Nsa Backup Screens; Backup Summary - ZyXEL Communications NSA-2401 User Manual

Network storage appliance
Hide thumbs Also See for NSA-2401:
Table of Contents

Advertisement

Chapter 9 Protect Screens
Finding Out More
See
Chapter 6 on page 125
See
Section 3.7 on page 89

9.2 NSA Backup Screens

Use the Protect > Backup menus to create data backups to another volume, an external USB
disk drive, or a computer or another NSA over the network.
The NSA deletes old backups according to the backup job's purge policy (see
page
200) before creating a new backup. If you have a backup scheduled to begin at midnight,
then at that time, the NSA deletes files according to the purge policy setting before doing the
back up. If space on the backup NSA is a concern, then configure the NSA to delete old
backups.
After purging old backups, the NSA does not check if enough space is available before backup
commences. The NSA starts transferring files and if not enough space is available, it issues a
log or alert to tell you that the backup failed (due to lack of space) and deletes any files already
transferred.
A full backup copies all files from your NSA to the backup device. It may take some time
depending on how many files you have to back up.
See also this related information:
Snapshots Versus Backups on page 197
Section 6.9.8 on page 156
Section 9.1 on page 195
To best protect data, back up data to another NSA or computer or an external
hard drive, and store in an off site location.

9.2.1 Backup Summary

Click the Backup link in the Navigation panel to access the Protect > Backup summary
screen. This screen shows a list of all backup jobs created and scheduled. You can also edit or
delete an existing backups or create a new one from here. Click a column's heading cell to sort
the table entries by that column's criteria. Click the heading cell again to reverse the sort order.
198
for more information on RAID.
for backup and snapshot tutorials.
for a comparison of backups and snapshots.
for a comparison of backups and RAID.
for an overview of protection methods available on the NSA.
Section 9.2.2 on
NSA-2401 User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents