User's Manual

Table of Contents
NSA-2401 User’s Guide
15
9.5 Backup Software Screen ................................................................................................... 220
Chapter 10
Application Screens .............................................................................................................223
10.1 Overview .......................................................................................................................... 223
10.1.1 What You Can Do In The Application Screens ....................................................... 223
10.1.2 What You Need to Know About The Application Screens ...................................... 223
10.2 FTP .................................................................................................................................. 224
10.3 Print Server ...................................................................................................................... 226
10.3.1 Print Server Rename .............................................................................................. 226
10.4 Copy Button ..................................................................................................................... 227
10.4.1 Changing the Copy Button Share .......................................................................... 227
Chapter 11
Maintenance Screens ..........................................................................................................229
11.1 Overview .......................................................................................................................... 229
11.1.1 What You Can Do In The Maintenance Screens .................................................... 229
11.1.2 What You Need to Know About The Maintenance Screens ................................... 229
11.2 Log .................................................................................................................................. 230
11.2.1 Search .................................................................................................................... 232
11.2.2 Log Records Configuration ..................................................................................... 232
11.2.3 Log Buzzer Priority Configuration ........................................................................... 233
11.2.4 Report Configuration .............................................................................................. 233
11.2.5 Export Log ..............................................................................................................236
11.3 Configuration .................................................................................................................... 237
11.3.1 Restoring the Configuration File ............................................................................. 238
11.4 SSL .................................................................................................................................. 239
11.5 Firmware Upgrade ........................................................................................................... 241
11.6 Power Management ......................................................................................................... 242
11.6.1 Power Control Schedule ......................................................................................... 244
11.7 Shutdown ......................................................................................................................... 245
Part III: Troubleshooting and Specifications..................................... 247
Chapter 12
Troubleshooting...................................................................................................................249
12.1 Troubleshooting Overview ............................................................................................... 249
12.2 Power, Hardware Connections, and LEDs ...................................................................... 249
12.3 NSA Login and Access ................................................................................................... 251
12.4 Users Cannot Access the NSA ........................................................................................ 253
12.5 Backups and Snapshots .................................................................................................. 254