Protect Screens; Chapter 9 Protect Screens; Protection Methods Overview; Table 67 Protection Methods Overview - ZyXEL Communications NSA-2401 User Manual

Network storage appliance
Hide thumbs Also See for NSA-2401:
Table of Contents

Advertisement

C
H A P T E R

9.1 Protection Methods Overview

This chapter introduces different ways of protecting data on the NSA and explains how to use
the Protect screens to create and schedule snapshots and backups.
There are a variety of ways to protect your data on the NSA. Below is a summary table of
preventative steps you should do in advance to protect against various problems.

Table 67 Protection Methods Overview

PROBLEM
Unexpected NSA behavior after
configuration changes
(On Your Computer)
Corrupt data files
Data infected by virus
Data files incorrectly deleted or modified
(On the NSA)
Corrupt data files
Data infected by virus
Data files incorrectly deleted or modified
(On the NSA)
Hard drive malfunction.
NSA malfunction
Network down
Natural disaster such as a fire or earthquake
occurs where your NSA is located
Hacking
Theft of files by removing the physical hard
drives.
NSA-2401 User's Guide

Protect Screens

RECOMMENDED PREVENTATIVE ACTION
Back up the NSA configuration file before you make
major configuration changes.
Use the Genie Backup Manager.
Use anti-virus software on your computer.
Create regular snapshots (recommended for volumes
with data that changes often).
Use anti-virus software on your computer to scan files
from others before saving them on the NSA.
You can also use anti-virus software on your computer
to scan the NSA for viruses.
Use RAID.
Back up data to another NSA or computer or an external
USB hard drive.
Place the NSA behind a hardware-based firewall. Ideally
the firewall should include deep packet inspection, IDP
(Intrusion Detection and Prevention), and anti-virus (like
ZyXEL's ZyWALL USG products for example).
Configure strong user passwords and Access Control
List (ACL) settings. See
Chapter 8 on page 173
details.
Use HTTPS for Web Configurator access to the NSA
(see
Section 11.4 on page
237).
Store sensitive data in encrypted NSA volumes (see
page
Encrypted Volumes on page
9
for
126).
195

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents