• Supporting Disk Refer to the included CD for support documents. • ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product certifications. User Guide Feedback Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead.
“k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on. • “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”. NSA-2400 User’s Guide...
Page 5
Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device. Server Telephone NSA-2400 User’s Guide Computer Notebook computer DSLAM Firewall Switch Router Document Conventions...
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. This product is recyclable. Dispose of it properly. Safety Warnings NSA-2400 User’s Guide...
AD is an Active Directory that contains the user names and passwords of all users that are allowed access to the NSA-2400. Users (U1, U2, U3) can all back up and share data on the NSA-2400. Important data stored on servers S1 and S2 may be also stored there. In addition to...
The following table describes the disk drive LEDs. Refer to the Quick Start Guide to see how to install and remove hard drives from the disk trays. Make sure the NSA-2400 is turned off when you install and remove hard drives from the NSA-2400.
This table describes the LEDs related to the hard disks. Table 1 Disk Drive Leds COLOR Green The following table describes the LEDs related to the NSA-2400 itself. Table 2 NSA-2400 LEDs COLOR Green Orange Green DIAG Orange Green Orange NSA-2400 User’s Guide...
Page 28
Chapter 1 Getting to Know Your NSA-2400 NSA-2400 User’s Guide...
NSA-2400 (refer to the Quick Start Guide or the appendices). 2.2.1 Access the NSA-2400 Via NDU If you don’t know the IP address of the NSA-2400, then use the NDU to find it. Refer to the Quick Start Guide to see how to install and run the NDU.
From the NDU main page click the icon under Admin to see the web configurator screen login screen. 2.2.2 Web Browser Access Open your browser and type in the IP address of the NSA-2400; 192.168.1.3 is the default IP address if one has not been assigned by a DHCP server. Figure 4 NDA URL 2.3 Login...
Chapter 2 Introducing the Web Configurator Figure 5 NSA-2400 Login Screen If another admin is already logged in, you may force them to log out in the next screen. Figure 6 Administrator Already Logged In You should see a screen asking you to change your password (highly recommended) as shown next.
Figure 7 Change Password Screen 1 If this is your first time to log into the NSA-2400, you will see a screen asking you to launch the setup wizard. Run the wizard to set up the basic NSA-2400 settings. See the Quick Start Guide for information on the wizard screens.
Figure 9 The web configurator management session automatically times out if it is left idle for 15 minutes. Simply log back into the NSA-2400 if this happens to you. 2.5 Global NSA-2400 Icons The icons and language label at the top-right of the screen ( You may select the web configurator language from the drop-down list box here.
This screen displays NSA-2400 hardware and IP address information. This screen displays statistics on users, groups and shares. Use this screen to create users who may use the NSA-2400. You may set user passwords, define storage limits per user, and associate users to a group(s).
This screen displays NSA-2400 date and time, log alert, HTTPS (SSL) and firmware version information. Use this screen to chose a time zone and/or allow the NSA-2400 to synchronize with a time server. Use this screen to configure when/where to send e-mail alerts, and what mail server to use.
Click the Disconnect icon before you remove an external hard drive so that you do not lose data that is being transferred to or from that hard drive. Click the Initialize icon for the NSA-2400 to create a volume on the (external) hard drive.
Click the Images icon to see a summary of all snapshots available. 2.6 Forgot Your Password If you forget your password, you could have the NSA-2400 e-mail your password to you if you configured your e-mail address and mail server on the NSA-2400. Alternatively, if you didn’t configure an e-mail address, then you will have to reset the NSA-2400.
Figure 13 Log in With New Password 2.7 The NSA-2400 RESET Button Use the RESET button at the front of the NSA-2400 to either just reset the admin password and NSA-2400 IP address (handy if you forgot your password or cannot access the web configurator) or reload the factory default configuration file (resets and erases all other configurations on the NSA-2400).
2.7.1 Reset To reset the admin password, NSA-2400 IP address and NSA-2400 subnet mask (only) to the factory default settings: 1 Use a pointed object to press and hold the RESET button for two seconds. Release the button when you hear a beep.
Page 40
Chapter 2 Introducing the Web Configurator NSA-2400 User’s Guide...
