• Supporting Disk Refer to the included CD for support documents. • ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product certifications. User Guide Feedback Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead.
“k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on. • “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”. NSA-2401 User’s Guide...
Page 5
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device. Computer Notebook computer Server Firewall Switch Router NSA-2401 User’s Guide...
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. This product is recyclable. Dispose of it properly. NSA-2401 User’s Guide...
List of Tables........................... 25 Part I: Introduction and Tutorials ............29 Chapter 1 Getting to Know Your NSA..................... 31 1.1 NSA-2401 Overview ......................31 1.1.1 Front Panel LEDs ....................... 32 1.1.2 Power Button ......................33 1.1.3 COPY Button ......................33 Chapter 2 Introducing the Web Configurator ..................
Page 12
3.9.2 Adding an Internal Hard Drive to an Existing Disk Array .......... 107 3.9.3 Using a Disk Array’s Increased Capacity ..............109 3.9.4 Migrating a RAID to Higher Capacity Hard Drives ............110 Part II: Web Configurator ..............115 NSA-2401 User’s Guide...
Page 15
12.1 Troubleshooting Overview ....................247 12.2 Power, Hardware Connections, and LEDs ..............247 12.3 NSA Login and Access ....................249 12.4 Users Cannot Access the NSA ..................251 12.5 Backups and Snapshots ....................252 12.6 External USB Disks ......................253 NSA-2401 User’s Guide...
Page 16
Appendix A Log Messages....................263 Appendix B Setting Up Your Computer’s IP Address ............273 Appendix C Importing Certificates..................297 Appendix D Open Source Licences ..................321 Appendix E Legal Information ....................351 Appendix F Customer Support ..................... 353 Index............................359 NSA-2401 User’s Guide...
Page 22
Figure 249 Internet Explorer 7: Certification Error ................298 Figure 250 Internet Explorer 7: Certification Error ................298 Figure 251 Internet Explorer 7: Certificate Error ................... 298 Figure 252 Internet Explorer 7: Certificate .................... 299 Figure 253 Internet Explorer 7: Certificate Import Wizard ..............299 NSA-2401 User’s Guide...
H A P T E R Getting to Know Your NSA 1.1 NSA-2401 Overview The NSA (Network Storage Appliance) allows secure storage and management of data on your network. Windows, Apple, or Linux users can access data on it as if it was on their own computers.
The SYS LED blinks orange when firmware is being uploaded to the NSA. Do not turn off or reset the NSA while the firmware update is in progress! Table 2 NSA LEDs COLOR STATUS DESCRIPTION Green The NSA is turned off. The NSA is turned on and receiving power. NSA-2401 User’s Guide...
NSA. Use the Applications > Copy Button screen (Section 10.4 on page 225) to choose where the NSA stores the files. The name of the folder created for the copied files consists of the date and time of the copy in year_month_day_hour_minute_second format. NSA-2401 User’s Guide...
Page 34
Chapter 1 Getting to Know Your NSA NSA-2401 User’s Guide...
2.2.1 Access the NSA Using the NDU If you don’t know the IP address of the NSA, then use the NDU to find it. Refer to the Quick Start Guide to see how to install and run the NDU. NSA-2401 User’s Guide...
The default user name and password are ‘admin’ and ‘1234’ respectively. Enter your user name and password, then click Login. Non-admin users can change their passwords by using the username and password in the My NSA > Password screen. See Section 2.5.7 on page 46 for details. NSA-2401 User’s Guide...
The Web Configurator session automatically times out after 15 minutes. Simply log back into the NSA if this happens to you. 2.4 User-level Screens Overview All users (including the administrator) first see the user-level access My NSA screen after login. NSA-2401 User’s Guide...
It is similar to a shared folder in Windows, but the access rights are independent of the folder (you configure the share and the folder separately). You can map a share to a network drive for easy and familiar file transfer for Windows users. NSA-2401 User’s Guide...
The administrator owns and manages the public shares. Configure Click this button to see and configure the management details for a share. Other Shares These are other shares on the internal hard drives or external (USB) devices that you can access (but not manage). NSA-2401 User’s Guide...
Table 5 My NSA Share Browsing Icons DESCRIPTION ICON Create Folder Click this icon to open a screen where you can create a new folder. Upload Click this button to copy a file from your computer to this location in the NSA. NSA-2401 User’s Guide...
Size This column displays a file’s size. Modified Date This column displays the last time the file or folder was changed (in year- month-day hour:minute:second format). Close Click this button to return to the My NSA screen. NSA-2401 User’s Guide...
Use the My NSA share configuration screens to see and configure share management details. Click My NSA and then the Configure button of one of your shares to open the following screen. This screen displays a share’s management details. Figure 11 My NSA Share Configuration NSA-2401 User’s Guide...
Share Name Enter the name of the shared folder. The text may consist of 1 to 255 characters. Share Name Details on page 44 for more information. Volume Select a volume for the share to be located on. NSA-2401 User’s Guide...
Page 44
• Share names cannot use names reserved for “automatic shares” of external USB disk volumes be unique, for example, “USB[0-9]{1,2}”, that is, a share named “USB” followed by a one or two digit number). 2.5.4.1 Share Access Configuration This screen allows you to assign permissions to a share. NSA-2401 User’s Guide...
The NSA allows FTP access to shares, folders or files with names encoded in the UTF-8 (8-bit UCS/Unicode Transformation Format) format. So your FTP client must support UTF-8 in order to access shares, folders or files on the NSA with Unicode names. • Spaces • _ [underscores] NSA-2401 User’s Guide...
2.5.7 Password Screen Click Password to open the following screen. Use this screen to change an account’s password. Enter a new password and confirm it by re-entering it. Figure 14 Password NSA-2401 User’s Guide...
The first time you access the administration screens, the setup wizard opens. See the online help for details on the setup wizard screens. After you configure the setup wizard, the Status screen displays when you enter the advanced administration screens. NSA-2401 User’s Guide...
Click this icon to open a web help page specific to the screen you are currently configuring. About Click this icon to view the model name, firmware version and copyright. Wizards Click this icon to open a sub-menu of wizard(s). NSA-2401 User’s Guide...
Click a minus (-) link to hide a category’s screen links. Certain screens also contain hyper links that allow you to jump to another screen. Click the Status icon to open the Status screen. Figure 16 Navigation Panel Links NSA-2401 User’s Guide...
Upload new firmware to your NSA. Power Set the hard drive sleep timer. Management Shutdown Restart your NSA or turn it off. Logout Click Logout to exit the Web Configurator. This is recommended to prevent unauthorized administrator access to the NSA. NSA-2401 User’s Guide...
If you have disk space available for a new disk array, then click this icon to open a screen where you can create a new disk array. Delete Select an entry and click this icon to remove the entry. Edit Select an entry and click this icon to modify it’s settings. NSA-2401 User’s Guide...
Press the RESET button and hold it for ten seconds (you will hear three beeps) and release it. The NSA sounds three more beeps after you release the button as confirmation. NSA-2401 User’s Guide...
Chapter 2 Introducing the Web Configurator Figure 17 Reset and Reload Timeline Beep Beep Beep Seconds Release Release Press button to reset to reload and restart The NSA automatically restarts to complete reloading the factory default configuration file. NSA-2401 User’s Guide...
Page 54
Chapter 2 Introducing the Web Configurator NSA-2401 User’s Guide...
You may also to give management read and write access to some files and give other employees read-only access. Using the tools built into the ZyXEL Web Configurator, you can do just this. 3.2.1 Setting Up User Accounts As the administrator of the NSA, one of the first tasks you will want to do is set up accounts for everyone who needs to use it.
Chapter 3 Tutorials 1 Log into the Web Configurator using your administrator Username and Password. Figure 18 Administrator Login 2 In the My NSA screen, click Administration. Figure 19 My NSA NSA-2401 User’s Guide...
3 Once the Web Configurator workspace appears, click Sharing > Users to open the user account management area. Figure 20 Sharing > Users 4 Click Add Account to open the Create a New Account screen. Figure 21 Sharing > Users > Create a New Account NSA-2401 User’s Guide...
After you create accounts, the next thing you’ll want to do is organize the user accounts into groups. This example creates a senior management group with vice president Gonzo as a member. You can add other members later. 1 Click Sharing > Groups > Add Group. Figure 22 Groups NSA-2401 User’s Guide...
You also have a senior management group. You want to allow the users in the senior management group to access both shares while Kermit can access his own share. 1 Click Sharing > Shares > Add Share. Figure 24 Shares NSA-2401 User’s Guide...
Share Access to Advanced and click Edit. Figure 25 Sharing > Shares > Add Share 3 Include Senior-Management under Full and click Apply. This way both Kermit and the senior managers have full access to the share. Figure 26 Share Access Configuration NSA-2401 User’s Guide...
Network Drive screen. 2 In the Folder field, enter two backslashes followed by the IP address of the NSA (192.168.1.35), another backslash, and the name of the share (Gonzo) and click Finish. Figure 28 Mapping a Share NSA-2401 User’s Guide...
5 Copy and paste the 2009-Plan.doc file into the Strategy folder. Figure 31 Using the Folder 3.3.2 Using a Share with a Web Browser Now Gonzo wants to use his web browser to add the 2010-2014-Plans.doc file to his Strategy folder. NSA-2401 User’s Guide...
Chapter 3 Tutorials 1 Open Firefox and enter http://192.168.1.35 to open the login screen. Enter Gonzo’s username and password and clicks Login. Figure 32 User Login 2 Click the Gonzo share. Figure 33 Gonzo’s My NSA Screens NSA-2401 User’s Guide...
5 Browse to the 2010-2014-Plans.doc file and click Apply. Figure 36 Upload Files Screen 3.4 How to Find the NSA in OS X Here’s how to find the NSA-2401 OS X. This example uses Mac OS X 10.5 (Leopard). NSA-2401 User’s Guide...
Chapter 3 Tutorials 1 Click the Finder icon in the dock. Figure 37 Opening the Finder 2 Select All under Shared in the sidebar. An entry for the NSA appears in the Network list. Figure 38 Displaying the NSA NSA-2401 User’s Guide...
3 Click the triangle beside the NSA’s name to display the shares that Gonzo can use. Figure 39 Displaying the NSA Alternatively, you can also connect directly to the NSA from the Go Menu in the Finder. Simply click Go > Connect to Server. Figure 40 Alternate Method for Displaying the NSA NSA-2401 User’s Guide...
Chapter 3 Tutorials 4 When the Connect to Server dialog box opens, type smb:// and the IP address of your NSA-2401 or click Browse to find it in your network. Click Connect. Figure 41 Connecting to the NSA 5 Once connected, you can now access the NSA from the finder or directly from the desktop.
2 Next, let’s modify the certificate by changing the Common Name to this NSA’s IP address of 192.168.1.35, the Organization to “Test” and the Key Length to 2048. Figure 43 Maintenance > SSL > Edit a Self-Signed Certificate NSA-2401 User’s Guide...
Chapter 3 Tutorials 3 The NSA restarts its network services and returns you to the login screen. Figure 44 Maintenance > SSL > Edit a Self-Signed Certificate NSA-2401 User’s Guide...
3.5.1.2 Downloading and Installing the NSA’s Customized Certificate 1 Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. Figure 45 Maintenance > SSL 2 Save the file to your computer. Figure 46 Downloading the NSA’s Certificate NSA-2401 User’s Guide...
4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix C on page 297 for other examples. In the Certificate dialog box, click Install Certificate. Figure 48 Certificate NSA-2401 User’s Guide...
5 In the Certificate Import Wizard, click Next. Figure 49 Certificate Import Wizard: Welcome 6 Leave Automatically select certificate store based on the type of certificate selected and click Next. Figure 50 Certificate Import Wizard: Certificate Store NSA-2401 User’s Guide...
Figure 51 Certificate Import Wizard: Finish 8 If you are presented with another Security Warning, click Yes. Figure 52 Security Warning 9 Finally, click OK when presented with the successful certificate installation message. Figure 53 Certificate Import Wizard: Successful NSA-2401 User’s Guide...
1 Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. Figure 54 Maintenance > SSL NSA-2401 User’s Guide...
3 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. Figure 56 Firefox: Secure Connection Failed NSA-2401 User’s Guide...
Chapter 3 Tutorials 6 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View. Figure 59 Firefox: Add Security Exception NSA-2401 User’s Guide...
7 The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close. Figure 60 Firefox: Add Security Exception NSA-2401 User’s Guide...
3.5.2 Using FTPS to Connect to the NSA This section covers how to use FTP over TLS with the NSA for secure FTP transfers. Before you go through this section, read Section 3.5.1 on page 68 to configure HTTPS. This example uses FileZilla. NSA-2401 User’s Guide...
1 Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA’s address. • Set the Servertype to FTPES - FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect. Figure 63 FileZilla Site Manager NSA-2401 User’s Guide...
3.5.3.1 Configuring the Share’s Access First you need to give Kermit and the senior management read-only access to the share. 1 Click Sharing > Shares. Select the Gonzo share and click Edit Share. Figure 65 Sharing > Shares NSA-2401 User’s Guide...
2 Set the Share Access to Advanced and click Edit. Figure 66 Sharing > Shares > Edit Share 3 Move Senior-Management and Kermit to Read Only. Click Apply in this screen and again in the edit screen. Figure 67 Share Access Configuration NSA-2401 User’s Guide...
Now you need to stop Kermit from accessing the 2010-2014-Plans file. 1 Select the Gonzo share, and click ACL Properties. Figure 68 Sharing > Shares 2 Click New ACL. Figure 69 Sharing > Shares > ACL Configuration NSA-2401 User’s Guide...
Strategy folder. Kermit and any member of the senior management group can log into the NSA and view the contents of the Strategy folder, although Kermit cannot see the 2010-2014-Plans.doc file. NSA-2401 User’s Guide...
For example, you might do daily backups of important individual files or folders and a weekly general archive. You can save backups to another location so your files can survive even if the original RAID or NSA fails. NSA-2401 User’s Guide...
3.7.3 Using a Snapshot Image to Restore Files To use a snapshot to restore files, use the MyNSA screens, CIFS (Windows Explorer), or FTP to browse to the folder named “snap-share”. Open or copy the folder or file that you want to restore. NSA-2401 User’s Guide...
Gonzo updates the files frequently, you decide to create a backup job that has the NSA publish the contents of the folder to an NSA in the German branch office. To create a synchronization backup: 1 Click Protect > Backup > Add Job. Figure 80 Protect > Backup NSA-2401 User’s Guide...
Gonzo wants only his current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder. Figure 81 Protect > Backup > Add Job: Step 1 NSA-2401 User’s Guide...
• Enter the other NSA’s address and administrator password. • Click Show target content to display the remote NSA’s contents. • Select the destination on the remote NSA (Backups in this example). • Click Next. Figure 82 Protect > Backup > Add Job: Step 2 NSA-2401 User’s Guide...
• Restrict the bandwidth usage to 256 KB/s to stop the archives from using all of your network connection’s available bandwidth. • You don’t have to configure a purge policy for a synchronization backup. • Click Next. Figure 84 Protect > Backup > Add Job: Step 3 NSA-2401 User’s Guide...
The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share. 3.7.5 Creating an Archive Backup To backup the NSA every week to a remote NSA: 1 Click Protect > Backup > Add Job. Figure 86 Protect > Backup NSA-2401 User’s Guide...
This example sets the NSA to do another full backup after every four incremental backups. Figure 87 Protect > Backup > Add Job: Step 1 NSA-2401 User’s Guide...
Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection. Figure 88 Protect > Backup > Add Job: Step 2 NSA-2401 User’s Guide...
If you have backup jobs for which the NSA has already performed backups, you can restore the files based on the backup job. Gonzo accidently deleted all of the files in his share and needs to do the following to restore them. NSA-2401 User’s Guide...
1 Click Protect > Restore. Specify where the archive files are located. In this example, enter “192.168.3.2” as the IP address, “admin” as the account name, “1234” as the password, and “Backups” as the share name. Click Test Connection. Click Next. Figure 96 Protect > Restore: Step 1 NSA-2401 User’s Guide...
3.8 Printer Server Tutorial Do the following to configure the NSA to allow computers on your network to share a printer. See www.zyxel.com for a list of compatible printers. 1 Make sure the NSA is on and the SYS light shines steadily.
7 Use the wizard screens to install the printer driver on the computer. You may need to get the file from the printer’s CD or the printer manufacturer’s website (the driver is not installed on the NSA). You must install the printer driver on each computer that will use the printer. NSA-2401 User’s Guide...
NSA’s storage capacity: • Connect external USB hard drives • Add internal hard drives if there are not four already installed. • Migrate a RAID 5 array to higher capacity hard drives. NSA-2401 User’s Guide...
JBOD array or three-disk RAID 5 array. When you add a new disk to an existing array, you do not have to create new volumes and sharing settings. For optimal performance and RAID storage capacity, use hard drives of the same speed and capacity. NSA-2401 User’s Guide...
Figure 108 Storage > Internal Storage > Disk 3 Click the RAID tab to display the RAID array summary screen. Select the array to which you want to add the disk and click Add Disk. Figure 109 Storage > Internal Storage > RAID NSA-2401 User’s Guide...
You do not have to change your existing share, backup, and snapshot settings. Of course you can also create new volumes, but you must configure new share settings in order to use them and new backup and snapshot settings to protect the files. NSA-2401 User’s Guide...
If the new hard drives have any data you want to keep, back it up to another location before you install them. Adding these hard drives to a disk array formats them so all data stored on them will be lost. To migrate a RAID5 array to a higher capacity hard drive: NSA-2401 User’s Guide...
4 Log out of the Web Configurator and then back in. The Log Message screen shows that the RAID is degraded, click Turn Off Buzzer to stop the audible alarm. Then click OK to continue. Figure 116 Storage > Internal Storage > Disk > Eject NSA-2401 User’s Guide...
Internal Storage > RAID screen and click Repair. Figure 118 Storage > Internal Storage > RAID 8 Select the disk you want to use to repair the RAID and click Apply. Figure 119 Storage > Internal Storage > RAID > Repair NSA-2401 User’s Guide...
RAID after each replacement. When you are done replacing hard drives and the final RAID recovery finishes, you can assign the increased storage capacity to your existing volumes (see Section 3.9.3 on page 109) . NSA-2401 User’s Guide...
It provides an overview of your NSA’s status, settings and activity. Once you leave the screen, you can return to it by clicking the Status icon or the text itself on the top-left of the navigation panel. Figure 121 Status Screen NSA-2401 User’s Guide...
This displays a summary of CPU usage by all current processes. Click the Refresh icon to update this display. It also automatically updates itself every 10 seconds. Note: If too many users are using the NSA then the NSA may appear sluggish. NSA-2401 User’s Guide...
Page 119
Unlocked, or Down). The following columns display the volume’s name, whether the volume is encrypted (CRYPTO) or not (NORMAL), the total size of the volume, how much is currently in use, and how much is still available. NSA-2401 User’s Guide...
Page 120
ANONYMOUS FTP otherwise. Connected At This displays the date and time the user last connected to the NSA in year-day-month hour:minute:second, format. IP Address This displays the IP address of the computer connected to the NSA. NSA-2401 User’s Guide...
New Date (yyyy-mm-dd) This field displays the last updated date from the time server or the last date configured manually. When you set Date Time Setup to Manual, enter the new date in this field and then click Apply. NSA-2401 User’s Guide...
Apply Click this to save your changes. Cancel Click this to discard changes. 5.1.1 Time Lag Time lag occurs when the time on the NSA falls behind the time on the time server. This may happen if: NSA-2401 User’s Guide...
Page 123
• A power surge occurs. The NSA gives no warning if time lag occurs. You should resynchronize the time after a power surge or after you have shut down the NSA several times. NSA-2401 User’s Guide...
Page 124
Chapter 5 System Setting Screen NSA-2401 User’s Guide...
The following diagram shows disks one to four combined into RAID Array 1. Volumes A, B, and C are on RAID Array 1. Figure 123 Disks, RAIDs, and Volumes Volume A Volume B Volume C RAID Array 1 Disk 1 Disk 2 Disk 3 Disk 4 NSA-2401 User’s Guide...
Page 126
Replace the faulty disk(s) and recreate the array, volumes, and sharing configuration. Finding Out More Section 6.9 on page 151 for theoretical background information on JBOD and the RAID levels used on the NSA. Read Section 3.9 on page 106 for how to increase the NSA’s storage capacity. NSA-2401 User’s Guide...
(yet) used by snapshots. Volume Free Space This is space on a storage volume that is not used up by files. Disks in the array The disks that belong to the array display under the array’s volumes. NSA-2401 User’s Guide...
Repair. 6.3.1 Internal Disks Screen Click Storage > Internal Storage > Disk to display the following screen. This screen provides information on disks installed in the NSA. Figure 125 Storage > Internal Storage > Disk NSA-2401 User’s Guide...
6.3.2 S.M.A.R.T Screen Click Storage > Internal Storage > Disk to display the disk summary screen. Select a disk and click the S.M.A.R.T. icon to display the following screen. This screen provides details about the drive and its status. NSA-2401 User’s Guide...
This field displays the local time that the hard drive is using. SMART support This field displays whether or not the hard drive is SMART-capable. SMART support This field displays whether or not the hard drive has SMART monitoring turned on. Click this button to close the screen. NSA-2401 User’s Guide...
This indicates when the hard drive updates the value for this attribute. Always means the hard drive updates this attribute during normal operation and during offline activities. Offline means the hard drive only updates this attribute when no one is accessing the hard drive. NSA-2401 User’s Guide...
The type of array you use depends on how many disks you have and how many arrays you want to create. Consider this carefully as all data is deleted when you re-create an array. Back up your data before deleting or re-creating an array NSA-2401 User’s Guide...
• RAID 1 offers data security, although the performance is slower than RAID 0. Since RAID 1 mirrors data onto a second disk, you can recover all data if one disk fails. NSA-2401 User’s Guide...
Data access may be slower from a degraded array, so it’s recommended that you replace the faulty disk and repair the array as soon as you can. NSA-2401 User’s Guide...
A warning screen appears. Click Yes if you want to remove the array and all of its data. Otherwise click No. Repair After you replace a faulty disk, select the hard drive array (its status will be Degraded) and click this icon to resynchronize the array. NSA-2401 User’s Guide...
Page 137
Remove Hot Spare To remove the standby drive from a RAID1 or RAID5 array, select the array and click this icon. After you do this, you can create a single-disk JBOD array for the disk. NSA-2401 User’s Guide...
6.5.1 Creating a New RAID Click the Create icon in the RAID screen as shown in Figure 128 on page 135 to create a new RAID array. Figure 129 Storage > Internal Storage > RAID > Create NSA-2401 User’s Guide...
• Down when a volume is down and cannot be fixed. The volume cannot be used and the data is lost. Replace the faulty disk(s) and recreate the array, volumes, and sharing configuration. NSA-2401 User’s Guide...
Select a volume and click this icon to check the volume’s file consistency. Note: If you have the NSA automatically attempt to repair any damaged files it finds during the scan, be careful not to cancel the scan as you may lose data. NSA-2401 User’s Guide...
RAID Array This field shows the RAID or JBOD array on which the volume is located. Capacity This field shows the total size of the volume, how much is currently in use, and how much is still available. NSA-2401 User’s Guide...
Acceptable characters are all alphanumeric characters (A-Z 0-9) and " " [spaces], “-” [dashes], "_" [underscores], and "." [periods]. The first character must be alphanumeric. The last character cannot be a space " ". NSA-2401 User’s Guide...
Page 143
You also use the screens to create copies of the USB key. Note: Create duplicate USB keys now since you cannot make them later. Apply Click this button to create the volume. Cancel Click this button to discard your changes and close this screen. NSA-2401 User’s Guide...
1 Select Yes to copy the USB key to another USB device. After the duplicate USB key creation completes, you return to this screen so you can make another. Click No when you are done making USB key copies. NSA-2401 User’s Guide...
Use the external storage screens to manage the NSA’s externally (USB) connected storage. Connect USB devices to the NSA’s USB ports. Click Storage > External Storage to open the following screen. This screen provides information on disks connected to the NSA. NSA-2401 User’s Guide...
Click Storage > External Storage > Volume to display the external (USB-connected) volume summary screen as shown next. Use this screen to manage the NSA’s external storage volumes. The NSA automatically creates volumes when you connect an external disk. You can also create other volumes. NSA-2401 User’s Guide...
No one will be able to use the volume until an administrator unlocks it. Note that if the volume was encrypted using a USB key and the USB key is connected when the NSA restarts, the NSA automatically unlocks the volume. NSA-2401 User’s Guide...
Click Storage > External Storage > Volume > Create to display the external (USB- connected) volume creation screen as shown next. You can also select an existing external volume and click the Edit icon. Use this screen to add or edit external storage volumes. NSA-2401 User’s Guide...
The same as EXT2, but adds a journaled file system and is more robust. reiserfs: Offers better performance for small files. xfs: Offers good performance for larger files. You can also have the NSA encrypt a volume that uses the xfs file system. NSA-2401 User’s Guide...
Click this button to save your changes back to the NSA. Cancel Click this button to discard your changes and close this screen. 6.9 Technical Reference This section contains background on JBOD and the RAID levels used on the NSAand lists some common S.M.A.R.T. attributes. NSA-2401 User’s Guide...
JBOD can be used to turn several different-sized drives into one big drive. For example, JBOD could convert 100 GB, 200 GB, 250 GB, and 500 GB drives into one large logical drive of 1050 GB. Since data isn’t striped across disks, if one disk fails, NSA-2401 User’s Guide...
GB (4 * 100 GB, the smallest disk size) and the remaining space (300 GB) is unused. Typical applications for RAID 0 are non-critical data (or data that changes infrequently and is backed up regularly) requiring high write speed such as audio, video, graphics, games and so NSA-2401 User’s Guide...
Data is duplicated across two disks, so if one disk fails, there is still a a copy of the data. These two arrays are configured as a single RAID 0 array for faster performance Table 40 RAID 10 RAID 0 RAID 1 RAID 1 DISK 1 DISK 2 DISK 3 DISK 4 NSA-2401 User’s Guide...
The advantage of a hot-spare is that if a disk fails, then the array resynchronizes automatically with the standby disk and operates at healthy array speed after the resynchronization. You need four hard disks installed to use RAID 10, RAID 5 or RAID 5 with hot- spare. NSA-2401 User’s Guide...
Recalibration High This is the number of times recalibration was requested when the Retries first attempt did not succeed. A decrease in this value is an indicator of hard disk mechanical subsystem problems. NSA-2401 User’s Guide...
Page 156
Rate (TAR) a read signal spike caused by sensor temperature rise due to touching the disk surface or contaminant particles. 206 Flying Height This is the height of the hard drive’s read/write heads above the disk surface. NSA-2401 User’s Guide...
Page 157
This is the hard drive’s temperature. 240 Head Flying This is the total time that the head has been positioning. Hours 250 Read Error Retry This is the number of errors in reading from the disk. Rate NSA-2401 User’s Guide...
Or you can assign the NSA a static (fixed) IP address. DNS Server Address A DNS (Domain Name System) server maps domain names (like www.zyxel.com) to their corresponding IP addresses. This lets you use domain names to access web sites without having to know their IP addresses.
Fault Tolerance: LAN2 serves as a backup (fail-over) for the LAN1. Both Gigabit Ethernet interfaces are connected to the same subnet. There is one IP address. If LAN1 loses its connection, LAN2 takes over LAN1’s IP address and traffic. NSA-2401 User’s Guide...
To use jumbo frames, your network must support 1 Gbps transmissions (Gigabit Ethernet). All of your network devices (computer Ethernet cards and switches, hubs, or routers) must also support the same size of jumbo frames that you specify in the NSA. NSA-2401 User’s Guide...
Use the Network > TCP/IP screen to assign the NSA a dynamic or static IP address(es), subnet mask, default gateway and DNS servers. The NSA automatically restarts its network services after you apply changes in the TCP/IP or Windows/CIFS screens. Click Network > TCP/IP to access the Network > TCP/IP screen. NSA-2401 User’s Guide...
LAN1 and LAN2 separately when the Teaming Mode is set to Stand Alone). Dynamic Select the Dynamic checkbox to have a DHCP server automatically assign an IP address to your NSA. If none is assigned, then the NSA reverts to the default IP address of 192.168.1.3. NSA-2401 User’s Guide...
Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup or domain. CIFS is always enabled on the NSA. NSA-2401 User’s Guide...
Page 165
NSA. Users (U1, U2, U3) can all back up and share data on the NSA. Important data stored on servers S1 and S2 may be also stored there. It is recommended that you place the NSA behind a firewall and/or IDP device for protection. NSA-2401 User’s Guide...
Type the domain name of the Windows server domain controller. The name can be up to 255 characters long. The NSA’s DNS server must be able to resolve this domain name. Windows Domain Administrator is the default Windows Domain Administrator. Administrator NSA-2401 User’s Guide...
Enable NFS Server Click this icon to allow access to the NFS shares. Disable NFS Server Click this icon to stop access to the NFS shares. Add NFS Share Click this icon to create a new NFS share. NSA-2401 User’s Guide...
Click Network > NFS > Add NFS Share (or Edit NFS Share) to display the screen where you can configure a share for systems to use NFS to access. Figure 149 Network > NFS > Add NFS Share NSA-2401 User’s Guide...
7.4.2 NFS Session Screen Click Network > NFS > NFS Session to display the NFS session screen. This screen shows which users are currently connected to the NSA using NFS. Figure 150 Network > NFS > NFS Session NSA-2401 User’s Guide...
This displays the date and time the user last connected to the NFS share in year-day-month hour:minute:second, format. IP Address This displays the IP address of the computer connected to the NSA. Click OK to close the window. NSA-2401 User’s Guide...
More restrictive access rights override less restrictive ones. In Conflict A user account is “in conflict” when the account name that exists on a network-attached storage device also exists on the domain controller. See Section 8.2.0.1 on page 177 for more. NSA-2401 User’s Guide...
Page 174
This is a list of read/write permissions associated with specific files and/or folders. Account names added to the list are linked to the files and folders that they are allowed to access, along with what kinds of actions they are allowed to perform with those files and folders. NSA-2401 User’s Guide...
Note: If a user is deleted on the domain controller but the NSA-2401 domain user list is not up-to-date, then the user cannot log in since authentication is handled by the domain controller.
Click Previous to cycle back through the pages of users, and Next to cycle forward through them. Status This icon displays the account as either a Conflict User, a Local User, a Domain User, or an Admin User. NSA-2401 User’s Guide...
Page 177
The NSA has no way to distinguish these two users as their passwords and user names are exactly the same. During a conflict situation, the local user takes precedence ONLY if the domain user and local user’s passwords are the same. NSA-2401 User’s Guide...
Enter the user’s e-mail address. Description Enter details about the user account. The text may consist of up to 110 letters, numerals and any printable character found on a typical English language keyboard except quotation marks (‘) or (“). NSA-2401 User’s Guide...
Page 179
• The account name cannot be the same as a system account name such as FTP or EVERYONE nor be the same as an existing local or domain account. Other reserved user names that are not allowed are: • bin • daemon • ftp • anonymous • nobody • root • pc-guest NSA-2401 User’s Guide...
Configurator using the username and password as defined in the Create New Account screen. After logging in, select the Password tab in the account toolbar. Figure 153 My NSA In the Password tab, create a new password and then click Apply. Figure 154 Password NSA-2401 User’s Guide...
Used (MB) Indicates how much of the volume quota the selected user has used. Used quote is measured in megabytes (MB). Group Name Indicates the groups to which the selected user belongs. Click this to close the screen. NSA-2401 User’s Guide...
Select a group from the list, then click this icon to retrieve its domain information, where applicable. Edit Group Select a group from the list, then click this icon to edit its permissions. See Section 8.2.1 on page 178 for details. NSA-2401 User’s Guide...
If you choose not to set any search parameters, then the defaults for each filter is used. Clear{filter} This button displays when you click the Search icon. Click to reset all the search filters back to their default settings. NSA-2401 User’s Guide...
Description Enter details about the user group. The text may consist of up to 110 letters, numerals and any printable character found on a typical English language keyboard except quotation marks. NSA-2401 User’s Guide...
Page 185
The group name cannot be EVERYONE nor be the same as an existing local or domain group. Other reserved group names that are not allowed are: • daemon • disk • ftp • nobody • lp • root • tty • utm NSA-2401 User’s Guide...
Select a share from the list, then click this icon to edit its settings. See Section 8.4.2 on page 190 for details. ACL Properties Click this icon to open the ACL Configuration screen, where you can set up an Access Control List. See Section 8.4.2 on page 190 for details. NSA-2401 User’s Guide...
This displays the name of the user account that owns the share. Permission Type This displays the type of permissions assigned to the share. Options are public, private, and advanced. The key icon indicates that a share has an Access Control List. NSA-2401 User’s Guide...
193) to clear out the recycle bin periodically or else its host volume will fill up and users will not be able to store any new files on it. Share Access Choose whether the share is public or private, or choose Advanced to open the Share Access Configuration screen. NSA-2401 User’s Guide...
You can remove users from any given authority level by selecting them and clicking the left arrow. Apply Click this to save your changes. Cancel Click this to discard changes and close the window. NSA-2401 User’s Guide...
This indicates whether the item in the list is a folder or file, as well as whether it is locked or unlocked. ACL Path This indicates the file or folder path and name on the share. Close Click this to close the screen. NSA-2401 User’s Guide...
This indicates when the file or folder was last altered on the share. When a file is uploaded to the NSA that is classified as a “modification” as it is considered newly written data by the device. Close Click this to close the screen. NSA-2401 User’s Guide...
Deny modified, moved, or removed. Deny - Removes all privileges; files and folders cannot be read, modified, moved, or removed. You can remove users from any given authority level by selecting them and clicking the left arrow. NSA-2401 User’s Guide...
Empty All Recycle Bins Click this button to manually delete all files and folders from all of the shares’ recycle bins. Apply Click this to save your changes. Cancel Click this to discard changes and close the window. NSA-2401 User’s Guide...
Click this button to add the information in Add DFS Links to the list. Delete This Link Click this button to permanently remove the associated DFS link. Apply Click this to save your changes. Cancel Click this to discard changes and close the window. NSA-2401 User’s Guide...
Place the NSA behind a hardware-based firewall. Ideally the firewall should include deep packet inspection, IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL’s ZyWALL USG products for example). Configure strong user passwords and Access Control List (ACL) settings. See Chapter 8 on page 173 details.
Snapshots are good for data that changes often and needs to have high availability. If files within a volume become infected or corrupted, you can revert files back to their state at a snapshot. You create snapshots of a complete volume, not a single file or folder within a volume. NSA-2401 User’s Guide...
Page 197
A backup proceeds without the snapshot if there is not enough space for the snapshot, but if an open file changes during the backup, the backup fails. NSA-2401 User’s Guide...
This screen shows a list of all backup jobs created and scheduled. You can also edit or delete an existing backups or create a new one from here. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. NSA-2401 User’s Guide...
Select an archive backup job that has already run and click this icon to restore a previous backup from another NSA or external USB hard drive connected to the NSA. Another option is to use Protect > Restore (Section 9.2.4 on page 207) to restore by the backup files themselves. NSA-2401 User’s Guide...
9.2.2 Creating a Backup Job In the Protect > Backup screen, click the Add Job icon to create a new backup job. Figure 167 Protect > Backup > Add Job: Step 1 NSA-2401 User’s Guide...
Synchronization Select this to keep updating a single copy of the source files to the target. At the time of writing the target must be another NSA-2401. Publish makes a copy of the source files. Additional files in the target folder can remain.
Page 203
Select this to back up the files to another volume on the NSA. Select the folder where you want to store the backup files. It is recommended that the target be on a different disk array from the source volume to provide protection in the even that the source drive fails. NSA-2401 User’s Guide...
Bandwidth Restrict the bandwidth of synchronization backups to help stop them from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet. NSA-2401 User’s Guide...
Time Enter the time, day and/or month as appropriate for your selection above. previous Click this button to return to the preceding screen. done Click this button to save your changes. NSA-2401 User’s Guide...
Click this button to save your changes back to the NSA. 9.2.4 Restoring by Backup Job In the Protect > Backup screen, select a backup job and click the Restore Archive icon to replace existing files with files saved previously. NSA-2401 User’s Guide...
The times use yyyy-mm-dd hh:mm:ss format. Check, Last Backup Time Select to which backup you want to return. All later backups are deleted. next Click this button to proceed. NSA-2401 User’s Guide...
Select the folders you want to restore. previous Click this button to return to the preceding screen. next Click this button to proceed. 9.2.4.2 Restoring a Backup: Step 3 Figure 175 Protect > Backup > Restore Archive: Step 3 NSA-2401 User’s Guide...
Internal or External Select this to restore files from another volume on the NSA or a USB- Volume connected device. Specify the share name (you can browse for it). next Click this button to proceed. NSA-2401 User’s Guide...
Select to which backup job and backup time you want to return. The NSA restores the files included in the backup archive. Files not in the backup archive are not modified. previous Click this button to return to the preceding screen. next Click this button to proceed. NSA-2401 User’s Guide...
