NSA-2401 Network Storage Appliance User’s Guide Version 1.10 3/2009 Edition 1 DEFAULT LOGIN LAN1 IP Address 192.168.1.3 LAN2 IP Address 192.168.100.3 Username admin Password 1234 www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the Web Configurator. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access. • Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary information.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. 1 " Warnings tell you about things that could harm you or your device. Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NSA may be referred to as the “NSA”, the “device” or the “system” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device.
Safety Warnings Safety Warnings 1 For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device.
Safety Warnings Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.
Safety Warnings 8 NSA-2401 User’s Guide
Contents Overview Contents Overview Introduction and Tutorials ..................................................................................................... 29 Getting to Know Your NSA ........................................................................................................ 31 Introducing the Web Configurator .............................................................................................. 35 Tutorials .....................................................................
Contents Overview 10 NSA-2401 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 4 Safety Warnings........................................................................................................................ 6 Contents Overview .......................................................
Table of Contents 2.6 Administration Screens ........................................................................................................ 47 2.6.1 Global Administration Icons ....................................................................................... 48 2.6.2 Navigation Panel ........................................................................................................ 49 2.6.3 Main Window ....................................................................................
Table of Contents Chapter 4 Status Screen ....................................................................................................................... 117 4.1 Status Screen .....................................................................................................................117 Chapter 5 System Setting Screen ......................................................................................................... 121 5.1 Date/Time .................................................
Table of Contents 7.1.1 What You Can Do in the Network Screens .............................................................. 159 7.1.2 What You Need to Know About the Network Screens ............................................. 159 7.2 TCP/IP Screen ................................................................................................................... 160 7.2.1 Configuring the TCP/IP Screen ................................................................................ 162 7.3 Windows/CIFS .
Table of Contents 9.5 Backup Software Screen ................................................................................................... 220 Chapter 10 Application Screens ............................................................................................................. 223 10.1 Overview .......................................................................................................................... 223 10.1.1 What You Can Do In The Application Screens .........................
Table of Contents 12.6 External USB Disks ......................................................................................................... 255 Chapter 13 Product Specifications ......................................................................................................... 257 13.1 Feature Tables ................................................................................................................. 257 13.2 Specification Tables ..................................................
List of Figures List of Figures Figure 1 NSA Overview .......................................................................................................................... 31 Figure 2 NSA Front Panel LEDs ............................................................................................................. 32 Figure 3 NDU Main Screen .................................................................................................................... 36 Figure 4 NDA URL ..........................
List of Figures Figure 39 Displaying the NSA ................................................................................................................ 67 Figure 40 Alternate Method for Displaying the NSA ............................................................................... 67 Figure 41 Connecting to the NSA ........................................................................................................... 68 Figure 42 Maintenance > SSL ..............................................
List of Figures Figure 82 Protect > Backup > Add Job: Step 2 ..................................................................................... 94 Figure 83 Protect > Backup > Add Job: Step 3 ..................................................................................... 95 Figure 84 Protect > Backup > Add Job: Step 3 ..................................................................................... 95 Figure 85 Protect > Backup > Add Job: Step 4 ................................................
List of Figures Figure 125 Storage > Internal Storage > Disk ..................................................................................... 128 Figure 126 Storage > Internal Storage > Disk > S.M.A.R.T. (Brief Summary) ..................................... 130 Figure 127 Storage > Internal Storage > Disk > S.M.A.R.T. (Full Summary) ...................................... 131 Figure 128 Storage > Internal Storage > RAID ...................................................................................
List of Figures Figure 168 Protect > Backup > Add: Step 2 ........................................................................................ 204 Figure 169 Protect > Backup > Add Job: Step 3 ................................................................................. 206 Figure 170 Protect > Backup > Add Job: Step 4 .................................................................................. 207 Figure 171 Protect > Backup > Edit Job: Step 1 ................................................
List of Figures Figure 211 Windows XP: Start Menu .................................................................................................... 276 Figure 212 Windows XP: Control Panel ............................................................................................... 276 Figure 213 Windows XP: Control Panel > Network Connections > Properties .................................... 277 Figure 214 Windows XP: Local Area Connection Properties ..................................................
List of Figures Figure 254 Internet Explorer 7: Certificate Import Wizard .................................................................... 302 Figure 255 Internet Explorer 7: Certificate Import Wizard .................................................................... 302 Figure 256 Internet Explorer 7: Select Certificate Store ....................................................................... 302 Figure 257 Internet Explorer 7: Certificate Import Wizard ..........................................
List of Figures 24 NSA-2401 User’s Guide
List of Tables List of Tables Table 1 Disk Drive LEDs ........................................................................................................................ 32 Table 2 NSA LEDs ................................................................................................................................. 32 Table 3 User-level Global Labels and Icons .......................................................................................... 38 Table 4 My NSA Screen ........................
List of Tables Table 39 RAID 1 .................................................................................................................................. 153 Table 40 RAID 10 ................................................................................................................................ 154 Table 41 RAID 5 .................................................................................................................................. 155 Table 42 S.M.A.R.T. Attributes .............
List of Tables Table 82 Protect > Restore: Step 4 ..................................................................................................... 215 Table 83 Protect > Snapshot > Snapshot Jobs Icons ......................................................................... 217 Table 84 Protect > Snapshot > Snapshot Jobs ................................................................................... 218 Table 85 Protect > Snapshot > Add Job .........................................................
List of Tables 28 NSA-2401 User’s Guide
P ART I Introduction and Tutorials Getting to Know Your NSA (31) Introducing the Web Configurator (35) 29
CHAPTER 1 Getting to Know Your NSA 1.1 NSA-2401 Overview The NSA (Network Storage Appliance) allows secure storage and management of data on your network. Windows, Apple, or Linux users can access data on it as if it was on their own computers. The NSA’s two Gigabit Ethernet ports can connect to two different LANs. Users on either LAN (or connected through the Internet) can back up and share data on the NSA. Two USB ports let you share USB printers and use external USB hard drives for extra storage space.
Chapter 1 Getting to Know Your NSA 1.1.1 Front Panel LEDs The front panel LEDs tell you important information about the NSA. Figure 2 NSA Front Panel LEDs Disk Drive LEDs LEDs The following table describes the disk drive LEDs. Refer to the Quick Start Guide to see how to install and remove hard drives from the disk trays. Table 1 Disk Drive LEDs LED COLOR STATUS DESCRIPTION PWR Green Off The hard disk drive tray is empty or not connected properly.
Chapter 1 Getting to Know Your NSA Table 2 NSA LEDs (continued) LED COLOR STATUS DESCRIPTION SYS Red On The NSA has passed system tests. Blinking The NSA is starting up or shutting down. Quick blinking indicates a RAID array is in degraded mode. On The NSA is unlocking an encrypted volume or there are no volumes in the NSA. Blinking Firmware is being uploaded to the NSA. Orange LAN1/LAN2 Green On The NSA has fully booted and is operating normally. Green Off The LAN is not connected.
Chapter 1 Getting to Know Your NSA 34 NSA-2401 User’s Guide
CHAPTER 2 Introducing the Web Configurator This chapter describes how to access the NSA Web Configurator and provides an overview of its screens. 2.1 Web Configurator Overview The Web Configurator is an HTML-based management interface that allows easy NSA setup and management via Internet browser. Use Internet Explorer 6.0, Mozilla firefox 1.0, Netscape Navigator 7.0 or later versions of these browsers. The recommended screen resolution is 1024 by 768 pixels or higher.
Chapter 2 Introducing the Web Configurator Figure 3 NDU Main Screen From the NDU main page click the icon under Admin to see the Web Configurator screen login screen. 2.2.2 Web Browser Access Open your browser and type in the IP address of the NSA. If the NSA does not get IP addresses from a DHCP server, the default LAN1 IP address is 192.168.1.3 and the default LAN2 IP address is 192.168.100.3. Figure 4 NDA URL 2.3 Login The default user name and password are ‘admin’ and ‘1234’ respectively.
Chapter 2 Introducing the Web Configurator Figure 5 NSA Login Screen You should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Skip. Figure 6 Change Password Screen " The Web Configurator session automatically times out after 15 minutes. Simply log back into the NSA if this happens to you. 2.
Chapter 2 Introducing the Web Configurator Figure 7 My NSA The icons and language label at the top-right of the screen are visible from most screens. Use the tabs at the top of the screen to navigate between the user-level screens and menus. The following table describes the ‘global’ icons and tabs in the user-level screens. Table 3 User-level Global Labels and Icons LABEL/ICON DESCRIPTION Language Select the Web Configurator language from the drop-down list box.
Chapter 2 Introducing the Web Configurator The main My NSA screen displays the shares to which you have access. Figure 8 My NSA Screen The following table describes this screen. Table 4 My NSA Screen LABEL DESCRIPTION My Own Shares These are the shares that you own (and manage). The share icons are folder shaped. Click a share icon to access the share’s contents. System Share This icon displays for a system share created by the NSA. User-created Share This icon displays for a user-created share.
Chapter 2 Introducing the Web Configurator 2.5.1 My NSA Share Browsing Screen Click My NSA and then click a share to open the following screen. Use the My NSA share browsing screens to see and access share contents. • • • • • Click a folder’s name to go into the folder. Click a file’s name to be able to save the file to your computer. Click the play icon to play the file. At the time of writing this is only for MP3 files. Click to the right of a file or folder name to select it.
Chapter 2 Introducing the Web Configurator Table 5 My NSA Share Browsing Icons (continued) ICON DESCRIPTION Delete Select a folder(s) or file(s) and click this icon to remove the folder(s) or file(s). Move The administrator can select a folder or file and click this button to move it to another location within this share or another share that you can access.
Chapter 2 Introducing the Web Configurator 2.5.2 My NSA Share Browsing Move to or Copy to Screen The administrator can select a folder or file in the My NSA share browsing screens and click the Move to button or the Copy to button to display a share browsing screen like the following. Use the share browsing screen to select the target path for moving or copying the folder or file. Figure 10 My NSA Share Browsing > Move to (or Copy to) The following table describes the labels in this screen.
Chapter 2 Introducing the Web Configurator The following table describes the icons in this screen. Table 8 My NSA Share Configuration Icons ICON DESCRIPTION Share This is the share icon followed by the name of the share. User This is the icon for the owner of the share. Share Browsing Click this icon or link to see and access the share’s contents. Edit Share Click this icon or link to configure the share’s management details. Delete Share Click this icon or link to remove the share and its contents.
Chapter 2 Introducing the Web Configurator Table 10 My NSA Change Share Properties (continued) LABEL DESCRIPTION Make this share owned by Select an owner for the share. Enable this share Select this to activate the share. Enable action log Select this to keep a log of all actions performed on the share. Enable recycle-bin Select this to create a recycle bin on the share. Whenever a user with sufficient permissions deletes a file or folder, it is stored here until it is deleted permanently.
Chapter 2 Introducing the Web Configurator Figure 13 My NSA Change Share Properties > Share Access Configuration The following table describes the labels in this screen. Table 11 My NSA Change Share Properties > Share Access Configuration LABEL DESCRIPTION Available Users/Groups This displays a list of users and groups that have not yet been assigned an authority level for the share. You can assign users and groups by selecting them and clicking the right arrow.
Chapter 2 Introducing the Web Configurator • . [periods] • - [dashes] Other limitations include: • • • • • • • • All leading and trailing spaces are removed automatically. Multiple spaces within names are converted to a single space. Share names must be unique (they cannot be the same as other share names). The NSA creates automatic volume names for external (USB) disk volumes. These are a type of share, so the share name you configure cannot conflict with the external (USB) disk volume names.
Chapter 2 Introducing the Web Configurator The following table describes the labels in this screen. Table 12 Password LABEL DESCRIPTION Account Name Type the user name of the account for which you want to change the password. Old Password Type the user’s current password. New Password Create a new password for the user. You can type from one to 14 singlebyte (no Chinese characters allowed for example) ASCII characters.
Chapter 2 Introducing the Web Configurator Figure 15 Status 1 2 3 4 2.6.1 Global Administration Icons The icons and language label at the top-right of the screen ( 1 ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels. Table 13 Global Labels and Icons LABEL/ICON DESCRIPTION Language Select the Web Configurator language from the drop-down list box.
Chapter 2 Introducing the Web Configurator Table 13 Global Labels and Icons LABEL/ICON DESCRIPTION Home Click this icon to return to the user-level (My NSA) screens. Logout Click this icon at any time to exit the Web Configurator. This is the same as clicking the Logout link at the bottom of the Navigation panel. 2.6.2 Navigation Panel The navigation panel on the left of the Web Configurator screens ( 2 ) contains screen links. Click a minus (-) link to hide a category’s screen links.
Chapter 2 Introducing the Web Configurator The following table describes the navigation panel links. Table 14 Screens Summary CATEGORY SUB-LINK Status FUNCTION This screen shows system information, the status of the volumes, and the users who are currently using the NSA. System Setting Date/Time Choose a time zone and/or allow the NSA to synchronize with a time server. Storage Internal Storage View and configure the NSA’s installed disks, RAIDs, and volumes.
Chapter 2 Introducing the Web Configurator 2.6.3 Main Window The Web Configurator’s main window ( 3 ) shows the screen you select in the navigation panel. It is discussed in the rest of this document. The Status screen is the first administration screen to display. See Chapter 4 on page 117 for more information about the Status screen. 2.6.4 Status Messages The message text box at the bottom of the screen ( 4 ) displays status messages as you configure the NSA. 2.6.
Chapter 2 Introducing the Web Configurator Table 15 Common Configuration Screen Icons (continued) ICON DESCRIPTION User This is a user icon. See the chapter on the sharing screens for details on variants of this icon. Share This is a share icon. See the chapter on shares for details on variants of this icon. 2.7 NSA RESET Button Use the RESET button on the front panel of the NSA to reset either just the NSA’s admin password and IP address settings or the whole factory default configuration file.
Chapter 2 Introducing the Web Configurator Figure 17 Reset and Reload Timeline Beep 0 Press button " 2 Release to reset Beep Beep 10 Seconds Release to reload and restart The NSA automatically restarts to complete reloading the factory default configuration file.
Chapter 2 Introducing the Web Configurator 54 NSA-2401 User’s Guide
CHAPTER 3 Tutorials 3.1 Overview These tutorials show you how to perform the following common tasks: • • • • • • • How to Configure Sharing: page 55 How to Use Shares: page 61 How to Find the NSA in OS X: page 65 How to Configure Security: page 68 Power Resume: page 89 How to Use Backups and Snapshots: page 89 How to Increase the NSA’s Storage Capacity: page 106 3.2 How to Configure Sharing This section covers how to create user accounts, groups, and shares.
Chapter 3 Tutorials 1 Log into the Web Configurator using your administrator Username and Password. Figure 18 Administrator Login 2 In the My NSA screen, click Administration.
Chapter 3 Tutorials 3 Once the Web Configurator workspace appears, click Sharing > Users to open the user account management area. Figure 20 Sharing > Users 4 Click Add Account to open the Create a New Account screen.
Chapter 3 Tutorials • Enter an account name and password. • Set how many megabytes of storage the account can use in each of the NSA’s volumes. You can set a different quota for each volume. A value of “0” MB means unlimited storage. • Enter the user’s e-mail address and any details or identifying information specific to the user account. • Select the groups to which you want to assign this account. • Click Apply. 5 Repeat these steps for the other user accounts you need. 3.2.
Chapter 3 Tutorials 2 Specify a name for the group. Select Gonzo and click Add Selected User(s) to include Gonzo in the group. Click Apply. Figure 23 Sharing > Groups > Add Share 3.2.3 Setting Up Shares You’ve created accounts for Gonzo and Kermit and now you want to create a share for each of them. You also have a senior management group. You want to allow the users in the senior management group to access both shares while Kermit can access his own share. 1 Click Sharing > Shares > Add Share.
Chapter 3 Tutorials 2 Specify a name for the share and select the volume it should be on. Select Kermit as the owner and set the Share Access to Advanced and click Edit. Figure 25 Sharing > Shares > Add Share 3 Include Senior-Management under Full and click Apply. This way both Kermit and the senior managers have full access to the share.
Chapter 3 Tutorials 4 Back in the Edit Shares screen, click Apply. Figure 27 Sharing > Shares > Add Share Now that you have created Kermit’s share, you can go through the steps again to create another share for Gonzo. For Gonzo’s share, set the Share Access to Keep it private to owner. 3.3 How to Use Shares Here is how people use the shares you have created. In this example Gonzo creates a folder named “Strategy” and puts files named 2009-Plan.doc and 2010-2014-Plans.doc into it. 3.3.
Chapter 3 Tutorials 3 Enter Gonzo’s username and password and click OK. Figure 29 Entering the Share Username and Password 4 Now Gonzo can use the share like a drive on his computer. Click File > New > Folder and create a folder named “Strategy”. Figure 30 Creating a Folder 5 Copy and paste the 2009-Plan.doc file into the Strategy folder. Figure 31 Using the Folder 3.3.2 Using a Share with a Web Browser Now Gonzo wants to use his web browser to add the 2010-2014-Plans.doc file to his Strategy folder.
Chapter 3 Tutorials 1 Open Firefox and enter http://192.168.1.35 to open the login screen. Enter Gonzo’s username and password and clicks Login. Figure 32 User Login 2 Click the Gonzo share.
Chapter 3 Tutorials 3 Open the Strategy share.
Chapter 3 Tutorials 4 Click Upload. Figure 35 Strategy Folder Screen 5 Browse to the 2010-2014-Plans.doc file and click Apply. Figure 36 Upload Files Screen 3.4 How to Find the NSA in OS X Here’s how to find the NSA-2401 OS X. This example uses Mac OS X 10.5 (Leopard).
Chapter 3 Tutorials 1 Click the Finder icon in the dock. Figure 37 Opening the Finder 2 Select All under Shared in the sidebar. An entry for the NSA appears in the Network list.
Chapter 3 Tutorials 3 Click the triangle beside the NSA’s name to display the shares that Gonzo can use. Figure 39 Displaying the NSA Alternatively, you can also connect directly to the NSA from the Go Menu in the Finder. Simply click Go > Connect to Server.
Chapter 3 Tutorials 4 When the Connect to Server dialog box opens, type smb:// and the IP address of your NSA-2401 or click Browse to find it in your network. Click Connect. Figure 41 Connecting to the NSA 5 Once connected, you can now access the NSA from the finder or directly from the desktop. 3.5 How to Configure Security Use these tutorials to help you secure your NSA. See also Chapter 6 on page 125 for details on encrypting volumes. 3.5.
Chapter 3 Tutorials 3.5.1.1 Customizing the NSA’s Certificate 1 Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit. Figure 42 Maintenance > SSL 2 Next, let’s modify the certificate by changing the Common Name to this NSA’s IP address of 192.168.1.35, the Organization to “Test” and the Key Length to 2048.
Chapter 3 Tutorials 3 The NSA restarts its network services and returns you to the login screen.
Chapter 3 Tutorials 3.5.1.2 Downloading and Installing the NSA’s Customized Certificate 1 Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. Figure 45 Maintenance > SSL 2 Save the file to your computer.
Chapter 3 Tutorials 3 Find the certificate file on your computer and double-click it. Figure 47 Downloading the NSA’s Certificate 4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix C on page 299 for other examples. In the Certificate dialog box, click Install Certificate.
Chapter 3 Tutorials 5 In the Certificate Import Wizard, click Next. Figure 49 Certificate Import Wizard: Welcome 6 Leave Automatically select certificate store based on the type of certificate selected and click Next.
Chapter 3 Tutorials 7 In the Completing the Certificate Import Wizard screen, click Finish. Figure 51 Certificate Import Wizard: Finish 8 If you are presented with another Security Warning, click Yes. Figure 52 Security Warning 9 Finally, click OK when presented with the successful certificate installation message.
Chapter 3 Tutorials 3.5.1.3 Turn on the NSA’s Web Security Now that you have customized the NSA’s certificate and installed it in your computer, you can turn on security for your Web Configurator sessions. This example uses Firefox 3.0. See Appendix C on page 299 for more information on browsers and certificates. 1 Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply.
Chapter 3 Tutorials 2 A warning screen pops up if applying your change may disconnect some users. Click Apply to continue. Figure 55 Maintenance > SSL > Force HTTPS Warning 3 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning.
Chapter 3 Tutorials 4 Click Add Exception. Figure 57 Firefox: Secure Connection Failed 5 Click Get Certificate.
Chapter 3 Tutorials 6 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View.
Chapter 3 Tutorials 7 The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close.
Chapter 3 Tutorials 8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel.
Chapter 3 Tutorials 9 The login screen displays. Figure 62 HTTPS Login Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s certificate so they can check it before adding a security exception (as in steps 6 to 7 on pages 78 to 79). See the next section for how to use FTPES with the NSA for secure FTP transfers. 3.5.
Chapter 3 Tutorials 1 Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA’s address. • Set the Servertype to FTPES - FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect.
Chapter 3 Tutorials 2 A security warning screen displays. The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). If they match, click OK. Figure 64 FileZilla Unknown Certificate Warning The shares and folders to which Gonzo has access display. Now you can use FTP to securely transfer files to or from the NSA.
Chapter 3 Tutorials 2 Set the Share Access to Advanced and click Edit. Figure 66 Sharing > Shares > Edit Share 3 Move Senior-Management and Kermit to Read Only. Click Apply in this screen and again in the edit screen.
Chapter 3 Tutorials 3.5.3.2 Setting the ACL to Deny Access to a File Now you need to stop Kermit from accessing the 2010-2014-Plans file. 1 Select the Gonzo share, and click ACL Properties. Figure 68 Sharing > Shares 2 Click New ACL.
Chapter 3 Tutorials 3 Open the Strategy folder. Figure 70 Sharing > Shares > ACL Configuration > New ACL 4 Select the 2010-2014-Plans.doc file and click Set ACL.
Chapter 3 Tutorials 5 Move Gonzo to Deny.
Chapter 3 Tutorials 6 A Restricted File icon appears beside the 2010-2014-Plans.doc file. Click Close. Figure 73 Sharing > Shares > ACL Configuration > New ACL > Strategy 7 This screen lists the Strategy share’s ACLs. Click Close. Figure 74 Sharing > Shares > ACL Configuration > New ACL > Strategy You are done configuring the 2010-2014-Plans.doc file’s ACL settings. Only Gonzo can edit or delete the files in the Strategy folder.
Chapter 3 Tutorials 3.6 Power Resume To keep the NSA operating as much of the time as possible, do the following to have the NSA automatically restart when the power comes back on after a power failure. Click Maintenance > Power Management. Select Always Power On and click Apply. Figure 75 Maintenance > Power Management 3.7 How to Use Backups and Snapshots Use the NSA’s backup and snapshot features to backup your files and folders.
Chapter 3 Tutorials 3.7.1 Creating a Snapshot Job Here’s an example of configuring hourly snapshots for a volume. 1 Click Protect > Snapshot > Add Job.
Chapter 3 Tutorials 2 Enter a name for the job, select the volume of which to take snapshots, set the number of snapshot images to keep (2 in this example). For the frequency, set it to occur every hour. Click Apply. " It’s strongly recommended to set the maximum amount of snapshots setting as low as possible as a high amount of snapshots can significantly reduce the volume’s file write performance. Figure 77 Protect > Snapshot > Add Job 3.7.
Chapter 3 Tutorials For example, Gonzo accidently overwrote his 2009-Plan.doc file. Use Windows Explorer to browse to the Gonzo share. (The Quick Start Guide covers how to map a share to a Windows network drive). Figure 79 Using a Snapshot Image • There is a snap-share folder with a folder for each snap-shot of volume contents to which Gonzo has access.
Chapter 3 Tutorials 2 Name the backup job and select Synchronization. Gonzo wants only his current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder.
Chapter 3 Tutorials 3 Select the folder that needs to be mirrored (the Gonzo share’s Strategic-Partners folder in this example) and Remote. • Enter the other NSA’s address and administrator password. • Click Show target content to display the remote NSA’s contents. • Select the destination on the remote NSA (Backups in this example). • Click Next.
Chapter 3 Tutorials 4 Click OK in the warning dialog box. Figure 83 Protect > Backup > Add Job: Step 3 5 For this example, assume the connection to the German branch office is a good one and not many files need to be backed up so leave the compression off. • Turn on the encryption to protect these sensitive files during the transfer. The final files stored on the remote NSA will be unencrypted (usable).
Chapter 3 Tutorials 6 Schedule the backup to occur every morning at 3:00 and click Done. Figure 85 Protect > Backup > Add Job: Step 4 You do not need to use a special restore process to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share. 3.7.5 Creating an Archive Backup To backup the NSA every week to a remote NSA: 1 Click Protect > Backup > Add Job.
Chapter 3 Tutorials 2 Identify the backup job and select Archive. New files are often added to the shares that you need to back up and existing files are not frequently changed so select Incremental. The NSA does a full backup first and later only copies source files that are new and/or modified since the last backup. This example sets the NSA to do another full backup after every four incremental backups.
Chapter 3 Tutorials 3 Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection.
Chapter 3 Tutorials 4 In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the target NSA so you can leave the encryption off, too. Have the NSA keep 3 backups. Figure 89 Protect > Backup > Add Job: Step 3 5 Set the frequency to Weekly. Schedule the backup for 5:00 every Saturday morning. Figure 90 Protect > Backup > Add Job: Step 4 3.7.
Chapter 3 Tutorials 1 Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 91 Protect > Backup 2 Select which backup to use and click Next.
Chapter 3 Tutorials 3 Select the Gonzo share and click Next. Figure 93 Protect > Backup > Restore Archive: Step 2 4 Select the original location and click Done.
Chapter 3 Tutorials 5 The NSA restores the files into the Gonzo share. When it finishes you can access the files. Figure 95 Protect > Backup > Restore Archive: Progress Gonzo 3.7.7 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore archived files by the backup job. In this example, the NSA’s RAID array failed. You’ve replaced the hard drives and re-configured the RAID.
Chapter 3 Tutorials 2 Select the backup job and backup time and click Next. Figure 97 Protect > Restore: Step 2 3 Select everything in the Gonzo share except the recycle folder. Click Next.
Chapter 3 Tutorials 4 Specify where you want to put the files. Browse to “/Gonzo”. Click Done. Figure 99 Protect > Restore: Step 4 The NSA restores the files and you can use them again. 3.8 Printer Server Tutorial Do the following to configure the NSA to allow computers on your network to share a printer. See www.zyxel.com for a list of compatible printers. 1 Make sure the NSA is on and the SYS light shines steadily. 2 Use a USB cable to connect the printer’s USB port to one of the NSA’s USB ports.
Chapter 3 Tutorials 3 Turn on the printer. The NSA detects it after a few moments. 4 On your computer, open your CIFS file sharing program (Windows Explorer for example) and browse to the NSA. Double-click the printer’s icon. Figure 101 Printer Connected to NSA: Windows Explorer 5 If you get a warning screen, click the option that lets you continue (Yes in this example).
Chapter 3 Tutorials Figure 104 Applications > Print Server After the driver installation finishes, the computer is ready to use the printer. Select the printer in an application to use it to print. Browse to the NSA using a CIFS program (like Windows Explorer) and double-click the printer’s icon to open the printer’s queue of print jobs. Figure 105 Printer Screen in Windows Explorer " Repeat steps 4 to 7 on your other computers so they can also use the printer. 3.
Chapter 3 Tutorials 3.9.1 Connecting External USB Hard Drives The easiest way to increase the NSA’s storage capacity is to connect an external USB hard drive. External USB hard drives are great for providing storage capacity for scheduled backups and snapshots of internal volumes. (External volumes can be the destination for a scheduled backup or snapshot, but only an internal volume can be the source.) Use the following procedure.
Chapter 3 Tutorials " If the new hard drives have any data you want to keep, back it up to another location before you install them. Adding these hard drives to a disk array formats them so all data stored on them will be lost. 1 See the Quick Start Guide for details on installing hard drives in the NSA’s bays. You can install hard drives while the NSA is operating. 2 Click Storage > Internal Volumes > Disk and make sure the new drive displays with a healthy status.
Chapter 3 Tutorials 4 Select RAID5 Reshape and click Apply. Figure 110 Storage > Internal Storage > RAID > Add Disk 5 After the NSA finishes adding the disk to the array, click the Disk tab. The new disk displays the same Type and RAID Array as the other disks in the array. Figure 111 Storage > Internal Storage > Disk You have completed adding the hard drive to the RAID array. Continue to Section 3.9.3 on page 109 for how to use the increased storage capacity. 3.9.
Chapter 3 Tutorials 1 Click the Volume tab. Select a volume and click Edit. Figure 112 Storage > Internal Storage > Volume 2 Increase the size and click Apply. Figure 113 Storage > Internal Storage > Volume > Edit 3 Repeat these steps for other volumes that need more storage capacity. 3.9.4 Migrating a RAID to Higher Capacity Hard Drives You can migrate a RAID 5 array to hard drives of higher capacity. Replace one hard drive at a time and recover the RAID before you go on to replace another hard drive.
Chapter 3 Tutorials 1 Click Storage > Internal Storage > Disk to list the installed disks. Select a disk to replace first (disk 1 in this example) and click Eject. Figure 114 Storage > Internal Storage > Disk 2 Click Apply. Figure 115 Storage > Internal Storage > Disk > Eject 3 Remove the hard drive. The NSA sounds an audible alarm. 4 Log out of the Web Configurator and then back in. The Log Message screen shows that the RAID is degraded, click Turn Off Buzzer to stop the audible alarm.
Chapter 3 Tutorials 5 Open the administration screens. In the Status screen the RAID array shows up as degraded. Figure 117 Status: RAID Degraded 6 Install the new hard drive. In this example it’s in disk drive bay 2. 7 The NSA automatically repairs a degraded RAID if you insert an empty disk without an existing file system. Otherwise, after you insert a disk you must go to the Storage > Internal Storage > RAID screen and click Repair.
Chapter 3 Tutorials 9 The RAID’s status displays as Recovering. Figure 120 Storage > Internal Storage > RAID After the recovery finishes and the status shows up as Healthy, reboot the NSA. Then you can use the same process to migrate any (or all) of the RAID’s drive as long as you replace them one-by-one and recover the RAID after each replacement.
Chapter 3 Tutorials 114 NSA-2401 User’s Guide
P ART II Web Configurator Status Screen (117) System Setting Screen (121) Storage Screens (125) Network Screens (159) Sharing Screens (173) Protect Screens (197) Application Screens (223) Maintenance Screens (229) 115
CHAPTER 4 Status Screen 4.1 Status Screen The Status screen is the first screen you see after you log into the Web Configurator (and complete the wizard for the first time). It provides an overview of your NSA’s status, settings and activity. Once you leave the screen, you can return to it by clicking the Status icon or the text itself on the top-left of the navigation panel.
Chapter 4 Status Screen The following table describes the icons in this screen. Table 16 Status Icons ICON DESCRIPTION Refresh Click this icon to refresh the data for the field or value with which it is associated. Edit Click this icon to open the configuration screen for the item with which it is associated. Healthy Green indicates a healthy disk array. All disks in the array are OK and the file system is functioning properly. Resynching Yellow indicates the raid array is being repaired or created.
Chapter 4 Status Screen Table 17 Status (continued) LABEL DESCRIPTION CPU Temperature This displays the current temperature near the NSA’s CPU. The NSA generates an emergency log if the temperature goes out of the normal operating range. If the temperature goes even higher, the NSA shuts down automatically to avoid damage from overheating. If the NSA overheats, make sure the fans are working and it is in a well ventilated place. Click the Refresh icon to update this display.
Chapter 4 Status Screen Table 17 Status (continued) LABEL DESCRIPTION External Volume This displays the volumes created on USB hard drives connected to the NSA. USB ports are numbered in the order that you connect USB devices. Status This shows whether the external (USB) volume is Healthy, Locked, Unlocked, or Down. Name This shows the NSA-generated name for an external (USB) volume. File System This field displays the type of file system that an external (USB) volume is using.
CHAPTER 5 System Setting Screen 5.1 Date/Time Use the NSA System Setting > Date/Time screen to set up the time on your NSA. To open this screen, click System Setting > Date/Time in the navigation bar of the Web Configurator. Choose a time zone and/or allow the NSA to synchronize with a time server. Figure 122 System Setting > Date/Time The following table describes the labels in this screen.
Chapter 5 System Setting Screen Table 18 System Setting > Date/Time (continued) LABEL DESCRIPTION New Time (hh:mm:ss) This field displays the last updated time from the time server or the last time configured manually. When you set Date Time Setup to Manual, enter the new time in this field and then click Apply. Get from Time Server Select this to have the NSA get the time and date from the time server you select in the Time Server Address field.
Chapter 5 System Setting Screen • The time server is no longer reachable. • The NSA is shut down often. The NSA internal battery keeps time when the NSA is shut down and this may cause possible variance. • A power surge occurs. The NSA gives no warning if time lag occurs. You should re-synchronize the time after a power surge or after you have shut down the NSA several times.
Chapter 5 System Setting Screen 124 NSA-2401 User’s Guide
CHAPTER 6 Storage Screens 6.1 Storage Screens Overview Use the storage screens to work with disks, RAIDs, and volumes to manage the NSA’s storage. 6.1.1 What You Can Do in the Storage Screens • Use the Internal Storage screens (Section 6.2 on page 127 through Section 6.6.1 on page 142) to view and configure the NSA’s installed disks, RAIDs, and volumes. • Use the External Storage screens (Section 6.7 on page 145 through Section 6.8.1 on page 149) to view and configure USB-connected disks and volumes. 6.
Chapter 6 Storage Screens Encrypted Volumes When you create a volume you can encrypt it using either a manually entered password or a USB key. Others cannot read the data even if they take the physical drive. Encrypting a volume does not affect how the volume’s users use it. The NSA automatically encrypts data the users write to the encrypted volume and de-crypts the data they read. " Keep an encrypted volume’s password or USB key in a safe place.
Chapter 6 Storage Screens 6.2 Internal Storage Status Screen Click Storage > Internal Storage > Status to display the following screen. This screen displays general information about the disks installed in the NSA and the disk arrays and volumes created on them. Figure 124 Storage > Internal Storage > Status Volumes and their capacity Array type and capacity Disks in the array The following table describes this screen.
Chapter 6 Storage Screens Table 19 Storage > Internal Storage > Status (continued) LABEL/ICON DESCRIPTION Hot-Spare This is the array’s standby drive if it has one. “There are not disks” displays if the array does not have a standby drive. Free These are installed disks that do not already belong to a disk array. 6.3 Disk You can view information on the NSA internal disks in this screen. Disk Replacement Restrictions See the Quick Start Guide for information on replacing disks in the NSA.
Chapter 6 Storage Screens The following table describes the icons in this screen. Table 20 Storage > Internal Storage > Disk Icons ICON DESCRIPTION Wizards Click this icon to open the Disk Setup Wizard to create a new disk array or volume. Eject Select a hard drive and click this icon to shut it down. Do this before removing a hard drive to help increase its usable lifetime. Note: Ejecting a disk from a JBOD or RAID0 array causes the array to fail and the data to be lost. S.M.A.R.T.
Chapter 6 Storage Screens Figure 126 Storage > Internal Storage > Disk > S.M.A.R.T. (Brief Summary) The following table describes this screen. Table 22 Storage > Internal Storage > Disk > S.M.A.R.T. (Brief Summary) 130 LABEL/ICON DESCRIPTION Device Info Format Select Brief Summary to display basic information about the drive and its status. Select Full Summary to display advanced details about the drive and its status. Temperature This field displays the hard drive’s temperature in degrees Celsius.
Chapter 6 Storage Screens 6.3.2.1 S.M.A.R.T Full Summary Set the Device Info Format field to Full Summary to display advanced details about the drive and its status. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. Figure 127 Storage > Internal Storage > Disk > S.M.A.R.T. (Full Summary) The following table describes this screen. Table 23 Storage > Internal Storage > Disk > S.M.A.R.T.
Chapter 6 Storage Screens Table 23 Storage > Internal Storage > Disk > S.M.A.R.T. (Full Summary) (continued) LABEL/ICON DESCRIPTION When Failed This column indicates when (if ever) the attribute failed. An attribute has failed if the normalized value is less than or equal to the threshold. -: This displays if the attribute is not failing now and has never failed in the past. FAILING_NOW: This displays if the attribute’s current normalized value is less than or equal to the threshold.
Chapter 6 Storage Screens For example if you originally have two disks configured in a RAID 1 array, and you then buy two more disks and want to configure all four at RAID 5, you should first back up all your data on those disks (see the Genie Backup Manager utility on the included CD) and then restore your data later after you create the new array. Below is a table that summarizes some attributes of the various array levels as supported on the NSA.
Chapter 6 Storage Screens Three Disks Choose a combination of JBOD and/or RAID 0 or RAID 1 for the reasons already outlined. With three disks you could create: • • • • up to three JBOD arrays one RAID 1 array with a hot-spare. one single-disk JBOD array and one two-disk RAID 0 or one two-disk RAID 1 array one RAID 5 array Four Disks In addition to the JBOD, RAID 0 and RAID 1 choices, you may choose RAID 10, RAID 5 or RAID5_(3 + hot-spare).
Chapter 6 Storage Screens • Down when an array is down and cannot be fixed. The array cannot be used and the data is lost. Replace the faulty disk(s) and recreate the array, volumes, and sharing configuration. If an array is down, users can no longer transfer files to/from the array’s shares. If an array is degraded, then file transfer to/from the shares in the degraded array will be slower.
Chapter 6 Storage Screens The following table describes the icons in this screen. Table 25 Storage > Internal Storage > RAID Icons ICON DESCRIPTION Wizards Click this icon to open the Disk Setup Wizard to create a new disk array or volume. Create If you have disk space available for a new disk array, then click this icon to open a screen where you can create a new disk array. Rename Select a hard drive array and click this icon to change the array’s name.
Chapter 6 Storage Screens Table 25 Storage > Internal Storage > RAID Icons (continued) ICON DESCRIPTION Resync Speed When a disk array is resynchronizing, you can select it and click this icon to set how fast the NSA resynchronizes the disk array. A screen displays. Select the how fast the NSA should re-synchronize the array. The faster the resynchronization, the slower the performance for users accessing shares.
Chapter 6 Storage Screens Table 25 Storage > Internal Storage > RAID Icons (continued) ICON DESCRIPTION Sort Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. Status This icon shows Healthy, Resynching, Degraded or Down; see Section 6.4.2 on page 134. If an array is degraded, click the Repair icon after you have replaced the faulty disk. The following table describes the labels in this screen.
Chapter 6 Storage Screens The following table describes this screen. Table 27 Storage > Internal Storage > RAID > Create LABEL DESCRIPTION RAID Level Use JBOD or RAID 0 if you want maximum capacity and/or maximum speed for your disks, and/or you have other means of protecting your data. Use RAID 1 to mirror primary data to another disk(s) with high performance. Use RAID 5 with three disks to balance performance, hard disk capacity usage with data protection in case of disk failure.
Chapter 6 Storage Screens Figure 130 Storage > Internal Storage > Volume The following table describes the icons in this screen. Table 28 Storage > Internal Storage > Volume Icons ICON DESCRIPTION Wizards Click this icon to open the Disk Setup Wizard to create a new disk array or volume. Create Click this icon to open a screen where you can create a new storage volume.
Chapter 6 Storage Screens Table 28 Storage > Internal Storage > Volume Icons (continued) ICON DESCRIPTION Lock If an encrypted volume is unlocked, you can select it and click this icon to lock it. No one will be able to use the volume until an administrator unlocks it. Note: At start up, if a USB key is inserted, the NSA automatically unlocks any volumes encrypted by the USB key. Unlock The NSA automatically locks an encrypted volume if the NSA loses power or the disk is removed.
Chapter 6 Storage Screens 6.6.1 Creating or Editing an Internal Volume Click Storage > Internal Storage > Volume > Create to display the internal volume creation screen as shown next. You can also select an existing internal volume and click the Edit icon. Use this screen to add or edit internal storage volumes. " Keep an encrypted volume’s password or USB key in a safe place. You cannot access a locked volume without the password or USB key. All of the volume’s data will be unusable.
Chapter 6 Storage Screens Table 30 Storage > Internal Storage > Volume Create (continued) LABEL DESCRIPTION Encrypted Select this check box and an option from the drop-down list box to encrypt the volume. This option is only available when you create a volume. The NSA automatically locks an encrypted volume if the NSA restarts or loses power or the disk is removed. An administrator can also manually lock the volume. Once a volume is locked, no one can use it again until an administrator unlocks it.
Chapter 6 Storage Screens Figure 132 Selecting the USB Device The following table describes this screen. Table 31 Selecting the USB Device LABEL DESCRIPTION Name This field shows USB1, USB2, and so on for disks connected to the NSA’s USB ports. Type This shows whether or not the device has an encrypted volume. Model Name This is the device’s model name that uniquely identifies it in the NSA. Capacity This field shows the device’s storage size. Next Click this button to proceed.
Chapter 6 Storage Screens Figure 134 Creating a Duplicate USB Key: Eject 3 Insert a different USB key and click Next. Figure 135 Creating a Duplicate USB Key: Insert After the duplicate USB key creation completes, you return to the first USB key duplication screen (see Figure 133 on page 144) so you can make another. 6.7 External Storage Disk Screen Use the external storage screens to manage the NSA’s externally (USB) connected storage. Connect USB devices to the NSA’s USB ports.
Chapter 6 Storage Screens The following table describes the icons in this screen. Table 32 Storage > External Storage > Disk Icons ICON DESCRIPTION Eject Select a USB-connected device and click this icon to be able to remove the device. Locate Select a USB-connected device and click this icon to have the device’s LED flash so you can identify it. Duplicate Key Connect a USB key device and another USB device to the NSA and click this to create a copy of the key.
Chapter 6 Storage Screens 6.8 External Volume Screen Click Storage > External Storage > Volume to display the external (USB-connected) volume summary screen as shown next. Use this screen to manage the NSA’s external storage volumes. The NSA automatically creates volumes when you connect an external disk. You can also create other volumes. Figure 137 Storage > External Storage > Volume The following table describes the icons in this screen.
Chapter 6 Storage Screens Table 34 Storage > External Storage > Volume Icons (continued) ICON DESCRIPTION Lock If an encrypted volume is unlocked, you can select it and click this icon to lock it. No one will be able to use the volume until an administrator unlocks it. Note that if the volume was encrypted using a USB key and the USB key is connected when the NSA restarts, the NSA automatically unlocks the volume.
Chapter 6 Storage Screens 6.8.1 Creating or Editing an External Volume " Creating a volume on a USB device formats it. All data on the USB device is lost. Click Storage > External Storage > Volume > Create to display the external (USBconnected) volume creation screen as shown next. You can also select an existing external volume and click the Edit icon. Use this screen to add or edit external storage volumes. " Keep an encrypted volume’s password or USB key in a safe place.
Chapter 6 Storage Screens Table 36 Storage > External Storage > Volume Create (continued) 150 LABEL DESCRIPTION File System Select the file system you want the new volume to use. If you plan to also use the USB device with another computer, it is recommended that you select the file system that the other computer uses. Windows file systems fat32: Newer, and more efficient than FAT16. Supports a volume size of up to 2 TB (Tera Bytes) and individual file sizes of up to 4 GB.
Chapter 6 Storage Screens Table 36 Storage > External Storage > Volume Create (continued) LABEL Create USB Drive DESCRIPTION Click this button to go to screens you can use to create a password for unlocking the volume and store the password on a connected USB device. You also use the screens to create copies of the USB key. See Section 6.6.2 on page 143 for details. Note: Create duplicate USB keys now since you cannot make them later. Without a USB key, you cannot access the volume if it becomes locked.
Chapter 6 Storage Screens lost. Parity protection is used with striping, and the “n” pieces of data are typically the blocks or bytes distributed across the drives in the array. The parity information can either be stored on a separate, dedicated drive, or be mixed with the data across all the drives in the array. " In the following figures, A1, A2, A3 and so on are blocks of data from the A file. Similarly, B1, B2, B3 and C1, C2, C3 ar blocks of data from the B and C files. 6.9.
Chapter 6 Storage Screens 6.9.3 RAID 0 RAID 0 spreads data evenly across two or more disks (data striping) with no mirroring nor parity for data redundancy, so if one disk fails the entire array will be lost. The major benefit of RAID 0 is performance. The following figure shows two disks in a single RAID 0 array. Data can be written and read across disks simultaneously for faster performance.
Chapter 6 Storage Screens RAID 1 capacity is limited to the size of the smallest disk in the RAID array. For example, if you have two disks of sizes 150 GB and 200 GB respectively in one RAID 1 array, then the maximum capacity is 150 GB and the remaining space (50 GB) is unused.
Chapter 6 Storage Screens 6.9.6 RAID 5 RAID 5 provides the best balance of capacity and performance while providing data redundancy. It provides redundancy by striping data across three disks and keeps the parity information (AP) on the fourth disk (in each stripe). In case of disk failure, data can be recovered from the surviving disks using the parity information. When you replace the failed disk, the reconstructed data is written onto the new disk.
Chapter 6 Storage Screens 6.9.8 RAID and Data Protection If a hard disk fails and you’re using a RAID 1, RAID 10, or RAID 5 array then your data will still be available (but at degraded speeds until you replace the hard disk that failed and resynchronize the array). However, RAID cannot protect against file corruption, virus attacks, files incorrectly deleted or modified, or the NSA malfunctioning. See Section 9.1 on page 197 for what you should use in these cases to protect data on your NSA. 6.9.9 S.M.A.
Chapter 6 Storage Screens Table 42 S.M.A.R.T. Attributes (continued) ID ATTRIBUTE NAME 12 Device Power Cycle Count 13 Soft Read Error Rate Low This is the number of uncorrected read errors the hard drive has reported. If this is not zero, back up your data. 190 Airflow Temperature Low This indicates the temperature of the airflow measured by a Western Digital hard drive. 190 Temperature Difference from 100 High This indicates the value of 100 - the temperature in degrees Celsius.
Chapter 6 Storage Screens Table 42 S.M.A.R.T. Attributes (continued) 158 ID ATTRIBUTE NAME 207 Spin High Current This is the quantity of high current used to spin up the drive. 208 Spin Buzz This is the number of buzz routines to spin up the drive. When the arm holding the read/write heads is stuck, the motor driving it tries to oscillate the arm to free it. This causes an audible vibration. 209 Offline Seek Performance This is the hard drive’s seek performance during offline operations.
CHAPTER 7 Network Screens This chapter discusses the network screens. 7.1 Network Screens Overview Use the network screens to configure the NSA’s network settings so computers can access it. 7.1.1 What You Can Do in the Network Screens • Use the TCP/IP screen (Section 7.2 on page 160) to configure the NSA’s TCP/IP network connection settings such as the teaming mode and IP addresses. • Use the Windows/CIFS screens (Section 7.
Chapter 7 Network Screens DHCP DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NSA as a DHCP client which means it is set to receive an IP address from a DHCP server. The NDU can help you discover the IP address of the NSA. Alternatively, configure a static IP address for the NSA. Jumbo Frames Jumbo frames are Ethernet frames larger than 1500 bytes.
Chapter 7 Network Screens Figure 140 Fault Tolerance Teaming Mode LAN1 LAN2 Load Balancing: This distributes the traffic load across LAN1 and LAN2. LAN1 and LAN2 are on the same subnet with the same IP address. It also includes backup functionality (fault tolerance). Figure 141 Load Balancing Teaming Mode LAN1 LAN2 Link Aggregation: This uses IEEE 802.3ad port link aggregation to combine LAN1 and LAN2 into a single logical link with greater bandwidth.
Chapter 7 Network Screens " If you enable jumbo frames on the NSA in a network that does not support them, you will lose access to the NSA. If this occurs, you will have to restore the factory default configuration. Use the RESET button or the Web Configurator. In the following example, the NSA has jumbo frames enabled and set to 9KB frames. This means the computer, notebook computer, and switch must also have jumbo frames enabled and be capable of supporting 9KB frames.
Chapter 7 Network Screens Figure 144 Network > TCP/IP The following table describes the labels in this screen. Table 43 Network > TCP/IP LABEL DESCRIPTION Teaming Mode Select how to use the NSA’s two Gigabit Ethernet interfaces. Stand Alone: Select this option to use a separate IP address on each of the two Gigabit Ethernet interfaces. Fault Tolerance: Select this option to use the LAN2 Gigabit Ethernet interface as a fail-over (backup) for the LAN1 Gigabit Ethernet interface.
Chapter 7 Network Screens Table 43 Network > TCP/IP LABEL DESCRIPTION Static Select the Static checkbox for the NSA to use fixed TCP/IP information. You must fill in all of the following fields. IP Address Type an IP address in this field. IP Subnet Mask Type an IP subnet mask in this field. Gateway Type a default gateway address in this field. DNS DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa.
Chapter 7 Network Screens " The NSA automatically restarts its network services after you apply changes in the TCP/IP or Windows/CIFS screens. Workgroup Security Mode A workgroup is a group of computers on a network that can share files. On the NSA, use Workgroup Security Mode if the user names and passwords for these computers are maintained on the NSA. This is suitable for users using the Common Internet File System (CIFS) protocol for remote file access in a small-to-medium sized office.
Chapter 7 Network Screens Figure 145 Active Directory Example Application AD S1 S2 LAN1 USB1 USB2 U3 U1 U2 7.3.1 Windows/CIFS Screen Click Network > Windows/CIFS to display this screen.
Chapter 7 Network Screens Figure 147 Network > Windows/CIFS (Domain) The following table describes the labels in these screens. Table 44 Network > Windows/CIFS LABEL DESCRIPTION Server Identification Server Name Enter a name to identify your NSA on the network in this field. By default the NSA uses “NSA” and the last four digits of the NSA’s LAN 1 MAC address. Description Enter additional identification information for the NSA (optional).
Chapter 7 Network Screens Table 44 Network > Windows/CIFS (continued) LABEL DESCRIPTION Windows Domain Administrator Password Type a password associated with the Windows Domain Administrator. Test Connection This button appears after the NSA joins a domain. Click it to check if the NSA can communicate with the Windows server domain controller. Leave Domain The Leave Domain button appears after the NSA joins a domain. Click Leave Domain to display options for having the NSA exit the domain.
Chapter 7 Network Screens Table 45 Network > NFS Icons (continued) ICON DESCRIPTION Edit NFS Share Select an existing NFS share and click this icon to open a screen where you can change the share’s settings. NFS Session Click this icon to open a screen that shows who is currently connected to the NSA using NFS. Delete NFS Share(s) Select an existing NFS share and click this icon to remove the share. Sort Click a column’s heading cell to sort the table entries by that column’s criteria.
Chapter 7 Network Screens The following table describes the labels in this screen. Table 47 Network > NFS > Add NFS Share LABEL DESCRIPTION Volume Name Select the volume upon which you want to create the NFS-enabled share. Share Name Enter the name of the shared folder. The text may consist of 1 to 106 characters. See Share Name Details on page 170 for details. Full Path This field displays the complete location of the share in the NSA. Comment Add descriptive text to help you identify the share.
Chapter 7 Network Screens The following table describes the labels in this screen. Table 48 Network > NFS > NFS Session LABEL DESCRIPTION Type This shows that this is an NFS connection to the NSA. NFS Share Path This displays the complete location of the NFS share in the NSA. Username This displays the name of the user connected to the NSA. Connected At This displays the date and time the user last connected to the NFS share in year-day-month hour:minute:second, format.
Chapter 7 Network Screens 172 NSA-2401 User’s Guide
CHAPTER 8 Sharing Screens 8.1 Overview Use the NSA’s Sharing screens to manage user accounts, groups of users, and shares. 8.1.1 What You Can Do In The Sharing Screens • Create and manage user accounts. See Section 8.2 on page 175 for details. • Create and manage groups. See Section 8.3 on page 182 for details. • Create and manage shares. See Section 8.4 on page 186 for details. 8.1.
Chapter 8 Sharing Screens Share A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder. You must have an internal volume before you can create shares. Volume A volume is a storage area on a single disk or spread across a number of disks (typically known as a disk array, or RAID) within a single file system. XFS XFS is journaled file system that allows for files as large as 16 terabytes.
Chapter 8 Sharing Screens Conflicting Share Access and ACL Settings If the share’s access permissions and the access permissions defined in the ACL differ, the NSA applies whichever is more restrictive. For example, if the share allows a user access but the ACL setting does not, the NSA does not give the user access. Also, if the ACL setting allows a user access but the share’s settings do not, the NSA does not give the user access. Finding Out More See Section 3.
Chapter 8 Sharing Screens Table 49 Sharing > Users Icons (continued) ICON DESCRIPTION Edit User Select a user account from the list, then click this icon to edit their account name, group membership, password, and volume quota. See Section 8.2.1 on page 178 for details. Delete Selected Users Select a user account from the list, then click this icon to remove it. User Info Select a user account from the list, then click this icon to view their quota and group information. See Section 8.2.
Chapter 8 Sharing Screens Table 50 Sharing > Users (continued) LABEL DESCRIPTION User Type This field displays whether the account is a user or an administrator. User Name This field displays the user name created when you add a new user. The admin account is the default NSA super user and cannot be deleted. Description This field displays any configured details about the user account. 8.2.0.
Chapter 8 Sharing Screens 8.2.1 Create a New Account & Change Account Properties To create an account, click Sharing > Users > Add User. To edit an existing local user account, click Sharing > Users > Edit User. The account creation and account editing screens are identical in appearance. Figure 152 Sharing > Users > Add User The following table describes the labels in this screen. Table 51 Sharing > Users > Create a New Account 178 LABEL DESCRIPTION Username Enter an account name.
Chapter 8 Sharing Screens Table 51 Sharing > Users > Create a New Account (continued) LABEL DESCRIPTION Group Membership Choose the groups to which you want to assign this account. You can select multiple groups by holding the [Ctrl] key while you click. Before a user can be assigned a group, you must first create one or more on the NSA. A group is a set of users that have common NSA access rights. A user can belong to more than one group. More restrictive access rights override less restrictive ones.
Chapter 8 Sharing Screens • admin 8.2.1.2 Account Password Management Non-admin users may change their passwords themselves by logging into the NSA Web Configurator using the username and password as defined in the Create New Account screen. After logging in, select the Password tab in the account toolbar. Figure 153 My NSA In the Password tab, create a new password and then click Apply.
Chapter 8 Sharing Screens " Non-admin user accounts cannot access the administrator Web Configurator screens and cannot browse shares assigned to other users. 8.2.2 View User Information To view a user account’s information, select it from the Sharing > Users list and then click User Info. The two tabs in the User Information screen are Quota List and Group List. Figure 155 Sharing > Users > User Information The following table describes the labels in this screen.
Chapter 8 Sharing Screens 8.3 Groups Click Sharing > Groups to open this screen where you can create and manage groups. A group is a collection of user accounts. Figure 156 Sharing > Groups The following table describes the icons in this screen. Table 53 Sharing > Groups Icons ICON DESCRIPTION Add Group Click this icon to open the Add a New Local Group screen, where you can add new local groups. See Section 8.3.1 on page 184 for details.
Chapter 8 Sharing Screens Table 53 Sharing > Groups Icons (continued) ICON DESCRIPTION Delete Selected Groups Select a group from the list, then click this icon to remove it. You can only delete local user groups, not domain groups. Sort Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. Local Group Indicates a local group created on the NSA.
Chapter 8 Sharing Screens Table 54 Sharing > Groups (continued) LABEL DESCRIPTION Previous & Next Click Previous to cycle back through the pages of groups, and Next to cycle forward through them. Status This icon displays the type of group and can also show if the group is in conflict. Group Type This field displays whether the group is a local group or a domain group. Group Name This field displays the group name. 8.3.
Chapter 8 Sharing Screens Table 55 Sharing > Groups > Add a New Local Group (continued) LABEL DESCRIPTION Available Users These are the user accounts that have been created on either the NSA or the domain controller. Select the user(s) that you want to join the group and then click the Add Selected Users) button. You need to click Apply for the changes to take effect. Group Membership These are the groups that the account already belongs to on the NSA.
Chapter 8 Sharing Screens 8.4 Shares Click Sharing > Shares to open this screen where you can create and manage shares. Figure 158 Sharing > Shares The following table describes the icons in this screen. Table 56 Sharing > Shares Icons ICON DESCRIPTION Add Share Click this icon to open the Add Share screen, where you can create new shares. See Section 8.4.1 on page 188 for details. Recycle Bin Click this icon to open the Recycle Bin Configuration screen. See Section 8.4.3 on page 194 for details.
Chapter 8 Sharing Screens Table 56 Sharing > Shares Icons (continued) ICON DESCRIPTION Delete Share Select a share from the list, then click this icon to remove it. DFS Click this icon to open the DFS Links screen. See Section 8.4.4 on page 194 for details on creating DFS links. Share Browser Select a share from the list, then click this icon to view its folder and file structure. You can also add, remove, and move files and folders within a share. See Section 2.5.
Chapter 8 Sharing Screens Table 57 Sharing > Shares (continued) LABEL DESCRIPTION Display Number Set the number of shares displayed per page. Previous & Next Click Previous to cycle back through the pages of shares, and Next to cycle forward through them. 8.4.1 Create a New Share & Edit a Share To create a local group, click Sharing > Shares > Add Share. To edit an existing local group, click Sharing > Shares > Edit Share. The share creation and share editing screens are identical in appearance.
Chapter 8 Sharing Screens Table 58 Sharing > Shares > Create a New Share (continued) LABEL DESCRIPTION Apply Click this to save your changes. Cancel Click this to discard changes and close the window. 8.4.1.1 Share Access Configuration This screen allows you to assign permissions to a share. Figure 160 Sharing > Shares > Create a New Share > Share Access Configuration The following table describes the labels in this screen.
Chapter 8 Sharing Screens 8.4.2 ACL Configuration Click Sharing > Shares, select a share, and click ACL Properties screen to open the Access Control List (ACL) screen. Use this screen to display and configure ACL settings. The ACL defines read and write permissions for specific files and folders. • If you add a new file to a folder, the new file takes on the folder’s ACL settings. • If you move a file from one folder to another, the file keeps its ACL settings.
Chapter 8 Sharing Screens The following table describes the labels in this screen. Table 61 Sharing > Shares > Create a New Share > Share Access Configuration LABEL DESCRIPTION Type This indicates whether the item in the list is a folder or file, as well as whether it is locked or unlocked. ACL Path This indicates the file or folder path and name on the share. Close Click this to close the screen. 8.4.2.1 New ACL Configuration This screen allows you to create a new ACL configuration.
Chapter 8 Sharing Screens The following table describes the labels in this screen. Table 63 Sharing > Shares > Create a New Share > Share Access Configuration LABEL DESCRIPTION Type This indicates whether the item in the list is a folder or file, as well as whether it is locked or unlocked. Name This indicates the file or folder’s name on the share. Size This indicates the file or folder’s size on the share in kilobytes.
Chapter 8 Sharing Screens The following table describes the labels in this screen. Table 64 Shares > ACL Configuration > New ACL Configuration > ACL Permission LABEL DESCRIPTION Target This displays the path of the currently selected item on the share. Apply to all directories and files under this folder If you are configuring a folder’s permission settings, select this option to have these permission settings overwrite any ACL settings of all folders and files within the folder.
Chapter 8 Sharing Screens 8.4.3 Recycle Bin Click Sharing > Shares > Recycle Bin to open the following screen. Use this screen to set up how the share recycle bin is managed. Figure 164 Sharing > Shares > Configuration The following table describes the labels in this screen. Table 65 Shares > ACL Configuration > New ACL Configuration > ACL Permission LABEL DESCRIPTION Clean Recycle Bin every... Set the number of days a deleted file can remain in the recycle bin before the NSA permanently deletes it.
Chapter 8 Sharing Screens The following table describes the labels in this screen. Table 66 Sharing > Shares > DFS LABEL DESCRIPTION Link Name Enter a name for the new DFS link. The text may consist of letters, numerals and any printable character found on a typical English language keyboard. Remote Server IP Enter the remote server’s IP address. Remote Share Name Enter a name for the new remote share.
Chapter 8 Sharing Screens 196 NSA-2401 User’s Guide
CHAPTER 9 Protect Screens 9.1 Protection Methods Overview This chapter introduces different ways of protecting data on the NSA and explains how to use the Protect screens to create and schedule snapshots and backups. There are a variety of ways to protect your data on the NSA. Below is a summary table of preventative steps you should do in advance to protect against various problems.
Chapter 9 Protect Screens 9.1.1 What You Can Do in the Protect Screens • Use the Backup screens (Section 9.2 on page 200) to back up data and restore backup files by archive backup job. • Use the Restore screens (Section 9.3 on page 212) to restore by backup files. • Use the Snapshot screens (Section 9.4 on page 215) to create and manage snapshot jobs. • Use the Backup Software screen (Section 9.5 on page 220) to locate the Genie Backup Manager license keys. 9.1.
Chapter 9 Protect Screens To use a snapshot to restore files, use the MyNSA screens, CIFS (Windows Explorer), or FTP to browse to the snapshot image folder. The snapshot folder contains images named after the folders and files in the volume at the time of the backup. To restore a folder or file to its state at the time of the snapshot, open the snapshot image of the same name. You can also copy or move the snapshot image to another folder (outside the snapshot folder).
Chapter 9 Protect Screens Finding Out More See Chapter 6 on page 125 for more information on RAID. See Section 3.7 on page 89 for backup and snapshot tutorials. 9.2 NSA Backup Screens Use the Protect > Backup menus to create data backups to another volume, an external USB disk drive, or a computer or another NSA over the network. The NSA deletes old backups according to the backup job’s purge policy (see Section 9.2.2 on page 202) before creating a new backup.
Chapter 9 Protect Screens Figure 166 Protect > Backup The following table describes the icons in this screen. Table 68 Protect > Backup Icons ICON DESCRIPTION Add Job Click this icon to create a new backup job (see also Section 9.2.2 on page 202). Edit Job Select a backup job and click this icon to modify it’s settings. Delete Selected Jobs(s) Select a backup job(s) and click this icon to remove the job(s). This does not delete any backup files the backup job has already created.
Chapter 9 Protect Screens Table 68 Protect > Backup Icons (continued) ICON DESCRIPTION Abort Job If a backup job is currently running, you can select it and click this icon to stop and abort the job. Sort Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. The following table describes the labels in this screen.
Chapter 9 Protect Screens The following table describes the labels in this screen. Table 70 Protect > Backup > Add Job: Step 1 LABEL DESCRIPTION Job Name This is a required field that uniquely identifies the backup. Type from 1 to 15 characters. You can use alphanumeric characters (A-Z 0-9) and "_" [underscores]. The first character must be a letter. Job Description Type from 0 to 60 characters to further describe this backup.
Chapter 9 Protect Screens 9.2.2.
Chapter 9 Protect Screens The following table describes the labels in this screen. Table 71 Protect > Backup > Add Job: Step 2 LABEL Backup Source DESCRIPTION Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files. Click to close a folder in the tree. This is useful if there are many folders or files that you wish to hide from view. Click to select a folder or file to back up.
Chapter 9 Protect Screens Table 71 Protect > Backup > Add Job: Step 2 (continued) LABEL External DESCRIPTION If there is an external USB hard drive connected to the NSA (for example USB1 ExtVolume 1), you can select a backup target on the external USB hard drive. Previous Click this button to return to the preceding screen. Next Click this button to proceed. 9.2.2.2 Creating a Backup Job: Step 3 Figure 169 Protect > Backup > Add Job: Step 3 The following table describes the labels in this screen.
Chapter 9 Protect Screens Table 72 Protect > Backup > Add Job: Step 3 (continued) LABEL DESCRIPTION Purge Policy Select a policy for deleting archive backups. This purge runs first before a new backup is done. For example, if you have a backup scheduled to begin at midnight, then at that time, the NSA checks these settings and deletes files accordingly before backup takes place. If space on the backup NSA or disk is a concern, then configure the NSA to delete old backups.
Chapter 9 Protect Screens 9.2.3 Editing a Backup Job In the Protect > Backup screen, select a backup job and click the Edit Job icon to change its settings. Figure 171 Protect > Backup > Edit Job: Step 1 The following table describes the labels in this screen. Table 74 Protect > Backup > Edit Job: Step 1 208 LABEL DESCRIPTION Job Name This field displays the name that uniquely identifies the backup. It is readonly. Job Description Type from 0 to 60 characters to further describe this backup.
Chapter 9 Protect Screens Table 74 Protect > Backup > Edit Job: Step 1 (continued) LABEL DESCRIPTION Bandwidth For backups to a remote NSA, you can restrict the bandwidth to help prevent the backups from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet. Purge Policy These fields display for archive backups. Select a policy for deleting archive backups. This purge runs first before a new backup is done.
Chapter 9 Protect Screens Figure 173 Protect > Backup > Restore Archive: Step 1 The following table describes the labels in this screen. Table 76 Protect > Backup > Restore Archive: Step 1 210 LABEL DESCRIPTION Job Name This is the name that identifies the backup job. Job Description This is some extra descriptive text on the backup. Backup type This displays what kind of backups the job creates.
Chapter 9 Protect Screens 9.2.4.1 Restoring a Backup: Step 2 Figure 174 Protect > Backup > Restore Archive: Step 2 The following table describes the labels in this screen. Table 77 Protect > Backup > Restore Archive: Step 2 LABEL DESCRIPTION Folder Chooser Select the folders you want to restore. previous Click this button to return to the preceding screen. next Click this button to proceed. 9.2.4.
Chapter 9 Protect Screens The following table describes the labels in this screen. Table 78 Protect > Backup > Restore Archive: Step 3 LABEL DESCRIPTION Original Location Select this option to restore the files to the place from which they were copied. Other Location Select this option to restore the files to somewhere other than the place from which they were copied. Type or browse for the folder to which you want to restore the backup files. Enter the backup job’s password if it has one.
Chapter 9 Protect Screens 9.3.1 Protect > Restore: Step 2 Figure 177 Protect > Restore: Step 2 The following table describes the labels in this screen. Table 80 Protect > Restore: Step 2 LABEL DESCRIPTION Select Restore Point Select to which backup job and backup time you want to return. The NSA restores the files included in the backup archive. Files not in the backup archive are not modified. previous Click this button to return to the preceding screen. next Click this button to proceed.
Chapter 9 Protect Screens 9.3.2 Protect > Restore: Step 3 Figure 178 Protect > Restore: Step 3 The following table describes the labels in this screen. Table 81 Protect > Restore: Step 3 214 LABEL DESCRIPTION Folder Chooser Select the folders you want to restore. previous Click this button to return to the preceding screen. next Click this button to proceed.
Chapter 9 Protect Screens 9.3.3 Protect > Restore: Step 4 Figure 179 Protect > Restore: Step 4 The following table describes the labels in this screen. Table 82 Protect > Restore: Step 4 LABEL DESCRIPTION Path for restoring Type or browse for the folder to which you want to restore the backup files. Enter the backup job’s password if it has one. previous Click this button to return to the preceding screen. done Click this button to save your changes back to the NSA. 9.
Chapter 9 Protect Screens " " The snapshot capture fails if deleting all previous snapshots does not leave enough space for the new snapshot. To take the snapshot, make more free space on the disk array by recreating a volume with a smaller capacity or upgrading the disk array to a larger storage capacity. It’s strongly recommended to set the maximum amount of snapshots setting as low as possible as a high amount of snapshots can significantly reduce the volume’s file write performance.
Chapter 9 Protect Screens The following table describes the icons in this screen. Table 83 Protect > Snapshot > Snapshot Jobs Icons ICON DESCRIPTION Add Job Click this icon to create a new snapshot job (see also Section 9.2.3 on page 208). Snapshot Image Access Click this icon to open a screen where you can define where the NSA stores the snapshot images (which also determines who can access them). Allow Only Admin: Store all snapshots for all of a disk array’s volumes in a single snapshots system share.
Chapter 9 Protect Screens The following table describes the labels in this screen. Table 84 Protect > Snapshot > Snapshot Jobs LABEL DESCRIPTION Status This field shows whether the snapshot job is currently running or waiting to run. The percent complete also displays for a currently running job. Job Name This is the name of the snapshot job. Volume Name This field identifies the volume upon which this job takes snapshots.
Chapter 9 Protect Screens The following table describes the labels in this screen. Table 85 Protect > Snapshot > Add Job LABEL DESCRIPTION Job Name This is a required field that uniquely identifies the snapshot. Type from 1 to 15 characters. You can use alphanumeric characters (A-Z 0-9) and "_" [underscores]. The first character must be a letter. Volume Name Select the (internal) volume to take a snapshot of. When creating a new snapshot, only volumes that are already created on the NSA are available.
Chapter 9 Protect Screens The following table describes the icons in this screen. Table 86 Protect > Snapshot > Snapshot Images Icons ICON DESCRIPTION Delete Selected Images Select a snapshot image(s) and click this icon to remove the image(s). Sort Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order. Status This icon shows whether or not the snapshot image is valid.
Chapter 9 Protect Screens Figure 183 Protect > Backup Software NSA-2401 User’s Guide 221
Chapter 9 Protect Screens 222 NSA-2401 User’s Guide
CHAPTER 10 Application Screens 10.1 Overview This chapter introduces the NSA Application screens. 10.1.1 What You Can Do In The Application Screens • Configure settings for FTP file transfers to/from the NSA. See Section 10.2 on page 224 for more information. • Share a printer. See Section 10.3 on page 226 for details. • Configure how the copy button works. See Section 10.4 on page 227 for details. 10.1.
Chapter 10 Application Screens Print Server A print server is a device or software that provides users on a network with shared access to one or more printers. The print server acts as a buffer, holding the information to be printed out until the printer becomes free. The NSA can act as a print server. Figure 184 Printer Sharing LAN1 LAN2 USB1 10.
Chapter 10 Application Screens Figure 185 Applications > FTP The following table describes the labels in this screen. Table 88 Applications > FTP LABEL DESCRIPTION Enable FTP Select this to allow users to connect to the NSA via FTP. This also enables FTP over Explicit TLS (FTPES). You can use FTP or FTPES to send files to the NSA or get files from the NSA. Connection Limit Enter the maximum number of concurrent FTP connections allowed on the NSA in this field.
Chapter 10 Application Screens 10.3 Print Server Click Applications > Print Server to open this screen. Use this screen to view and manage the NSA’s list of printers and print jobs. Figure 186 Applications > Print Server The following table describes the labels in this screen. Table 89 Applications > Print Server LABEL DESCRIPTION Refresh Click this to update the list of printers and print jobs. Status This fields shows whether the printer is connected and turned on (on-line) or not (off-line).
Chapter 10 Application Screens The following table describes the labels in this screen. Table 90 Applications > Print Server > Rename LABEL DESCRIPTION Name Type a new name to identify the printer. The name must be unique from all the other names of printers connected to the NSA. Apply Click this to save your changes. Reset Click this to discard any changes and start again. 10.4 Copy Button Click Applications > Copy Button to open this screen.
Chapter 10 Application Screens Figure 189 Applications > Copy Button > Edit The following table describes the icons in this screen. Table 92 Applications > Copy Button > Edit ICON DESCRIPTION Available Share Indicates the share can be used for file and folder management. Unavailable Share Indicates the share cannot be used because the NSA cannot find the physical location of the share. Disabled Share Indicates the share is no longer functional. If this happens, talk to your network administrator.
CHAPTER 11 Maintenance Screens 11.1 Overview This chapter introduces the NSA Maintenance screens. 11.1.1 What You Can Do In The Maintenance Screens • View the NSA system logs. See Section 11.2 on page 230 for details. • Manage the NSA configuration file. See Section 11.3 on page 237 for details. • Configure HTTPS and the NSA’s SSL certificate. See Section 11.4 on page 239 for details. • Upload new firmware. See Section 11.5 on page 241 for details. • Set the power management settings. See Section 11.
Chapter 11 Maintenance Screens Finding Out More See Section 3.5 on page 68 for tutorials on configuring security. See Section 3.6 on page 89 for a tutorial on power resume. 11.2 Log Click Maintenance > Log to open a screen that displays all NSA activity logs. Figure 190 Maintenance > Log The following table describes the icons in this screen. Table 94 Maintenance > Log Icons ICON DESCRIPTION Refresh Click this icon to update the log display.
Chapter 11 Maintenance Screens Table 94 Maintenance > Log Icons (continued) ICON DESCRIPTION Log Config Click this icon to open Log Configuration screen. See Section 11.2.2 on page 232 for more information. Report Config Click this icon to open the Log Report Configuration screen, where you can set up how logs are handled. See Section 11.2.4 on page 233 for details. Export Log Click this button to export the selected log(s). The following table describes the labels in this screen.
Chapter 11 Maintenance Screens Figure 192 Maintenance > Log > Log Classes (continued) LOG CLASS DESCRIPTION Application This class shows information about the NSA’s FTP, print server, and copy button applications. Backup This log class shows information about all backup-related activity. 11.2.1 Search Click the Maintenance > Log > Search icon to display the search filters. Figure 193 Maintenance > Log > Search Filters The following table describes the labels in this screen.
Chapter 11 Maintenance Screens The following table describes the labels in this screen. Table 96 Maintenance > Log > Log Config > Log Records Configuration LABEL DESCRIPTION Log Reserve Time: Set the number of months, up to 10, to keep the logs stored on the NSA. Save Log to: Select a user account on whose share you want to store the logs. The system default stores logs in a neutral location. Apply Click this to save your changes. Cancel Click this to discard changes and close the window. 11.2.
Chapter 11 Maintenance Screens Figure 196 Maintenance > Log > Log Report Configuration > Mail Setting The following table describes the labels in this screen. Table 98 Maintenance > Log > Log Report Configuration > Mail Setting LABEL DESCRIPTION Enable Log Email Select this option to have the NSA periodically send log files by e-mail to the account specified in the options below. Email To Enter the e-mail address to which you want the logs e-mailed.
Chapter 11 Maintenance Screens Figure 197 Maintenance > Log > Log Report Configuration > Report Setting The following table describes the labels in this screen. Table 99 Maintenance > Log > Log Report Configuration > Report Setting LABEL DESCRIPTION Alert Select the kind of log(s) to be sent out during mail alerts. Alerts are issued when a critical or system event requires immediate attention. See Section 11.2.0.1 on page 231 for information on the different log classes.
Chapter 11 Maintenance Screens 11.2.4.3 Syslog Server Setting This screen lets you set up the NSA to upload log files to a syslog server. Figure 198 Maintenance > Log > Log Report Configuration > Syslog Server Setting The following table describes the labels in this screen. Table 100 Maintenance > Log > Log Report Configuration > Syslog Server Setting LABEL DESCRIPTION Enable Syslog Server Select this option to have the NSA upload its log files to the syslog server.
Chapter 11 Maintenance Screens 11.3 Configuration Click Maintenance > Configuration to open a screen where you can backup and restore the NSA configuration settings or restore the device to its factory default settings. Figure 199 Maintenance > Configuration The following table describes the labels in this screen.
Chapter 11 Maintenance Screens Table 101 Maintenance > Configuration LABEL DESCRIPTION Reset to Default Reset to Default Click this to restore the NSA to its factory default settings. 11.3.1 Restoring the Configuration File When restoring a previously saved configuration file, you are presented with a warning screen if any users are connected. Figure 200 Maintenance > Configuration > Restore The following table describes the labels in this screen.
Chapter 11 Maintenance Screens Figure 201 Maintenance > Configuration > Restore > Restarting 11.4 SSL Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that was issued by a known certificate authority.
Chapter 11 Maintenance Screens The following table describes the labels in this screen. Table 103 Maintenance > SSL LABEL DESCRIPTION Force HTTPs Select the Force HTTPs option to turn on the NSA’s web browser security. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it. The NSA displays a warning screen if applying your change may disconnect some users. Click Apply if you want to continue.
Chapter 11 Maintenance Screens Figure 203 Maintenance > SSL > Edit a Self-Signed Certificate The following table describes the labels in this screen. Table 104 Maintenance > Configuration LABEL DESCRIPTION Common Name This name describes the certificate’s origin, either in the form of an IP address or a domain name. Host IP Address Select this option and enter the NSA’s IP address if you want to use this for the common name.
Chapter 11 Maintenance Screens 1 The SYS LED blinks orange when firmware is being uploaded to the NSA. Do not turn off or reset the NSA while the firmware update is in progress! Figure 204 Maintenance > FW Upgrade The following table describes the labels in this screen. Table 105 Maintenance > FW Upgrade LABEL DESCRIPTION Firmware File Enter the location of the firmware file you want to upload.
Chapter 11 Maintenance Screens Figure 205 Maintenance > Power Management The following table describes the labels in this screen. Table 106 Maintenance > Power Management LABEL DESCRIPTION Hard Drive Sleep Time Settings Hard Drive Sleep Time Enter the number of minutes the NSA will sit idle before spinning the hard disks down to sleep. Apply Click this to save your changes in this section.
Chapter 11 Maintenance Screens Table 106 Maintenance > Power Management (continued) LABEL DESCRIPTION Power On After Power Failure Select an option to set whether or not the NSA restarts when the power is restored after a power failure. Keep Former Status Select this option to have the NSA automatically restart only if it was operating when the power failed. The NSA remains off if it was already off when the power failed.
Chapter 11 Maintenance Screens The following table describes the labels in this screen. Table 107 Maintenance > Power Management > Edit LABEL DESCRIPTION Power Control Schedule List This table lists the power on, power off, and reboot schedules. For example, you could have one schedule to turn the NSA on every morning, at 8:00, another schedule to turn it off every evening at 18:00, and a third schedule to have it reboot every Friday at 14:00.
Chapter 11 Maintenance Screens Figure 207 Maintenance > Shutdown The following table describes the labels in this screen. Table 108 Maintenance > Shutdown LABEL DESCRIPTION Restart Click this to restart the device. Shutdown Click this to shut down the system and restart it again later. When you click the Restart button a pop-up screen appears asking you to confirm the action. Click Apply to continue or Cancel to abort the process.
P ART III Troubleshooting and Specifications Troubleshooting (249) Product Specifications (257) 247
CHAPTER 12 Troubleshooting 12.1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • • • • • Power, Hardware Connections, and LEDs NSA Login and Access Users Cannot Access the NSA Backups and Snapshots External USB Disks 12.2 Power, Hardware Connections, and LEDs V The NSA PWR LED does not turn on (no LEDs are on). • Make sure the NSA is turned on.
Chapter 12 Troubleshooting After replacing the disk, go to the Storage > Internal Storage > RAID screen. If the array’s status is not Resynching, select the array and click the Repair icon. V The NSA SYS LED is orange or is flashing orange. • If the SYS LED is steady on orange, then the NSA is unlocking an encrypted volume or there are no volumes in the NSA. If there are no volumes on the NSA, you cannot create shares on the NSA.
Chapter 12 Troubleshooting • Make sure the Ethernet cable is connected properly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it’s connected directly to a computer, make sure that the computer network card is working (ping 127.0.0.1 on the computer). • Use another Ethernet cable. If you’re connecting to a Gigabit Ethernet, make sure you’re using an 8-wire Ethernet cable. • If the problem continues, contact the vendor. See Section 1.1.
Chapter 12 Troubleshooting • Confirm that the computer running the NDU has a network connection. See the section on the NSA’s LAN connection for related information. • The computer running the NDU can only discover NSAs in the same subnet. NSAs connected to the same switch or router as your NDU computer are usually in the same subnet unless the router is doing subnetting or the switch is implementing VLAN. • The Genie Backup program uses the same network port as the NDU to discover the NSA.
Chapter 12 Troubleshooting 12.4 Users Cannot Access the NSA V A local user cannot access a share • Check that the NSA is turned on and connected to the network. The local user should try to ping the NSA or use the NDU to discover it. • The local user should check that he entered his login name and password correctly. • Check if the share exists and has the correct access settings for this user. • Check the Access Control List (ACL) of read/write permissions associated with specific files and/or folders.
Chapter 12 Troubleshooting • Leave the domain and re-join it. V A domain user can’t access a share. In addition to the checks listed previously for local users, check that the domain controller is turned on and connected to the network. V A user can access a share but cannot access individual folders or files within the share. Check the Access Control List (ACL) of read/write permissions associated with the share’s specific files and/or folders.
Chapter 12 Troubleshooting You may need to manually delete some previous snapshots to make more space. If you still cannot take the snapshot you may need to recreate the volume with a larger amount of space reserved for snapshots. • You can also check the logs on the NSA to find out the reason why the snapshot failed. • A snapshot must be done on a complete volume. Check that the volume is not down, locked, or degraded. If it is, then see Section 12.2 on page 249.
Chapter 12 Troubleshooting 256 NSA-2401 User’s Guide
CHAPTER 13 Product Specifications See also the Getting to Know Your NSA chapter for a general overview of the key features. 13.1 Feature Tables These are the main external physical features. Table 109 Physical Features 2 USB Ports Expand storage capacity by attaching compatible USB (version 2) hard drives to the USB ports.
Chapter 13 Product Specifications Table 110 Firmware Features (continued) 258 Disk Quota Use the disk quota feature to stop one user(s) from using up all disk capacity by setting a limit on how much storage space he/she may use. User Passwords Configure a password for an individual User to restrict access to the NSA. Non-admin users can change their own passwords by accessing the Web Configurator. The Change Password screen appears when a username other than “admin” is entered.
Chapter 13 Product Specifications Table 110 Firmware Features (continued) UPS Integration Connect an APC Uninterruptible Power Supply (UPS) with a USB connection to the NSA. The NSA shuts itself down if the UPS’s battery charge gets down to a user-configurable percentage. This allows the NSA to shut down properly and avoid data loss caused by a power failure when the UPS stops supplying power.
Chapter 13 Product Specifications Table 111 NSA Hardware Specifications (continued) Reset Button Reset the NSA or restore the factory default configuration file AC Input Voltage: 100 - 240 V at 50 - 60 Hz Current: 2 A DC Output Voltage: 19 V Current: 2 A Operating Temperature 0º C ~ 40º C Storage Temperature -30º C ~ 60º C Operating Humidity 20% ~ 90% RH (non-condensing) Storage Humidity 20% ~ 95% RH (non-condensing) Certifications EMC: FCC Class B, EN 55022 Class B Safety: UL 60950-1, CSA 6
Chapter 13 Product Specifications Table 112 NSA Firmware Specifications (continued) System Management Remote Management via Web Configurator (HTTP) Secure Remote Management via Web Configurator (HTTPS) NSA Discovery Utility (NDU) E-mail alerts Logging/Monitoring Centralized Logs Firmware Upgrade Web Configurator Web Browsers Supported Internet Explorer 6.0 and later versions. Firefox 1.07 and later versions. A. Limits may vary depending on user-share resource usage. 13.
Chapter 13 Product Specifications 262 NSA-2401 User’s Guide
P ART IV Appendices and Index Log Messages (265) Setting Up Your Computer’s IP Address (275) Importing Certificates (299) Open Source Licences (323) Legal Information (353) Index (355) 263
APPENDIX A Log Messages This appendix shows some NSA log messages.
Appendix A Log Messages Table 114 Log Messages FEATURE SEVERITY MESSAGE ARGUMENT(S) CIFS - share NOTICE Purge all files in recycle-bin folder in share: {0}. Share Name CIFS - share INFO Expire recycle-bin finish for share {0}, process time: {1} seconds, remove {2} file ({3} bytes) Share Name CIFS - user NOTICE CIFS - user How log it takes to process this recycle bin Number of files removed in recycle bin Add new user {0} by {1} from {2}.
Appendix A Log Messages Table 114 Log Messages FEATURE SEVERITY MESSAGE ARGUMENT(S) Network NOTICE Network interface {0} link down NFS INFO Enable NFS: SUCCESS NFS CRIT Enable NFS: FAILED NFS INFO Disable NFS: SUCCESS NFS CRIT Disable NFS: FAILED NFS INFO Export {0} ({1},{2}) to NFS: SUCCESS Path IP Filter Permission: rw, ro NFS CRIT Export {0} ({1},{2}) to NFS: FAILED Path IP Filter Permission: rw, ro NFS INFO Remove All data in NFS Share {0}: SUCCESS NFS Share Name NFS
Appendix A Log Messages Table 114 Log Messages FEATURE SEVERITY MESSAGE ARGUMENT(S) Snapshot INFO Expand Snapshot Image {0}(Increased Size={1}MB): SUCCESS Snapshot Image Name Size Snapshot CRIT Expand Snapshot Image {0}(Increased Size={1}MB): FAILED Snapshot Image Name Size Snapshot INFO Enable Snap-Share: SUCCESS Snapshot CRIT Enable Snap-Share: FAILED Snapshot INFO Disable Snap-Share: SUCCESS Snapshot CRIT Disable Snap-Share: FAILED Snapshot CRIT No Freespace to Expand Snapshot
Appendix A Log Messages Table 114 Log Messages FEATURE SEVERITY MESSAGE Storage RAID CRIT Start Repairing Degraded Raid: FAILED Storage RAID CRIT Modify Rebuild Priority to high/ normal/low: FAILED Storage RAID CRIT Reshape Raid5 by Adding disk{0}: FAILED Disk Slog ID Storage RAID CRIT Add Hot-Spare disk{0} to Raid: FAILED Disk Slog ID Storage RAID CRIT Remove Hot-Spare disk{0} from Raid: FAILED Disk Slog ID Storage RAID EMERG There is a RAID Degraded Storage RAID CRIT Please check
Appendix A Log Messages Table 114 Log Messages FEATURE SEVERITY MESSAGE Storage Volume INFO Unlock Internal Volume: SUCCESS Storage Volume INFO Change Internal Crypto Volume Password Prompt to [{0}]: Success Storage Volume INFO Change Internal Crypto Volume Password: SUCCESS Storage Volume INFO Rename External Volume to [{0}]: SUCCESS Storage Volume INFO Lock External Volume: SUCCESS Storage Volume INFO Unlock External Volume: SUCCESS Storage Volume INFO Change External Crypto Volume
Appendix A Log Messages Table 114 Log Messages FEATURE SEVERITY MESSAGE Storage Volume CRIT Create USB Key: FAILED Storage Volume CRIT Duplicate USB Key: FAILED Storage Volume CRIT Rename Internal Volume to [{0}]: FAILED Volume Name Storage Volume CRIT Expand Volume (Increased Size={0}MB): FAILED Size Storage Volume CRIT Lock Internal Volume: FAILED Storage Volume CRIT Unlock Internal Volume: FAILED Storage Volume CRIT Change Internal Crypto Volume Password Prompt to [{0}]: FAILED
Appendix A Log Messages Table 114 Log Messages FEATURE SEVERITY MESSAGE System EMERG Temperature exceeds the upper bound and may cause damage.System is going to shutdown. System INFO Temperature is back to normal. System EMERG Fan speed is too low and may cause damage System ERR Fan speed is lower than normal speed. System INFO Fan speed is normal. System INFO Device is shutdown by administrator System NOTICE The system was shutdown abnormally.
Appendix A Log Messages Table 114 Log Messages FEATURE SEVERITY MESSAGE System Time INFO Daylight saving is disabled System Time INFO Daylight saving is enabled Web INFO USER {0} ({1}) login WEB success User Name Web INFO USER {0} has logged out from WEB User Name Web INFO USER {0} ({1}) login WEB failed User Name SSL INFO Certficate is imported successfully. SSL NOTICE The public key in {0} doesn't match the public key of Certificate Request on system.
Appendix A Log Messages 274 NSA-2401 User’s Guide
APPENDIX B Setting Up Your Computer’s IP Address " Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 211 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix B Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. Figure 213 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 215 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. Figure 216 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 217 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon.
Appendix B Setting Up Your Computer’s IP Address 4 Click Manage network connections. Figure 219 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 220 Windows Vista: Network and Sharing Center " 280 During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 222 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 223 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon. Figure 224 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 225 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 226 Mac OS X 10.4: Network Preferences > TCP/IP Tab.
Appendix B Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. Figure 227 Mac OS X 10.4: Network Preferences > Ethernet 6 Click Apply Now and close the window.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 229 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 230 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 231 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask.
Appendix B Setting Up Your Computer’s IP Address Figure 232 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 233 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default Ubuntu 8 installation. " Make sure you are logged in as the root administrator.
Appendix B Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 236 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Properties dialog box opens. Figure 238 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default openSUSE 10.3 installation. " Make sure you are logged in as the root administrator.
Appendix B Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 243 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 244 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 245 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 246 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 247 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address 298 NSA-2401 User’s Guide
APPENDIX C Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix C Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 249 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix C Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 252 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next.
Appendix C Importing Certificates 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 254 Internet Explorer 7: Certificate Import Wizard 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 255 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix C Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 257 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes.
Appendix C Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 259 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 261 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix C Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click Tools > Internet Options. Figure 263 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix C Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 265 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 266 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix C Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click Tools > Options. Figure 270 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix C Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 272 Firefox 2: Certificate Manager 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 273 Firefox 2: Select File 5 The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information.
Appendix C Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click Tools > Options. Figure 274 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix C Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 276 Firefox 2: Certificate Manager 4 In the Delete Web Site Certificates dialog box, click OK. Figure 277 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix C Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click Tools > Preferences. Figure 280 Opera 9: Tools Menu 2 In Preferences, click Advanced > Security > Manage certificates.
Appendix C Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 282 Opera 9: Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix C Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 284 Opera 9: Install authority certificate 6 Next, click OK. Figure 285 Opera 9: Install authority certificate 7 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix C Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click Tools > Preferences. Figure 286 Opera 9: Tools Menu 2 In Preferences, Advanced > Security > Manage certificates.
Appendix C Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 288 Opera 9: Certificate manager 4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. " 318 There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix C Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 289 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 290 Konqueror 3.
Appendix C Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 292 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 293 Konqueror 3.
Appendix C Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 295 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 296 Konqueror 3.
Appendix C Importing Certificates 322 NSA-2401 User’s Guide
APPENDIX D Open Source Licences Notice Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes software developed by the Apache Software Foundation under Apache License. Apache License Version 2.
Appendix D Open Source Licences “Derivative Works” shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.
Appendix D Open Source Licences distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License.
Appendix D Open Source Licences Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Appendix D Open Source Licences The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it.
Appendix D Open Source Licences We call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.
Appendix D Open Source Licences 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.
Appendix D Open Source Licences compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.
Appendix D Open Source Licences required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
Appendix D Open Source Licences contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
Appendix D Open Source Licences END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, autofs, device-mapper, evms, exim. Lm_sensors, mdadm, pam_mount, raidtools, samba, sg_utils, smartmontools, vsftpd, xfsprogs and Linux kernel software under GPL license. GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc.
Appendix D Open Source Licences 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
Appendix D Open Source Licences 3.
Appendix D Open Source Licences directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
Appendix D Open Source Licences INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein, if any, are the property of their respective owners.
Appendix D Open Source Licences Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License ======== Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved.
Appendix D Open Source Licences Original SSLeay License -------------------------------Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’s SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to.
Appendix D Open Source Licences This Product include mod_ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix D Open Source Licences 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group.
Appendix D Open Source Licences 1.2. “Contributor Version” means the combination of the Original Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor. 1.3. “Covered Code” means the Original Code or Modifications or the combination of the Original Code and Modifications, in each case including portions thereof. 1.4.
Appendix D Open Source Licences The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and under Patents Claims infringed by the making, using or se
Appendix D Open Source Licences Any Modification which You create or to which You contribute must be made available in Source Code form under the terms of this License either on the same media as an Executable version or via an accepted Electronic Distribution Mechanism to anyone to whom you made an Executable version available; and if made available via Electronic Distribution Mechanism, must remain available for at least twelve (12) months after the date it initially became available, or at least six (6)
Appendix D Open Source Licences Contributor. You must make it absolutely clear than any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer. 3.6. Distribution of Executable Versions.
Appendix D Open Source Licences Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License published by Netscape. No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License. 6.3.
Appendix D Open Source Licences any software, hardware, or device, other than such Participant's Contributor Version, directly or indirectly infringes any patent, then any rights granted to You by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the date You first made, used, sold, distributed, or had made, Modifications made by that Participant. 8.3.
Appendix D Open Source Licences As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability. 13.
Appendix D Open Source Licences The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
Appendix D Open Source Licences 4.Restrictions You may not publish, display, disclose, sell, rent, lease, modify, store, loan, distribute, or create derivative works of the Software, or any part thereof. You may not assign, sublicense, convey or otherwise transfer, pledge as security or otherwise encumber the rights and licenses granted hereunder with respect to the Software.
Appendix D Open Source Licences DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. 8.
Appendix D Open Source Licences 352 NSA-2401 User’s Guide
APPENDIX E Legal Information Copyright Copyright © 2009 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix E Legal Information Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
Index Index A about icon 48 access configuration 44, 189 Access Control List, see ACL accessing share contents 40 account names 179 ACL 85, 174, 175, 190 Active Directory, see AD active sessions 120 AD 165 add disk 137 administration screens 38, 47 ALM LED 32 troubleshooting 250 anonymous 193 ANONYMOUS FTP 193, 253 anonymous FTP access 225 Apache License 323 Apple 31, 65 archive 96, 203 array 125 degraded 126 down 126 repair 126 resynching 134 B backup 89, 96, 200 archive 96, 203 bandwidth 206 compression
Index copied files folder format 33 COPY button 33, 227 folder format 33 LED 33 share 227 COPY LED troubleshooting 255 copying 33, 42 copyright 48, 353 CPU temperature 119 usage 118 crypto 141, 148 CSV 236 server address assignment 159 domain 177 group 173 user 173 domain controller time 165 domain mode 258 domain name 167 Domain Name System. See DNS.
Index NTFS 150 ReiserFS 150 scan 147 unlock 148 XFS 150 F factory defaults 52 fan speed 119 FAT16 150 FAT32 150 FCC interference statement 353 file access 85 browsing 40 path 43 restricted 88 security 85 storage system 260 system 150 troubleshooting access 254 File Transfer Protocol over Explicit TLS, see FTPES File Transfer Protocol, see FTP files deleting 41 FileZilla 81 fingerprint 79 firmware 241 specifications 260 upgrade 241 version 1, 119, 200 folder 38, 40 access 85 browsing 40 name restrictions 4
Index logout 38, 49 user 52 web help 38 idle timeout 225 hard drive 243 in conflict 173 internal file system 174 hard drives 39 IP address, default 36 records configuration 232 report configuration 233 search 232 severity 237 logging/monitoring 261 logical volume 174 manager 174 login troubleshooting 252 username 36 logout automatic 37 icon 38, 49 J JavaScript 35 JBOD 132, 152 expand 137 jumbo frames 160, 161, 164 L LAN LEDs 33 troubleshooting 251 LAN1 36 LAN2 36 language 48 leave domain 168 LEDs disk d
Index NAS 174 navigation panel 49 NDU 35 troubleshooting discovery 252 network connection test 164 protocols 260 security 260 Network-Attached Storage, see NAS NFS 168 share name details 170 non-admin users 180 NSA Discovery Utility, see NDU NSA LEDs 32 NTFS 150 O open source licences 323 Open SSL License 337, 338 OpenLDAP 337 OpenLDAP Public License 337 operating humidity 260 operating temperature 260 OS X 65 P parity 151 password 36, 38, 46 change screen 37 changing 46 default 36 forgot? 52 Patent 353
Index down 135 healthy 134 summary 135 three disks 134 two disks 133 recycle bin 194 Redundant Array of Independent Disks, see RAID ReiserFS 150 related documentation 3 repair 126 replacing disks 128 reset button 257 procedure 52 reset defaults 52 reshape 137 reshaping 107 restart 246 restoring by backup files 212 by backup files tutorial 102 by backup job 209 by backup job tutorial 99 files 99 restricted file 190 file example 88 folder 190 restrictions on folder names 45 on replacing disks 128 on share na
Index synchronization 203 tutorial 92 syntax conventions 4 SYS LED 33 troubleshooting 249 syslog server 229, 236 system management 261 system setting 121 T TCP/IP 162 teaming mode 163 temperature CPU 119 operating 260 thumbprint 79 time 121 Daylight Saving Time 122 lag 122 time server 122 timeout 37 TLS 82, 223 Transport Layer Security, see TLS troubleshooting backups 254 buzzer 251 COPY LED 255 domain user 253 domain user share access 254 file access 254 folder access 254 forgot password 251 LED indicato
Index locked 126, 139 name restrictions 45 password 142, 149 RAID 1 153 scan 140 status 134 summary 139 unlock 140, 141, 146 unlocked 126, 139 USB key 142, 143, 149 W warranty 354 period 354 web browsers share access tutorial 62 supported 261 Web Configurator 35 browsers 35 logout 38, 49 troubleshooting access 252 web help 48 icon 38 web security 75 Windows 31 Windows domain administrator 167 administrator password 168 leave 168 security mode 165 Windows Explorer 61 workgroup 177, 258 workgroup security m