The following table describes the labels in this screen. Table 6 System Overview LABEL System Resources NSA-2400 User’s Guide Status Screens DESCRIPTION Select a number of seconds or None from the drop-down list box to refresh all screen statistics automatically at the end of each time interval.
Page 44
This displays the most recent (nine) error messages generated by the NSA. Click on a log entry to go to the Status > System Log screen. A volume is a storage area on a single disk or spread across a number of disks within a single file system.
Initially you can only read and write to the Public folder until you create shares on the NSA. This session is then displayed as shown in Figure 16 Session Example (Windows) NSA-2400 User’s Guide DESCRIPTION For external drives, this field shows USB1 for the first external hard drive you connect to the NSA (regardless of which USB port), USB2 for the second and USB3 for the third.
The screen always shows all logs by default. Choose a specific log category and then click Filter to view logs for just that category. Click this button to just view log types selected in the list box above. This shows the date and time the log was created. NSA-2400 User’s Guide...
Log Severity Levels Table 10 LEVEL See the appendices for a table of example log messages. NSA-2400 User’s Guide DESCRIPTION This displays the log category; see Table 9 on page This displays how serious the log is rated by the NSA. See page 47 for more information.
This displays whether the reset button is enabled or not. Use the reset button to reset the NSA-2400 (user name to “admin”, default password to “1234”, default IP address to 192.168.1.3 with subnet mask of 255.255.255.0) or restore the factory default configuration file (all configurations, including shares, users, passwords and so on are returned to the original configurations).
Page 49
Table 11 System Info (continued) LABEL MAC Address UPS Info NSA-2400 User’s Guide DESCRIPTION This displays the NSA’s unique physical hardware address (MAC). You need the MAC address to register the product at myZyXEL.com. Customer support may also request it for troubleshooting purposes.
Page 50
Chapter 3 Status Screens NSA-2400 User’s Guide...
More restrictive access rights override less restrictive ones. 4.2.1 In Limbo and In Conflict If a user or group is deleted in the domain controller, (but not on the NSA) then it appears as in limbo on the NSA. NSA-2400 User’s Guide Sharing Screens...
Page 52
• Share 1 is configured to be only accessible by the local user u1. • Share 2 is configured to be only accessible by the domain user u1. • Share 3 is configured to be accessible by BOTH the local and domain u1. NSA-2400 User’s Guide...
Total Number of Users This field displays the total number of user accounts created on the NSA Total Number of Local Users Total Number of CIFS Domain Users NSA-2400 User’s Guide SHARE 2 CIFS: Accessible by CIFS: Accessible by Local u1 only.
This field displays the number of shares that have been disabled on the NSA. If a shared folder is deleted or moved, the share appears as 'unavailable' on the NSA. This field displays the number of such shares. NSA-2400 User’s Guide...
This field displays the user name created when you add a new user. admin is the default NSA super user and cannot be deleted. This field displays the maximum amount of storage space this user may occupy on the NSA. It is unlimited if 0 is specified.
ANONYMOUS_FTP, EVERYONE nor be the same as an existing local or domain user. Other reserved user names that are not allowed are: • bin • daemon • ftp • ftpguest • nobody • root • smbguest • admin NSA-2400 User’s Guide...
This is the maximum amount of space this user is allowed per volume. Type a positive whole number (no floats, no negatives) as the maximum amount of storage (in MB) this user may use on the NSA. 0 MB means unlimited storage. The quota cannot exceed 500000000 MB.
Membership list and then click the Remove Selected Group(s) button. You need to click Apply for the changes to take effect. Click this button to save your changes back to the NSA. Click this button to begin configuring this screen afresh. NSA-2400 User’s Guide...
Table 18 Sharing > Groups LABEL Status User Type Group Name NSA-2400 User’s Guide DESCRIPTION This is a local group icon. Groups cannot be disabled. This is a domain group icon. Groups cannot be disabled. This is a local group in conflict icon.
This label displays the edit and remove icons for all groups created on the NSA. Click the Edit icon to edit the corresponding existing group. Click the Remove icon to delete it. Click this button to go to a screen to create a new group on the NSA. NSA-2400 User’s Guide...
