background image

 

www.zyxel.com

NSA-2401

Network Storage Appliance

User’s Guide

Version 1.00
11/2008
Edition 1

DEFAULT LOGIN

LAN1 IP Address

192.168.1.3

LAN2 IP Address

192.168.100.3

Username

admin

Password

1234

Summary of Contents for NSA-2401

Page 1: ...www zyxel com NSA 2401 Network Storage Appliance User s Guide Version 1 00 11 2008 Edition 1 DEFAULT LOGIN LAN1 IP Address 192 168 1 3 LAN2 IP Address 192 168 100 3 Username admin Password 1234...

Page 2: ......

Page 3: ...r Online Help Embedded web help for descriptions of individual screens and supplementary information Supporting Disk Refer to the included CD for support documents ZyXEL Web Site Please refer to www z...

Page 4: ...denoted by square brackets and uppercase text for example ENTER means the enter or return key on your keyboard Enter means for you to type one or more characters and then press the ENTER key Select or...

Page 5: ...401 User s Guide 5 Icons Used in Figures Figures in this User s Guide may use the following generic icons The NSA icon is not an exact representation of your device NSA Computer Notebook computer Serv...

Page 6: ...power adaptor or cord for your device Connect the power adaptor or cord to the right supply voltage for example 110V AC in North America or 230V AC in Europe Do NOT allow anything to rest on the powe...

Page 7: ...Safety Warnings NSA 2401 User s Guide 7...

Page 8: ...Safety Warnings NSA 2401 User s Guide 8...

Page 9: ...eb Configurator 35 Tutorials 55 Web Configurator 115 Status Screen 117 System Setting Screen 121 Storage Screens 125 Network Screens 159 Sharing Screens 173 Protect Screens 195 Application Screens 221...

Page 10: ...Contents Overview NSA 2401 User s Guide 10...

Page 11: ...Button 33 1 1 3 COPY Button 33 Chapter 2 Introducing the Web Configurator 35 2 1 Web Configurator Overview 35 2 2 Accessing the NSA Web Configurator 35 2 2 1 Access the NSA Using the NDU 35 2 2 2 Web...

Page 12: ...3 5 1 Configuring Security for Web Configurator Sessions 68 3 5 2 Using FTPS to Connect to the NSA 81 3 5 3 Controlling Access to Shares Folders and Files 83 3 6 Power Resume 89 3 7 How to Use Backup...

Page 13: ...129 6 4 Arrays 132 6 4 1 RAID Levels 132 6 4 2 Array Status 134 6 5 RAID Screen 135 6 5 1 Creating a New RAID 138 6 6 Internal Volume Screen 139 6 6 1 Creating or Editing an Internal Volume 142 6 6 2...

Page 14: ...ies 178 8 2 2 View User Information 181 8 3 Groups 182 8 3 1 Add a New Local Group Change Group Properties 184 8 4 Shares 186 8 4 1 Create a New Share Edit a Share 188 8 4 2 ACL Configuration 190 8 4...

Page 15: ...Screens 227 11 1 2 What You Need to Know About The Maintenance Screens 227 11 2 Log 228 11 2 1 Search 230 11 2 2 Log Records Configuration 230 11 2 3 Log Buzzer Priority Configuration 231 11 2 4 Repo...

Page 16: ...ecification Tables 257 13 3 Power Consumption 259 Part IV Appendices and Index 261 Appendix A Log Messages 263 Appendix B Setting Up Your Computer s IP Address 273 Appendix C Importing Certificates 29...

Page 17: ...re 16 Navigation Panel Links 49 Figure 17 Reset and Reload Timeline 53 Figure 18 Administrator Login 56 Figure 19 My NSA 56 Figure 20 Sharing Users 57 Figure 21 Sharing Users Create a New Account 57 F...

Page 18: ...77 Figure 58 Firefox Add Security Exception 77 Figure 59 Firefox Add Security Exception 78 Figure 60 Firefox Add Security Exception 79 Figure 61 Firefox Add Security Exception 80 Figure 62 HTTPS Login...

Page 19: ...indows Explorer 105 Figure 102 Printer Connected to NSA Windows Explorer Warning 105 Figure 103 Printer Driver Needed 105 Figure 104 Applications Print Server 106 Figure 105 Printer Screen in Windows...

Page 20: ...42 Link Aggregation Teaming Mode 161 Figure 143 Jumbo Frames 162 Figure 144 Network TCP IP 163 Figure 145 Active Directory Example Application 166 Figure 146 Network Windows CIFS Workgroup 166 Figure...

Page 21: ...Applications Copy Button 225 Figure 189 Applications Copy Button Edit 226 Figure 190 Maintenance Log 228 Figure 191 Maintenance Log 229 Figure 192 Maintenance Log Log Classes 229 Figure 193 Maintenanc...

Page 22: ...84 Figure 230 Mac OS X 10 5 Systems Preferences 284 Figure 231 Mac OS X 10 5 Network Preferences Ethernet 285 Figure 232 Mac OS X 10 5 Network Preferences Ethernet 286 Figure 233 Mac OS X 10 5 Network...

Page 23: ...2 Tools Menu 307 Figure 271 Firefox 2 Options 307 Figure 272 Firefox 2 Certificate Manager 308 Figure 273 Firefox 2 Select File 308 Figure 274 Firefox 2 Tools Menu 309 Figure 275 Firefox 2 Options 30...

Page 24: ...List of Figures NSA 2401 User s Guide 24...

Page 25: ...Storage Internal Storage Status 127 Table 20 Storage Internal Storage Disk Icons 129 Table 21 Storage Internal Storage Disk 129 Table 22 Storage Internal Storage Disk S M A R T Brief Summary 130 Tabl...

Page 26: ...0 Table 61 Sharing Shares Create a New Share Share Access Configuration 190 Table 62 Sharing Shares ACL Configuration New ACL Configuration Icons 191 Table 63 Sharing Shares Create a New Share Share A...

Page 27: ...Log Log Config Log Records Configuration 231 Table 97 Maintenance Log Log Config Buzzer Priority 231 Table 98 Maintenance Log Log Report Configuration Mail Setting 232 Table 99 Maintenance Log Log Rep...

Page 28: ...List of Tables NSA 2401 User s Guide 28...

Page 29: ...29 PART I Introduction and Tutorials Getting to Know Your NSA 31 Introducing the Web Configurator 35...

Page 30: ...30...

Page 31: ...The NSA s SATA II Serial Advanced Technology Attachment hard disk serial links are compatible with all major hard drive manufacturers RAID Redundant Array of Independent Disks protects your data even...

Page 32: ...hile the firmware update is in progress Table 1 Disk Drive LEDs LED COLOR STATUS DESCRIPTION PWR Green Off The hard disk drive tray is empty or not connected properly On The hard disk drive is connect...

Page 33: ...d files consists of the date and time of the copy in year_month_day_hour_minute_second format SYS Red On The NSA has passed system tests Blinking The NSA is starting up or shutting down Quick blinking...

Page 34: ...Chapter 1 Getting to Know Your NSA NSA 2401 User s Guide 34...

Page 35: ...se Internet Explorer 6 0 Mozilla firefox 1 0 Netscape Navigator 7 0 or later versions of these browsers The recommended screen resolution is 1024 by 768 pixels or higher In order to use the Web Config...

Page 36: ...ess of the NSA If the NSA does not get IP addresses from a DHCP server the default LAN1 IP address is 192 168 1 3 and the default LAN2 IP address is 192 168 100 3 Figure 4 NDA URL 2 3 Login The defaul...

Page 37: ...as shown next Type a new password and retype it to confirm and click Apply or click Skip Figure 6 Change Password Screen The Web Configurator session automatically times out after 15 minutes Simply l...

Page 38: ...ou configure the share and the folder separately You can map a share to a network drive for easy and familiar file transfer for Windows users Table 3 User level Global Labels and Icons LABEL ICON DESC...

Page 39: ...em Share This icon displays for a system share created by the NSA User created Share This icon displays for a user created share External USB Share This icon displays for a share on an external USB de...

Page 40: ...the play icon to play the file At the time of writing this is only for MP3 files Click to the right of a file or folder name to select it Use the SHIFT key to select a range of entries Hold down the...

