ZyXEL Communications NSA-2401 User Manual

ZyXEL Communications NSA-2401 User Manual

Network storage appliance
Hide thumbs Also See for NSA-2401:
Table of Contents

Advertisement

NSA-2401
Network Storage Appliance
User's Guide
Version 1.00
11/2008
Edition 1
DEFAULT LOGIN
LAN1 IP Address
LAN2 IP Address
Username
Password
192.168.1.3
192.168.100.3
admin
1234
www.zyxel.com

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NSA-2401

  • Page 1 NSA-2401 Network Storage Appliance User’s Guide Version 1.00 11/2008 Edition 1 DEFAULT LOGIN LAN1 IP Address 192.168.1.3 LAN2 IP Address 192.168.100.3 Username admin Password 1234 www.zyxel.com...
  • Page 3: About This User's Guide

    • Supporting Disk Refer to the included CD for support documents. • ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product certifications. User Guide Feedback Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead.
  • Page 4: Document Conventions

    “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on. • “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”. NSA-2401 User’s Guide...
  • Page 5 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device. Computer Notebook computer Server Firewall Switch Router NSA-2401 User’s Guide...
  • Page 6: Safety Warnings

    • Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. This product is recyclable. Dispose of it properly. NSA-2401 User’s Guide...
  • Page 7 Safety Warnings NSA-2401 User’s Guide...
  • Page 8 Safety Warnings NSA-2401 User’s Guide...
  • Page 9: Table Of Contents

    Network Screens ........................159 Sharing Screens ........................173 Protect Screens ........................195 Application Screens ......................... 221 Maintenance Screens ......................227 Troubleshooting and Specifications .................. 245 Troubleshooting ........................247 Product Specifications ......................255 Appendices and Index ......................261 NSA-2401 User’s Guide...
  • Page 10 Contents Overview NSA-2401 User’s Guide...
  • Page 11: Table Of Contents

    List of Tables........................... 25 Part I: Introduction and Tutorials ............29 Chapter 1 Getting to Know Your NSA..................... 31 1.1 NSA-2401 Overview ......................31 1.1.1 Front Panel LEDs ....................... 32 1.1.2 Power Button ......................33 1.1.3 COPY Button ......................33 Chapter 2 Introducing the Web Configurator ..................
  • Page 12 3.9.2 Adding an Internal Hard Drive to an Existing Disk Array .......... 107 3.9.3 Using a Disk Array’s Increased Capacity ..............109 3.9.4 Migrating a RAID to Higher Capacity Hard Drives ............110 Part II: Web Configurator ..............115 NSA-2401 User’s Guide...
  • Page 13 6.9.5 RAID 10 ........................154 6.9.6 RAID 5 ........................155 6.9.7 Hot-spare ......................... 155 6.9.8 RAID and Data Protection ..................156 6.9.9 S.M.A.R.T Attributes ....................156 Chapter 7 Network Screens........................159 7.1 Network Screens Overview ....................159 NSA-2401 User’s Guide...
  • Page 14 9.3.1 Protect > Restore: Step 2 ..................211 9.3.2 Protect > Restore: Step 3 ..................212 9.3.3 Protect > Restore: Step 4 ..................213 9.4 Snapshots .......................... 213 9.4.1 Creating/Editing Snapshots ..................216 9.4.2 Snapshot Images ..................... 217 NSA-2401 User’s Guide...
  • Page 15 12.1 Troubleshooting Overview ....................247 12.2 Power, Hardware Connections, and LEDs ..............247 12.3 NSA Login and Access ....................249 12.4 Users Cannot Access the NSA ..................251 12.5 Backups and Snapshots ....................252 12.6 External USB Disks ......................253 NSA-2401 User’s Guide...
  • Page 16 Appendix A Log Messages....................263 Appendix B Setting Up Your Computer’s IP Address ............273 Appendix C Importing Certificates..................297 Appendix D Open Source Licences ..................321 Appendix E Legal Information ....................351 Appendix F Customer Support ..................... 353 Index............................359 NSA-2401 User’s Guide...
  • Page 17: List Of Figures

    Figure 33 Gonzo’s My NSA Screens ...................... 63 Figure 34 Gonzo Share Screen ......................64 Figure 35 Strategy Folder Screen ......................65 Figure 36 Upload Files Screen ....................... 65 Figure 37 Opening the Finder ......................... 66 Figure 38 Displaying the NSA ........................ 66 NSA-2401 User’s Guide...
  • Page 18 Figure 78 Protect > Snapshot > Snapshot Image Access ..............91 Figure 79 Using a Snapshot Image ......................92 Figure 80 Protect > Backup ........................92 Figure 81 Protect > Backup > Add Job: Step 1 ..................93 NSA-2401 User’s Guide...
  • Page 19 Figure 120 Storage > Internal Storage > RAID ..................113 Figure 121 Status Screen ........................117 Figure 122 System Setting > Date/Time ....................121 Figure 123 Disks, RAIDs, and Volumes ....................125 Figure 124 Storage > Internal Storage > Status ................... 127 NSA-2401 User’s Guide...
  • Page 20 Figure 164 Sharing > Shares > Configuration ..................193 Figure 165 Sharing > Shares > DFS ....................194 Figure 166 Protect > Backup ....................... 199 Figure 167 Protect > Backup > Add Job: Step 1 ................. 200 NSA-2401 User’s Guide...
  • Page 21 Figure 206 Maintenance > Power Management > Edit ............... 242 Figure 207 Maintenance > Shutdown ....................244 Figure 208 Maintenance > Shutdown > Confirm Restart ..............244 Figure 209 Maintenance > Shutdown > Confirm Shutdown ..............244 Figure 210 Power Adaptor Pinout......................259 NSA-2401 User’s Guide...
  • Page 22 Figure 249 Internet Explorer 7: Certification Error ................298 Figure 250 Internet Explorer 7: Certification Error ................298 Figure 251 Internet Explorer 7: Certificate Error ................... 298 Figure 252 Internet Explorer 7: Certificate .................... 299 Figure 253 Internet Explorer 7: Certificate Import Wizard ..............299 NSA-2401 User’s Guide...
  • Page 23 Figure 292 Konqueror 3.5: Public Key Certificate File ................318 Figure 293 Konqueror 3.5: Certificate Import Result ................318 Figure 294 Konqueror 3.5: Kleopatra ....................318 Figure 295 Konqueror 3.5: Settings Menu .................... 319 Figure 296 Konqueror 3.5: Configure ....................319 NSA-2401 User’s Guide...
  • Page 24 List of Figures NSA-2401 User’s Guide...
  • Page 25: List Of Tables

    Table 34 Storage > External Storage > Volume Icons ................ 147 Table 35 Storage > External Storage > Volume .................. 148 Table 36 Storage > External Storage > Volume Create ..............149 Table 37 JBOD ............................ 152 Table 38 RAID 0 ..........................153 NSA-2401 User’s Guide...
  • Page 26 Table 78 Protect > Backup > Restore Archive: Step 3 ................ 210 Table 79 Protect > Restore: Step 1 ..................... 210 Table 80 Protect > Restore: Step 2 ......................211 Table 81 Protect > Restore: Step 3 ..................... 212 NSA-2401 User’s Guide...
  • Page 27 Table 109 Physical Features ....................... 255 Table 110 Firmware Features ......................255 Table 111 NSA Hardware Specifications ....................257 Table 112 NSA Firmware Specifications ....................258 Table 113 Power Consumption in Watts (W) ..................259 Table 114 Log Messages ........................263 NSA-2401 User’s Guide...
  • Page 28 List of Tables NSA-2401 User’s Guide...
  • Page 29: Introduction And Tutorials

    Introduction and Tutorials Getting to Know Your NSA (31) Introducing the Web Configurator (35)
  • Page 31: Getting To Know Your Nsa

    H A P T E R Getting to Know Your NSA 1.1 NSA-2401 Overview The NSA (Network Storage Appliance) allows secure storage and management of data on your network. Windows, Apple, or Linux users can access data on it as if it was on their own computers.
  • Page 32: Front Panel Leds

    The SYS LED blinks orange when firmware is being uploaded to the NSA. Do not turn off or reset the NSA while the firmware update is in progress! Table 2 NSA LEDs COLOR STATUS DESCRIPTION Green The NSA is turned off. The NSA is turned on and receiving power. NSA-2401 User’s Guide...
  • Page 33: Power Button

    NSA. Use the Applications > Copy Button screen (Section 10.4 on page 225) to choose where the NSA stores the files. The name of the folder created for the copied files consists of the date and time of the copy in year_month_day_hour_minute_second format. NSA-2401 User’s Guide...
  • Page 34 Chapter 1 Getting to Know Your NSA NSA-2401 User’s Guide...
  • Page 35: Introducing The Web Configurator

    2.2.1 Access the NSA Using the NDU If you don’t know the IP address of the NSA, then use the NDU to find it. Refer to the Quick Start Guide to see how to install and run the NDU. NSA-2401 User’s Guide...
  • Page 36: Web Browser Access

    The default user name and password are ‘admin’ and ‘1234’ respectively. Enter your user name and password, then click Login. Non-admin users can change their passwords by using the username and password in the My NSA > Password screen. See Section 2.5.7 on page 46 for details. NSA-2401 User’s Guide...
  • Page 37: User-Level Screens Overview

    The Web Configurator session automatically times out after 15 minutes. Simply log back into the NSA if this happens to you. 2.4 User-level Screens Overview All users (including the administrator) first see the user-level access My NSA screen after login. NSA-2401 User’s Guide...
  • Page 38: My Nsa Screen

    It is similar to a shared folder in Windows, but the access rights are independent of the folder (you configure the share and the folder separately). You can map a share to a network drive for easy and familiar file transfer for Windows users. NSA-2401 User’s Guide...
  • Page 39: Figure 8 My Nsa Screen

    The administrator owns and manages the public shares. Configure Click this button to see and configure the management details for a share. Other Shares These are other shares on the internal hard drives or external (USB) devices that you can access (but not manage). NSA-2401 User’s Guide...
  • Page 40: My Nsa Share Browsing Screen

    Table 5 My NSA Share Browsing Icons DESCRIPTION ICON Create Folder Click this icon to open a screen where you can create a new folder. Upload Click this button to copy a file from your computer to this location in the NSA. NSA-2401 User’s Guide...
  • Page 41: Table 6 My Nsa Share Browsing

    Size This column displays a file’s size. Modified Date This column displays the last time the file or folder was changed (in year- month-day hour:minute:second format). Close Click this button to return to the My NSA screen. NSA-2401 User’s Guide...
  • Page 42: My Nsa Share Browsing Move To Or Copy To Screen

    Use the My NSA share configuration screens to see and configure share management details. Click My NSA and then the Configure button of one of your shares to open the following screen. This screen displays a share’s management details. Figure 11 My NSA Share Configuration NSA-2401 User’s Guide...
  • Page 43: My Nsa Change Share Properties Screen