Add Selected User(s) Remove Selected User(s) Apply Cancel NSA-2400 User’s Guide DESCRIPTION Type a group name from 1 to 16 single-byte ASCII characters. The first character must be alphabetical [A-Z a-z] (case insensitive) and cannot be a number. See Section 4.6.1 on page 60 names.
Click the Sharing link in the Navigation panel and then click the Shares link or the Shares tab to access the Sharing > Shares screen. The default shares on the NSA are shown in the following figure. Figure 25 Sharing > Shares NSA-2400 User’s Guide...
The default backup and snapshot shares cannot be deleted. This displays the name of the shared folder on the NSA. This displays which storage area (volume) the share was created. The default shares are on volume1. This displays the location of the shared folder on the NSA. Forward slashes are used as path (folder tree branch) separators.
255 characters 4.8.3 Share Comments Share comments are optional, so they can be blank. The maximum character length of a share comment is 255 characters. Share comments can contain any character except for the following: • “[double quote] NSA-2400 User’s Guide...
Windows shares. Since DFS is a logical mapping, the physical location of data becomes transparent to your users and applications. You can use DFS links when accessing the NSA using CIFS, not FTP. NSA-2400 User’s Guide Chapter 4 Sharing Screens...
See page 63 for more information on share names. You should have already created volumes (a single accessible storage area with a single file system) on the NSA. Section 4.8.1 on...
Page 67
Deny Any Access -> Share Access Rights Full Access: Read Access: Deny Access: NSA-2400 User’s Guide DESCRIPTION Type the location of the share on the NSA using forward slashes as branch separators. See Section 4.8.2 on page 64 share paths.
Page 68
Click the corresponding button to add or remove a DFS link. Click this button to save your changes back to the NSA. Click this button to begin configuring this screen afresh. Section 4.8.4 on page 65 for more information). Section 4.8.1 on page NSA-2400 User’s Guide...
IP addresses, follow their instructions in selecting the IP addresses and the subnet mask. The subnet mask specifies the network number portion of an IP address. NSA-2400 User’s Guide Network Screens...
Use the RESET button or the web configurator. In the following example, the NSA-2400 has jumbo frames enabled and set to 9KB frames. This means the computer, notebook computer, and switch must also have jumbo frames enabled and be capable of supporting 9KB frames.
Mode DHCP Server IP Address IP Subnet Mask NSA-2400 User’s Guide 1 Gbps Ethernet DESCRIPTION This field displays whether the NSA is receiving an IP address from a DHCP server (Dynamic) or whether it is assigned a static IP address.
This field shows the length of time in seconds that the FTP connection can be idle before timing out. This displays whether users are allowed to log into the NSA using an ‘FTP’ user name or ‘anonmyous’ without giving a password. NSA-2400 User’s Guide...
IP address of a machine before you can access it. If you have the IP address(es) of the DNS server(s), enter them. Dynamic Select the checkbox to have the DHCP server automatically assign a DNS server address to your NSA. NSA-2400 User’s Guide Chapter 5 Network Screens...
(including computer Ethernet cards and switches, hubs, or routers) support. Note: If you enable jumbo frames on the NSA-2400 in a network Apply Click Apply to save your TCP/IP configurations. After you click Apply, the NSA restarts.
The NSA time and date must be the same as the time and date on the external domain controller if the NSA is using one to import users and groups. 5.5.3 Windows/CIFS Screen Figure 32 Network > Windows/CIFS_Workgroup NSA-2400 User’s Guide Chapter 5 Network Screens...
Active Directory Domain if it uses a Windows 2000 or later operating system. Type the domain name of the Windows server domain controller. The name can be up to 255 characters long. Administrator is the default Windows Domain Administrator. NSA-2400 User’s Guide...
Enable FTP Connection Limit Idle Timeout Enable Anonymous FTP Access Apply NSA-2400 User’s Guide DESCRIPTION Type a password associated with the Windows Domain Administrator. Click here to save your changes back to the NSA. for more details on FTP. DESCRIPTION Select the Enable FTP checkbox to allow users to connect to the NSA via FTP;...
Protect screens to create and schedule snapshots and external backups. 6.1 Protection Methods There are a variety of ways to protect your data on the NSA-2400. Below is a summary table of what can be done in each situation.
6.1.3.1 Some Important Notes on Snapshots 1 Snapshots cannot be taken on external volumes or internal volumes using the BACKUP storage system. Snapshots are stored in the reserved snapshot space. 2 If the reserved space for snapshots runs out, then all snapshots (including previously created ones) are lost.
6 The purging of snapshots occurs after the next snapshot is taken (unlike backup purges which occur before backup is done). 7 You cannot create snapshots with volumes created using this NSA-2400 release 1 (v1.00 AFA.0 C0) firmware. To overcome this, create a new volume using release 2 firmware, copy the old volume data over to the new volume and then recreate the old volume.
The Protect > Overview screen shows you how many backups, snapshots and schedules you have created or configured. for a comparison of backups and snapshots. for a comparison of backups and RAID. for an overview of protection methods available on the NSA-2400. NSA-2400 User’s Guide...
(You can also do this in the Protect > Scheduler screen, but if you do it in the Protect > Backup screen, then specific related backup information is already entered.) NSA-2400 User’s Guide DESCRIPTION This is the name of the backup This is some extra descriptive text on the backup This displays normal backup type.
Add a New Backup Job to create a new backup. (Section 6.4 on page 95) in this User’s Guide for more Protect > Backup Protect > Backup screen to edit that backup or NSA-2400 User’s Guide screen to immediately...
External Disk What to Backup Files/Folders to backup: NSA-2400 User’s Guide DESCRIPTION This is a required field that uniquely identifies the backup. Type from one to 32 characters. All characters are allowed except /:"'*?<>\. Type from 0 to 60 characters to further describe this backup.
Click this button to save your changes back to the NSA. Click this button to begin configuring this screen afresh. Protect > Backup screen to replace existing files with files NSA-2400 User’s Guide...
Choose whether files in the backup should replace existing file.s • Do NOT replace existing files • Always replace files Choose whether to restore files to their original location on the NSA-2400 or specify a different location (on the NSA-2400) • Original Location •...
You can also do this within the create/edit snapshot screen (see 6.3.7 on page 94 for details on these fields). Protect > Snapshot screen, then specific related snapshot information is already entered.) Section 6.3.7 on page 94). Section screen to schedule NSA-2400 User’s Guide...
Table 32 Protect > Snapshot > Create/Edit LABEL Snapshot Job Name: Snapshot Job Description: Type from 0 to 60 characters to further describe this snapshot. NSA-2400 User’s Guide (Section 6.4 on page 95) in this User’s Guide for more Protect > Snapshot Protect >...
As a snapshot is a file of changes since your previous snapshots, selecting this option may cause problems with rollback later. Click this button to save your changes back to the NSA. Click this button to begin configuring this screen afresh. NSA-2400 User’s Guide...
6.4.2 Scheduler Create/Edit Screen Click the Create a New Scheduled Task button in the new schedule. Click the edit icon in the schedule. NSA-2400 User’s Guide summary screen. DESCRIPTION This fields shows whether the backup or snapshot has been run yet..
Select how often the job should run (Daily, Weekly or Monthly) Enter the time, day and/or month as appropriate for your selection above. Click this button to save your changes back to the NSA. Click this button to begin configuring this screen afresh. NSA-2400 User’s Guide...
H A P T E R This chapter covers storage systems, volumes and disks on the NSA-2400. 7.1 Storage Introduction Use the Storage screens to create and manage NSA-2400 volumes (internal and external), disks and reserve snapshot space. • See Section 7.3 on page 98...
Below is a table that summarizes some attributes of the various RAID levels as supported on the NSA-2400. For capacity and storage efficiency, “S” is the size of the smallest drive in the array, and “N” is the number of drives in the array.
The following is a guide to help you choose a storage method for the various number of disks supported on the NSA-2400. See and the RAID levels used on the NSA-2400. Typical applications for each method are also shown there.
You (the administrator) can see the status of a volume in the Status, Storage > Overview or Storage > Volume screens. The NSA-2400 has the following classifications for the status of a volume: • Healthy if all disks in the volume are OK and the file system is functioning properly.
