does not, the NSA does not gi ve the user ac[...]

  • Seite 176

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 176 The following table describes the labels in this screen. Edit User Select a user account from the list, then click this icon to edit their account name, group membership , password, and volume quota. See Section 8.2.1 on page 178 for details. Delete Selected Use rs Select a user account from the[...]

  • Seite 177

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 177 8.2.0.1 Conflict Users A conflict user is a local user that has the sa me user name as that of a user on a domain controller . For example, if you first create lo cal users and groups on the NSA (in Wo r k g r o u p mode) and later you chang e to domain mode whe r e you create (or there are alr[...]

  • Seite 178

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 178 8.2.1 Create a New Account & C hange Accoun t Properties T o create an account, click Sharing > Users > Add User . T o edit an existing local user account, click Sharing > Users > Edit User . The account creation and account editin g screens are identical in appearance. Figure 15[...]

  • Seite 179

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 179 8.2.1.1 Account Names Enter an account name from 1 to 14 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characte rs are not allow ed as the first character . The account name can o nly co ntain the following characters: • Alphanumeric A-z 0-9 • S[...]

  • Seite 180

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 180 •a d m i n 8.2.1.2 Account Password Management Non-admin users ma y ch ange their passwords th ems elves by logging into the NSA W eb Configurator using the username and password as defined in the Create New Account screen. After logging in, select the Password tab in the account toolbar . Fig[...]

  • Seite 181

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 181 " Non-admin user accounts cannot access the administrator W eb Configurator screens and cannot browse s hares assigned to other users. 8.2.2 V iew User Information T o view a user account’ s information, select it from the Sharing > U sers list and then click User Info . The two tabs [...]

  • Seite 182

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 182 8.3 Group s Click Sharing > Gr oups to open this screen whe re you can create and manage groups. A group is a collection of user accounts. Figure 156 Sharing > Grou ps The following table describes the icons in this screen. T able 53 Sharing > Groups Icons ICON DESCRIPTION Add Group Cli[...]

  • Seite 183

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 183 The following table describes the labels in this screen. Delete Selected Group s Select a group from the list, then click this icon to remove it. Y ou ca n only delete local user g roups, not domain groups. Sort Click a column’s heading cell to sort the table entries by that column’s criter[...]

  • Seite 184

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 184 8.3.1 Add a New Local Group & Cha n ge Group Properties T o create a local group, click Sharing > Groups > Add Gr oup . T o edit an existing local group, click Sharing > Groups > Edit Group . The group creation and group editing screens are identical in appearance. Figure 157 Sha[...]

  • Seite 185

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 185 8.3.1.1 Group Names Enter a group name fro m 1 to 16 characters. Th e first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characte rs are not allowed a s the first character . The group name can o nly contain the following characters: • alphanumeric A- z 0-9 (there is [...]

  • Seite 186

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 186 8.4 Shares Click Sharing > Shar e s to open this scre en where you can create and manage shares. Figure 158 Sharing > Shares The following table describes the icons in this screen. T able 56 Sharing > Shares Ic ons ICON DESCRIPTION Add Share Click this icon to open the Add Share screen,[...]

  • Seite 187

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 187 The following table describes the labels in this screen. Delete Share Select a share from the list, then click this icon to remove it. DFS Click this icon to open the DFS Links scre en. See Secti on 8.4.4 on page 194 for details on creating DFS links. Share Browser Select a share from the list,[...]

  • Seite 188

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 188 8.4.1 Create a New Share & Edit a Share T o create a local group, click Sharing > Shares > Add Shar e . T o edit an existing local group, click Sharing > Share s > Edit Share . The share creation and share editing scr eens are identical in appearance. Figure 159 Sharing > Shar[...]

  • Seite 189

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 189 8.4.1.1 Share Access Con figuration This screen allows you to assign permissions to a share. Figure 160 Sharing > Shares > Create a New Share > Share Access Configuration The following table describes the labels in this screen. Apply Click this to save your changes. Cancel Click this t[...]

  • Seite 190

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 190 8.4.2 ACL Configuration Click Sharing > Shar e s , select a share , and clic k ACL Properties screen to open the Access Control List (ACL) screen. Use this screen to display and configure ACL settings . The ACL defines read a nd write permission s for specific files and folders . • If you a[...]

  • Seite 191

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 191 The following table describes the labels in this screen. 8.4.2.1 New ACL Configuration This screen allows you to create a new ACL configuration. Figure 162 Sharing > Shares > ACL Configuration > Ne w ACL Configuration The following table describes the icons in this screen. T able 61 Sh[...]

  • Seite 192

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 192 The following table describes the labels in this screen. 8.4.2.2 ACL Permissions Use this screen to set who can access the selected folder or file. Figure 163 Shares > ACL Configuration > New ACL Configura tio n > ACL Permission T able 63 Sharing > Shares > Create a New Share >[...]

  • Seite 193

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 193 The following table describes the labels in this screen. 8.4.2.3 EVER YONE & ANONYMOUS Share Access Rights W ith an EVER YONE access right, you still need to log in. Every local user with an account on the NSA can access this share using their u sername and password. Users with accounts on [...]

  • Seite 194

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 194 8.4.3 Recycle Bin Click Sharing > Shar es > Recycle Bin to open the following screen . Use this screen to set up how the share recycle bin is managed. Figure 164 Sharing > Shares > Configuration The following table describes the labels in this screen. 8.4.4 DFS Distributed File Syste[...]

  • Seite 195

    Chapter 8 Sharing Scre ens NSA-2401 User’s Guide 195 The following table describes the labels in this screen. T able 66 Sharing > Shares > DF S LABEL DESCRIPTION Link Name Enter a name for the new DFS link. The text may consist of letters, numerals and any printable character found on a typical English langua ge keyboard. Remote Server IP E[...]

  • Seite 196

    Chapter 8 Sharing Screens NSA-2401 User’s Guide 196[...]

  • Seite 197

    NSA-2401 User’s Guide 197 C HAPTER 9 Protect Screens 9.1 Protection Methods Overview This chapter introduces d ifferent ways of protecting data on the NSA and explains how to u se the Pr otect screens to cre ate and schedule snapshots and backups. There are a variety of ways to protect your data on the NSA. Below is a summary table of preventativ[...]

  • Seite 198

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 198 9.1.1 What Y ou Can Do in the Protect Screens •U s e t h e Backup screens ( Section 9.2 on page 20 0 ) to back up data and restore ba ckup files by archive backup jo b. • Use the Rest ore screens ( Section 9.3 on pa ge 212 ) to restore by backup files. • Use the Snapshot screens ( Secti[...]

  • Seite 199

    Chapter 9 Protect Screens NSA-2401 User’s Guide 199 T o use a snapshot to restore files, use the MyNSA screens, CIFS (W indows Explorer), or FTP to browse to the snapshot imag e folder . The snapshot folder c ontains images name d after the folders and files in the volume at the time of t he backup. T o restore a folder or file to its state at th[...]

  • Seite 200

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 200 Finding Out More See Chapter 6 on pa ge 125 for more information on RAID. See Section 3.7 on page 8 9 for backup and snapshot tutorials. 9.2 NSA Backup Screens Use the Protect > Backup menus to create data backups to another volume, an external USB disk drive, or a computer or anoth er NSA[...]

  • Seite 201

    Chapter 9 Protect Screens NSA-2401 User’s Guide 201 Figure 166 Protect > Backup The following table describes the icons in this screen. T able 68 Protect > Backup Ic ons ICON DESCRIPTION Add Job Click this icon to create a new backup job (se e also Section 9.2.2 o n page 202 ). Edit Job Select a backup job and click this icon to modify it?[...]

  • Seite 202

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 202 The following table describes the labels in this screen. 9.2.2 Creating a Backup Job In the Protect > Backup screen, click the Add Job icon to create a new back up job. Figure 167 Protect > Backup > Add Job: S tep 1 Abort Job If a backup job is currently running, y ou can select it a[...]

  • Seite 203

    Chapter 9 Protect Screens NSA-2401 User’s Guide 203 The following table describes the labels in this screen. T able 70 Protect > Backup > Add Job: S tep 1 LABEL DESCRIPTION Job Name This is a required field that uniq uely identifies the backup. T ype from 1 to 15 characters. Y ou can use alphanumeric cha rac te rs (A-Z 0-9) and "_"[...]

  • Seite 204

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 204 9.2.2.1 Creating a Backup Job: S tep 2 Figure 168 Protect > Backup > Add: S tep 2[...]

  • Seite 205

    Chapter 9 Protect Screens NSA-2401 User’s Guide 205 The following table describes the labels in this screen. T able 71 Protect > Backup > Add Job: S tep 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse th rough folders, sub-fo lders and files. Click[...]

  • Seite 206

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 206 9.2.2.2 Creating a Backup Job: S tep 3 Figure 169 Protect > Backup > Add Job: S tep 3 The following table describes the labels in this screen. External If there is an external USB hard drive connected to t he NSA (for example USB1 ExtV olume 1), you can select a ba ckup target on the e [...]

  • Seite 207

    Chapter 9 Protect Screens NSA-2401 User’s Guide 207 9.2.2.3 Creating a Backup Job: S tep 4 Figure 170 Protect > Backu p > Add Job: S tep 4 The following table describes the labels in this screen. Purge Poli cy Select a pol icy for deleting archive backups. This purge runs first before a new backup is done. For example, if you have a backup [...]

  • Seite 208

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 208 9.2.3 Editing a Backup Job In the Pr otect > Backup screen, selec t a backup job an d click the Edit Job icon to chan ge its settings. Figure 171 Protect > Backup > Edit Job: S tep 1 The following table describes the labels in this screen. T able 74 Protect > Backup > Edit Job:[...]

  • Seite 209

    Chapter 9 Protect Screens NSA-2401 User’s Guide 209 9.2.3.1 Editing a Backup Job: S tep 2 Figure 172 Protect > Backup > Edit Job: S tep 2 The following table describes the labels in this screen. 9.2.4 Restoring by Backup Job In the Protect > Backup screen, select a backup job and click the Restore Ar chive icon to replace existing files [...]

  • Seite 210

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 210 Figure 173 Protect > Backup > Restor e Archive: S tep 1 The following table describes the labels in this screen. T able 76 Protect > Backup > Restore Archive: S tep 1 LABEL DESCRIPTION Job Name This is the name that identifies the backup job. Job Description This is some extra des[...]

  • Seite 211

    Chapter 9 Protect Screens NSA-2401 User’s Guide 21 1 9.2.4.1 Restoring a Backup: S tep 2 Figure 174 Protect > Backup > Restor e Archive: S tep 2 The following table describes the labels in this screen. 9.2.4.2 Restoring a Backup: S tep 3 Figure 175 Protect > Backup > Restor e Archive: S tep 3 T able 77 Protect > Backup > Restore[...]

  • Seite 212

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 212 The following table describes the labels in this screen. 9.3 Restoring by Backup Files Click Pr otect > Restore to open the Restore scree ns. Use these scree ns to restore by the backup files if you deleted an archive backup jo b or the NSA or the RAID array containi ng the backup job fail[...]

  • Seite 213

    Chapter 9 Protect Screens NSA-2401 User’s Guide 213 9.3.1 Protect > Restore: St ep 2 Figure 177 Protect > Resto re: S tep 2 The following table describes the labels in this screen. T able 80 Protect > Restore: S tep 2 LABEL DESCRIPTION Select Restor e Point Select to which backup job and backu p time you want to return . The NSA restores[...]

  • Seite 214

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 214 9.3.2 Protect > Restore: St ep 3 Figure 178 Protect > Resto re: S tep 3 The following table describes the labels in this screen. T able 81 Protect > Restore: S tep 3 LABEL DESCRIPTION Folder Chooser Select the folders you want to restore. previous Click this button to return to the p[...]

  • Seite 215

    Chapter 9 Protect Screens NSA-2401 User’s Guide 215 9.3.3 Protect > Restore: St ep 4 Figure 179 Protect > Resto re: S tep 4 The following table describes the labels in this screen. 9.4 Snap shot s Import ant Notes on Snap shots 1 Snapshots can only be taken on internal volumes. 2 The NSA stores s napshots in the space on the disk array that[...]

  • Seite 216

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 216 " The snapshot capture fails if deleting all previous snaps hots does not leave enough space for the new snap shot. T o ta ke the snapshot, make more free space on the disk array by recreating a volume with a smaller capacity or upgrading the disk array to a larger storage capacity . &qu[...]

  • Seite 217

    Chapter 9 Protect Screens NSA-2401 User’s Guide 217 The following table describes the icons in this screen. T able 83 Protect > Snapsho t > Snapshot Jobs Icons ICON DESCRIPTION Add Job Click this icon to create a new snapshot job (see also Section 9.2.3 on page 208 ). Snapshot Image Access Click this icon to open a screen where you can defi[...]

  • Seite 218

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 218 The following table describes the labels in this screen. 9.4.1 Creating/Editing Snap shots In the Protect > Snapshot screen, click the Cr eate Job icon to open the following screen. Use this screen to create a new snapshot job. Y ou can also select an exis ting snapshot job in the Protect [...]

  • Seite 219

    Chapter 9 Protect Screens NSA-2401 User’s Guide 219 The following table describes the labels in this screen. 9.4.2 Snap shot Images Click Pr otect > Snapshot > Snapshot Images tab to open the fo llowing screen. Click a column’ s heading cell to sort the table entries by that column’ s criteria. Cl ick the heading cell again to reverse t[...]

  • Seite 220

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 220 The following table describes the icons in this screen. The following table describes the labels in this screen. 9.5 Backup Sof tware Screen Click Pr otect > Backup Software to open the Backup Softwar e screen. This screen provides you with y our Genie Backup Manager Lite license key and d[...]

  • Seite 221

    Chapter 9 Protect Screens NSA-2401 User’s Guide 221 Figure 183 Protect > Backup Software[...]