    Share Name Enter the name of the shared folder. The text may consist of 1 to 255 characters. Share Name Details on page 44 for more information. Volume Select a volume for the share to be located on. NSA-2401 User’s Guide...
  • Page 44 • Share names cannot use names reserved for “automatic shares” of external USB disk volumes be unique, for example, “USB[0-9]{1,2}”, that is, a share named “USB” followed by a one or two digit number). 2.5.4.1 Share Access Configuration This screen allows you to assign permissions to a share. NSA-2401 User’s Guide...
  • Page 45: Share And Folder Names

    The NSA allows FTP access to shares, folders or files with names encoded in the UTF-8 (8-bit UCS/Unicode Transformation Format) format. So your FTP client must support UTF-8 in order to access shares, folders or files on the NSA with Unicode names. • Spaces • _ [underscores] NSA-2401 User’s Guide...
  • Page 46: Share Paths

    2.5.7 Password Screen Click Password to open the following screen. Use this screen to change an account’s password. Enter a new password and confirm it by re-entering it. Figure 14 Password NSA-2401 User’s Guide...
  • Page 47: Administration Screens

    The first time you access the administration screens, the setup wizard opens. See the online help for details on the setup wizard screens. After you configure the setup wizard, the Status screen displays when you enter the advanced administration screens. NSA-2401 User’s Guide...
  • Page 48: Global Administration Icons

    Click this icon to open a web help page specific to the screen you are currently configuring. About Click this icon to view the model name, firmware version and copyright. Wizards Click this icon to open a sub-menu of wizard(s). NSA-2401 User’s Guide...
  • Page 49: Navigation Panel

    Click a minus (-) link to hide a category’s screen links. Certain screens also contain hyper links that allow you to jump to another screen. Click the Status icon to open the Status screen. Figure 16 Navigation Panel Links NSA-2401 User’s Guide...
  • Page 50: Table 14 Screens Summary

    Upload new firmware to your NSA. Power Set the hard drive sleep timer. Management Shutdown Restart your NSA or turn it off. Logout Click Logout to exit the Web Configurator. This is recommended to prevent unauthorized administrator access to the NSA. NSA-2401 User’s Guide...
  • Page 51: Main Window

    If you have disk space available for a new disk array, then click this icon to open a screen where you can create a new disk array. Delete Select an entry and click this icon to remove the entry. Edit Select an entry and click this icon to modify it’s settings. NSA-2401 User’s Guide...
  • Page 52: Nsa Reset Button

    Press the RESET button and hold it for ten seconds (you will hear three beeps) and release it. The NSA sounds three more beeps after you release the button as confirmation. NSA-2401 User’s Guide...
  • Page 53: Figure 17 Reset And Reload Timeline

    Chapter 2 Introducing the Web Configurator Figure 17 Reset and Reload Timeline Beep Beep Beep Seconds Release Release Press button to reset to reload and restart The NSA automatically restarts to complete reloading the factory default configuration file. NSA-2401 User’s Guide...
  • Page 54 Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide...
  • Page 55: Tutorials

    You may also to give management read and write access to some files and give other employees read-only access. Using the tools built into the ZyXEL Web Configurator, you can do just this. 3.2.1 Setting Up User Accounts As the administrator of the NSA, one of the first tasks you will want to do is set up accounts for everyone who needs to use it.
  • Page 56: Figure 18 Administrator Login

    Chapter 3 Tutorials 1 Log into the Web Configurator using your administrator Username and Password. Figure 18 Administrator Login 2 In the My NSA screen, click Administration. Figure 19 My NSA NSA-2401 User’s Guide...
  • Page 57: Figure 20 Sharing > Users

    3 Once the Web Configurator workspace appears, click Sharing > Users to open the user account management area. Figure 20 Sharing > Users 4 Click Add Account to open the Create a New Account screen. Figure 21 Sharing > Users > Create a New Account NSA-2401 User’s Guide...
  • Page 58: Setting Up Groups

    After you create accounts, the next thing you’ll want to do is organize the user accounts into groups. This example creates a senior management group with vice president Gonzo as a member. You can add other members later. 1 Click Sharing > Groups > Add Group. Figure 22 Groups NSA-2401 User’s Guide...
  • Page 59: Setting Up Shares

    You also have a senior management group. You want to allow the users in the senior management group to access both shares while Kermit can access his own share. 1 Click Sharing > Shares > Add Share. Figure 24 Shares NSA-2401 User’s Guide...
  • Page 60: Figure 25 Sharing > Shares > Add Share

    Share Access to Advanced and click Edit. Figure 25 Sharing > Shares > Add Share 3 Include Senior-Management under Full and click Apply. This way both Kermit and the senior managers have full access to the share. Figure 26 Share Access Configuration NSA-2401 User’s Guide...
  • Page 61: How To Use Shares

    Network Drive screen. 2 In the Folder field, enter two backslashes followed by the IP address of the NSA (192.168.1.35), another backslash, and the name of the share (Gonzo) and click Finish. Figure 28 Mapping a Share NSA-2401 User’s Guide...
  • Page 62: Using A Share With A Web Browser

    5 Copy and paste the 2009-Plan.doc file into the Strategy folder. Figure 31 Using the Folder 3.3.2 Using a Share with a Web Browser Now Gonzo wants to use his web browser to add the 2010-2014-Plans.doc file to his Strategy folder. NSA-2401 User’s Guide...
  • Page 63: Figure 32 User Login

    Chapter 3 Tutorials 1 Open Firefox and enter http://192.168.1.35 to open the login screen. Enter Gonzo’s username and password and clicks Login. Figure 32 User Login 2 Click the Gonzo share. Figure 33 Gonzo’s My NSA Screens NSA-2401 User’s Guide...
  • Page 64: Figure 34 Gonzo Share Screen

    Chapter 3 Tutorials 3 Open the Strategy share. Figure 34 Gonzo Share Screen NSA-2401 User’s Guide...
  • Page 65: How To Find The Nsa In Os X

    5 Browse to the 2010-2014-Plans.doc file and click Apply. Figure 36 Upload Files Screen 3.4 How to Find the NSA in OS X Here’s how to find the NSA-2401 OS X. This example uses Mac OS X 10.5 (Leopard). NSA-2401 User’s Guide...
  • Page 66: Figure 37 Opening The Finder

    Chapter 3 Tutorials 1 Click the Finder icon in the dock. Figure 37 Opening the Finder 2 Select All under Shared in the sidebar. An entry for the NSA appears in the Network list. Figure 38 Displaying the NSA NSA-2401 User’s Guide...
  • Page 67: Figure 39 Displaying The Nsa

    3 Click the triangle beside the NSA’s name to display the shares that Gonzo can use. Figure 39 Displaying the NSA Alternatively, you can also connect directly to the NSA from the Go Menu in the Finder. Simply click Go > Connect to Server. Figure 40 Alternate Method for Displaying the NSA NSA-2401 User’s Guide...
  • Page 68: How To Configure Security

    Chapter 3 Tutorials 4 When the Connect to Server dialog box opens, type smb:// and the IP address of your NSA-2401 or click Browse to find it in your network. Click Connect. Figure 41 Connecting to the NSA 5 Once connected, you can now access the NSA from the finder or directly from the desktop.
  • Page 69: Figure 42 Maintenance > Ssl

    2 Next, let’s modify the certificate by changing the Common Name to this NSA’s IP address of 192.168.1.35, the Organization to “Test” and the Key Length to 2048. Figure 43 Maintenance > SSL > Edit a Self-Signed Certificate NSA-2401 User’s Guide...
  • Page 70: Figure 44 Maintenance > Ssl > Edit A Self-Signed Certificate

    Chapter 3 Tutorials 3 The NSA restarts its network services and returns you to the login screen. Figure 44 Maintenance > SSL > Edit a Self-Signed Certificate NSA-2401 User’s Guide...
  • Page 71: Figure 45 Maintenance > Ssl

    3.5.1.2 Downloading and Installing the NSA’s Customized Certificate 1 Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. Figure 45 Maintenance > SSL 2 Save the file to your computer. Figure 46 Downloading the NSA’s Certificate NSA-2401 User’s Guide...
  • Page 72: Figure 47 Downloading The Nsa's Certificate

    4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix C on page 297 for other examples. In the Certificate dialog box, click Install Certificate. Figure 48 Certificate NSA-2401 User’s Guide...
  • Page 73: Figure 49 Certificate Import Wizard: Welcome

    5 In the Certificate Import Wizard, click Next. Figure 49 Certificate Import Wizard: Welcome 6 Leave Automatically select certificate store based on the type of certificate selected and click Next. Figure 50 Certificate Import Wizard: Certificate Store NSA-2401 User’s Guide...
  • Page 74: Figure 51 Certificate Import Wizard: Finish

    Figure 51 Certificate Import Wizard: Finish 8 If you are presented with another Security Warning, click Yes. Figure 52 Security Warning 9 Finally, click OK when presented with the successful certificate installation message. Figure 53 Certificate Import Wizard: Successful NSA-2401 User’s Guide...
  • Page 75: Figure 54 Maintenance > Ssl

    1 Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. Figure 54 Maintenance > SSL NSA-2401 User’s Guide...
  • Page 76: Figure 55 Maintenance > Ssl > Force Https Warning

    3 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. Figure 56 Firefox: Secure Connection Failed NSA-2401 User’s Guide...
  • Page 77: Figure 57 Firefox: Secure Connection Failed

    Chapter 3 Tutorials 4 Click Add Exception. Figure 57 Firefox: Secure Connection Failed 5 Click Get Certificate. Figure 58 Firefox: Add Security Exception NSA-2401 User’s Guide...
  • Page 78: Figure 59 Firefox: Add Security Exception

    Chapter 3 Tutorials 6 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View. Figure 59 Firefox: Add Security Exception NSA-2401 User’s Guide...
  • Page 79: Figure 60 Firefox: Add Security Exception

    7 The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close. Figure 60 Firefox: Add Security Exception NSA-2401 User’s Guide...
  • Page 80: Figure 61 Firefox: Add Security Exception

    Chapter 3 Tutorials 8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. Figure 61 Firefox: Add Security Exception NSA-2401 User’s Guide...
  • Page 81: Using Ftps To Connect To The Nsa

    3.5.2 Using FTPS to Connect to the NSA This section covers how to use FTP over TLS with the NSA for secure FTP transfers. Before you go through this section, read Section 3.5.1 on page 68 to configure HTTPS. This example uses FileZilla. NSA-2401 User’s Guide...
  • Page 82: Figure 63 Filezilla Site Manager

    1 Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA’s address. • Set the Servertype to FTPES - FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect. Figure 63 FileZilla Site Manager NSA-2401 User’s Guide...
  • Page 83: Controlling Access To Shares, Folders, And Files

    3.5.3.1 Configuring the Share’s Access First you need to give Kermit and the senior management read-only access to the share. 1 Click Sharing > Shares. Select the Gonzo share and click Edit Share. Figure 65 Sharing > Shares NSA-2401 User’s Guide...
  • Page 84: Figure 66 Sharing > Shares > Edit Share

    2 Set the Share Access to Advanced and click Edit. Figure 66 Sharing > Shares > Edit Share 3 Move Senior-Management and Kermit to Read Only. Click Apply in this screen and again in the edit screen. Figure 67 Share Access Configuration NSA-2401 User’s Guide...
  • Page 85: Figure 68 Sharing > Shares

    Now you need to stop Kermit from accessing the 2010-2014-Plans file. 1 Select the Gonzo share, and click ACL Properties. Figure 68 Sharing > Shares 2 Click New ACL. Figure 69 Sharing > Shares > ACL Configuration NSA-2401 User’s Guide...
  • Page 86: Figure 70 Sharing > Shares > Acl Configuration > New Acl

    3 Open the Strategy folder. Figure 70 Sharing > Shares > ACL Configuration > New ACL 4 Select the 2010-2014-Plans.doc file and click Set ACL. Figure 71 Sharing > Shares > ACL Configuration > New ACL > Strategy NSA-2401 User’s Guide...
  • Page 87: Figure 72 Sharing > Shares > Acl Configuration > New Acl > Strategy > Set Acl

    Chapter 3 Tutorials 5 Move Gonzo to Deny. Figure 72 Sharing > Shares > ACL Configuration > New ACL > Strategy > Set ACL NSA-2401 User’s Guide...
  • Page 88: Figure 73 Sharing > Shares > Acl Configuration > New Acl > Strategy

    Strategy folder. Kermit and any member of the senior management group can log into the NSA and view the contents of the Strategy folder, although Kermit cannot see the 2010-2014-Plans.doc file. NSA-2401 User’s Guide...
  • Page 89: Power Resume

    For example, you might do daily backups of important individual files or folders and a weekly general archive. You can save backups to another location so your files can survive even if the original RAID or NSA fails. NSA-2401 User’s Guide...
  • Page 90: Creating A Snapshot Job

    Chapter 3 Tutorials 3.7.1 Creating a Snapshot Job Here’s an example of configuring hourly snapshots for a volume. 1 Click Protect > Snapshot > Add Job. Figure 76 Protect > Snapshot NSA-2401 User’s Guide...
  • Page 91: Configuring Snapshot Image Access

    3.7.3 Using a Snapshot Image to Restore Files To use a snapshot to restore files, use the MyNSA screens, CIFS (Windows Explorer), or FTP to browse to the folder named “snap-share”. Open or copy the folder or file that you want to restore. NSA-2401 User’s Guide...
  • Page 92: Creating A Synchronization Backup

    Gonzo updates the files frequently, you decide to create a backup job that has the NSA publish the contents of the folder to an NSA in the German branch office. To create a synchronization backup: 1 Click Protect > Backup > Add Job. Figure 80 Protect > Backup NSA-2401 User’s Guide...
  • Page 93: Figure 81 Protect > Backup > Add Job: Step 1

    Gonzo wants only his current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder. Figure 81 Protect > Backup > Add Job: Step 1 NSA-2401 User’s Guide...
  • Page 94: Figure 82 Protect > Backup > Add Job: Step 2

    • Enter the other NSA’s address and administrator password. • Click Show target content to display the remote NSA’s contents. • Select the destination on the remote NSA (Backups in this example). • Click Next. Figure 82 Protect > Backup > Add Job: Step 2 NSA-2401 User’s Guide...
  • Page 95: Figure 83 Protect > Backup > Add Job: Step 3

    • Restrict the bandwidth usage to 256 KB/s to stop the archives from using all of your network connection’s available bandwidth. • You don’t have to configure a purge policy for a synchronization backup. • Click Next. Figure 84 Protect > Backup > Add Job: Step 3 NSA-2401 User’s Guide...
  • Page 96: Creating An Archive Backup

    The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share. 3.7.5 Creating an Archive Backup To backup the NSA every week to a remote NSA: 1 Click Protect > Backup > Add Job. Figure 86 Protect > Backup NSA-2401 User’s Guide...
  • Page 97: Figure 87 Protect > Backup > Add Job: Step 1

    This example sets the NSA to do another full backup after every four incremental backups. Figure 87 Protect > Backup > Add Job: Step 1 NSA-2401 User’s Guide...
  • Page 98: Figure 88 Protect > Backup > Add Job: Step 2

    Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection. Figure 88 Protect > Backup > Add Job: Step 2 NSA-2401 User’s Guide...
  • Page 99: Restoring Archived Files By Backup Job

    If you have backup jobs for which the NSA has already performed backups, you can restore the files based on the backup job. Gonzo accidently deleted all of the files in his share and needs to do the following to restore them. NSA-2401 User’s Guide...
  • Page 100: Figure 91 Protect > Backup

    1 Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 91 Protect > Backup 2 Select which backup to use and click Next. Figure 92 Protect > Backup > Restore Archive: Step 1 NSA-2401 User’s Guide...
  • Page 101: Figure 93 Protect > Backup > Restore Archive: Step 2

    Chapter 3 Tutorials 3 Select the Gonzo share and click Next. Figure 93 Protect > Backup > Restore Archive: Step 2 4 Select the original location and click Done. Figure 94 Protect > Backup > Restore Archive: Step 3 NSA-2401 User’s Guide...
  • Page 102: Restoring By Backup Files

    1 Click Protect > Restore. Specify where the archive files are located. In this example, enter “192.168.3.2” as the IP address, “admin” as the account name, “1234” as the password, and “Backups” as the share name. Click Test Connection. Click Next. Figure 96 Protect > Restore: Step 1 NSA-2401 User’s Guide...
  • Page 103: Figure 97 Protect > Restore: Step 2

    2 Select the backup job and backup time and click Next. Figure 97 Protect > Restore: Step 2 3 Select everything in the Gonzo share except the recycle folder. Click Next. Figure 98 Protect > Restore: Step 3 NSA-2401 User’s Guide...
  • Page 104: Printer Server Tutorial

    3.8 Printer Server Tutorial Do the following to configure the NSA to allow computers on your network to share a printer. See www.zyxel.com for a list of compatible printers. 1 Make sure the NSA is on and the SYS light shines steadily.
  • Page 105: Figure 101 Printer Connected To Nsa: Windows Explorer

    7 Use the wizard screens to install the printer driver on the computer. You may need to get the file from the printer’s CD or the printer manufacturer’s website (the driver is not installed on the NSA). You must install the printer driver on each computer that will use the printer. NSA-2401 User’s Guide...
  • Page 106: How To Increase The Nsa's Storage Capacity

    NSA’s storage capacity: • Connect external USB hard drives • Add internal hard drives if there are not four already installed. • Migrate a RAID 5 array to higher capacity hard drives. NSA-2401 User’s Guide...
  • Page 107: Connecting External Usb Hard Drives

    JBOD array or three-disk RAID 5 array. When you add a new disk to an existing array, you do not have to create new volumes and sharing settings. For optimal performance and RAID storage capacity, use hard drives of the same speed and capacity. NSA-2401 User’s Guide...
  • Page 108: Figure 108 Storage > Internal Storage > Disk

    Figure 108 Storage > Internal Storage > Disk 3 Click the RAID tab to display the RAID array summary screen. Select the array to which you want to add the disk and click Add Disk. Figure 109 Storage > Internal Storage > RAID NSA-2401 User’s Guide...
  • Page 109: Using A Disk Array's Increased Capacity

    You do not have to change your existing share, backup, and snapshot settings. Of course you can also create new volumes, but you must configure new share settings in order to use them and new backup and snapshot settings to protect the files. NSA-2401 User’s Guide...
  • Page 110: Migrating A Raid To Higher Capacity Hard Drives

    If the new hard drives have any data you want to keep, back it up to another location before you install them. Adding these hard drives to a disk array formats them so all data stored on them will be lost. To migrate a RAID5 array to a higher capacity hard drive: NSA-2401 User’s Guide...
  • Page 111: Figure 114 Storage > Internal Storage > Disk

    4 Log out of the Web Configurator and then back in. The Log Message screen shows that the RAID is degraded, click Turn Off Buzzer to stop the audible alarm. Then click OK to continue. Figure 116 Storage > Internal Storage > Disk > Eject NSA-2401 User’s Guide...
  • Page 112: Figure 117 Status: Raid Degraded

    Internal Storage > RAID screen and click Repair. Figure 118 Storage > Internal Storage > RAID 8 Select the disk you want to use to repair the RAID and click Apply. Figure 119 Storage > Internal Storage > RAID > Repair NSA-2401 User’s Guide...
  • Page 113: Figure 120 Storage > Internal Storage > Raid

    RAID after each replacement. When you are done replacing hard drives and the final RAID recovery finishes, you can assign the increased storage capacity to your existing volumes (see Section 3.9.3 on page 109) . NSA-2401 User’s Guide...
  • Page 114 Chapter 3 Tutorials NSA-2401 User’s Guide...
  • Page 115: Web Configurator

    Web Configurator Status Screen (117) System Setting Screen (121) Storage Screens (125) Network Screens (159) Sharing Screens (173) Protect Screens (195) Application Screens (221) Maintenance Screens (227)
  • Page 117: Status Screen

    It provides an overview of your NSA’s status, settings and activity. Once you leave the screen, you can return to it by clicking the Status icon or the text itself on the top-left of the navigation panel. Figure 121 Status Screen NSA-2401 User’s Guide...
  • Page 118: Table 16 Status Icons

    This displays a summary of CPU usage by all current processes. Click the Refresh icon to update this display. It also automatically updates itself every 10 seconds. Note: If too many users are using the NSA then the NSA may appear sluggish. NSA-2401 User’s Guide...
  • Page 119 Unlocked, or Down). The following columns display the volume’s name, whether the volume is encrypted (CRYPTO) or not (NORMAL), the total size of the volume, how much is currently in use, and how much is still available. NSA-2401 User’s Guide...
  • Page 120 ANONYMOUS FTP otherwise. Connected At This displays the date and time the user last connected to the NSA in year-day-month hour:minute:second, format. IP Address This displays the IP address of the computer connected to the NSA. NSA-2401 User’s Guide...
  • Page 121: System Setting Screen

    New Date (yyyy-mm-dd) This field displays the last updated date from the time server or the last date configured manually. When you set Date Time Setup to Manual, enter the new date in this field and then click Apply. NSA-2401 User’s Guide...
  • Page 122: Time Lag

    Apply Click this to save your changes. Cancel Click this to discard changes. 5.1.1 Time Lag Time lag occurs when the time on the NSA falls behind the time on the time server. This may happen if: NSA-2401 User’s Guide...
  • Page 123 • A power surge occurs. The NSA gives no warning if time lag occurs. You should resynchronize the time after a power surge or after you have shut down the NSA several times. NSA-2401 User’s Guide...
  • Page 124 Chapter 5 System Setting Screen NSA-2401 User’s Guide...
  • Page 125: Storage Screens

    The following diagram shows disks one to four combined into RAID Array 1. Volumes A, B, and C are on RAID Array 1. Figure 123 Disks, RAIDs, and Volumes Volume A Volume B Volume C RAID Array 1 Disk 1 Disk 2 Disk 3 Disk 4 NSA-2401 User’s Guide...
  • Page 126 Replace the faulty disk(s) and recreate the array, volumes, and sharing configuration. Finding Out More Section 6.9 on page 151 for theoretical background information on JBOD and the RAID levels used on the NSA. Read Section 3.9 on page 106 for how to increase the NSA’s storage capacity. NSA-2401 User’s Guide...
  • Page 127: Internal Storage Status Screen

    (yet) used by snapshots. Volume Free Space This is space on a storage volume that is not used up by files. Disks in the array The disks that belong to the array display under the array’s volumes. NSA-2401 User’s Guide...
  • Page 128: Disk

    Repair. 6.3.1 Internal Disks Screen Click Storage > Internal Storage > Disk to display the following screen. This screen provides information on disks installed in the NSA. Figure 125 Storage > Internal Storage > Disk NSA-2401 User’s Guide...
  • Page 129: Screen

    6.3.2 S.M.A.R.T Screen Click Storage > Internal Storage > Disk to display the disk summary screen. Select a disk and click the S.M.A.R.T. icon to display the following screen. This screen provides details about the drive and its status. NSA-2401 User’s Guide...
  • Page 130: Figure 126 Storage > Internal Storage > Disk > S.m.a.r.t. (Brief Summary)

    This field displays the local time that the hard drive is using. SMART support This field displays whether or not the hard drive is SMART-capable. SMART support This field displays whether or not the hard drive has SMART monitoring turned on. Click this button to close the screen. NSA-2401 User’s Guide...
  • Page 131: Figure 127 Storage > Internal Storage > Disk > S.m.a.r.t. (Full Summary)

    This indicates when the hard drive updates the value for this attribute. Always means the hard drive updates this attribute during normal operation and during offline activities. Offline means the hard drive only updates this attribute when no one is accessing the hard drive. NSA-2401 User’s Guide...
  • Page 132: Arrays

    The type of array you use depends on how many disks you have and how many arrays you want to create. Consider this carefully as all data is deleted when you re-create an array. Back up your data before deleting or re-creating an array NSA-2401 User’s Guide...
  • Page 133: Table 24 Raid Array Levels Quick Comparison

    • RAID 1 offers data security, although the performance is slower than RAID 0. Since RAID 1 mirrors data onto a second disk, you can recover all data if one disk fails. NSA-2401 User’s Guide...
  • Page 134: Array Status

    Data access may be slower from a degraded array, so it’s recommended that you replace the faulty disk and repair the array as soon as you can. NSA-2401 User’s Guide...
  • Page 135: Raid Screen

    6.5 RAID Screen Click Storage > Internal Storage > RAID to display the RAID array summary screen as shown. Use this screen to manage the NSA RAID (and JBOD) arrays. Figure 128 Storage > Internal Storage > RAID NSA-2401 User’s Guide...
  • Page 136: Table 25 Storage > Internal Storage > Raid Icons

    A warning screen appears. Click Yes if you want to remove the array and all of its data. Otherwise click No. Repair After you replace a faulty disk, select the hard drive array (its status will be Degraded) and click this icon to resynchronize the array. NSA-2401 User’s Guide...
  • Page 137 Remove Hot Spare To remove the standby drive from a RAID1 or RAID5 array, select the array and click this icon. After you do this, you can create a single-disk JBOD array for the disk. NSA-2401 User’s Guide...
  • Page 138: Creating A New Raid

    6.5.1 Creating a New RAID Click the Create icon in the RAID screen as shown in Figure 128 on page 135 to create a new RAID array. Figure 129 Storage > Internal Storage > RAID > Create NSA-2401 User’s Guide...
  • Page 139: Internal Volume Screen

    • Down when a volume is down and cannot be fixed. The volume cannot be used and the data is lost. Replace the faulty disk(s) and recreate the array, volumes, and sharing configuration. NSA-2401 User’s Guide...
  • Page 140: Figure 130 Storage > Internal Storage > Volume

    Select a volume and click this icon to check the volume’s file consistency. Note: If you have the NSA automatically attempt to repair any damaged files it finds during the scan, be careful not to cancel the scan as you may lose data. NSA-2401 User’s Guide...
  • Page 141: Table 29 Storage > Internal Storage > Volume

    RAID Array This field shows the RAID or JBOD array on which the volume is located. Capacity This field shows the total size of the volume, how much is currently in use, and how much is still available. NSA-2401 User’s Guide...
  • Page 142: Creating Or Editing An Internal Volume

    Acceptable characters are all alphanumeric characters (A-Z 0-9) and " " [spaces], “-” [dashes], "_" [underscores], and "." [periods]. The first character must be alphanumeric. The last character cannot be a space " ". NSA-2401 User’s Guide...
  • Page 143 You also use the screens to create copies of the USB key. Note: Create duplicate USB keys now since you cannot make them later. Apply Click this button to create the volume. Cancel Click this button to discard your changes and close this screen. NSA-2401 User’s Guide...
  • Page 144: Usb Key Creation

    1 Select Yes to copy the USB key to another USB device. After the duplicate USB key creation completes, you return to this screen so you can make another. Click No when you are done making USB key copies. NSA-2401 User’s Guide...
  • Page 145: External Storage Disk Screen

    Use the external storage screens to manage the NSA’s externally (USB) connected storage. Connect USB devices to the NSA’s USB ports. Click Storage > External Storage to open the following screen. This screen provides information on disks connected to the NSA. NSA-2401 User’s Guide...
  • Page 146: Figure 136 Storage > External Storage > Disk

    Click Storage > External Storage > Volume to display the external (USB-connected) volume summary screen as shown next. Use this screen to manage the NSA’s external storage volumes. The NSA automatically creates volumes when you connect an external disk. You can also create other volumes. NSA-2401 User’s Guide...
  • Page 147: External Volume Screen

    No one will be able to use the volume until an administrator unlocks it. Note that if the volume was encrypted using a USB key and the USB key is connected when the NSA restarts, the NSA automatically unlocks the volume. NSA-2401 User’s Guide...
  • Page 148: Creating Or Editing An External Volume

    Click Storage > External Storage > Volume > Create to display the external (USB- connected) volume creation screen as shown next. You can also select an existing external volume and click the Edit icon. Use this screen to add or edit external storage volumes. NSA-2401 User’s Guide...
  • Page 149: Figure 138 Storage > External Storage > Volume > Create

    The same as EXT2, but adds a journaled file system and is more robust. reiserfs: Offers better performance for small files. xfs: Offers good performance for larger files. You can also have the NSA encrypt a volume that uses the xfs file system. NSA-2401 User’s Guide...
  • Page 150: Technical Reference

    Click this button to save your changes back to the NSA. Cancel Click this button to discard your changes and close this screen. 6.9 Technical Reference This section contains background on JBOD and the RAID levels used on the NSAand lists some common S.M.A.R.T. attributes. NSA-2401 User’s Guide...
  • Page 151: Storage Terminology

    JBOD can be used to turn several different-sized drives into one big drive. For example, JBOD could convert 100 GB, 200 GB, 250 GB, and 500 GB drives into one large logical drive of 1050 GB. Since data isn’t striped across disks, if one disk fails, NSA-2401 User’s Guide...
  • Page 152: Jbod

    GB (4 * 100 GB, the smallest disk size) and the remaining space (300 GB) is unused. Typical applications for RAID 0 are non-critical data (or data that changes infrequently and is backed up regularly) requiring high write speed such as audio, video, graphics, games and so NSA-2401 User’s Guide...
  • Page 153: Raid 0

    Data is duplicated across two disks, so if one disk fails, there is still a a copy of the data. These two arrays are configured as a single RAID 0 array for faster performance Table 40 RAID 10 RAID 0 RAID 1 RAID 1 DISK 1 DISK 2 DISK 3 DISK 4 NSA-2401 User’s Guide...
  • Page 154: Raid 5

    The advantage of a hot-spare is that if a disk fails, then the array resynchronizes automatically with the standby disk and operates at healthy array speed after the resynchronization. You need four hard disks installed to use RAID 10, RAID 5 or RAID 5 with hot- spare. NSA-2401 User’s Guide...
  • Page 155: Raid And Data Protection

    Recalibration High This is the number of times recalibration was requested when the Retries first attempt did not succeed. A decrease in this value is an indicator of hard disk mechanical subsystem problems. NSA-2401 User’s Guide...
  • Page 156 Rate (TAR) a read signal spike caused by sensor temperature rise due to touching the disk surface or contaminant particles. 206 Flying Height This is the height of the hard drive’s read/write heads above the disk surface. NSA-2401 User’s Guide...
  • Page 157 This is the hard drive’s temperature. 240 Head Flying This is the total time that the head has been positioning. Hours 250 Read Error Retry This is the number of errors in reading from the disk. Rate NSA-2401 User’s Guide...
  • Page 158 Chapter 6 Storage Screens NSA-2401 User’s Guide...
  • Page 159: Network Screens

    Or you can assign the NSA a static (fixed) IP address. DNS Server Address A DNS (Domain Name System) server maps domain names (like www.zyxel.com) to their corresponding IP addresses. This lets you use domain names to access web sites without having to know their IP addresses.
  • Page 160: Tcp/Ip Screen

    Fault Tolerance: LAN2 serves as a backup (fail-over) for the LAN1. Both Gigabit Ethernet interfaces are connected to the same subnet. There is one IP address. If LAN1 loses its connection, LAN2 takes over LAN1’s IP address and traffic. NSA-2401 User’s Guide...
  • Page 161: Figure 140 Fault Tolerance Teaming Mode

    To use jumbo frames, your network must support 1 Gbps transmissions (Gigabit Ethernet). All of your network devices (computer Ethernet cards and switches, hubs, or routers) must also support the same size of jumbo frames that you specify in the NSA. NSA-2401 User’s Guide...
  • Page 162: Configuring The Tcp/Ip Screen

    Use the Network > TCP/IP screen to assign the NSA a dynamic or static IP address(es), subnet mask, default gateway and DNS servers. The NSA automatically restarts its network services after you apply changes in the TCP/IP or Windows/CIFS screens. Click Network > TCP/IP to access the Network > TCP/IP screen. NSA-2401 User’s Guide...
  • Page 163: Figure 144 Network > Tcp/Ip

    LAN1 and LAN2 separately when the Teaming Mode is set to Stand Alone). Dynamic Select the Dynamic checkbox to have a DHCP server automatically assign an IP address to your NSA. If none is assigned, then the NSA reverts to the default IP address of 192.168.1.3. NSA-2401 User’s Guide...
  • Page 164: Windows/Cifs

    Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup or domain. CIFS is always enabled on the NSA. NSA-2401 User’s Guide...
  • Page 165 NSA. Users (U1, U2, U3) can all back up and share data on the NSA. Important data stored on servers S1 and S2 may be also stored there. It is recommended that you place the NSA behind a firewall and/or IDP device for protection. NSA-2401 User’s Guide...
  • Page 166: Windows/Cifs Screen

    Chapter 7 Network Screens Figure 145 Active Directory Example Application LAN1 USB1 USB2 7.3.1 Windows/CIFS Screen Click Network > Windows/CIFS to display this screen. Figure 146 Network > Windows/CIFS (Workgroup) NSA-2401 User’s Guide...
  • Page 167: Figure 147 Network > Windows/Cifs (Domain)

    Type the domain name of the Windows server domain controller. The name can be up to 255 characters long. The NSA’s DNS server must be able to resolve this domain name. Windows Domain Administrator is the default Windows Domain Administrator. Administrator NSA-2401 User’s Guide...
  • Page 168: Nfs Screen

    Enable NFS Server Click this icon to allow access to the NFS shares. Disable NFS Server Click this icon to stop access to the NFS shares. Add NFS Share Click this icon to create a new NFS share. NSA-2401 User’s Guide...
  • Page 169: Add Or Edit Nfs Share Screen

    Click Network > NFS > Add NFS Share (or Edit NFS Share) to display the screen where you can configure a share for systems to use NFS to access. Figure 149 Network > NFS > Add NFS Share NSA-2401 User’s Guide...
  • Page 170: Nfs Session Screen

    7.4.2 NFS Session Screen Click Network > NFS > NFS Session to display the NFS session screen. This screen shows which users are currently connected to the NSA using NFS. Figure 150 Network > NFS > NFS Session NSA-2401 User’s Guide...
  • Page 171: Table 48 Network > Nfs > Nfs Session

    This displays the date and time the user last connected to the NFS share in year-day-month hour:minute:second, format. IP Address This displays the IP address of the computer connected to the NSA. Click OK to close the window. NSA-2401 User’s Guide...
  • Page 172 Chapter 7 Network Screens NSA-2401 User’s Guide...
  • Page 173: Sharing Screens

    More restrictive access rights override less restrictive ones. In Conflict A user account is “in conflict” when the account name that exists on a network-attached storage device also exists on the domain controller. See Section 8.2.0.1 on page 177 for more. NSA-2401 User’s Guide...
  • Page 174 This is a list of read/write permissions associated with specific files and/or folders. Account names added to the list are linked to the files and folders that they are allowed to access, along with what kinds of actions they are allowed to perform with those files and folders. NSA-2401 User’s Guide...
  • Page 175: Users

    Note: If a user is deleted on the domain controller but the NSA-2401 domain user list is not up-to-date, then the user cannot log in since authentication is handled by the domain controller.
  • Page 176: Table 50 Sharing > Users

    Click Previous to cycle back through the pages of users, and Next to cycle forward through them. Status This icon displays the account as either a Conflict User, a Local User, a Domain User, or an Admin User. NSA-2401 User’s Guide...
  • Page 177 The NSA has no way to distinguish these two users as their passwords and user names are exactly the same. During a conflict situation, the local user takes precedence ONLY if the domain user and local user’s passwords are the same. NSA-2401 User’s Guide...
  • Page 178: Create A New Account & Change Account Properties

    Enter the user’s e-mail address. Description Enter details about the user account. The text may consist of up to 110 letters, numerals and any printable character found on a typical English language keyboard except quotation marks (‘) or (“). NSA-2401 User’s Guide...
  • Page 179 • The account name cannot be the same as a system account name such as FTP or EVERYONE nor be the same as an existing local or domain account. Other reserved user names that are not allowed are: • bin • daemon • ftp • anonymous • nobody • root • pc-guest NSA-2401 User’s Guide...
  • Page 180: Figure 153 My Nsa

    Configurator using the username and password as defined in the Create New Account screen. After logging in, select the Password tab in the account toolbar. Figure 153 My NSA In the Password tab, create a new password and then click Apply. Figure 154 Password NSA-2401 User’s Guide...
  • Page 181: View User Information

    Used (MB) Indicates how much of the volume quota the selected user has used. Used quote is measured in megabytes (MB). Group Name Indicates the groups to which the selected user belongs. Click this to close the screen. NSA-2401 User’s Guide...
  • Page 182: Groups

    Select a group from the list, then click this icon to retrieve its domain information, where applicable. Edit Group Select a group from the list, then click this icon to edit its permissions. See Section 8.2.1 on page 178 for details. NSA-2401 User’s Guide...
  • Page 183: Table 54 Sharing > Groups

    If you choose not to set any search parameters, then the defaults for each filter is used. Clear{filter} This button displays when you click the Search icon. Click to reset all the search filters back to their default settings. NSA-2401 User’s Guide...
  • Page 184: Add A New Local Group & Change Group Properties

    Description Enter details about the user group. The text may consist of up to 110 letters, numerals and any printable character found on a typical English language keyboard except quotation marks. NSA-2401 User’s Guide...
  • Page 185 The group name cannot be EVERYONE nor be the same as an existing local or domain group. Other reserved group names that are not allowed are: • daemon • disk • ftp • nobody • lp • root • tty • utm NSA-2401 User’s Guide...
  • Page 186: Shares

    Select a share from the list, then click this icon to edit its settings. See Section 8.4.2 on page 190 for details. ACL Properties Click this icon to open the ACL Configuration screen, where you can set up an Access Control List. See Section 8.4.2 on page 190 for details. NSA-2401 User’s Guide...
  • Page 187: Table 57 Sharing > Shares

    This displays the name of the user account that owns the share. Permission Type This displays the type of permissions assigned to the share. Options are public, private, and advanced. The key icon indicates that a share has an Access Control List. NSA-2401 User’s Guide...
  • Page 188: Create A New Share & Edit A Share

    193) to clear out the recycle bin periodically or else its host volume will fill up and users will not be able to store any new files on it. Share Access Choose whether the share is public or private, or choose Advanced to open the Share Access Configuration screen. NSA-2401 User’s Guide...
  • Page 189: Figure 160 Sharing > Shares > Create A New Share > Share Access Configuration

    You can remove users from any given authority level by selecting them and clicking the left arrow. Apply Click this to save your changes. Cancel Click this to discard changes and close the window. NSA-2401 User’s Guide...
  • Page 190: Acl Configuration

    This indicates whether the item in the list is a folder or file, as well as whether it is locked or unlocked. ACL Path This indicates the file or folder path and name on the share. Close Click this to close the screen. NSA-2401 User’s Guide...
  • Page 191: Figure 162 Sharing > Shares > Acl Configuration > New Acl Configuration

    This indicates when the file or folder was last altered on the share. When a file is uploaded to the NSA that is classified as a “modification” as it is considered newly written data by the device. Close Click this to close the screen. NSA-2401 User’s Guide...
  • Page 192: Figure 163 Shares > Acl Configuration > New Acl Configuration > Acl Permission

    Deny modified, moved, or removed. Deny - Removes all privileges; files and folders cannot be read, modified, moved, or removed. You can remove users from any given authority level by selecting them and clicking the left arrow. NSA-2401 User’s Guide...
  • Page 193: Recycle Bin

    Empty All Recycle Bins Click this button to manually delete all files and folders from all of the shares’ recycle bins. Apply Click this to save your changes. Cancel Click this to discard changes and close the window. NSA-2401 User’s Guide...
  • Page 194: Dfs

    Click this button to add the information in Add DFS Links to the list. Delete This Link Click this button to permanently remove the associated DFS link. Apply Click this to save your changes. Cancel Click this to discard changes and close the window. NSA-2401 User’s Guide...
  • Page 195: Protect Screens

    Place the NSA behind a hardware-based firewall. Ideally the firewall should include deep packet inspection, IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL’s ZyWALL USG products for example). Configure strong user passwords and Access Control List (ACL) settings. See Chapter 8 on page 173 details.
  • Page 196: What You Can Do In The Protect Screens

    Snapshots are good for data that changes often and needs to have high availability. If files within a volume become infected or corrupted, you can revert files back to their state at a snapshot. You create snapshots of a complete volume, not a single file or folder within a volume. NSA-2401 User’s Guide...
  • Page 197 A backup proceeds without the snapshot if there is not enough space for the snapshot, but if an open file changes during the backup, the backup fails. NSA-2401 User’s Guide...
  • Page 198: Nsa Backup Screens

    This screen shows a list of all backup jobs created and scheduled. You can also edit or delete an existing backups or create a new one from here. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. NSA-2401 User’s Guide...
  • Page 199: Figure 166 Protect > Backup

    Select an archive backup job that has already run and click this icon to restore a previous backup from another NSA or external USB hard drive connected to the NSA. Another option is to use Protect > Restore (Section 9.2.4 on page 207) to restore by the backup files themselves. NSA-2401 User’s Guide...
  • Page 200: Creating A Backup Job

    9.2.2 Creating a Backup Job In the Protect > Backup screen, click the Add Job icon to create a new backup job. Figure 167 Protect > Backup > Add Job: Step 1 NSA-2401 User’s Guide...
  • Page 201: Table 70 Protect > Backup > Add Job: Step 1

    Synchronization Select this to keep updating a single copy of the source files to the target. At the time of writing the target must be another NSA-2401. Publish makes a copy of the source files. Additional files in the target folder can remain.
  • Page 202: Figure 168 Protect > Backup > Add: Step 2

    Chapter 9 Protect Screens 9.2.2.1 Creating a Backup Job: Step 2 Figure 168 Protect > Backup > Add: Step 2 NSA-2401 User’s Guide...
  • Page 203 Select this to back up the files to another volume on the NSA. Select the folder where you want to store the backup files. It is recommended that the target be on a different disk array from the source volume to provide protection in the even that the source drive fails. NSA-2401 User’s Guide...
  • Page 204: Figure 169 Protect > Backup > Add Job: Step 3

    Bandwidth Restrict the bandwidth of synchronization backups to help stop them from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet. NSA-2401 User’s Guide...
  • Page 205: Figure 170 Protect > Backup > Add Job: Step 4

    Time Enter the time, day and/or month as appropriate for your selection above. previous Click this button to return to the preceding screen. done Click this button to save your changes. NSA-2401 User’s Guide...
  • Page 206: Editing A Backup Job

    Encryption You can have the NSA use a password to encrypt the backup files. NSA-2401 User’s Guide...
  • Page 207: Restoring By Backup Job

    Click this button to save your changes back to the NSA. 9.2.4 Restoring by Backup Job In the Protect > Backup screen, select a backup job and click the Restore Archive icon to replace existing files with files saved previously. NSA-2401 User’s Guide...
  • Page 208: Figure 173 Protect > Backup > Restore Archive: Step 1

    The times use yyyy-mm-dd hh:mm:ss format. Check, Last Backup Time Select to which backup you want to return. All later backups are deleted. next Click this button to proceed. NSA-2401 User’s Guide...
  • Page 209: Figure 174 Protect > Backup > Restore Archive: Step 2

    Select the folders you want to restore. previous Click this button to return to the preceding screen. next Click this button to proceed. 9.2.4.2 Restoring a Backup: Step 3 Figure 175 Protect > Backup > Restore Archive: Step 3 NSA-2401 User’s Guide...
  • Page 210: Restoring By Backup Files

    Internal or External Select this to restore files from another volume on the NSA or a USB- Volume connected device. Specify the share name (you can browse for it). next Click this button to proceed. NSA-2401 User’s Guide...
  • Page 211: Protect > Restore: Step 2

    Select to which backup job and backup time you want to return. The NSA restores the files included in the backup archive. Files not in the backup archive are not modified. previous Click this button to return to the preceding screen. next Click this button to proceed. NSA-2401 User’s Guide...
  • Page 212: Protect > Restore: Step 3

    The following table describes the labels in this screen. Table 81 Protect > Restore: Step 3 LABEL DESCRIPTION Folder Chooser Select the folders you want to restore. previous Click this button to return to the preceding screen. next Click this button to proceed. NSA-2401 User’s Guide...
  • Page 213: Protect > Restore: Step 4

    (space not used by volumes). If there is not enough disk space for the new snapshot, the NSA continues to delete older snapshots to make more space. It is possible that all previous snapshots will be lost. NSA-2401 User’s Guide...
  • Page 214: Figure 180 Protect > Snapshot > Snapshot Jobs

    Click Protect > Snapshot in the Navigation panel to display the following screen. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. Figure 180 Protect > Snapshot > Snapshot Jobs NSA-2401 User’s Guide...
  • Page 215: Table 83 Protect > Snapshot > Snapshot Jobs Icons

    Select a snapshot job(s) and click this icon to remove the job(s). Sort Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. NSA-2401 User’s Guide...
  • Page 216: Creating/Editing Snapshots

    NSA’s file write performance. Table 112 on page 258 for the maximum number of snapshots allowed in the NSA. You can only create one snapshot job per volume. Figure 181 Protect > Snapshot > Add Job NSA-2401 User’s Guide...
  • Page 217: Snapshot Images

    Click Protect > Snapshot > Snapshot Images tab to open the following screen. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. Figure 182 Protect > Snapshot > Snapshot Images NSA-2401 User’s Guide...
  • Page 218: Backup Software Screen

    You can also locate your license keys on the back of the envelope of the CD that came with your NSA. For more information about Genie Backup Manager please see Genie Backup Manager on page 196. NSA-2401 User’s Guide...
  • Page 219: Figure 183 Protect > Backup Software

    Chapter 9 Protect Screens Figure 183 Protect > Backup Software NSA-2401 User’s Guide...
  • Page 220 Chapter 9 Protect Screens NSA-2401 User’s Guide...
  • Page 221: Application Screens

    Your file transfers could be subject to snooping. FTPS (File Transfer Protocol over TLS) File Transfer Protocol over TLS (FTPS) is a file transfer service that uses TLS (Transport Layer Security) for secure transfers across the Internet. NSA-2401 User’s Guide...
  • Page 222: Ftp

    NSA using FTP (File Transfer Protocol) or FTP over TLS. Your FTP client must be set to use FTP over TLS in order to use FTPS with the NSA. If your FTP client offers multiple types of FTP over TLS, use explicit encryption. NSA-2401 User’s Guide...
  • Page 223: Figure 185 Applications > Ftp

    This setting applies to all FTP client connections to the NSA. It does not affect your Windows/CIFS connections (it will not correct the character display in Windows Explorer). Apply Click this to save your changes. Reset Click this to discard any changes and start again. NSA-2401 User’s Guide...
  • Page 224: Print Server

    Click Applications > Print Server, select a printer from the list, and then click that printer’s Rename icon to open this screen. Use this screen to change the name that the NSA uses for the printer. Figure 187 Applications > Print Server > Rename NSA-2401 User’s Guide...
  • Page 225: Copy Button

    Click this to discard any changes and start again. 10.4.1 Changing the Copy Button Share Click Applications > Copy Button and then Edit to open the following screen. Use this screen to select the share the NSA uses with the copy button. NSA-2401 User’s Guide...
  • Page 226: Figure 189 Applications > Copy Button > Edit

    Apply Select a share, then click this to make it the default location where data is stored when you press the copy button. Reset Click this to discard any changes and start again. NSA-2401 User’s Guide...
  • Page 227: Maintenance Screens

    On a typical network the syslog daemon can be configured to send system logs to a central online repository known as a syslog server. This allows the network administrators to quickly access and examine them without having to go to every machine on the network. NSA-2401 User’s Guide...
  • Page 228: Log

    See Section 11.2.1 on page 230 for more information. Purge All Logs Click this icon to erase all logs from the NSA. Click Yes to remove all logs or No to cancel. NSA-2401 User’s Guide...
  • Page 229: Figure 191 Maintenance > Log

    This class shows information on the operation of the NSA’s built-in services. System This class shows all other system related messages. Network This class shows information on network configuration, setting changes and so on. Storage This class shows information about the NSA’s internal and external storage activity. NSA-2401 User’s Guide...
  • Page 230: Search

    Click Maintenance > Log > Log Config to open the Log Records Configuration screen, where you can customize the duration that logs are kept on the NSA. Figure 194 Maintenance > Log > Log Config > Log Records Configuration NSA-2401 User’s Guide...
  • Page 231: Log Buzzer Priority Configuration

    Click this to discard changes and close the window. 11.2.4 Report Configuration Click Maintenance > Logs > Report Config to open the report configuration screens. 11.2.4.1 Mail Setting This screen lets you configure whether or not logs are e-mailed. NSA-2401 User’s Guide...
  • Page 232: Figure 196 Maintenance > Log > Log Report Configuration > Mail Setting

    Apply Click this to save your changes. Cancel Click this to discard changes and close the window. 11.2.4.2 Report Setting This screen lets you configure which types of logs are e-mailed during alerts and reports. NSA-2401 User’s Guide...
  • Page 233: Figure 197 Maintenance > Log > Log Report Configuration > Report Setting

    Select the kind of log(s) to be sent out during mail reports. Reports are issued at set intervals. See Section 11.2.0.1 on page 229 for information on the different log classes. Apply Click this to save your changes. Cancel Click this to discard changes and close the window. NSA-2401 User’s Guide...
  • Page 234: Export Log

    Click Maintenance > Log and then select a log from the list. To export it, click the Export Log icon. Your web browser prompts you to download the log file as a CSV (Comma Separated Value) file type, which is compatible with Microsoft Excel and other spreadsheet software. NSA-2401 User’s Guide...
  • Page 235: Configuration

    To restore a previously saved configuration file, Browse to the file on your computer or LAN and then click the Restore button. If any users are connected at the time, you are presented with a warning screen. Figure 200 Maintenance > Configuration > Warning NSA-2401 User’s Guide...
  • Page 236: Figure 201 Maintenance > Configuration > Restarting

    Click this to save your changes. Cancel Click this to discard changes and close the window. If the NSA is free of all connections, then configuration file loads and the NSA restarts itself. Figure 201 Maintenance > Configuration > Restarting NSA-2401 User’s Guide...
  • Page 237: Ssl

    Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that was issued by a known certificate authority. Figure 202 Maintenance > SSL NSA-2401 User’s Guide...
  • Page 238: Table 103 Maintenance > Ssl

    When you select the Edit a self-signed CA certificate option, then click the Edit button, a screen opens to allow you to make adjustments to the NSA’s public key certificate. The screen is also the same for the Create a certificate authorized by other CA option. NSA-2401 User’s Guide...
  • Page 239: Firmware Upgrade

    Click this to discard changes and close the window. 11.5 Firmware Upgrade Click Maintenance > FW Upgrade to open this screen, where you can upgrade the NSA firmware. Be sure to download the latest firmware files from the ZyXEL website. NSA-2401 User’s Guide...
  • Page 240: Power Management

    NSA again. If you interrupt the upgrade, then the NSA may become unusable. Reset Click this to begin configuring this screen afresh. 11.6 Power Management Click Maintenance > Power Management to open this screen, where you can set the NSA’s power management settings. NSA-2401 User’s Guide...
  • Page 241: Figure 205 Maintenance > Power Management

    UPS is charging. A setting close to 0 is also not recommended since the UPS would not have enough power to allow the NSA to shutdown properly. Apply Click this to save your changes in this section. NSA-2401 User’s Guide...
  • Page 242: Power Control Schedule

    Click Maintenance > Power Management > Edit to open this screen, where you can configure power control schedules to have the NSA turn on, turn off, or reboot at specified times. Figure 206 Maintenance > Power Management > Edit NSA-2401 User’s Guide...
  • Page 243: Shutdown

    Click Maintenance > Shutdown to open the shutdown screen. Use this screen to turn off the NSA or restart it. Before shutting down or restarting, check the System Status screen to make sure that no one is logged into the NSA or transferring files to or from it. NSA-2401 User’s Guide...
  • Page 244: Figure 207 Maintenance > Shutdown

    Figure 208 Maintenance > Shutdown > Confirm Restart When you click the Shutdown button a pop-up screen appears asking you to confirm. Click Apply to continue or Cancel to abort the process. Figure 209 Maintenance > Shutdown > Confirm Shutdown NSA-2401 User’s Guide...
  • Page 245: Troubleshooting And Specifications

    Troubleshooting and Specifications Troubleshooting (247) Product Specifications (255)
  • Page 247: Troubleshooting

    RAID 5). Go to the Storage > Internal Storage > Disk screen to identify the faulty disk. Replace the faulty disk with another of equal or greater capacity. See your Quick Start Guide for information on replacing a disk and also Disk Replacement Restrictions on page 128. NSA-2401 User’s Guide...
  • Page 248 If it is Resynching, the NSA is repairing the RAID array. If it is Degraded, select the array and click the Repair icon. If the status is Down, recreate the array, volumes, and sharing configuration. • If the problem continues, contact the NSA vendor. A LAN LED is off. NSA-2401 User’s Guide...
  • Page 249: Nsa Login And Access

    I forgot the password. • The default password is 1234. • You may have to reset the NSA password or configuration - see Section 2.7 on page 52 detailed information on the reset button. The NDU cannot discover my NSA. NSA-2401 User’s Guide...
  • Page 250 [Caps Lock] is not on. • Turn the NSA off and on. • If this does not work, you have to reset the device to its factory defaults. See Section 2.7 on page 52 for detailed information on the reset button. NSA-2401 User’s Guide...
  • Page 251: Users Cannot Access The Nsa

    If the domain controller uses a private IP address, the NSA needs to use a private DNS server. If the domain controller uses a public IP address, the NSA needs to use a public DNS server. • Leave the domain and re-join it. NSA-2401 User’s Guide...
  • Page 252: Backups And Snapshots

    • You can also check the logs on the NSA to find out the reason why the snapshot failed. NSA-2401 User’s Guide...
  • Page 253: External Usb Disks

    Copying files from a USB device failed. The USB device may not be compatible with the NSA. Press the COPY button to set the COPY LED back to green. Try saving the files onto a computer and then from the computer to the NSA (through the network connection). NSA-2401 User’s Guide...
  • Page 254 Chapter 12 Troubleshooting NSA-2401 User’s Guide...
  • Page 255: Product Specifications

    It’s a good idea to create a snapshot before backing up data, to be sure you’re backing up consistent data even if the backup is still running several hours later. NSA-2401 User’s Guide...
  • Page 256 Windows computer to an NSA. S.M.A.R.T. The NSA can use the S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) monitoring system to detect and report on hard drive reliability indicators to help anticipate hard drive failures. NSA-2401 User’s Guide...
  • Page 257: Specification Tables

    Two auto-negotiating, auto MDI/MDI-X 10/100/1000 Mbps RJ-45 Ethernet ports (10 Base-T/100 Base-TX/1000 Base-T) USB v2.0 Storage Two ports on the front panel. Windows: NTFS (read only), FAT32 and FAT16 Linux: EXT2, EXT3 and XFS LEDs PWR, SYS, LAN1, LAN2, and COPY NSA-2401 User’s Guide...
  • Page 258: Table 112 Nsa Firmware Specifications

    Windows 2000 Professional/Server Windows XP Home/Professional Windows Me Linux Max no. of user accounts Maximum number of concurrent FTP sessions Maximum number of concurrent CIFS sessions Maximum number of snapshots in the NSA Maximum number of snapshots per volume NSA-2401 User’s Guide...
  • Page 259: Power Consumption

    POWER SOURCE SYSTEM BOOT UP SYSTEM READ/WRITE IN POWER SAVING MODE) 240V/50Hz 77.8 (peak) 51.6 (peak) 24.2 120V/60Hz 76.5(peak) 52.9 (peak) 23.0 100V/60Hz 76.0 (peak) 53.1 (peak) 22.5 This is the external power adaptor pinout specification Figure 210 Power Adaptor Pinout. NSA-2401 User’s Guide...
  • Page 260 Chapter 13 Product Specifications NSA-2401 User’s Guide...
  • Page 261: Appendices And Index

    Appendices and Index Log Messages (263) Setting Up Your Computer’s IP Address (273) Importing Certificates (297) Open Source Licences (321) Legal Information (351) Customer Support (353) Index (359)
  • Page 263: Appendix A Log Messages

    Share Name CIFS - share NOTICE Add new disabled share {0} for Share Name Folder Volume unshared folder: {1} in volume: Name Name {2}. CIFS - share NOTICE Recycle-bin disabled. Remove Share Name recycle-bin folder in share: {0}. NSA-2401 User’s Guide...
  • Page 264 Clean system log complete INFO Change DB path to {0}/log OK Share Name INFO Reset DB to System Default OK Network NOTICE Network Config setting is changed Network NOTICE Network interface {0} link up Network interface name NSA-2401 User’s Guide...
  • Page 265 Purge Snapshot Image {0}: Snapshot SUCCESS Image Name Snapshot CRIT Purge Snapshot Image {0}: Snapshot FAILED Image Name Snapshot INFO Delete Snapshot Image {0}: Snapshot SUCCESS Image Name Snapshot CRIT Delete Snapshot Image {0}: Snapshot FAILED Image Name NSA-2401 User’s Guide...
  • Page 266 Success Storage - INFO Remove Hot-Spare disk{0} from Disk Slog ID RAID Raid: Success Storage - CRIT Create RAID (raid label={0}): RAID FAILED Storage - CRIT Relabel RAID: FAILED RAID Storage - CRIT Delete RAID: FAILED RAID NSA-2401 User’s Guide...
  • Page 267 Storage - INFO Duplicate USB Key: SUCCESS Volume Storage - INFO Rename Internal Volume to Volume Name Volume [{0}]: SUCCESS Storage - INFO Expand Volume (Increased Size Volume Size={0}MB): SUCCESS Storage - INFO Lock Internal Volume: Volume SUCCESS NSA-2401 User’s Guide...
  • Page 268 Create External Crypto Volume Volume Name Filesystem Volume [{0}] ({1}) using PASSWD: type FAILED Storage - CRIT Create External Crypto Volume Volume Name Filesystem Volume [{0}] using USB Key ({1}): type FAILED Storage - CRIT Delete Volume: FAILED Volume NSA-2401 User’s Guide...
  • Page 269 Storage - CRIT Eject External Disk ({0}): disk id Volume FAILED Storage - CRIT Detected Disk{0} I/O error. Volume System NOTICE Hostname is set to {0} System NOTICE System description is changed System EMERG Temperature is too high! NSA-2401 User’s Guide...
  • Page 270 Firmware upgrade fails, the file is invalid or corrupted! System - INFO NTP server is set to {0} NTP server Time System INFO NTP updates successfully from NTP server System - INFO Clock timezone is set to {0} TimeZone Time NSA-2401 User’s Guide...
  • Page 271 Request and private key on system. Please create a Certificate Request and enroll it. NOTICE The file {0} is not a valid File Name Certificate file. NOTICE Failed to import Certificate. NOTICE Unexpected error while importing Certificate file. NSA-2401 User’s Guide...
  • Page 272 Appendix A Log Messages NSA-2401 User’s Guide...
  • Page 273: Appendix B Setting Up Your Computer's Ip Address

    P P E N D I X Setting Up Your Computer’s IP Address Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported.
  • Page 274: Figure 211 Windows Xp: Start Menu

    The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 211 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon. Figure 212 Windows XP: Control Panel NSA-2401 User’s Guide...
  • Page 275: Figure 213 Windows Xp: Control Panel > Network Connections > Properties

    3 Right-click Local Area Connection and then select Properties. Figure 213 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Figure 214 Windows XP: Local Area Connection Properties NSA-2401 User’s Guide...
  • Page 276: Figure 215 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. NSA-2401 User’s Guide...
  • Page 277: Figure 216 Windows Vista: Start Menu

    Figure 216 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 217 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon. Figure 218 Windows Vista: Network And Internet NSA-2401 User’s Guide...
  • Page 278: Figure 219 Windows Vista: Network And Sharing Center

    Figure 219 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 220 Windows Vista: Network and Sharing Center During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NSA-2401 User’s Guide...
  • Page 279: Figure 221 Windows Vista: Local Area Connection Properties

    Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 221 Windows Vista: Local Area Connection Properties NSA-2401 User’s Guide...
  • Page 280: Figure 222 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties

    2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. NSA-2401 User’s Guide...
  • Page 281: Figure 223 Mac Os X 10.4: Apple Menu

    The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 223 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon. Figure 224 Mac OS X 10.4: System Preferences NSA-2401 User’s Guide...
  • Page 282: Figure 225 Mac Os X 10.4: Network Preferences

    Configure. Figure 225 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 226 Mac OS X 10.4: Network Preferences > TCP/IP Tab. NSA-2401 User’s Guide...
  • Page 283: Figure 227 Mac Os X 10.4: Network Preferences > Ethernet

    Click Apply Now and close the window. Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 228 Mac OS X 10.4: Network Utility NSA-2401 User’s Guide...
  • Page 284: Figure 229 Mac Os X 10.5: Apple Menu

    The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 229 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 230 Mac OS X 10.5: Systems Preferences NSA-2401 User’s Guide...
  • Page 285: Figure 231 Mac Os X 10.5: Network Preferences > Ethernet

    • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NSA. NSA-2401 User’s Guide...
  • Page 286: Figure 232 Mac Os X 10.5: Network Preferences > Ethernet

    6 Click Apply and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 233 Mac OS X 10.5: Network Utility NSA-2401 User’s Guide...
  • Page 287: Figure 234 Ubuntu 8: System > Administration Menu

    2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. Figure 235 Ubuntu 8: Network Settings > Connections NSA-2401 User’s Guide...
  • Page 288: Figure 236 Ubuntu 8: Administrator Account Authentication

    3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 236 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties. Figure 237 Ubuntu 8: Network Settings > Connections NSA-2401 User’s Guide...
  • Page 289: Figure 238 Ubuntu 8: Network Settings > Properties

    7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 239 Ubuntu 8: Network Settings > DNS 8 Click the Close button to apply the changes. NSA-2401 User’s Guide...
  • Page 290: Figure 240 Ubuntu 8: Network Tools

    Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 240 Ubuntu 8: Network Tools NSA-2401 User’s Guide...
  • Page 291: Figure 241 Opensuse 10.3: K Menu > Computer Menu

    1 Click K Menu > Computer > Administrator Settings (YaST). Figure 241 openSUSE 10.3: K Menu > Computer Menu 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 242 openSUSE 10.3: K Menu > Computer Menu NSA-2401 User’s Guide...
  • Page 292: Figure 243 Opensuse 10.3: Yast Control Center

    Figure 243 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 244 openSUSE 10.3: Network Settings NSA-2401 User’s Guide...
  • Page 293: Figure 245 Opensuse 10.3: Network Card Setup

    6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 Click Next to save the changes and close the Network Card Setup window. NSA-2401 User’s Guide...
  • Page 294: Figure 246 Opensuse 10.3: Network Settings

    8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 246 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window. NSA-2401 User’s Guide...
  • Page 295: Figure 247 Opensuse 10.3: Knetwork Manager

    Options sub-menu, select Show Connection Information. Figure 247 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 248 openSUSE: Connection Status - KNetwork Manager NSA-2401 User’s Guide...
  • Page 296 Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide...
  • Page 297: Appendix C Importing Certificates

    Many ZyXEL products, such as the NSA-2401, issue their own public key certificates. These can be used by web browsers on a LAN or WAN to verify that they are in fact connecting to the legitimate device and not one masquerading as it.
  • Page 298: Figure 249 Internet Explorer 7: Certification Error

    Figure 249 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended). Figure 250 Internet Explorer 7: Certification Error 3 In the Address Bar, click Certificate Error > View certificates. Figure 251 Internet Explorer 7: Certificate Error NSA-2401 User’s Guide...
  • Page 299: Figure 252 Internet Explorer 7: Certificate

    Appendix C Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 252 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next. Figure 253 Internet Explorer 7: Certificate Import Wizard NSA-2401 User’s Guide...
  • Page 300: Figure 254 Internet Explorer 7: Certificate Import Wizard

    Figure 255 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK. Figure 256 Internet Explorer 7: Select Certificate Store NSA-2401 User’s Guide...
  • Page 301: Figure 257 Internet Explorer 7: Certificate Import Wizard

    9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 257 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 258 Internet Explorer 7: Security Warning NSA-2401 User’s Guide...
  • Page 302: Figure 259 Internet Explorer 7: Certificate Import Wizard

    Figure 259 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
  • Page 303: Figure 261 Internet Explorer 7: Public Key Certificate File

    Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
  • Page 304: Figure 263 Internet Explorer 7: Tools Menu

    This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click Tools > Internet Options. Figure 263 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates. Figure 264 Internet Explorer 7: Internet Options NSA-2401 User’s Guide...
  • Page 305: Figure 265 Internet Explorer 7: Certificates

    5 In the Root Certificate Store dialog box, click Yes. Figure 267 Internet Explorer 7: Root Certificate Store 6 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA-2401 User’s Guide...
  • Page 306: Figure 268 Firefox 2: Website Certified By An Unknown Authority

    3 The certificate is stored and you can now connect securely to the Web Configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information. Figure 269 Firefox 2: Page Info NSA-2401 User’s Guide...
  • Page 307: Figure 270 Firefox 2: Tools Menu

    Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
  • Page 308: Figure 272 Firefox 2: Certificate Manager

    Figure 273 Firefox 2: Select File 5 The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information. NSA-2401 User’s Guide...
  • Page 309: Figure 274 Firefox 2: Tools Menu

    This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click Tools > Options. Figure 274 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 275 Firefox 2: Options NSA-2401 User’s Guide...
  • Page 310: Figure 276 Firefox 2: Certificate Manager

    4 In the Delete Web Site Certificates dialog box, click OK. Figure 277 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA-2401 User’s Guide...
  • Page 311: Figure 278 Opera 9: Certificate Signer Not Found

    Figure 278 Opera 9: Certificate signer not found 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. Figure 279 Opera 9: Security information NSA-2401 User’s Guide...
  • Page 312: Figure 280 Opera 9: Tools Menu

    Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
  • Page 313: Figure 282 Opera 9: Certificate Manager

    Appendix C Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 282 Opera 9: Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open. Figure 283 Opera 9: Import certificate NSA-2401 User’s Guide...
  • Page 314: Figure 284 Opera 9: Install Authority Certificate

    6 Next, click OK. Figure 285 Opera 9: Install authority certificate 7 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. NSA-2401 User’s Guide...
  • Page 315: Figure 286 Opera 9: Tools Menu

    This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click Tools > Preferences. Figure 286 Opera 9: Tools Menu 2 In Preferences, Advanced > Security > Manage certificates. Figure 287 Opera 9: Preferences NSA-2401 User’s Guide...
  • Page 316: Figure 288 Opera 9: Certificate Manager

    4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button. NSA-2401 User’s Guide...
  • Page 317: Figure 289 Konqueror 3.5: Server Authentication

    3 Click Forever when prompted to accept the certificate. Figure 290 Konqueror 3.5: Server Authentication 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 291 Konqueror 3.5: KDE SSL Information NSA-2401 User’s Guide...
  • Page 318: Figure 292 Konqueror 3.5: Public Key Certificate File

    Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
  • Page 319: Figure 295 Konqueror 3.5: Settings Menu

    4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button. NSA-2401 User’s Guide...
  • Page 320 Appendix C Importing Certificates NSA-2401 User’s Guide...
  • Page 321: Appendix D Open Source Licences

    No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes software developed by the Apache Software Foundation under Apache License.
  • Page 322 Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file NSA-2401 User’s Guide...
  • Page 323 Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS Version 1.1 Copyright (c) 1999-2003 The Apache Software Foundation. All rights reserved. NSA-2401 User’s Guide...
  • Page 324 Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1. Preamble NSA-2401 User’s Guide...
  • Page 325 The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. NSA-2401 User’s Guide...
  • Page 326 Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. NSA-2401 User’s Guide...
  • Page 327 If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not NSA-2401 User’s Guide...
  • Page 328 Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the NSA-2401 User’s Guide...
  • Page 329 It is not the purpose of this section to induce you to infringe any patents or other property right claims or to NSA-2401 User’s Guide...
  • Page 330 DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES. NSA-2401 User’s Guide...
  • Page 331: Gnu General Public License

    To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION NSA-2401 User’s Guide...
  • Page 332 Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. NSA-2401 User’s Guide...
  • Page 333 License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies NSA-2401 User’s Guide...
  • Page 334 WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR NSA-2401 User’s Guide...
  • Page 335 OpenLDAP is a registered trademark of the OpenLDAP Foundation. Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to copy and distribute verbatim copies of this document is granted This Product includes open SSL under the Open SSL License NSA-2401 User’s Guide...
  • Page 336 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ================== This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). NSA-2401 User’s Guide...
  • Page 337 POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] NSA-2401 User’s Guide...
  • Page 338 4. Products derived from this software may not be called “PHP”, nor may “PHP” appear in their name, without prior written permission from group@php.net. You may indicate that your software works in conjunction with PHP by saying “Foo for PHP” instead of calling it “PHP Foo” or “phpfoo” NSA-2401 User’s Guide...
  • Page 339 Mozilla Public License Version 1.1 1. Definitions. 1.0.1. “Commercial Use” means distribution or otherwise making the Covered Code available to a third party. 1.1. “Contributor” means each entity that creates or contributes to the creation of Modifications. NSA-2401 User’s Guide...
  • Page 340 (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. 2. Source Code License. 2.1. The Initial Developer Grant. NSA-2401 User’s Guide...
  • Page 341 Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5. 3.2. Availability of Source Code. NSA-2401 User’s Guide...
  • Page 342 Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any NSA-2401 User’s Guide...
  • Page 343 6. Versions of the License. 6.1. New Versions Netscape Communications Corporation (“Netscape”) may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions NSA-2401 User’s Guide...
  • Page 344 Participant to You under Sections 2.1 and/or 2.2 automatically terminate at the expiration of the 60 day notice period specified above. NSA-2401 User’s Guide...
  • Page 345 International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. 12. Responsibility for claims NSA-2401 User’s Guide...
  • Page 346 Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: NSA-2401 User’s Guide...
  • Page 347 License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
  • Page 348 DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR...
  • Page 349 This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement.
  • Page 350 Appendix D Open Source Licences NSA-2401 User’s Guide...
  • Page 351: Appendix E Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
  • Page 352 Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
  • Page 353: Appendix F Customer Support

    In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. Regional offices are listed below (see also http:// www.zyxel.com/web/contact_us.php).
  • Page 354 • Regular Mail: ZyXEL Communications Oy, Malminkaari 10, 00700 Helsinki, Finland France • E-mail: info@zyxel.fr • Telephone: +33-4-72-52-97-97 • Fax: +33-4-72-52-19-20 • Web: www.zyxel.fr • Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest, France NSA-2401 User’s Guide...
  • Page 355 • Sales E-mail: sales@zyxel.in • Telephone: +91-11-30888144 to +91-11-30888153 • Fax: +91-11-30888149, +91-11-26810715 • Web: http://www.zyxel.in • Regular Mail: India - ZyXEL Technology India Pvt Ltd., II-Floor, F2/9 Okhla Phase -1, New Delhi 110020, India Japan • Support E-mail: support@zyxel.co.jp •...
  • Page 356 • Sales E-mail: sales@zyxel.com.my • Telephone: +603-8076-9933 • Fax: +603-8076-9833 • Web: http://www.zyxel.com.my • Regular Mail: ZyXEL Malaysia Sdn Bhd., 1-02 & 1-03, Jalan Kenari 17F, Bandar Puchong Jaya, 47100 Puchong, Selangor Darul Ehsan, Malaysia North America • Support E-mail: support@zyxel.com •...
  • Page 357 • Support E-mail: support@zyxel.com.sg • Sales E-mail: sales@zyxel.com.sg • Telephone: +65-6899-6678 • Fax: +65-6899-8887 • Web: http://www.zyxel.com.sg • Regular Mail: ZyXEL Singapore Pte Ltd., No. 2 International Business Park, The Strategy #03-28, Singapore 609930 Spain • Support E-mail: support@zyxel.es • Sales E-mail: sales@zyxel.es •...
  • Page 358 • Sales E-mail: sales@zyxel.co.uk • Telephone: +44-1344-303044, 08707-555779 (UK only) • Fax: +44-1344-303034 • Web: www.zyxel.co.uk • FTP: ftp.zyxel.co.uk • Regular Mail: ZyXEL Communications UK Ltd., 11 The Courtyard, Eastern Road, Bracknell, Berkshire RG12 2XB, United Kingdom (UK) NSA-2401 User’s Guide...
  • Page 359: Index

    NSA-2401 User’s Guide...
  • Page 360 LEDs unlock quota volume recommendations external volume replacement restrictions create S.M.A.R.T. attributes EXT2 see also hard drive EXT3 disk quota FAT16 conflict users FAT32 NSA-2401 User’s Guide...
  • Page 361 HyperText Transfer Protocol over Secure Socket copying Layer, see HTTPS deleting moving forgot password front panel LEDs 81, 221, 222 anonymous access character set icons connection limit about idle timeout administration common over TLS global 38, 48 NSA-2401 User’s Guide...
  • Page 362 Mozilla Public License Linux My NSA local changing share properties screen group management overview screens user screens 37, 38 locate tutorial lock 141, 148 My Own Shares external volume locked volumes buzzer priority classes 229, 235 NSA-2401 User’s Guide...
  • Page 363 Patent one disk path quick comparison PHP License RAID 0 ping RAID 10 power RAID 5 button RAID 5 spare consumption remove failure 89, 242 reshape restart reshaping resume 89, 242 resync speed schedule resynching NSA-2401 User’s Guide...
  • Page 364 82, 237 tutorial standby drive status messages S.M.A.R.T. screen attributes storage 125, 258 safety warnings disk SATA 31, 255 external disk scan humidity external volume increasing capacity tutorial internal volume internal screen temperature links striping summary 49, 50 NSA-2401 User’s Guide...
  • Page 365 RAID capacity local user share access UTF-8 login NDU discovery non-admin passwords overview snapshots Web Configurator access volume 125, 174 tutorials choosing a storage method create 142, 149 creating crypto 141, 148 down NSA-2401 User’s Guide...
  • Page 366 Windows Windows domain administrator administrator password leave security mode Windows Explorer workgroup 177, 256 workgroup security mode write performance 91, 216 affected by snapshots 91, 216 150, 174 ZyXEL Communications Corporation NSA-2401 User’s Guide...
  • Page 367 Index NSA-2401 User’s Guide...

Table of Contents