7.4 RAID This section contains theoretical background on JBOD and the RAID levels used on the NSA- 2400. Skip to the next section if you already understand RAID and know what storage system you want to use on the NSA-2400.
(but you may lose data in the whole volume depending on the nature of the disk failure). You can add disks to the JBOD volume later (using the Add disk to JBOD feature) and even remove them so JBOD offers a lot of NSA-2400 User’s Guide...
400 GB (4 * 100 GB, the smallest disk size) and the remaining space (300 GB) is unused. Typical applications for RAID 0 are non-critical data (or data that changes infrequently and is backed up regularly) requiring high write speed such as audio, video, graphics, games and so NSA-2400 User’s Guide Chapter 7 Storage Screens DISK 3...
(two or four for the NSA). When you use RAID 1 on the NSA-2400, you MUST use disks 1 and 2 in one RAID volume and/or disks 3 and 4 in the other; you cannot have disks 1 and 3 in the same RAID volume for example.
The following example shows data stripped across three disks (A1 to A3 in the first strip for example) with parity information (AP) on the fourth disk Table 42 RAID 5 DISK 1 DISK 2 NSA-2400 User’s Guide RAID 0 RAID 1 DISK 3 DISK 4...
NSA-2400 malfunctioning. See 6.1 on page 83 for what you should use in these cases to protect data on your NSA-2400. 7.5 Volume Screen Click the Volume tab to display the volume summary screen as shown.
Repair icon after you have replaced the faulty disk. This field shows the NSA-generated name for the volume. This field shows what type of data storage system (a RAID type or JBOD) the volume is using. For external drives, it may show REGULAR meaning that the NSA can read the volume but the volume wasn’t created on the...
A disk can only belong to one volume. Click this button to save your changes back to the NSA. Click this button to begin configuring this screen afresh. Figure 49 for more NSA-2400 User’s Guide...
If your USB storage device uses a NTFS file system, then the NSA can read files from it, but cannot write files to it. If you want to be able to write files to that storage device, then you should back up all data on the device (to an internal drive for example) and then click the Initialize icon for the NSA to create an XFS volume on the (external) hard drive.
5 Save a backup of this volume. 6 Once you have made the backup, go to Storage > Volume and delete this volume. 7 Shut down the NSA. 8 Put back the disk(s) you removed in step 1.
To avoid conflicting volumes, delete a volume before you remove its disk(s). 7.7.5 Disk Screen The following screen shows information on disks installed in the NSA-2400. Figure 52 Storage > Disk The following table describes the labels in this screen.
Page 112
Click the Locate icon to cause the corresponding USB LED on the NSA to blink. Click the Initialize icon for the NSA to create a volume on the (external) hard drive. You can configure an external disk as either JBOD or BACKUP only! NSA-2400 User’s Guide...
8.1 Maintenance Overview Use the maintenance screens to: • View system information • Set the NSA-2400 date and time • View logs and configure where e-mail logs should be sent via e-mail • Change your password and configure HTTPS • Manage the NSA-2400 configuration file •...
SSL by loading a different certificate in the Maintenance > Security screen. This field displays the version number of the firmware for your 2400 . The time is updated . The date is updated should send e-mail alerts. NSA- NSA-2400 User’s Guide...
8.2 Date/Time Use this screen to select a time zone and a time server from which your NSA-2400 can get the time and date. This time is then used in NSA-2400 logs and alerts. 8.2.1 Time Lag Time lag occurs when the time on the NSA-2400 falls behind the time on the time server. This may happen if: •...
Time Zone Apply 8.3 Log Alert Screen Use this screen to set how often the NSA-2400 should e-mail alerts, to where and via what e- mail server. An alert is an event that requires administrator attention. DESCRIPTION This field displays the time of your NSA-2400.
Use SMTP Authentication SMTP User Name Password From Email Address NSA-2400 User’s Guide DESCRIPTION This section allows you to set the e-mail alert options. You can decide how often to send e-mail alerts, to whom, and via which mail server.
NSA-2400. 8.4.1 Introduction to HTTPS HTTPS is used on the NSA-2400 so that you may securely access the NSA-2400 using the web configurator. HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web protocol that encrypts and decrypts web pages. Secure Socket Layer (SSL)
Figure 56 Certificate Warning Screens You see warning screens because the NSA-2400 comes with a default certificate where its Certificate Name (Common Name) and your NSA-2400 domain name do not match. Figure 57 NSA-2400 Default Certificate You may choose to accept the default certificate temporarily for this session or permanently.
Click Apply to save your password change. Select the check box to allow only secure web (HTTPS) connections to the NSA-2400. HTTP connection attempts are forwarded to HTTPS. Clear the check box to allow both HTTP and HTTPS connections. Click Apply to save your secure connection change.
SSL Key. Note for the Common Name, you must type your NSA's Fully Qualified Domain Name (FQDN). For example, if your NSA-2400’s domain name is nsa.zyxel.com then make sure the common name is exactly the same. This is important as otherwise your certificate will have a domain name mismatch.
NSA-2400. For example, if your NSA-2400 domain name is nsa.zyxel.com, then make sure the common name is exactly the same. If you use an IP address to access your NSA-2400, then set the common name to the IP address of the NSA-2400.
• The Certificate Authority (CA) is trusted. Your certificate authority must be trusted by your browser. 8.5 Configuration Use the Configuration screen to back up or restore the NSA-2400 configuration settings and enable or disable the hardware reset button. 8.5.1 Configuration Screen Click the Maintenance link in the Navigation panel and then click the Configuration link or the Configuration tab to access the Maintenance >...
Button Load Default Button 8.6 Firmware Upgrade Use this screen to upgrade the NSA-2400 firmware. You should first have downloaded the latest firmware files from the ZyXEL website. 8.6.1 Firmware Upgrade Screen Click the Maintenance link in the Navigation panel and then click the FW Upgrade link or the FW Upgrade tab to access the Maintenance >...
Upgrade 8.7 Shutdown Use this screen to turn off the NSA-2400 or perform a software restart. A software restart is faster than turning the NSA-2400 off and then turning it on again. Before shutting down or restarting, check the System Status > Active Sessions screen to make sure that no one is logged into the NSA-2400 or transferring files to or from the NSA-2400.
Figure 63 Maintenance > Shutdown > Confirm Restart When you click the Shutdown button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the shutdown. Figure 64 Maintenance > Shutdown > Confirm Shutdown NSA-2400 User’s Guide...
RAID volume is down but the volume can still be used (if you’re using RAID 1 or RAID 5). What you have to do is turn the NSA-2400 off and replace the faulty disk. See your Quick Start Guide for information on replacing a disk and also 7.7.3 on page...
Page 130
NSA-2400 must be turned off before you remove or install hard drive(s). After replacing the disk, turn on the NSA-2400, go to the Storage > Disk screen and click the Repair icon next to the new disk. If there is already another volume resynchronizing, then you will see Waiting Resync as the volume status.
The disk drive ALM LED is on. • The hard disk has a problem. What you have to do is turn the NSA-2400 off and replace the faulty disk. See your Quick Start Guide for information on replacing a disk and also Section 7.7.3 on page...
I forgot the password. • The default password is 1234. • If you forget your password, you could have the NSA-2400 e-mail your password to you if you configured your e-mail address and mail server on the NSA in the Maintenance >...
The NDU cannot discover my NSA. • Confirm that the computer running the NDU has a network connection. See the section on the NSA-2400’s LAN connection for related information. • The computer running the NDU can only discover NSA-2400s in the same subnet. NSA- 2400s connected to the same switch or router as your NDU computer are usually in the same subnet unless the router is doing subnetting or the switch is implementing VLAN.
Page 134
Java enabled. See the • Make sure your computer is in the same subnet as the NSA-2400. • Reset the device to its factory defaults, and try to access the NSA-2400 with the default IP address. See Section 2.7 on page 38 •...
• Check that the domain controller is turned on. • Check that the NSA-2400 time is synchronized with the domain controller. If the NSA time is set manually, make sure that the domain controller is also set manually to the same time.
The snapshot or backup does not run at the time configured. • Check that the correct time is configured on the NSA-2400. • Check that the NSA-2400 is able to access the time server from which it gets the time; see Section 8.2 on page Section 9.2 on page...