  • Seite 222

    Chapter 9 Pro te ct Scre ens NSA-2401 User’s Guide 222[...]

  • Seite 223

    NSA-2401 User’s Guide 223 C HAPTER 10 Application Screens 10.1 Overview This chapter introduces the NSA Application screens. 10.1.1 What Y ou Can Do In The Application Screens • Configure settings for FTP file transfers to/from the NSA. See Section 10.2 on page 224 for more information. • Share a printer . See Section 10.3 on page 226 for det[...]

  • Seite 224

    Chapter 10 App licat ion Scre en s NSA-2401 User’s Guide 224 Print Server A print server is a device or software that pr ovides users on a network with shared access to one or more printers. The print server acts as a buf fer, holding the informat ion to be printed out until the printer becomes free. The NSA can act as a print server . Figure 184[...]

  • Seite 225

    Chapter 10 Application Screens NSA-2401 User’s Guide 225 Figure 185 Applications > FTP The following table describes the labels in this screen. T able 88 Applications > FTP LABEL DESCRIPTION Enable FTP Select this to allow users to connect to the NSA via FTP . This also enables FTP over Explicit TLS (FTPES). Y ou can use FTP or FTPES to sen[...]

  • Seite 226

    Chapter 10 App licat ion Scre en s NSA-2401 User’s Guide 226 10.3 Print Server Click Applications > Pri nt Server to open this screen. Use this screen to view and manage the NSA’ s list of printers and print jobs. Figure 186 Applications > Print Server The following table describes the labels in this screen. 10.3.1 Print Server Rename Cli[...]

  • Seite 227

    Chapter 10 Application Screens NSA-2401 User’s Guide 227 The following table describes the labels in this screen. 10.4 Copy Button Click Applications > Copy Button to open this screen. Use the COPY button on the front panel of the NSA to copy files between a USB fl ash drive or externally connected hard disk and a share in the NSA. If more tha[...]

  • Seite 228

    Chapter 10 App licat ion Scre en s NSA-2401 User’s Guide 228 Figure 189 Applications > Copy Button > Edit The following table describes the icons in this screen. The following table describes the labels in this screen. T able 92 Applications > Copy Button > Edit ICON DESCRIPTION A vailable Share Indicates the share can be used for fil[...]

  • Seite 229

    NSA-2401 User’s Guide 229 C HAPTER 11 Maintenance Screens 1 1.1 Overview This chapter introduces the NSA Maintenance screens. 1 1.1.1 What Y ou Can Do In The Maintenance Screens • V iew the NSA system logs. See Section 11.2 on page 230 for details. • Manage the NSA configuration file. See Section 11.3 on page 237 for details. • Configure HT[...]

  • Seite 230

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 230 Finding Out More See Section 3.5 on page 6 8 for tutorials on configuring security . See Section 3.6 on page 8 9 for a tutorial on power resume. 1 1.2 Log Click Maintenance > Log to open a screen that displays all NSA activity logs. Figure 190 Maintenance > Log The following table des[...]

  • Seite 231

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 231 The following table describes the labels in this screen. 1 1.2.0.1 Log Classes The NSA keep s detailed records of all activity that occurs on it . These records, or logs, are organized according to “class”. The followin g table de scribes the different log classes. Log Config Click this[...]

  • Seite 232

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 232 1 1.2.1 Search Click the Maintenance > Log > Search icon to display the search filters. Figure 193 Maintenance > Log > Search Filters The following table describes the labels in this screen. 1 1.2.2 Log Records Configuration Click Maintenance > Log > Log Config to open the[...]

  • Seite 233

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 233 The following table describes the labels in this screen. 1 1.2.3 Log Buzzer Priority Configuration Click Maintenance > Log > Log Config > Buzzer Priority to open a screen where you can configure the audible buzzer ’ s settings. enable or disable the audible buzzer alarm feature a[...]

  • Seite 234

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 234 Figure 196 Maintenance > Log > Log Report Configuration > Mail Setting The following table describes the labels in this screen. 1 1.2.4.2 Report Setting This screen lets you configur e which types of lo gs are e-mailed during alerts and reports. T able 98 Maintenance > Log > [...]

  • Seite 235

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 235 Figure 197 Maintenance > Log > Log Report Configuration > Repo rt Setting The following table describes the labels in this screen. T able 99 Maintenance > Log > Log Report Configuration > Report Setting LABEL DESCRIPTION Alert Select the kind of log(s) to be sent ou t duri[...]

  • Seite 236

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 236 1 1.2.4.3 Syslog Server Setting This screen lets you set up the NSA to upload log files to a syslog server . Figure 198 Maintenance > L o g > Log Report Configuration > Syslog Server Setting The following table describes the labels in this screen. 1 1.2.5 Export Log Click Maintenan[...]

  • Seite 237

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 237 1 1.3 Configuration Click Maintenance > Configuration to open a screen where you can backup and restore the NSA configuration settings or restore th e device to its factory default settings. Figure 199 Maintenance > Configuration The following table describes the labels in this screen[...]

  • Seite 238

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 238 1 1.3.1 Restoring the Configuration File When restoring a previously saved configuration file, you are presented with a warning screen if any users are connected. Figure 200 Maintenance > Configur ation > Restore The following table describes the labels in this screen. If the NSA is f[...]

  • Seite 239

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 239 Figure 201 Maintenance > Configur ation > Restore > Restarting 1 1.4 SSL Click Maintenance > SSL to open this screen, where you ca n turn on HTTPS, create a pu blic key certificate, or upload a public key ce rt ific ate that was issued by a known certificate authority . Figure 2[...]

  • Seite 240

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 240 The following table describes the labels in this screen. 1 1.4.0.1 Editing a Self-Signed Certificate or Creating a Certificate Signi ng Request When you select the Edit a self-signed CA certificate option, then click the Edit button, a screen opens to allow you to make adjustments to the NS[...]

  • Seite 241

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 241 Figure 203 Maintenance > SSL > Edit a Self-Signed Certificate The following table describes the labels in this screen. 1 1.5 Firmware Upgrade Click Maintenance > FW Upgrade to open this screen, wh ere you can upgrade the NSA firmware. Be sure to down load the latest firmware fi les[...]

  • Seite 242

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 242 1 The SYS LED blinks orange w hen firmware is being up loaded to the NSA. Do not turn off or reset th e NSA while the firmware update is in progress! Figure 204 Maintenance > FW Upgrade The following table describes the labels in this screen. 1 1.6 Power Management Click Maintenance >[...]

  • Seite 243

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 243 Figure 205 Maintenance > Power Ma nagement The following table describes the labels in this screen. T able 106 Maintenance > Power Mana gement LABEL DESCRIPTION Hard Drive Sleep T ime Settin gs Hard Drive Sleep T ime Enter the numbe r of minutes the NSA will sit idle before spinning t[...]

  • Seite 244

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 244 1 1.6.1 Power Control Schedule Click Maintenance > Power Management > Edit to open this screen, where you can configure power control schedules to have the NS A turn on, turn off, or reboot at specified times. Figure 206 Maintenance > Power Ma nag ement > Edit Power On After Pow[...]

  • Seite 245

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 245 The following table describes the labels in this screen. 1 1.7 Shut down Click Maintenance > Shutdown to open the shutdown scree n. Use this screen to turn off the NSA or restart it. Before shuttin g down or restarting, check the System S tatus screen to make sure that no one is logged i[...]

  • Seite 246

    Chapter 11 Maintenance Screens NSA-2401 User’s Guide 246 Figure 207 Maintenance > Shut down The following table describes the labels in this screen. When you cli ck the Restart button a pop-up screen app e ars asking you to confirm th e action. Click Apply to continue or Ca ncel to abort the process. Figure 208 Maintenance > Shut down > [...]

  • Seite 247

    247 P ART III T roubleshooting and S pecifications T roubleshooting (249) Product Specification s (257)[...]

  • Seite 248

    248[...]

  • Seite 249

    NSA-2401 User’s Guide 249 C HAPTER 12 Troubleshooting 12.1 T roubleshooting Overview This chapter offers some sugg estions to solve problems you might encounter . The potential problems are divided into the following categories. • Power , Hardware Connections, and LEDs • NSA Login and Access • Users Cannot Access the NSA • Backups and Sna[...]

  • Seite 250

    Chapter 12 Tro u blesh oo tin g NSA-2401 User’s Guide 250 After replacing the disk, go to the S torage > Internal S torage > RAID screen. If the array’ s status is not Resynching , select the array and click the Repair icon. V The NSA SYS LED is orange or is flashing orange. • If the SYS LED is steady on orange, then the NS A is unlocki[...]

  • Seite 251

    Chapter 12 Troubleshooting NSA-2401 User’s Guide 251 • Make sure the Ethernet cable is connected pr operly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it’ s connected directly to a computer , make sure that the computer network card is working (p ing 127.0.0.1 on the computer). • Use an[...]

  • Seite 252

    Chapter 12 Tro u blesh oo tin g NSA-2401 User’s Guide 252 • Confirm that the computer running the NDU has a network connection. See the section on the NSA’ s LAN connection for related information. • The computer running the NDU can only discover NSAs in the same subnet. NSAs connected to the same switch or router as your NDU computer are u[...]

  • Seite 253

    Chapter 12 Troubleshooting NSA-2401 User’s Guide 253 12.4 Users Cannot Access the NSA V A local user cannot access a share • Check that the NSA is turne d on and connecte d to the network. The local us er should try to ping the NSA or u se the NDU to discover it. • The local user should check that he en tered his login name and password corre[...]

  • Seite 254

    Chapter 12 Tro u blesh oo tin g NSA-2401 User’s Guide 254 • Leave the domain and re-join it. V A domain user can’t access a share. In addition to the checks listed previously for lo cal users, check that th e domain controller is turned on and co nnected to the network. V A user can access a share but cannot access individual folders or files[...]

  • Seite 255

    Chapter 12 Troubleshooting NSA-2401 User’s Guide 255 Y ou may need to manually delete some prev ious snapshot s to make more space. If you still cannot take the snapshot yo u may need to recreate the volu me with a larger amount of space reserved for snapshots. • Y ou can also check the logs on the NSA to find out the re ason why the snapshot f[...]

  • Seite 256

    Chapter 12 Tro u blesh oo tin g NSA-2401 User’s Guide 256[...]

  • Seite 257

    NSA-2401 User’s Guide 257 C HAPTER 13 Product Specifications See also the Getting to Know Y our NSA chapte r for a general overview of the key features. 13.1 Feature T ables These are the main external physical features. These are some of the main firmware features of the NSA. T able 109 Physical F eatures 2 USB Ports Exp a nd sto rage capacity b[...]

  • Seite 258

    Chapter 13 Product Specifications NSA-2401 User’s Guide 258 Disk Quota Use the disk quota feature to st op one user(s) from using up all disk capacity by setting a limit on how much storage space he/she may use. User Passwords Config ure a password for an individual Use r to restrict access to the NSA. Non-admin user s can change thei r own passw[...]

  • Seite 259

    Chapter 13 Product Specifications NSA-2401 User’s Guide 259 13.2 S pecification T ables The NSA hardwa re sp e cif i cations are shown in the following table. UPS Integration Connect an APC Un interr uptible Power Supply (UPS) with a USB connection to the NSA. The NSA shuts itself down if the UPS’s battery charge gets down to a user-configur ab[...]

  • Seite 260

    Chapter 13 Product Specifications NSA-2401 User’s Guide 260 The NSA firmware specif ications are shown in the following table Reset Button Reset the NSA or restore the fact ory default configuration file AC Input V oltage: 100 - 240 V at 50 - 60 Hz Current: 2 A DC Output V oltage: 19 V Current: 2 A Operating T emperature 0º C ~ 40º C S torage T[...]

  • Seite 261

    Chapter 13 Product Specifications NSA-2401 User’s Guide 261 13.3 Power Consumption The NSA-2400 was tested using the specified po wer sources with the external power adapter and with four hard drives installed. " This table is a laborato ry test of NSA-2400 power consumption for your reference only . This is the external power adaptor pinout[...]

  • Seite 262

    Chapter 13 Product Specifications NSA-2401 User’s Guide 262[...]

  • Seite 263

    263 P ART IV Appendices and Index Log Messages (265) Setting Up Y our Computer ’ s IP Address (275) Importing Certificates (299) Open Source Licences (323) Legal Information (353) Index (355)[...]

  • Seite 264

    264[...]

  • Seite 265

    NSA-2401 User’s Guide 265 A PPENDIX A Log Messages This appendix shows some NSA log messages. Log Messages T able 1 14 Log Messag e s FEATURE SEVERITY MESSAGE ARGUMENT(S) Action Log INFO [ClientIP][UserName][ShareNa me][ServiceName][ActionName] [FilePath+FileName_Unde r the share] ServiceName: FTP/CIFS/ WEB ActionName: Delete, Delete DIR, Create [...]

  • Seite 266

    Appendix A Log Messa ge s NSA-2401 User’s Guide 266 CIFS - share NOTICE Purge all files in recycle-bin folder in share: {0}. Share Name CIFS - share INFO Expire recycle-bin finish for share {0}, process time: {1} seconds, remove {2} file ({3} bytes) Share Name How log it takes to process this recycle bin Number of files removed in recycle bin Num[...]

  • Seite 267

    Appendix A Log Messages NSA-2401 User’s Guide 267 Network NOTICE Network interface {0} link down NFS I N FO Enable NFS: SUCCESS NFS CRIT Enable NFS: F AILED NFS INFO Disable NFS: SUCCESS NFS CRIT Disable NFS: F AILED NFS INFO Export {0} ({1},{2}) to NFS: SUCCESS Path IP Filter Permission: rw , ro NFS CRIT Export {0} ({1},{2}) to NFS: FA I L E D P[...]

  • Seite 268

    Appendix A Log Messa ge s NSA-2401 User’s Guide 268 Snapshot INFO Expand Snapshot Image {0}(Increased Size={1}MB): SUCCESS Snapshot Image Name Size Snapshot CRIT Expand Snapshot Image {0}(Increased Size={1}MB): FA I L E D Snapshot Image Name Size Snapshot INFO Enable Snap-Share: SUCCESS Snapshot CRIT Enable Snap-Share: F AIL ED Snapshot INFO Disa[...]

  • Seite 269

    Appendix A Log Messages NSA-2401 User’s Guide 269 S torage - RAID CRIT S tart Rep airing De graded Raid: FA I L E D S torage - RAID CRIT Modify Rebuild Priority to high/ normal/low : F AILED S torage - RAID CRIT Reshape Raid5 by Adding disk{0}: F AILED Disk Slog ID S torage - RAID CRIT Add Hot-S pare disk{0} to Raid: FA I L E D Disk Slog ID S tor[...]

  • Seite 270

    Appendix A Log Messa ge s NSA-2401 User’s Guide 270 S torage - Vo l u m e INFO Unlock Inte rnal V olume: SUCCESS S torage - Vo l u m e INFO Change Internal Crypto V olu me Password Prompt to [{0}]: Success New Password Prompt S torage - Vo l u m e INFO Change Internal Crypto V olu me Password: SUCCESS S torage - Vo l u m e INFO Rename External V [...]

  • Seite 271

    Appendix A Log Messages NSA-2401 User’s Guide 271 S torage - Vo l u m e CRIT Create USB Key: F AILED S torage - Vo l u m e CRIT Duplicate USB Key: F AILED S torage - Vo l u m e CRIT Rename Internal V olume to [{0}]: F AILED V olume Name S torage - Vo l u m e CRIT Expand V olume (Increased Size={0}MB): F AILED Size S torage - Vo l u m e CRIT Lock [...]

  • Seite 272

    Appendix A Log Messa ge s NSA-2401 User’s Guide 272 System EMERG T emperature exceeds the upper bound and may cause damage.System is going to shutdown. System INFO T emperature is back to normal. System EMERG Fan speed is too low and may cause damage System ERR Fan speed is lower than normal speed. System INFO Fan speed is normal. System INFO Dev[...]

  • Seite 273

    Appendix A Log Messages NSA-2401 User’s Guide 273 System - Ti m e INFO Daylight saving is disa bled System - Ti m e INFO Daylight saving is en abled Web INFO USER {0} ({1}) login WEB success User Name IP Web INFO USER {0} has logged out from WEB User Name Web INFO USER {0} ({1}) login WEB failed User Name IP SSL INFO Certficate is importe d succe[...]

  • Seite 274

    Appendix A Log Messa ge s NSA-2401 User’s Guide 274[...]

  • Seite 275

    NSA-2401 User’s Guide 275 A PPENDIX B Setting Up Y our Computer ’ s IP Address " Y our specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on yo[...]

  • Seite 276

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 276 Windows XP/NT/2000 The following example uses the defa ult Wi ndows XP display theme b ut can also apply to W indows 2000 and W indows NT . 1 Click St a r t > Control Panel . Figure 21 1 Windows XP: S tart Menu 2 In the Control Panel , click the Network Connections[...]

  • Seite 277

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 277 3 Right-click Local Area Connection and then select Properties . Figure 213 Windows XP: Control Panel > Network Conn ections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties . Figure 214 Windows XP: Local Area Conne cti[...]

  • Seite 278

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 278 5 The Internet Protocol TCP/IP Pr operties window o pens. Figure 215 Windows XP: Internet Protocol (TCP/IP) Propert ies 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically . Select Use the following IP A[...]

  • Seite 279

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 279 Windows V ist a This section shows screens from W indows V ista Professional. 1 Click St a r t > Control Panel . Figure 216 Windows V ista: S tart Menu 2 In the Control Panel , click the Network and Intern et icon. Figure 217 Windows V ista: Control Panel 3 Click the [...]

  • Seite 280

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 280 4 Click Manage network connections . Figure 219 Windows V ista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties . Figure 220 Windows V ista: Network and Sharing Center " During this procedure, click Continue whenever Wind[...]

  • Seite 281

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 281 6 Select Internet Protocol V ersion 4 (TCP/IPv4) and then select Properties . Figure 221 Windows V ista: Local Area Connection Properties[...]

  • Seite 282

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 282 7 The Internet Protocol V ersion 4 (TCP/IPv4) Properties window opens. Figure 222 Windows V ista: Internet Protocol V ersion 4 (TCP/IPv4) Prope rties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically .[...]

  • Seite 283

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 283 Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences . Figure 223 Mac OS X 10.4: Apple Menu 2 In the System Prefer ences window , click the Network icon. Figure 224 Mac OS X 10.4: Sys[...]

  • Seite 284

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 284 3 When the Ne twork preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configur e. Figure 225 Mac OS X 10.4: Network Preference s 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in[...]

  • Seite 285

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 285 5 For statically assigned settings, do the following: •F r o m t h e Configure IPv4 list, select Manually . •I n t h e IP Addr e ss field, type your IP address. •I n t h e Subnet Mask field, type your subnet mask. •I n t h e Router field, type the IP address of y[...]

  • Seite 286

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 286 Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences . Figure 229 Mac OS X 10.5: Apple Menu 2 In System Prefer ences , click the Network icon. Figure 230 Mac OS X 10.5: Systems Preferences[...]

  • Seite 287

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 287 3 When the Ne twork preferences pane opens, select Ethernet from the list of available connection types. Figure 231 Mac OS X 10.5: Network Preference s > Ethernet 4 From the Configure list, select Us ing DHCP for dynamically assigned settings. 5 For statically assigne[...]

  • Seite 288

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 288 Figure 232 Mac OS X 10.5: Network Preference s > Ethernet 6 Click Apply and close the window . V erifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities , and then selecting the appropriate Network interface fro[...]

  • Seite 289

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 289 Linux: Ubuntu 8 (GNOME) This section shows you how to co nfigure your computer ’ s TCP/IP settings in the GNU Object Model Environment (GNOME) us ing the Ubuntu 8 Linux distribution. The procedur e, screens and file locations may vary depending on your specific distrib[...]

  • Seite 290

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 290 3 In the Authenticate window , enter your admin acc ou nt name and pa ssword then click the Authenticate button. Figure 236 Ubuntu 8: Administrato r Acco unt Authentication 4 In the Network Settings window , select the connection that you want to configure, then click[...]

  • Seite 291

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 291 5 The Pr operties dialog box opens. Figure 238 Ubuntu 8: Network Settings > Properties •I n t h e Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. •I n t h e Configuration list, select S tatic IP address if you have a sta[...]

  • Seite 292

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 292 V erifying Settings Check your TCP/IP properties by clicking System > Administration > Network T ools , and then selecting the appropriate Network device from the Devices tab. The Interface S tatistics column shows data if your co nnection is work ing properly .[...]

  • Seite 293

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 293 Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’ s TCP/IP settings in the K Desktop Environment (KDE) using the op enSUSE 10.3 Linux distributio n. The procedure, screens and file locations may vary depending on your specif ic distribut[...]

  • Seite 294

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 294 3 When the Y aST Control Center window opens, select Network Devices and then click the Network C ard icon. Figure 243 openSUSE 10.3: Y aST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriat e connection Name from th[...]

  • Seite 295

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 295 5 When the Network Card Setup windo w op ens, click the Address tab Figure 245 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dy namic IP address. Select S tatically assigned IP Address if you have a static IP address. Fill in the IP addr[...]

  • Seite 296

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 296 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server in formation in the fields provided. Figure 246 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window .[...]

  • Seite 297

    Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide 297 V erifying Settings Click the KNetwork Manager icon on the Ta s k b a r to check your TCP/IP properties. From the Options sub-menu, select Show Connecti on Information . Figure 247 openSUSE 10.3: KNetwo rk Manager When the Connection S tatus - KNetwork Manager window ope[...]

  • Seite 298

    Appendix B Se tting Up Your Computer ’s IP Addres s NSA-2401 User’s Guide 298[...]

  • Seite 299

    NSA-2401 User’s Guide 299 A PPENDIX C Importing Certificates This appendix shows you how to import pub lic key certificates into your web browser . Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as V eriSign, Comodo, or Network Solutions, to name a few , receives [...]

  • Seite 300

    Appendix C Importing Certificates NSA-2401 User’s Guide 300 Internet Explorer The following examp l e us es M icr osoft Intern et Explorer 7 on W indows XP Professional; however , they can also apply to In ternet Explorer on W indows V ista. 1 If your device’ s W eb Configurator is set t o use SSL certification, then the first time you browse t[...]

  • Seite 301

    Appendix C Importing Certificates NSA-2401 User’s Guide 301 4 In the Certificate dialog box, click Install Certificate . Figure 252 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard , click Nex t . Figure 253 Internet Explorer 7: Certificate Import Wizar d[...]

  • Seite 302

    Appendix C Importing Certificates NSA-2401 User’s Guide 302 6 If you want Internet Expl orer to Automatically select certificate store based on the type of certificate , click Next again and then go to step 9. Figure 254 Internet Explorer 7: Certificate Import Wizar d 7 Otherwise, select Place all certificates in the following store and then clic[...]

  • Seite 303

    Appendix C Importing Certificates NSA-2401 User’s Guide 303 9 In the Completing the Ce rtificate Import W izard screen, click Finish . Figure 257 Internet Explorer 7: Certificate Import Wizar d 10 If you are presented with another Security W arning , click Ye s . Figure 258 Internet Explorer 7: Security Warning[...]

  • Seite 304

    Appendix C Importing Certificates NSA-2401 User’s Guide 304 11 Finally , click OK when presented with the successf ul certificate installation message. Figure 259 Internet Explorer 7: Certificate Import Wizar d 12 The next time you start Internet Explorer a nd go to a Z yXEL W eb Configurator page, a sealed padlock icon appears in the address bar[...]

  • Seite 305

    Appendix C Importing Certificates NSA-2401 User’s Guide 305 Inst allin g a St and-Alone Certific ate File in Internet Explorer Rather than browsing to a ZyXEL W eb Config urator and installing a public key certificate when prompted, you ca n install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certif[...]

  • Seite 306

    Appendix C Importing Certificates NSA-2401 User’s Guide 306 Removing a Certificate in Internet Explorer This section shows yo u how to remove a pub lic key certificate in Internet Explorer 7. 1 Open Internet Explorer and click To o l s > Internet Options . Figure 263 Internet Explorer 7: T ools Menu 2 In the Internet Options dialog box, click [...]

  • Seite 307

    Appendix C Importing Certificates NSA-2401 User’s Guide 307 3 In the Certificates dialog box, click the T rusted Root Certificates Authorities tab, select the certificate that you wa nt to delete, and then click Remove . Figure 265 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Ye s . Figure 266 Internet Explorer 7: C[...]

  • Seite 308

    Appendix C Importing Certificates NSA-2401 User’s Guide 308 Firefox The following example uses Mo zilla Firefox 2 on W indows XP Professional; however , the screens can also apply to Firefox 2 on all platforms. 1 If your device’ s W eb Configurator is set t o use SSL certification, then the first time you browse to it you are presented with a c[...]

  • Seite 309

    Appendix C Importing Certificates NSA-2401 User’s Guide 309 Inst allin g a St and-Alone Ce rtificate File in Firefox Rather than browsing to a ZyXEL W eb Config urator and installing a public key certificate when prompted, you ca n install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click T ools > Options .[...]

  • Seite 310

    Appendix C Importing Certificates NSA-2401 User’s Guide 310 3 In the Certificate Manager dialo g box, click W eb Sites > Import . Figure 272 Firefox 2: Certificate Manager 4 Use the Select File dialog box to locate the certificate and then click Open . Figure 273 Firefox 2: Select File 5 The next time you visit the web site, click th e padlock[...]

  • Seite 311

    Appendix C Importing Certificates NSA-2401 User’s Guide 31 1 Removing a Certificate in Firefox This section shows yo u how to remove a public key certificate in Firefox 2. 1 Open Firefox and click T ools > Options . Figure 274 Firefox 2: T ools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates . Figure 275[...]

  • Seite 312

    Appendix C Importing Certificates NSA-2401 User’s Guide 312 3 In the Certificate Manager dialog box, select the W eb Sites tab, select the certificate that you want to remove, and then click Delete . Figure 276 Firefox 2: Certificate Manager 4 In the Delete W eb Site Certificates dialog box, click OK . Figure 277 Firefox 2: Delete Web Site Certif[...]

  • Seite 313

    Appendix C Importing Certificates NSA-2401 User’s Guide 313 Opera The following example uses Opera 9 on W indow s XP Professional; however , the sc reens ca n apply to Opera 9 on all platforms. 1 If your device’ s W eb Configurator is set t o use SSL certification, then the first time you browse to it you are presented with a certification erro[...]

  • Seite 314

    Appendix C Importing Certificates NSA-2401 User’s Guide 314 Inst allin g a St and-Alone Ce rtificate File in Opera Rather than browsing to a ZyXEL W eb Config urator and installing a public key certificate when prompted, you ca n install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click To o l s > Pr eference[...]

  • Seite 315

    Appendix C Importing Certificates NSA-2401 User’s Guide 315 3 In the Certificates Manager , click Authorities > Import . Figure 282 Opera 9 : Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open. Figure 283 Opera 9: Import certifica te[...]

  • Seite 316

    Appendix C Importing Certificates NSA-2401 User’s Guide 316 5 In the Install authority certificate dialog box, click Instal l . Figure 284 Opera 9: Install authority certificate 6 Next, click OK . Figure 285 Opera 9: Install authority certificate 7 The next time you visit the web site, click th e padlock in the address bar to open the Security in[...]

  • Seite 317

    Appendix C Importing Certificates NSA-2401 User’s Guide 317 Removing a Certificate in Opera This section shows yo u how to remove a public key certificate in Opera 9. 1 Open Opera and click To o l s > Pr eferences . Figure 286 Opera 9: T ools Menu 2 In Prefer ences , Advanced > Security > Manage certificates . Figure 287 Opera 9: Prefer [...]

  • Seite 318

    Appendix C Importing Certificates NSA-2401 User’s Guide 318 3 In the Certificates manager , select the Authorities tab, select the certificate that you want to remove, and then click Delete . Figure 288 Opera 9 : Certificate manager 4 The next time you go to the web site that issued the public key c ertificate you just removed, a certific ation e[...]

  • Seite 319

    Appendix C Importing Certificates NSA-2401 User’s Guide 319 Konqueror The following examp le uses Konqueror 3.5 on openSUSE 10. 3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’ s W eb Configurator is set t o use SSL certification, then the first time you browse to it you are presented with a certif[...]

  • Seite 320

    Appendix C Importing Certificates NSA-2401 User’s Guide 320 Inst alling a St and-Alone Ce rtificate File in Konqueror Rather than browsing to a ZyXEL W eb Config urator and installing a public key certificate when prompted, you ca n install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate fil[...]

  • Seite 321

    Appendix C Importing Certificates NSA-2401 User’s Guide 321 Removing a Certificate in Konqueror This section shows yo u how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settin g s > Configure Konquer or . Figure 295 Konqueror 3.5: Settings Men u 2 In the Configure d ialog box, select Crypto . 3 On the Peer SS[...]

  • Seite 322

    Appendix C Importing Certificates NSA-2401 User’s Guide 322[...]

  • Seite 323

    NSA-2401 User’s Guide 323 A PPENDIX D Open Source Licences Notice Information herein is subject to change withou t notice. Companies, name s, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical , for any purpos e, except the express [...]

  • Seite 324

    Appendix D Open Source Licences NSA-2401 User’s Guide 324 “Derivative W orks” shall mean any work, whether in Source or Object form, that is based on (or derived from) the W ork and for which the edit orial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship . For the purposes of [...]

  • Seite 325

    Appendix D Open Source Licences NSA-2401 User’s Guide 325 distributed as part of the Derivative W orks; within the Source form or do cumentation, if provided along with the Derivative W orks; or , within a display genera ted by the Derivative W orks, if and wherever such third-party no tices n ormally appear . The contents of the NOTICE file are [...]

  • Seite 326

    Appendix D Open Source Licences NSA-2401 User’s Guide 326 Redistribution and use in source and binary fo rms, with or without modification, are permi tted provided that the following conditions are met: Redistributions of source co de must retain the above copyright notice, this li st of conditions and the following disclaimer . Redistributions i[...]

  • Seite 327

    Appendix D Open Source Licences NSA-2401 User’s Guide 327 The licenses for most software ar e de signed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your free dom to share and change free software--to make su re the software is free for all its users. This license, the Le[...]

  • Seite 328

    Appendix D Open Source Licences NSA-2401 User’s Guide 328 W e call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Pu blic License. It also provides other free software developers Less of an advant age over competing non-free programs. Thes e disadvan tages are[...]

  • Seite 329

    Appendix D Open Source Licences NSA-2401 User’s Guide 329 1. Y ou may copy and distribute verbatim copies of the Library's comple te source code as you receive it, in any medium, provided that you conspicuou sly and appro priately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices tha[...]

  • Seite 330

    Appendix D Open Source Licences NSA-2401 User’s Guide 330 compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library , but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a [...]

  • Seite 331

    Appendix D Open Source Licences NSA-2401 User’s Guide 331 required form of the “work that uses the Librar y” must include any data and utility programs needed for reproducing the executable from it. Howeve r, as a special exception, the materials to be distributed need not include an ything that is normally distributed (in either source or bi[...]

  • Seite 332

    Appendix D Open Source Licences NSA-2401 User’s Guide 332 contest validity of any such claims; this sec tion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have mad e generous contribution s to the wide range of software distributed through th[...]

  • Seite 333

    Appendix D Open Source Licences NSA-2401 User’s Guide 333 END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, auto fs, device-mapper , evms, exim. Lm_sensors, mdadm, pam_mount, raid tools, samba, sg_utils, smartmontool s, vsftpd, xfsprogs and Linux kernel software under GPL license. GNU GENERAL PUBLIC LICENSE V ersion 2, June 19 91[...]

  • Seite 334

    Appendix D Open Source Licences NSA-2401 User’s Guide 334 0. This License ap plies to any program or othe r work which contains a notice pla ced by the copyright holder saying it may be distributed under the terms of this Ge neral Public License. The “Program”, belo w , refers to any such prog ram or work, and a “work based on the Program?[...]

  • Seite 335

    Appendix D Open Source Licences NSA-2401 User’s Guide 335 3. Y ou may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sec tions 1 and 2 above provided that you also do one of the following: a) Accompany it with the comple te corresponding machine-readab le source code, [...]

  • Seite 336

    Appendix D Open Source Licences NSA-2401 User’s Guide 336 directly or indirectly through you, then the on ly way you could satisfy both it and this License would be to refrain entirely from di stribution of the Program. If any portion of this section is held invalid or unenforce able under any partic ul ar circ umstance, the balance of the sectio[...]

  • Seite 337

    Appendix D Open Source Licences NSA-2401 User’s Guide 337 INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DA T A OR DA T A BEING RENDERED INACCURA TE OR LOSSES SUST AINED BY YOU OR THIRD P AR TIES OR A F AILURE OF THE PROGRAM TO OPERA TE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER P AR TY HAS BEEN ADVISED OF THE POSS[...]

  • Seite 338

    Appendix D Open Source Licences NSA-2401 User’s Guide 338 Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays unde r a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-s tyle Open Source l[...]

  • Seite 339

    Appendix D Open Source Licences NSA-2401 User’s Guide 339 Original SSLeay License -------------------------------- Copyright (C) 1995-1998 Eric Y oung (e ay@cryptsoft.com) A ll ri ghts reserved. This package is an SSL implementation written by Eric Y oung (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’ s SSL.[...]

  • Seite 340

    Appendix D Open Source Licences NSA-2401 User’s Guide 340 This Product include mod _ ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights rese rved. Redistribution and us e in source and binary forms, with or without modification, are permitte d provided that th[...]

  • Seite 341

    Appendix D Open Source Licences NSA-2401 User’s Guide 341 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number . Once covered code has been published unde r a particular version of the license, you ma y always continue to u se it under the terms of th[...]

  • Seite 342

    Appendix D Open Source Licences NSA-2401 User’s Guide 342 1.2. “Contributor V ersion” means the combina tion of the Original Code, prior Modifications used by a Contributor , and th e Modifications made by that pa rticular Contributor . 1.3. “Covered Code” means the Original Code or Modifications or th e combination of the Original Code a[...]

  • Seite 343

    Appendix D Open Source Licences NSA-2401 User’s Guide 343 The Initial Developer hereby grants Y ou a wo rld-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify , display , perform[...]

  • Seite 344

    Appendix D Open Source Licences NSA-2401 User’s Guide 344 Any Modification which Y ou create or to which Y ou contribute must be made available in Source Code form under the terms of this Licen se either on the same media as an Executable version or via an accepted Electronic Distribu tion Mechanism to anyone to whom you made an Executable versio[...]

  • Seite 345

    Appendix D Open Source Licences NSA-2401 User’s Guide 345 Contributor . Y ou must make it absolutely clear than any such warranty , support, indemnity or liability obligation is of fered by Y ou alone, and Y ou hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contrib[...]

  • Seite 346

    Appendix D Open Source Licences NSA-2401 User’s Guide 346 Once Covered Code has bee n published under a particu lar version of the License, Y ou may always continue to use it under the terms of that version. Y ou may also choose to use su ch Covered Code under the terms of any sub sequent version of the License published by Netscape. No one other[...]

  • Seite 347

    Appendix D Open Source Licences NSA-2401 User’s Guide 347 any software, hardware, or device , other than such Participant's Contributor V ersion, directly or indirectly infringes any patent, then any ri ghts granted to Y ou by such Participant under Sections 2.1(b) and 2.2 (b) are revoked effective as of the date Y ou first made, used, sold,[...]

  • Seite 348

    Appendix D Open Source Licences NSA-2401 User’s Guide 348 As between Initial Developer and the Contri butors, each party is responsible for claims and damages arising, directly or indirectly , out of its utilization of rights under this License and Y ou agree to work with Initial De veloper and Contributors to dist ribute such responsibility on a[...]

  • Seite 349

    Appendix D Open Source Licences NSA-2401 User’s Guide 349 The above copy righ t notic e an d t his permis sio n notice shall be included in all copies or substantial portions of the Software. THE SOFTW ARE IS PROVIDED “AS IS”, WITHOUT W ARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED T O THE W ARRANTIES OF MERCHANT ABILITY [...]

  • Seite 350

    Appendix D Open Source Licences NSA-2401 User’s Guide 350 4.Restrictions Y ou may not publish, display , disclose, sell, re nt, lease, modify , store, loan, distribute, or create derivative works of the Software, or any part thereof. Y ou may not a ssign, sublicense, convey or otherwise transfer , pledge as secur ity or otherwise encumber the rig[...]

  • Seite 351

    Appendix D Open Source Licences NSA-2401 User’s Guide 351 DOCUMENT A TION OR OTHER WISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME ST A TES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMIT A TION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENT AL DAMAGES, THE ABOVE LIMIT A TION MA Y NOT APPL Y TO YOU. 8.Export[...]

  • Seite 352

    Appendix D Open Source Licences NSA-2401 User’s Guide 352[...]

  • Seite 353

    NSA-2401 User’s Guide 353 A PPENDIX E Legal Information Copyright Copyright © 2009 by ZyXEL Communications Corporation. The contents of this publication may not be reprod uced in any part or as a whole, transcribed, stored in a retrieval system, tran slated into any language, or transmitted in any form or by any means, el ectronic, mechanical , [...]

  • Seite 354

    Appendix E Leg al In fo rm at ion NSA-2401 User’s Guide 354 Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Vie wing Ce rtifi cations 1 Go to http://www .zyxel.com . 2 Select your product on the ZyXEL home pag e to go to that product's page. 3 Select the certification you wish to view from this page. ZyXEL [...]

  • Seite 355

    Index NSA-2401 User’s Guide 355 Index A about icon 48 access configuration 44 , 189 Access Control List, see ACL accessing share contents 40 account names 179 ACL 85 , 174 , 175 , 19 0 Active Directory , see AD active sessions 120 AD 165 add disk 137 administration screens 38 , 47 ALM LED 32 troubleshootin g 250 anonymous 193 ANONYMOUS FTP 193 , [...]

  • Seite 356

    Index NSA-2401 User’s Guide 356 copied files folder format 33 COPY button 33 , 227 folder format 33 LED 33 share 227 COPY LED troubleshootin g 255 copying 33 , 42 copyright 48 , 353 CPU temperature 11 9 usage 11 8 crypto 141 , 148 CSV 236 D date 121 daylight saving 122 default IP address 36 passwor d 36 settings 52 username 36 degraded array 126 [...]

  • Seite 357

    Index NSA-2401 User’s Guide 357 NTFS 150 ReiserFS 150 scan 147 unlock 148 XFS 150 F factory defaults 52 fan speed 11 9 FAT 1 6 150 FAT 3 2 150 FCC interf er ence statement 35 3 file access 85 browsing 40 pat h 43 restricted 88 security 85 storage system 260 system 150 troubleshooting access 254 File T ransfer Pro tocol over Explicit TLS, see FTPE[...]

  • Seite 358

    Index NSA-2401 User’s Guide 358 logout 38 , 49 user 52 web help 38 idle timeout 225 hard drive 243 in conflict 173 internal file system 174 hard drives 39 IP address, default 36 J JavaScript 35 JBOD 132 , 152 expand 137 jumbo frames 160 , 161 , 164 L LAN LEDs 33 troubleshootin g 251 LAN1 36 LAN2 36 language 48 leave domain 168 LEDs disk drive 32 [...]

  • Seite 359

    Index NSA-2401 User’s Guide 359 NAS 174 navigation panel 49 NDU 35 troubleshooting discovery 252 network connection test 164 protocols 260 security 260 Network-Attached S torage, see NAS NFS 168 share name details 170 non-admin users 180 NSA Discovery Utility , see NDU NSA LEDs 32 NTFS 150 O open source licences 323 Open SSL License 337 , 338 Ope[...]

  • Seite 360

    Index NSA-2401 User’s Guide 360 down 135 healthy 134 summary 135 three disks 134 two disks 133 recycle bin 194 Redundant Array of Indepen dent Disks, see RAID ReiserFS 150 related documentation 3 repair 126 replacing disks 128 reset button 257 procedure 52 reset defaults 52 reshape 137 reshaping 107 restart 246 restoring by backup files 212 by ba[...]

  • Seite 361

    Index NSA-2401 User’s Guide 361 synchronization 203 tutorial 92 syntax conventions 4 SYS LED 33 troubleshootin g 249 syslog server 229 , 236 system management 261 system setting 121 T TCP/IP 162 teaming mo de 163 temperature CPU 11 9 operating 260 thumbprint 79 time 121 Daylight Saving Time 122 lag 122 time se rver 12 2 timeout 37 TLS 82 , 223 T [...]

  • Seite 362

    Index NSA-2401 User’s Guide 362 locked 126 , 139 name restrictions 45 passwor d 142 , 149 RAID 1 153 scan 140 status 134 summary 139 unlock 140 , 141 , 146 unlocked 126 , 139 USB key 142 , 143 , 149 W warranty 354 period 354 web browsers share access tutorial 62 supported 261 Web Configurator 35 browsers 35 logout 38 , 49 troubleshooting access 2[...]