Page 41: ...to the next higher layer in the share s folder tree Folder Click this icon to browse the folder File Click this icon to select a file Table 6 My NSA Share Browsing LABEL DESCRIPTION Current location...

Page 42: ...n this screen 2 5 3 My NSA Share Configuration Use the My NSA share configuration screens to see and configure share management details Click My NSA and then the Configure button of one of your shares...

Page 43: ...icon followed by the name of the share User This is the icon for the owner of the share Share Browsing Click this icon or link to see and access the share s contents Edit Share Click this icon or lin...

Page 44: ...lowed by a one or two digit number 2 5 4 1 Share Access Configuration This screen allows you to assign permissions to a share Make this share owned by Select an owner for the share Enable this share S...

Page 45: ...11 My NSA Change Share Properties Share Access Configuration LABEL DESCRIPTION Available Users Groups This displays a list of users and groups that have not yet been assigned an authority level for th...

Page 46: ...er length of a name is one character that is a name cannot be blank The maximum character length of share name is 255 characters Unicode is supported for share names although your FTP client must supp...

Page 47: ...you configure the setup wizard the Status screen displays when you enter the advanced administration screens Table 12 Password LABEL DESCRIPTION Account Name Type the user name of the account for whi...

Page 48: ...s The following table describes the global icons and labels 1 2 3 4 Table 13 Global Labels and Icons LABEL ICON DESCRIPTION Language Select the Web Configurator language from the drop down list box He...

Page 49: ...Certain screens also contain hyper links that allow you to jump to another screen Click the Status icon to open the Status screen Figure 16 Navigation Panel Links Home Click this icon to return to the...

Page 50: ...er groups and add group members Shares Create shared folders to which you can allow users and or groups read write access rights Protect Backup Create and manage data backups to an external USB disk d...

Page 51: ...Click this icon to open the Disk Setup Wizard to create a new disk array or volume Eject Select a hard drive and click this icon to shut it down Do this before removing a hard drive to help increase i...

Page 52: ...ear one beep and release it The NSA sounds another single beep after you release the button as confirmation 2 7 2 Reload Factory Default Configuration File Do the following to reload the factory defau...

Page 53: ...NSA 2401 User s Guide 53 Figure 17 Reset and Reload Timeline The NSA automatically restarts to complete reloading the factory default configuration file 0 2 10 Beep Beep Beep Release Release to reset...

Page 54: ...Chapter 2 Introducing the Web Configurator NSA 2401 User s Guide 54...

Page 55: ...ifferent levels of access to individual files and folders hosted on the NSA For example if you intend to use the NSA within a single department you may decide to give all the members of that departmen...

Page 56: ...3 Tutorials NSA 2401 User s Guide 56 1 Log into the Web Configurator using your administrator Username and Password Figure 18 Administrator Login 2 In the My NSA screen click Administration Figure 19...

Page 57: ...e 57 3 Once the Web Configurator workspace appears click Sharing Users to open the user account management area Figure 20 Sharing Users 4 Click Add Account to open the Create a New Account screen Figu...

Page 58: ...y details or identifying information specific to the user account Select the groups to which you want to assign this account Click Apply 5 Repeat these steps for the other user accounts you need 3 2 2...

Page 59: ...gure 23 Sharing Groups Add Share 3 2 3 Setting Up Shares You ve created accounts for Gonzo and Kermit and now you want to create a share for each of them You also have a senior management group You wa...

Page 60: ...it should be on Select Kermit as the owner and set the Share Access to Advanced and click Edit Figure 25 Sharing Shares Add Share 3 Include Senior Management under Full and click Apply This way both...

Page 61: ...e use the shares you have created In this example Gonzo creates a folder named Strategy and puts files named 2009 Plan doc and 2010 2014 Plans doc into it 3 3 1 Using a Share with Windows Explorer Gon...

Page 62: ...an use the share like a drive on his computer Click File New Folder and create a folder named Strategy Figure 30 Creating a Folder 5 Copy and paste the 2009 Plan doc file into the Strategy folder Figu...

Page 63: ...A 2401 User s Guide 63 1 Open Firefox and enter http 192 168 1 35 to open the login screen Enter Gonzo s username and password and clicks Login Figure 32 User Login 2 Click the Gonzo share Figure 33 G...

Page 64: ...Chapter 3 Tutorials NSA 2401 User s Guide 64 3 Open the Strategy share Figure 34 Gonzo Share Screen...

Page 65: ...4 Click Upload Figure 35 Strategy Folder Screen 5 Browse to the 2010 2014 Plans doc file and click Apply Figure 36 Upload Files Screen 3 4 How to Find the NSA in OS X Here s how to find the NSA 2401...

Page 66: ...rials NSA 2401 User s Guide 66 1 Click the Finder icon in the dock Figure 37 Opening the Finder 2 Select All under Shared in the sidebar An entry for the NSA appears in the Network list Figure 38 Disp...

Page 67: ...e beside the NSA s name to display the shares that Gonzo can use Figure 39 Displaying the NSA Alternatively you can also connect directly to the NSA from the Go Menu in the Finder Simply click Go Conn...

Page 68: ...an now access the NSA from the finder or directly from the desktop 3 5 How to Configure Security Use these tutorials to help you secure your NSA See also Chapter 6 on page 125 for details on encryptin...

Page 69: ...SL and then select Edit a self signed CA certificate and click Edit Figure 42 Maintenance SSL 2 Next let s modify the certificate by changing the Common Name to this NSA s IP address of 192 168 1 35 t...

Page 70: ...Chapter 3 Tutorials NSA 2401 User s Guide 70 3 The NSA restarts its network services and returns you to the login screen Figure 44 Maintenance SSL Edit a Self Signed Certificate...

Page 71: ...ownloading and Installing the NSA s Customized Certificate 1 Log in and return to Maintenance SSL Under Modify the Existing Certificate click Download Figure 45 Maintenance SSL 2 Save the file to your...

Page 72: ...le click it Figure 47 Downloading the NSA s Certificate 4 Install the certificate The rest of the steps in this section are an example of installing a certificate in Windows See Appendix C on page 297...

Page 73: ...In the Certificate Import Wizard click Next Figure 49 Certificate Import Wizard Welcome 6 Leave Automatically select certificate store based on the type of certificate selected and click Next Figure...

Page 74: ...ard screen click Finish Figure 51 Certificate Import Wizard Finish 8 If you are presented with another Security Warning click Yes Figure 52 Security Warning 9 Finally click OK when presented with the...

Page 75: ...n your computer you can turn on security for your Web Configurator sessions This example uses Firefox 3 0 See Appendix C on page 297 for more information on browsers and certificates 1 Close your web...

Page 76: ...igure 55 Maintenance SSL Force HTTPS Warning 3 The NSA logs you out and automatically redirects your formerly non secure HTTP connection to a secure HTTPS connection Your browser may give you a warnin...

Page 77: ...Chapter 3 Tutorials NSA 2401 User s Guide 77 4 Click Add Exception Figure 57 Firefox Secure Connection Failed 5 Click Get Certificate Figure 58 Firefox Add Security Exception...

Page 78: ...utorials NSA 2401 User s Guide 78 6 Before you add an exception verify that the device to which you are trying to connect is providing the correct certificate Click View Figure 59 Firefox Add Security...

Page 79: ...7 The SHA1 fingerprint must match the NSA s certificate you downloaded from the NSA to your computer Double click the NSA s certificate file and then click Details and look at the Thumbprint Click Cl...

Page 80: ...Chapter 3 Tutorials NSA 2401 User s Guide 80 8 If the certificate fingerprints match click Confirm Security Exception otherwise click Cancel Figure 61 Firefox Add Security Exception...

Page 81: ...t fingerprint for the NSA s certificate so they can check it before adding a security exception as in steps 6 to 7 on pages 78 to 79 See the next section for how to use FTPS with the NSA for secure FT...

Page 82: ...1 Open FileZilla and click File Site Manager New Site Configure the Host field with the NSA s address Set the Servertype to FTPES FTP over explicit TLS SSL Configure the account name and password Cli...

Page 83: ...e method to let your users know the correct fingerprint for the NSA s certificate so they can check it before adding a security exception 3 5 3 Controlling Access to Shares Folders and Files Gonzo wan...