9.6 External USB Disks My external USB disk is read-only. If your USB disk was formatted as NTFS, then it can be read-only by the NSA-2400 ((it may show REGULAR meaning that the NSA can read the volume but the volume wasn’t created on the NSA).
Appendices and Index Product Specifications (141) Log Messages (147) Setting up Your Computer’s IP Address (151) Open Source Licences (171) Legal Information (201) Customer Support (203) Index (209)
Serial ATA also allows more efficient internal airflow and also smaller chassis design. Use the reset button to reset the NSA-2400 (user name to “admin”, default password to “1234”, default IP address to 192.168.1.3 with subnet mask of 255.255.255.0) or restore the factory default configuration file (all configurations, including shares, users, passwords and so on are returned to the original configurations).
Page 142
Use the disk quota feature to stop one user(s) from using up all disk capacity by setting a limit on how much storage space he/she may use. Configure a password for an individual User to restrict access to the NSA.
Specification Tables The NSA-2400 hardware specifications are shown in the following table. Table 55 NSA-2400 Hardware Specifications IP Address Subnet Mask Default Username Default Password Dimensions Weight Disk Trays Compatible Hard Disks CPU Operating Temperature Ports Ethernet USB v2.0 Storage...
A. Limits may vary depending on user-share resource usage. Power Consumption The NSA-2400 was tested using the specified power sources with the external power adapter and with four hard drives installed. This table is a laboratory test of NSA-2400 power consumption for your reference only.
P P E N D I X This appendix shows some NSA-2400 log messages. Log Messages Table 58 Log Messages SEVERITY MESSAGE SECURITY INFO User {0} successfully log in from {1} INFO User {0} attempted to login from {1} INFO...
Page 148
Volume name Volume name Volume name Volume name Volume name Volume name Volume name Volume name Volume name Configuratio Disks Volume name Configuratio Disks Volume name Configuratio Disks Disk name Disk name Disk name Disk name Disk name NSA-2400 User’s Guide...
Page 149
CPU temperature over 90 degree C ERROR Unable to convert date time format A. IP of a web configurator session changed B. Browser type of the same web configurator session changed. NSA-2400 User’s Guide Appendix B Log Messages ARGUMENT(S) Disk name Disk name...
Page 150
Appendix B Log Messages NSA-2400 User’s Guide...
7 and later operating systems. After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to “communicate” with your network. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window. NSA-2400 User’s Guide Address...
2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. NSA-2400 User’s Guide...
• If you do not know your DNS information, select Disable DNS. • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). NSA-2400 User’s Guide Appendix C Setting up Your Computer’s IP Address...
3 Select your network adapter. You should see your computer's IP address, subnet mask and default gateway. Windows 2000/NT/XP The following example figures use the default Windows XP GUI theme. 1 Click start (Start in Windows 2000/NT), Settings, Control Panel. NSA-2400 User’s Guide...
2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 73 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. NSA-2400 User’s Guide Appendix C Setting up Your Computer’s IP Address...
• If you have a dynamic IP address click Obtain an IP address automatically. • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Click Advanced. NSA-2400 User’s Guide...
Automatic metric check box and type a metric in Metric. • Click Add. • Repeat the previous three steps for each default gateway you want to add. • Click OK when finished. NSA-2400 User’s Guide Appendix C Setting up Your Computer’s IP Address...
• If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. NSA-2400 User’s Guide...
Network Connections, right-click a network connection, click Status and then click the Support tab. Macintosh OS X 1 Click the Apple menu, and click System Preferences to open the System Preferences window. NSA-2400 User’s Guide Appendix C Setting up Your Computer’s IP Address...
• Type your subnet mask in the Subnet mask box. • Type the IP address of your gateway in the Router address box. 5 Click Apply Now and close the window. 6 Restart your computer (if prompted). NSA-2400 User’s Guide...
Figure 81 Red Hat 9.0: KDE: Network Configuration: Devices 2 Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown. NSA-2400 User’s Guide Appendix C Setting up Your Computer’s IP Address...
Configuration screen. Enter the DNS server information in the fields provided. Figure 83 Red Hat 9.0: KDE: Network Configuration: DNS 5 Click the Devices tab. 6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. NSA-2400 User’s Guide...
2 If you know your DNS server IP address(es), enter the DNS server information in the file in the resolv.conf two DNS server IP addresses are specified. NSA-2400 User’s Guide Appendix C Setting up Your Computer’s IP Address is the name of the Ethernet card). Open the eth0...
To have Internet Explorer trust a device certificate issued by a certificate authority, import the certificate authority’s certificate into your operating system as a trusted certification authority. The following example procedure shows how to import the device’s (self-signed) server certificate into your operating system as a trusted certification authority. NSA-2400 User’s Guide Browser...
1 In Internet Explorer, double click the lock shown in the following screen. Figure 91 Login Screen 2 Click Install Certificate to open the Install Certificate wizard. Figure 92 Certificate General Information before Import 3 Click Next to begin the Install Certificate wizard. NSA-2400 User’s Guide...
Figure 93 Certificate Import Wizard 1 4 Select where you would like to store the certificate and then click Next. Figure 94 Certificate Import Wizard 2 5 Click Finish to complete the Import Certificate wizard. NSA-2400 User’s Guide Appendix D Importing Certificates Into Your Browser...
Appendix D Importing Certificates Into Your Browser Figure 95 Certificate Import Wizard 3 6 Click Yes to add the device certificate to the root store. Figure 96 Root Certificate Store NSA-2400 User’s Guide...
No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes software developed by the Apache Software Foundation under Apache License.
Page 172
Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file NSA-2400 User’s Guide...
Page 173
Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS Version 1.1 Copyright (c) 1999-2003 The Apache Software Foundation. All rights reserved. NSA-2400 User’s Guide...
Page 174
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1. Preamble NSA-2400 User’s Guide...
Page 175
The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. NSA-2400 User’s Guide...
Page 176
Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. NSA-2400 User’s Guide...
Page 177
Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library.
Page 178
Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the NSA-2400 User’s Guide...
Page 179
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to NSA-2400 User’s Guide...
Page 180
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES. NSA-2400 User’s Guide...
To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION NSA-2400 User’s Guide Appendix E Open Source Licences...
Page 182
Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
Page 183
License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies NSA-2400 User’s Guide...
Page 184
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR NSA-2400 User’s Guide...
Page 185
Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to copy and distribute verbatim copies of this document is granted This Product includes open SSL under the Open SSL License NSA-2400 User’s Guide Appendix E Open Source Licences...
Page 186
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ================== This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). NSA-2400 User’s Guide...
Page 187
POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] NSA-2400 User’s Guide...
Page 188
4. Products derived from this software may not be called “PHP”, nor may “PHP” appear in their name, without prior written permission from group@php.net. You may indicate that your software works in conjunction with PHP by saying “Foo for PHP” instead of calling Foo” or “phpfoo” it “PHP NSA-2400 User’s Guide...
Page 189
1. Definitions. 1.0.1. “Commercial Use” means distribution or otherwise making the Covered Code available to a third party. 1.1. “Contributor” means each entity that creates or contributes to the creation of Modifications. NSA-2400 User’s Guide Appendix E Open Source Licences...
Page 190
(b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. 2. Source Code License. 2.1. The Initial Developer Grant. NSA-2400 User’s Guide...
Page 191
Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5. 3.2. Availability of Source Code. NSA-2400 User’s Guide...
Page 192
Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any NSA-2400 User’s Guide...
Page 193
6. Versions of the License. 6.1. New Versions Netscape Communications Corporation (“Netscape”) may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions NSA-2400 User’s Guide...
Page 194
Participant to You under Sections 2.1 and/or 2.2 automatically terminate at the expiration of the 60 day notice period specified above. NSA-2400 User’s Guide...
Page 195
International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. 12. Responsibility for claims NSA-2400 User’s Guide...
Page 196
Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: NSA-2400 User’s Guide...
Page 197
License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
Page 198
DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR...
Page 199
This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement.
Page 200
Appendix E Open Source Licences NSA-2400 User’s Guide...
Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
Page 202
Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
CIFS Domain Users Common Internet File System (CIFS) common screen icons compatible hard disks computer’s IP Address configuration file backup restore configuration file backup NSA-2400 User’s Guide connection limit contact information copyright usage customer support date/time default NTP time servers DFS Links...