The following table describes the labels in this screen. Table 81 Protect > Restore: Step 3 LABEL DESCRIPTION Folder Chooser Select the folders you want to restore. previous Click this button to return to the preceding screen. next Click this button to proceed. NSA-2401 User’s Guide...
(space not used by volumes). If there is not enough disk space for the new snapshot, the NSA continues to delete older snapshots to make more space. It is possible that all previous snapshots will be lost. NSA-2401 User’s Guide...
Click Protect > Snapshot in the Navigation panel to display the following screen. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. Figure 180 Protect > Snapshot > Snapshot Jobs NSA-2401 User’s Guide...
Select a snapshot job(s) and click this icon to remove the job(s). Sort Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. NSA-2401 User’s Guide...
NSA’s file write performance. Table 112 on page 258 for the maximum number of snapshots allowed in the NSA. You can only create one snapshot job per volume. Figure 181 Protect > Snapshot > Add Job NSA-2401 User’s Guide...
Click Protect > Snapshot > Snapshot Images tab to open the following screen. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. Figure 182 Protect > Snapshot > Snapshot Images NSA-2401 User’s Guide...
You can also locate your license keys on the back of the envelope of the CD that came with your NSA. For more information about Genie Backup Manager please see Genie Backup Manager on page 196. NSA-2401 User’s Guide...
Your file transfers could be subject to snooping. FTPS (File Transfer Protocol over TLS) File Transfer Protocol over TLS (FTPS) is a file transfer service that uses TLS (Transport Layer Security) for secure transfers across the Internet. NSA-2401 User’s Guide...
NSA using FTP (File Transfer Protocol) or FTP over TLS. Your FTP client must be set to use FTP over TLS in order to use FTPS with the NSA. If your FTP client offers multiple types of FTP over TLS, use explicit encryption. NSA-2401 User’s Guide...
This setting applies to all FTP client connections to the NSA. It does not affect your Windows/CIFS connections (it will not correct the character display in Windows Explorer). Apply Click this to save your changes. Reset Click this to discard any changes and start again. NSA-2401 User’s Guide...
Click Applications > Print Server, select a printer from the list, and then click that printer’s Rename icon to open this screen. Use this screen to change the name that the NSA uses for the printer. Figure 187 Applications > Print Server > Rename NSA-2401 User’s Guide...
Click this to discard any changes and start again. 10.4.1 Changing the Copy Button Share Click Applications > Copy Button and then Edit to open the following screen. Use this screen to select the share the NSA uses with the copy button. NSA-2401 User’s Guide...
Apply Select a share, then click this to make it the default location where data is stored when you press the copy button. Reset Click this to discard any changes and start again. NSA-2401 User’s Guide...
On a typical network the syslog daemon can be configured to send system logs to a central online repository known as a syslog server. This allows the network administrators to quickly access and examine them without having to go to every machine on the network. NSA-2401 User’s Guide...
See Section 11.2.1 on page 230 for more information. Purge All Logs Click this icon to erase all logs from the NSA. Click Yes to remove all logs or No to cancel. NSA-2401 User’s Guide...
This class shows information on the operation of the NSA’s built-in services. System This class shows all other system related messages. Network This class shows information on network configuration, setting changes and so on. Storage This class shows information about the NSA’s internal and external storage activity. NSA-2401 User’s Guide...
Click Maintenance > Log > Log Config to open the Log Records Configuration screen, where you can customize the duration that logs are kept on the NSA. Figure 194 Maintenance > Log > Log Config > Log Records Configuration NSA-2401 User’s Guide...
Click this to discard changes and close the window. 11.2.4 Report Configuration Click Maintenance > Logs > Report Config to open the report configuration screens. 11.2.4.1 Mail Setting This screen lets you configure whether or not logs are e-mailed. NSA-2401 User’s Guide...
Apply Click this to save your changes. Cancel Click this to discard changes and close the window. 11.2.4.2 Report Setting This screen lets you configure which types of logs are e-mailed during alerts and reports. NSA-2401 User’s Guide...
Select the kind of log(s) to be sent out during mail reports. Reports are issued at set intervals. See Section 11.2.0.1 on page 229 for information on the different log classes. Apply Click this to save your changes. Cancel Click this to discard changes and close the window. NSA-2401 User’s Guide...
Click Maintenance > Log and then select a log from the list. To export it, click the Export Log icon. Your web browser prompts you to download the log file as a CSV (Comma Separated Value) file type, which is compatible with Microsoft Excel and other spreadsheet software. NSA-2401 User’s Guide...
To restore a previously saved configuration file, Browse to the file on your computer or LAN and then click the Restore button. If any users are connected at the time, you are presented with a warning screen. Figure 200 Maintenance > Configuration > Warning NSA-2401 User’s Guide...
Click this to save your changes. Cancel Click this to discard changes and close the window. If the NSA is free of all connections, then configuration file loads and the NSA restarts itself. Figure 201 Maintenance > Configuration > Restarting NSA-2401 User’s Guide...
Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that was issued by a known certificate authority. Figure 202 Maintenance > SSL NSA-2401 User’s Guide...
When you select the Edit a self-signed CA certificate option, then click the Edit button, a screen opens to allow you to make adjustments to the NSA’s public key certificate. The screen is also the same for the Create a certificate authorized by other CA option. NSA-2401 User’s Guide...
Click this to discard changes and close the window. 11.5 Firmware Upgrade Click Maintenance > FW Upgrade to open this screen, where you can upgrade the NSA firmware. Be sure to download the latest firmware files from the ZyXEL website. NSA-2401 User’s Guide...
NSA again. If you interrupt the upgrade, then the NSA may become unusable. Reset Click this to begin configuring this screen afresh. 11.6 Power Management Click Maintenance > Power Management to open this screen, where you can set the NSA’s power management settings. NSA-2401 User’s Guide...
UPS is charging. A setting close to 0 is also not recommended since the UPS would not have enough power to allow the NSA to shutdown properly. Apply Click this to save your changes in this section. NSA-2401 User’s Guide...
Click Maintenance > Power Management > Edit to open this screen, where you can configure power control schedules to have the NSA turn on, turn off, or reboot at specified times. Figure 206 Maintenance > Power Management > Edit NSA-2401 User’s Guide...
Click Maintenance > Shutdown to open the shutdown screen. Use this screen to turn off the NSA or restart it. Before shutting down or restarting, check the System Status screen to make sure that no one is logged into the NSA or transferring files to or from it. NSA-2401 User’s Guide...
Figure 208 Maintenance > Shutdown > Confirm Restart When you click the Shutdown button a pop-up screen appears asking you to confirm. Click Apply to continue or Cancel to abort the process. Figure 209 Maintenance > Shutdown > Confirm Shutdown NSA-2401 User’s Guide...
RAID 5). Go to the Storage > Internal Storage > Disk screen to identify the faulty disk. Replace the faulty disk with another of equal or greater capacity. See your Quick Start Guide for information on replacing a disk and also Disk Replacement Restrictions on page 128. NSA-2401 User’s Guide...
Page 248
If it is Resynching, the NSA is repairing the RAID array. If it is Degraded, select the array and click the Repair icon. If the status is Down, recreate the array, volumes, and sharing configuration. • If the problem continues, contact the NSA vendor. A LAN LED is off. NSA-2401 User’s Guide...
I forgot the password. • The default password is 1234. • You may have to reset the NSA password or configuration - see Section 2.7 on page 52 detailed information on the reset button. The NDU cannot discover my NSA. NSA-2401 User’s Guide...
Page 250
[Caps Lock] is not on. • Turn the NSA off and on. • If this does not work, you have to reset the device to its factory defaults. See Section 2.7 on page 52 for detailed information on the reset button. NSA-2401 User’s Guide...
If the domain controller uses a private IP address, the NSA needs to use a private DNS server. If the domain controller uses a public IP address, the NSA needs to use a public DNS server. • Leave the domain and re-join it. NSA-2401 User’s Guide...
Copying files from a USB device failed. The USB device may not be compatible with the NSA. Press the COPY button to set the COPY LED back to green. Try saving the files onto a computer and then from the computer to the NSA (through the network connection). NSA-2401 User’s Guide...
It’s a good idea to create a snapshot before backing up data, to be sure you’re backing up consistent data even if the backup is still running several hours later. NSA-2401 User’s Guide...
Page 256
Windows computer to an NSA. S.M.A.R.T. The NSA can use the S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) monitoring system to detect and report on hard drive reliability indicators to help anticipate hard drive failures. NSA-2401 User’s Guide...
Two auto-negotiating, auto MDI/MDI-X 10/100/1000 Mbps RJ-45 Ethernet ports (10 Base-T/100 Base-TX/1000 Base-T) USB v2.0 Storage Two ports on the front panel. Windows: NTFS (read only), FAT32 and FAT16 Linux: EXT2, EXT3 and XFS LEDs PWR, SYS, LAN1, LAN2, and COPY NSA-2401 User’s Guide...
Windows 2000 Professional/Server Windows XP Home/Professional Windows Me Linux Max no. of user accounts Maximum number of concurrent FTP sessions Maximum number of concurrent CIFS sessions Maximum number of snapshots in the NSA Maximum number of snapshots per volume NSA-2401 User’s Guide...
POWER SOURCE SYSTEM BOOT UP SYSTEM READ/WRITE IN POWER SAVING MODE) 240V/50Hz 77.8 (peak) 51.6 (peak) 24.2 120V/60Hz 76.5(peak) 52.9 (peak) 23.0 100V/60Hz 76.0 (peak) 53.1 (peak) 22.5 This is the external power adaptor pinout specification Figure 210 Power Adaptor Pinout. NSA-2401 User’s Guide...
Appendices and Index Log Messages (263) Setting Up Your Computer’s IP Address (273) Importing Certificates (297) Open Source Licences (321) Legal Information (351) Customer Support (353) Index (359)
Share Name CIFS - share NOTICE Add new disabled share {0} for Share Name Folder Volume unshared folder: {1} in volume: Name Name {2}. CIFS - share NOTICE Recycle-bin disabled. Remove Share Name recycle-bin folder in share: {0}. NSA-2401 User’s Guide...
Page 264
Clean system log complete INFO Change DB path to {0}/log OK Share Name INFO Reset DB to System Default OK Network NOTICE Network Config setting is changed Network NOTICE Network interface {0} link up Network interface name NSA-2401 User’s Guide...
Page 265
Purge Snapshot Image {0}: Snapshot SUCCESS Image Name Snapshot CRIT Purge Snapshot Image {0}: Snapshot FAILED Image Name Snapshot INFO Delete Snapshot Image {0}: Snapshot SUCCESS Image Name Snapshot CRIT Delete Snapshot Image {0}: Snapshot FAILED Image Name NSA-2401 User’s Guide...
Page 266
Success Storage - INFO Remove Hot-Spare disk{0} from Disk Slog ID RAID Raid: Success Storage - CRIT Create RAID (raid label={0}): RAID FAILED Storage - CRIT Relabel RAID: FAILED RAID Storage - CRIT Delete RAID: FAILED RAID NSA-2401 User’s Guide...
Page 267
Storage - INFO Duplicate USB Key: SUCCESS Volume Storage - INFO Rename Internal Volume to Volume Name Volume [{0}]: SUCCESS Storage - INFO Expand Volume (Increased Size Volume Size={0}MB): SUCCESS Storage - INFO Lock Internal Volume: Volume SUCCESS NSA-2401 User’s Guide...
Page 268
Create External Crypto Volume Volume Name Filesystem Volume [{0}] ({1}) using PASSWD: type FAILED Storage - CRIT Create External Crypto Volume Volume Name Filesystem Volume [{0}] using USB Key ({1}): type FAILED Storage - CRIT Delete Volume: FAILED Volume NSA-2401 User’s Guide...
Page 269
Storage - CRIT Eject External Disk ({0}): disk id Volume FAILED Storage - CRIT Detected Disk{0} I/O error. Volume System NOTICE Hostname is set to {0} System NOTICE System description is changed System EMERG Temperature is too high! NSA-2401 User’s Guide...
Page 270
Firmware upgrade fails, the file is invalid or corrupted! System - INFO NTP server is set to {0} NTP server Time System INFO NTP updates successfully from NTP server System - INFO Clock timezone is set to {0} TimeZone Time NSA-2401 User’s Guide...
Page 271
Request and private key on system. Please create a Certificate Request and enroll it. NOTICE The file {0} is not a valid File Name Certificate file. NOTICE Failed to import Certificate. NOTICE Unexpected error while importing Certificate file. NSA-2401 User’s Guide...
Page 272
Appendix A Log Messages NSA-2401 User’s Guide...
P P E N D I X Setting Up Your Computer’s IP Address Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported.
The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 211 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon. Figure 212 Windows XP: Control Panel NSA-2401 User’s Guide...
3 Right-click Local Area Connection and then select Properties. Figure 213 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Figure 214 Windows XP: Local Area Connection Properties NSA-2401 User’s Guide...
2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. NSA-2401 User’s Guide...
Figure 216 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 217 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon. Figure 218 Windows Vista: Network And Internet NSA-2401 User’s Guide...
Figure 219 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 220 Windows Vista: Network and Sharing Center During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NSA-2401 User’s Guide...
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 221 Windows Vista: Local Area Connection Properties NSA-2401 User’s Guide...
2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. NSA-2401 User’s Guide...
The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 223 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon. Figure 224 Mac OS X 10.4: System Preferences NSA-2401 User’s Guide...
Configure. Figure 225 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 226 Mac OS X 10.4: Network Preferences > TCP/IP Tab. NSA-2401 User’s Guide...
Click Apply Now and close the window. Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 228 Mac OS X 10.4: Network Utility NSA-2401 User’s Guide...
The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 229 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 230 Mac OS X 10.5: Systems Preferences NSA-2401 User’s Guide...
• From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NSA. NSA-2401 User’s Guide...
6 Click Apply and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 233 Mac OS X 10.5: Network Utility NSA-2401 User’s Guide...
2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. Figure 235 Ubuntu 8: Network Settings > Connections NSA-2401 User’s Guide...
3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 236 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties. Figure 237 Ubuntu 8: Network Settings > Connections NSA-2401 User’s Guide...
7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 239 Ubuntu 8: Network Settings > DNS 8 Click the Close button to apply the changes. NSA-2401 User’s Guide...
Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 240 Ubuntu 8: Network Tools NSA-2401 User’s Guide...
1 Click K Menu > Computer > Administrator Settings (YaST). Figure 241 openSUSE 10.3: K Menu > Computer Menu 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 242 openSUSE 10.3: K Menu > Computer Menu NSA-2401 User’s Guide...
Figure 243 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 244 openSUSE 10.3: Network Settings NSA-2401 User’s Guide...
6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 Click Next to save the changes and close the Network Card Setup window. NSA-2401 User’s Guide...
8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 246 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window. NSA-2401 User’s Guide...
Options sub-menu, select Show Connection Information. Figure 247 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 248 openSUSE: Connection Status - KNetwork Manager NSA-2401 User’s Guide...
Page 296
Appendix B Setting Up Your Computer’s IP Address NSA-2401 User’s Guide...
Many ZyXEL products, such as the NSA-2401, issue their own public key certificates. These can be used by web browsers on a LAN or WAN to verify that they are in fact connecting to the legitimate device and not one masquerading as it.
Figure 249 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended). Figure 250 Internet Explorer 7: Certification Error 3 In the Address Bar, click Certificate Error > View certificates. Figure 251 Internet Explorer 7: Certificate Error NSA-2401 User’s Guide...
Appendix C Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 252 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next. Figure 253 Internet Explorer 7: Certificate Import Wizard NSA-2401 User’s Guide...
Figure 255 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK. Figure 256 Internet Explorer 7: Select Certificate Store NSA-2401 User’s Guide...
9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 257 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 258 Internet Explorer 7: Security Warning NSA-2401 User’s Guide...
Figure 259 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click Tools > Internet Options. Figure 263 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates. Figure 264 Internet Explorer 7: Internet Options NSA-2401 User’s Guide...
5 In the Root Certificate Store dialog box, click Yes. Figure 267 Internet Explorer 7: Root Certificate Store 6 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA-2401 User’s Guide...
3 The certificate is stored and you can now connect securely to the Web Configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information. Figure 269 Firefox 2: Page Info NSA-2401 User’s Guide...
Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
Figure 273 Firefox 2: Select File 5 The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information. NSA-2401 User’s Guide...
This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click Tools > Options. Figure 274 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 275 Firefox 2: Options NSA-2401 User’s Guide...
4 In the Delete Web Site Certificates dialog box, click OK. Figure 277 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA-2401 User’s Guide...
Figure 278 Opera 9: Certificate signer not found 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. Figure 279 Opera 9: Security information NSA-2401 User’s Guide...
Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
Appendix C Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 282 Opera 9: Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open. Figure 283 Opera 9: Import certificate NSA-2401 User’s Guide...
6 Next, click OK. Figure 285 Opera 9: Install authority certificate 7 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. NSA-2401 User’s Guide...
This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click Tools > Preferences. Figure 286 Opera 9: Tools Menu 2 In Preferences, Advanced > Security > Manage certificates. Figure 287 Opera 9: Preferences NSA-2401 User’s Guide...
4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button. NSA-2401 User’s Guide...
3 Click Forever when prompted to accept the certificate. Figure 290 Konqueror 3.5: Server Authentication 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 291 Konqueror 3.5: KDE SSL Information NSA-2401 User’s Guide...
Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button. NSA-2401 User’s Guide...
Page 320
Appendix C Importing Certificates NSA-2401 User’s Guide...
No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes software developed by the Apache Software Foundation under Apache License.
Page 322
Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file NSA-2401 User’s Guide...
Page 323
Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS Version 1.1 Copyright (c) 1999-2003 The Apache Software Foundation. All rights reserved. NSA-2401 User’s Guide...
Page 324
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1. Preamble NSA-2401 User’s Guide...
Page 325
The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. NSA-2401 User’s Guide...
Page 326
Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. NSA-2401 User’s Guide...
Page 327
If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not NSA-2401 User’s Guide...
Page 328
Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the NSA-2401 User’s Guide...
Page 329
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to NSA-2401 User’s Guide...
Page 330
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES. NSA-2401 User’s Guide...
To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION NSA-2401 User’s Guide...
Page 332
Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. NSA-2401 User’s Guide...
Page 333
License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies NSA-2401 User’s Guide...
Page 334
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR NSA-2401 User’s Guide...
Page 335
OpenLDAP is a registered trademark of the OpenLDAP Foundation. Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to copy and distribute verbatim copies of this document is granted This Product includes open SSL under the Open SSL License NSA-2401 User’s Guide...
Page 336
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ================== This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). NSA-2401 User’s Guide...
Page 337
POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] NSA-2401 User’s Guide...
Page 338
4. Products derived from this software may not be called “PHP”, nor may “PHP” appear in their name, without prior written permission from group@php.net. You may indicate that your software works in conjunction with PHP by saying “Foo for PHP” instead of calling it “PHP Foo” or “phpfoo” NSA-2401 User’s Guide...
Page 339
Mozilla Public License Version 1.1 1. Definitions. 1.0.1. “Commercial Use” means distribution or otherwise making the Covered Code available to a third party. 1.1. “Contributor” means each entity that creates or contributes to the creation of Modifications. NSA-2401 User’s Guide...
Page 340
(b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. 2. Source Code License. 2.1. The Initial Developer Grant. NSA-2401 User’s Guide...
Page 341
Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5. 3.2. Availability of Source Code. NSA-2401 User’s Guide...
Page 342
Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any NSA-2401 User’s Guide...
Page 343
6. Versions of the License. 6.1. New Versions Netscape Communications Corporation (“Netscape”) may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions NSA-2401 User’s Guide...
Page 344
Participant to You under Sections 2.1 and/or 2.2 automatically terminate at the expiration of the 60 day notice period specified above. NSA-2401 User’s Guide...
Page 345
International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. 12. Responsibility for claims NSA-2401 User’s Guide...
Page 346
Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: NSA-2401 User’s Guide...
Page 347
License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
Page 348
DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR...
Page 349
This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement.
Page 350
Appendix D Open Source Licences NSA-2401 User’s Guide...
Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
Page 352
Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. Regional offices are listed below (see also http:// www.zyxel.com/web/contact_us.php).
Page 354
• Regular Mail: ZyXEL Communications Oy, Malminkaari 10, 00700 Helsinki, Finland France • E-mail: info@zyxel.fr • Telephone: +33-4-72-52-97-97 • Fax: +33-4-72-52-19-20 • Web: www.zyxel.fr • Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest, France NSA-2401 User’s Guide...
Page 355
• Sales E-mail: sales@zyxel.in • Telephone: +91-11-30888144 to +91-11-30888153 • Fax: +91-11-30888149, +91-11-26810715 • Web: http://www.zyxel.in • Regular Mail: India - ZyXEL Technology India Pvt Ltd., II-Floor, F2/9 Okhla Phase -1, New Delhi 110020, India Japan • Support E-mail: support@zyxel.co.jp •...
Page 356
• Sales E-mail: sales@zyxel.com.my • Telephone: +603-8076-9933 • Fax: +603-8076-9833 • Web: http://www.zyxel.com.my • Regular Mail: ZyXEL Malaysia Sdn Bhd., 1-02 & 1-03, Jalan Kenari 17F, Bandar Puchong Jaya, 47100 Puchong, Selangor Darul Ehsan, Malaysia North America • Support E-mail: support@zyxel.com •...
Page 357
• Support E-mail: support@zyxel.com.sg • Sales E-mail: sales@zyxel.com.sg • Telephone: +65-6899-6678 • Fax: +65-6899-8887 • Web: http://www.zyxel.com.sg • Regular Mail: ZyXEL Singapore Pte Ltd., No. 2 International Business Park, The Strategy #03-28, Singapore 609930 Spain • Support E-mail: support@zyxel.es • Sales E-mail: sales@zyxel.es •...
Page 360
LEDs unlock quota volume recommendations external volume replacement restrictions create S.M.A.R.T. attributes EXT2 see also hard drive EXT3 disk quota FAT16 conflict users FAT32 NSA-2401 User’s Guide...
Page 361
HyperText Transfer Protocol over Secure Socket copying Layer, see HTTPS deleting moving forgot password front panel LEDs 81, 221, 222 anonymous access character set icons connection limit about idle timeout administration common over TLS global 38, 48 NSA-2401 User’s Guide...
Page 362
Mozilla Public License Linux My NSA local changing share properties screen group management overview screens user screens 37, 38 locate tutorial lock 141, 148 My Own Shares external volume locked volumes buzzer priority classes 229, 235 NSA-2401 User’s Guide...