Page 84: ...Guide 84 2 Set the Share Access to Advanced and click Edit Figure 66 Sharing Shares Edit Share 3 Move Senior Management and Kermit to Read Only Click Apply in this screen and again in the edit screen...

Page 85: ...3 2 Setting the ACL to Deny Access to a File Now you need to stop Kermit from accessing the 2010 2014 Plans file 1 Select the Gonzo share and click ACL Properties Figure 68 Sharing Shares 2 Click New...

Page 86: ...NSA 2401 User s Guide 86 3 Open the Strategy folder Figure 70 Sharing Shares ACL Configuration New ACL 4 Select the 2010 2014 Plans doc file and click Set ACL Figure 71 Sharing Shares ACL Configurati...

Page 87: ...Chapter 3 Tutorials NSA 2401 User s Guide 87 5 Move Gonzo to Deny Figure 72 Sharing Shares ACL Configuration New ACL Strategy Set ACL...

Page 88: ...the Strategy share s ACLs Click Close Figure 74 Sharing Shares ACL Configuration New ACL Strategy You are done configuring the 2010 2014 Plans doc file s ACL settings Only Gonzo can edit or delete th...

Page 89: ...ps and Snapshots Use the NSA s backup and snapshot features to backup your files and folders Do snapshots frequently hourly or daily for example since they are faster than backups Snapshots help prote...

Page 90: ...Chapter 3 Tutorials NSA 2401 User s Guide 90 3 7 1 Creating a Snapshot Job Here s an example of configuring hourly snapshots for a volume 1 Click Protect Snapshot Add Job Figure 76 Protect Snapshot...

Page 91: ...7 2 Configuring Snapshot Image Access Taking a snapshot creates an image file that you use to restore files By default only the administrator can access the snapshot images You want to allow users to...

Page 92: ...e time the snapshot was taken in year month day hour minute second format and the name of the snapshot job The take4_080904160008_hourly_example folder contains a 5yearPlan folder with a 2009 Plan doc...

Page 93: ...and select Synchronization Gonzo wants only his current set of files in the remote NSA s folder so you select Mirror to make the target folder identical to the source folder The NSA deletes any other...

Page 94: ...o share s Strategic Partners folder in this example and Remote Enter the other NSA s address and administrator password Click Show target content to display the remote NSA s contents Select the destin...

Page 95: ...e backed up so leave the compression off Turn on the encryption to protect these sensitive files during the transfer The final files stored on the remote NSA will be unencrypted usable Restrict the ba...

Page 96: ...do not need to use a special restore process to use the files a synchronization backup creates The copy of files that the NSA creates on the other NSA s Backups share can be used directly by anyone wi...

Page 97: ...you need to back up and existing files are not frequently changed so select Incremental The NSA does a full backup first and later only copies source files that are new and or modified since the last...

Page 98: ...the volume1 check box to select all the folders and files Select Remote and enter the other NSA s address username password and share name If you want to make sure the remote NSA is reachable click Te...

Page 99: ...ups Figure 89 Protect Backup Add Job Step 3 5 Set the frequency to Weekly Schedule the backup for 5 00 every Saturday morning Figure 90 Protect Backup Add Job Step 4 3 7 6 Restoring Archived Files by...

Page 100: ...NSA 2401 User s Guide 100 1 Click Protect Backup screen select a backup job and click Restore Archive Figure 91 Protect Backup 2 Select which backup to use and click Next Figure 92 Protect Backup Res...

Page 101: ...rials NSA 2401 User s Guide 101 3 Select the Gonzo share and click Next Figure 93 Protect Backup Restore Archive Step 2 4 Select the original location and click Done Figure 94 Protect Backup Restore A...

Page 102: ...containing the backup job failed you cannot restore archived files by the backup job In this example the NSA s RAID array failed You ve replaced the hard drives and re configured the RAID To restore...

Page 103: ...SA 2401 User s Guide 103 2 Select the backup job and backup time and click Next Figure 97 Protect Restore Step 2 3 Select everything in the Gonzo share except the recycle folder Click Next Figure 98 P...

Page 104: ...Server Tutorial Do the following to configure the NSA to allow computers on your network to share a printer See www zyxel com for a list of compatible printers 1 Make sure the NSA is on and the SYS li...

Page 105: ...on that lets you continue Yes in this example Figure 102 Printer Connected to NSA Windows Explorer Warning 6 If your computer does not already have the printer s driver installed you will need to inst...

Page 106: ...n to open the printer s queue of print jobs Figure 105 Printer Screen in Windows Explorer Repeat steps 4 to 7 on your other computers so they can also use the printer 3 9 How to Increase the NSA s Sto...

Page 107: ...Figure 106 Connecting a USB Hard Drive 2 Click Storage External Volumes and make sure the USB drive displays with a healthy status Figure 107 Storage External Storage Disk The NSA automatically creat...

Page 108: ...1 See the Quick Start Guide for details on installing hard drives in the NSA s bays You can install hard drives while the NSA is operating 2 Click Storage Internal Volumes Disk and make sure the new d...

Page 109: ...the hard drive to the RAID array Continue to Section 3 9 3 on page 109 for how to use the increased storage capacity 3 9 3 Using a Disk Array s Increased Capacity After you increase an array s storag...

Page 110: ...o hard drives of higher capacity Replace one hard drive at a time and recover the RAID before you go on to replace another hard drive For optimal performance and RAID storage capacity use hard drives...

Page 111: ...igure 114 Storage Internal Storage Disk 2 Click Apply Figure 115 Storage Internal Storage Disk Eject 3 Remove the hard drive The NSA sounds an audible alarm 4 Log out of the Web Configurator and then...

Page 112: ...example it s in disk drive bay 2 7 The NSA automatically repairs a degraded RAID if you insert an empty disk without an existing file system Otherwise after you insert a disk you must go to the Storag...

Page 113: ...shows up as Healthy reboot the NSA Then you can use the same process to migrate any or all of the RAID s drive as long as you replace them one by one and recover the RAID after each replacement When...

Page 114: ...Chapter 3 Tutorials NSA 2401 User s Guide 114...

Page 115: ...115 PART II Web Configurator Status Screen 117 System Setting Screen 121 Storage Screens 125 Network Screens 159 Sharing Screens 173 Protect Screens 195 Application Screens 221 Maintenance Screens 227...

Page 116: ...116...

Page 117: ...ee after you log into the Web Configurator and complete the wizard for the first time It provides an overview of your NSA s status settings and activity Once you leave the screen you can return to it...

Page 118: ...an be fixed Data access may be slower from a degraded array so it s recommended that you replace the faulty disk and repair the array as soon as you can Down Indicates that a disk array is down and ca...

Page 119: ...power failure when the UPS stops supplying power The NSA uses power from the normal power source again when its power returns The APC UPS battery is recharged then too System Information Server Name...

Page 120: ...NSA can read the volume but that it wasn t created by the NSA Disk Usage This shows total disk size the percentage of the external USB volume being used and the percentage that is available Active Ses...

Page 121: ...bes the labels in this screen Table 18 System Setting Date Time LABEL DESCRIPTION Current Time This field displays the time according to the NSA Current Date This field displays the date according to...

Page 122: ...d States starts using Daylight Saving Time at 2 A M local time So in the United States you would use March Second Sunday at 2 00 Daylight Saving Time starts in the European Union on the last Sunday of...

Page 123: ...The NSA is shut down often The NSA internal battery keeps time when the NSA is shut down and this may cause possible variance A power surge occurs The NSA gives no warning if time lag occurs You shou...

Page 124: ...Chapter 5 System Setting Screen NSA 2401 User s Guide 124...

Page 125: ...o Know About Storage Disks Disks are the physical storage drives you use with the NSA Internal storage is the hard drives you install inside the NSA External storage is USB connected drives RAIDs A ha...

Page 126: ...nce a volume is locked no one can use it until an administrator unlocks it The NSA does not take snapshots of a locked volume See Chapter 9 on page 195 for more on snapshots Degraded Arrays A degraded...

Page 127: ...and their capacity The name and capacity of each volume in the array Disk This represents the internal physical hard drives Used Space This represents how much of a volume s capacity is currently fill...

Page 128: ...tore all original data in that array If you use a bigger disk the extra space on the disk will not be used The NSA automatically repairs a degraded RAID if you insert an empty disk without an existing...

Page 129: ...e data to be lost S M A R T Select a hard drive and click this icon to display details about the drive and its status The S M A R T Self Monitoring Analysis and Reporting Technology monitoring system...

Page 130: ...rs of the hard drive s health or performance Device Model This field displays the hard drive model number that uniquely identifies a hard drive Serial Number This field displays this individual hard d...

Page 131: ...ways mapped so higher values are better Compare this with the threshold value Worst This is the hard drive s worst recorded normalized value for this attribute Compare this with the threshold value Th...

Page 132: ...disk size 100 GB and the remaining space 300 GB is unused 6 4 1 RAID Levels The type of array you use depends on how many disks you have and how many arrays you want to create Consider this carefully...

Page 133: ...0 or RAID 1 With two disks you could create one or two JBOD arrays JBOD gives flexibility and maximum disk space usage You can later add another disk to your JBOD array without having to re create sh...

Page 134: ...d protection against up to one disk failure RAID 5 uses 75 of the available space for your data All data can be recovered if one disk fails If two disks fail then all data in the array is lost If one...

Page 135: ...it When you add a disk to a three disk RAID 5 array the NSA reshapes it into a four disk RAID 5 array Resynchronizing or reshaping an array is done block by block so the time it takes depends on the...

Page 136: ...can create a new disk array Rename Select a hard drive array and click this icon to change the array s name Delete Select a hard drive array and click this icon to remove the array You must remove all...

Page 137: ...lick this icon You can add a disk to increase an array s capacity or to use as a hot spare standby When you add a disk to an existing array you do not have to re create shares access rights and so on...

Page 138: ...ection 6 4 2 on page 134 If an array is degraded click the Repair icon after you have replaced the faulty disk Table 26 Storage Internal Storage RAID LABEL DESCRIPTION Label This field shows the name...

Page 139: ...JBOD or RAID 0 if you want maximum capacity and or maximum speed for your disks and or you have other means of protecting your data Use RAID 1 to mirror primary data to another disk s with high perfo...

Page 140: ...e Click this icon to open a screen where you can create a new storage volume Edit Select a volume and click this icon to modify it s settings Delete Select a volume s and click this icon to remove the...

Page 141: ...ord click Password Prompt to display the hint you configured to help you remember it If the USB device containing the volume s key is already inserted remove it and re insert it Sort Click a column s...

Page 142: ...USB key make sure you create backup copies when you create the USB key You can only create USB key backup copies when you are creating the USB key Do not use the USB key for anything else do not stor...

Page 143: ...e NSA create a password for the volume and store the password on a connected USB device Later if the volume is locked the NSA automatically unlocks it when you insert the USB key At start up if a USB...

Page 144: ...SB Key Strongly Recommended Use these screens to create extra copies of your USB key in case one is lost damaged or stolen Without a USB key you cannot access the volume if it becomes locked All of th...

Page 145: ...eating a Duplicate USB Key Insert After the duplicate USB key creation completes you return to the first USB key duplication screen see Figure 133 on page 145 so you can make another 6 7 External Stor...

Page 146: ...ted device and click this icon to be able to remove the device Locate Select a USB connected device and click this icon to have the device s LED flash so you can identify it Sort Click a column s head...

Page 147: ...odify it s settings Scan Select a volume and click this icon to check the volume s file consistency Note If you have the NSA automatically attempt to repair any damaged files it finds during the scan...

Page 148: ...olume again If the USB device containing the volume s key is already inserted remove it and re insert it Sort Click a column s heading cell to sort the table entries by that column s criteria Click th...

Page 149: ...each volume use a unique name Acceptable characters are all alphanumeric characters and spaces _ underscores and periods The first character must be alphanumeric A Z 0 9 The last character cannot be...

Page 150: ...rd The password fields display if you choose to encrypt the volume by manually entering a password Enter a password for encrypting the volume Password Confirm Re type the password to make sure you ent...

Page 151: ...arity In mirroring 50 of the drives in the array are reserved for duplicate data Parity is another way to allow data recovery in the event of disk failure using calculations rather than duplicating th...

Page 152: ...ta redundancy so if one disk fails the entire array will be lost The major benefit of RAID 0 is performance The following figure shows two disks in a single RAID 0 array Data can be written and read a...

Page 153: ...GB and the remaining space 50 GB is unused Typical applications for RAID 1 are those requiring high fault tolerance without need of large amounts of storage capacity or top performance for example ac...

Page 154: ...RAID 5 array is the smallest disk in the RAID set multiplied by one less than the number of disks in the RAID set For example if you have four disks of sizes 150 GB 150 GB 200 GB and 250 GB respective...

Page 155: ...Total number of reallocated sectors on the hard drive When the hard drive detects a read write verification error it marks the sector as reallocated and transfers the data to a specially reserved spa...

Page 156: ...f the sector is later successfully written or read this value decreases and reallocation is not performed Only failed write attempts cause a reallocation not read errors This can be difficult to test...

Page 157: ...operated under data load this requires movement of the magnetic head armature 223 Load Unload Retry Count This is how many time the magnetic head has changed position 224 Load Friction Low This is res...

Page 158: ...Chapter 6 Storage Screens NSA 2401 User s Guide 158...

Page 159: ...ccess the NSA 7 1 2 What You Need to Know About the Network Screens Teaming Mode The teaming mode sets how the NSA s two Gigabit Ethernet interfaces behave They can act independently one can back up t...

Page 160: ...s in order to share files across the network CIFS runs over TCP IP but uses the SMB Server Message Block protocol found in Microsoft Windows for file and printer access therefore CIFS will allow all a...

Page 161: ...greater bandwidth Both interfaces use the same IP address and MAC address It also includes fault tolerance and load balancing Connect LAN1 and LAN2 to the same Ethernet switch The switch must also ha...

Page 162: ...and set to 9KB frames This means the computer notebook computer and switch must also have jumbo frames enabled and be capable of supporting 9KB frames Figure 143 Jumbo Frames 7 2 1 Configuring the TCP...

Page 163: ...thernet interfaces on the same subnet with the same IP address The NSA distributes the traffic load across both interfaces Link Aggregation Select this option to use IEEE 802 3ad port link aggregation...

Page 164: ...r IP address es into the fields below Primary DNS Server Type a primary DNS server IP address Secondary DNS Server Type a secondary DNS server IP address Jumbo Frames Jumbo frames improve network perf...

Page 165: ...server directory and the NSA checks this list when authenticating users and or groups that seek access to a share This is suitable for a large number of CIFS users where accounts are stored on an ext...

Page 166: ...NSA 2401 User s Guide 166 Figure 145 Active Directory Example Application 7 3 1 Windows CIFS Screen Click Network Windows CIFS to display this screen Figure 146 Network Windows CIFS Workgroup LAN1 US...

Page 167: ...mmon directory database Domain users and groups are created on a centralized Windows based domain controller Select either Workgroup or Domain from the drop down list box This field becomes read only...

Page 168: ...ptions for having the NSA exit the domain Select Gracefully Leave Domain to have the NSA notify the Windows server domain controller that the NSA is leaving the domain You must also enter the Windows...

Page 169: ...and click this icon to remove the share Sort Click a column s heading cell to sort the table entries by that column s criteria Click the heading cell again to reverse the sort order Status This icon...

Page 170: ...47 Network NFS Add NFS Share LABEL DESCRIPTION Volume Name Select the volume upon which you want to create the NFS enabled share Share Name Enter the name of the shared folder The text may consist of...

Page 171: ...ction to the NSA NFS Share Path This displays the complete location of the NFS share in the NSA Username This displays the name of the user connected to the NSA Connected At This displays the date and...

Page 172: ...Chapter 7 Network Screens NSA 2401 User s Guide 172...

Page 173: ...domain user or group is created on a centralized Windows based domain controller This list is used by the NSA when authenticating accounts and or groups that seek access to a share If a user belongs...

Page 174: ...al volumes Furthermore with the assistance of a logical volume manager a logical volume can actually span multiple physical hard disk drives Logical Volume Manager A logical volume manager is tool tha...

Page 175: ...Users to open this screen where you can create and manage user accounts for the NSA s file services Figure 151 Sharing Users The following table describes the icons in this screen Table 49 Sharing Use...

Page 176: ...ndicates a domain user account in conflict See Section 8 2 0 1 on page 177 for more information Table 50 Sharing Users LABEL DESCRIPTION Display Number Set the number of user accounts displayed per pa...

Page 177: ...an the two users are treated as two distinct users Therefore each user can only access shares to which they have been given access rights However if the domain user s password and local user s passwor...

Page 178: ...A system See Section 8 2 1 1 on page 179 for more details on account names Password Create a password associated with this account The text may consist of up to 14 letters numerals and any printable c...

Page 179: ...or domain account Other reserved user names that are not allowed are bin daemon ftp anonymous nobody root pc guest Group Membership Choose the groups to which you want to assign this account You can...

Page 180: ...hange their passwords themselves by logging into the NSA Web Configurator using the username and password as defined in the Create New Account screen After logging in select the Password tab in the ac...

Page 181: ...st and Group List Figure 155 Sharing Users User Information The following table describes the labels in this screen Table 52 Sharing Users User Information Quota List LABEL DESCRIPTION User Name Displ...

Page 182: ...Add Group Click this icon to open the Add a New Local Group screen where you can add new local groups See Section 8 3 1 on page 184 for details Search Click this icon to display the search filters wh...

Page 183: ...ler that is in conflict with a local group created on the NSA Table 54 Sharing Groups LABEL DESCRIPTION Display Number Set the number of groups displayed per page Go to Page Select a page number of us...

Page 184: ...s field displays the group name Table 54 Sharing Groups continued LABEL DESCRIPTION Table 55 Sharing Groups Add a New Local Group LABEL DESCRIPTION Group Name Enter a local group name The text may con...

Page 185: ...If you enter a group bob but use BOB when connecting via CIFS or FTP it will use the account settings used for bob The group name cannot be EVERYONE nor be the same as an existing local or domain gro...

Page 186: ...n the Add Share screen where you can create new shares See Section 8 4 1 on page 188 for details Recycle Bin Click this icon to open the Recycle Bin Configuration screen See Section 8 4 3 on page 193...

Page 187: ...lable Share Indicates the share can be used for file and folder management Unavailable Share Indicates the share cannot be used because the NSA cannot find the physical location of the share Disabled...

Page 188: ...elect this to activate the share Enable Action Log Select to keep a log of all actions performed on files folders in the share These actions include whenever anyone adds or removes a folder and reads...

Page 189: ...EL DESCRIPTION Available Users Groups This displays a list of users and groups that have not yet been assigned an authority level for the share You can assign users and groups by selecting them and cl...

Page 190: ...New ACL Click this icon to open the New ACL Configuration screen See Section 8 4 2 1 on page 191 for details Modify ACL Click this icon to open the ACL Permission screen See Section 8 4 2 2 on page 1...

Page 191: ...no ACL permission set Restricted Folder This is a folder that has ACL permissions set Unrestricted File This is a file that has no ACL permissions set Restricted File This is a file that has its ACL...

Page 192: ...der if the selected item is a folder If you clear this option the NSA still applies the permission settings to any directories and files under this folder that do not have other ACL settings Available...

Page 193: ...rights to these type shares See Section 8 4 2 2 on page 192 for details on permissions 8 4 3 Recycle Bin Click Sharing Shares Recycle Bin to open the following screen Use this screen to set up how th...

Page 194: ...igure 165 Sharing Shares DFS The following table describes the labels in this screen Table 66 Sharing Shares DFS LABEL DESCRIPTION Link Name Enter a name for the new DFS link The text may consist of l...

Page 195: ...iles incorrectly deleted or modified Create regular snapshots recommended for volumes with data that changes often Use anti virus software on your computer to scan files from others before saving them...

Page 196: ...guration file If you forgot the NSA password then reset the device to go back to the factory default configuration Configuration File Backup and Restoration does not affect disk arrays volumes or data...

Page 197: ...ails Snapshots Versus Backups See Section 9 2 on page 198 for more information on backups 1 A snapshot only records changes to files within a volume so it s faster and takes up less space than a backu...

Page 198: ...f not enough space is available it issues a log or alert to tell you that the backup failed due to lack of space and deletes any files already transferred A full backup copies all files from your NSA...

Page 199: ...s Select a backup job s and click this icon to remove the job s This does not delete any backup files the backup job has already created Execute Job Now Select a backup job and click this icon to have...

Page 200: ...heading cell again to reverse the sort order Table 69 Protect Backup LABEL DESCRIPTION Status This field shows whether the backup job is currently running or waiting to run The percent complete also d...

Page 201: ...ll of the source files at each backup This provides the most protection but also requires the most storage space Incremental copies only source files that are new and or modified since the last backup...

Page 202: ...Chapter 9 Protect Screens NSA 2401 User s Guide 202 9 2 2 1 Creating a Backup Job Step 2 Figure 168 Protect Backup Add Step 2...

Page 203: ...to display Note If you select to back up an entire folder and then de select a sub folder or file within that folder the main folder icon will turn and any new sub folders and files added to this mai...

Page 204: ...although it also consumes more of the NSA s CPU s computing power With compression enabled the transfer of the backup file is faster However restoring may be slower If backup space is not a concern a...

Page 205: ...xisted only in those previous backups Select this if backup space is limited and recovery of old files is not important Keep Backups for ___ day s Backups older than the number of days you enter here...

Page 206: ...d only Job Description Type from 0 to 60 characters to further describe this backup Backup Type This field displays what kind of backup is to be performed It is read only Source folder s file s Specif...

Page 207: ...s files accordingly before backup takes place If space on the backup NSA or disk is a concern then configure the NSA to delete old backups Keep All Old Backups Purge is in effect disabled Select this...

Page 208: ...ckup job Job Description This is some extra descriptive text on the backup Backup type This displays what kind of backups the job creates Scheduler Information This field displays the backup s frequen...

Page 209: ...wing table describes the labels in this screen 9 2 4 2 Restoring a Backup Step 3 Figure 175 Protect Backup Restore Archive Step 3 Table 77 Protect Backup Restore Archive Step 2 LABEL DESCRIPTION Folde...

Page 210: ...ocation Select this option to restore the files to the place from which they were copied Other Location Select this option to restore the files to somewhere other than the place from which they were c...

Page 211: ...ls in this screen Table 80 Protect Restore Step 2 LABEL DESCRIPTION Select Restore Point Select to which backup job and backup time you want to return The NSA restores the files included in the backup...

Page 212: ...re 178 Protect Restore Step 3 The following table describes the labels in this screen Table 81 Protect Restore Step 3 LABEL DESCRIPTION Folder Chooser Select the folders you want to restore previous C...

Page 213: ...ller So it s better to leave enough unused space on a disk array when creating volumes 5 If the disk array containing the snapshots fails then the snapshots are lost 6 The NSA does not take snapshots...

Page 214: ...more data is being written it may cause the snapshot image size to increase beyond it s original size in this case all the snapshots on the volume will need to expand to accommodate the extra data If...

Page 215: ...default The administrator can change the snapshot share s share permissions By Share Permission Access each volume s snapshots in a share in the volume Users with read access to the share can also re...

Page 216: ...the maximum number of snapshots allowed in the NSA You can only create one snapshot job per volume Figure 181 Protect Snapshot Add Job Table 84 Protect Snapshot Snapshot Jobs LABEL DESCRIPTION Status...

Page 217: ...are already created on the NSA are available Note You can only create one snapshot job per volume A snapshot must be done on a complete volume and not a single file or folder However you can restore...

Page 218: ...e Backup Manager on page 196 Table 86 Protect Snapshot Snapshot Images Icons ICON DESCRIPTION Delete Selected Images Select a snapshot image s and click this icon to remove the image s Sort Click a co...

Page 219: ...Chapter 9 Protect Screens NSA 2401 User s Guide 219 Figure 183 Protect Backup Software...

Page 220: ...Chapter 9 Protect Screens NSA 2401 User s Guide 220...

Page 221: ...works See Section 10 4 on page 225 for details 10 1 2 What You Need to Know About The Application Screens FTP File Transfer Protocol File Transfer Protocol FTP is a file transfer service that functio...

Page 222: ...printed out until the printer becomes free The NSA can act as a print server Figure 184 Printer Sharing 10 2 FTP Click Applications FTP to open this screen and configure settings for transferring file...

Page 223: ...n can be idle before being disconnected by the NSA Enable Anonymous FTP Access Select this to allow any user to log into the NSA using FTP or anonymous as a username and no password Any other name is...

Page 224: ...s This fields shows whether the printer is connected and turned on on line or not off line Name This identifies the printer Each printer connected to the NSA must use a unique name Actions Rename Clic...

Page 225: ...pplications Print Server Rename LABEL DESCRIPTION Name Type a new name to identify the printer The name must be unique from all the other names of printers connected to the NSA Apply Click this to sav...

Page 226: ...dit LABEL DESCRIPTION Status This column displays whether the share is Available Unavailable or Disabled Share Type This displays whether the share is created by the system or by the administrator Sha...

Page 227: ...lity an unauthorized party cannot read the transferred data authentication one party can identify the other party and data integrity you know if data has been changed Public Key Certificate Public key...

Page 228: ...gs Figure 190 Maintenance Log The following table describes the icons in this screen Table 94 Maintenance Log Icons ICON DESCRIPTION Refresh Click this icon to update the log display Search Click this...

Page 229: ...cy Alert Critical Error Warning Notice and Info Message This displays a description of the log Click the top of the column to sort by alphabetical or reverse alphabetical order Display Number Set the...

Page 230: ...esults according to the log type selected The default setting is View All Logs Severity This filters search results according to the severity rating selected When you select a severity the NSA searche...

Page 231: ...og Log Config Log Records Configuration LABEL DESCRIPTION Log Reserve Time Set the number of months up to 10 to keep the logs stored on the NSA Save Log to Select a user account on whose share you wan...

Page 232: ...Email Server Enter the SMTP server the NSA will use to send the e mail Email Format Select whether to send e mails as HTML or as plain text Use SMTP Authentication Check this option if your SMTP mail...

Page 233: ...g mail alerts Alerts are issued when a critical or system event requires immediate attention See Section 11 2 0 1 on page 229 for information on the different log classes Report Time Set the frequency...

Page 234: ...file as a CSV Comma Separated Value file type which is compatible with Microsoft Excel and other spreadsheet software Table 100 Maintenance Log Log Report Configuration Syslog Server Setting LABEL DES...

Page 235: ...AN and then click the Restore button If any users are connected at the time you are presented with a warning screen Figure 200 Maintenance Configuration Warning Table 101 Maintenance Configuration LAB...

Page 236: ...1 Maintenance Configuration Restarting Table 102 Maintenance Configuration LABEL DESCRIPTION Type Indicates the kind of connection the user has to the NSA Share Name Indicates the share to which the u...

Page 237: ...User s Guide 237 11 4 SSL Click Maintenance SSL to open this screen where you can turn on HTTPS create a public key certificate or upload a public key certificate that was issued by a known certifica...

Page 238: ...y of the NSA s public key certificate to your local computer This is useful for installing the certificate without having to connect to the NSA or for sending by email to other users for them to insta...

Page 239: ...domain name if you want to use this for the common name Organizational Unit Optional Enter this name of the organizational unit which owns or maintains the NSA This is an optional field Organization...

Page 240: ...you can set the NSA s power management settings Table 105 Maintenance FW Upgrade LABEL DESCRIPTION Firmware File Enter the location of the firmware file you want to upload Browse Click this open a Bro...

Page 241: ...ty When you use an APC Uninterruptible Power Supply UPS with a USB connection to the NSA the NSA shuts itself down if the APC UPS s battery charge gets down to the percentage you specify in this field...

Page 242: ...A operating as much of the time as possible The NSA restarts automatically even if it was turned off when the power failed Always Power Off Select this option to keep the NSA from automatically restar...

Page 243: ...to remove a power control schedule from the list Add Power Control Schedule Use this part of the screen to configure power on power off and reboot times Type Select whether this power control schedule...

Page 244: ...Apply to continue or Cancel to abort the process Figure 208 Maintenance Shutdown Confirm Restart When you click the Shutdown button a pop up screen appears asking you to confirm Click Apply to continu...

Page 245: ...245 PART III Troubleshooting and Specifications Troubleshooting 247 Product Specifications 255...

Page 246: ...246...

Page 247: ...ptor or cord is connected to the NSA and plugged in to an appropriate power source Make sure the power source is turned on Turn the NSA off and on Disconnect the power cord for at least 10 seconds Rec...

Page 248: ...rectly in the disk tray Push the tray back into NSA disk bay until it snaps into place and push the latch up see the NSA Quick Start Guide the hard disk is not faulty You could either try a different...

Page 249: ...an audible alarm to warn you Log into the Web Configurator You will be presented with a screen that displays the log and lets you disable the buzzer 12 3 NSA Login and Access V I forgot the IP address...

Page 250: ...the default LAN2 IP address If you changed the IP address use the new IP address If you changed the IP address and have forgotten it see the troubleshooting suggestions for I forgot the IP address fo...

Page 251: ...lder of another parent share Check that the parent share s access rights do not conflict with the subfolder share It is recommended that you do not create subfolder shares Check if the user belongs to...

Page 252: ...ou re backing up to another NSA another NSA or a computer check that it allows the NSA to write files to it For a synchronization backup the target must be another NSA or another compatible model Chec...

Page 253: ...heck that the correct time is configured on the NSA Check that the NSA is able to access the time server from which it gets the time see Chapter 5 on page 121 12 6 External USB Disks V The COPY LED is...

Page 254: ...Chapter 12 Troubleshooting NSA 2401 User s Guide 254...

Page 255: ...ed data transfer Serial ATA also allows more efficient internal airflow and also smaller chassis design Hot Swappable Hard Drives You can remove and install hard drives while the NSA is operating Buzz...

Page 256: ...2 can backup LAN1 If LAN1 loses its connection LAN2 takes over LAN1 s IP address and traffic IEEE 802 3d Ethernet Load Balance The NSA can distribute the traffic load across LAN1 and LAN2 HTTP HTTPS A...

Page 257: ...an error occurs or as a scheduled log summary Table 110 Firmware Features continued Table 111 NSA Hardware Specifications LAN1 IP Address 192 168 1 3 if the NSA cannot get an IP address from a DHCP s...

Page 258: ...wire Ethernet cable for Gigabit connections Table 112 NSA Firmware Specifications File Storage System SINGLE RAID 0 1 5 Network Protocols TCP IP UDP IP DHCP Client FTP HTTP HTTPS File Management Dist...

Page 259: ...a Web Configurator HTTP Secure Remote Management via Web Configurator HTTPS NSA Discovery Utility NDU E mail alerts Logging Monitoring Centralized Logs Firmware Upgrade Web Configurator Web Browsers S...

Page 260: ...Chapter 13 Product Specifications NSA 2401 User s Guide 260...

Page 261: ...261 PART IV Appendices and Index Log Messages 263 Setting Up Your Computer s IP Address 273 Importing Certificates 297 Open Source Licences 321 Legal Information 351 Customer Support 353 Index 359...

Page 262: ...262...

Page 263: ...INFO Join domain 0 type 1 success Domain Name Domain Type CIFS domain INFO Leave Domain success CIFS domain INFO Import Domain User and Group success 0 user s 1 group s It took 2 seconds number of dom...

Page 264: ...ICE Add new group 0 Group Name CIFS group NOTICE Delete group 0 Group Name COPY BTN NOTICE Copy Button Can not get configuration for Copy Button COPY BTN NOTICE Copying content of 0 to 1 Start USB Int...

Page 265: ...JOB name Scheduler ERR Job 0 is resulted as failed JOB name Scheduler INFO Job 0 is is finished successfully JOB name Scheduler INFO Job 0 is canceled by user JOB name Scheduler INFO Restore job 0 is...

Page 266: ...is plugged Storage Disk INFO Disk 0 is unplugged Storage Disk INFO An external Mass Storage device is plugged Storage Disk INFO An external Mass Storage device is unplugged Storage RAID INFO Create R...

Page 267: ...ESS Volume Name Size Storage Volume INFO Create Internal Crypto Volume 0 Size 1 MB using PASSWD SUCCESS Volume Name Size Storage Volume INFO Create Internal Crypto Volume 0 using USB Key Size 1 MB SUC...

Page 268: ...nly read write operation SUCCESS Storage Volume INFO Cancel Internal Volume Scan SUCCESS Storage Volume INFO Scan External Volume SUCCESS Storage Volume INFO Cancel External Volume Scan SUCCESS Storag...

Page 269: ...nal Volume FAILED Storage Volume CRIT Unlock External Volume FAILED Storage Volume CRIT Change External Crypto Volume Password Prompt to 0 FAILED New Password Prompt Storage Volume CRIT Change Externa...

Page 270: ...ged USB NOTICE An external Printer device is plugged USB NOTICE An external Printer device is unplugged USB NOTICE An external USB hub device is plugged USB NOTICE An external USB hub device is unplug...

Page 271: ...NFO Certficate is imported successfully SSL NOTICE The public key in 0 doesn t match the public key of Certificate Request on system File Name SSL NOTICE There is not any Certificate Request and priva...

Page 272: ...Appendix A Log Messages NSA 2401 User s Guide 272...

Page 273: ...cate with the other devices on your network Windows Vista XP 2000 Mac OS 9 OS X and all versions of UNIX LINUX include the software components you need to use TCP IP on your computer If you manually a...

Page 274: ...s XP NT 2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT 1 Click Start Control Panel Figure 211 Windows XP Start Menu 2 In the Con...

Page 275: ...e 275 3 Right click Local Area Connection and then select Properties Figure 213 Windows XP Control Panel Network Connections Properties 4 On the General tab select Internet Protocol TCP IP and then cl...

Page 276: ...dress that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided 7 Click OK to close t...

Page 277: ...n shows screens from Windows Vista Professional 1 Click Start Control Panel Figure 216 Windows Vista Start Menu 2 In the Control Panel click the Network and Internet icon Figure 217 Windows Vista Cont...

Page 278: ...onnections Figure 219 Windows Vista Network and Sharing Center 5 Right click Local Area Connection and then select Properties Figure 220 Windows Vista Network and Sharing Center During this procedure...

Page 279: ...endix B Setting Up Your Computer s IP Address NSA 2401 User s Guide 279 6 Select Internet Protocol Version 4 TCP IPv4 and then select Properties Figure 221 Windows Vista Local Area Connection Properti...

Page 280: ...IP address that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided Click Advanced...

Page 281: ...1 Mac OS X 10 3 and 10 4 The screens in this section are from Mac OS X 10 4 but can also apply to 10 3 1 Click Apple System Preferences Figure 223 Mac OS X 10 4 Apple Menu 2 In the System Preferences...

Page 282: ...es pane opens select Built in Ethernet from the network connection type list and then click Configure Figure 225 Mac OS X 10 4 Network Preferences 4 For dynamically assigned settings select Using DHCP...

Page 283: ...dress In the Subnet Mask field type your subnet mask In the Router field type the IP address of your device Figure 227 Mac OS X 10 4 Network Preferences Ethernet Click Apply Now and close the window V...

Page 284: ...SA 2401 User s Guide 284 Mac OS X 10 5 The screens in this section are from Mac OS X 10 5 1 Click Apple System Preferences Figure 229 Mac OS X 10 5 Apple Menu 2 In System Preferences click the Network...

Page 285: ...es Figure 231 Mac OS X 10 5 Network Preferences Ethernet 4 From the Configure list select Using DHCP for dynamically assigned settings 5 For statically assigned settings do the following From the Conf...

Page 286: ...c OS X 10 5 Network Preferences Ethernet 6 Click Apply and close the window Verifying Settings Check your TCP IP properties by clicking Applications Utilities Network Utilities and then selecting the...

Page 287: ...al configuration The following screens use the default Ubuntu 8 installation Make sure you are logged in as the root administrator Follow the steps below to configure your computer IP address in GNOME...

Page 288: ...window enter your admin account name and password then click the Authenticate button Figure 236 Ubuntu 8 Administrator Account Authentication 4 In the Network Settings window select the connection th...

Page 289: ...st select Static IP address if you have a static IP address Fill in the IP address Subnet mask and Gateway address fields 6 Click OK to save the changes and close the Properties dialog box and return...

Page 290: ...fying Settings Check your TCP IP properties by clicking System Administration Network Tools and then selecting the appropriate Network device from the Devices tab The Interface Statistics column shows...

Page 291: ...pending on your specific distribution release version and individual configuration The following screens use the default openSUSE 10 3 installation Make sure you are logged in as the root administrato...

Page 292: ...dow opens select Network Devices and then click the Network Card icon Figure 243 openSUSE 10 3 YaST Control Center 4 When the Network Settings window opens click the Overview tab select the appropriat...

Page 293: ...k the Address tab Figure 245 openSUSE 10 3 Network Card Setup 6 Select Dynamic Address DHCP if you have a dynamic IP address Select Statically assigned IP Address if you have a static IP address Fill...

Page 294: ...Guide 294 8 If you know your DNS server IP address es click the Hostname DNS tab in Network Settings and then enter the DNS server information in the fields provided Figure 246 openSUSE 10 3 Network S...

Page 295: ...he Task bar to check your TCP IP properties From the Options sub menu select Show Connection Information Figure 247 openSUSE 10 3 KNetwork Manager When the Connection Status KNetwork Manager window op...

Page 296: ...Appendix B Setting Up Your Computer s IP Address NSA 2401 User s Guide 296...

Page 297: ...timate Many ZyXEL products such as the NSA 2401 issue their own public key certificates These can be used by web browsers on a LAN or WAN to verify that they are in fact connecting to the legitimate d...

Page 298: ...s Vista 1 If your device s Web Configurator is set to use SSL certification then the first time you browse to it you are presented with a certification error Figure 249 Internet Explorer 7 Certificati...

Page 299: ...s NSA 2401 User s Guide 299 4 In the Certificate dialog box click Install Certificate Figure 252 Internet Explorer 7 Certificate 5 In the Certificate Import Wizard click Next Figure 253 Internet Explo...

Page 300: ...then go to step 9 Figure 254 Internet Explorer 7 Certificate Import Wizard 7 Otherwise select Place all certificates in the following store and then click Browse Figure 255 Internet Explorer 7 Certifi...

Page 301: ...Guide 301 9 In the Completing the Certificate Import Wizard screen click Finish Figure 257 Internet Explorer 7 Certificate Import Wizard 10 If you are presented with another Security Warning click Ye...

Page 302: ...nstallation message Figure 259 Internet Explorer 7 Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page a sealed padlock icon appears in the a...

Page 303: ...n prompted you can install a stand alone certificate file if one has been issued to you 1 Double click the public key certificate file Figure 261 Internet Explorer 7 Public Key Certificate File 2 In t...

Page 304: ...rer This section shows you how to remove a public key certificate in Internet Explorer 7 1 Open Internet Explorer and click Tools Internet Options Figure 263 Internet Explorer 7 Tools Menu 2 In the In...

Page 305: ...te and then click Remove Figure 265 Internet Explorer 7 Certificates 4 In the Certificates confirmation click Yes Figure 266 Internet Explorer 7 Certificates 5 In the Root Certificate Store dialog box...

Page 306: ...ion then the first time you browse to it you are presented with a certification error 2 Select Accept this certificate permanently and click OK Figure 268 Firefox 2 Website Certified by an Unknown Aut...

Page 307: ...g to a ZyXEL Web Configurator and installing a public key certificate when prompted you can install a stand alone certificate file if one has been issued to you 1 Open Firefox and click Tools Options...

Page 308: ...Import Figure 272 Firefox 2 Certificate Manager 4 Use the Select File dialog box to locate the certificate and then click Open Figure 273 Firefox 2 Select File 5 The next time you visit the web site c...

Page 309: ...Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2 1 Open Firefox and click Tools Options Figure 274 Firefox 2 Tools Menu 2 In the Options dialog box cl...

Page 310: ...e certificate that you want to remove and then click Delete Figure 276 Firefox 2 Certificate Manager 4 In the Delete Web Site Certificates dialog box click OK Figure 277 Firefox 2 Delete Web Site Cert...

Page 311: ...nfigurator is set to use SSL certification then the first time you browse to it you are presented with a certification error 2 Click Install to accept the certificate Figure 278 Opera 9 Certificate si...

Page 312: ...sing to a ZyXEL Web Configurator and installing a public key certificate when prompted you can install a stand alone certificate file if one has been issued to you 1 Open Opera and click Tools Prefere...

Page 313: ...401 User s Guide 313 3 In the Certificates Manager click Authorities Import Figure 282 Opera 9 Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open...

Page 314: ...e dialog box click Install Figure 284 Opera 9 Install authority certificate 6 Next click OK Figure 285 Opera 9 Install authority certificate 7 The next time you visit the web site click the padlock in...

Page 315: ...emoving a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9 1 Open Opera and click Tools Preferences Figure 286 Opera 9 Tools Menu 2 In Preferences Advanced...

Page 316: ...nt to remove and then click Delete Figure 288 Opera 9 Certificate manager 4 The next time you go to the web site that issued the public key certificate you just removed a certification error appears T...

Page 317: ...set to use SSL certification then the first time you browse to it you are presented with a certification error 2 Click Continue Figure 289 Konqueror 3 5 Server Authentication 3 Click Forever when prom...

Page 318: ...to you 1 Double click the public key certificate file Figure 292 Konqueror 3 5 Public Key Certificate File 2 In the Certificate Import Result Kleopatra dialog box click OK Figure 293 Konqueror 3 5 Cer...

Page 319: ...ings Menu 2 In the Configure dialog box select Crypto 3 On the Peer SSL Certificates tab select the certificate you want to delete and then click Remove Figure 296 Konqueror 3 5 Configure 4 The next t...

Page 320: ...Appendix C Importing Certificates NSA 2401 User s Guide 320...

Page 321: ...n of the acting entity and all other entities that control are controlled by or are under common control with that entity For the purposes of this definition control means i the power direct or indire...

Page 322: ...sublicense and distribute the Work and such Derivative Works in Source or Object form 3 Grant of Patent License Subject to the terms and conditions of this License each Contributor hereby grants to Yo...

Page 323: ...icable law or agreed to in writing Licensor provides the Work and each Contributor provides its Contributions on an AS IS BASIS WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND either express or implied i...

Page 324: ...ING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR...

Page 325: ...object files to the recipients so that they can re link them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We pro...

Page 326: ...ary The former contains code derived from the library whereas the latter must be combined with the library in order to run GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTI...

Page 327: ...themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based...

Page 328: ...rovided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice with each copy of the work tha...

Page 329: ...their licenses terminated so long as such parties remain in full compliance 9 You are not required to accept this License since you have not signed it However nothing else grants you permission to mo...

Page 330: ...d by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the Free Software Foundation 14 If you wish to incorporate parts...

Page 331: ...e pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender...

Page 332: ...You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in...

Page 333: ...the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute th...

Page 334: ...new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifi...

Page 335: ...may use this Software under terms of this license revision or under the terms of any subsequent revision of the license THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS AS IS...

Page 336: ...t and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission For written permission please contact openssl core openssl org Product...

Page 337: ...s list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution All advertising materials mentioning features or use of this software must...

Page 338: ...AGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STR...

Page 339: ...RRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED...

Page 340: ...riginal Code or previous Modifications 1 10 Original Code means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code and which at t...

Page 341: ...nfringed by the making using or selling of Modifications made by that Contributor either alone and or in combination with its Contributor Version or portions of such combination to make use sell offer...

Page 342: ...the claim and the party making the claim in sufficient detail that a recipient will know whom to contact If Contributor obtains such knowledge after the Modification is made available as described in...

Page 343: ...ust make it absolutely clear that any terms which differ from this License are offered by You alone not by the Initial Developer or any Contributor You hereby agree to indemnify the Initial Developer...

Page 344: ...r any other contributor assume the cost of any necessary servicing repair or correction This disclaimer of warranty constitutes an essential part of this license No use of any covered code is authoriz...

Page 345: ...of liability shall not apply to liability for death or personal injury resulting from such party s negligence to the extent applicable law prohibits such limitation Some jurisdictions do not allow th...

Page 346: ...__________ Portions created by ______________________ are Copyright C ______ _______________________ All Rights Reserved Contributor s ______________________________________ Alternatively the contents...

Page 347: ...IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED AND YOUR MONEY WILL BE REFUNDED 1 Grant of License for Personal Use ZyXEL Communication...

Page 348: ...hout limitation not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software 6 No Warranty THE SOFTWARE IS PROVIDED AS IS TO THE...

Page 349: ...ftware and Documentation in your possession or under your control ZyXEL may terminate this License Agreement for any reason including but not limited to if ZyXEL finds that you have violated any of th...

Page 350: ...Appendix D Open Source Licences NSA 2401 User s Guide 350...

Page 351: ...ithout notice Certifications Federal Communications Commission FCC Interference Statement The device complies with Part 15 of FCC rules Operation is subject to the following two conditions This device...

Page 352: ...duct or components to proper operating condition Any replacement will consist of a new or re manufactured functionally equivalent product of equal or higher value and will be solely at the discretion...

Page 353: ...eps you took to solve it is the prefix number you dial to make an international telephone call Corporate Headquarters Worldwide Support E mail support zyxel com tw Sales E mail sales zyxel com tw Tele...

Page 354: ...www zyxel cz Regular Mail ZyXEL Communications Czech s r o Modransk 621 143 01 Praha 4 Modrany Cesk Republika Denmark Support E mail support zyxel dk Sales E mail sales zyxel dk Telephone 45 39 55 07...

Page 355: ...E mail sales zyxel in Telephone 91 11 30888144 to 91 11 30888153 Fax 91 11 30888149 91 11 26810715 Web http www zyxel in Regular Mail India ZyXEL Technology India Pvt Ltd II Floor F2 9 Okhla Phase 1...

Page 356: ...32 0858 Web www zyxel com Regular Mail ZyXEL Communications Inc 1130 N Miller St Anaheim CA 92806 2001 U S A Norway Support E mail support zyxel no Sales E mail sales zyxel no Telephone 47 22 80 61 80...

Page 357: ...ta 28033 Madrid Spain Sweden Support E mail support zyxel se Sales E mail sales zyxel se Telephone 46 31 744 7700 Fax 46 31 744 7701 Web www zyxel se Regular Mail ZyXEL Communications A S Sj porten 4...

Page 358: ...ail support ua zyxel com Sales E mail sales ua zyxel com Telephone 380 44 247 69 78 Fax 380 44 494 49 32 Web www ua zyxel com Regular Mail ZyXEL Ukraine 13 Pimonenko Str Kiev 04050 Ukraine United King...

Page 359: ...re by files 210 restore by job 207 software 218 synchronization 201 synchronization tutorial 92 troubleshooting 252 tutorial 92 backup files restoring files by 102 backup job restoring files by 99 bac...

Page 360: ...128 S M A R T attributes 156 see also hard drive disk quota conflict users 177 Distributed File System see DFS DNS 164 server address assignment 159 domain 177 group 173 user 173 domain controller ti...

Page 361: ...42 forgot password 249 front panel LEDs 32 FTP 81 221 222 anonymous access 223 character set 223 connection limit 223 idle timeout FTP 223 over TLS 81 settings 169 FTPES FTP over explicit TLS SSL 82 F...

Page 362: ...148 locked volumes 126 log 228 buzzer priority 231 classes 229 235 CSV 234 export 234 records configuration 230 report configuration 231 search 230 severity 235 logging monitoring 259 logical volume...

Page 363: ...consumption 259 failure 89 242 restart 89 resume 89 242 schedule 242 power adaptor pinout 259 power management 240 hard drive sleep time 241 primary domain controller 256 print server 222 224 rename 2...

Page 364: ...reen links 49 summary 49 50 secure connections 75 security 68 Self Monitoring Analysis and Reporting Technology see S M A R T Serial Advanced Technology Attachment see SATA server name 119 share 38 17...

Page 365: ...NDU discovery 250 non admin passwords 250 overview 247 snapshots 252 Web Configurator access 250 tutorials 55 U Unicode 8 bit UCS Unicode Transformation Format see UTF 8 unlock 141 148 external volum...

Page 366: ...sers share access tutorial 62 supported 259 Web Configurator 35 browsers 35 logout 38 49 troubleshooting access 250 web help 48 icon 38 web security 75 Windows 31 Windows domain administrator 167 admi...

Page 367: ...Index NSA 2401 User s Guide 367...

Reviews: