Home
        ZyXEL NSA-2401 User's Manual
         Contents
1.       for  internal business use only  for up to the number of users specified in sales order and invoice   You have the right to make one backup copy of the Software and Documentation solely for  archival  back up or disaster recovery purposes  You shall not exceed the scope of the license  granted hereunder  Any rights not expressly granted by ZyXEL to you are reserved by  ZyXEL  and all implied licenses are disclaimed     2 Ownership    You have no ownership rights in the Software  Rather  you have a license to use the Software  as long as this License Agreement remains in full force and effect  Ownership of the Software   Documentation and all intellectual property rights therein shall remain at all times with  ZyXEL  Any other use of the Software by any other entity is strictly forbidden and is a  violation of this License Agreement     3 Copyright    The Software and Documentation contain material that is protected by United States  Copyright Law and trade secret law  and by international treaty provisions  All rights not  granted to you herein are expressly reserved by ZyXEL  You may not remove any proprietary  notice of ZyXEL or any of its licensors from any copy of the Software or Documentation     NSA 2401 User s Guide 349    Appendix D Open Source Licences    4 Restrictions    You may not publish  display  disclose  sell  rent  lease  modify  store  loan  distribute  or  create derivative works of the Software  or any part thereof  You may not assign  sublicense   
2.      Email    Description      Available Group s  Group Membership    Senior Managemer        Group Membership       The following table describes the labels in this screen   Table 51 Sharing  gt  Users  gt  Create a New Account    LABEL DESCRIPTION    Username Enter an account name  The text may consist of up to 14 letters  numerals  and any printable character found on a typical English language  keyboard  with certain limitations due to the nature of the NSA system     See Section 8 2 1 1 on page 179 for more details on account names     Password Create a password associated with this account  The text may consist of  up to 14 letters  numerals and any printable character found on a typical  English language keyboard     Password  Confirm  Enter the exact same password that you just typed in the above field     Quota  per volume  Set how many megabytes of storage the account can use in each of the  NSA   s volumes  You can set a different quota for each volume  A value of     0    MB means unlimited storage  The quota for an individual volume  cannot exceed 500000000 MB  488 281 gigabytes  or 477 terabytes      Enter the user   s e mail address     Description Enter details about the user account  The text may consist of up to 110  letters  numerals and any printable character found on a typical English  language keyboard except quotation marks       or              NSA 2401 User   s Guide    Chapter 8 Sharing Screens    Table 51 Sharing  gt  Users  gt  Create a New Accoun
3.      Snapsho obs   Snapshot Images      Display      All w    1 i a I Ime   i ame              Capacity  Ertan tae i I ens bee  gt     2 00 GB  0  Used  100     volurei 2008 09 08 10 10 25 er       Be  ee eee       NSA 2401 User   s Guide 219    Chapter 9 Protect Screens    The following table describes the icons in this screen   Table 86 Protect  gt  Snapshot  gt  Snapshot Images Icons    ICON DESCRIPTION      Delete Selected Images    Select a snapshot image s  and click this icon to remove the image s    ome  Delete Image  Delete Image    2008 09 08 10 10 56   All irnage s  will be DELETED  Are you sure you want to DELETE the  selected image s      Sort  Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order       Status    This icon shows whether or not the snapshot image is valid        The following table describes the labels in this screen   Table 87 Protect  gt  Snapshot  gt  Snapshot Images    LABEL DESCRIPTION  Display Select for which volume you want to show snapshot images  or all    This field identifies the volume that this image is a snapshot of     Snapshot This field displays when the snapshot image was created  in yyyy mm dd  hh mm ss format     Capacity This field shows the storage space available for the snapshot  how much  is currently in use  and how much is still available     9 5 Backup Software Screen       Click Protect  gt  Backup Software to open the Backup Soft
4.      The disk drive PWR LED is oft        e Check that the NSA is on  see Power  Hardware Connections  and LEDs   e Remove the disk tray and make sure    e itis a SATA I or SATA II compatible hard drive  it is installed correctly in the disk tray  Push the tray back into NSA disk bay until it  snaps into place and push the latch up  see the NSA Quick Start Guide    the hard disk is not faulty  You could either try a different hard disk or test the original  hard disk in a different NSA or computer     e If the problem continues  contact the NSA vendor          The disk drive ALM LED is on        e The hard disk has a problem  Go to the Storage  gt  Internal Storage  gt  Disk screen  select  the disk and click the S M A R T  icon to see status details about the disk    If the hard disk is faulty  replace it  See your Quick Start Guide for information on  replacing a disk and also Disk Replacement Restrictions on page 128  After replacing the  disk  go to the Storage  gt  Internal Storage  gt  Disk screen and check the status of the new  disk  You should also go to the Storage  gt  Internal Storage  gt  RAID screen and check the  array   s status  If it is Resynching  the NSA is repairing the RAID array  If it is Degraded   select the array and click the Repair icon  If the status is Down  recreate the array   volumes  and sharing configuration     e If the problem continues  contact the NSA vendor          A LAN LED is off        NSA 2401 User   s Guide    Chapter 12 Troublesh
5.      e Share names cannot use names reserved for  automatic shares    of external USB disk  volumes be unique  for example     USB 0 9  1 2      that is  a share named    USB     followed by a one or two digit number      7 4 2 NFS Session Screen    Click Network  gt  NFS  gt  NFS Session to display the NFS session screen  This screen shows  which users are currently connected to the NSA using NFS     Figure 150 Network  gt  NFS  gt  NFS Session         SSNS Ce TTS    Fy Ones es er 6  amp     NSA 2401 User   s Guide    Chapter 7 Network Screens    The following table describes the labels in this screen   Table 48 Network  gt  NFS  gt  NFS Session    LABEL DESCRIPTION  Type This shows that this is an NFS connection to the NSA   NFS Share Path This displays the complete location of the NFS share in the NSA     Username This displays the name of the user connected to the NSA     Connected At This displays the date and time the user last connected to the NFS share  in year day month hour minute second  format     IP Address This displays the IP address of the computer connected to the NSA     OK Click OK to close the window        NSA 2401 User   s Guide    Chapter 7 Network Screens    NSA 2401 User   s Guide       Sharing Screens    8 1 Overview    Use the NSA   s Sharing screens to manage user accounts  groups of users  and shares     8 1 1 What You Can Do In The Sharing Screens    e Create and manage user accounts  See Section 8 2 on page 175 for details   e Create and manage 
6.      list     Figure 38 Displaying the NSA       Y DEVICES     Macintosh HD  iDisk        11800 nb Neighborhood     mygroup Neighborhood     nsa220 Neighborhood   nsa2401 Neighborhood     qisda Neighborhood     trans Neighborhood     workgroup Neighborhood     172 23 37 108 Server   ll root s remote desktop Mac Server    Y SHARED      172 23 37 108  amp   ll root s remote de       v v v v YVA Y Y       PLACES  E Desktop  GS cemcpm  A Applications  Bi Documents     gt  SEARCH FOR       NSA 2401 User   s Guide    Chapter 3 Tutorials    3 Click the triangle beside the NSA   s name to display the shares that Gonzo can use     Figure 39 Displaying the NSA    i rm    FE  no   7  Peis   PN pi Q      Y DEVICES Name   Pate Modified         F gt       TZTZT7QT  a  G   Macintosh HD  gt   11800 nb  Disk       mygroup Neighborhood     gt    M nsaz20   Neighborhood  Y SHARED  gt   amp  nsa2401 Neighborhood  ll 172 23 37 108  amp    P    gisda Neighborhood  Il root s remote de     gt      trans Neighborhood          Neighborh pod       workgroup Neighborhood  lil 172 23 37 108 Server   Y PLACES E root s remote desktop Mac Server     Desktop      cpmcem   A Applications   Documents       Alternatively  you can also connect directly to the NSA from the Go Menu in the  Finder  Simply click Go  gt  Connect to Server     Figure 40 Alternate Method for Displaying the NSA    Back  Forward  Enclosing Folder    Computer eC   Date Modified   Kine  f   Home EH Scat Neighborhood  Desktop DPD ee Neighbo
7.     Choose a master password to protect personal certificates  Browsing    Motifirations   Set master password       Content  Fonts  Downloads    Programs Every time needed    Ask for password        Enable Fraud Protection    Toolbars  Shortcuts  Voice          NSA 2401 User s Guide 31 7    Appendix C Importing Certificates    3 In the Certificates manager  select the Authorities tab  select the certificate that you  want to remove  and then click Delete     Figure 288 Opera 9  Certificate manager    Certificate manager       Certificate authorities   1 72 20  37  202 td   AAA Certificate Services   Actalis Root CA   AddTrust Class 1 CA Root   AddTrust External CA Root   AddTrust Public CA Root   AddTrust Qualified CA Root  Baltimore CyberTrust Code Signing Root   Baltimore CyberTrust Mobile Root   Baltimore CyberTrust Root   Certum CA   Certum CA Level I   Certum CA Level II   Certum CA Level IIT   Certum CA Level IV   Class 1 Public Primary Certification Authority   Class 1 Public Primary Certification Authority   G2   c  1998 VeriSig     Class 2 Public Primary Certification Authority         4 The next time you go to the web site that issued the public key certificate you just  removed  a certification error appears        ES There is no confirmation when you delete a certificate authority  so be  absolutely certain that you want to go through with it before clicking the button        318  NSA 2401 User   s Guide    Appendix C Importing Certificates    Konqueror    The fo
8.     Table 113 Power Consumption in Watts  W     SYSTEM IDLE  HARD DISKS  POWER SOURCE   SYSTEM BOOT UP   SYSTEM READ WRITE   iy POWER SAVING MODE     240V 50Hz 77 8  peak  51 6  peak  24 2    120V 60Hz 76 5 peak  52 9  peak  23 0  100V 60Hz 76 0  peak  53 1  peak  22 5       This is the external power adaptor pinout specification    Figure 210 Power Adaptor Pinout        NSA 2401 User s Guide 261    Chapter 13 Product Specifications    262 NSA 2401 User s Guide    PART IV    Appendices and  Index    Log Messages  265    Setting Up Your Computer   s IP Address  275   Importing Certificates  299    Open Source Licences  323    Legal Information  353    Index  355           Log Messages    This appendix shows some NSA log messages     Log Messages    Table 114 Log Messages    FEATURE SEVERITY MESSAGE   MESSAGE   ARGUMENT S    Action Log INFO  ClientIP  UserName  ShareNa   ServiceName    ActionName  Delete  Delete DIR   me  ServiceName  ActionName    FTP CIFS  Create DIR  Write  upload   Read   FilePath FileName Under the   WEB  download   share     Action Log    INFO  ClientIP  UserName  ShareNa_   ServiceName   Rename me  ServiceName  Rename  Fil   FTP CIFS   ePath FileName Under the WEB  share     gt  FilePath FileName Underthe  share     CIFS   mill Join domain  0   type   1   Domain Domain  domain mill     Name Type  CIFS   INFO Leave Domain success    domain    CIFS   INFO Import Domain User and Group   number of number of   number of  domain Success  10  user s    1  domai
9.     Work    shall mean the work of authorship  whether in Source or Object form  made available  under the License  as indicated by a copyright notice that is included in or attached to the work   an example is provided in the Appendix below      NSA 2401 User   s Guide    Appendix D Open Source Licences       Derivative Works    shall mean any work  whether in Source or Object form  that is based on   or derived from  the Work and for which the editorial revisions  annotations  elaborations  or  other modifications represent  as a whole  an original work of authorship  For the purposes of  this License  Derivative Works shall not include works that remain separable from  or merely  link  or bind by name  to the interfaces of  the Work and Derivative Works thereof        Contribution    shall mean any work of authorship  including the original version of the Work  and any modifications or additions to that Work or Derivative Works thereof  that is  intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an  individual or Legal Entity authorized to submit on behalf of the copyright owner  For the  purposes of this definition     submitted    means any form of electronic  verbal  or written  communication sent to the Licensor or its representatives  including but not limited to  communication on electronic mailing lists  source code control systems  and issue tracking  systems that are managed by  or on behalf of  the Licensor for the purpose 
10.     marketing clients    engineering                NSA 2401 User   s Guide    Chapter 3 Tutorials    3 Once the Web Configurator workspace appears  click Sharing  gt  Users to open the user    account management area     Figure 20 Sharing  gt  Users  ZyXEL    ss Sharing   Users      B Status  a    te    bearch  Account    Users  Grour     Shares         gt  ON PE  ars CAD  lt   y A   Edit User Delete Retrieve User Info  Selected Domain  Users        anguage  SENM 7 E FP AN    Display Number  po a      Prev Next       admin  anonymous  cjackson  dbowman  ptuscadero  rcortez    tfonzarelli      Prev Next     gt       Message KE    4 Click Add Account to open the Create a New Account screen     Figure 21 Sharing  gt  Users  gt  Create a New Account    Create User    Username  New Password    Password  Confirm   Quota  per volume     Email    Description    Group Membership       NSA 2401 User s Guide    Group Membership    FA       57    Chapter 3 Tutorials    e Enter an account name and password       Set how many megabytes of storage the account can use in each of the NSA   s  volumes  You can set a different quota for each volume  A value of    0    MB means  unlimited storage     e Enter the user   s e mail address and any details or identifying information specific to  the user account     e Select the groups to which you want to assign this account   e Click Apply   5 Repeat these steps for the other user accounts you need     3 2 2 Setting Up Groups    After you create a
11.     new network card  manually     Configuring or  Deleting    Choose a network card  to change or remove   Then press Configure or  Delete as desired     AMD PCnet   Fast 79C971  MAC   08 00 27 96 ed 3d      Device Name  eth etho    Started automatically at boot     P address assigned using DHCP           Ae    i k         Abort          NSA 2401 User   s Guide    Appendix B Setting Up Your Computer s IP Address    5 When the Network Card Setup window opens  click the Address tab    Figure 245 openSUSE 10 3  Network Card Setup    l vast2  linux h202       Address Setup      4  Network Card Setup  Select Mo Address  Setup if you do not   Banana  want any IP address  for this device  This is onfiguration Name  particularly useful for  Ethernet      a  bonding ethernet                   devices  O No IP Address  for Bonding Devices           Select Dynamic O Dynamic Address   DHCP    address if you do not      Statically assigned IP Address    have a static IP  address assigned by IP Address subnet Mask Hostname    the system             administrator or your  cable or DSL provider     You can choose one of  the dynamic address  assignment method   Select DHCP if you  have a DHCP server  running on your local  network  Network  addresses are then  obtained automatically  from the server     To automatically  search for free IP and  then assign it  statically  select  Zeroconf  To use      Cancel         6 Select Dynamic Address  DHCP  if you have a dynamic IP address     Select
12.    00 192  Figure 164 Sharing  gt  Shares  gt  Configuration css cacs cae ca came siacicisesutdaresimicnecenaveitacaveesnsieriamitcareetmmeneia 194  FN NNN ere vlg 194  ge ea 5 AG    EET RET heen eT tree 201  Figure 167 FO  gt  Backup   AGG Job SENT seeeneeenmaaksemeekondandavnddsbkanEv   202    20 NSA 2401 User s Guide    List of Figures    2 ee Me EEE 204  Figur   169 Protecti  gt  FNS Add Job  Step s  re sanatori eain aiea 206  Figure 170 Protect   Backup  gt  Add Job  SANN icicsassnencntaacsasiesanwcenienaarstniuniapssentoumezemnsriarsienkeotepcraeiens 207  PIS T71 FOR  gt  Backup  gt  Edi Jon  SIED T nnereknckiaie da ae 208  Figure 172 Protect  gt  Backup  gt  Edit Job  Step 2       rrrnrrrrnnnnnnnnnrrnrrnnnnnnrrnnnnnnnnnvrnnnnnnnnnsrnnnnnnnnnerrnnnnnnnnsnee 209  Figure 173 Protect  gt  Backup  gt  Restore Archive  Step 1       rrrnnrnnnnnnrvnnnvnnnnnrnnnnnnrnvannrnnnnnnnnnnnsnnnnnrnnnnnene 210  Figure 174 Protect  gt  Backup  gt  Restore Archive  Step 2           cccccsessccceceeeeeeeeeeseneeseeeeeeseaseeeeesseasseeeesenas 211  Figure 175 Protect  gt  Backup  gt  Restore Archive  Step 3            cccceccccsseecceeseeceeeeeceeeeeceeseesseseeenseeeeseneeens 211  FO T o FPG SRE AG 212  moure T77 Frolcei   Restore  Siep 2 cence ete reece tec ier pra NN EN 213  FORT FOR SFK NT cacraeicercacerdectartim neo eeanimamin oer 214  Figure 179 Protect  gt  Restore  EE uiearenctnneentels 215  Figure 180 Protect  gt  Snapshot  gt  Snapshot Jobs 2 0 0 0    ceccccccseeeeeeeeeeeeeeaeeee
13.    6 4 Arrays    RAID  Redundant Array of Independent Disks  or JBOD is the storage method that the NSA  uses  The storage method you use depends on how many disks you have and how many  volumes you want to create  It   s important that you consider this carefully as all data is deleted  when you re create a volume     RAID is a method of storing data on multiple disks to provide a combination of greater  capacity  reliability  and or speed  The NSA also supports JBOD  Just a Bunch Of Disks   which is not technically a RAID storage method  You combine multiple physical disks into a  RAID or JBOD array     Hard Drives to Use With RAID    You can use RAID or JBOD for the physical hard disk drives installed in the NSA   s drive  bays  If you use RAID  instead of JBOD   it is recommended that you use hard drives of the  same storage capacity as RAID uses the capacity of the array   s smallest drive  For example  if  you have four disks of sizes 100 GB  150 GB  150 GB and 200 GB respectively in one RAID  array  then the maximum capacity is based on the size of the smallest disk size  100 GB  and  the remaining space  300 GB  is unused     6 4 1 RAID Levels    The type of array you use depends on how many disks you have and how many arrays you  want to create  Consider this carefully as all data is deleted when you re create an array        BS Back up your data before deleting or re creating an array       NSA 2401 User   s Guide    Chapter 6 Storage Screens    For example if you o
14.    Downloads Ctrl   Add ons   Java Console   Error Console   Page Info    Clear Private Data    Ctrl 5hift Del    w    Options          2 Inthe Options dialog box  click Advanced  gt  Encryption  gt  View Certificates     Figure 271 Firefox 2  Options  Options    Main Tabs Content Feeds Privacy Security Advanced                              M 00770000    General   Network   Update   Encryption                              Protocols    Use SSL 3 0 Use TLS 1 0    Certificates  When    web site requires a certificate     O  Select one automatically     Ask me every time       NSA 2401 User   s Guide 309    Appendix C Importing Certificates    3 Inthe Certificate Manager dialog box  click Web Sites  gt  Import     Figure 272 Firefox 2  Certificate Manager      Certificate Manager     5   x      Your Certificates   People   Web Sites       You have certificates on file that identify these web sites     Certificate Name Purposes       4 Use the Select File dialog box to locate the certificate and then click Open   Figure 273 Firefox 2  Select File  Select File containing Web Site certificate to import    Look in   E Desktop vi F T ES E     4 My Computer  my Documents    Jmy Network Places         My Computer          My Network  Places    File name  CA  cer vw      Files of type  Certificate Files v  C        5 The next time you visit the web site  click the padlock in the address bar to open the  Page Info  gt  Security window to see the web page   s security information     310 N
15.    E     Day  C  First     Monday w       The following table describes the labels in this screen   Table 73 Protect  gt  Backup  gt  Add Job  Step 4    Backup Frequency Select how often the job should run  Hourly  Daily  Weekly  or Monthly    It is recommended you schedule large backups for times when your  network is not busy  such as at night  If two events are configured to run at  the same time  then one must wait until the other finishes running     Enter the time  day and or month as appropriate for your selection above   Click this button to return to the preceding screen   Click this button to save your changes        NSA 2401 User   s Guide 207    Chapter 9 Protect Screens    9 2 3 Editing a Backup Job    In the Protect  gt  Backup screen  select a backup job and click the Edit Job icon to change its  settings     Figure 171 Protect  gt  Backup  gt  Edit Job  Step 1    Step 1       Job Settings    Job Name   Example        second example   Job  Description    Backup      incremental  Type    Source folder sj  file s     volumedl Jeff    volumedl nfs      Backup  Target    Target path   volume    Compression   No  Encryption   No      Internal Volume    Bandwidth    N A KBs  0 for no limitation     Purge Policy   iE Keep All Old Backups  C Keep Only   backups  1 30   C Keep Backups Forf days 1 3650        The following table describes the labels in this screen   Table 74 Protect  gt  Backup  gt  Edit Job  Step 1  LABEL DESCRIPTION    Job Name This field displays the 
16.    Internal Storage  External Storage a            built in snapshots snapshots admin advanced  TCP IP   Windows CIFS   NFS    Users  Growing    Shares          NSA 2401 User   s Guide    Chapter 3 Tutorials    2 Specify a name for the share and select the volume it should be on  Select Kermit as the  owner and set the Share Access to Advanced and click Edit     Figure 25 Sharing  gt  Shares  gt  Add Share  EG    Edit Share    Share Name  Kermit  Volume  volumet  111 76 GE   B    Make This Share    Owned By kem  Enable This Share    Enable Action Log Lal    Enable A  Recycle bin nd    Share Access  Advanced w       3 Include Senior Management under Full and click Apply  This way both Kermit and  the senior managers have full access to the share     Figure 26 Share Access Configuration    Share Access Configuration    Available User s  Groupts      lt LOCALUSERS gt   lt LOCALUSERS gt   Gonzo Kermit   anonymous   p  lt DOMAINUSERS gt   admin m    lt LOCALGROUPS gt    lt DOMAINUSERS gt    Senior Management   lt LOCALGROUPS gt  SE  lt DOMAINGROUPS gt   Everyone   Management    lt DOMAINGROUPS gt     Read Only     lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt      lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt       Note     Tou may select multiple users groups by using Ctrl   Click           NSA 2401 User s Guide    Chapter 3 Tutorials    4 Back in the Edit Shares screen  click Apply     Figure 27 Sharing  gt  S
17.    gt  ea volume1 405 13 GB  ll 384 50 GB    capacity  810 38    A    GB disk1 disk4 disk3  Disks in the array    i          Hot Spare Currently  there are no hot spare disks      Available  Diskis  Currently  there are no available disk s1     The following table describes this screen   Table 19 Storage  gt  Internal Storage  gt  Status    LABEL ICON DESCRIPTION    Wizards    Click this icon to open the Disk Setup Wizard to create a new disk array  or volume     Array type and capacity The type of disk array  JBOD or RAID level  is listed first along with the  array s capacity  See Section 6 4 on page 132 for more on the types of  disk array     Volumes and their The name and capacity of each volume in the array   capacity    This represents the internal  physical  hard drives     Used Space This represents how much of a volume s capacity is currently filled by  files     Locked Volume This represents a volume to which the NSA is blocking access     Used Space  snapshot  Snapshots  records of changes to files within a volume  are stored in the  space on the disk array that is not allocated to volumes  This represents  how much of that space is currently filled by snapshots  See Chapter 9 on  page 197 for more on snapshots     RAID Free Space This is space on the disk array that is not allocated to volumes and is not   yet  used by snapshots     Volume Free Space This is space on a storage volume that is not used up by files   Disks in the array The disks that belong to the a
18.   0   file size   1  bytes   System   INFO The file  0  is verified and File Name   FW restored  system is going to  restart   System   NOTICE The file  0  is corrupted  Stop File Name   FW the configuration restoration    System   NOTICE Firmware is upgrading from OLD VERSI  NEW VER   FW version  0  to  1  ON SION   System   NOTICE Firmware upgrade fails  the file   FW is invalid or corrupted    System   INFO NTP server is set to  0  NTP server   Time   INFO NTP updates successfully from   NTP server    0    Time    272 NSA 2401 User s Guide       Appendix A Log Messages    Table 114 Log Messages    FEATURE   SEVERITY MESSAGE   ARGUMENT S     System   INFO Daylight saving is disabled  Time  System   INFO Daylight saving is enabled  Time    W INFO USER  0    1   login WEB User Name  SUCCESS    INFO USER 10  has logged out from User Name  WEB    INFO USER  0    1   login WEB failed   User Name    INFO Certficate is imported  successfully   File Name    W    W    Certificate Request on system     There is not any Certificate  Request and private key on  system  Please create a  Certificate Request and enroll it        eb  SSL NOTICE The public key in  0  doesn t  match the public key of  SSL NOTICE The file  0  is not a valid File Name  Certificate file   NOTICE Failed to import Certificate   SL    S NOTICE Unexpected error while  importing Certificate file     NSA 2401 User s Guide 273    Appendix A Log Messages    274    NSA 2401 User   s Guide    NSA 2401 User   s Guide     
19.   257  affect on write performance 91  218  create 218  creation 90  image access 91  217  images 219  notes 198  restoring files 91  troubleshooting 254  versus backup 199   spreadsheets 236   SSL 82  239  tutorial 69   standby drive 137   status  messages 51  screen 117   storage 125  260  disk 128  external disk 145  humidity 260  increasing capacity tutorial 106  internal 127  temperature 260   striping 151   sub links 49   supported clients 260    360 NSA 2401 User s Guide    synchronization 203  tutorial 92    syntax conventions 4    SYS LED 33  troubleshooting 249    syslog server 229  236  system management 261  system setting 121    T    TCP IP 162  teaming mode 163  temperature  CPU 119  operating 260  thumbprint 79  time 121  Daylight Saving Time 122  lag 122    time server 122   timeout 37   TLS 82  223   Transport Layer Security  see TLS    troubleshooting  backups 254  buzzer 251  COPY LED 255  domain user 253  domain user share access 254  file access 254  folder access 254  forgot password 251  LED indicators 249  ALM 250  LAN 251  PWR 250  SYS 249  local user share access 253  login 252  NDU discovery 252  non admin passwords 252  overview 249  snapshots 254  Web Configurator access 252    tutorials 55    U    Unicode    Index    8 bit UCS Unicode Transformation Format  see  UTF 8  unlock 140  141  146  148  external volume 148    unlocked volumes 126  upgrading firmware 241  uploading files 40   UPS 243    USB 31  107  devices 39  drives 145  eject 146  exte
20.   66  FOUG ee Rts FN ME NGA EE RE EE EEE 66    NSA 2401 User   s Guide    List of Figures    FONN eee 67  Figure 40 Alternate Method for Displaying the NSA        rrrrrrnnnnnvnvnnnnvrnnnnnrrnnnnnnnrnnnnnsrnnnnnnnsennnnnsrnnnnnnnennnnnn 67  FEET EEE EE EE 68  ge  EE ETT 69  Figure 43 Maintenance  gt  SSL  gt  Edit a Self Signed Certificate         mrrrrrrrnrrrrrrrvrrvrrrrnnnnnrrrrrrrrvrrrrnnnnnnnnne 69  Figure 44 Maintenance  gt  SSL  gt  Edit a Self Signed Certificate          rrrrrrrnrnrrrrnnnnnrvrrnnnrrnnnnnnrenrnnnnrrnnnnnnee 70  FIT Varro 71  Figure 46 Downloading Ne NEAS Certificate Leserne eee 71  Figure 47 Downloading the NAAS Certificate 44resessessmesmmmmeninekueaetmnemnibagekun 72  FE REE TE ne eee eee ete moe EN re RE 72  Figure 49 Certificate Import Wizard  Welcome       rrrnrnnrnnnnnnnnnnvvnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnssnnnnnnnnnannsenn Ta  Figure 50 Certificate Import Wizard  Certificate Store        rrrrrrrrrrnnnnvrrnnnnrrrvnnnnnvnrnnnnrrnnnnnnnnnnrnnnrennnnnsennnnnnn 73  Figure 51 Certificate Import Wizard  Finish           rrrerrrnnnnrnrorrrnnnnnnenrrrnnnnnnnnnrnnnnnennnnrnnnnsrennnnnnnnssennnnnsnnnssenn 74  FUN NNN 74  Figure 53 Certificate Import Wizard  Successful          rrrrrrrrnnnnnvrrnrnnnnnnrnnnnnnnnnnrnnnnnnnnnnnnnnrrnnnnnssennnnnnnnnnneenn 74  PU TL ee eee ee ee eee on eee eee ee ee eee nee eee 75  Figure 55 Maintenance  gt  SSL  gt  Force HTTPS Warning    ccc  ccciccscsssccssecscessessaienssesssceescsesssceneatenseeersesees 76  Figure
21.   80 NSA 2401 User s Guide    Chapter 3 Tutorials    9 The login screen displays     Figure 62 HTTPS Login    ZyXEL NSA 2401   Mozilla Firefox  File Edit wiew History Bookmarks Tools Help      Most Visited W wikipedia 192 168 1 1 G2  TW ZyWALL 1050  7 vahoo BabelFish T      Google    Welcome to NWS4 2401  Enter Username password and click to login      uUsername    Password     a maximum of 14 alphanumeric  printable characters  no single and double quotes       i  Note     Please turn on the Javascript and ActiveX control setting on  Internet Explorer     Login   Reset         Now  anyone who connects to the NSA   s Web Configurator screens will automatically do so  by HTTPs  Use a secure method to let your users know the correct fingerprint for the NSA   s  certificate so they can check it before adding a security exception  as in steps 6 to 7 on pages  78 to 79   See the next section for how to use FTPES with the NSA for secure FTP transfers     3 5 2 Using FTPES to Connect to the NSA    This section covers how to use FTP over Explicit TLS with the NSA for secure FTP transfers   Before you go through this section  read Section 3 5 1 on page 68 to configure HTTPS  This  example uses FileZilla     NSA 2401 User   s Guide 81    Chapter 3 Tutorials    1 Open FileZilla and click File  gt  Site Manager  gt  New Site   e Configure the Host field with the NSA   s address   e Set the Servertype to FTPES   FTP over explicit TLS SSL   e Configure the account name and password   e Cli
22.   Change Share Pr Iperties    Share Name  Example Share  Volume  volume  55 62 GB   7    Make this share ladnin       6c  w    owned by  Enable this share Ed    Enable action log E  Enable recycle bin E    Share Access  Make it public D          The following table describes the labels in the this screen   Table 10 My NSA Change Share Properties    LABEL DESCRIPTION    Share Name Enter the name of the shared folder  The text may consist of 1 to 255 characters   See Share Name Details on page 44 for more information     Select a volume for the share to be located on        NSA 2401 User   s Guide 43    Chapter 2 Introducing the Web Configurator    Table 10 My NSA Change Share Properties  continued   LABEL DESCRIPTION    Make this share Select an owner for the share   owned by    Enable this share   Select this to activate the share   Enable action log   Select this to keep a log of all actions performed on the share     Enable recycle bin   Select this to create a recycle bin on the share  Whenever a user with sufficient       permissions deletes a file or folder  it is stored here until it is deleted permanently    Choose whether the share is public or private  or choose Advanced to open the  Share Access Configuration screen  see Section 2 5 4 1 on page 44     Click this to save your changes    Click this to discard changes and close the window     Share Name Details    Use any character except double quotes       single quotes      slashes  I or     square brackets         
23.   Groups    Groups            8  Add Search Update Edit Group Delete    Group Domain Selected Display Number   20 W  Groups Groupis  Goto Page fm    Type    l Wkeywordsji GF GE    Page 1   f i1    Example    Pagel of 1       The following table describes the icons in this screen   Table 53 Sharing  gt  Groups Icons    Add Group    Click this icon to open the Add a New Local Group screen  where you  can add new local groups  See Section 8 3 1 on page 184 for details     Search    Click this icon to display the search filters which you can use to search for  user groups by type or keyword     Update Domain Groups    Select a group from the list  then click this icon to retrieve its domain  information  where applicable     Edit Group    Select a group from the list  then click this icon to edit its permissions  See  Section 8 2 1 on page 178 for details        182  NSA 2401 User   s Guide    Chapter 8 Sharing Screens    Table 53 Sharing  gt  Groups Icons  continued   ICON DESCRIPTION    Delete Selected Groups  Se Select a group from the list  then click this icon to remove it  You can only    delete local user groups  not domain groups         1 Delete Group FREEP1776     The following user s  will no longer be members  of Group  FREEP1776      FredT AgathaG    Do you wish to proceed     Sort    Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order     Conflict Local Group   Indicates a loc
24.   LABEL DESCRIPTION  Volume Name Select the volume upon which you want to create the NFS enabled share     Share Name Enter the name of the shared folder  The text may consist of 1 to 106    characters  See Share Name Details on page 170 for details   Full Path  Comment  DNS IP Filter    This field displays the complete location of the share in the NSA   Add descriptive text to help you identify the share     To control access to the NFS share  configure filters based on domain  names and IP addresses  Enter a domain name or IP address and select  the appropriate level of access  You can also just use a   to indicate any     read only  The users can view the files in the share but not delete them    or add files     read write  The users have full access to the share and can read  delete   and add files        A  remove  Apply   Cancel Click to discard changes and close the window     Q  Q    Click this button to display another field for entering a DNS or IP filter   Click this button to remove the DNS or IP filter field     Click to save your changes     Share Name Details    Use any character except double quotes      single quotes      slashes    or     square brackets         colons      semi colons      angle brackets   lt   gt    the plus sign      semi colons      commas       question marks      asterisks      the pound sign      tab      and the equals sign        e Spaces are not allowed    e Share names must be unique  they cannot be the same as other share names 
25.   Setting Up Your Computer   s IP  Address       Your specific ZyXEL device may not support all of the operating systems  described in this appendix  See the product specifications for more information  about which operating systems are supported        This appendix shows you how to configure the IP settings on your computer in order for it to  be able to communicate with the other devices on your network  Windows Vista XP 2000   Mac OS 9 OS X  and all versions of UNIX LINUX include the software components you need  to use TCP IP on your computer     If you manually assign IP information instead of using a dynamic IP  make sure that your  network   s computers have IP addresses that place them in the same subnet     In this appendix  you can set up an IP address for     e Windows XP NT 2000 on page 276   e Windows Vista on page 279   e Mac OS X  10 3 and 10 4 on page 283   e Mac OS X  10 5 on page 286   e Linux  Ubuntu 8  GNOME  on page 289   e Linux  openSUSE 10 3  KDE  on page 293    275    Appendix B Setting Up Your Computer s IP Address    Windows XP NT 2000    The following example uses the default Windows XP display theme but can also apply to  Windows 2000 and Windows NT     1 Click Start  gt  Control Panel     Figure 211 Windows XP  Start Menu          Internet Explorer     My Documents  e Outlook Express    W Paint    W  Files and Settings Transfer W           4 My Recent Documents    E My Pictures    hf     B9 Command Prompt LE My Music  E  Acrobat Reader 4 0    My
26.   and Volumes    and C are on RAID Array 1         RAID Array 1       NSA 2401 User   s Guide    Chapter 6 Storage Screens    Encrypted Volumes    BES    When you create a volume you can encrypt it using either a manually entered password or a  USB key  Others cannot read the data even if they take the physical drive  Encrypting a  volume does not affect how the volume   s users use it  The NSA automatically encrypts data  the users write to the encrypted volume and de crypts the data they read        Keep an encrypted volume s password or USB key in a safe place  Without the  password or USB key  you cannot access the volume if it becomes locked  All  of the volume s data will be unusable        Locked and Unlocked Volumes    Keep an encrypted volume unlocked to allows users to use its shares as normal  Lock an  encrypted volume to block all user access to its shares  The NSA automatically locks an  encrypted volume if the disk is removed or the NSA restarts  is reset  since a reset includes a  restart   or loses power  The administrator can also manually lock the volume  Once a volume  is locked  no one can use it until an administrator unlocks it  The NSA does not take snapshots  of a locked volume  See Chapter 9 on page 197 for more on snapshots     Degraded Arrays    BS    A degraded array is one that is damaged by a hard drive failure but can still be repaired by  replacing the failed drive  The array is still operational but at risk since all of the array   s data  may
27.   criteria  Click the heading cell again to reverse the sort order    Status    This icon shows whether the volume is Healthy  Locked  Unlocked  or  Down  see Section 6 6 on page 139  If a volume is degraded  click the       The following table describes the labels in this screen   Table 35 Storage  gt  External Storage  gt  Volume    LABEL DESCRIPTION  This field shows the name of the volume     Volume Type This field shows the volume is unencrypted  Normal  or encrypted   Crypto      File System This field displays the type of file system that an external  USB  volume is  using     This field shows to which USB port the device is connected     Capacity This field shows the total size of the volume  how much is currently in use   and how much is still available        148 NSA 2401 User s Guide    Chapter 6 Storage Screens    6 8 1 Creating or Editing an External Volume       LS Creating a volume on a USB device formats it  All data on the USB device is  lost        Click Storage  gt  External Storage  gt  Volume  gt  Create to display the external  USB   connected  volume creation screen as shown next  You can also select an existing external  volume and click the Edit icon  Use this screen to add or edit external storage volumes        BS Keep an encrypted volume   s password or USB key in a safe place  You cannot  access a locked volume without the password or USB key  All of the volume   s  data will be unusable  If you use a USB key  keep backup copies  Do not use  the U
28.   fail     RAID   This icon represents a disk array  See the chapter on the storage screens for more  details    Volume   This icon represents a storage volume  See the chapter on the storage screens for  more details    Disk   This icon shows the status of a hard disk  See the chapter on the storage screens for  more details    Create    If you have disk space available for a new disk array  then click this icon to open a  screen where you can create a new disk array     Delete  Select an entry and click this icon to remove the entry     Edit  Select an entry and click this icon to modify it   s settings        NSA 2401 User   s Guide       Chapter 2 Introducing the Web Configurator    Table 15 Common Configuration Screen Icons  continued   ICON DESCRIPTION    User  This is a user icon  See the chapter on the sharing screens for details on variants of  this icon     Share    This is a share icon  See the chapter on shares for details on variants of this icon        2 7 NSA RESET Button    BES    Use the RESET button on the front panel of the NSA to reset either just the NSA   s admin  password and IP address settings or the whole factory default configuration file  Use an object  such as an unfolded paper clip to press the RESET button        Ideally you should back up the current NSA configuration file before resetting  or reloading the factory default configuration file        2   1 Reset    Do the following to only reset the administrator password and IP address settings 
29.   provided that you also meet all of these conditions  a  The modified  work must itself be a software library  b  You must cause the files modified to carry prominent  notices stating that you changed the files and the date of any change  c  You must cause the  whole of the work to be licensed at no charge to all third parties under the terms of this  License  d  If a facility in the modified Library refers to a function or a table of data to be  supplied by an application program that uses the facility  other than as an argument passed  when the facility is invoked  then you must make a good faith effort to ensure that  in the event  an application does not supply such function or table  the facility still operates  and performs  whatever part of its purpose remains meaningful   For example  a function in a library to  compute square roots has a purpose that is entirely well defined independent of the  application  Therefore  Subsection 2d requires that any application supplied function or table  used by this function must be optional  if the application does not supply it  the square root  function must still compute square roots   These requirements apply to the modified work as a  whole  If identifiable sections of that work are not derived from the Library  and can be  reasonably considered independent and separate works in themselves  then this License  and  its terms  do not apply to those sections when you distribute them as separate works  But when  you distribute t
30.   s  battery charge gets down to the percentage you specify in this field  This  allows the NSA to shut down properly and avoid data loss caused by a  power failure when the UPS stops supplying power    A setting around 50  is recommended  A setting close to 100  is not  recommended since it would cause the NSA to shut down whenever the  UPS is charging  A setting close to 0 is also not recommended since the  UPS would not have enough power to allow the NSA to shutdown  properly     Apply Click this to save your changes in this section           NSA 2401 User   s Guide    Chapter 11 Maintenance Screens    Table 106 Maintenance  gt  Power Management  continued   LABEL DESCRIPTION    Power On After Power Select an option to set whether or not the NSA restarts when the power is  Failure restored after a power failure     Keep Former Status Select this option to have the NSA automatically restart only if it was  operating when the power failed  The NSA remains off if it was already off  when the power failed     Always Power On Select this option to keep the NSA operating as much of the time as  possible  The NSA restarts automatically even if it was turned off when  the power failed     Always Power Off Select this option to keep the NSA from automatically restarting when the  power is restored after a power failure  This is a computer s    traditional     behavior  Select this if you have other servers such as a domain controller  or DNS server that you want to start or check a
31.   s Guide 257    Chapter 13 Product Specifications    Table 110 Firmware Features  continued     Disk Quota Use the disk quota feature to stop one user s  from using up all disk  capacity by setting a limit on how much storage space he she may  use     User Passwords Configure a password for an individual User to restrict access to the  NSA  Non admin users can change their own passwords by    accessing the Web Configurator  The Change Password screen  appears when a username other than    admin    is entered     Volume Encryption The NSA can create encrypted volumes so an attacker who removes  the physical drive still cannot read the data     ACL The Access Control List  ACL  defines user read write permissions for  specific files and or folders     Storage Event Logs The NSA can keep detailed records of all user access to files and  folders     Workgroup and Domain For Windows or Mac OSX users  using the Common Internet File   Security Modes System  CIFS  protocol for remote file access  you can configure  Workgroup mode requiring users to log in with a user name and  password  These user and group accounts are maintained on the  NSA  For a large number of CIFS users where accounts are stored on  an external server  you can use Domain security mode  Primary  Domain Controller        Client Support Data can be shared among all Windows  Mac  Linux  and UNIX users  that have FTP client software or CIFS file sharing support  such as  Samba for Linux and UNIX users      IEEE 802
32.   s storage allocation  With it  an administrator can create   delete  move and resize any number of logical volumes at will     Snapshot    A snapshot is a    point in time    copy of data on a logical volume  Later  as new snapshots of  the volume are made  only those bits of data that have changed from the original snapshot are  duplicated  This allows a system to create instant backups on the fly without requiring a user to  stop working or temporarily abandon the machine  Moreover  snapshots take up a fraction of  the space of traditional full volume backups     Network Attached Storage  NAS     A NAS is basically a computer that is connected to a network and which provides additional  storage capabilities to users and groups  NAS solutions most often serve as backup  destinations because they come with multiple hard disk drives and numerous redundancy  features in case any given drive fails     Access Control List  ACL     This is a list of read write permissions associated with specific files and or folders  Account  names added to the list are linked to the files and folders that they are allowed to access  along  with what kinds of actions they are allowed to perform with those files and folders     NSA 2401 User   s Guide    Chapter 8 Sharing Screens    Conflicting Share Access and ACL Settings    If the share   s access permissions and the access permissions defined in the ACL differ  the  NSA applies whichever is more restrictive  For example  if the share allows 
33.  04 15 17 07       7 This screen lists the Strategy share   s ACLs  Click Close     Figure 74 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL  gt  Strategy  ee SS SS SS S     ACL Configuration    New ACL Edit ACL Reset ACL    Share Name   Gonzo     eim  Type ACL Path      Og  Strategy 2010 2014 Plans doc       You are done configuring the 2010 2014 Plans doc file   s ACL settings  Only Gonzo can edit  or delete the files in the Strategy folder  Kermit and any member of the senior management  group can log into the NSA and view the contents of the Strategy folder  although Kermit  cannot see the 2010 2014 Plans doc file     NSA 2401 User s Guide    3 6 Power Resume    Chapter 3 Tutorials    To keep the NSA operating as much of the time as possible  do the following to have the NSA  automatically restart when the power comes back on after a power failure     Click Maintenance  gt  Power Management  Select Always Power On and click Apply     Figure 75 Maintenance  gt  Power Management      Status    Date Time    Internal Storage  External Storage    TECP AF  Windows CIFS  NFS    Users  Groups  Shares    Backup   Restore  Snapshot  Backup Software    FIP  Print Server  Copy Button    Log  Configuration  SSL Certification  Fw Upgrade    Power Managemen    Shutdown       es Maintenance   Power Management    Hard Drive Sleep Time Settings      Note  Set the Hard Drive Sleep Time to 0 minute s  to Disable     A caution  When your Hard Drive s  are asleep  it may take some tim
34.  2011     install gest  Issuer Statement       NSA 2401 User s Guide    Chapter 3 Tutorials    5 In the Certificate Import Wizard  click Next     Figure 49 Certificate Import Wizard  Welcome    Certificate Import Wizard    Welcome to the Certificate Import  Wizard    This wizard helps you copy certificates  certificate trust  lists  and certificate revocation lists from your disk to a  certificate store     A certificate  which is issued by a certification authority  is  a confirmation of your identity and contains information  used to protect data or to establish secure network  connections     certificate store is the system area where  certificates are kept     To continue  cick Next        6 Leave Automatically select certificate store based on the type of certificate selected  and click Next   Figure 50 Certificate Import Wizard  Certificate Store  Certificate Import Wizard    Certificate Store  Certificate stores are system areas where certificates are kept     Windows can automatically select a certificate store  or you can specify a location for        Automatically select the certificate store based on the type of certificate         Place all certificates in the following store    fe s                              NSA 2401 User   s Guide 13    Chapter 3 Tutorials    7 Inthe Completing the Certificate Import Wizard screen  click Finish   Figure 51 Certificate Import Wizard  Finish  Certificate Import Wizard    Completing the Certificate Import  Wizard    You have suc
35.  202    This connection to the server is encrypted     Should I trustthis site     View certificates       304 NSA 2401 User s Guide    Appendix C Importing Certificates    Installing a Stand Alone Certificate File in Internet Explorer    Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate  when prompted  you can install a stand alone certificate file if one has been issued to you     1 Double click the public key certificate file     Figure 261 Internet Explorer 7  Public Key Certificate File  2 Inthe security warning dialog box  click Open   Figure 262 Internet Explorer 7  Open File   Security Warning    Open File   Security Warning  Do you want to open this file   Name  CA cer  as Publisher  Unknown Publisher    Type  Security Certificate  From  D  Documents and Settings 13435 Desktop    Always ask before opening this file    While files from the Intemet can be useful  this file type can  potentially hann your computer  f you do not trust the source  do not  open this software  What s the risk        3 Refer to steps 4 12 in the Internet Explorer procedure beginning on page 300 to  complete the installation process     NSA 2401 User   s Guide 305    Appendix C Importing Certificates    Removing a Certificate in Internet Explorer  This section shows you how to remove a public key certificate in Internet Explorer 7     1 Open Internet Explorer and click Tools  gt  Internet Options     Figure 263 Internet Explorer 7  Tools Menu    er     E
36.  35 am GMT   Serial number  11139321193569894228   MDS digest  3F 9A 76 6E A9 F5 07 41 BE 4C 8B 8B A2 D3 F0 2F   Cipher in use  DHE RSA AES256 SHA   Details  DHE RSA AES256 SHA SSLv3 Kx DH Au RSA Enc AES 256  Mac SHA1l  SSL version  TLSv1 SSLv3   Cipher strength  256 bits used of a 256 bit cipher          NSA 2401 User   s Guide    Appendix C Importing Certificates    Installing a Stand Alone Certificate File in Konqueror    Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate  when prompted  you can install a stand alone certificate file if one has been issued to you     1 Double click the public key certificate file     Figure 292 Konqueror 3 5  Public Key Certificate File       2 Inthe Certificate Import Result   Kleopatra dialog box  click OK     Figure 293 Konqueror 3 5  Certificate Import Result  W Certificate Import Result   Kleop    Detailed results of importing CA  der     T  Total number processed  1    Imported  1       The public key certificate appears in the KDE certificate manager  Kleopatra     Figure 294 Konqueror 3 5  Kleopatra    Kleopatra    File View Certificates CRLs Tools Settings Help    Subject   Issuer   Serial    CN 10R CA 1 PN O Bundesnetzagentur c    CN 10R CA 1 PN 0 B    2A  CN 11R CA 1 PN O0 Bundesnetzagentur C    CN 11R CA 1 PN 0 B    2D  CN 172 20 37 202 0U X Z2200 0 ZyXEL  i CN 172 20 37 202 00  CN 6R Ca 1PM NAMEDISTINGUISHER 1 0    CN 6R Ca 1 PN NAME     CN 7R CA L PN  NAMEDISTINGUISHER 1 0    CN 7R CA 1 P
37.  3d Ethernet LAN2 can backup LAN1  If LAN1 loses its connection  LAN2 takes   Failover over LAN1   s IP address and traffic    IEEE 802 3d Ethernet Load   The NSA can distribute the traffic load across LAN1 and LANZ2    Balance   HTTP HTTPS Access the NSA using a regular web connection  HTTP  or an  encrypted web connection  HTTPS  using secure socket layer  SSL      SSL Certificate Manager The NSA can generate certificates and certificate requests     DHCP  Dynamic Host DHCP  Dynamic Host Configuration Protocol  allows the NSA to   Configuration Protocol  obtain an IP address and subnet mask at start up from a centralized  DHCP server  Alternatively  you can give the NSA a static IP address  and subnet mask        Full Network Management The embedded Web Configurator is an platform independent web   based utility that allows you to easily access the NSA   s management  settings     Firmware Upload and Upload new firmware to the NSA using the Web Configurator  You  Configuration File can also back up and restore the NSA configuration file containing all  Management its settings to from your computer     NSA Discovery Utility  NDU    Use the NDU from a Windows computer to find NSA s  in your  network  access the NSA login page  change its IP address  configuration or map to a Windows network drive     Genie Backup Manager Genie Backup Manager is a tool for Windows users to create  and  schedule  backups of data stored on their Windows computer to an  NSA     The NSA can use th
38.  56 Firefox  Secure Connection Failed   ceseedisccicsctecccavsseeenapesaeeiaracccidiasmeepeceecaeioomnsenesiantegeecsebeeacs 76  Figure 57 Firefox  Secure Connection Failed            ccccecccecescccecceeeeeceeeeeeeeeeeeeeaeeseeeeessseeaeeeeeesseaeeeeeeeeetags 77  Figure 58 Firefox  Add Security FANN essensen eeldLe 77  Figure 59 Firefox  Add Security Exception            cccccccccccssseecceeeeeaeeeeeeeeeeeseeeeeeeeseaeeeeessaaeaeeeeessaaaeeeeeeeeeeaas 78  Figure 60 FO Acd Secu B  NN oiesesenetacictacsinensccnreescucvseneacaicradeesasementetdaccbepeacnieeemiasnicretieiouns 79  Figure 61 Firefox  Add Security Exception            cccccccccccsssescceeeceaeeeeeeeeeeeseeeeeeseesaseeeeessaeeaeeeeessaaaeeeeeeeeeeaas 80  ae ATIP E etches eg Sa ss ew nme pea ale ee sce eerie 81  Pour eo FE es ee vek 82  Figure 64 FileZilla Unknown Certificate Warning             cccccccssseseecceeeeceecceeeeecaeeeceeeeaaeeeeeseaecessueseeesaanaaes 83  ETE EEE EEE ER 83  Figure 66 Sharing  gt  Shares  gt  Edit Share Lenne elenelekd 84  Figure 67 Share Access Configuration            cccccccsseecccceceeeeseceeecaaeeeeeeeeeaeeeeeeeeesseeeeceeesssaeaeeeeeeesaeaeeeseeeeeaas 84  eg ee TE EE EE EE ER ER 85  Figure 69 Sharing  gt  Shares  gt  ACL Configuration             ccccccccccsseeeeeeceeeeeeeeeeeseaeeeeeceeseseeaeeeeeesseaeeeeeessaaegs 85  Figure 70 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL      rrrnnnnnnnvnnnnnnnrnnnnnnrvnnnnnnrennnnnnrnnnnnsnsennnnnne 86  Figure 71 Sharing  gt  Shares  
39.  Appearance Dashboard  amp  Desktop  amp   Expos   Screen Saver    Hardware    0       Bluetooth CDs  amp  DVDs Displays    Internet  amp  Network     e fa ci  2 Inthe System Preferences window  click the Network icon        Figure 224 Mac OS X 10 4  System Preferences          aan System Preferences    4     Show All   fal  Personal  GEM AA 6 Q  Appearance Dashboard amp  Desktop  amp  Dock International Security Spotlight  Expos   Screen Saver  Hardware  no  E 0   gt  ws A  ko i    Y EF i       Bluetooth CDs  amp  DVDs Displays Energy Keyboard  amp  Print  amp  Fax Sound  Saver Mouse  Internet  amp  N    a eya             Mac QuickTime Sharing  System  2aGQ         E  Accounts Date  amp  Time Software speech Startup Disk Universal    Update ACCESS    NSA 2401 User   s Guide 283    Appendix B Setting Up Your Computer   s IP Address    3 When the Network preferences pane opens  select Built in Ethernet from the network  connection type list  and then click Configure     Figure 225 Mac OS X 10 4  Network Preferences  een Network      lt       Show All   Q    Location  _ Automatic hed  Show    Network Status 14     Bulk in Ethernet 15 currently active and has the IP address                      Built in Ethernet 10 0 1 2  You are connected to the Internet via Built in Ethernet   l Internet Sharing 15 on and is using AirPort to share the     AirPort connection            Configure        Bsconnect      D  Click the lock to prevent further changes    Assist me      Apply Now    4 
40.  BTN   NOTICE RESET BUTTON  Reset  configuration to factory default   Scheduler  INFO  Job  O is triggered by schedule  JOBname     1        Scheduler INFO Job  0  is is finished JOB name  successfully    Ene  I ee ME EE    CLE INFO Restore job   0   is triggered by   JOB name  user  Scheduler    INFO  Power On  schedule is  Power triggered   Scheduler    INFO  Power Off  schedule is  Power triggered   Scheduler    INFO  Reboot  schedule is triggered   Power  Snapshot INFO Take Snapshot with Job Name   Snapshot Job   Rotate   0   Rotate Count  1    name Count  SUCCESS  Snapshot CRIT Take Snapshot with Job Name   Snapshot Job   Rotate   0   Rotate Count  1    FAILED   name Count  Snapshot INFO Purge Snapshot Image  0   Snapshot  SUCCESS Image Name  Snapshot CRIT Purge Snapshot Image  0   Snapshot  FAILED Image Name  Snapshot INFO Delete Snapshot Image  0   Snapshot  SUCCESS Image Name  Snapshot CRIT Delete Snapshot Image  0   Snapshot  FAILED Image Name       NSA 2401 User   s Guide 267    Appendix A Log Messages    Table 114 Log Messages    FEATURE  SEVERITY MESSAGE   ARGUMENT S    Snapshot INFO Expand Snapshot Image Snapshot Size   O  Increased Size  1 MB   Image Name  SUCCESS   Snapshot CRIT Expand Snapshot Image Snapshot Size   O  Increased Size  1 MB   Image Name  FAILED    INFO Enable Snap Share  SUCCESS  CRIT Enable Snap Share  FAILED    INFO Disable Snap Share  SUCCESS LG  CRIT Disable Snap Share  FAILED i    Snapshot CRIT No Freespace to Expand Snapshot  Snapshot  Pur
41.  Computer  ae Tour Windows sP       Windows Movie Maker E  Control Panel    I Printers and Faxes        Help and Support       Search    All Programs  gt  EJ Run        Log Orr   D    Turn OFF Computer    is untitled   Paint    2 Inthe Control Panel  click the Network Connections icon     Figure 212 Windows XP  Control Panel  E Control Panel    File Edit View Favorites Tools Help       e acl        ei po Search m Folders Hae    address  gt  Control Panel    vg Control Panel    Network   E Switch to Category view Connections    See Also    7 Game    Windows Update Controllers          2 6 NSA 2401 User   s Guide    Appendix B Setting Up Your Computer   s IP Address    3 Right click Local Area Connection and then select Properties     Figure 213 Windows XP  Control Panel  gt  Network Connections  gt  Properties    ocal Area Connection    nabled    jas 3 standard PCI Fast Ethernet Adapte  Disable    Status  Repair    Bridge Connections    Create Shortcut    Rename       4 On the General tab  select Internet Protocol  TCP IP  and then click Properties     Figure 214 Windows XP  Local Area Connection Properties        _ Local Area Connection Properties      General   Authentication   Advanced _  Connect using     M Accton EN1207D TX PCI Fast Ethernet Adapter            This connection uses the following tems      M E Client for Microsoft Networks  File and Printer Sharing for Microsoft Networks                              Description    Transmission Control Frotocol Internet Prot
42.  EE NN EE EE 276  Figure 212 Windows PI OPP saseserree eee ae 276  Figure 213 Windows XP  Control Panel  gt  Network Connections  gt  Properties              cccccsseeseeeeeeeeeeees 277  Figure 214 Windows XP  Local Area Connection Properties         rrrrrrnnrerrnnnrrrnnnrrnnnnnennanrennnenennnanennnaneen 277  Figure 215 Windows XP  Internet Protocol  TCP IP  Properties        rrrrrnrrrrvrnnrnvrrrrnnrevrrnnnnrrnrnnenenrnnnnnene 278  Figure 216 Windows vista  Start EEE 279  Foure 217 IS Veia COMTO EE rirka ir kirisaii iiite 279  Figure 218 Windows Vista  Network And Internet                  ccccccseeeeceeseeceeseeceeseecceeeeeseaeeecsageessegeesseeeeess 279  Figure 219 Windows Vista  Network and Sharing Center              cccccseccccccssseeeceeeeeecseeeseceeseseeeseeaeeeesaaees 280  Figure 220 Windows Vista  Network and Sharing Center        rrrrrnnnrrnnnnnnnrrnnnnnrvnnnnnnrnvrnnnnennnnnnrenrnnnerennnnn 280  Figure 221 Windows Vista  Local Area Connection Properties       rrrrnrnrrnrannnnevrnnnnnnvrrnnnnrvnnnnnrennnnnnrennnnn 281  Figure 222 Windows Vista  Internet Protocol Version 4  TCP IPv4  Properties               c cccccceseeeeeeeeees 282  Figure 223 Mac OS X 10 4  Apple Menu      rrrannnrrrnrrnnnnnvrnrrnnnnnnnvrnnnnnnnnnrrnnnnnnnnnrrnnnnnnnnnsrnnnnnnnsnseennnnnnnnnnee 283  Figure 224 Mac OS X 10 4  System Preferences Luuussdnerssemkenease eee abetbukondande 283  Figure 225 Mac OS X 10 4  Network Preferences        rrrrrnnnnnnrnnnnnnnnnnernnrrnnnnrrnnnnnnnnnnnnnnrnnnnn
43.  Information     Job Mame   German Office    Job  Description        Backup Type  Archive    o Synchronization       Publish     Mirror    A Caution     Please make sure that your backup target directory is  empty  otherwise all files will be deleted during the first  run of the backup job           NSA 2401 User   s Guide    Chapter 3 Tutorials    3 Select the folder that needs to be mirrored  the Gonzo share   s Strategic Partners folder  in this example  and Remote   e Enter the other NSA   s address and administrator password   e Click Show target content to display the remote NSA   s contents   e Select the destination on the remote NSA  Backups in this example    e Click Next     Figure 82 Protect  gt  Backup  gt  Add Job  Step 2    Add anew backup Job    volumet    EH    volume  EL sj Gonzo    EH  5SyearPlan    EH  snap share    FLEA Strategic Partners  LH  Kermit  HHC  Strategy    Cm Business Plan  lial Sales    volurelfGonzofStrateqgic Partners       Backup Target    g Remote  Remote NSA 921681340  pr  192 160 1 34  Username  admin Admin Only     Remote  Admin s   BER    Password    SHOW     content      OG   volumet  x     iad       volume    volurnelfBackups     C Local    f External    Previous          94 NSA 2401 User s Guide    Chapter 3 Tutorials    4 Click OK in the warning dialog box     Figure 83 Protect  gt  Backup  gt  Add Job  Step 3  The page at http   192 168 1 35 says      iz        You are creating a mirror job  When you run this job  all the file fo
44.  MAXIMUM EXTENT PERMITTED  BY LAW  ZyXEL DISCLAIMS ALL WARRANTIES OF ANY KIND  EITHER  EXPRESSED OR IMPLIED  INCLUDING  WITHOUT LIMITATION  IMPLIED  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE  ZyXEL DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN  THE SOFTWARE WILL MEET ANY REQUIREMENTS OR NEEDS YOU MAY HAVE   OR THAT THE SOFTWARE WILL OPERATE ERROR FREE  OR IN AN  UNINTERUPTED FASHION  OR THAT ANY DEFECTS OR ERRORS IN THE  SOFTWARE WILL BE CORRECTED  OR THAT THE SOFTWARE IS COMPATIBLE  WITH ANY PARTICULAR PLATFORM  SOME JURISDICTIONS DO NOT ALLOW  THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT  APPLY TO YOU  IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE BY A  COURT OF COMPETENT JURISDICTION  THEN ALL EXPRESS AND IMPLIED  WARRANTIES SHALL BE LIMITED IN DURATION TO A PERIOD OF THIRTY  30   DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE  AND NO  WARRANTIES SHALL APPLY AFTER THAT PERIOD     7 Limitation of Liability    IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY  INCIDENTAL OR CONSEQUENTIAL DAMAGES  INCLUDING  WITHOUT  LIMITATION  INDIRECT  SPECIAL  PUNITIVE  OR EXEMPLARY DAMAGES FOR  LOSS OF BUSINESS  LOSS OF PROFITS  BUSINESS INTERRUPTION  OR LOSS OF  BUSINESS INFORMATION  ARISING OUT OF THE USE OF OR INABILITY TO USE  THE PROGRAM  OR FOR ANY CLAIM BY ANY OTHER PARTY  EVEN IF ZyXEL  HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES  ZyXEL S  AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS  AGREEME
45.  Mode    LAN1       LAN2       Link Aggregation  This uses IEEE 802 3ad port link aggregation to combine LAN  and  LAN  into a single logical link with greater bandwidth  Both interfaces use the same IP  address and MAC address  It also includes fault tolerance and load balancing  Connect LAN I  and LAN  to the same Ethernet switch  The switch must also have IEEE 802 3ad port link  aggregation  also called trunking  enabled for the two interfaces connected to the NSA     Figure 142 Link Aggregation Teaming Mode    LAN1       LAN2       Jumbo Frames    To use jumbo frames  your network must support I Gbps transmissions  Gigabit Ethernet   All  of your network devices  computer Ethernet cards and switches  hubs  or routers  must also  support the same size of jumbo frames that you specify in the NSA     NSA 2401 User   s Guide 161    Chapter 7 Network Screens    BS       If you enable jumbo frames on the NSA in a network that does not support  them  you will lose access to the NSA  If this occurs  you will have to restore  the factory default configuration  Use the RESET button or the Web  Configurator        In the following example  the NSA has jumbo frames enabled and set to 9KB frames  This  means the computer  notebook computer  and switch must also have jumbo frames enabled  and be capable of supporting 9KB frames     Figure 143 Jumbo Frames       1 Gbps Ethernet       7 2 1 Configuring the TCP IP Screen    BES    Use the Network  gt  TCP IP screen to assign the NSA a dyn
46.  Protect Screens    Figure 166 Protect  gt  Backup    rh 8 amp 8 pA    Add Job Edit Job Delete Execute Restore  Selected Job Now Archive       The following table describes the icons in this screen   Table 68 Protect  gt  Backup Icons    ICON DESCRIPTION    Add Job  Click this icon to create a new backup job  see also Section 9 2 2 on page  202      Edit Job  Select a backup job and click this icon to modify it   s settings       Delete Selected Jobs s   per  Select a backup job s  and click this icon to remove the job s   This does  i not delete any backup files the backup job has already created     gone Job  All selected backup job s  will be DELETED    re you sure you want  to DELETE the selected backup jobs      Execute Job Now    Select a backup job and click this icon to have the NSA perform the  backup now  without waiting for the scheduled time      Restore Archive  Select an archive backup job that has already run and click this icon to     restore a previous backup from another NSA or external USB hard drive  connected to the NSA  Another option is to use Protect  gt  Restore   Section 9 2 3 on page 208  to restore by the backup files themselves           NSA 2401 User s Guide    Chapter 9 Protect Screens    Table 68 Protect  gt  Backup Icons  continued   ICON DESCRIPTION    Abort Job    If a backup job is currently running  you can select it and click this icon to  stop and abort the job     Sort  Click a column   s heading cell to sort the table entries by that c
47.  Q    QuickTime Sharing       Network       System           na    9 O     Accounts Date  amp  Time Parental Software Speech Startup Disk Time Machine Universal    Controls Update Access    286 NSA 2401 User s Guide    Appendix B Setting Up Your Computer s IP Address    3 When the Network preferences pane opens  select Ethernet from the list of available  connection types     Figure 231 Mac OS X 10 5  Network Preferences  gt  Ethernet  aon Network       Internal Modem as    Not Connected 5 Status  Not Connected  The cable for Ethernet is connected  but    PPPoE your computer does not have an IP address   Not Lonnected        Ethernet ae Configure    Using DHCP    Not Connected       FireWire    Not Connected    AirPort    Off    DNS Server     Search Domains     802 1X  WPA  ZyXELO4  Chavanced                   n    p   Click the lock to prevent further changes    Assist me         4 From the Configure list  select Using DHCP for dynamically assigned settings        5 For statically assigned settings  do the following   e From the Configure list  select Manually   In the IP Address field  enter your IP address   e In the Subnet Mask field  enter your subnet mask   e In the Router field  enter the IP address of your NSA     NSA 2401 User   s Guide 287    Appendix B Setting Up Your Computer   s IP Address    Figure 232 Mac OS X 10 5  Network Preferences  gt  Ethernet  An Network       Location    Automatic Hj          Internal Modem Q    Not Connected  amp   Status  Not Connect
48.  RAID 0 are non critical data  or data that changes infrequently and is  backed up regularly  requiring high write speed such as audio  video  graphics  games and so  on     6 9 4 RAID 1    RAID 1 creates an exact copy  or mirror  of a set of data on another disk  This is useful when  data backup is more important than data capacity  The following figure shows two disks in a  single RAID I array with mirrored data  Data is duplicated across two disks  so if one disk  fails  there is still a copy of the data     Table 39 RAID 1       As RAID 1 uses mirroring and duplexing  a RAID 1 array needs an even number of disks  two  or four for the NSA      NSA 2401 User   s Guide    Chapter 6 Storage Screens    RAID I capacity is limited to the size of the smallest disk in the RAID array  For example  if  you have two disks of sizes 150 GB and 200 GB respectively in one RAID   array  then the  maximum capacity is 150 GB and the remaining space  50 GB  is unused     Typical applications for RAID I are those requiring high fault tolerance without need of large  amounts of storage capacity or top performance  for example  accounting and financial data   small database systems  and enterprise servers     6 9 5 RAID 10    RAID 10  RAID 1 0  is a nested RAID where two RAID I arrays are stored on the physical  disks with a RAID 0 array on top  It is a stripe of mirrors  RAID 1 provides redundancy while  RAID 0 boosts performance  The following figure shows two disks in two RAID 1 arrays   Dat
49.  Refresh icon to update this display  It also automatically updates  itself every 60 seconds     Fan Speed This is the RPM  Rotations Per Minute  of the NSA   s fans   Click the Refresh icon to update this display  It also automatically updates  itself every 60 seconds    Memory Usage This shows how much of the NSA s total memory is being used   Click the Refresh icon to update this display  It also automatically updates  itself every 10 seconds     UPS Status When you use an APC Uninterruptible Power Supply  UPS  with a USB  connection to the NSA  this field displays the remaining charge for the  UPS s battery  A UPS is advisable to protect sensitive data stored on the  NSA in the event of a power outage    The NSA uses power from the UPS when the normal power source is  down and while the UPS still has battery power    The NSA shuts itself down if the UPS   s battery charge gets down to the  percentage you specify in the Power Management screen  see Section  11 6 on page 242   This allows the NSA to shut down properly and avoid  data loss caused by a power failure when the UPS stops supplying power   The NSA uses power from the normal power source again when its power  returns  The APC UPS battery is recharged then too     a T    Server Name This displays the name which helps you find the NSA on the network   Click the Edit icon to go to the Network  gt  Windows CIFS screen where  you can change the Server Name    Model Name This displays the device   s model name     This 
50.  ST32508205CE 3 40 232 09 GB       3 Click the RAID tab to display the RAID array summary screen  Select the array to  which you want to add the disk and click Add Disk     Figure 109 Storage  gt  Internal Storage  gt  RAID    Internal Storage    A FP T Sa S B     Wizards Create Rename Delete Repair Resyne   Add Disk  Remove  Speed Hot Spare    3  i DE  SED  1 atid    _ so       108 NSA 2401 User s Guide    Chapter 3 Tutorials    4 Select RAID5 Reshape and click Apply     Figure 110 Storage  gt  Internal Storage  gt  RAID  gt  Add Disk  PRS EGGENE   Add Disk    Disk Name  disk  w    Please choose an option      amp  RAIDS Reshape  C Add Hot Spare       5 After the NSA finishes adding the disk to the array  click the Disk tab  The new disk  displays the same Type and RAID Array as the other disks in the array     Figure 111 Storage  gt  Internal Storage  gt  Disk    EEE                                                   Internal Storage    F     Z     S M A  RT     Model Name    seagate STISO008305CE    raldsSD2D1iD4D3 465 76 GB      raidSD2D1D4D3 Beagate ST312082745 3 42 111 79 GB  Healthy       aidED2D1D4D3  DE WOS000AAVS 002ZTB      465 76 GB  Healthy 01 0       idsnonipaps   seagate ST32508205CE       232 89 GB  Healthy       You have completed adding the hard drive to the RAID array  Continue to Section 3 9 3 on  page 109 for how to use the increased storage capacity     3 9 3 Using a Disk Array   s Increased Capacity    After you increase an array   s storage capacity  us
51.  Settings window  select the connection that you want to configure  then  click Properties     Figure 237 Ubuntu 8  Network Settings  gt  Connections              Wetwone Setting    Location     Point to point connec     This network interface is not c                290  NSA 2401 User   s Guide    Appendix B Setting Up Your Computer s IP Address    5 The Properties dialog box opens     Figure 238 Ubuntu 8  Network Settings  gt  Properties  Ao Properties rrr    IP address     Subnet mask       Gateway address  fd       cancel        e In the Configuration list  select Automatic Configuration  DHCP  if you have a  dynamic IP address        e In the Configuration list  select Static IP address if you have a static IP address  Fill  in the IP address  Subnet mask  and Gateway address fields     6 Click OK to save the changes and close the Properties dialog box and return to the  Network Settings screen     7 Ifyou know your DNS server IP address es   click the DNS tab in the Network Settings  window and then enter the DNS server information in the fields provided     Figure 239 Ubuntu 8  Network Settings  gt  DNS    Search Domains          8 Click the Close button to apply the changes     NSA 2401 User   s Guide 291    Appendix B Setting Up Your Computer   s IP Address    Verifying Settings    Check your TCP IP properties by clicking System  gt  Administration  gt  Network Tools  and  then selecting the appropriate Network device from the Devices tab  The Interface Statistics  c
52.  Speed Hot Spare    TRAD A    i   mE   ecovering 0   112 81 GB  i i  11  raldsSpiD3D4 RAIDS Used  Estimated   Time Leftdt 223 56 GB Total 50  Free    sk     mings        After the recovery finishes and the status shows up as Healthy  reboot the NSA  Then you can  use the same process to migrate any  or all  of the RAID   s drive as long as you replace them  one by one and recover the RAID after each replacement  When you are done replacing hard  drives and the final RAID recovery finishes  you can assign the increased storage capacity to  your existing volumes  see Section 3 9 3 on page 109         NSA 2401 User   s Guide    Chapter 3 Tutorials    114 NSA 2401 User s Guide    PART II  Web Configurator    Status Screen  117        System Setting Screen  121   Storage Screens  125   Network Screens  159   Sharing Screens  173   Protect Screens  197   Application Screens  223     Maintenance Screens  229           Status Screen    4 1 Status Screen    The Status screen is the first screen you see after you log into the Web Configurator  and  complete the wizard for the first time   It provides an overview of your NSA   s status  settings  and activity  Once you leave the screen  you can return to it by clicking the Status icon or the  text itself on the top left of the navigation panel     Figure 121 Status Screen       System Resource    System Information    Server Name nsa2401   Model Name NSA 2401   Firmware Version 1 00 AFF 0 b4    00 19 CB 82 96 63   MAC Address 00 19 CB 8
53.  Statically assigned IP Address if you have a static IP address  Fill in the IP  address  Subnet mask  and Hostname fields     7 Click Next to save the changes and close the Network Card Setup window        NSA 2401 User   s Guide    Appendix B Setting Up Your Computer   s IP Address    8 If you know your DNS server IP address es   click the Hostname DNS tab in Network  Settings and then enter the DNS server information in the fields provided     Figure 246 openSUSE 10 3  Network Settings       Yast2 linux h20z  lt     Enterthenamefor          Network Settings  this computer and the    DNS domain that it    belongs to  Global Options Global Options   Overview   Overview   Hostname DNS J  Routing Routing      Optionally enter the  Hostname and Domain Name      name server list and Hostname Bomain Name  domain search list        linux h20z    site    Note that the  _  Change Hostname via DHCP  hostname is global  it    applies to all  interfaces  not just  this one      _  Write Hostname to  etc hosts    M Change  ete resoly conf manually   Name Servers and Domain Search List    The domain is Name Server l Domain Search  especially important if hov  gt    this computer is    mail  server  Name Server 2    If you are using DHCP    to get an IP address    check whether to get   a hostname via DHCP     The hostname of your s  host  which can be  _  Update DNS data via DHCP  seen by issuing the   hostname command    will be set   automatically by the   DHCP client  You may   want t
54.  YOUNG    AS IS  AND ANY EXPRESS OR  IMPLIED WARRANTIES  INCLUDING  BUT NOT LIMITED TO  THE IMPLIED  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE ARE DISCLAIMED  IN NO EVENT SHALL THE AUTHOR OR  CONTRIBUTORS BE LIABLE FOR ANY DIRECT  INDIRECT  INCIDENTAL   SPECIAL  EXEMPLARY  OR CONSEQUENTIAL DAMAGES  INCLUDING  BUT NOT  LIMITED TO  PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES  LOSS OF  USE  DATA  OR PROFITS  OR BUSINESS INTERRUPTION  HOWEVER CAUSED  AND ON ANY THEORY OF LIABILITY  WHETHER IN CONTRACT  STRICT  LIABILITY  OR TORT INCLUDING NEGLIGENCE OR OTHERWISE  ARISING IN  ANY WAY OUT OF THE USE OF THIS SOFTWARE  EVEN IF ADVISED OF THE  POSSIBILITY OF SUCH DAMAGE     The licence and distribution terms for any publicly available version or derivative of this code  cannot be changed  1 e  this code cannot simply be copied and put under another distribution  licence  including the GNU Public Licence       NSA 2401 User   s Guide 339    Appendix D Open Source Licences    This Product include mod ssl software under BSD license    BSD  Copyright  c   dates as appropriate to package     The Regents of the University of California  All rights reserved  Redistribution and use in  source and binary forms  with or without modification  are permitted provided that the  following conditions are met     Redistributions of source code must retain the above copyright notice  this list of conditions  and the following disclaimer     Redistributions in binary form must 
55.  a record of your new password whenever you change it   The system will lock you out if you have forgotten your password     anna    46  NSA 2401 User s Guide    Chapter 2 Introducing the Web Configurator    The following table describes the labels in this screen   Table 12 Password    LABEL DESCRIPTION  Account Name Type the user name of the account for which you want to change the  password     Old Password Type the user   s current password     Retype to confirm You must type the exact same password that you just typed in the above  field     Apply Click this button to save your changes back to the NSA   Cancel Click this button to begin configuring this screen afresh        New Password Create a new password for the user  You can type from one to 14 single   byte  no Chinese characters allowed for example  ASCII characters     2 6 Administration Screens    The Administration tab displays when you log in as the administrator  Click Administration  in the My NSA screens to open the advanced administration screens     The first time you access the administration screens  the setup wizard opens  See the online  help for details on the setup wizard screens  After you configure the setup wizard  the Status  screen displays when you enter the advanced administration screens     NSA 2401 User   s Guide    Figure 15 Status  ZyXEL    fice    Date Time    Internal Storage  External Storage    TCP IP  Windows CIFS  NFS    Users  Groups  Shares    Backup   Restore  Snapshot  Backup So
56.  and configure the NSA   s installed disks  RAIDs  and   Storage volumes   o View and configure the NSA   s USB connected disks and volumes  Network Configure the NSA   s teaming mode  IP address  and DNS  settings  You can also perform a ping test  Windows CIFS   Specify the NSA   s server name and workgroup name and choose   a workgroup or domain authentication method    Dm  oA  v 2  as  oD       O     5     U    NFS Configure NFS settings so computers with Unix or Linux operating  systems can access the NSA  Sharing Users Create users who may use the NSA  You may set user passwords   define storage limits per user  and associate users to a group s    Create user groups and add group members   Create shared folders to which you can allow users and or groups  read write access rights  Protect Create and manage data backups to an external USB disk drive or  another NSA over the network   Restore a previous backup from another NSA or external USB  hard drive connected to the NSA   Snapshot Create and manage snapshots  records of changes to an internal  volume at a particular moment in time    Backup Use this screen to display the backup software license keys   Software  Applications FTP Enable FTP file transfer to from the NSA  set the number of FTP  connections allowed  an FTP idle timeout  and the character set     View and manage the NSA   s list of printers and print jobs     ep   3         D  vp     Copy Button Configure the copy button share location    Maintenance Log V
57.  and reproducing the content of the  NOTICE file     7  Disclaimer of Warranty  Unless required by applicable law or agreed to in writing  Licensor  provides the Work  and each Contributor provides its Contributions  on an    AS IS    BASIS   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND  either express or implied   including  without limitation  any warranties or conditions of TITLE  NON   INFRINGEMENT  MERCHANTABILITY  or FITNESS FOR A PARTICULAR PURPOSE   You are solely responsible for determining the appropriateness of using or redistributing the  Work and assume any risks associated with Your exercise of permissions under this License     8  Limitation of Liability  In no event and under no legal theory  whether in tort  including  negligence   contract  or otherwise  unless required by applicable law  such as deliberate and  grossly negligent acts  or agreed to in writing  shall any Contributor be liable to You for  damages  including any direct  indirect  special  incidental  or consequential damages of any  character arising as a result of this License or out of the use or inability to use the Work   including but not limited to damages for loss of goodwill  work stoppage  computer failure or  malfunction  or any and all other commercial damages or losses   even if such Contributor has  been advised of the possibility of such damages     9  Accepting Warranty or Additional Liability  While redistributing the Work or Derivative  Works thereof  You may choose to offer  a
58.  be lost if a second hard drive fails  Data access may also be slower from a degraded array   It   s recommended that you replace the faulty disk and repair the array as soon as you can        The NSA automatically repairs a degraded RAID if you insert an empty disk  without an existing file system  Otherwise  when you replace a disk you must  go to the Storage  gt  Internal Storage  gt  RAID screen and click Repair        Down Arrays    When an array is down  it cannot be fixed  The array cannot be used and the data is lost   Replace the faulty disk s  and recreate the array  volumes  and sharing configuration     Finding Out More    See Section 6 9 on page 151 for theoretical background information on JBOD and the RAID  levels used on the NSA     Read Section 3 9 on page 106 for how to increase the NSA   s storage capacity     NSA 2401 User   s Guide    Chapter 6 Storage Screens    6 2 Internal Storage Status Screen    Click Storage  gt  Internal Storage  gt  Status to display the following screen  This screen  displays general information about the disks installed in the NSA and the disk arrays and  volumes created on them     Figure 124 Storage  gt  Internal Storage  gt  Status    Wizards    Status   Disk   RAID   volume           i   Note  You can hover your cursor over a volume or disk and a tooltip with more  information will appear     Used Locked Used Space RAID Free Volume Free    Volumes and  SE de    their capacity    volume fsnapshot  Space Space  Array type and 
59.  can access the NSA     7 1 2 What You Need to Know About the Network Screens    Teaming Mode    The teaming mode sets how the NSA   s two Gigabit Ethernet interfaces behave  They can act  independently  one can back up the other  they can share the traffic load  or they can be  trunked into a logical link     IP Address    The NSA needs an IP address es  to communicate with the computers on your network  The  NSA can get an IP address automatically if you have a device on your network that gives them  out  Or you can assign the NSA a static  fixed  IP address     DNS Server Address    A DNS  Domain Name System  server maps domain names  like www zyxel com  to their  corresponding IP addresses  This lets you use domain names to access web sites without  having to know their IP addresses  The NSA can receive the IP address of a DNS server  automatically  along with the NSA   s own IP address   You can also manually enter a DNS  server IP address in the NSA     NSA 2401 User   s Guide 159    Chapter 7 Network Screens    DHCP    DHCP  Dynamic Host Configuration Protocol  RFC 2131 and RFC 2132  allows individual  clients to obtain TCP IP configuration at start up from a server  You can configure the NSA as  a DHCP client which means it is set to receive an IP address from a DHCP server  The NDU  can help you discover the IP address of the NSA     Alternatively  configure a static IP address for the NSA     Jumbo Frames    Jumbo frames are Ethernet frames larger than 1500 bytes  T
60.  cannot be used and the  data is lost  Replace the faulty disk s  and recreate the array  volumes  and sharing  configuration     NSA 2401 User   s Guide 139    Chapter 6 Storage Screens    Figure 130 Storage  gt  Internal Storage  gt  Volume    Internal Storage       e bi  amp  8 9 Hh  amp     Wizards Create Duplicate Edit Delete Scan Unlock  Key      Disk   RAID Volume    Encrypted rald5D1D2D4       The following table describes the icons in this screen   Table 28 Storage  gt  Internal Storage  gt  Volume Icons    Wizards    Click this icon to open the Disk Setup Wizard to create a new disk array  or volume     Create    Click this icon to open a screen where you can create a new storage  volume     Duplicate Key   If you have volumes that were encrypted using a USB key  you can click  this to go to the external volume screen where you can copy the USB key  to a second USB device    Edit   Select a volume and click this icon to modify it s settings     Delete  Select a volume s  and click this icon to remove the volume s      Note  If you remove a volume  all data in the volume disk s   is lost     Scan  Select a volume and click this icon to check the volume   s file consistency     Scan Yolume      re you sure to scan the volume     Auto File Repair     Stop Volume Scan with Auto File Repair may cause data loss     Performing this operation will cause some network services to temporarily disconnect     Note  If you have the NSA automatically attempt to repair  any damaged
61.  column displays the last time the file or folder was changed  in year   month day hour minute second format      Click this button to return to the My NSA screen           NSA 2401 User   s Guide at    Chapter 2 Introducing the Web Configurator    2 5 2 My NSA Share Browsing Move to or Copy to Screen    The administrator can select a folder or file in the My NSA share browsing screens and click  the Move to button or the Copy to button to display a share browsing screen like the  following  Use the share browsing screen to select the target path for moving or copying the  folder or file     Figure 10 My NSA Share Browsing  gt  Move to  or Copy to   _ Select a folder    Shares  Fred       p      Mote        Files with same filename will be overwritten    The following table describes the labels in this screen   Table 7 My NSA Share Browsing  gt  Move to  or Copy to   LABEL DESCRIPTION    Select the target share    Path Select a folder on the NSA  You can also browse to find or create a folder on the NSA or  type the location of the folder using forward slashes as branch separators   Click this button to move or copy the file     Click this button to return to the My NSA share browsing screen        2 5 3 My NSA Share Configuration    Use the My NSA share configuration screens to see and configure share management details   Click My NSA and then the Configure button of one of your shares to open the following  screen  This screen displays a share   s management details     Fig
62.  connect to this Web site    Cancel       3 The certificate is stored and you can now connect securely to the Web Configurator  A  sealed padlock appears in the address bar  which you can click to open the Page Info  gt   Security window to view the web page   s security information     Figure 269 Firefox 2  Page Info    3 Page Info B EIK     General   Forms   Links   Media         Web Site Identity Verified    The web site 172  20 37  202 supports authentication for the page you are  viewing  The identity of this web site has been verified by ZyXEL  a certificate  authority you trust for this purpose           Vi View the security certificate that verifies this web site s    identity     Connection Encrypted  High grade Encryption  AES 256 256 bit   The page you are viewing was encrypted before being transmitted over the  Internet    Encryption makes it very difficult for unauthorized people to view information    traveling between computers  Itis therefore very unlikely that anyone read  this page as it traveled across the network                                   NSA 2401 User   s Guide    Appendix C Importing Certificates    Installing a Stand Alone Certificate File in Firefox    Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate  when prompted  you can install a stand alone certificate file if one has been issued to you     1 Open Firefox and click Tools  gt  Options     Figure 270 Firefox 2  Tools Menu    Tools    Web Search Ctrl X 
63.  dbredevapeieatasue 237  Table 102 Maintenance  gt  Configuration           ccccccccccccssscceeceesececeeeeceeceueceeseesecesseeseeeseeseceeseeeeeeeaeaeeeeeees 238  FIT agrees ceraees ycicaceennasee sient E REEN s 240  Table 104 Maintenance  gt  Configuration ccdisicescpatciresntisasercisinetsaratasitnaesvresnaaressinnseseeniviemarmarinarns 241  Table 105 Maintenance  gt  FW Upgrade er 242  Table 106 Maintenance  gt  Power Management         rrnnnnennnnnnnnnnnnennnnnennnnnnnnnnnennnnnsnnnnnsennnnnennnnnsennnnsennnnne 243  Table 107 Maintenance  gt  Power Management  gt  Edit       mmrranennnnennnnnnnnnnnnnnnennnnrnnnnrnnnnennnnennnnnnnnnsennnennnn 245  Table 108 Famtenantce  gt  SMLUIGOWT EE 246  Table 109 Physical he 257  Table 110 Firmware Features        rrrrannernnnnnennnnnennnnnennnnnennnnrnnnnnennnansennnnsennansennannsennunsennunsennnansennnnnsennnene 257  Table 111 NAN Je 259  Table 112 NSA Firmware Specifications vrede edited 260  Table 113 Power Consumption in Watts Oc ve 261  TL NNN EEEE E 265    NSA 2401 User   s Guide    List of Tables    28 NSA 2401 User s Guide    PART I    Introduction and  Tutorials    r NSA  31   ntroducing the Web Configurator  35           Getting to Know Your NSA    1 1 NSA 2401 Overview    The NSA  Network Storage Appliance  allows secure storage and management of data on  your network  Windows  Apple  or Linux users can access data on it as if it was on their own  computers  The NSA   s two Gigabit Ethernet ports can connect to two diff
64.  disk array containing the snapshots fails  then the snapshots are lost   6 The NSA does not take snapshots of a locked volume     Snapshot Purging    The NSA automatically purges snapshots just before taking a new snapshot  The NSA deletes  the oldest snapshot if there is no free space remaining on the disk array  space not used by  volumes   If there is not enough disk space for the new snapshot  the NSA continues to delete  older snapshots to make more space  It is possible that all previous snapshots will be lost     NSA 2401 User   s Guide    Chapter 9 Protect Screens       LES The snapshot capture fails if deleting all previous snapshots does not leave  enough space for the new snapshot  To take the snapshot  make more free  space on the disk array by recreating a volume with a smaller capacity or  upgrading the disk array to a larger storage capacity           LS It s strongly recommended to set the maximum amount of snapshots setting  as low as possible as a high amount of snapshots can significantly reduce the  volume   s file write performance        Purging of snapshots can also occur when more data is added to the volume  When more data  is being written it may cause the snapshot image size to increase beyond it   s original size   in   this case all the snapshots on the volume will need to expand to accommodate the extra data  If  there is not enough space for them all to expand  some snapshots may be deleted     See Table 112 on page 260 for the maximum number o
65.  field displays when you click the Search icon  Enter a specific word  for which to search  The default is all words     Search This button displays when you click the Search icon  Click to begin  searching according to the search parameters you set  If you choose not  to set any search parameters  then the defaults for each filter is used    Clear filter  This button displays when you click the Search icon  Click to reset all the  search filters back to their default settings    Previous  amp  Next Click Previous to cycle back through the pages of users  and Next to  cycle forward through them    Status This icon displays the account as either a Conflict User  a Local User  a  Domain User  or an Admin User        NSA 2401 User   s Guide    Chapter 8 Sharing Screens    Table 50 Sharing  gt  Users  continued   DESCRIPTION    User Type This field displays whether the account is a user or an administrator     User Name This field displays the user name created when you add a new user  The  admin account is the default NSA super user and cannot be deleted        Description This field displays any configured details about the user account     8 2 0 1 Conflict Users    A conflict user is a local user that has the same user name as that of a user on a domain  controller  For example  if you first create local users and groups on the NSA  in Workgroup  mode  and later you change to domain mode where you create  or there are already  identical  users and groups  then they appear as i
66.  files it finds during the scan  be careful  not to cancel the scan as you may lose data           140 NSA 2401 User s Guide    Chapter 6 Storage Screens    Table 28 Storage  gt  Internal Storage  gt  Volume Icons  continued   ICON DESCRIPTION    Lock   If an encrypted volume is unlocked  you can select it and click this icon to  lock it  No one will be able to use the volume until an administrator  unlocks it     Note  At start up  if a USB key is inserted  the NSA  automatically unlocks any volumes encrypted by the  USB key       Lock Yolume      re you sure to lock the volume     Performing this operation will cause some network services to temporarily  disconnect     Unlock    The NSA automatically locks an encrypted volume if the NSA loses power  or the disk is removed  Select a locked volume and click this icon to open  a screen where you can enter the volume   s password or use the USB key  to allow users to use the volume again  If you forgot the password  click  Password Prompt to display the hint you configured to help you  remember it     Unlock Internal Yolume    Please enter your volume s password to unlock it   Password    Password Prompt     If the USB device containing the volume   s key is already inserted  remove  it and re insert it    Sort   Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order    Status    This icon shows whether the volume is Healthy  Locked  Unlocke
67.  guided by the two goals of  preserving the free status of all derivatives of our free software and of promoting the sharing  and reuse of software generally     NO WARRANTY    11  BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE  THERE IS NO  WARRANTY FOR THE PROGRAM  TO THE EXTENT PERMITTED BY APPLICABLE  LAW  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT  HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM    AS IS    WITHOUT  WARRANTY OF ANY KIND  EITHER EXPRESSED OR IMPLIED  INCLUDING  BUT  NOT LIMITED TO  THE IMPLIED WARRANTIES OF MERCHANTABILITY AND  FITNESS FOR A PARTICULAR PURPOSE  THE ENTIRE RISK AS TO THE QUALITY  AND PERFORMANCE OF THE PROGRAM IS WITH YOU  SHOULD THE PROGRAM  PROVE DEFECTIVE  YOU ASSUME THE COST OF ALL NECESSARY SERVICING   REPAIR OR CORRECTION     12  INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN  WRITING WILL ANY COPYRIGHT HOLDER  OR ANY OTHER PARTY WHO MAY  MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE  BE  LIABLE TO YOU FOR DAMAGES  INCLUDING ANY GENERAL  SPECIAL   INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR    336 NSA 2401 User s Guide    Appendix D Open Source Licences    INABILITY TO USE THE PROGRAM  INCLUDING BUT NOT LIMITED TO LOSS OF  DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY  YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH  ANY OTHER PROGRAMS   EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN  ADVISED OF THE POSSIBILITY OF SUCH DAMAGES     END OF TERMS AND C
68.  key certificate  when prompted  you can install a stand alone certificate file if one has been issued to you     1 Open Opera and click Tools  gt  Preferences     Figure 280 Opera 9  Tools Menu    Mail and chat accounts     Delete private data       Notes Ctrl Alt E  Transfers Ctirl Alt T  History Cirl Alt H  Links Ctrl AltH  Advanced   Quick preferences       2 In Preferences  click Advanced  gt  Security  gt  Manage certificates     Figure 281 Opera 9  Preferences    Preferences    Tabs Choose a master password to protect personal certificates  Browsing     Notifications Set master password       Content  Fonts  Downloads    Programs Every time needed    Ask for password    History      Enable Fraud Protection    Toolbars  Shortcuts  Voice       1314 NSA 2401 User s Guide    Appendix C Importing Certificates    3 Inthe Certificates Manager  click Authorities  gt  Import     Figure 282 Opera 9  Certificate manager    Certificate manager         Certificate authorities   AAA Certificate Services     Actalis Root CA   AddTrust Class 1 CA Root   AddTrust External CA Root   AddTrust Public CA Root    AddTrust Qualified CA Root   Baltimore CyberTrust Code Signing Root   Baltimore CyberTrust Mobile Root   Baltimore CyberTrust Root    Certum CA     Certum CA Level I     Certum CA Level II     Certum CA Level IIT     Certum CA Level IV   Class 1 Public Primary Certification Authority   Class 1 Public Primary Certification Authority   G2   c  1998 VeriSig     Class 2 Public Primary 
69.  level of log that triggers the  audible buzzer   When you enable this feature  the NSA sounds an audible alarm buzzer if it    generates a log of a severity level equal to or higher than the one selected in the  drop down list box to the right     Apply Click this to save your changes   Click this to discard changes and close the window        11 2 4 Report Configuration    Click Maintenance  gt  Logs  gt  Report Config to open the report configuration screens     11 2 4 1 Mail Setting    This screen lets you configure whether or not logs are e mailed     NSA 2401 User   s Guide       Chapter 11 Maintenance Screens    Figure 196 Maintenance  gt  Log  gt  Log Report Configuration  gt  Mail Setting  Log Report Configuration    7    Dann    ee wi        o s  AF ina a  Mail Setting Report Se ung    syslog 3 erver Setting        Email Configuration       Enable Log Email    Email To   Email From   Email Server   Email Format    HTML    Plain Text      Use SMTP Authentication    Wser    Password    Password  fContirm     Lal After applying settings  Send a test email       The following table describes the labels in this screen   Table 98 Maintenance  gt  Log  gt  Log Report Configuration  gt  Mail Setting    LABEL DESCRIPTION  Enable Log Select this option to have the NSA periodically send log files by e mail to the  Email account specified in the options below     Email To Enter the e mail address to which you want the logs e mailed     Email From Enter the e mail address from w
70.  meaning it automatically adjusts to either a crossover or  straight through Ethernet cable     SATA Interface Serial ATA is an interface technology that allows high speed data  transfer  Serial ATA also allows more efficient internal airflow and  also smaller chassis design     Hot Swappable Hard Drives   You can remove and install hard drives while the NSA is operating     Audible alarm buzzer triggered by logs of a user specified severity  level     Reset Button Use the reset button to reset the NSA  user name to    admin     default  password to    1234     default IP address to 192 168 1 3 with subnet  mask of 255 255 255 0  or restore the factory default configuration  file  all configurations  including shares  users  passwords and so on  are returned to the original configurations         These are some of the main firmware features of the NSA     Table 110 Firmware Features  Hard Drive Arrays RAID 0 with 2 3  or 4 hard drives   RAID 1 with 2 hard drives  RAID 5 with 3 or 4 hard drives    RAID 10  1 0  with 4 hard drives  JBOD with 1 2 3  or 4 hard drives       Create separate archive backups or synchronize a copy     Snapshot A snapshot is a backup of your NSA data on the NSA  If files within a  volume become infected or corrupted  you can revert the volume back  to a previous snapshot  It s a good idea to create a snapshot before  backing up data  to be sure you re backing up consistent data even if  the backup is still running several hours later     NSA 2401 User 
71.  network services and returns you to the login screen     Figure 44 Maintenance  gt  SSL  gt  Edit a Self Signed Certificate    Restarting Network  Services        AT Current Status Waiting for new network  settings to apply       The NSA Server will restart network services  After services  have been restarted you can begin accessing the system  using the new network host settings     This page will TRY to automatically redirect you to the web  configurator using the new network settings when it is  available     If you are not redirected please do so manually by clicking  the link below or typing the new host address in your  browser s address bar  If you continue to have problems  connecting  please use the NDU  Network Discovery Utility   tool to discover It           70 NSA 2401 User   s Guide    Chapter 3 Tutorials    3 5 1 2 Downloading and Installing the NSA   s Customized Certificate    1 Log in and return to Maintenance  gt  SSL  Under Modify the Existing Certificate  click  Download     Figure 45 Maintenance  gt  SSL    Force HTTPS  TLS SSL  Connections    A Caution     Modifications of TLS SSL certificate settings will restart network services        Force HTTPs    Install System Default CA    This action will install the system default C4 in the trusted CA list of your browser    Stepi Download the default CA file   Baja esis   gt     Step  Double click on the CA file to install it into your browser    Modify the Existing Certificate    fi Caution     Modificatio
72.  of 1050 GB  Since data isn   t striped across disks  if one disk fails   you should just lose the data on that disk  but you may lose data in the whole array depending  on the nature of the disk failure   You can add disks to the JBOD array later  using the Add  disk to JBOD feature  and even remove them so JBOD offers a lot of flexibility  However  JBOD read performance is not as good as RAID as only one disk can be read at a time and  they must be read sequentially  The following figure shows three disks in a single JBOD array   Data is not written across disks but written sequentially to each disk until it   s full     Table 37 JBOD       NSA 2401 User   s Guide    Hi    Chapter 6 Storage Screens    6 9 3 RAID 0    RAID 0 spreads data evenly across two or more disks  data striping  with no mirroring nor  parity for data redundancy  so if one disk fails the entire array will be lost  The major benefit  of RAID 0 is performance  The following figure shows two disks in a single RAID 0 array   Data can be written and read across disks simultaneously for faster performance     Table 38 RAID 0       RAID 0 capacity is the size of the smallest disk multiplied by the number of disks you have  configured at RAID 0 on the NSA  For example  if you have four disks of sizes 100 GB  150  GB  150 GB and 200 GB respectively in one RAID 0 array  then the maximum capacity is 400  GB  4   100 GB  the smallest disk size  and the remaining space  300 GB  is unused     Typical applications for
73.  originally written at the  National Center for Supercomputing Applications  University of Illinois  Urbana Champaign     This Product includes phpmvc software under LGPL license     GNU LESSER GENERAL PUBLIC LICENSE  Version 2 1  February 1999  Copyright  C  1991  1999 Free Software Foundation  Inc   59 Temple Place  Suite 330  Boston  MA 02111 1307 USA    Everyone is permitted to copy and distribute verbatim copies of this license document  but  changing it is not allowed   This is the first released version of the Lesser GPL  It also counts    as the successor of the GNU Library Public License  version 2  hence the version number 2 1     Preamble    326 NSA 2401 User s Guide    Appendix D Open Source Licences    The licenses for most software are designed to take away your freedom to share and change it   By contrast  the GNU General Public Licenses are intended to guarantee your freedom to  share and change free software  to make sure the software is free for all its users     This license  the Lesser General Public License  applies to some specially designated software  packages  typically libraries  of the Free Software Foundation and other authors who decide  to use it  You can use it too  but we suggest you first think carefully about whether this license  or the ordinary General Public License is the better strategy to use in any particular case  based  on the explanations below     When we speak of free software  we are referring to freedom of use  not price  Our Ge
74.  ports are numbered in the order that you connect USB       devices     Status This shows whether the external  USB  volume is Healthy  Locked   Unlocked  or Down     This shows the NSA generated name for an external  USB  volume     File System This field displays the type of file system that an external  USB  volume is  USING    Disk s  This shows what type of data storage system the external  USB  volume  has  It may show REGULAR or OK meaning that the NSA can read the  volume but that it wasn   t created by the NSA    Disk Usage This shows total disk size  the percentage of the external  USB  volume  being used and the percentage that is available    Active Sessions  This shows whether it   s a Windows CIFS or FTP connection to the NSA    Share Name This displays the shared folder name on the NSA that the user is  connected to for CIFS sessions and is blank for FTP sessions    Username This displays the name of the user connected to the NSA if one is defined  and ANONYMOUS FTP otherwise    Connected At This displays the date and time the user last connected to the NSA in  year day month hour minute second  format     IP Address This displays the IP address of the computer connected to the NSA           120 NSA 2401 User s Guide       System Setting Screen    5 1 Date Time    Use the NSA System Setting  gt  Date Time screen to set up the time on your NSA  To open  this screen  click System Setting  gt  Date Time in the navigation bar of the Web Configurator   Choose a time
75.  s Guide    Chapter 3 Tutorials    7 The SHA  fingerprint must match the NSA   s certificate you downloaded from the NSA  to your computer   Double click the NSA   s certificate file and then click Details and  look at the Thumbprint   Click Close     Figure 60 Firefox  Add Security Exception    Certificate Viewer  nsaz401        Could not verify this certificate because the issuer is not trusted   General Details   Certification Path      Issued To    Common Name  CN  nsaz401 Show     lt All gt         Organization  01  lt Not Part OF Certificate  gt     Organizational Unit  OU  Test value    Serial Number 00 09 91 D0 56 5E 4F 56 96 E  subject nsa2401  Test   Issued By    Public key RSA  1024 Bits    Common Name  CM  nsa2401 ime Subject Key Identifier d5 bb a8 fa c   dd if 4e d1 ds     Organization  0  nsa2401  fq Authority Key Identifier KeyID d5 bb a8 fa c   dd 1F 4     Organizational Unit  OU  Test in Basic Constraints Subject Type C4  Path Lengt     validity  rg  Thumbprint algorithm shal   Issued On 9 6 2008   Thumbprint S7D1 4304 8249 959F CD81 2     Expires On a 8 2011    SHA1 Fingerprint DADL A 824995 SF CD  811281 70969  A aA DAAB  11186    pvt a3ca 8245 s  r ener 2817 eses sasa paan 1186             Edit Properties    Copy to File            NSA 2401 User s Guide 79    Chapter 3 Tutorials  8 If the certificate fingerprints match  click Confirm Security Exception  otherwise click  Cancel     Figure 61 Firefox  Add Security Exception          Add Security Exception  
76.  s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order    Status    This icon shows the NFS share   s current status  It can be valid  usable  or  invalid  deleted         The following table describes the labels in this screen   Table 46 Network  gt  NFS  LABEL DESCRIPTION    NFS Share Path This field identifies the location of the NFS share in the NSA  Users need  to use this share path to mount the NFS share as a drive on their  computers     This field identifies the volume that the share is in     DNS IP filters This field displays the domain name or IP address filters configured for  controlling access to the share     This field displays any descriptive text added for the share     7 4 1 Add or Edit NFS Share Screen    Click Network  gt  NFS  gt  Add NFS Share  or Edit NFS Share  to display the screen where  you can configure a share for systems to use NFS to access        Figure 149 Network  gt  NFS  gt  Add NFS Share  Add NFS Share    Volume Name  volumet  111 76 GB        NFS Share Name example  Full Path M datarb2272bbednfs esample    Comment    DNSAP Filter    example com  Read Only   a     i  Note  you can input a domain name or IP in the filter      character represent  public  ex  172 23 26 0 74 or   zyHel com tw    PE T    nm    NSA 2401 User s Guide 169       Chapter 7 Network Screens    The following table describes the labels in this screen   Table 47 Network  gt  NFS  gt  Add NFS Share
77.  satisfy  simultaneously your obligations under this License and any other pertinent obligations  then as  a consequence you may not distribute the Program at all  For example  if a patent license  would not permit royalty free redistribution of the Program by all those who receive copies    NSA 2401 User   s Guide    Appendix D Open Source Licences    directly or indirectly through you  then the only way you could satisfy both it and this License  would be to refrain entirely from distribution of the Program  If any portion of this section is  held invalid or unenforceable under any particular circumstance  the balance of the section is  intended to apply and the section as a whole is intended to apply in other circumstances  It is  not the purpose of this section to induce you to infringe any patents or other property right  claims or to contest validity of any such claims  this section has the sole purpose of protecting  the integrity of the free software distribution system  which is implemented by public license  practices  Many people have made generous contributions to the wide range of software  distributed through that system in reliance on consistent application of that system  it is up to  the author donor to decide if he or she is willing to distribute software through any other  system and a licensee cannot impose that choice  This section is intended to make thoroughly  clear what is believed to be a consequence of the rest of this License     8  If the distribu
78.  slots  as insufficient airflow may harm your  device     NSA 2401 User   s Guide    Safety Warnings    Your product is marked with this symbol  which is known as the WEEE mark  WEEE  stands for Waste Electronics and Electrical Equipment  It means that used electrical and  electronic products should not be mixed with general waste  Used electrical and  electronic equipment should be treated separately        NSA 2401 User   s Guide    Safety Warnings    8 NSA 2401 User   s Guide    Contents Overview    Contents Overview    Tydal Mee EG EEE Spr nM sptle  29  Er ET EEE EN 31  introducing th   Web Gage EEE REE EE 35  Tr   55   EE Fo ee ENE EE EE EE 115  en lO EE EE EE 117  SES EEE ER ENE 121   S Og EE ENE EE NE ET 125  KN Je 159  se AL 2 REE RESEPT 173  F  re 197  Frelsers eg SODES EE on E 223  Maintenance Steens iccccciscescaisecsiatioseresnsssvenresiassauadassarderenessasscsetionssddsetnaesesssebnahiaussevestbadaadennes 229  Troubleshooting and Specifications          rrannnnnrnnnnnnnnnnnnnnnnnnnnnnnnennnnnnnennnnnnnnennnnnnnnennnnnnnennnnnnn 247  TN NN 249  PE ee EEE EE iacrmeens 257  spe and NGG PE EE 263    NSA 2401 User s Guide    Contents Overview    10 NSA 2401 User s Guide    Table of Contents    Table of Contents    About This Users EG el RE EEE NE ER 3  Kle GE g   ge EEE EE 4  TVG 6  ECE ERE EE EE nana 9  TNT  11  TT 17  TT 25  Part I  Introduction and Tutorials        avunravavnnvnrnnnnnnvnvannnvannnnnnnnnnnnnansnnnvnne 29  Chapter 1  Genma to KNOW TT EE 31  1 1 NSA 
79.  status     Select Full Summary to display advanced details about the drive and its  Status     This field displays the identifier number of the S M A R T  attribute     Attribute Name This field displays the text name of the S M A R T  attribute  See Section    6 9 9 on page 156 for a list of common S M A R T  attributes     This field displays the S M A R T  attribute   s flag    Value This is the attribute   s current  or most recent  normalized value  These  normalized values range from 1 to 254 and are almost always mapped so  higher values are better  Compare this with the threshold value    Worst This is the hard drive   s worst recorded normalized value for this attribute   Compare this with the threshold value     Thresh This is the attribute   s threshold value  If the attribute   s current normalized  value is less than or equal to the threshold  the attribute has failed  An  attribute value close to or below the threshold indicates the hard drive is  no longer reliable     Type Attributes can be one of two types  Pre failure  Pre fail  or Old age   Old_age    Pre failure attributes are ones that indicate imminent hard drive failure if  the attribute value is less than or equal to the threshold   Old age attributes indicate end of product life from old age  normal  wearing out  if the attribute value is less than or equal to the threshold   Note that just because an attribute is of the Pre fail tyoe does not mean  your hard drive is ready to fail  If only means thi
80.  terms applicable to Covered  Code created under this License     6 3  Derivative Works    If You create or use a modified version of this License  which you may only do in order to  apply it to code which is not already Covered Code governed by this License   You must  a   rename Your license so that the phrases    Mozilla        MOZILLAPL      MOZPL        Netscape         MPL        NPL    or any confusingly similar phrase do not appear in your license  except to note  that your license differs from this License  and  b  otherwise make it clear that Your version of  the license contains terms which differ from the Mozilla Public License and Netscape Public  License   Filling in the name of the Initial Developer  Original Code or Contributor in the  notice described in Exhibit A shall not of themselves be deemed to be modifications of this  License      7  Disclaimer of warranty    Covered code is provided under this license on an    as is    basis  without warranty of any kind   either expressed or implied  including  without limitation  warranties that the covered code is  free of defects  merchantable  fit for a particular purpose or non infringing  The entire risk as  to the quality and performance of the covered code is with you  Should any covered code  prove defective in any respect  you  not the initial developer or any other contributor  assume  the cost of any necessary servicing  repair or correction  This disclaimer of warranty  constitutes an essential part of 
81.  the certificate   s origin  either in the form of an IP  address or a domain name     Host IP Address Select this option and enter the NSA   s IP address if you want to use this  for the common name     Host Domain Name Select this option and enter the NSA   s domain name if you want to use  this for the common name    Organizational Unit Enter this name of the organizational unit which owns or maintains the   Optional  NSA  This is an optional field     Organization  Optional  Enter this name of the organization or company which owns or maintains  the NSA  This is an optional field     Country  Optional  Enter this name of the country in which the NSA is located  This is an  optional field     Key Type Select the certificate   s key type  either RSA or DSA RSA is a public key  encryption and digital signature algorithm  while DSA is only a digital  signature algorithm     Key Length Select the encryption key length  The longer the key  the better the  encryption security  The only drawback to having a long key is that the file  encrypted with it swells in size as well     Apply Click this to save your changes   Cancel Click this to discard changes and close the window        11 5 Firmware Upgrade    Click Maintenance  gt  FW Upgrade to open this screen  where you can upgrade the NSA  firmware  Be sure to download the latest firmware files from the ZyXEL website     NSA 2401 User   s Guide 241    Chapter 11 Maintenance Screens        lt  gt  The SYS LED blinks orange when fi
82.  the configuration file   The NSA delays a scheduled restart or power off until it finishes any of the  following    e Backing up files   e Restoring files from a backup   e Taking a snapshot   If the NSA is turned off at the time when a restart or power off is  scheduled  the NSA does not perform the restart or power off    If the NSA is turned on at the time when a power on is scheduled  the  NSA does not perform the power on     Click this to add the power control schedule to the list   Apply Click this to save your changes   Click this to discard changes and close the window        11 7 Shutdown    Click Maintenance  gt  Shutdown to open the shutdown screen  Use this screen to turn off the  NSA or restart it  Before shutting down or restarting  check the System Status screen to make  sure that no one is logged into the NSA or transferring files to or from it     NSA 2401 User   s Guide 245    Chapter 11 Maintenance Screens    Figure 207 Maintenance  gt  Shutdown  System Shutdown    Click Restart to have the device perform a software restart  The SYS LED blinks as the device restarts and then stays steady on if the  restart is successful  Wait a minute before logging into the device again        The following table describes the labels in this screen   Table 108 Maintenance  gt  Shutdown  DESCRIPTION    Restart Click this to restart the device   Shutdown Click this to shut down the system and restart it again later     When you click the Restart button a pop up screen appe
83.  the hard drive has  reported  If this is not zero  back up your data   This indicates the temperature of the airflow measured by a  Western Digital hard drive     This indicates the value of 100   the temperature in degrees  Celsius  Manufacturers can set a minimum threshold that    D  12   Device Power  Cycle Count  13   Soft Read Error Lo  Rate  O    W  190   Airflow Low    Temperature    190   Temperature  Difference from    100    191   G sense error  rate   192   Power off  Retract Count   193   Load Unload  Cycle    134  Temperature        corresponds to a maximum temperature     This is the number of mistakes caused by impact loads    This is how many times the heads are loaded off the media   This is the number of load and unload cycles into head landing  zone position     This is the hard drive   s internal temperature       Q  5    L  L  L  L    E    195   Hardware ECC High This is the time between ECC  Error Correction Code  corrected  Recovered errors     196   Reallocation  Event Count    OW  OW  OW  OW  OW    L This is the total number of reallocation  remap  operations  The  raw value is the total attempts to move data from reallocated  sectors to a spare area  Successful and unsuccessful attempts    are both included        197   Current Pending  Sector Count    Low This is the number of unstable sectors awaiting reallocation  If the  secior is later successfully written or read  this value decreases  and reallocation is not performed  Only failed write attem
84.  this License  whose permissions for other licensees extend to the entire whole  and thus to  each and every part regardless of who wrote it  Thus  it 1s not the intent of this section to claim  rights or contest your rights to work written entirely by you  rather  the intent is to exercise the  right to control the distribution of derivative or collective works based on the Program  In  addition  mere aggregation of another work not based on the Program with the Program  or  with a work based on the Program  on a volume of a storage or distribution medium does not  bring the other work under the scope of this License     334 NSA 2401 User s Guide    Appendix D Open Source Licences    3  You may copy and distribute the Program  or a work based on it  under Section 2  in object  code or executable form under the terms of Sections I and 2 above provided that you also do  one of the following     a  Accompany it with the complete corresponding machine readable source code  which must  be distributed under the terms of Sections 1 and 2 above on a medium customarily used for  software interchange  or     b  Accompany it with a written offer  valid for at least three years  to give any third party  for  a charge no more than your cost of physically performing source distribution  a complete  machine readable copy of the corresponding source code  to be distributed under the terms of  Sections I and 2 above on a medium customarily used for software interchange  or  c   Accompany it 
85.  those files and folders  delete  move  rename  and so on      12 5 Backups and Snapshots         pa   cannot make a backup           Check the logs to find the reason why the backup failed    You can also look at the Backup screen   s Last Run Result display    If you   re backing up to another NSA  another NSA  or a computer  check that it allows the  NSA to write files to it  For a synchronization backup  the target must be another NSA or  another compatible model    Check that enough space is available on the external disk  If there isn   t you may need to  purge older backups or delete other files on the backup USB disk or NSA  see Section  9 2 3 on page 208     e Check that the NSA is not performing another backup job  Scheduler queues backups  when a different backup is already going on at the time a backup is scheduled             pa   cannot take a snapshot       e Check the logs  The NSA generates an alert log when an error occurs during the snapshot  capture process  This log lists why the snapshot failed  for example  low disk space     NSA 2401 User   s Guide    Chapter 12 Troubleshooting    You may need to manually delete some previous snapshots to make more space  If you  still cannot take the snapshot you may need to recreate the volume with a larger amount of  space reserved for snapshots    e You can also check the logs on the NSA to find out the reason why the snapshot failed     e A snapshot must be done on a complete volume  Check that the volume is not d
86.  to protect data on your NSA     6 9 9 S M A R T Attributes    The following table describes some common S M A R T  attributes  If a higher or lower raw  attribute value is better  it is indicated in the BETTER column  Since S M A R T  attributes  and their definitions vary by manufacturer  refer to the hard drive manufacturer for details  about the attributes your hard drive supports     Table 42 S M A R T  Attributes    ATTRIBUTE  Di NAME BETTER   DESCRIPTION  01 Read Error Rate   Low Shows the rate of hardware read errors  If this is not zero  there is  a problem with the disk surface or the read write heads   02   Throughput High This is the hard drive s general  overall  throughput performance   Performance A decreasing value indicates a problem   03   Spin Up Time Lo This is the average number of milliseconds the hard drive took for  spindle spin up  from zero RPM to fully operational      Start Stop Count The total number of spindle start and stop cycles     w  Reallocated Low Total number of reallocated sectors on the hard drive  When the  Sectors Count hard drive detects a read write verification error  it marks the   sector as    reallocated    and transfers the data to a specially  reserved  spare  area  The process is also known as remapping  with    reallocated    sectors known as remaps  The more sectors    the hard drive has to reallocate  the slower read and write speeds  become     ka Read Channel oOo   This is the margin of a channel when it reads data   Mar
87.  turn off the  printer s power  Then reconnect the printer and turn it back on     10 3 1 Print Server Rename       Click Applications  gt  Print Server  select a printer from the list  and then click that printer   s  Rename icon to open this screen  Use this screen to change the name that the NSA uses for the  printer     Figure 187 Applications  gt  Print Server  gt  Rename      _     SES EE SS SS SS 7                  Rename Printer    limit 15 characters    Mote  Only alphanumeric characters  and underscore     are acceptable    Re    226 NSA 2401 User s Guide    Chapter 10 Application Screens    The following table describes the labels in this screen     Table 90 Applications  gt  Print Server  gt  Rename    LABEL DESCRIPTION  Name Type a new name to identify the printer  The name must be unique from all  the other names of printers connected to the NSA     Apply Click this to save your changes   Click this to discard any changes and start again        10 4 Copy Button    Click Applications  gt  Copy Button to open this screen  Use the COPY button on the front  panel of the NSA to copy files between a USB flash drive or externally connected hard disk  and a share in the NSA  If more than one USB device is connected to the NSA  the NSA uses  the USB device that was most recently connected     Figure 188 Applications  gt  Copy Button       Currently Selected Share    Bill    Copy Direction  USB   gt  Share a    The following table describes the labels in this screen     T
88.  variance     e A power surge occurs     The NSA gives no warning if time lag occurs  You should re synchronize the time after a  power surge or after you have shut down the NSA several times     NSA 2401 User   s Guide    Chapter 5 System Setting Screen    124 NSA 2401 User s Guide       Storage Screens    6 1 Storage Screens Overview    Use the storage screens to work with disks  RAIDs  and volumes to manage the NSA   s  storage     6 1 1 What You Can Do in the Storage Screens    e Use the Internal Storage screens  Section 6 2 on page 127 through Section 6 6 1 on page  142  to view and configure the NSA   s installed disks  RAIDs  and volumes     e Use the External Storage screens  Section 6 7 on page 145 through Section 6 8 1 on page  149  to view and configure USB connected disks and volumes     6 1 2 What You Need to Know About Storage    Disks    Disks are the physical storage drives you use with the NSA  Internal storage is the hard drives  you install inside the NSA  External storage is USB connected drives     RAIDs    A hard drive array  RAID  is a storage method that lets you store data across multiple internal  disks  You combine the internal disks into arrays  Each disk must belong to an array in order to  use it  You can create multiple arrays     Volumes  A volume is a storage area that you create on an array of internal disks or an external disk     The following diagram shows disks one to four combined into RAID Array 1  Volumes A  B   Figure 123 Disks  RAIDs
89.  with  code not governed by the terms of this License     1 8   License    means this document     1 8 1   Licensable    means having the right to grant  to the maximum extent possible  whether  at the time of the initial grant or subsequently acquired  any and all of the rights conveyed  herein     1 9     Modifications    means any addition to or deletion from the substance or structure of  either the Original Code or any previous Modifications  When Covered Code is released as a  series of files  a Modification 1s     Any addition to or deletion from the contents of a file containing Original Code or previous  Modifications     Any new file that contains any part of the Original Code or previous Modifications     1 10     Original Code    means Source Code of computer software code which is described in  the Source Code notice required by Exhibit A as Original Code  and which  at the time of its  release under this License is not already Covered Code governed by this License     1 10 1     Patent Claims    means any patent claim s   now owned or hereafter acquired   including without limitation  method  process  and apparatus claims  in any patent Licensable  by grantor     1 11     Source Code    means the preferred form of the Covered Code for making modifications  to it  including all modules it contains  plus any associated interface definition files  scripts  used to control compilation and installation of an Executable  or source code differential  comparisons agains
90.  your SSL Certificate     Windows  CIFS    MSA is a member of Workgrou    Workgroup Name nsazdi limit 15 characters       1166 NSA 2401 User s Guide    Chapter 7 Network Screens    Figure 147 Network  gt  Windows CIFS  Domain     Server Identification    Server Name  NSAexample  Description       i  Note     1 This new system name will not apply until the system restarts   2  Modifying your Server Name will affect your SSL Certificate     Windows  CIFS    Cl Note     Please make sure that your DNS server is able to resolve the Windows Domain  Name  Usually your domain controller is also your DNS server     NSA is a member of Domain 7    Windows Domain Protocol  Active Directory domain A    Domain Name    Windows Domain  Administrator    Windows Domain  Administrator Password       The following table describes the labels in these screens   Table 44 Network  gt  Windows CIFS    LABEL DESCRIPTION    Server Identification    Server Name Enter a name to identify your NSA on the network in this field     By default the NSA uses    NSA    and the last four digits of the NSA   s LAN 1  MAC address     Description Enter additional identification information for the NSA  optional      mr se    NSA is a member of A workgroup is a group of computers on a network that can share files   These user accounts are maintained on the NSA   A domain is a group of computers that are part of a network and share a  common directory database  Domain users and groups are created on a  centralized Win
91.  zone and or allow the NSA to synchronize with a time server        Current Time  Current Date        Manual  New Date  yyyy mm dd   New Time  hh mm ss     Get from Time Server    Time Server Address    Time Zone  La  Enable Daylight Saving  Start Date    End Date    Figure 122 System Setting  gt  Date Time    14 26 12  0800  2008 5 12    2008 5 12    DEE Ge fe E    ime stdtime gov tw     GMT 08 00  Beijing  Hong Kong  Perth  Singapore  Taipei      x  ll  mf Bp S    x  mM Bh g    7        hours    fm ey    The following table describes the labels in this screen   Table 18 System Setting  gt  Date Time    LABEL  Current Time  Current Date    Manual    New Date  yyyy mm dd     DESCRIPTION  This field displays the time according to the NSA   This field displays the date according to the NSA     Select this radio button to enter the time and date manually     When you enter the time settings manually  the NSA uses the new setting  once you click Apply     This field displays the last updated date from the time server or the last  date configured manually    When you set Date Time Setup to Manual  enter the new date in this  field and then click Apply        NSA 2401 User   s Guide    Chapter 5 System Setting Screen    Table 18 System Setting  gt  Date Time  continued   LABEL DESCRIPTION    New Time  hh mm ss  This field displays the last updated time from the time server or the last  time configured manually     When you set Date Time Setup to Manual  enter the new time in this f
92. 0 2014 Plans doc file and click Set ACL     Figure 71 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL  gt  Strategy  EE EEE     ACL Configuration      Gonzo Strategy    2008 09 04 15 17 07    35 50  KB       86 NSA 2401 User s Guide    Chapter 3 Tutorials    5 Move Gonzo to Deny     Figure 72 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL  gt  Strategy  gt  Set ACL  lOl    ACL Permission    Target  Gonzo Strategy 2010 2014 Plans doc  ACL Options        Apply to all directories and files under this folder     Available Userfsi Groupts      lt LOCALUSERS gt   lt LOCALUSERS gt   Gonzo  lt DOMAINUSERS gt   admin  lt LOCALGROUPS gt   anonymoaus ftp    lt DOMAINGROUPS gt   anonymous EEE    lt DOMAINUSERS gt     lt LOCALGROUPS gt    Senior Management   EVENONE    lt DOMAINGROUPS gt     Read Only     lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt      lt LOCALUSERS gt   Kermit   lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt      i  Note     You may select multiple users groups by using Ctrl   Click           NSA 2401 User   s Guide 87    Chapter 3 Tutorials    6 A Restricted File icon appears beside the 2010 2014 Plans doc file  Click Close     Figure 73 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL  gt  Strategy  FRERE EEE EE EEE EE EE       ACL Configuration    set ACL    Current Location   Gonzo Strategy      Size Modified Date     Fy 2010 2014 Plans doc ES 2008 09 16 10 46 44    A 2009 Plan doc ae 2008 09
93. 11 4 on page 239 for  details     e Upload new firmware  See Section 11 5 on page 241 for details   e Set the power management settings  See Section 11 6 on page 242 for details     Restart or turn off your NSA  See Section 11 7 on page 245 for details     11 1 2 What You Need to Know About The Maintenance Screens    HTTPS    HyperText Transfer Protocol over Secure Socket Layer  or HTTP over SSL is a web protocol  that encrypts and decrypts web pages  Secure Socket Layer  SSL  is an application level  protocol that enables secure transactions of data by ensuring confidentiality  an unauthorized  party cannot read the transferred data   authentication  one party can identify the other party   and data integrity  you know if data has been changed      Public Key Certificate    Public key certificates are used by web browsers to ensure that a secure web site is legitimate   When a certificate authority such as VeriSign  Comodo  or Network Solutions  to name a few   receives a certificate request from a website operator  they confirm that the web domain and  contact information in the request match those on public record with a domain name registrar   If they match  then the certificate is issued to the website operator  who then places it on his  site to be issued to all visiting web browsers to let them know that the site is legitimate     Syslog Server    The syslog protocol is built around data logging for the purposes of keeping records and  analysis  On a typical network th
94. 118  crypto 141  148  CSV 236    D    date 121  daylight saving 122  default  IP address 36  password 36  settings 52  username 36  degraded  array 126  deleting  folders or files 41  RAID 136  shares 187  user accounts 176  user groups 183  volumes 140  DFS 194  DHCP 160  258  diagnostic tool 164  disclaimer 353  disk 125  eject 129  external 145  internal 128  LEDs 32  quota 258  recommendations 132    replacement restrictions 128    S M A R T  attributes 156  see also hard drive    disk quota  conflict users 177    Distributed File System  see DFS    DNS 164    server address assignment 159    domain 177  group 173  user 173    domain controller  time 165    domain mode 258  domain name 167  Domain Name System  See DNS   domain security mode 165  domain user  troubleshooting 253  troubleshooting share access 254  down array 126  duplexing 151  Dynamic Host Configuration Protocol  see DHCP    E    eject 146  ejecting a disk 129  EMC 260  encrypted volume  password 142  149  encryption 126  206  EVERYONE 193  exiting the Web Configurator 38  49  expand JBOD 137  explicit TLS SSL 82  export log 236  EXT2 150  EXT3 150  external  devices 39  107  shares 39  external disk  eject 146  locate 146  external storage 145  lock 148  scan 147  unlock 148  volume 147  external volume 147  create 149  EXT2 150  EXT3 150  FAT16 150  FAT32 150  file system 150  lock 148    356 NSA 2401 User s Guide    NTFS 150  ReiserFS 150  scan 147  unlock 148  XFS 150    F    factory defaults 52  fan s
95. 168  PAA POT Edit NFS Share Sergo ee 169  ET NNN 170  Chapter 8  NN 173  BET OE EEE E A EE NE NE R  R 173  8 1 1 What YOU Can Do In The Sharing Screens Luenmesnnekeedeaarevedbkendte 173  8 1 2 What You Need to Know About The Sharing Screens               cccccesseeceeeeeeeeeeeaeeeeeees 173  EE EE TE ae ee ee ee eee ee eee eee eee eee ree 175  8 2 1 Create a New Account  amp  Change Account Properties                ccccccsseeeeeeeeeeeeeeeeeeeees 178  B2 Von ON 9 EEE 181  JE EE EEE E A E eee 182  8 3 1 Add a New Local Group  amp  Change Group Properties       rrrrurvvnnnnrvrvnnnnvrrnnnnnrvnvnnnneen 184  ENE Ge Li eeetadennd 186  8 4 1 Create a New Share  amp  Edit a Share          rrnrrnnnnnnnrnnnnnnnrnnnnnnernnnnnsnrnnnnnnnsnnnnnsnnsnnnnneeee 188  MENN NN see 190  TN 194  EEA EE EE ET PERERA ET 194  Chapter 9  FUNN 197  9 1 Protection Methods Overview inissixesrcnsscseneidarsrawrcssasecuedsendeiceneialseswensinideuevenvaldausredinasousrdonad 197  9 1 1 What You Can Do in the Protect Screens sansene 198  9 1 2 What You Need to Know About Protection Methods                 cccceccseeeeeeeeeeeeeeeeeeeeeees 198  Ja et A ote ve   see ee eee en eee lee NE NE 200  re TE ETE EN EE NE 200  REE Sa EE NE NN NE EE 202  EET NNN 208  NNN gets sales peace oi ewan eee inar e eed ri 209  9 3 Restoring by Backup Files             ccc ccceecccsssecceeeeecceececceuceseaseeeceececeueeecsasessaeeessueeeseneeesaaees 212  RE EEE 213  PN NNN ee 214  23 Frotect  gt  Restore  NN 215  NN 215     TT ENN 
96. 168 1 3 if the NSA cannot get an IP address from a DHCP server     LAN2 IP Address 192 168 100 3 if the NSA cannot get an IP address from a DHCP server     Subnet Mask 255 255 255 0  24 bits  if the NSA cannot get a subnet mask from a DHCP  server     we    Compatible Hard Disks     SATA II  Serial Advanced Technology Attachment  hard disk serial links  The NSA also recognizes SATA   compatible drives     from the NSA  Use an external power adaptor if more current is necessary     CPU Operating 0   to 85   C  Temperature    Ethernet Two auto negotiating  auto MDI MDI X 10 100 1000  Mbps RJ 45 Ethernet  ports  10 Base T 100 Base TX 1000 Base T     USB v2 0 Storage Two ports on the front panel   Windows  NTFS  read only   FAT32 and FAT16          Linux  EXT2  EXT3 and XFS  LEDs PWR  SYS  LAN1  LAN2  and COPY    NSA 2401 User   s Guide 259    Chapter 13 Product Specifications    Table 111 NSA Hardware Specifications  continued     Reset Button    Reset the NSA or restore the factory default configuration file    AC Input Voltage  100   240 V at 50   60 Hz  Current  2 A    DC Output    Voltage  19 V    Current  2 A    20    90  RH  non condensing   20    95  RH  non condensing     Certifications    EMC  FCC Class B  EN 55022 Class B    Safety  UL 60950 1  CSA 60950 1  EN60950 1  IEC 60950 1    A  Hard drives may not be included with your NSA   B  Use an 8 wire Ethernet cable for Gigabit connections     The NSA firmware specifications are shown in the following table  Table 112 NS
97. 2 98 62    FTP Server Status Enabled  gt      CPU Usage  dd 1   CPU Temperature  QQ  47 00  c  116 6  F     FAN Speed 1289RPM 1955RPM    Mamoru es ei  emory Usage 23MB 256MB    ti AU td 2d      volume Status    Internal Yolume     a volume3 Encrypted N A      Locked  HE   gt   1045 48   Healthy B volumet Normal Used    ibodD1D4D3    jbod Healthy 405 13 GB Total   100  Free   810 38 GBTotal 384 50    ey B    26 Me   GBFree  B ead    volume  Normal  Healthy 9 80 GB Total 100  Free    External Yolume  CEN      ie es  gt        Active Sessions    r   K   Z     v       vvs ee ee ie eee nd nel a  y KFR AP TT 7 1 TAPERS oy JE       FOG    2008 07 16 10 37 06 192 168 1 33          NSA 2401 User s Guide 11 r      Chapter 4 Status Screen    The following table describes the icons in this screen   Table 16 Status Icons    ICON DESCRIPTION    Refresh    Click this icon to refresh the data for the field or value with which it is  associated     Edit  Click this icon to open the configuration screen for the item with which it is  associated     FP  Healthy    Green indicates a healthy disk array  All disks in the array are OK and the    file system is functioning properly     Resynching  Yellow indicates the raid array is being repaired or created     Waiting to Resync  Indicates that another array is already being resynchronized  Only one  array can resynchronize at a time     Degraded   Indicates that a disk array is currently down  but can be fixed  Data access  may be slower from a deg
98. 2401 OvervieW EE EE EE ENN 31  Ti Fom AE NM TERE 32  1 1 2 Foper BURON ERE EE EN 33  1 1 3 COPY PNG 33  Chapter 2  Introducing the Web Configurator        rrannnennnnnnennnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnennnnnnennnnnnnnnnnnennnnnnnnnnnunen 35  2l a  eis Te EET EE ene eee 35  2 2 Accessing the NSA Web Configurator    0 ciccccszcscsccestansssneccessessaanevenessatacenscessatseanccnasatenesseenes 35  2 2 1 Access the NSA Using the NDU ed 35  2 2 2 Web Browser ACCESS            ccecececcecececececececucaccuaccecucecstecseacseacauauauausecenscsescavseauauauaunenens 36  EE     RER ETR SEEREN EET EE PN VERN PE 36  2 4 User level Screens Overview           cccccececcececcccececaccececcccusecaccesecscaececseaececseeecunacsecuaacsvausecenass 37  EE ET EE EE E EE E eae 38  2 5 1 My NSA Share Browsing Screen            cccccccsseeeecceeeceeeeceeeeeseeeeeeeeeseeeeeceeeseaaeaeeeeesaaaeses 40  2 5 2 My NSA Share Browsing Move to or Copy to Screen       rrrvrrnnnnnvrvnnnnnvvnnnnnrernnnnnnvnnnnnn 42  2233 MY NSA Share NNN edelt Nana 42  2 5 4 My NSA Change Share Properties Screen              cccccccseeeeeeeeeeeececaeeceseeauseeessaaeeessaaess 43  2 5 5 Share and Folder Names               cccsceceecececcecececcccacecaccececaucusecsecusecsecesanseaecasscsececacseass 45  2 5 6 Share Paths oirisider ner aeia aiani daana Aaii rarai dadais idire 46  25 7 SOE SE EEE es ds ie 46    NSA 2401 User   s Guide    Table of Contents    AE EE ERE EEE ERE EE EN EE A 47  TNT NNN saeir n aa 48  AE ee ER ERE ER 
99. 3387 C64 18384    e Te       6 The next time you go to the web site that issued the public key certificate you just  removed  a certification error appears        NSA 2401 User   s Guide 307    Appendix C Importing Certificates    Firefox    The following example uses Mozilla Firefox 2 on Windows XP Professional  however  the  screens can also apply to Firefox 2 on all platforms     1 If your device   s Web Configurator is set to use SSL certification  then the first time you  browse to it you are presented with a certification error     2 Select Accept this certificate permanently and click OK     Figure 268 Firefox 2  Website Certified by an Unknown Authority    Website Certified by an Unknown Authority    Unable to verify the identity of 172 20 37 202 as a trusted site     A Possible reasons for this error     Your browser does not recognize the Certificate Authority that issued the site s certificate     The site s certificate is incomplete due to a server misconfiguration       You are connected to a site pretending to be 172 20 37 202  possibly to obtain your  confidential information     Please notify the site s webmaster about this problem     Before accepting this certificate  you should examine this site s certificate carefully  Are you  willing to to accept this certificate for the purpose of identifying the Web site 172 20 37 202     Examine Certificate           Accept this certificate permanently    P this session        Do not accept this certificate and do not
100. 4  for more information     e Share a printer  See Section 10 3 on page 226 for details   e Configure how the copy button works  See Section 10 4 on page 227 for details     10 1 2 What You Need to Know About The Application Screens    FTP  File Transfer Protocol     File Transfer Protocol  FTP  is a file transfer service that functions across the Internet  A  system running the FTP server accepts commands from a system running an FTP client  FTP  is not a secure protocol  Your file transfers could be subject to snooping     FTPES  File Transfer Protocol over Explicit TLS     File Transfer Protocol over Explicit TLS  FTPES  is a file transfer service that uses TLS   Transport Layer Security  for secure transfers across the Internet     NSA 2401 User   s Guide    Chapter 10 Application Screens    Print Server    A print server is a device or software that provides users on a network with shared access to  one or more printers  The print server acts as a buffer  holding the information to be printed  out until the printer becomes free  The NSA can act as a print server     Figure 184 Printer Sharing       10 2 FIP    Click Applications  gt  FTP to open this screen and configure settings for transferring files to  and from the NSA using FTP  File Transfer Protocol  or FTP over Explicit TLS        LES Your FTP client must be set to use FTP over Explicit TLS in order to use  FTPES with the NSA        NSA 2401 User   s Guide    Chapter 10 Application Screens    Figure 185 Applicati
101. 6  Table 51 Sharing  gt  Users  gt  Create a New Account           cccceeccccssecceceseceeeeseecaeseeseeeeeesaeeeeseeeessaeeessaeees 178  Table 52 Sharing  gt  Users  gt  User Information  gt  Quota List        rrerrrrnnnrrnrnnnnrnnnnnnnrnnnnnnrrnnnnnnrnnrnnsnrnnnnnnee 181  Te ohan NNN een 182  le er EE EE EE EE RE eee eee eet mere 183  Table 55 Sharing  gt  Groups  gt  Add a New Local Group hassel 184  TR ate ohang s anaes CONS er 186  TN ernan i 187  Table 58 Sharing  gt  Shares  gt  Create a New Share         rrrrrrnnnrnnnnnnnrennnnnnnnnnnnnnrennnnnsnennnnnnnrnnnnnnnennnnnnsnen 188  Table 59 Sharing  gt  Shares  gt  Create a New Share  gt  Share Access Configuration                  cccceeseeees 189  Tabie 60 ar GS AL ON ICONS se ce ctecercateecnceeneninacdelannescesienedenneianeaaecnacsenensesacianeescnnseenennioe  190  Table 61 Sharing  gt  Shares  gt  Create a New Share  gt  Share Access Configuration               c   ccceeseeees 191  Table 62 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL Configuration ICONS                ccceeseeeeeeees 191  Table 63 Sharing  gt  Shares  gt  Create a New Share  gt  Share Access Configuration               c cscecesseeees 192  Table 64 Shares  gt  ACL Configuration  gt  New ACL Configuration  gt  ACL Permission                  ccc00008 193  Table 65 Shares  gt  ACL Configuration  gt  New ACL Configuration  gt  ACL Permission                  ccc00008 194  Table 66 Sharing  gt  Shares  gt  DFS EEE aaa e in Aa i E 195  Table 
102. 67 Protection Methods Overview oo      ccccceeeccccceeseceeceesceeeeeeseceeeeeeeeecsuaeeeessueeeeseaeeeesseeeeeesegeeeeeees 197  TN NNN eaei es 201  TN rOn NNN hj   202  Fe PORN  gt  Backup  gt  Add Job  Step T vvs 203  MENN SBN NNN aE SEE 205  Table PN  gt  Backup   Add Job  Sep F eee 206  Table 73 Protect  gt  Backup  gt  Add Job  Step 4 pics mnt enema enemmn 207  Table 74 Protect  gt   Backup  gt  Edit Job  Step EE 208  Table 75 Protect  gt  Backup  gt  Edit Job  Step 2       rrrrrrrnnneennrannnrennnnnrnnnrnnnnnnnnnnsrennnnnnennnnnnnennnnnnsennnnnnssenn 209  Table 76 Protect  gt  Backup  gt  Restore Archive  Step 1         rrrernnnernnnnrrnnnnnennannennnnnennnnnennnnnennnnnennnnnnennnee 210  Table 77 Protect  gt  Backup  gt  Restore Archive  Step 2 wisesccicesiaressseisinsicasaianevienrsiesnsenriesesigneieseiiaiseries 211  Table 78 Protect  gt  Backup  gt  Restore Archive  Step 3        mrrernnnernnnnernnansennannennnnnennnnnennnenennnnnennnnnsennnee 212  We ee We TANN    212  peler PER TR 213  Tone VPN JG 214    26  NSA 2401 User s Guide    List of Tables    TETEN Nea 215  Table 83 Protect  gt  Snapshot  gt  Snapshot Jobs ICONS       rrrnnrrennnnnennnnnernnnnnrnnnnnrnnnnrernnnnrnnnnnnrnnnrernnusernnn 217  Table 84 Protect  gt  Snapshot  gt  Snapshot Jobs           urrrennnnnrnnnnnrnnnnnvnnnnnnrnnnnnrnnnnnnnnnnnnnannnnnnnnnnnnnnnnnnannsnnnn 218  Te PFOS SN SND Lese 219  Table 86 Protect  gt  Snapshot  gt  Snapshot Images ICONS      r rrrrrnnnerrnanerrnnnernnnrenvnnrennanne
103. A Firmware Specifications    File Storage System SINGLE  RAID 0  1 5    Network Protocols    File Management    Network File Sharing Protocol  Network Security    Supported Clients    TCP IP  UDP IP  DHCP Client  FTP   HTTP  HTTPS    Distributed File System  DFS   Create Delete System Volume    CIFS SMB for Windows and Mac OSX  HTTP for web browser   FTP   NFS    Authentication   Share level   Active Directory Services  ADS   Encrypted Network Login    Windows 2000 Professional Server  Windows XP Home Professional  Windows Me   Linux    Maximum number of  concurrent FTP sessions  Maximum number of  concurrent CIFS sessions  Maximum number of  snapshots in the NSA       Maximum number of 5  snapshots per volume  260 NSA 2401 User   s Guide    Chapter 13 Product Specifications    Table 112 NSA Firmware Specifications  continued   System Management Remote Management via Web Configurator  HTTP   Secure Remote Management via Web Configurator  HTTPS   NSA Discovery Utility  NDU   E mail alerts    Logging Monitoring Centralized Logs    Firmware Upgrade Web Configurator    Web Browsers Supported Internet Explorer 6 0 and later versions   Firefox 1 07 and later versions     A  Limits may vary depending on user share resource usage     13 3 Power Consumption    The NSA 2400 was tested using the specified power sources with the external power adapter  and with four hard drives installed        LES This table is a laboratory test of NSA 2400 power consumption for your  reference only    
104. A in each file of the Source Code  If it is not possible  to put such notice in a particular Source Code file due to its structure  then You must include  such notice in a location  such as a relevant directory  where a user would be likely to look for  such a notice  If You created one or more Modification s  You may add your name as a  Contributor to the notice described in Exhibit A  You must also duplicate this License in any  documentation for the Source Code where You describe recipients    rights or ownership rights  relating to Covered Code  You may choose to offer  and to charge a fee for  warranty  support   indemnity or liability obligations to one or more recipients of Covered Code  However  You  may do so only on Your own behalf  and not on behalf of the Initial Developer or any    344 NSA 2401 Users Guide    Appendix D Open Source Licences    Contributor  You must make it absolutely clear than any such warranty  support  indemnity or  liability obligation is offered by You alone  and You hereby agree to indemnify the Initial  Developer and every Contributor for any liability incurred by the Initial Developer or such  Contributor as a result of warranty  support  indemnity or liability terms You offer     3 6  Distribution of Executable Versions     You may distribute Covered Code in Executable form only if the requirements of Sections 3 1   3 2  3 3  3 4 and 3 5 have been met for that Covered Code  and if You include a notice stating  that the Source Code versio
105. A using a CIFS program  like Windows  Explorer  and double click the printer   s icon to open the printer   s queue of print jobs        Figure 105 Printer Screen in Windows Explorer  a Canon PRT 1 on 192 168 1 2    Printer Document View Help    Document Name Jstatus Jf Owner  Pages   size         LES Repeat steps 4 to 7 on your other computers so they can also use the printer        3 9 How to Increase the NSA   s Storage Capacity    As time goes by your company is likely to need more storage capacity  You can do one or  more of the following to increase the NSA   s storage capacity     e Connect external USB hard drives  e Add internal hard drives if there are not four already installed   e Migrate a RAID 5 array to higher capacity hard drives     106 NSA 2401 User s Guide    Chapter 3 Tutorials    3 9 1 Connecting External USB Hard Drives    The easiest way to increase the NSA   s storage capacity is to connect an external USB hard  drive  External USB hard drives are great for providing storage capacity for scheduled  backups and snapshots of internal volumes   External volumes can be the destination for a  scheduled backup or snapshot  but only an internal volume can be the source   Use the  following procedure     1 Connect the external USB hard drive to USB1 or USB2 on the NSA   s front panel     Figure 106 Connecting a USB Hard Drive       USB1         2 Click Storage  gt  External Volumes and make sure the USB drive displays with a  healthy status     Figure 107 Stor
106. Auto File Repair     Stop Volume Scan with Auto File Repair may cause data loss     Performing this operation will cause some network services to temporarily disconnect     Note  If you have the NSA automatically attempt to repair  any damaged files it finds during the scan  be careful  not to cancel the scan           NSA 2401 User s Guide    Chapter 6 Storage Screens    Table 34 Storage  gt  External Storage  gt  Volume Icons  continued   ICON DESCRIPTION    Lock    If an encrypted volume is unlocked  you can select it and click this icon to  lock it  No one will be able to use the volume until an administrator  unlocks it  Note that if the volume was encrypted using a USB key and the  USB key is connected when the NSA restarts  the NSA automatically  unlocks the volume       Lock   olume      re you sure to lock the volume     Performing this operation will cause some network services to temporarily  disconnect     Unlock   The NSA automatically locks an encrypted volume if the NSA loses power  or the disk is removed  Select a locked volume and click this icon to open  a screen where you can enter the volume   s password or use the USB key    to allow users to use the volume again     Unlock External Yolume    Please input password or insert USB Key to Unlock     Password      Password Prompt     If the USB device containing the volume s key is already inserted  remove  it and re insert it    Sort   Click a column   s heading cell to sort the table entries by that column s
107. Certification Authority   Class 2 Public Primary Certification Authority   G2   c  1998 Verisig            4 Use the Import certificate dialog box to locate the certificate and then click Open     Figure 283 Opera 9  Import certificate    Import certificate BIK     uk LET       My Computer   my Documents  my Network Places    My Network  Places          NSA 2401 User   s Guide    Appendix C Importing Certificates    5 In the Install authority certificate dialog box  click Install     Figure 284 Opera 9  Install authority certificate    Install authority certificate    Install this certificate authority s certificate chain in the database        6 Next  click OK     Figure 285 Opera 9  Install authority certificate    Install authority certificate       7 The next time you visit the web site  click the padlock in the address bar to open the  Security information window to view the web page   s security details     316 NSA 2401 User   s Guide    Appendix C Importing Certificates    Removing a Certificate in Opera    This section shows you how to remove a public key certificate in Opera 9     1 Open Opera and click Tools  gt  Preferences     Figure 286 Opera 9  Tools Menu    Mail and chat accounts     Delete private data       Notes Ctrl Alt      Transfers Ctrl  Alt T  History Ctrl  Alt H    Links Ctrl Alt H    Advanced  Quick preferences    Appearance          2 In Preferences  Advanced  gt  Security  gt  Manage certificates     Figure 287 Opera 9  Preferences    Preferences   
108. Due to Statute or Regulation     If it is impossible for You to comply with any of the terms of this License with respect to some  or all of the Covered Code due to statute  judicial order  or regulation then You must   a   comply with the terms of this License to the maximum extent possible  and  b  describe the  limitations and the code they affect  Such description must be included in the legal file  described in Section 3 4 and must be included with all distributions of the Source Code   Except to the extent prohibited by statute or regulation  such description must be sufficiently  detailed for a recipient of ordinary skill to be able to understand it     5  Application of this License     This License applies to code to which the Initial Developer has attached the notice in Exhibit  A and to related Covered Code     6  Versions of the License   6 1  New Versions    Netscape Communications Corporation     Netscape     may publish revised and or new  versions of the License from time to time  Each version will be given a distinguishing version  number     6 2  Effect of New Versions    NSA 2401 User s Guide 345    Appendix D Open Source Licences    Once Covered Code has been published under a particular version of the License  You may  always continue to use it under the terms of that version  You may also choose to use such  Covered Code under the terms of any subsequent version of the License published by  Netscape  No one other than Netscape has the right to modify the
109. EMENT  IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT  HOLDERS BE LIABLE FOR ANY CLAIM  DAMAGES OR OTHER LIABILITY   WHETHER IN AN ACTION OF CONTRACT  TORT OR OTHERWISE  ARISING FROM   OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER  DEALINGS IN THE SOFTWARE     This Product includes Sablotron software under MPL License    Mozilla Public License Version 1 1  1  Definitions     1 0 1     Commercial Use    means distribution or otherwise making the Covered Code available  to a third party     1 1     Contributor    means each entity that creates or contributes to the creation of  Modifications     NSA 2401 User   s Guide 341    Appendix D Open Source Licences    1 2     Contributor Version    means the combination of the Original Code  prior Modifications  used by a Contributor  and the Modifications made by that particular Contributor     1 3     Covered Code    means the Original Code or Modifications or the combination of the  Original Code and Modifications  in each case including portions thereof     1 4     Electronic Distribution Mechanism    means a mechanism generally accepted in the  software development community for the electronic transfer of data     1 5     Executable    means Covered Code in any form other than Source Code     1 6     Initial Developer    means the individual or entity identified as the Initial Developer in the  Source Code notice required by Exhibit A     1 7   Larger Work    means a work which combines Covered Code or portions thereof
110. EMPLARY  OR  CONSEQUENTIAL DAMAGES  INCLUDING  BUT NOT LIMITED TO   PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES  LOSS OF USE  DATA  OR  PROFITS  OR BUSINESS INTERRUPTION  HOWEVER CAUSED AND ON ANY  THEORY OF LIABILITY  WHETHER IN CONTRACT  STRICT LIABILITY  OR TORT   INCLUDING NEGLIGENCE OR OTHERWISE  ARISING IN ANY WAY OUT OF THE  USE OF THIS SOFTWARE  EVEN IF ADVISED OF THE POSSIBILITY OF SUCH  DAMAGE     The names of the authors and copyright holders must not be used in advertising or otherwise to  promote the sale  use or other dealing in this Software without specific  written prior  permission  Title to copyright in this Software shall at all times remain with copyright holders     OpenLDAP is a registered trademark of the OpenLDAP Foundation     Copyright 1999 2003 The OpenLDAP Foundation  Redwood City  California  USA  All  Rights Reserved  Permission to copy and distribute verbatim copies of this document is  granted    This Product includes open SSL under the Open SSL License    NSA 2401 User   s Guide 337    Appendix D Open Source Licences    Open SSL License  LICENSE ISSUES    The OpenSSL toolkit stays under a dual license  1 e  both the conditions of the OpenSSL  License and the original SSLeay license apply to the toolkit  See below for the actual license  texts  Actually both licenses are BSD style Open Source licenses  In case of any license issues  related to OpenSSL please contact openssl core Qopenssl org     OpenSSL License    Copyright  c  1998 2004 The O
111. ESSAGE   ARGUMENT S   Storage   INFO Unlock Internal Volume   Volume SUCCESS       Storage   INFO Change Internal Crypto Volume   New   Volume Password Prompt to   0    Password  Success Prompt   Storage   INFO Change Internal Crypto Volume   Volume Password  SUCCESS   Storage   INFO Rename External Volume to Volume Name   Volume   O    SUCCESS   Storage   INFO Lock External Volume    Volume SUCCESS   Storage   INFO Unlock External Volume    Volume SUCCESS    Storage   INFO  Volume           Change External Crypto Volume   New  Password Prompt to   0    Password  Success Prompt  Storage   INFO Change External Crypto Volume  Volume Password  SUCCESS  Storage   INFO Start Scanning Internal Volume  Volume  read only read write operation   Storage   INFO Scan Internal Volume  read   only read write operation    SUCCESS       Volume       Storage   INFO Cancel Internal Volume Scan    Volume SUCCESS   Storage   INFO Scan External Volume    Volume SUCCESS   Storage   INFO Cancel External Volume Scan    Volume SUCCESS   Storage   INFO Eject External Disk   0    disk id   Volume SUCCESS   Storage   CRIT Create Internal Normal Volume   Volume Name   Size  Volume  101   Size  1 MB   FAILED    Storage    Volume    CRIT    Create Internal Crypto Volume   Volume Name   Size   101   Size  1 MB  using  PASSWD  FAILED  Create Internal Crypto Volume   Volume Name   Size    0   using USB Key   Size  1 MB   FAILED  Storage   CRIT Create External Normal Volume   Volume Name   Filesystem  Volume K
112. For dynamically assigned settings  select Using DHCP from the Configure IPv4 list in  the TCP IP tab     igure 226 Mac OS X 10 4  Network Preferences  gt  TCP IP Tab      e eo Network   a    ShowaAll   Q    Location  l Automatic HH  Show    Built in Ethernet KY    AppleTalk    Ethernet              PPPoE Proxies        Using DHCP       Configure IPv4        IP Address  0 0 0 0   Renew DHCP Lease    Subnet Mask  DHCP Client ID    If required   Router   DNS Servers   Search Domains   Optional   IPv6 Address     Configure IPv6       7   Click the lock to prevent further changes    Assist me    Ji Apply Now         NSA 2401 User   s Guide    Appendix B Setting Up Your Computer   s IP Address    5 For statically assigned settings  do the following   e From the Configure IPv4 list  select Manually   e In the IP Address field  type your IP address   e In the Subnet Mask field  type your subnet mask   e In the Router field  type the IP address of your device     Figure 227 Mac OS X 10 4  Network Preferences  gt  Ethernet    A0 Network   a    Show all   Q o    Location    Automatic HA i    Show   Built in Ethernet                 TCP IP   PPPoE AppleTalk Proxies Ethernet    IP Address  0 0 0 0    Subnet Mask  0 0 0 0         Router  0 0 0 0    DNS Servers   Search Domains   Optional   IPv6 Address     Configure IPv6           p   Click the lock to prevent further changes    Assist me       Apply Now       6 Click Apply Now and close the window     Verifying Settings    Check your TCP 
113. For the appropriate IP settings      gt  Use the Following IP address        Obtain DNS server address automatically    0 0 Use the Following DNS server addresses       Advanced         Lk   eanet      8 Select Obtain an IP address automatically if your network administrator or ISP  assigns your IP address dynamically     Select Use the following IP Address and fill in the IP address  Subnet mask  and  Default gateway fields if you have a static IP address that was assigned to you by your  network administrator or ISP  You may also have to enter a Preferred DNS server and  an Alternate DNS server  if that information was provided Click Advanced     9 Click OK to close the Internet Protocol  TCP IP  Properties window   10 Click OK to close the Local Area Connection Properties window     Verifying Settings  1 Click Start  gt  All Programs  gt  Accessories  gt  Command Prompt     2 In the Command Prompt window  type  ipconfig  and then press  ENTER      You can also go to Start  gt  Control Panel  gt  Network Connections  right click a  network connection  click Status and then click the Support tab to view your IP address  and connection information     282 NSA 2401 User s Guide    Appendix B Setting Up Your Computer   s IP Address    Mac OS X  10 3 and 10 4    The screens in this section are from Mac OS X 10 4 but can also apply to 10 3   1 Click Apple  gt  System Preferences     Figure 223 Mac OS X 10 4  Apple Menu  eer      4 gt     Show All      Personal      dl    og EK   
114. HT  HOLDERS BE LIABLE FOR ANY CLAIM  DAMAGES OR OTHER LIABILITY   WHETHER IN AN ACTION OF CONTRACT  TORT OR OTHERWISE  ARISING FROM   OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER  DEALINGS IN THE SOFTWARE     NOTE  Some components of the NSA 2401 incorporate source code covered under the  Apache License  GPL License  LGPL License  BSD License  Open SSL License  OpenLDAP  License  PHP License and MIT License  To obtain the source code covered under those  Licenses  please contact ZyXEL Communications Corporation at  ZyXEL Technical Support     End User License Agreement for    NSA 2401       WARNING  ZyXEL Communications Corp  IS WILLING TO LICENSE THE ENCLOSED  SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF  THE TERMS CONTAINED IN THIS LICENSE AGREEMENT  PLEASE READ THE  TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS  INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM  IF YOU  DO NOT AGREE TO THESE TERMS  THEN ZyXEL  INC  IS UNWILLING TO LICENSE  THE SOFTWARE TO YOU  IN WHICH EVENT YOU SHOULD RETURN THE  UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT  WAS ACQUIRED  AND YOUR MONEY WILL BE REFUNDED     1 Grant of License for Personal Use    ZyXEL Communications Corp      ZyXEL     grants you a non exclusive  non sublicense  non   transferable license to use the program with which this license is distributed  the    Software          including any documentation files accompanying the Software     Documentation
115. ICONS      r rrrrnannenrnnnennnnnrennnnrnnnanrenannrennnnnnnnnnnennansennunnennanennnnsennnnene 38  Table 4 My NSA apie ne 39  Table 5 My NSA Share Browsing ICONS             cccccceecceceeeeeceeeeeceeeeeeceeceesececseeeeeceuceeseueeeseuececsueeessuseesseaaess 40  TNA Sno BONSI JJ 41  Table 7 My NSA Share Browsing  gt  Move to  or Copy 10            ccceecccceecceceeeeeeseeeeeceeeeseeeesseeeeseeeeessaeeeees 42  Table 8 My NSA Share Configuration ICONS        rrerrnnnerrnnnevrnanrernnnnvrnnnrennanrennnernnnnnnennansennusnennnnsennnsennnnene 43  MT NNN eee ene 43  Table 10 My NSA Change Share Properties         rrrrurnerrannernnnnrnrnnnrnnnnnrnnnnnrennnnennnnnnennunsennusnennnnnennnssennnnsne 43  Table 11 My NSA Change Share Properties  gt  Share Access Configuration               cccccccesseeeeeeeeeeeeeeees 45  SU Ge a EE EE annie preee unin aateieteaates 47  Table 13 Global Labels and ICONS  o        cccccceeecccccesseceeceeeeeeceeesececeeeeceeseeeseceeeueceeseuseeeeeeaeeceessuaeesetseneeeeeeas 48  BP  a  say NNN eee ene S Se ae Ca eee een ree 50  Tabie 15 C  mmon Coniguralion Sereen ICONS cictecrsstsieesn iceman 51  pe Bhs goles Nig  clo     ET EEE EE A ner ere 118  TVETEN eer ene eee veneenere tereerpe rene matte rere carer eter errr tr esecm re ter nr nr errerrry h Srenest ter rtree eer etre rn trey 118  Table 18 System Seting  gt  Date  TIME DN renee ee eee 121  Table 19 Storage  gt  Internal Storage  gt  Status 4avrmssaeemsnanmegaasekenknk kb Naa 127  Table 20 Storage  g
116. IP properties by clicking Applications  gt  Utilities  gt  Network Utilities  and  then selecting the appropriate Network Interface from the Info tab     Figure 228 Mac OS X 10 4  Network Utility  808 Network Utility                  Netstat AppleTalk       Whois       Traceroute Port Scan         Ping Lookup          Finger    interface for information  Network Interface  en0     nter Transfer Statistics       Hardware Address 00 16 cb 8b 50 2e Sent Packets 20607    IP Address es  118 169 44 203 Send Errors 0  Link Speed 100 Mb Recv Packets 22626  Link Status Active Recv Errors 0   Vendor Marvell Collisions 0    Model Yukon Gigabit Adapter  88E8053       NSA 2401 User s Guide 285    Appendix B Setting Up Your Computer   s IP Address    Mac OS X  10 5    The screens in this section are from Mac OS X 10 5     1 Click Apple  gt  System Preferences     Figure 229 Mac OS X 10 5  Apple Menu     Finder File Edit Vie  About This Mac    Software Update     Mac OS X Software       E  System PRETRIENCES  n    TE     Bley  Recent Items  Force Quit       Sleep  Restart     Shut Down          2 In System Preferences  click the Network icon     Figure 230 Mac OS X 10 5  Systems Preferences  aan System Preferences          Personal    i       Appearance Desktop  amp  Expos    amp  International Security Spotlight  Screen Saver Spaces  Hardware  E    ea P    j  9 Laal y hu    m Q  CDs  amp  DVDs Displays Energy Keyboard  amp  Print  amp  Fax Sound  Saver Mouse    Internet  amp  Ne           
117. IPTION    Available Users Groups This displays a list of users and groups that have not yet been assigned  an authority level for the share  You can assign users and groups by  selecting them and clicking the right arrow     Full Assign users and groups one of the following authority levels   Read Only Full   Grants read write privileges   Deny Read Only   Grants read only privileges  files and folders cannot be    modified  moved  or removed     Deny   Removes all privileges  files and folders cannot be read   modified  moved  or removed     You can remove users from any given authority level by selecting them  and clicking the left arrow     Apply Click this to save your changes   Click this to discard changes and close the window        2 5 5 Share and Folder Names    The name can only contain the following characters     e Alphanumeric  A z 0 9  and Unicode     The NSA allows FTP access to shares  folders or files with names encoded in the UTF 8   8 bit UCS Unicode Transformation Format  format  So your FTP client must support  UTF 8 in order to access shares  folders or files on the NSA with Unicode names    e Spaces   e      underscores     NSA 2401 User s Guide 45    Chapter 2 Introducing the Web Configurator       periods      dashes      Other limitations include     All leading and trailing spaces are removed automatically    Multiple spaces within names are converted to a single space    Share names must be unique  they cannot be the same as other share names     T
118. MOUS FTP access rights to  these type shares        See Section 8 4 2 2 on page 192 for details on permissions     NSA 2401 User   s Guide 193    Chapter 8 Sharing Screens    8 4 3 Recycle Bin    Click Sharing  gt  Shares  gt  Recycle Bin to open the following screen  Use this screen to set up  how the share recycle bin is managed     Figure 164 Sharing  gt  Shares  gt  Configuration    Recycle Bin Configuration    Clean Recycle Bin every fo days  0 31  0 means not clean it automatically         The following table describes the labels in this screen   Table 65 Shares  gt  ACL Configuration  gt  New ACL Configuration  gt  ACL Permission    LABEL DESCRIPTION    Clean Recycle Bin every      Set the number of days a deleted file can remain in the recycle bin before  the NSA permanently deletes it  If you enter a value of    O    then it never  automatically cleans out the recycle bin and you must clean it manually     Empty All Recycle Bins Click this button to manually delete all files and folders from all of the  Now shares    recycle bins     Apply Click this to save your changes     Cancel Click this to discard changes and close the window        8 4 4 DFS    Distributed File System  DFS  is a network server component that makes it easier for you to  find and manage data on your network  Through DFS  you can build a single hierarchical file  system whose contents are distributed throughout your organization   s network  It permits  shares to be hierarchically connected to ot
119. Make sure your Internet browser has JavaScripts and Java enabled   Make sure your computer is in the same subnet as the NSA     Reset the NSA to its factory defaults  and try to access the NSA with the default IP  address  See Section 2 7 on page 52 for detailed information on the reset button     e If the problem continues  contact the network administrator or vendor        pa   can see the Login screen  but I cannot log in to the NSA        Make sure you have entered the user name and password correctly  The default user name  is admin  and the default password is 1234  These fields are case sensitive  so make sure   Caps Lock  is not on    e Turn the NSA off and on    e If this does not work  you have to reset the device to its factory defaults  See Section 2 7  on page 52 for detailed information on the reset button     NSA 2401 User   s Guide    Chapter 12 Troubleshooting  12 4 Users Cannot Access the NSA         pa A local user cannot access a share          Check that the NSA is turned on and connected to the network  The local user should try  to ping the NSA or use the NDU to discover it     The local user should check that he entered his login name and password correctly     Check if the share exists and has the correct access settings for this user     e Check the Access Control List  ACL  of read write permissions associated with specific  files and or folders  Account names added to the list are linked to the files and folders that  they are allowed to access  al
120. N NAME     CN 8R CA 1 FN  0 Regqgulierungsbeh  rde f    CN 8R CA 1 PN O Re    01  CN 9R CA 1 PN 0 Regqulierungsbeh  rde f    CN 9R CA 1 PN O0 Fe    02  CN CA Cert Signing Authority EMAIL supp    CN CA Cert Signing A   00  CN D TRUST Qualified Root CA 1 2006 PN     CN D TRUST Qualifie    00B95F  CN D TRUST Qualified Root CA 2 2006 PN     CN D TRUST Qualifie    OOBS     CN S TRUST Qualified Root CA 2006 001 P    CN S TRUST Qualifie    OODF          fli Keys     3 The next time you visit the web site  click the padlock in the address bar to open the  KDE SSL Information window to view the web page   s security details        NSA 2401 User   s Guide    Appendix C Importing Certificates    Removing a Certificate in Konqueror    This section shows you how to remove a public key certificate in Konqueror 3 5     1 Open Konqueror and click Settings  gt  Configure Konqueror     Figure 295 Konqueror 3 5  Settings Menu  Settings      fi Hide Menubar Ctrl M  Toalbars      4 Full Screen Mode Ctrl Shift F    Load View Profile  Save View Profile  Web Browsing      Configure View Profiles     Configure Extensions     18 Configure Spell Checking           Configure Toolbars     2 Configure Konqueror          2 Inthe Configure dialog box  select Crypto     3 Onthe Peer SSL Certificates tab  select the certificate you want to delete and then click  Remove     Figure 296 Konqueror 3 5  Configure    Configure   Konqueror             Configure SSL  manage certificates  and other cryptograp    SSL O
121. NELW OT KISTOTAGE  rutine New Password    Password  Confirm       fica ution     Please keep a record of your new password whenever you change it   The system will lock you out if you have forgotten your password              180 NSA 2401 User s Guide    Chapter 8 Sharing Screens       LS Non admin user accounts cannot access the administrator Web Configurator  screens and cannot browse shares assigned to other users        8 2 2 View User Information    To view a user account   s information  select it from the Sharing  gt  Users list and then click  User Info  The two tabs in the User Information screen are Quota List and Group List     Figure 155 Sharing  gt  Users  gt  User Information    User Information     User Information    User Name  Wazun User Name  Wazun    f Quota List   Group List       Quota List Group List j                                        K    K                    S  Quota MB    Used  MB      backup_office Unlimited 0 00 KL240 X10    everyone                The following table describes the labels in this screen   Table 52 Sharing  gt  Users  gt  User Information  gt  Quota List    Indicates how much of the volume quota the selected user has used   Used quote is measured in megabytes  MB      OK Click this to close the screen     NSA 2401 User s Guide 181    Chapter 8 Sharing Screens    8 3 Groups    Click Sharing  gt  Groups to open this screen where you can create and manage groups  A  group is a collection of user accounts     Figure 156 Sharing  gt
122. NG  BUT NOT LIMITED TO  THE  IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  PARTICULAR PURPOSE ARE DISCLAIMED  IN NO EVENT SHALL THE OpenSSL  PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT  INDIRECT   INCIDENTAL  SPECIAL  EXEMPLARY  OR CONSEQUENTIAL DAMAGES   INCLUDING  BUT NOT LIMITED TO  PROCUREMENT OF SUBSTITUTE GOODS OR  SERVICES  LOSS OF USE  DATA  OR PROFITS  OR BUSINESS INTERRUPTION   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY  WHETHER IN  CONTRACT  STRICT LIABILITY  OR TORT  INCLUDING NEGLIGENCE OR  OTHERWISE  ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE  EVEN  IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE     This product includes cryptographic software written by Eric Young  eay  cryptsoft com    This product includes software written by Tim Hudson  t h cryptsoft com      338 NSA 2401 User s Guide    Appendix D Open Source Licences    Original SSLeay License    Copyright  C  1995 1998 Eric Young  eay  cryptsoft com  All rights reserved     This package is an SSL implementation written by Eric Young  eay  cryptsoft com   The  implementation was written so as to conform with Netscape   s SSL     This library is free for commercial and non commercial use as long as the following  conditions are adhered to  The following conditions apply to all code found in this distribution   be it the RC4  RSA  Ihash  DES  etc   code  not just the SSL code  The SSL documentation  included with this distribution is covered by the same copyright terms except tha
123. NSA 2401    Network Storage Appliance    User s Guide    Version 1 10  3 2009  Edition 1       DEFAULT LOGIN    LAN1 IP Address 192 168 1 3  LAN2 IP Address 192 168 100 3    Username admin    Password 1234          ZyXEL    www zyxel com    About This User s Guide    About This User s Guide    Intended Audience    This manual is intended for people who want to configure the NSA using the Web  Configurator     Related Documentation    e Quick Start Guide    The Quick Start Guide is designed to help you get up and running right away  It contains  information on setting up your network and configuring for Internet access     e Web Configurator Online Help    Embedded web help for descriptions of individual screens and supplementary  information     e Supporting Disk  Refer to the included CD for support documents   e ZyXEL Web Site    Please refer to www zyxel com for additional support documentation and product  certifications     User Guide Feedback    Help us help you  Send all User Guide related comments  questions or suggestions for  improvement to the following address  or use e mail instead  Thank you     The Technical Writing Team   Zy XEL Communications Corp    6 Innovation Road II   Science Based Industrial Park   Hsinchu  300  Taiwan     E mail  techwriters Q zyxel com tw    Customer Support    In the event of problems that cannot be solved by using this manual  you should contact your  vendor  If you cannot contact your vendor  then contact a ZyXEL office for the reg
124. NT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND    350 NSA 2401 User s Guide    Appendix D Open Source Licences    DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE   BUT SHALL IN NO EVENT EXCEED  1 000  BECAUSE SOME STATES COUNTRIES  DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR  CONSEQUENTIAL OR INCIDENTAL DAMAGES  THE ABOVE LIMITATION MAY  NOT APPLY TO YOU     8 Export Restrictions    THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY  APPLICABLE LAWS  REGULATIONS  ORDERS  OR OTHER RESTRICTIONS ON THE  EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE  WHICH MAY BE IMPOSED FROM TIME TO TIME  YOU SHALL NOT EXPORT THE  SOFTWARE  DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND  DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS  REGULATIONS   ORDERS  OR OTHER RESTRICTIONS  YOU AGREE TO INDEMNIFY ZyXEL  AGAINST ALL CLAIMS  LOSSES  DAMAGES  LIABILITIES  COSTS AND EXPENSES   INCLUDING REASONABLE ATTORNEYS    FEES  TO THE EXTENT SUCH CLAIMS  ARISE OUT OF ANY BREACH OF THIS SECTION 8     9 Audit Rights    ZyXEL SHALL HAVE THE RIGHT  AT ITS OWN EXPENSE  UPON REASONABLE  PRIOR NOTICE  TO PERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO  ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS  LICENSE AGREEMENT     10 Termination       This License Agreement is effective until it is terminated  You may terminate this License  Agreement at any time by destroying or returning to ZyXEL all copies of the Software and  Documentation in your posse
125. O    1    FAILED type  Storage   CRIT Create External Crypto Volume   Volume Name   Filesystem    0   using USB Key   1       Volume  101    1   using PASSWD   FAILED   Storage   CRIT Delete Volume  FAILED   Volume    Create External Crypto Volume   Volume Name   Filesystem  2 0 NSA 2401 User s Guide    Storage   CRIT    Volume            CRIT    Storage    Volume       Table 114 Log Messages  FEATURE SEVERITY ARGUMENT S     Storage   CRIT Create USB Key  FAILED  Volume  Storage   CRIT Duplicate USB Key  FAILED  Volume  Storage   CRIT Rename Internal Volume to Volume Name  Volume   0    FAILED  Storage   CRIT Expand Volume  Increased Size  Volume Size  0 MB   FAILED  Storage   CRIT Lock Internal Volume  FAILED  Volume  Storage   CRIT Unlock Internal Volume  FAILED  Volume    Storage   CRIT Change Internal Crypto Volume   New  Volume Password Prompt to   0    Password  FAILED Prompt       Storage   CRIT Change Internal Crypto Volume   Volume Password  FAILED   Storage   CRIT Rename External Volume to Volume Name  Volume   O    FAILED   Storage   CRIT Lock External Volume  FAILED   Volume   Storage   CRIT Unlock External Volume    Volume FAILED    Storage    Volume    CRIT Change External Crypto Volume   New    Password Prompt to   0    Password        FAILED Prompt       Storage   CRIT Change External Crypto Volume   Volume Password  FAILED   Storage   CRIT Start Scanning Internal Volume   Volume  read only read write operation    Storage   CRIT Scan Internal Volume  read    V
126. ONDITIONS    All other trademarks or trade names mentioned herein  if any  are the property of their  respective owners     This Product includes OpenLDAP software under the OpenLDAP Public License    The OpenLDAP Public License  Version 2 8  17 August 2003    Redistribution and use of this software and associated documentation     Software      with or  without modification  are permitted provided that the following conditions are met     1  Redistributions in source form must retain copyright statements and notices     2  Redistributions in binary form must reproduce applicable copyright statements and notices   this list of conditions  and the following disclaimer in the documentation and or other  materials provided with the distribution  and    3  Redistributions must contain a verbatim copy of this document     The OpenLDAP Foundation may revise this license from time to time  Each revision is  distinguished by a version number  You may use this Software under terms of this license  revision or under the terms of any subsequent revision of the license     THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS  CONTRIBUTORS    AS IS  AND ANY EXPRESSED OR IMPLIED WARRANTIES   INCLUDING  BUT NOT LIMITED TO  THE IMPLIED WARRANTIES OF  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE  DISCLAIMED  IN NO EVENT SHALL THE OPENLDAP FOUNDATION  ITS  CONTRIBUTORS  OR THE AUTHOR S  OR OWNER S  OF THE SOFTWARE BE  LIABLE FOR ANY DIRECT  INDIRECT  INCIDENTAL  SPECIAL  EX
127. Prompt     2 Inthe Command Prompt window  type  ipconfig  and then press  ENTER      You can also go to Start  gt  Control Panel  gt  Network Connections  right click a  network connection  click Status and then click the Support tab to view your IP address  and connection information     2 8 NSA 2401 User   s Guide    Appendix B Setting Up Your Computer s IP Address    Windows Vista    This section shows screens from Windows Vista Professional     1 Click Start  gt  Control Panel     Figure 216 Windows Vista  Start Menu       Ir  eye 7 0 Professional Connect To       Media Player Classic    Control Panel  Default Programs   gt  All Programs Help and Support  Ji aG      O a    2 Inthe Control Panel  click the Network and Internet icon        Figure 217 Windows Vista  Control Panel       Goe     Control Panel p       4     ED    File Edit View Tools Help        Control Panel Home    System and Maintenance User Accounts    Get started with Windows      Change account type  Back up your computer    Classic View    Appearance and  Personalization   Change desktop background  Change the color scheme  Adjust screen resolution    Security   Check for updates      Allow a program through Windows  Firewall    Network and Internet   onnect to the Internet    Clock  Language  and Region  Change keyboards or other input  methods   Change display language    View network status and tasks  Set up file sharing       3 Click the Network and Sharing Center icon     Figure 218 Windows Vista  N
128. R E nolish aea    Password Administration       i My NSA    My Shares    Networkitorage  ASJIEINES    test 2 USB Card I     t ngare  cringe    Other Shares    Currently  there are no other shares that are accessible to you on the system                 The icons and language label at the top right of the screen are visible from most screens  Use  the tabs at the top of the screen to navigate between the user level screens and menus  The  following table describes the    global    icons and tabs in the user level screens     Table 3 User level Global Labels and Icons    LABEL ICON DESCRIPTION  Language Select the Web Configurator language from the drop down list box     Help Click the Help icon to open a web help page specific to the screen you are  currently configuring     Logout Click the Logout icon at any time to exit the Web Configurator     My NSA Click this tab to go to screens where you can manage your shares and access the  files on public shares  The administrator must go into the administration screens to  manage other user s shares     Password Click this tab to go to a screen where you can change your password    Administration This tab displays when you log in as the administrator  Click the tab to go to  screens where you can manage advanced configurations        2 5 My NSA Screen    Use the My NSA screens to manage your shares and access the files in folders to which you  have access     A share is a set of user access permissions for a specific folder on a vo
129. RRANTIES OF MERCHANTABILITY AND  FITNESS FOR A PARTICULAR PURPOSE  THE ENTIRE RISK AS TO THE QUALITY  AND PERFORMANCE OF THE LIBRARY IS WITH YOU  SHOULD THE LIBRARY  PROVE DEFECTIVE  YOU ASSUME THE COST OF ALL NECESSARY SERVICING   REPAIR OR CORRECTION     16  INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN  WRITING WILL ANY COPYRIGHT HOLDER  OR ANY OTHER PARTY WHO MAY  MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE  BE  LIABLE TO YOU FOR DAMAGES  INCLUDING ANY GENERAL  SPECIAL   INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR  INABILITY TO USE THE LIBRARY  INCLUDING BUT NOT LIMITED TO LOSS OF  DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY  YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH  ANY OTHER SOFTWARE   EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN  ADVISED OF THE POSSIBILITY OF SUCHDAMAGES     NSA 2401 User   s Guide    Appendix D Open Source Licences    END OF TERMS AND CONDITIONS     This Product includes apcid  apcupsd  autofs  device mapper  evms  exim  Lm_sensors   mdadm  pam_mount  raidtools  samba  sg_utils  smartmontools  vsftpd  xfsprogs and Linux  kernel software under GPL license     GNU GENERAL PUBLIC LICENSE  Version 2  June 1991  Copyright  C  1989  1991 Free Software Foundation  Inc   59 Temple Place   Suite 330  Boston  MA 02111 1307  USA    Everyone is permitted to copy and distribute verbatim copies of this license document  but  changing it is not allowed     Preamble    The license
130. Reference    This section contains background on JBOD and the RAID levels used on the NSAand lists  some common S M A R T  attributes     6 9 1 Storage Terminology    These are some terms that you need to know in order to understand storage systems     e Mirroring  In a RAID system using mirroring  all data in the system is written simultaneously to two  hard disks instead of one  This provides 100  data redundancy as if one disk fails the  other has the duplicated data  Mirroring setups always require an even number of drives    e Duplexing  Like in mirroring  all data is duplicated onto two distinct physical hard drives but in  addition it also duplicates the hardware that controls the two hard drives  one of the drives  would be connected to one adapter and the other to a second adapter     e Striping  Striping is the breaking up of data and storing different data pieces on each of the drives in  an array  This allows faster reading and writing as it can be done simultaneously across  disks  Striping can be done at the byte level  or in blocks  Byte level striping means that  the first byte of the file is sent to the first drive  then the second to the second drive  and so  on  Block level striping means that each file is split into blocks of a certain size and those  are distributed to the various drives  The size of the blocks used is also called the stripe  size  or block size     e Parity  In mirroring 50  of the drives in the array are reserved for duplicate data  Par
131. S minutes ow   B  0 Shours o Sminutes ETEN BEG    Page 1 Of 1       The following table describes the labels in this screen   Table 95 Maintenance  gt  Log  gt  Search Filters    LABEL DESCRIPTION  Type This filters search results according to the log type selected  The default setting is  View All Logs     Severity This filters search results according to the severity rating selected  When you  select a severity  the NSA searches through all logs of that severity or higher  The    default is to search through all files regardless of severity     Keyword s  Enter a specific word for which to search  The default is all words     Time This filters search results according to the time frame selected in the beginning  date and end date fields  The default is any time frame since the first existing log  file was generated   Purged logs  of course  cannot be searched      To set a start date  click the left menu and pick a day from the calendar   To set an end date  click the right menu and pick a day from the calendar     Search Click to begin searching according to the search parameters you set  If you choose  not to set any search parameters  then the defaults for each filter is used     Clear  filter  Click to reset all the search filters back to their default settings           11 2 2 Log Records Configuration    Click Maintenance  gt  Log  gt  Log Config to open the Log Records Configuration screen   where you can customize the duration that logs are kept on the NSA     Figur
132. SA        9 2 4 Restoring by Backup Job    In the Protect  gt  Backup screen  select a backup job and click the Restore Archive icon to  replace existing files with files saved previously     NSA 2401 User s Guide 209    Chapter 9 Protect Screens    Figure 173 Protect  gt  Backup  gt  Restore Archive  Step 1    En    Restore    Step 1  Select Restore Point       Job Information    Job Mame  Weekly backup  Job Description   Backup Type  Incremental    Scheduler    Information  every week    Restored Time       The following table describes the labels in this screen   Table 76 Protect  gt  Backup  gt  Restore Archive  Step 1    Scheduler Information This field displays the backup   s frequency  the time it was last run in  and  whether or not it succeeded   and when it is scheduled to run again  The  times use yyyy mm dd hh mm ss format     Check  Last Backup Time   Select to which backup you want to return  All later backups are deleted   Click this button to proceed        210 NSA 2401 User s Guide    Chapter 9 Protect Screens    9 2 4 1 Restoring a Backup  Step 2    Figure 174 Protect  gt  Backup  gt  Restore Archive  Step 2    nr  Restore    Step Z  Please select which file s   folder s  to restore        Folder Chooser    Selected Folder    Eg F  E  Ra Gonzo i       The following table describes the labels in this screen   Table 77 Protect  gt  Backup  gt  Restore Archive  Step 2    9 2 4 2 Restoring a Backup  Step 3       Figure 175 Protect  gt  Backup  gt  Restore Archiv
133. SA 2401 User s Guide    Appendix C Importing Certificates    Removing a Certificate in Firefox  This section shows you how to remove a public key certificate in Firefox 2     1 Open Firefox and click Tools  gt  Options     Figure 274 Firefox 2  Tools Menu    Web Search Ctrl K    Downloads Ctrl J  Add ons    Java Console  Error Console  Page Info    Clear Private Data    Ctrl 5hift Del    w    2 Inthe Options dialog box  click Advanced  gt  Encryption  gt  View Certificates     Options          Figure 275 Firefox 2  Options    Privacy Security Advanced    General   Network   Updale       Protocols    Use SSL 3 0 Use TLS 1 0      Certificates  When a web site requires a certificate     O  Select one automatically     Ask me every time          NSA 2401 User   s Guide    Appendix C Importing Certificates    3 In the Certificate Manager dialog box  select the Web Sites tab  select the certificate  that you want to remove  and then click Delete     Figure 276 Firefox 2  Certificate Manager    9 Certificate Manager T  E  x         Web Sites   4 thorities    You have certificates on file that identify these web sites       Certificate Name Purposes  El ZyXEL       72 20  57  202 Client Server Status Responder       4 Inthe Delete Web Site Certificates dialog box  click OK     Figure 277 Firefox 2  Delete Web Site Certificates  Delete Web Site Certificates    Are you sure you want to delete these web site certificates     172 20 37 202       5 The next time you go to the web site tha
134. SB key for anything else  do not store data on it or format it         Figure 1    38 Storage  gt  External Storage  gt  Volume  gt  Create          Available Diskfs   USB1 245 00MB     Volume Name test   File System fa HE  T Encrypted   D        Note  You can t change password of this encrypted volume if you    encrypt it by USE    APE    The following table describes this screen   Table 36 Storage  gt  External Storage  gt  Volume Create    LABEL DESCRIPTION    Available Disk s  Select the external  USB  device upon which you want to create the  volume     Volume Name Type a volume name from 1 to 31 characters  To ease management  it is    highly recommended that each volume use a unique name   Acceptable characters are all alphanumeric characters and      spaces      _   underscores   and      periods    The first character must be alphanumeric  A Z 0 9    The last character cannot be a space              NSA 2401 User   s Guide 149    Chapter 6 Storage Screens    Table 36 Storage  gt  External Storage  gt  Volume Create  continued     LABEL    File System  Encrypted    Password    DESCRIPTION    Select the file system you want the new volume to use  If you plan to also  use the USB device with another computer  it is recommended that you  select the file system that the other computer uses   Windows file systems  fat32  Newer  and more efficient than FAT16  Supports a volume size  of up to 2 TB  Tera Bytes  and individual file sizes of up to 4 GB   fat16  Compatible with 
135. SP Page    E    Delete Browsing History       Pop up Blocker  Phishing Filter  Manage Add ons    Work Offline  Windows Update  Full Screen  Menu Bar  Toolbars    Windows Messenger  Diagnose Connection Problems     Sun Java Console    Internet Options       2 Inthe Internet Options dialog box  click Content  gt  Certificates     Figure 264 Internet Explorer 7  Internet Options  Internet Options    General   Security   Prive                               Content Advisor    Ratings help you control the Internet content that can be  viewed on this computer     Certificates    Use certificates for encrypted connections and identification     Clear SSL state   Certificates Publishers  AutoComplete    AutoComplete stores previous entries    on webpages and suggests matches  for you     Feeds provide updated content from    websites that can be read in Internet  Explorer and other programs                                         NSA 2401 User s Guide    Appendix C Importing Certificates  3 In the Certificates dialog box  click the Trusted Root Certificates Authorities tab   select the certificate that you want to delete  and then click Remove     Figure 265 Internet Explorer 7  Certificates    Certificates    Intended purpose     lt All gt          Intermediate Certification Authoriti  Issued To Expiratio    Friendly Name     172 20 37 202 172 20 37 202 5 21 2011  lt None gt   EE  ABA ECOM Root CA ABA ECOM Root CA 7 10 2009 DST  ABA ECOM     Autoridad Certifica    Autoridad Certifica
136. Screens    Table 72 Protect  gt  Backup  gt  Add Job  Step 3  continued   LABEL DESCRIPTION    Purge Policy Select a policy for deleting archive backups  This purge runs first before a  new backup is done  For example  if you have a backup scheduled to  begin at midnight  then at that time  the NSA checks these settings and  deletes files accordingly before backup takes place  If space on the  backup NSA or disk is a concern  then configure the NSA to delete old  backups    e Keep All Old Backup files  Purge is in effect disabled  Select this if    backup space is not a concern    Keep Only ___ backups  All backup files older than the last one are  deleted  You will not be able to recover files that existed  only  in those  previous backups  Select this if backup space is limited and recovery  of old files is not important    Keep Backups for _ day s   Backups older than the number of  days you enter here are deleted  0 days means that all old backups  are deleted when a new one is done     Click this button to return to the preceding screen   Click this button to proceed     9 2 2 3 Creating a Backup Job  Step 4       Figure 170 Protect  gt  Backup  gt  Add Job  Step 4  Add anew backup Job        Step 4       Scheduler    Backup  Monthly E    Frequency     Soh eae ap      Step 1  Please select the month s  of    year       January    February   March April May June  duly   August LJ    October F F    September November December    Step 2  Please select the day of the month  
137. USERS gt   anonymo  lt LOCALGROUPS gt     anonymous ftp     lt DOMAINGROUPS gt    lt DOMAINUSERS gt      lt LOCALGROUPS gt   Everyone  Example    Test   lt DOMAINGROUPS gt      Read Only     lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt      lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt        Note     Tou may select multiple users groups by using Ctrl   Click           192 NSA 2401 User s Guide    Chapter 8 Sharing Screens    The following table describes the labels in this screen   Table 64 Shares  gt  ACL Configuration  gt  New ACL Configuration  gt  ACL Permission    Target This displays the path of the currently selected item on the share     Apply to all directories and   If you are configuring a folder   s permission settings  select this option to   files under this folder have these permission settings overwrite any ACL settings of all folders  and files within the folder   If you clear this option  the NSA still applies the permission settings to any  directories and files under this folder that do not have other ACL settings   You can still change the ACL settings of the folder   s contents later  If  someone is already connected to a file or folder  changing the ACL  settings does not end their current setting  but will apply to any future  attempts to access the file or folder     Available Users Groups This displays a list of users and groups that have not yet been assigned    an authority lev
138. a is duplicated across two disks  so if one disk fails  there is still a a copy of the data  These  two arrays are configured as a single RAID 0 array for faster performance     Table 40 RAID 10       Typical applications for RAID 10 are those requiring both high performance and reliability   such as enterprise servers and high end moderate sized database systems  RAID 10 is often  used in place of RAID 1 or RAID 5 by those requiring higher performance  It may be used   instead of RAID 1 for applications requiring more capacity     154 NSA 2401 User s Guide    Chapter 6 Storage Screens    6 9 6 RAID 5    RAID 5 provides the best balance of capacity and performance while providing data  redundancy  It provides redundancy by striping data across three disks and keeps the parity  information  AP  on the fourth disk  in each stripe   In case of disk failure  data can be  recovered from the surviving disks using the parity information  When you replace the failed  disk  the reconstructed data is written onto the new disk  Re synchronize the array to have it  return to its original state  The following example shows data stripped across three disks  A1  to A3 in the first strip for example  with parity information  AP  on the fourth disk     Table 41 RAID 5       The capacity of a RAID 5 array is the smallest disk in the RAID set multiplied by one less than  the number of disks in the RAID set  For example  if you have four disks of sizes 150 GB  150  GB  200 GB and 250 GB respecti
139. a user access but  the ACL setting does not  the NSA does not give the user access  Also  if the ACL setting  allows a user access but the share   s settings do not  the NSA does not give the user access     Finding Out More  See Section 3 2 on page 55 for a tutorial on configuring the sharing screens     See Section 3 3 on page 61 for a tutorial on using shares     8 2 Users    Click Sharing  gt  Users to open this screen where you can create and manage user accounts for  the NSA   s file services     Figure 151 Sharing  gt  Users    F j E   oP py fa Ei   4dd User Search Update Edit User Delete User Info  Domain Selected Display Number  20     Users Useris  Go to Page i  m     Type   all E Keyword s     P Search BEL       The following table describes the icons in this screen   Table 49 Sharing  gt  Users Icons    Add User    Click this icon to open the Create a New Account screen  where you can  add new user accounts  See Section 8 2 1 on page 178 for details     Search    Click this icon to display the search filters which you can use to search for  user accounts by type or keyword     Update Domain Users    Click this icon to update the list of domain users by connecting to domain  controller and retrieving the latest list of users and groups     Note  If a user is deleted on the domain controller but the  NSA 2401 domain user list is not up to date  then the  user cannot log in since authentication is handled by  the domain controller        NSA 2401 User   s Guide    Ch
140. able 91 Applications  gt  Copy Button    LABEL DESCRIPTION  Currently Selected Share   This field displays the share that the NSA is set to use with the copy button  feature     Click this button to use a different share with the copy button feature     Copy Direction Select whether you want to use the copy button to copy files from the USB  device to the share on the NSA or from the share on the NSA to the USB    device     Apply Select a share  then click this to make it the default location where data is  stored when you press the copy button   Clear Settings Click this to reset this screen to the default settings   Click this to discard any changes and start again     10 4 1 Changing the Copy Button Share       Click Applications  gt  Copy Button and then Edit to open the following screen  Use this  screen to select the share the NSA uses with the copy button     NSA 2401 User   s Guide 227    Chapter 10 Application Screens    Figure 189 Applications  gt  Copy Button  gt  Edit    Please select a share to be the target share for the copy button     user create Bob private  user create Bill private  user create i im i private  user create Fred public    user create Sales public       The following table describes the icons in this screen   Table 92 Applications  gt  Copy Button  gt  Edit    ICON DESCRIPTION    Available Share  pcg I Indicates the share can be used for file and folder management     Unavailable Share    eG Indicates the share cannot be used because the NSA c
141. ably effect the  intention of the parties     NSA 2401 User   s Guide    Appendix D Open Source Licences    NSA 2401 User   s Guide       Legal Information    Copyright    Copyright    2009 by ZyXEL Communications Corporation     The contents of this publication may not be reproduced in any part or as a whole  transcribed   stored in a retrieval system  translated into any language  or transmitted in any form or by any  means  electronic  mechanical  magnetic  optical  chemical  photocopying  manual  or  otherwise  without the prior written permission of ZyXEL Communications Corporation     Published by ZyXEL Communications Corporation  All rights reserved     Disclaimer    Zy XEL does not assume any liability arising out of the application or use of any products  or  software described herein  Neither does it convey any license under its patent rights nor the  patent rights of others  ZyXEL further reserves the right to make changes in any products  described herein without notice  This publication is subject to change without notice     Certifications    Federal Communications Commission  FCC  Interference Statement    The device complies with Part 15 of FCC rules  Operation is subject to the following two  conditions     e This device may not cause harmful interference   e This device must accept any interference received  including interference that may cause  undesired operations     This device has been tested and found to comply with the limits for a Class B digital de
142. access display  Now you can use FTP to securely  transfer files to or from the NSA  Use a secure method to let your users know the correct  fingerprint for the NSA   s certificate so they can check it before adding a security exception     3 5 3 Controlling Access to Shares  Folders  and Files    Gonzo wants to give Kermit and the senior management group read only access to the  Strategy folder  However Kermit is not to see the 2010 2014 Plans file  The following  sections show how to configure the    Gonzo    share   s access settings and Access Control List   ACL  settings     3 5 3 1 Configuring the Share   s Access    First you need to give Kermit and the senior management read only access to the share     1 Click Sharing  gt  Shares  Select the Gonzo share and click Edit Share     Figure 65 Sharing  gt  Shares    Internal Storage      External Storage a 2 E        3 m    TCPAP Add Shara Recycle i Z ACL Delets DFS Shara  Windows CIFS Prozertias Shere Browser    HTE    samme        IERSE    Girmuans     j J  ert cre ated    Shares       User created Kermit vslumelykerm   Kermt     Advances       NSA 2401 User s Guide 83    Chapter 3 Tutorials    2 Set the Share Access to Advanced and click Edit     Figure 66 Sharing  gt  Shares  gt  Edit Share    Edit Share    Share Name  Gonzo  Volume  volumet  111 07 GE   B    Make This Share Gm   E  Owned By a    Enable This Share    Enable Action Log     Enable Recycle  Bin    Share Access       3 Move Senior Management and Kermit to R
143. ackup job or the NSA or the RAID array containing the backup job  failed you cannot restore archived files by the backup job  In this example  the NSA   s RAID  array failed  You   ve replaced the hard drives and re configured the RAID  To restore by  backup files     1 Click Protect  gt  Restore  Specify where the archive files are located  In this example   enter    192 168 3 2    as the IP address     admin    as the account name     1234    as the  password  and    Backups    as the share name  Click Test Connection  Click Next     Figure 96 Protect  gt  Restore  Step 1    Restore    Step 1  Select Restored Source    f Remote NSA    IF 19216832       adds 192 168 3 2  User  admin    Password E    Successfully    Share  Backus     Set Former connected to  Mame be   HSA   Internal or External Volume    m       102  NSA 2401 User   s Guide    Chapter 3 Tutorials    2 Select the backup job and backup time and click Next     Figure 97 Protect  gt  Restore  Step 2    Restore    Step Z  Select Restore Point    5 aoe name OO O O  o amp  Weekly_backup         C    recycle    EJ Restored Time    E 2008 09 08 14 35 45  C 2008 09 08 14 37 28    Previous       3 Select everything in the Gonzo share except the recycle folder  Click Next     Figure 98 Protect  gt  Restore  Step 3  _ EEE    Restore    Step 3  Please select which file s   folder s  to restore     roloder wan  I PERSE J EES    Pe SSK rei i BE E    Gonzo Planning    Gonzo Strategy      2010 201 4 Plans  doc     E 2009 Plan 
144. acter must be a letter     Volume Name Select the  internal  volume to take a snapshot of   When creating a new snapshot  only volumes that are already created on  the NSA are available   Note  You can only create one snapshot job per volume   A snapshot must be done on a complete volume  and not a single file or  folder  However you can restore files from a snapshot on an individual file   by file basis     Max  i of Snapshot   Select the number of snapshot images to take from 1 to 5  It s strongly  Image s  recommended to set this as low as possible as each new snapshot image  created will reduce the NSA   s file write performance           Period Select how often the job should run  Hourly  Daily  or Weekly   It is  recommended you schedule snapshots for times when your network is  not busy  such as at night  If two events are configured to run at the same  time  then one must wait until the other finishes running     Enter the time  and or day as appropriate for your selection     Apply Click this button to save your changes back to the NSA     Cancel Click this button to discard your changes and exit the screen        9 4 2 Snapshot Images    Click Protect  gt  Snapshot  gt  Snapshot Images tab to open the following screen  Click a  column   s heading cell to sort the table entries by that column   s criteria  Click the heading cell  again to reverse the sort order     Figure 182 Protect  gt  Snapshot  gt  Snapshot Images       Snapshot    oe    Delete  Selected  Amagets
145. age  gt  External Storage  gt  Disk    External Storage    1   i       fe  Eject Lacate Duplicate    USB Key USB FLASH DRIVE 54CB 245 00 MB       The NSA automatically creates volumes for the USB drive  You just need to configure sharing  settings  Chapter 8 on page 173  to let your users use it     3 9 2 Adding an Internal Hard Drive to an Existing Disk Array    If you do not already have four disks installed  you can install more  You can add a new disk to  an existing JBOD array or three disk RAID 5 array  When you add a new disk to an existing  array  you do not have to create new volumes and sharing settings     For optimal performance and RAID storage capacity  use hard drives of the same speed and  capacity     NSA 2401 User s Guide    Chapter 3 Tutorials       LES If the new hard drives have any data you want to keep  back it up to another  location before you install them  Adding these hard drives to a disk array  formats them so all data stored on them will be lost        1 See the Quick Start Guide for details on installing hard drives in the NSA   s bays  You  can install hard drives while the NSA is operating     2 Click Storage  gt  Internal Volumes  gt  Disk and make sure the new drive displays with a  healthy status     Figure 108 Storage  gt  Internal Storage  gt  Disk    Internal Storage    we     iW    14 y    Wizards Eject SMALT     raid5 raldSDiD3D4 seagate STIL2082745 3 42 111 79 GB    raida  raidsDip3sp4a    PS Ve 465 76 GB    raids raldsSDiD3D4 Seagate
146. agreed upon in writing by the parties or the litigation claim is not withdrawn  the  rights granted by Participant to You under Sections 2 1 and or 2 2 automatically terminate at  the expiration of the 60 day notice period specified above     346 NSA 2401 User s Guide    Appendix D Open Source Licences    any software  hardware  or device  other than such Participant s Contributor Version  directly  or indirectly infringes any patent  then any rights granted to You by such Participant under  Sections 2 1 b  and 2 2 b  are revoked effective as of the date You first made  used  sold   distributed  or had made  Modifications made by that Participant     8 3  If You assert a patent infringement claim against Participant alleging that such  Participant s Contributor Version directly or indirectly infringes any patent where such claim  is resolved  such as by license or settlement  prior to the initiation of patent infringement  litigation  then the reasonable value of the licenses granted by such Participant under Sections  2 1 or 2 2 shall be taken into account in determining the amount or value of any payment or  license     8 4  In the event of termination under Sections 8 1 or 8 2 above  all end user license  agreements  excluding distributors and resellers  which have been validly granted by You or  any distributor hereunder prior to termination shall survive termination     9  Limitation of liability    Under no circumstances and under no legal theory  whether tort  includin
147. al group created on the NSA that is in conflict with a domain  group    Domain Group   Indicates a domain group created on a domain controller     Conflict Domain Group    Indicates a domain group created on a domain controller that is in conflict  with a local group created on the NSA        The following table describes the labels in this screen   Table 54 Sharing  gt  Groups    Display Number Set the number of groups displayed per page   Go to Page Select a page number of user account groups to display     Type This field displays when you click the Search icon  Use it to filter search  results according to the user group type selected     Keyword s  This field displays when you click the Search icon  Enter a specific word  for which to search  The default is all words     Search This button displays when you click the Search icon  Click to begin  searching according to the search parameters you set  If you choose not  to set any search parameters  then the defaults for each filter is used     Clear filter  This button displays when you click the Search icon  Click to reset all the  search filters back to their default settings        NSA 2401 User   s Guide 183    Chapter 8 Sharing Screens    Table 54 Sharing  gt  Groups  continued   LABEL DESCRIPTION    Previous  amp  Next Click Previous to cycle back through the pages of groups  and Next to  cycle forward through them   This icon displays the type of group and can also show if the group Is in  conflict     Group Type Th
148. amic or static IP address es    subnet mask  default gateway and DNS servers        The NSA automatically restarts its network services after you apply changes in  the TCP IP or Windows CIFS screens        Click Network  gt  TCP IP to access the Network  gt  TCP IP screen     NSA 2401 User   s Guide    Chapter 7 Network Screens    Figure 144 Network  gt  TCP IP    IP Address    Teaming Mode  Standalone        Default Gateway ILAN        Note        The network cable for LANZ is currently unplugged     iE Dynamic iE Dynamic       Static    Static    IP Address  192 158 1 34 IP Address  0 0 0 0    IF Subnet Mask  255 255 255 0 IF Subnet Mask  0 0 0 0    Gateway  192 168 1 1 Gateway      iE Dynamic     Static    Primary DNS Server  192 168 1 1  Secondary ONS Server  0 0 0 0    Jumbo Frames    Disabled  co Enabled       Caution     Jumbo Frame is supported in 1 Gbps and higher mode only  Please make sure your host  switch hub  and router support  Jumbo Frames    Network Diagnostic Tool       The following table describes the labels in this screen   Table 43 Network  gt  TCP IP    LABEL DESCRIPTION    Teaming Mode Select how to use the NSA   s two Gigabit Ethernet interfaces     Stand Alone  Select this option to use a separate IP address on each of the two  Gigabit Ethernet interfaces     Fault Tolerance  Select this option to use the LAN2 Gigabit Ethernet interface as  a fail over  backup  for the LAN1 Gigabit Ethernet interface  Both Gigabit  Ethernet interfaces are connected t
149. and finally the Log Setting tab to get to that screen    e Units of measurement may denote the    metric    value or the    scientific    value  For  example     k    for kilo may denote    1000    or    1024        M    for mega may denote    1000000     or    1048576    and so on     e    e g     1s a Shorthand for    for instance     and  1 e      means    that is    or    in other words        NSA 2401 User   s Guide    Document Conventions    Icons Used in Figures    Figures in this User   s Guide may use the following generic icons  The NSA icon is not an  exact representation of your device     Notebook computer    Server Firewall Switch       NSA 2401 User   s Guide 5    Safety Warnings    Safety Warnings        lt  gt  For your safety  be sure to read and follow all warning notices and instructions        Do NOT use this product near water  for example  in a wet basement or near a swimming  pool     Do NOT expose your device to dampness  dust or corrosive liquids   Do NOT store things on the device     Do NOT install  use  or service this device during a thunderstorm  There is a remote risk  of electric shock from lightning     Connect ONLY suitable accessories to the device     Do NOT open the device or unit  Opening or removing covers can expose you to  dangerous high voltage points or other risks  ONLY qualified service personnel should  service or disassemble this device  Please contact your vendor for further information     ONLY qualified service personnel shou
150. annot find the  physical location of the share     Disabled Share  Indicates the share is no longer functional  If this happens  talk to your  network administrator     The following table describes the labels in this screen   Table 93 Applications  gt  Copy Button  gt  Edit    LABEL DESCRIPTION  Status This column displays whether the share is Available  Unavailable or  Disabled     Share Type This displays whether the share is created by the system or by the  administrator     This displays the name of the share on the NSA        Share Path This displays the location of the shared folder on the NSA  Forward  slashes are used as path  folder tree branch  separators  Share paths that  no longer exist are shown in red    This displays the name of the user account that owns the share    Permission Type This displays the type of permissions assigned to the share  Options are  public  private  and advanced    Apply Select a share  then click this to make it the default location where data is  stored when you press the copy button     Click this to discard any changes and start again        228 NSA 2401 User s Guide       Maintenance Screens    11 1 Overview    This chapter introduces the NSA Maintenance screens     11 1 1 What You Can Do In The Maintenance Screens    e View the NSA system logs  See Section 11 2 on page 230 for details   e Manage the NSA configuration file  See Section 11 3 on page 237 for details     e Configure HTTPS and the NSA   s SSL certificate  See Section 
151. apter 8 Sharing Screens    Table 49 Sharing  gt  Users Icons  continued   ICON DESCRIPTION    Edit User   Select a user account from the list  then click this icon to edit their account  name  group membership  password  and volume quota  See Section  8 2 1 on page 178 for details     Delete Selected Users  Select a user account from the list  then click this icon to remove it     User Info    Select a user account from the list  then click this icon to view their quota  and group information  See Section 8 2 2 on page 181 for details     Sort    Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order     Local User  Indicates a local user account     Domain User  Indicates a domain user account        Administrator  Indicates an administrator account     Conflict Local User    Indicates a local user account in conflict  See Section 8 2 0 1 on page 177  for more information     Conflict Domain User    Indicates a domain user account in conflict  See Section 8 2 0 1 on page  177 for more information        The following table describes the labels in this screen   Table 50 Sharing  gt  Users    LABEL DESCRIPTION  Display Number Set the number of user accounts displayed per page   Go to Page Select a page number of user accounts to display     Type This field displays when you click the Search icon  Use it to filter search  results according to the user account type selected    Keyword s  This
152. ard    Certificate Store  Certificate stores are system areas where certificates are kept     Windows can automatically select a certificate store  or you can specify a location for     2  Automatically select the certificate store based on the type of certificate         Place all certificates in the following store          7 Otherwise  select Place all certificates in the following store and then click Browse        Figure 255 Internet Explorer 7  Certificate Import Wizard         Place all certificates in the following store  Certificate store     8 In the Select Certificate Store dialog box  choose a location in which to save the  certificate and then click OK                             Figure 256 Internet Explorer 7  Select Certificate Store    Select Certificate Store    Select the certificate store you want to use                                FEET Y    2 6  a Trusted Root Certification Authorities     Enterprise Trust   1 29  Intermediate Certification Authorities    5 Active Directory User Object  A Trusted Bi thlichere                E Show physical stores          NSA 2401 User   s Guide    Appendix C Importing Certificates    9 In the Completing the Certificate Import Wizard screen  click Finish   Figure 257 Internet Explorer 7  Certificate Import Wizard  Certificate Import Wizard    Completing the Certificate Import  Wizard    You have successfully completed the Certificate Import  wizard     You have specified the following settings   Certificate Store Select
153. are Permission  Access each volume   s snapshots in a share in  the volume  Users with read access to the share can also read or copy the  files in the snapshots  Each share will have a folder named snap share for  users to access the share   s snapshots     Edit Job  Select a snapshot job and click this icon to modify it   s settings     Take Snapshot Now    Select a snapshot job and click this icon to have the NSA perform the  snapshot right away  instead of waiting for the scheduled time      The job is running now     Delete Selected Job s   Select a snapshot job s  and click this icon to remove the job s      The job is running now     Sort    Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order        NSA 2401 User   s Guide 21 F      Chapter 9 Protect Screens    The following table describes the labels in this screen   Table 84 Protect  gt  Snapshot  gt  Snapshot Jobs  LABEL DESCRIPTION    Status This field shows whether the snapshot job is currently running or waiting  to run  The percent complete also displays for a currently running job     Job Name This is the name of the snapshot job     Volume Name This field identifies the volume upon which this job takes snapshots  A    snapshot must be done on a complete volume  and not a single file or  folder     Snapshot Number This field displays how many snapshots this job has taken so far     Period This field displays the snapshot 
154. ars asking you to confirm the action   Click Apply to continue or Cancel to abort the process        Figure 208 Maintenance  gt  Shutdown  gt  Confirm Restart    Restart system now     The following users are currently connected  If you decide to continue  they may  be disconnected     Bob    Web 192 166 1 355  Web admin 192 168 1 33       Performing this operation vill cause some network services to  temporarily disconnect        When you click the Shutdown button a pop up screen appears asking you to confirm  Click  Apply to continue or Cancel to abort the process     Figure 209 Maintenance  gt  Shutdown  gt  Confirm Shutdown    Shutdown system now           NSA 2401 User   s Guide    PART III    Troubleshooting  and Specifications    eshooting  249   ications  257        247       Troubleshooting    12 1 Troubleshooting Overview    This chapter offers some suggestions to solve problems you might encounter  The potential  problems are divided into the following categories     e Power  Hardware Connections  and LEDs  e NSA Login and Access   e Users Cannot Access the NSA   e Backups and Snapshots   e External USB Disks    12 2 Power  Hardware Connections  and LEDs         pa The NSA PWR LED does not turn on  no LEDs are on            e Make sure the NSA is turned on    Make sure you are using the power adaptor or cord included with the NSA    e Make sure the power adaptor or cord is connected to the NSA and plugged in to an  appropriate power source  Make sure the power sour
155. asetalicdeaneneneeddsmeraiaedsisiaieeicianadieas 96  Figure 87 Protect  gt  Backup  gt  Add Job  Step  1 assessed tcctkscemtetneedi cco uatednducuantcetacotimeeeedescomseniensens 97  FP  gt  Backup  gt  AdO JOD  SED    Jarre nekte 98  Figure 89 Protect  gt  Backup  gt  Add Job  Step 3 Leer 99  Fig  re 90 Froleci  gt  Backup   AGG JOD  SE ER 99  Bo eee Sey Mig OIE EE ER TE EE EN EEE 100  Figure 92 Protect  gt  Backup  gt  Restore Archive  Step 1      mmmrrnnnnnnnvvnrnnnnnnrvvnnnnnnnnvnnvrnnnnnsnnnvnnnnnnrennnnnnnnee 100  Figure 93 Protect  gt  Backup  gt  Restore Archive  Step 2 Lusneneismsenleiaejemejeaseelabisemekeidesndnebeee 101  Figure 94 Protect  gt  Backup  gt  Restore Archive  Step 3             ccccccssssseeeeeceeeseeeeeceeeeseeeeessaeeseeeeessesseeees 101  Figure 95 Protect  gt  Backup  gt  Restore Archive  Progress              cccsssecesssecescseeecceseeseeeeeesoueeeseueeessaneess 102  Foue PORN FN 1 arsina arad rennit ara irar a T aniria r eian aran iiaiai 102  Figure 97 Fiotect SN arr 103  gre Rye ee EEE 103  Figure 99 Froteci  gt  Restore  TL Veret Seen 104  Foue TOU Fer NN aa E E A 104  Figure 101 Printer Connected to NSA  Windows Explorer           cccccseccccceeseeeeceeeeeeceeeseeeeaeeeeessaaeeeeeaaees 105  Figure 102 Printer Connected to NSA  Windows Explorer Warning             ccccsseeeceeeeeeeeecaeeeeeeeaeeeeeesaees 105  Fioure 103 Frinter Lriver Needed erre   tkere 105  Figure 104 Applications  gt  Print Server  eccaicscesseccnctietvcsvncssxseneeicstasna
156. at the work was made with  c  Accompany the work with a written offer  valid for at  least three years  to give the same user the materials specified in Subsection 6a  above  for a  charge no more than the cost of performing this distribution  d  If distribution of the work is  made by offering access to copy from a designated place  offer equivalent access to copy the  above specified materials from the same place  e  Verify that the user has already received a  copy of these materials or that you have already sent this user a copy  For an executable  the    330 NSA 2401 User s Guide    Appendix D Open Source Licences    required form of the    work that uses the Library    must include any data and utility programs  needed for reproducing the executable from it  However  as a special exception  the materials  to be distributed need not include anything that is normally distributed  in either source or  binary form  with the major components  compiler  kernel  and so on  of the operating system  on which the executable runs  unless that component itself accompanies the executable     It may happen that this requirement contradicts the license restrictions of other proprietary  libraries that do not normally accompany the operating system  Such a contradiction means  you cannot use both them and the Library together in an executable that you distribute     7  You may place library facilities that are a work based on the Library side by side in a single  library together with 
157. ate errors    View certificates          NSA 2401 User   s Guide    Appendix C Importing Certificates    4 In the Certificate dialog box  click Install Certificate     Figure 252 Internet Explorer 7  Certificate    Certificate          General   Details    Certification Path        Certificate Information    This CA Root certificate is not trusted  To enable trust   install this certificate in the Trusted Root Certification  Authorities store     Issued to  nsaz401  Issued by  nsa2401    Valid from 5 20 2008 to 5 20 2011    R nstall pkt           5 In the Certificate Import Wizard  click Next     Figure 253 Internet Explorer 7  Certificate Import Wizard    Certificate Import Wizard    Welcome to the Certificate Import  Wizard    This wizard helps you copy certificates  certificate trust  lists  and certificate revocation lists from your disk to a  certificate store     A certificate  which is issued by a certification authority  is  a confirmation of your identity and contains information  used to protect data or to establish secure network  connections     certificate store is the system area where  certificates are kept     To continue  cick Next                                   NSA 2401 User   s Guide    Appendix C Importing Certificates    6 If you want Internet Explorer to Automatically select certificate store based on the  type of certificate  click Next again and then go to step 9     Figure 254 Internet Explorer 7  Certificate Import Wizard    Certificate Import Wiz
158. ath Internal    COPY BTN   NOTICE    Path    COPY BTN   NOTICE Copying content of  0  to  1   USB   Internal   USB      Done Path Internal    Path  FTP INFO USER  0    1   login FTP User Name  SUCCESS    ETP nS  FTP MD  FTP NONGE  FTP ue    LOG INFO Clean system log complete  LOG INFO Change DB path to  O  log OK  LOG INFO Reset DB to System Default OK    NOTICE Network Config setting is  changed    NOTICE    Network    Network Network interface  0  link up Network    interface    name          NOTICE Delete group  0   Group Name a       FTP NOTICE FTP service starts with TLS  mode    Number of   Number   files of bytes   removed in   removed   recycle bin   in  recycle  bin    NOTICE  Add new user  br A  tom 2   UserName  UserName  P     NOTICE Delete new user  0  by  1  from   User Name User Name   2      NOTICE User  0  password has been User Name User Name  changed by  1  from  2      NSA 2401 User   s Guide    Appendix A Log Messages    Table 114 Log Messages    FEATURE SEVERITY  MESSAGE   ARGUMENT S    Netware  NOTE  Netware Vind      I      NFS mo  EnbioNFS success       es     fom feens   1  s pe paes O O    CRT Disable Disable NFS  FAILED FAILED    Ge Sp      1   2   to be gr EE Filter a  rw  ro  CRIT ee 10    1   2   to NFS  Path IP Filter Permission   rw  ro  INFO Remove All data in NFS Share   NFS Share   0   SUCCESS Name  CRIT Remove All data in NFS Share   NFS Share   0   FAILED Name  RESET BTN   NOTICE RESET BUTTON  Reset admin  password  amp  ip setting  RESET
159. aw  that is to say   a work containing the Program or a portion of it  either verbatim or with modifications and or  translated into another language   Hereinafter  translation is included without limitation in the  term    modification      Each licensee is addressed as    you     Activities other than copying   distribution and modification are not covered by this License  they are outside its scope  The  act of running the Program is not restricted  and the output from the Program is covered only if  its contents constitute a work based on the Program  independent of having been made by  running the Program   Whether that is true depends on what the Program does     1  You may copy and distribute verbatim copies of the Program s source code as you receive It   in any medium  provided that you conspicuously and appropriately publish on each copy an  appropriate copyright notice and disclaimer of warranty  keep intact all the notices that refer to  this License and to the absence of any warranty  and give any other recipients of the Program a  copy of this License along with the Program  You may charge a fee for the physical act of  transferring a copy  and you may at your option offer warranty protection in exchange for a  fee     2  You may modify your copy or copies of the Program or any portion of it  thus forming a  work based on the Program  and copy and distribute such modifications or work under the  terms of Section 1 above  provided that you also meet all of these 
160. b Folder or FTP site     cane      NSA 2401 User s Guide 61       Chapter 3 Tutorials    3 Enter Gonzo   s username and password and click OK     Figure 29 Entering the Share Username and Password    Enter Network Password 3  x     Incorect password or unknown Username for     14192  168 1 354Gonzo  Cancel  Connect As   Gonzo Eel    Password  ie    4 Now Gonzo can use the share like a drive on his computer  Click File  gt  New  gt  Folder  and create a folder named    Strategy           Figure 30 Creating a Folder      Gonzo on  197 168 1 35   H       File Edit view Favorites Tools Help   9  gt   Alan glu xala      Address    Hil   Go  5     Er 16 2008 9 37 AM    9 16 2008 9 37 AM  Gonzo on     192 168 1 35   HJ       5 Copy and paste the 2009 Plan doc file into the Strategy folder     Figure 31 Using the Folder    Favorites Tools Help       3 3 2 Using a Share with a Web Browser    Now Gonzo wants to use his web browser to add the 2010 2014 Plans doc file to his Strategy  folder     62 NSA 2401 User s Guide    Chapter 3 Tutorials    1 Open Firefox and enter http   192 168 1 35 to open the login screen  Enter Gonzo   s  username and password and clicks Login     Figure 32 User Login    2 ZyXEL NSA 2401   Mozilla Firefox  File Edit View History Bookmarks Tools Help       http  ff192 168 1 35 loginwrap  html 7 VW  Wikipedia tEnalist JE j    Welcome to NS4 2401  Enter Username password and click to login     Siysername  Gonzo   Password meets       a masimum of 14 alphanumeric  
161. ble describes the labels in this screen   Table 57 Sharing  gt  Shares    LABEL DESCRIPTION   Status This icon displays whether the share is available  unavailable or disabled   The default and snapshot shares cannot be deleted    Share Type This displays whether the share is created by the system or by an  administrator account     This displays the name of the shared folder on the NSA   This displays the name of the user account that owns the share     Permission Type This displays the type of permissions assigned to the share  Options are  public  private  and advanced     The key icon indicates that a share has an Access Control List        NSA 2401 User   s Guide    Chapter 8 Sharing Screens    Table 57 Sharing  gt  Shares  continued   DESCRIPTION    Display Number Set the number of shares displayed per page        Previous  amp  Next Click Previous to cycle back through the pages of shares  and Next to  cycle forward through them     8 4 1 Create a New Share  amp  Edit a Share    To create a local group  click Sharing  gt  Shares  gt  Add Share   To edit an existing local group  click Sharing  gt  Shares  gt  Edit Share     The share creation and share editing screens are identical in appearance        Figure 159 Sharing  gt  Shares  gt  Create a New Share       Share Name   j  Volume  volume   111 76 GE   a    Make This Share Gam H  Owned By admin   Enable This Share   Enable Action Log       Enable Recycle  Bin kd    Share Access  Keep It private to owner w    The fol
162. bniiarceoeesversiintiorsi rasi AL rinira anidan 106  Figure 105 Printer Screen in Windows Explorer vase 106  Figure 106 Connecino a USB RS ER nite 107  Figure 107 Storage  gt  External Storage  gt  Disk uoeseesekvenesepeeenekeGeddineamedamane 107  Figure 108 Storage  gt  Internal Storage  gt  DISK           lt c cccccseeseccecceccsasescccecsnsenceseesneesaeeeeascesaseneaseneasenneners 108  Figure 109 Storage  gt  Internal Storage  gt  RAID cscs ade cecetedssenesieiecenseshigeacsdccpbeiasecscielaseaseticessesieniaioreecie 108  Figure 110 Storage  gt  Internal Storage  gt  RAID  gt  Add Disk      uunnnnnnnnnrrvvnnnnnnnrvevvrnnnnrrrrennnnnnnrrrennnnnsrneren 109  Figure 111 Silorag    gt  Internal Storage S DISK EE EE EE 109  Figure 112 Storage  gt  Internal Storage  gt  Volume       rnnnnnnnnnnnnnnnnnnnrnnnnnnnnnnnnnnnnnrrnnrnnnnnnnsrnnnnnnnnneennnnnnnssenee 110  Figure 113 Storage  gt  Internal Storage  gt  Volume  gt  Edit       rrrrrnnnnnvrrnnnnrvvrnnnnrrvnnnnnrnnrnnnnrrnrransrenrnnsnrrnnnnn 110  Fi    re 114 St  rage   Internal Storage  gt  DISK RR ER iaai 111  Figure 115 Storage  gt  Internal Storage  gt  Disk  gt  Eject sccccicicencrecassuncececwiencndeseiadiorcacaceacedaceienciwareeseeenads 111  Figure 116 Storage  gt  Internal Storage  gt  Disk  gt  Eject        rrrnrrnnrvvnrnnnnnnrvvvrnnnnnnrennvnnnnnervennnnnnnnnrrnvnnnnnsnenn 111  PIS TT omus  RAD DN ee 112  Figure 118 Storage  gt  Internal Storage  gt  RAID      rrrannnnnrnnrrnnnnnnvvnnrrnnnnnsrnnrrnnnnnsrnnnnnnnnnss
163. button to proceed     9 2 2 2 Creating a Backup Job  Step 3       Figure 169 Protect  gt  Backup  gt  Add Job  Step 3  Add a new backup Job    Step 3        Compression     ves      No      Encryption     Yes    ng       Purge Policy    o Keep All Old Backup files  C keep Only the last   backup files 1 30     C keep Backups For   daylsif1 3650        The following table describes the labels in this screen   Table 72 Protect  gt  Backup  gt  Add Job  Step 3    LABEL DESCRIPTION    Compression Compression reduces the size of the file that you want to back up  although it also consumes more of the NSA   s CPU   s computing power   With compression enabled  the transfer of the backup file is faster   However restoring may be slower  If backup space is not a concern and  recovery speed is  then turn off compression  If the backup target is at a  remote site to which the NSA connects through a low bandwidth  connection  turn on compression     Encryption For synchronization backups  enable encryption to use encryption while  transferring the file  However the final file stored on the remote NSA is  unencrypted    For archive backups  use encryption to create password encrypted  backup files    Bandwidth Restrict the bandwidth of synchronization backups to help stop them from  using all of your network connection   s available bandwidth  This is more  important when backing up to a remote NSA or computer through the  Internet     206 NSA 2401 User s Guide          Chapter 9 Protect 
164. c ness nse pce ne cae se ao E ae tee cee 39  Fe EEE ee EE EEE NE 40  Figure 10 My NSA Share Browsing  gt  Move to  or Copy tO         rrrrrrrrrnnnrerrnnnnnnnrrnnnnrnnnnnnnnnrnnnnnrnnnnnsnsennnnn 42  Figure 11 My NSA Share NN cndartaceswncnicicnrranrsceraraciseess neeriicemneemnedsanereneesmne 42  Figure 12 My NSA Change Share Properties             cccccccccsseccceceeeeeceeeceeseaeeeeseusecessuaeeeeseueeeesaaaeeessaases 43  Figure 13 My NSA Change Share Properties  gt  Share Access Configuration                  cseeeeeeeeeeeeeeeeees 45  JE EE REE EE EE 46  FN re 48  Figure TS en JE REE EE ER 49  Figure 17 NNN MENNEG eee 53  FEE eee a 56  EEE PE EE EE 56  ge EE EE im a S 57  Figure 21 Sharing  gt  Users  gt  Create a New Account       rrnnrrnnnnennnnnnnnnrrnnnnrnnnnnnrennnnnnrennnnnnrrnnnnenennnnnsennnnn 57  FU 58  ge  gt  Groups PO SAIS EE SE isian 59  SEE 0 EEE pce E NE 59  Figure 29 Sharing ee RE EE rs 60  ete see EEE 60  Figure 27 Sharing  gt  Shares  gt  ACG SAIS x icsnsasciiricecanineveshtasunaunrcineinbnescnnevcrsaniateneiadidetinbreisneersuaoeeeins 61  gs EEE EE ET ue eee meee cee en i oe 61  Figure 29 Entering the Share Username and Password             ccccceeececcceeeeeeeeeeeeeeeseeeeeeseeeeeeseeeeessaaeeees 62  Ut NFU en 62  PT NTN re DGEN APT 62  ON NN 63  Figure 33 Gonzo s LIF NSA ee REE RE 63  Foure TINN 64  UG do orate Folder Sei ainena E EEA EENE AAEN EAN TENE Aa ENEE EE 65  Figure do Upioad Fics SOTO eee a aiir S 65  Figure 37 Opening the Finder Laste ke ker
165. cally locks an encrypted volume if the NSA restarts or  loses power or the disk is removed  An administrator can also manually  lock the volume  Once a volume is locked  no one can use it again until an  administrator unlocks it   Encryption affects the NSA   s write speeds   password  Select this option to manually enter a password for the  volume  You can also enter a password prompt hint to help you remember  the password if you forget it  You will need to manually re enter the key  every time the NSA restarts   USB key  Select this option to have the NSA create a password for the  volume and store the password on a connected USB device  Later  if the  volume is locked  the NSA automatically unlocks it when you insert the  USB key   At start up  if a USB key is inserted  the NSA automatically unlocks any  volumes encrypted by it     Password The password fields display if you choose to encrypt the volume by  manually entering a password  Enter a password for encrypting the  volume    Password  Confirm  Re type the password to make sure you entered it correctly    Password Prompt Enter a hint to help you recall the password if you forget it     USB Key The USB field and button display if you choose to encrypt the volume by  USB key  Select a USB key device that you created previously or select a  USB device that you want to make into a USB key   If the USB device is not already connected  connect it and click the  Refresh icon     The NSA   s upper USB port is USB1 and its 
166. cceptance of  this License to do so  and all its terms and conditions for copying  distributing or modifying  the Library or works based on it     10  Each time you redistribute the Library  or any work based on the Library   the recipient  automatically receives a license from the original licensor to copy  distribute  link with or  modify the Library subject to these terms and conditions  You may not impose any further  restrictions on the recipients    exercise of the rights granted herein  You are not responsible for  enforcing compliance by third parties with this License     11  If  as a consequence of a court judgment or allegation of patent infringement or for any  other reason  not limited to patent issues   conditions are imposed on you  whether by court  order  agreement or otherwise  that contradict the conditions of this License  they do not  excuse you from the conditions of this License  If you cannot distribute so as to satisfy  simultaneously your obligations under this License and any other pertinent obligations  then as  a consequence you may not distribute the Library at all  For example  if a patent license would  not permit royalty free redistribution of the Library by all those who receive copies directly or  indirectly through you  then the only way you could satisfy both it and this License would be  to    refrain entirely from distribution of the Library  If any portion of this section is held invalid or  unenforceable under any particular circumstan
167. ccess speed to shares until resynchronization finishes     Add Disk  To add another disk to an existing JBOD  RAID1  or RAID5 array  select  the array and click this icon  You can add a disk to increase an array s    capacity or to use as a hot spare  standby   When you add a disk to an  existing array  you do not have to re create shares  access rights and so  on as you would if you created a new array     Add Disk    Disk Name  disk   E     please choose the function      RAIDS Reshape  C add Hot Spare    Reshape  Make a three disk RAID5 array into a four disk RAID5 array   Expand JBOD  Add another disk to a JBOD array    Add Hot Spare  Add a standby disk  For a RAID1 or RAID5 array  the  capacity of the disk you are adding must be equal to or greater than the  smallest disk in the array     Remove Hot Spare   To remove the standby drive from a RAID1 or RAID5 array  select the  array and click this icon  After you do this  you can create a single disk  JBOD array for the disk     Remove Hot Spare       Chapter 6 Storage Screens    Table 25 Storage  gt  Internal Storage  gt  RAID Icons  continued   ICON DESCRIPTION    Sort    Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order     Status   This icon shows Healthy  Resynching  Degraded or Down  see Section  6 4 2 on page 134  If an array is degraded  click the Repair icon after you  have replaced the faulty disk        The following tab
168. ccounts  the next thing you    ll want to do is organize the user accounts into  groups  This example creates a senior management group with vice president Gonzo as a  member  You can add other members later     1 Click Sharing  gt  Groups  gt  Add Group     Figure 22 Groups    ss Sharing   Groups    Status    Fn  HE    Search Update Edit Group Delete    Date Time Domain Selected Display Number  20 W  Groups   Group s  Go to Page  1 B  Internal Storage  External Storage Page 1 Of 1    aig kel        i MP    TCP IP   i E     nr ae  Windows CIFS   ocal Management  HFS       Page 1 Of 1  Users  Groups  ohares          58  NSA 2401 User s Guide    Chapter 3 Tutorials    2 Specify a name for the group  Select Gonzo and click Add Selected User s  to include  Gonzo in the group  Click Apply     Figure 23 Sharing  gt  Groups  gt  Add Share    Add a New Local Group    Group Name  Senior H anagement  Description      Available User s  Group Membership    Gonzo       Group Membership       3 2 3 Setting Up Shares    You   ve created accounts for Gonzo and Kermit and now you want to create a share for each of  them  You also have a senior management group  You want to allow the users in the senior  management group to access both shares while Kermit can access his own share     1 Click Sharing  gt  Shares  gt  Add Share     Figure 24 Shares    se Sharing   Shares      Shares    Status  a our g Es af    Add Share JRecycle Edit Share ACL Delete Share  Date Time Bi Properties Share Browser 
169. ccsccsitcsdescinmnianiereectiasrcblecdnvcreneiesiosnernese 91  3 7 4 Creating a Synchronization Backup       1   lt ccccccseseccccecssssseeceessseseseecesnenssasecrecteueseerecteness 92  3 7 5 Creating an Archive BackUp acs innnan a aii aa 96  3 7 6 Restoring Archived Files by Backup JOb cccicccsicevesceraidsrasessesrdinvervacnsiasesseieiasierseiavecrenes 99  sda Pesona DW COG FoS seende Sabani 102   FIN ewer TUOTE eaa EEEE wet eee es eee 104   3 9 How to Increase the NSA s Storage Capacity      rrnrvnnnnnvnnnnnnrrnvnnnnevevnnnnenvnnnnnevennnnnernnnnnnenennn 106  3 9 1 Connecting External USB Hard Drives       rrrrannrnerrnrrnnnnnennnrnnnnnnnennnnnnnnnrnnnrnnnnnsrennnnnnn 107  3 9 2 Adding an Internal Hard Drive to an Existing Disk Array         rrrrrnrrrrnrnnnrrrnnnnnnenvnnnnnenn 107  3 9 3 Using a Disk Array   s Increased Capacity         rrrrrnrnnrrnnnnnnovnrnnnnnnnnnnrrnnnnnrnnnrrnnnnnnennnnnnn 109  3 9 4 Migrating a RAID to Higher Capacity Hard Drives        rrrrrnnnrrnrnnnnnrnrnnnnvnnnnnnrennnnnnrennnnn 110   PET  Web GONTQUIALON Lauvavaramesmmsmmsemsmsmmesmmmarmmm 115    NSA 2401 User s Guide    Table of Contents    Chapter 4  ET EE ENE EE 117  TV NN 117  Chapter 5  SET EE 121  TRE E 121  ETE EEE NE diaeresis 122  Chapter 6  e ole ET REE EE A eine E E A 125  Me bee GE EE EE ER ER 125  6 1 1 What You Can Do in the Storage Screens     rwurrrnnnnnavvrvnnnnnnnvvnnnnnnnnnnvennnnnnenrennnnennennee 125  6 1 2 What You Need to Know About Storage       rrrrrrnnrrrrrnnnnrrnnnnnn
170. ce  the balance of the section is intended to  apply  and the section as a whole is intended to apply in other circumstances  It is not the  purpose of this section to induce you to infringe any patents or other property right claims or to    NSA 2401 User   s Guide    Appendix D Open Source Licences    contest validity of any such claims  this section has the sole purpose of protecting the integrity  of the free software distribution system which is implemented by public license practices   Many people have made generous contributions to the wide range of software distributed  through that system in reliance on consistent application of that system  it is up to the author   donor to decide if he or she is willing to distribute software through any other system and a  licensee cannot impose that choice  This section is intended to make thoroughly clear what is  believed to be a consequence of the rest of this License     12  If the distribution and or use of the Library is restricted in certain countries either by  patents or by copyrighted interfaces  the original copyright holder who places the Library  under this License may add an explicit geographical distribution limitation excluding those  countries  so that distribution is permitted only in or among countries not thus excluded  In  such case  this License incorporates the limitation as if written in the body of this License     13  The Free Software Foundation may publish revised and or new versions of the Lesser  Gen
171. ce is turned on    e Turn the NSA off and on    e Disconnect the power cord for at least 10 seconds  Reconnect it and turn the NSA back on    e If the problem continues  contact the vendor        pa The NSA SYS LED is  quickly  flashing red        If the SYS LED is quickly flashing red then a RAID array is degraded  Degraded means one of  the disks in a RAID array is down but the array can still be used  if you   re using RAID I or  RAID 5   Go to the Storage  gt  Internal Storage  gt  Disk screen to identify the faulty disk   Replace the faulty disk with another of equal or greater capacity  See your Quick Start Guide  for information on replacing a disk and also Disk Replacement Restrictions on page 128     NSA 2401 User   s Guide 249    Chapter 12 Troubleshooting    After replacing the disk  go to the Storage  gt  Internal Storage  gt  RAID screen  If the array   s  status is not Resynching  select the array and click the Repair icon        The NSA SYS LED is orange or is flashing orange        e If the SYS LED is steady on orange  then the NSA is unlocking an encrypted volume or  there are no volumes in the NSA  If there are no volumes on the NSA  you cannot create  shares on the NSA  You must first create a RAID and volume  you must already have an  internal disk installed   See also Chapter 6 on page 125    e If the SYS LED is flashing orange  then firmware is being upgraded to the NSA  Wait  until the firmware upgrade is complete and the SYS LED turns steady green     
172. cessfully completed the Certificate Import  wizard     You have specified the following settings   Certificate Store Selected Automatically determined by i  Content Certificate                                 fn        8 If you are presented with another Security Warning  click Yes     Figure 52 Security Warning  security Warning    You are about to install a certificate from a certification authority  CA  daiming to represent   nsa 401    Windows cannot validate that the certificate is actually from   nsa2401   You should confirm its origin by contacting   nsa2401   The following number will assist you in this process     Thumbprint  sha 1   350 109AC DBCOES54 FE327C71 46401546 24255893   Warning    If you install this root certificate  Windows will automatically trust any certificate issued by this CA  Installing a  certificate with an unconfirmed thumbprint is a security risk  If you dick  Yes  you acknowledge this risk     Do you want to install this certificate           9 Finally  click OK when presented with the successful certificate installation message   Figure 53 Certificate Import Wizard  Successful    Certificate Import Wizard    x 1     The import was successful           74 NSA 2401 User s Guide    Chapter 3 Tutorials    3 5 1 3 Turn on the NSA   s Web Security    Now that you have customized the NSA   s certificate and installed it in your computer  you can  turn on security for your Web Configurator sessions  This example uses Firefox 3 0  See  Appendix C on 
173. ch filters which you can use to search for  specific text and or criteria in the log collection  See Section 11 2 1 on  page 232 for more information     Purge All Logs  Click this icon to erase all logs from the NSA     Eg       A Purge All Logs           re you sure you want to purge all log messages     Click Yes to remove all logs or No to cancel           NSA 2401 User   s Guide    Chapter 11 Maintenance Screens    Table 94 Maintenance  gt  Log Icons  continued   ICON DESCRIPTION    Log Config   0 Click this icon to open Log Configuration screen  See Section 11 2 2 on  page 232 for more information   Report Config   D   Click this icon to open the Log Report Configuration screen  where you  can set up how logs are handled  See Section 11 2 4 on page 233 for  details     Export Log       The following table describes the labels in this screen   Figure 191 Maintenance  gt  Log  LABEL DESCRIPTION      This is the log entry   s number in the list according to the currently selected sort  order    Time This shows the date and time the log was created  Click the top of the column to  sort by oldest or newest     This displays the log category     Severity This displays how serious the log is rated by the NSA  The severity ratings are   Emergency  Alert  Critical  Error  Warning  Notice  and Info     Message This displays a description of the log  Click the top of the column to sort by  alphabetical or reverse alphabetical order    Display Number   Set the number of logs displa
174. character  display in Windows Explorer      Apply Click this to save your changes   Click this to discard any changes and start again        NSA 2401 User   s Guide       Chapter 10 Application Screens    10 3 Print Server    Click Applications  gt  Print Server to open this screen  Use this screen to view and manage  the NSA   s list of printers and print jobs     Figure 186 Applications  gt  Print Server    E Rename Ek Cancel Job fil  Delete    on line       The following table describes the labels in this screen   Table 89 Applications  gt  Print Server  LABEL DESCRIPTION    Click this to update the list of printers and print jobs     Status This fields shows whether the printer is connected and turned on  on line   or not  off line     Name This identifies the printer  Each printer connected to the NSA must use a  unique name     Actions Rename  Click this to change the name the NSA uses for the printer   Cancel Job  Click this to remove all print jobs from the NSA queue for a particular printer   However  since the NSA sends print jobs to the printer as soon as it can  this  button may only have an effect if there are very large or many print jobs in  the queue  To stop a print job that has already started  you may have to turn  off the printer   Delete  Click this to remove a printer from the NSA   s printer list  To add the printer  back into the list  disconnect the printer from the NSA   s USB port and  reconnect it  If that does not work  disconnect the USB port and
175. ck Connect     Figure 63 FileZilla Site Manager       Site Manager    Select Entry       My Sites   S     E New site Host   192 168 1 35   Port   21                    General    Advanced   Transfer settings   Charset l    Servertype   FTPES   FTP over explicit TLS SSL we    Logontype    Normal we      User  Gonzo      Password     Account  EET  Comments        82 NSA 2401 User s Guide    Chapter 3 Tutorials    2 A security warning screen displays  The SHA1 fingerprint must match the NSA   s  certificate you downloaded from the NSA to your computer   Double click the NSA   s  certificate file and then click Details and look at the Thumbprint   If they match  click  OK     Figure 64 FileZilla Unknown Certificate Warning          Unknown certificate       The server s certificate is unknown  Please carefully examine the certificate to    1   make sure the server can be trusted     Details   Host  192 168  1 35 21   valid From  9112 2008   valid to  al12 2011   Serial number  O0 8F 2d 37  2c 36  19 67 37   Public key algorithm  RSA with 1024 bits   Fingerprint  MDS    14 bo 16 d9 61 0d 00 12 a9 66 4a  SF abi8c c4 50   Fingerprint  SHA 1 1  62 77 6f 09 cf 140112 94 84 38 167 193  d5  d    Sbice  82 46 60 83    Subject of certificate Certificate issuer  Common name  NS49863 Common name  NS49863  Organization  ZyXEL Organization  ZyXEL    Session details  Cipher  AE5 128 CB6C  MAC  SHAI    Trust this certificate and carry on connecting     The shares and folders to which Gonzo has 
176. colons      semi colons      angle brackets   lt   gt    the plus sign      semi colons      commas       question marks      asterisks      and the equals sign         All leading and trailing spaces are removed automatically   Multiple spaces within names are converted to a single space   Share names must be unique  they cannot be the same as other share names      Share names cannot use names reserved for    automatic shares    of external USB disk  volumes be unique  for example     USB 0 9  1 2      that is  a share named    USB     followed by a one or two digit number      2 5 4 1 Share Access Configuration    This screen allows you to assign permissions to a share     NSA 2401 User   s Guide    Chapter 2 Introducing the Web Configurator    Figure 13 My NSA Change Share Properties  gt  Share Access Configuration    Share Access Configuration    Available User sj Group s      lt LOCALUSERS gt   lt LOCALUSERS gt   anonymous ttp  lt DOMAINUSERS gt   admin  lt LOCALGROUPS gt    lt DOMAINUSERS gt  aes everone   lt LOCALGROUPS gt   lt DOMAINGROUPS gt    lt DOMAINGROUPS gt  miin    Read Only     lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt      lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt        Note     Tou may select multiple users groups by using Ctrl   Click        The following table describes the labels in this screen   Table 11 My NSA Change Share Properties  gt  Share Access Configuration    DESCR
177. conditions     a  You must cause the modified files to carry prominent notices stating that you changed the  files and the date of any change     b  You must cause any work that you distribute or publish  that in whole or in part contains or  is derived from the Program or any part thereof  to be licensed as a whole at no charge to all  third parties under the terms of this License     c  If the modified program normally reads commands interactively when run  you must cause  it  when started running for such interactive use in the most ordinary way  to print or display  an announcement including an appropriate copyright notice and a notice that there is no  warranty  or else  saying that you provide a warranty  and that users may redistribute the  program under these conditions  and telling the user how to view a copy of this License    Exception  if the Program itself is interactive but does not normally print such an  announcement  your work based on the Program is not required to print an announcement      These requirements apply to the modified work as a whole  If identifiable sections of that work  are not derived from the Program  and can be reasonably considered independent and separate  works in themselves  then this License  and its terms  do not apply to those sections when you  distribute them as separate works  But when you distribute the same sections as part of a whole  which is a work based on the Program  the distribution of the whole must be on the terms of 
178. convey or otherwise transfer  pledge as security or otherwise encumber the rights and licenses  granted hereunder with respect to the Software  You may not copy  reverse engineer   decompile  reverse compile  translate  adapt  or disassemble the Software  or any part thereof   nor shall you attempt to create the source code from the object code for the Software  You may  not market  co brand  private label or otherwise permit third parties to link to the Software  or  any part thereof  You may not use the Software  or any part thereof  in the operation of a  service bureau or for the benefit of any other person or entity  You may not cause  assist or  permit any third party to do any of the foregoing     5 Confidentiality    You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you  hereby agree to maintain the confidentiality of the Software using at least as great a degree of  care as you use to maintain the confidentiality of your own most confidential information  You  agree to reasonably communicate the terms and conditions of this License Agreement to those  persons employed by you who come into contact with the Software  and to use reasonable best  efforts to ensure their compliance with such terms and conditions  including  without  limitation  not knowingly permitting such persons to use any portion of the Software for the  purpose of deriving the source code of the Software     6 No Warranty    THE SOFTWARE IS PROVIDED    AS IS     TO THE
179. corporated within the  Work constitutes direct or contributory patent infringement  then any patent licenses granted  to You under this License for that Work shall terminate as of the date such litigation is filed     4  Redistribution  You may reproduce and distribute copies of the Work or Derivative Works  hereof in any medium  with or without modifications  and in Source or Object form  provided  that You meet the following conditions      a  You must give any other recipients of the Work or Derivative Works a copy of this  License  and     b  You must cause any modified files to carry prominent notices stating that You changed the  files  and     c  You must retain  in the Source form of any Derivative Works that You distribute  all  copyright  patent  trademark  and attribution notices from the Source form of the Work   excluding those notices that do not pertain to any part of the Derivative Works  and     d  If the Work includes a    NOTICE    text file as part of its distribution  then any Derivative  Works that You distribute must include a readable copy of the attribution notices contained  within such NOTICE file  excluding those notices that do not pertain to any part of the  Derivative Works  in at least one of the following places  within a NOTICE text file    324 NSA 2401 User s Guide    Appendix D Open Source Licences    distributed as part of the Derivative Works  within the Source form or documentation  if  provided along with the Derivative Works  or  withi
180. ction covers how to create user accounts  groups  and shares     You can customize account permissions to give different users different levels of access to  individual files and folders hosted on the NSA  For example  if you intend to use the NSA  within a single department you may decide to give all the members of that department read  and write access to all the files located on it  You could also decide to give management read  and write access to some files and give other employees read only access  Using the tools built  into the ZyXEL Web Configurator  you can do just this     3 2 1 Setting Up User Accounts    As the administrator of the NSA  one of the first tasks you will want to do is set up accounts  for everyone who needs to use it  Suppose you need accounts for a vice president named  Gonzo and a manager named Kermit  Do the following to create a user account     NSA 2401 User   s Guide    Chapter 3 Tutorials    1 Log into the Web Configurator using your administrator Username and Password     Figure 18 Administrator Login    ZYXEL NSA 2401    Welcome to NSA 2401  Enter Username  password and click to login     Ousermamel   Password          a maximum of 14 alpha     CL Note     Please turn on the Javascript and ActiveX control setting on  Internet Explorer        2 Inthe My NSA screen  click Administration     Figure 19 My NSA  Language  2a    Password dministratio       My Own Shares    NEtWOTKIStOTaAgE     AJJIEinsa Shy    snapshots  EST    Other Shares    W B
181. d  or  Down        The following table describes the labels in this screen   Table 29 Storage  gt  Internal Storage  gt  Volume    LABEL DESCRIPTION  This field shows the name of the volume     Volume Type This field shows the volume is unencrypted  Normal  or encrypted   Crypto      RAID Array This field shows the RAID or JBOD array on which the volume is located    Capacity This field shows the total size of the volume  how much is currently in use   and how much is still available        NSA 2401 User   s Guide 141    Chapter 6 Storage Screens    6 6 1 Creating or Editing an Internal Volume    BES    Click Storage  gt  Internal Storage  gt  Volume  gt  Create to display the internal volume  creation screen as shown next  You can also select an existing internal volume and click the  Edit icon  Use this screen to add or edit internal storage volumes        Keep an encrypted volume   s password or USB key in a safe place  You cannot  access a locked volume without the password or USB key  All of the volume   s  data will be unusable  If you use a USB key  keep backup copies  Do not use  the USB key for anything else  do not store data on it or format it      RAID Label RAIDS  example 7    Volume Name    Size  75776 MB  1GB   1024MB   Available        151552MB   148 00 GBTotal   50  Used     Capacity    Encrypted password x  Password   i    Password      Confirm     Password Prompt         Note  size will be rounded up to the nearest 64MB boundary       The following table de
182. d only privileges  files and folders cannot be  modified  moved  or removed   Deny   Removes all privileges  files and folders cannot be read   modified  moved  or removed   You can remove users from any given authority level by selecting them  and clicking the left arrow     Apply Click this to save your changes   Click this to discard changes and close the window           NSA 2401 User   s Guide 189    Chapter 8 Sharing Screens    8 4 2 ACL Configuration    Click Sharing  gt  Shares  select a share  and click ACL Properties screen to open the Access  Control List  ACL  screen  Use this screen to display and configure ACL settings  The ACL  defines read and write permissions for specific files and folders    e If you add a new file to a folder  the new file takes on the folder   s ACL settings     e If you move a file from one folder to another  the file keeps its ACL settings  The NSA  automatically creates a new ACL for the individual file with its ACL settings     e Copying and pasting a file from one folder to another is treated the same as creating a new  file  the new file takes on the folder   s ACL settings     Figure 161 Sharing  gt  Shares  gt  ACL Configuration  ACL Configuration    a   op Tod  ip  i             New ACL Modify AZL Reset ACL    Share Name   Tom    GY  x11  Cy fFileZilla_ 3 0 9 2 win32 setup exe       The following table describes the icons in this screen   Table 60 Sharing  gt  ACL Configuration Icons    ICON DESCRIPTION    New ACL   Click this ic
183. d the following disclaimer     2  Redistributions in binary form must reproduce the above copyright notice  this list of  conditions and the following disclaimer in the documentation and or other materials provided  with the distribution     3  The name    PHP    must not be used to endorse or promote products derived from this  software without prior written permission  For written permission  please contact  group   php net     4  Products derived from this software may not be called  PHP     nor may    PHP    appear in  their name  without prior written permission from group   php net  You may indicate that your  software works in conjunction with PHP by saying    Foo for PHP    instead of calling it    PHP  Foo    or    phpfoo       340 NSA 2401 User s Guide    Appendix D Open Source Licences    5  The PHP Group may publish revised and or new versions of the license from time to time   Each version will be given a distinguishing version number  Once covered code has been  published under a particular version of the license  you may always continue to use it under the  terms of that version  You may also choose to use such covered code under the terms of any  subsequent version of the license published by the PHP Group  No one other than the PHP  Group has the right to modify the terms applicable to covered code created under this License     6  Redistributions of any form whatsoever must retain the following acknowledgment      This product includes PHP  freely available 
184. doc  Strategy          NSA 2401 User s Guide    Chapter 3 Tutorials    4 Specify where you want to put the files  Browse to     Gonzo     Click Done     Figure 99 Protect  gt  Restore  Step 4    ee  Restore    Step 4  Set a restore target and start restoring    Path for restoring    a ao      OWAE a     Please input encryption password if you have set to this backup job       esevevrvves        The NSA restores the files and you can use them again     3 8 Printer Server Tutorial    Do the following to configure the NSA to allow computers on your network to share a printer   See www zyxel com for a list of compatible printers     1 Make sure the NSA is on and the SYS light shines steadily     2 Use a USB cable to connect the printer   s USB port to one of the NSA   s USB ports   Make sure the printer is also connected to an appropriate power source     Figure 100 Printer Sharing       1104 NSA 2401 User s Guide    Chapter 3 Tutorials    3 Turn on the printer  The NSA detects it after a few moments     4 On your computer  open your CIFS file sharing program  Windows Explorer for  example  and browse to the NSA  Double click the printer   s icon     Figure 101 Printer Connected to NSA  Windows Explorer     I 197 168 1 2      File Edit wiew Favorites Tools Help    Back       ft    search L Folders iA   fr DE X   EH            Address a 192 168 1 2     comment oo     S       El  LI   P       Canon PRT 1    192 168 1 2 ad MUSIC  5 If you get a warning screen  click the option that 
185. dor    6 29 2009 Autoridad Certif      2  Autoridad Certifica    Autoridad Certificador    6 30 2009 Autoridad Certif         Baltimore EZ by DST Baltimore EZ by DST 7 4 2009 DST  Baltimore E      2  Belgacom E Trust P    Belgacom E Trust Prim    1 21 2010 Belgacom E Trus     Elcaw HET Secure    C amp W HET SecareNet    10 16 2009 CW HKT Secure     EJcaw HET Secure    C amp W HET SecureNet    10 16 2009 CW HKT Secure     Eca HKT SecureN    C amp W HKT SecureNet     10 16 2010 CW HKT Secure    s    Certificate intended purposes     lt All gt     E   Boot   Remove       4 Inthe Certificates confirmation  click Yes     Figure 266 Internet Explorer 7  Certificates    Certificates    Certificates is installed  any deleted third party root certificates will be restored automatically  but the system root    EN Deleting system root certificates might prevent some Windows components from working properly  If Update Root  certificates will not  Do you want to delete the selected certificate s         5 In the Root Certificate Store dialog box  click Yes     Figure 267 Internet Explorer 7  Root Certificate Store    Root Certificate Store       T Do you want to DELETE the following certificate from the Root Store     Subject   172 20 37 202  ZyXEL   Issuer   Self Issued   Time Validity   Wednesday  May 21  2008 through Saturday  May 21  2011  Serial Number   00846BC7 46BFYC2E CB   Thumbprint  shal    DC44635D 10FE2D0D E764A72ED 002B9AF7 677EB0E9  Thumbprint  md5    65F5E948 FOBC9598 5080
186. dows based domain controller   Select either Workgroup or Domain from the drop down list box  This  field becomes read only after the NSA joins a domain     Workgroup Name Type your workgroup name in this field if you selected Workgroup from  the field above     The following fields apply if you selected Domain     Windows Domain Select a windows domain protocol if you selected Domain above  Choose   Protocol NT4 Domain if your server uses a Windows NT operating system and  Active Directory Domain if it uses a Windows 2000 or later operating  system     Domain Name Type the domain name of the Windows server domain controller  The  name can be up to 255 characters long     The NSA s DNS server must be able to resolve this domain name     Windows Domain Administrator is the default Windows Domain Administrator   Administrator          NSA 2401 User s Guide    Chapter 7 Network Screens    Table 44 Network  gt  Windows CIFS  continued   LABEL DESCRIPTION    Type a password associated with the Windows Domain Administrator     Windows Domain  Administrator    Password       Test Connection This button appears after the NSA joins a domain  Click it to check if the  NSA can communicate with the Windows server domain controller     Leave Domain The Leave Domain button appears after the NSA joins a domain  Click  Leave Domain to display options for having the NSA exit the domain   Select Gracefully Leave Domain to have the NSA notify the Windows  server domain controller that the NSA i
187. e     previous Click this button to return to the preceding screen   next Click this button to proceed        214  NSA 2401 User   s Guide    Chapter 9 Protect Screens    9 3 3 Protect  gt  Restore  Step 4    Figure 179 Protect  gt  Restore  Step 4  ee    Restore    Step 4  Set a restore target and start restoring    Path for restoring    Please input encryption password if you have set to this backup job    Previous Done       The following table describes the labels in this screen   Table 82 Protect  gt  Restore  Step 4    LABEL DESCRIPTION  Path for restoring Type or browse for the folder to which you want to restore the backup  files  Enter the backup job   s password if it has one     previous Click this button to return to the preceding screen     Click this button to save your changes back to the NSA        9 4 Snapshots    Important Notes on Snapshots    1 Snapshots can only be taken on internal volumes    2 The NSA stores snapshots in the space on the disk array that is not used by volumes    3 Since a snapshot is a record of changes  if very large files  typically over 1GB  are  transferred onto the volume  then that    change    may be larger than the space available  for the snapshot causing it to become invalid     4 Space available for snapshots can be decreased later by increasing the size of volumes   but not increased   Volumes can only be made bigger  not smaller   So it s better to leave  enough unused space on a disk array when creating volumes     5 Ifthe
188. e  In Germany for instance  you would  enter 2 AM because Germany s time zone is one hour ahead of GMT or  UTC  GMT 1      End Date Configure the day and time when Daylight Saving Time ends if you  selected Enable Daylight Saving  The o clock field uses the 24 hour  format  Here are a couple of examples    Daylight Saving Time ends in the United States on the first Sunday of  November  Each time zone in the United States stops using Daylight  Saving Time at 2 A M  local time  So in the United States you would select  November  First  Sunday  at 2 00    Daylight Saving Time ends in the European Union on the last Sunday of  October  All of the time zones in the European Union stop using Daylight  Saving Time at the same moment  1 A M  GMT or UTC   So in the  European Union you would select October  Last  Sunday  The time you  specify depends on your time zone  In Germany for instance  you would  type 2 because Germany s time zone is one hour ahead of GMT or UTC   GMT 1      Offset Specify by how many hours to change the time for Daylight Saving Time   Apply Click this to save your changes   Click this to discard changes     5 1 1 Time Lag    Time lag occurs when the time on the NSA falls behind the time on the time server  This may  happen 1f                 NSA 2401 User s Guide    Chapter 5 System Setting Screen    e The time server is no longer reachable   e The NSA is shut down often  The NSA internal battery keeps time when the NSA is shut  down and this may cause possible
189. e  Step 3    Restore    Step 3  Set a restore target and start restoring    f Original Location    f Other Location       NSA 2401 User   s Guide    Chapter 9 Protect Screens    The following table describes the labels in this screen   Table 78 Protect  gt  Backup  gt  Restore Archive  Step 3  LABEL o DESCRIPTION    Location     this option to restore the files to the place from which they were  copied     Other Location Select this option to restore the files to somewhere other than the place  from which they were copied     Type or browse for the folder to which you want to restore the backup  files  Enter the backup job s password if it has one     Click this button to return to the preceding screen   Click this button to save your changes back to the NSA        9 3 Restoring by Backup Files    Click Protect  gt  Restore to open the Restore screens  Use these screens to restore by the  backup files if you deleted an archive backup job or the NSA or the RAID array containing the  backup job failed  You can also restore a previous archive backup from another NSA or an  external USB hard drive connected to the NSA     Figure 176 Protect  gt  Restore  Step 1    Step 1  Select Restored Source    f Remote NSA    IP Address    Account    Password    Share Name      f Internal or External Volume    M       The following table describes the labels in this screen   Table 79 Protect  gt  Restore  Step 1  DESCRIPTION    Remote NSA Select this option to restore from another NSA  Type t
190. e  to wake up the hard drivefs   which may cause services to be  non responsive for a brief period of time     fo minutes Eaa    Minimum UPS Capacity    E    EA    M Note  This feature will not work now because there is no UPS control  cable connected    H Note  The NSA automatically shuts down if the UPS s remaining charge  gets down to this level     Hard Drive Sleep  Time    Minimum UPS  Capacity    Power On After Power Failure    f Keep Former Status  If the system was on when the power failed  it restarts automatically when the  power is restored  If it was off  it stays off     f Always Power On  The system restarts automatically when the power is restored       Always Power Off    The system will not restart after power failure  You must press the power  button manually to restart It     Power On Off Schedule    Enable Power Control  Schedule    3 7 How to Use Backups and Snapshots    Use the NSA   s backup and snapshot features to backup your files and folders        Do snapshots frequently  hourly or daily for example  since they are faster than backups     Snapshots help protect against accidental file loss or damage caused by hackers     e Schedule backups for times when the network is not busy  like at night or on weekends    For example  you might do daily backups of important individual files or folders and a  weekly general archive  You can save backups to another location so your files can  survive even if the original RAID or NSA fails        NSA 2401 User   
191. e 194 Maintenance  gt  Log  gt  Log Config  gt  Log Records Configuration    Log Configuration    Log Records Configuration   Buzzer Priority      Log Reserve Time       Months    Save Log to               NSA 2401 User   s Guide    Chapter 11 Maintenance Screens    The following table describes the labels in this screen   Table 96 Maintenance  gt  Log  gt  Log Config  gt  Log Records Configuration    LABEL DESCRIPTION  Log Reserve Set the number of months  up to 10  to keep the logs stored on the NSA   Time     Save Log to  Select a user account on whose share you want to store the logs  The system  default stores logs in a neutral location    Apply Click this to save your changes    Cancel Click this to discard changes and close the window        11 2 3 Log Buzzer Priority Configuration    Click Maintenance  gt  Log  gt  Log Config  gt  Buzzer Priority to open a screen where you can  configure the audible buzzer   s settings  enable or disable the audible buzzer alarm feature and  set what severity level of logs trigger it     nat pee ee eat a    Figure 195 Maintenance  gt  Log  gt  Log Config  gt  Buzzer Priority         L  g Records Configuration   Buzzer Priority      F Enable Buzzer  Emergency      The following table describes the labels in this screen   Table 97 Maintenance  gt  Log  gt  Log Config  gt  Buzzer Priority    LABEL DESCRIPTION    Enable Buzzer Select this option to enable the audible buzzer alarm feature   Use the drop down list box to select the severity
192. e S M A R T   Self Monitoring  Analysis  and  Reporting Technology  monitoring system to detect and report on  hard drive reliability indicators to help anticipate hard drive failures        258 NSA 2401 User s Guide    Chapter 13 Product Specifications    Table 110 Firmware Features  continued    UPS Integration Connect an APC Uninterruptible Power Supply  UPS  with a USB  connection to the NSA  The NSA shuts itself down if the UPS   s battery  charge gets down to a user configurable percentage  This allows the  NSA to shut down properly and avoid data loss caused by a power  failure when the UPS stops supplying power     Hard Disk Drive Power  Saving    Power Control Schedule The NSA can turn itself off and on or restart according to the schedule  you configure    Auto Shutdown The NSA automatically turns itself off when there is almost no power  or the temperature is too high     Time and Date Configure a time server and set a time zone for your NSA to show the  correct times in e mail alerts and logs     If  a hard disk inside the NSA for a user configurable period of time     the NSA puts it to sleep until you use it again        E mail Alerts Configure an e mail to be sent to an NSA administrator whenever an  error occurs or as a scheduled log summary     13 2 Specification Tables    The NSA hardware specifications are shown in the following table     D      D      Er  Er  Z  op    gt   L  Q       Q     Q       OD  op   O  D  Q  O     O       ep     LAN1 IP Address 192 
193. e is not open to external access     Select Create a certificate authorized by other CA  then follow the on   screen instructions to install a certificate that has been authorized by a  third party certificate authority     Note  Use this method if the device is open to external  access  such as allowing users to connect through the  Internet using FTP over Explicit TLS or HTTPs        11 4 0 1 Editing a Self Signed Certificate or Creating a Certificate Signing Request    When you select the Edit a self signed CA certificate option  then click the Edit button  a  screen opens to allow you to make adjustments to the NSA   s public key certificate     The screen is also the same for the Create a certificate authorized by other CA option     240 NSA 2401 User s Guide    Chapter 11 Maintenance Screens       Figure 203 Maintenance  gt  SSL  gt  Edit a Self Signed Certificate     milt i ee ENE Mini fer  Sr  Edit the Self signed Certificate       Common Mame        Host IP Address    f Host Domain Name  NS498563    Organizational Uniti Optional    Max length  64 characters  Organization  Optional   EEL Max length  64 characters    Country iOptional    Country code only  such as TW  US  JP  etc     Key Type ASA       Key Length            Note     If you choose a large key length  it may take a while to make the  certificate file     The following table describes the labels in this screen   Table 104 Maintenance  gt  Configuration    LABEL DESCRIPTION  Common Name This name describes
194. e notice and other  provisions required by the  ___  License  If you do not delete the provisions above  a recipient  may use your version of this file under either the MPL or the  ___  License        NOTE  The text of this Exhibit A may differ slightly from the text of the notices in the Source  Code files of the Original Code  You should use the text of this Exhibit A rather than the text  found in the Original Code Source Code for Your Modifications     This Product includes expiate and krb5 software under the MIT License    The MIT License    Copyright  c   lt year gt   lt copyright holders gt     Permission is hereby granted  free of charge  to any person obtaining a copy of this software  and associated documentation files  the    Software         to deal in the Software without  restriction  including without limitation the rights to use  copy  modify  merge  publish   distribute  sublicense  and or sell copies of the Software  and to permit persons to whom the  Software is furnished to do so  subject to the following conditions     348 NSA 2401 User s Guide    Appendix D Open Source Licences    The above copyright notice and this permission notice shall be included in all copies or  substantial portions of the Software     THE SOFTWARE IS PROVIDED    AS IS     WITHOUT WARRANTY OF ANY KIND   EXPRESS OR IMPLIED  INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF  MERCHANTABILITY  FITNESS FOR A PARTICULAR PURPOSE AND  NONINFRINGEMENT  IN NO EVENT SHALL THE AUTHORS OR COPYRIG
195. e syslog daemon can be configured to send system logs to a  central online repository known as a syslog server  This allows the network administrators to  quickly access and examine them without having to go to every machine on the network     NSA 2401 User   s Guide 229    Chapter 11 Maintenance Screens    Finding Out More  See Section 3 5 on page 68 for tutorials on configuring security     See Section 3 6 on page 89 for a tutorial on power resume     11 2 Log    Click Maintenance  gt  Log to open a screen that displays all NSA activity logs     Figure 190 Maintenance  gt  Log    O        Oaa    Purge All Log Report Export Display Number  50    l    Refresh Search Logs Config Config Log Go to Page  1        Pagel Of 1    2008 07 21 14 38 22 User    info User adminfg19  166 1 33  login  2008 07 21 14 37 04 built in service notice FTP server starts with TLS mode  2008 07 21 14 37 02 built in service notice FTP server starts with TLS mode  2008 07 21 14 37 02 storage notice Diski is unplugged    2008 07 21 14 36 54 storage crit Detected Disk1 I O error   2008 07 21 14 36 54 built in service notice FTP server stops   2008 07 21 14 36 53 storage notice Disk3 is unplugged    2008 07 21 14 36 45 built in service notice FTP server stops    on mm       MR    Pagel Of 1       The following table describes the icons in this screen   Table 94 Maintenance  gt  Log Icons    DESCRIPTION    Refresh  Click this icon to update the log display     Search    Click this icon to display the sear
196. e the  disk surface   NSA 2401 User s Guide    206   Flying Height    Chapter 6 Storage Screens    Table 42 S M A R T  Attributes  continued     ATTRIBUTE   ID NAME BETTER   DESCRIPTION   207   Spin High This is the quantity of high current used to spin up the drive   Current    208 This is the number of buzz routines to spin up the drive  When the    arm holding the read write heads is stuck  the motor driving it tries  to oscillate the arm to free it  This causes an audible vibration   209   Offline Seek  Performance    220   Disk Shift   221   G Sense Error  Rate   222   Loaded Hours   223   Load Unload  Retry Count   224   Load Friction   225   Load Unload  Cycle Count    226   Load  In  time       This is the hard drive   s seek performance during offline  operations  Offline operations are tests the drive does itself as  opposed to those that an external diagnostic tool has it do  Seek  performance is how quickly the drive moves from track to track     This is the number of attempts to compensate for variations in  platter speed        This is how far the disk has moved relative to the spindle  this  kind of shift is usually due to shock      Lo  L This is the number of errors that have resulted from external    vibration and shock     This is how long the hard drive has operated under data load  this  requires movement of the magnetic head armature      This is how many time the magnetic head has changed position     L This is resistance caused by friction in mechanica
197. e the following procedure to make the NSA   s  existing volumes larger in order to use the increased capacity  You do not have to change your  existing share  backup  and snapshot settings  Of course you can also create new volumes  but  you must configure new share settings in order to use them and new backup and snapshot  settings to protect the files     NSA 2401 User   s Guide 109    Chapter 3 Tutorials    1 Click the Volume tab  Select a volume and click Edit     Figure 112 Storage  gt  Internal Storage  gt  Volume    Internal Storage    Ne    Wizards i Delete Scan Lock UnLock      woe  6 16 MB  Used    172 29 GB Total 100  Free    volumet Normal jbodD1D4  Healthy       2 Increase the size and click Apply     Figure 113 Storage  gt  Internal Storage  gt  Volume  gt  Edit  Edit Internal Yolume    RAID Name  bodD1D4    l    Volume Mame example    Size  87637 B  1GB   1024MB     Available Capacity E Ege GE    Encrypted          i  Note  size will be rounded up to the nearest 64MB boundary       3 Repeat these steps for other volumes that need more storage capacity     3 9 4 Migrating a RAID to Higher Capacity Hard Drives    You can migrate a RAID 5 array to hard drives of higher capacity  Replace one hard drive at a  time and recover the RAID before you go on to replace another hard drive     For optimal performance and RAID storage capacity  use hard drives of the same speed and    capacity  It is also recommended that you perform the upgrade when the network   s traffic  
198. e you can create a new disk array     Rename  Select a hard drive array and click this icon to change the array   s name     reName  RAID Label  RAID5 example    Delete    Select a hard drive array and click this icon to remove the array  You must  remove all of an array   s volumes before you can delete the array     Note  Deleting an array also deletes all data in the array s  disk s      A warning screen appears  Click Yes if you want to remove the array and  all of its data  Otherwise click No     am      ge RAID  RAIDS example     ALL Data On this RAID will be DELETED    re you sure you want to  DELETE this RAID        Performing this operation will cause some network  services to temporarily disconnect     Repair  After you replace a faulty disk  select the hard drive array  its status will be  Degraded  and click this icon to resynchronize the array           136 NSA 2401 User s Guide    Chapter 6 Storage Screens    Table 25 Storage  gt  Internal Storage  gt  RAID Icons  continued     ICON    NSA 2401 User   s Guide       DESCRIPTION    Resync Speed  When a disk array is resynchronizing  you can select it and click this icon  to set how fast the NSA resynchronizes the disk array  A screen displays     Resync Speed Setting    Speed Setting  medium l       Select the how fast the NSA should re synchronize the array  The faster  the resynchronization  the slower the performance for users accessing  shares  With resynchronizing at a high priority  users may have limited  a
199. ead Only  Click Apply in this screen and  again in the edit screen     Figure 67 Share Access Configuration    Share Access Configuration    Available Userfsi Groupts      lt LOCALUSERS gt   lt LOCALUSERS gt   anorymous   p Bonzo   admin  lt DOMAINUSERS gt    lt DOMAINUSERS gt  rar  lt LOCALGROUPS gt    lt LOCALGROUPS gt       lt DOMAINGROUPS gt   evenlone  m    lt DOMAINGHOUPS gt     Read Only     lt LOCALUSERS gt   Kermit   lt DOMAINUSERS gt    lt LOCALGROUPS gt   Senior Management   lt DOMAINGROUPS gt      lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt      i  Note     You may select multiple users groups by using Ctrl   Click           NSA 2401 User   s Guide    Chapter 3 Tutorials    3 5 3 2 Setting the ACL to Deny Access to a File  Now you need to stop Kermit from accessing the 2010 2014 Plans file     1 Select the Gonzo share  and click ACL Properties     Figure 68 Sharing  gt  Shares    Shares    oO    Add Shara Recycle i DHS Shara  i Browser    Owner Type       vslunmestlskern   Kermt Adsanzec    2 Click New ACL     Figure 69 Sharing  gt  Shares  gt  ACL Configuration    Edit ACL Reset ACL    ne  Strategy  ACL Path       NSA 2401 User   s Guide 85     Chapter 3 Tutorials    3 Open the Strategy folder     Figure 70 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL    ACL Configuration    Set ACL    Current Location   Gonzo    size  Madea bate    recycle 0 2008 09 16 09 37 36  Strategy 0 2008 09 16 10 46 44       4 Select the 201
200. eading cell again to reverse the sort order        The following table describes the labels in this screen   Table 33 Storage  gt  External Storage  gt  Disk    LABEL DESCRIPTION    Name This field displays the name of the NSA   s USB port  USB1 or USB2  to  which the disk is connected  The NSA   s upper USB port is USB1 and its  lower USB port is USB2     This shows whether or not the device has an encrypted volume   Model Name This is the device   s model name that uniquely identifies it in the NSA   Capacity This field shows the device   s storage size        146 NSA 2401 User s Guide    Chapter 6 Storage Screens    6 8 External Volume Screen    Click Storage  gt  External Storage  gt  Volume to display the external  USB connected   volume summary screen as shown next  Use this screen to manage the NSA   s external storage  volumes  The NSA automatically creates volumes when you connect an external disk  You  can also create other volumes     Figure 137 Storage  gt  External Storage  gt  Volume    External Storage    hel r  E ari  1 i    i  ai    Lock UnLock       The following table describes the icons in this screen   Table 34 Storage  gt  External Storage  gt  Volume Icons    Create    Click this icon to open a screen where you can create a new storage  volume     Edit  Select a volume and click this icon to modify it   s settings     Scan  Select a volume and click this icon to check the volume s file consistency     Scan Yolume      re you sure to scan the volume     
201. ecceeeeceeeseeueceessuaeeeessaaeeeesauseeeessageeessaaaeeess 249  12 2 Power  Hardware Connections  and LEDS      rrrnnnnnnnnnnnnnnnnnnnnnnnnnnnvnnnnnnnnnannennnvnnnnrvnnnnnnnene 249  12o ROA LOGIN Ne 251  12 4 Users Cannot Access the ne 253  pe OT se EEE EE ETE AE 254    NSA 2401 User s Guide    Table of Contents    Er DE ERE EE 255  Chapter 13  ge eee aaraa E 257  13 1 Feature Tables nicninsasinsniccseerersionicsasnohennsdaciaiiadspawrebaiasinjadiaisimnsaiiaddamesaiebcsionmbinseinsssicedseiaueds 257  TNT   lt  aE E cere ee 259  TN 261  Part IV  Appendices and Index        rranrvnnnnnnnnnnnnnnnnnnnennnennnennnennnennnnnnnnen 263  Appendix A Log Messages          rrrnrarrrnnnnrnnnnrnrnnnennnnrnnnnrnnnnnennnnennnsnnnnnnennnnrnnnnnennnnennnneennnnennnneen 265  Appendix B Setting Up Your Computer s IP Address                 cccccccccsseeeeseeeeeeseeeeeesaeeessaeeeess 275  Appendix C Importing Certificates             ccccccccccsseecceceeeeeceeeeeeeeceseeeeeceesseaeeeeessaaeeeessueeeessaaaes 299  Appendix D Open Source LICENCES         rrrrrrrnnnnnrrnrnnnnnrrnnnnnnrrnrnnnnrrnnrnnnnsennnnensennnnsnnernnnnsnseennnn 323  Pa Eeg EE NS 353  0 REE EEE eee eae 355    16  NSA 2401 User s Guide    List of Figures    List of Figures    AE KE JONER EEE TT EE ET ETE 31  PEPE GE ENER EE EE ERR EN 32  Fowe J NOUT EI NN re 36  FAD NL eor E E RA E T E EES 36  Figure 5 NSA Login Sreet Lassen ERRA EREN A na a EAS aa aE E Ea 37  FEN FEN NN eden 37  FOT   42v442r4v4v4r44v4v4vre    38  PENT EN gsc s
202. ect a folder s  or file s  and click this icon to remove the folder s  or    Delete all content associated with these folders and files     Do you wish to proceed     The administrator can select a folder or file and click this button to move it  to another location within this share or another share that you can access        The administrator can select a folder or file and click this button to move  create a copy of it in another location within this share or another share  that you can access     Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order        Up One Level   Click this icon to go to the next higher layer in the share   s folder tree   Folder   Click this icon to browse the folder         File     Click this icon to select a file     The following table describes the labels in this screen   Table 6 My NSA Share Browsing    LABEL DESCRIPTION  Current location This is the name of the share and folder path that you are in     Type The icon in this column identifies the entry as a folder or a file   The folder with an arrow pointing up is the link that takes you to the next  higher layer in the share s folder tree   Name This column identifies the names of folders and files in the share   Click a file   s name to open the file or save it to your computer   Click a folder   s name to display the folder   s contents     This column displays a file   s size     Modified Date This
203. ections    A Caution     Modifications of TLS SSL certificate settings will restart network services        Force HTTPs    Install System Default CA    This action will install the system default C4 in the trusted CA list of your browser    Stepi Download the default CA file   isis ieee     Step  Double click on the CA file to install it into your browser    Modify the Existing Certificate    A Caution     Modifications of TLS SSL certificate settings will restart network services       Edit    self signed CA certificate  Stepl Edit the Self signed Certificate      ont HA      igned CA file    Step3 Double click on the CA file to install it into your browser    C Create a Certificate To Be Authorized By My Own Certificate Authority       2 Next  let   s modify the certificate by changing the Common Name to this NSA   s IP  address of 192 168 1 35  the Organization to    Test    and the Key Length to 2048     Figure 43 Maintenance  gt  SSL  gt  Edit a Self Signed Certificate    Edit the Self signed Certificate    Common Mame     amp  Host IP Address  192 168 1 35  f Host Domain Name  15235863    Organizational UnitfOptional    Max length  64 characters  Organization Optional  Test Max length  64 characters    Country Optional    Country code only  such as Tw  US  JP  etc   Key Type R   O   Key Length 2048s      Note     If you choose a large key length  it may take a while to make the certificate          NSA 2401 User   s Guide    Chapter 3 Tutorials    3 The NSA restarts its
204. ed  The cable for Ethernet is connected  but     PPPoE 222  your computer does not have an IP address   Not Connected  Hug aay     Configure    Manually i  epi 2 IP Address  0 0 0 0 K  e Finavia s is  er  Jot Connected    Subnet Mask   AirPort      oF T Router   DNS Server     Search Domains     802 1X  WPA  ZyXELO4   Connect    dags   Advanced       7   i  Click the lock to prevent further changes    Assistme        Revert     Apply      6 Click Apply and close the window     Verifying Settings    Check your TCP IP properties by clicking Applications  gt  Utilities  gt  Network Utilities  and  then selecting the appropriate Network interface from the Info tab     Figure 233 Mac OS X 10 5  Network Utility       Netstat AppleTalk Ping Lookup Whois Finger    interface for information                         Hardware Address  00 30 65 25 6a b3 Sent Packets  1230    IP Address es   10 0 2 2 Send Errors  0  Link Speed  11 Mbit s Recv Packets  1197  Link Status  Active Recv Errors  0   Vendor  Apple Collisions  0    Model  Wireless Network Adapter   802 11     fi       288 NSA 2401 User s Guide    Appendix B Setting Up Your Computer   s IP Address    Linux  Ubuntu 8  GNOME     This section shows you how to configure your computer   s TCP IP settings in the GNU Object  Model Environment  GNOME  using the Ubuntu 8 Linux distribution  The procedure  screens  and file locations may vary depending on your specific distribution  release version  and  individual configuration  The followi
205. ed Automatically determined by i  Content Certificate                                             fn        10 If you are presented with another Security Warning  click Yes     Figure 258 Internet Explorer 7  Security Warning    Security Warning            You are about to install a certificate from a certification authority  CA  daiming to represent        nsa2401    Windows cannot validate that the certificate is actually from   nsa2401   You should confirm its origin by contacting   nsa2401   The following number will assist you in this process     Thumbprint  sha 1   350 109AC DBCOES54 FE327C71 4640 1546 242E5893   Warning    If you install this root certificate  Windows will automatically trust any certificate issued by this CA  Installing a  certificate with an unconfirmed thumbprint is a security risk  If you cick  Yes  you acknowledge this risk     Do you want to install this certificate        NSA 2401 User   s Guide    Appendix C Importing Certificates    11 Finally  click OK when presented with the successful certificate installation message     Figure 259 Internet Explorer 7  Certificate Import Wizard    Certificate Import Wizard    a  i I   The import was successful        12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page  a    sealed padlock icon appears in the address bar  Click it to view the page   s Website  Identification information     E 3 Website Identification  ay    172 20 37 202 has identified this site as  172 20 37
206. ed after the   folders and files in the volume at the time of the backup  To restore a folder or file to its state   at the time of the snapshot  open the snapshot image of the same name  You can also copy or   move the snapshot image to another folder  outside the snapshot folder      When you use a snapshot to restore files  the NSA keeps intermediate snapshots between the  snapshot you use and the present  For example  say you had the NSA take daily snapshots and  on Friday you choose to use Monday s snapshot  the NSA keeps the Tuesday  Wednesday  and  Thursday snapshots     Although you can continue to work while the NSA takes a snapshot  it s a good idea to  schedule snapshots for non peak times so not very many files are open  Snapshots may get  progressively slower as more are done but they are still very fast compared to backups  as only  block changes are recorded         LES The NSA automatically purges snapshots        See Snapshot Purging on page 215 for details     Snapshots Versus Backups  See Section 9 2 on page 200 for more information on backups     1 A snapshot only records changes to files within a volume  so it   s faster and takes up less  space than a backup     2 You must create a snapshot of a complete volume  not on a single file or folder as you  can do with a backup     It   s a good idea to take both snapshots and backups for the following reasons     1 Snapshots may become invalid  so it   s good to also have backups available in case that  happen
207. eds to do the following to restore them     NSA 2401 User   s Guide 99    Chapter 3 Tutorials    1 Click Protect  gt  Backup screen  select a backup job and click Restore Archive     Figure 91 Protect  gt  Backup    Add Job Edit Job Delete  Selected  Iobis     Status Job Name    WAITING    Weekly Dackup       2 Select which backup to use and click Next     Figure 92 Protect  gt  Backup  gt  Restore Archive  Step 1    Restore    Step 1  Select Restore Point    Job Mame  Weekly backup  Job Description   Backup Type  Incremental    Scheduler  Information     a Restored Time    E 2008 09 08 14 35 45    every week          NSA 2401 User s Guide    Chapter 3 Tutorials    3 Select the Gonzo share and click Next     Figure 93 Protect  gt  Backup  gt  Restore Archive  Step 2  En    Restore    Step Z  Please select which file s   folder s  to restore     ER   H  Gonzo       4 Select the original location and click Done     Figure 94 Protect  gt  Backup  gt  Restore Archive  Step 3    Restore    Step 3  Set a restore target and start restoring    f Original Location  f   Other Location      Sr             NSA 2401 User s Guide 101    Chapter 3 Tutorials    5 The NSA restores the files into the Gonzo share  When it finishes you can access the  files     Figure 95 Protect  gt  Backup  gt  Restore Archive  Progress  ee  Progress    Job Name     Gonzo    Target Path    original location  Volume  volume     Progress    100        3 7 7 Restoring by Backup Files    If you deleted an archive b
208. eeeeesesaauaaseseeeeeeeessaaaasssesees 319  PG Spona MOn Cater randen 315  Figure 284 Opera 9  Install authority certificate 2 0 0    ceeeeseseeeeeeceeeeeesseeeeeeeeeseeeauaasseeeeeessesenagssssseess 316  Figure 285 Opera 9  Install authority certificate ee 316  Pee Te PE iranin TEE E ET 317  FTP NNN 317  Figure 288 Opera 9  Certificate manager               cccccccccssssssssseeeeeeececseuesseseeeeeeeesseeseaaseeeeeeeeesseenassessesess 318  Figure 289 Konqueror 3 5  Server Authentication         rrrnrnnrnvvrnnnnnnnvvnnnnnnnnvnnnnnnnnnrrnnnnnnnnnsennnnnnnnsennnnnnnnee 319  Figure 290 Konqueror 3 5  Server Authentication             cccccccccsssseeeeceeeeeeceueeeeeeeeeeeseeeaeeseeeeeeeeeseaaaageees 319  Figure 291 Kongueror 3 9  KDE SSL ITAD sieicuinsainusacimrdixneesoaresiainwiarunianssonsdlnaattmieenearnieiadinananaes 319  Figure 292 Konqueror 3 5  Public Key Certificate File                cccccccsseececceseceeeaeseeecseeeeeeesesseeessaaeeeseaeaes 320  Figure 293 Konqueror 3 5  Certificate Import Result         rrrrrnrnrnnnnnernnnnrnnvnnrrnvnnnrnnnnnrnnnnnrrnnnnnennnnnennnnnnen 320  EE Ge RED  RER ER 320  Figure 295 Kongueror 3 5  Settings NN ene 321  Figure 296 FET GE wisssisnnseranasndneccrasecaneccanusareessxissnni lt qinenteinbiansdempixaeend Dani ENERE ENEA 321    NSA 2401 User   s Guide    List of Figures    24 NSA 2401 User s Guide    List of Tables    List of Tables    TETTE te 32  TN E A A em ee Rr ETE are Rae ec ee SET tora 32  Table 3 User level Global Labels and 
209. een  see Figure 133 on page 144  so you can make another     6 7 External Storage Disk Screen    Use the external storage screens to manage the NSA   s externally  USB  connected storage   Connect USB devices to the NSA   s USB ports  Click Storage  gt  External Storage to open the  following screen  This screen provides information on disks connected to the NSA     Figure 136 Storage  gt  External Storage  gt  Disk  External Storage  te  Eject Locate Duplicate  Key    mr    USB FLASH DRIVE 54CB 245 00 MB    silicon  power 0 00 3 73 GB       Healthy    NSA 2401 User s Guide 145    Chapter 6 Storage Screens    The following table describes the icons in this screen   Table 32 Storage  gt  External Storage  gt  Disk Icons    Eject  Select a USB connected device and click this icon to be able to remove  the device     Eject Disk    re you sure you want to eject this disk     Performing this operation will cause some  network services to temporarily disconnect     LAPPIY   Cancel      Locate    Select a USB connected device and click this icon to have the device   s  LED flash so you can identify it     Duplicate Key    Connect a USB key device and another USB device to the NSA and click  this to create a copy of the key  Select the USB key device as the Source  USB  Connect another USB device and select it as the Destination USB     Create a Duplicate USB Key    Source    Target    Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the h
210. eeseeeeeeeseeeeeeeseaeeeeesaeeeeesaees 216  Fe 181 FOR  gt  NTN AND ioiei AE neon 218  Figure 182 Protect  gt  Snapshot  gt  Snapshot Images              ccseeeecccseseeeeceeeeeeeeeeeeeeeseeueeeeeauseeeessaaesessaaees 219  Figure 193 Froteci  gt  Backup EE  gt  EE EE 221  FT PEN vr 224  gre eee a ERE ER 225  Figure 186 Applications  gt  Pint NE persisiran a Ea EEEE EEE EN EAREN 226  Figure 187 Applications  gt  Print Server  gt  Rename _                 cccccseeecceseeeeceeeeeceseeeeceseeseasesecaueeeseeeeenaseeees 226  Figure 188 Applications  gt  Copy Button         rrrrrerrrrrnnnnrorvrrrnnnnrrrrrnnnnnnnrrenrnnnnnnssrnnnnnnnssennnnnnnssesennnnnnnnsnee 227  Figure 189 Applications    ry Bulon SET Leed 228  MERE EEE aita dnai roike iren itsin 230  Figure 191 Maintenance pnt aces santas atc r ame ME 231  Figure 192 Maintenance  gt  Log  gt  Log Classes   r iid eeisieaeactimdeera hihi 231  Figure 193 Maintenance  gt  Log  gt  Search Filters sii cccsceccscuveiesceddccsstteusectsddenedscteuenediwssseaseceiicreieedaadendons 232  Figure 194 Maintenance  gt  Log  gt  Log Config  gt  Log Records Configuration         rrrrrrrnnnrrnnnnnrnnnvvnnnnnnnnnn 232  Figure 195 Maintenance  gt  Log  gt  Log Config  gt  Buzzer Priority                 cccccssececeseeeeeeseeeceeseeseeseeseeeeeees 233  Figure 196 Maintenance  gt  Log  gt  Log Report Configuration  gt  Mail Setting       rrrrrrnnnrrnnnnnnnrrnnvvvnnnnnnnnnn 234  Figure 197 Maintenance  gt  Log  gt  Log Report Configuration  gt  Repor
211. eeseeeeessaaaseeeeesenaseees 306  Figure 265 Internet Explorer 7  Certificates ooscceti ecesascetbleceneccagiassescexinddeuaeceiciatesanceiadcbaqeabiadsnacevieaieeaecteld 307  Figure 266 Internet Explorer 7  Certificates           rrrrrrrrnnnrrrrrrrrnnnrnrrvrrrnnnnnrvnrrnnnnnnennnnnnnnneennnnnnnnnsennnnnnnssee 307  Figure 267 Internet Explorer 7  Root Certificate Store        r  rrnrnernnannavnnnnnnvrnvnnnnvennnnnernnnnnnenennnnsrnnnnnueenenne 307  Figure 268 Firefox 2  Website Certified by an Unknown Authority                cccccccesssseeeeeeeeeeeeeeeeeeeaeeeeeees 308  PU Nr 308  ge Fl EEE EE 309  TET PG EEE EE 309  Figure 272 Firefox 2  Certificate Manager             ccsssssssecceecceeeseeseeeeeeeeeesauaeeseeeeeeeesesaaaeeeeeeeeeessaaaseeeess 310  PN FN EF eee 310  Figure 274 Firefox 2  Tools Menu      rrrnannnnennnnnvnnnnnnnenennnnnrnnnnnnennennnnenennnnnennnnnnnsnennnnernnnnnnnenennnnsennnnnnuenennen 311  FOUG e S PE Ge RE EEE ER 311  Figure 276 Firefox 2  Certificate Manager         rrrrnnrnrrrrrnnnnnrovrrnnnnnnrnnrrrnnnnnrnnnnnnnnssennnnnnsnssrnnnnnsnsssnnnnnnnnsnee 312  Figure 277 Firefox 2  Delete Web Site Certificates          rrrrrrrrrrrnnnrrrrnnnnrrrrrannnrrnnnnnrnnrnnnnrrnnnnnnrrnrnnnsennnnnnn 312  Figure 2 5 Opera 9  NE signer Not TOUTO  Luske de eek bedbiebaesekdenkne 313  Fig  re 279 Opera 9  0 EE EEE als  EEE LE Eh EE EEE 314  Figure 26 EG 0 eg RE ERE gE a riai 314  Figure 282 Opera 9  Certificate manager              cccccccccccssssesseeeeeeeeeeenaueaaseeec
212. eives a certificate request from a website operator  they confirm that the web domain and  contact information in the request match those on public record with a domain name registrar   If they match  then the certificate is issued to the website operator  who then places it on the  site to be issued to all visiting web browsers to let them know that the site is legitimate     Many ZyXEL products  such as the NSA 2401  issue their own public key certificates  These  can be used by web browsers on a LAN or WAN to verify that they are in fact connecting to  the legitimate device and not one masquerading as it  However  because the certificates were  not issued by one of the several organizations officially recognized by the most common web  browsers  you will need to import the ZyXEL created certificate into your web browser and  flag that certificate as a trusted authority        You can see if you are browsing on a secure website if the URL in your web  browser s address bar begins with https    or there is a sealed padlock  icon   44   somewhere in the main browser window  not all browsers show the  padlock in the same location         In this appendix  you can import a public key certificate for     e Internet Explorer on page 300  e Firefox on page 308   e Opera on page 313   e Konqueror on page 319    NSA 2401 User s Guide 299    Appendix C Importing Certificates    Internet Explorer    The following example uses Microsoft Internet Explorer 7 on Windows XP Professional   
213. el for the share  You can assign users and groups an  authority level by selecting them and clicking the right arrow     Full Assign users and groups one of the following authority levels     Read Only Full   Grants read write privileges   Den Read Only   Grants read only privileges  files and folders cannot be  eny mp    modified  moved  or removed   Deny   Removes all privileges  files and folders cannot be read   modified  moved  or removed     You can remove users from any given authority level by selecting them  and clicking the left arrow     Apply Click this to save your changes   Click this to discard changes and close the window     8 4 2 3 EVERYONE  amp  ANONYMOUS Share Access Rights    With an EVERYONE access right  you still need to log in  Every local user with an account  on the NSA can access this share using their username and password  Users with accounts on a  domain server cannot access shares with EVERYONE access rights  EVERYONE has every  local user as a member  It does NOT include domain users        With ANONYMOUS FTP  you must enter either  anonymous  or  ftp  as the user name  Any  other name is considered a user name  so must be valid and have a corresponding correct  password        LES If you are already logged into a share using your username and password  you  will NOT be able to access a share that has ANONYMOUS FTP only access  rights  as these require    no login     If this is not your intention  it is  recommended you set EVERYONE AND ANONY
214. enforceable  such provision shall be reformed only to  the extent necessary to make it enforceable  This License shall be governed by California law  provisions  except to the extent applicable law  if any  provides otherwise   excluding its  conflict of law provisions  With respect to disputes in which at least one party is a citizen of   or an entity chartered or registered to do business in the United States of America  any  litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the  Northern District of California  with venue lying in Santa Clara County  California  with the  losing party responsible for costs  including without limitation  court costs and reasonable  attorneys    fees and expenses  The application of the United Nations Convention on Contracts  for the International Sale of Goods is expressly excluded  Any law or regulation which  provides that the language of a contract shall be construed against the drafter shall not apply to  this License     12  Responsibility for claims    NSA 2401 User   s Guide 347    Appendix D Open Source Licences    As between Initial Developer and the Contributors  each party is responsible for claims and  damages arising  directly or indirectly  out of its utilization of rights under this License and  You agree to work with Initial Developer and Contributors to distribute such responsibility on  an equitable basis  Nothing herein is intended or shall be deemed to constitute any admiss
215. ense because it does Less to protect the  user s freedom than the ordinary General Public License  It also provides other free software  developers Less of an advantage over competing non free programs  These disadvantages are  the reason we use the ordinary General Public License for many libraries  However  the Lesser  license provides advantages in certain special circumstances     For example  on rare occasions  there may be a special need to encourage the widest possible  use of a certain library  so that it becomes a de facto standard  To achieve this  non free  programs must be allowed to use the library  A more frequent case is that a free library does  the same job as widely used non free libraries  In this case  there is little to gain by limiting the  free library to free software only  so we use the Lesser General Public License  In other cases   permission to use a particular library in non free programs enables a greater number of people  to use a large body of free software  For example  permission to use the GNU C Library in  non free programs enables many more people to use the whole GNU operating system  as well  as its variant  the GNU Linux operating system     Although the Lesser General Public License is Less protective of the users  freedom  it does  ensure that the user of a program that is linked with the Library has the freedom and the  wherewithal to run that program using a modified version of the Library     The precise terms and conditions for co
216. er configuration file     If you forgot the NSA password  then reset the device to go back to the factory default  configuration        Configuration File Backup and Restoration does not affect disk arrays   volumes  or data  your files and folders  on the NSA        Genie Backup Manager    BS    Use the Genie Backup Manager to transfer data from your computer to the NSA  You could  use Genie Backup Manager to back up from one NSA to another NSA but it   s recommended  you use the NSA Protect  gt  Backup to do this  see Section 9 2 on page 200  as the latter  would be faster        The Genie Backup program uses the same network port as the NDU to  discover the NSA  To avoid a port conflict  do not run the Genie Backup  Manager at the same time as the NDU        Snapshots    A snapshot is a record of changes to an internal volume at a particular moment in time  As it  only records changes to files made in a volume  it   s faster and takes up less space than a  backup  Snapshots are good for data that changes often and needs to have high availability  If  files within a volume become infected or corrupted  you can revert files back to their state at a  snapshot     You create snapshots of a complete volume  not a single file or folder within a volume     NSA 2401 User   s Guide    Chapter 9 Protect Screens    To use a snapshot to restore files  use the MyNSA screens  CIFS  Windows Explorer   or FTP  to browse to the snapshot image folder  The snapshot folder contains images nam
217. eral Public License from time to time  Such new versions will be similar in spirit to the  present version  but may differ in detail to address new problems or concerns  Each version 1s  given a distinguishing version number  If the Library specifies a version number of this  License which applies to it and  any later version     you have the option of following the terms  and conditions either of that version or of any later version published by the Free Software  Foundation  If the Library does not specify a license version number  you may choose any  version ever published by the Free Software Foundation     14  If you wish to incorporate parts of the Library into other free programs whose distribution  conditions are incompatible with these  write to the author to ask for permission  For software  which is copyrighted by the Free Software Foundation  write to the Free Software Foundation   we sometimes make exceptions for this  Our decision will be guided by the two goals of  preserving the free status of all derivatives of our free software and of promoting the sharing    and reuse of software generally   NO WARRANTY    15  BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE  THERE IS NO  WARRANTY FOR THE LIBRARY  TO THE EXTENT PERMITTED BY APPLICABLE  LAW  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT  HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY    AS IS    WITHOUT  WARRANTY OF ANY KIND  EITHER EXPRESSED OR IMPLIED  INCLUDING  BUT  NOT LIMITED TO  THE IMPLIED WA
218. erent LANs  Users  on either LAN  or connected through the Internet  can back up and share data on the NSA   Two USB ports let you share USB printers and use external USB hard drives for extra storage  space     Figure 1 NSA Overview       e The NSA   s SATA II  Serial Advanced Technology Attachment  hard disk serial links are  compatible with all major hard drive manufacturers     e RAID  Redundant Array of Independent Disks  protects your data even if a hard disk fails   e The snapshot and backup features let you further protect your data     e The NSA offers powerful security features  Use HTTPS or FTPES for secure file  transfers  Create encrypted volumes so an attacker who removes the physical drive still  cannot read the data  The NSA can also record all user access to files and folders     e The NSA lets you publish or mirror files to another NSA as a backup that others can  access  at a branch office for example      e See the specifications appendix for a more detailed list of NSA features     NSA 2401 User   s Guide    Chapter 1 Getting to Know Your NSA    1 1 1 Front Panel LEDs    The front panel LEDs tell you important information about the NSA     Figure 2 NSA Front Panel LEDs       The following table describes the disk drive LEDs  Refer to the Quick Start Guide to see how  to install and remove hard drives from the disk trays     Table 1 Disk Drive LEDs  COLOR   STATUS   DESCRIPTION  Green Off The hard disk drive tray is empty or not connected properly     On T
219. es a RAID 1  RAID 5  or RAID 10 array to repair it  When you add a  disk to a three disk RAID 5 array  the NSA reshapes it into a four disk RAID 5 array   Resynchronizing or reshaping an array is done block by block  so the time it takes depends on  the size of your hard drive s   not the amount of data you have on them        BS Do not restart the NSA while the NSA is re sychronizing or reshaping an array  as this will cause the process to start over from the beginning again after the  NSA fully reboots        You can access data on a RAID array while the NSA is re sychronizing or reshaping it  but it  is not recommended  The performance will be slower and your data is at risk until the  resychronization or reshaping is complete     6 5 RAID Screen    Click Storage  gt  Internal Storage  gt  RAID to display the RAID array summary screen as  shown  Use this screen to manage the NSA RAID  and JBOD  arrays     Figure 128 Storage  gt  Internal Storage  gt  RAID          A elm 3      Wizards Create Rename Delete Repair Resync Add Disk Remove  Speed Hot Spare    Status   Disk RAID   Volume      NSA 2401 User   s Guide    Chapter 6 Storage Screens    The following table describes the icons in this screen   Table 25 Storage  gt  Internal Storage  gt  RAID Icons    DESCRIPTION    Wizards    Click this icon to open the Disk Setup Wizard to create a new disk array  or volume     Create    If you have disk space available for a new disk array  then click this icon to  open a screen wher
220. es this screen   Table 22 Storage  gt  Internal Storage  gt  Disk  gt  S M A R T   Brief Summary     LABEL ICON DESCRIPTION    Device Info Format Select Brief Summary to display basic information about the drive and its  status     Select Full Summary to display advanced details about the drive and its  Status     This field displays the hard drive   s temperature in degrees Celsius     Health This field displays a general rating of the hard drive   s overall operating  condition   This field displays a general rating of the hard drive   s overall operating  speed     Detail Information These fields tell you details about the hard drive  such as identification  information  They are not indicators of the hard drive   s health or  performance     Device Model This field displays the hard drive model number that uniquely identifies a  hard drive    Serial Number This field displays this individual hard drive   s serial number from the  manufacturer    Firmware Version This field displays the version number of the hard drive s internal  operating software    User Capacity This field displays the hard disk   s usable size    ATA Version This field displays the hard disk s Advanced Technology Attachment  version number    ATA Standard This field displays the Advanced Technology Attachment standard the  hard drive supports     This field displays the local time that the hard drive is using   SMART support This field displays whether or not the hard drive is SMART capable     SMART 
221. eshooting discovery 252    network  connection test 164  protocols 260  security 260    Network Attached Storage  see NAS    NFS 168  share name details 170    non admin users 180   NSA Discovery Utility  see NDU  NSA LEDs 32   NTFS 150    O    open source licences 323  Open SSL License 337  338  OpenLDAP 337   OpenLDAP Public License 337  operating humidity 260  operating temperature 260   OS X 65    P    parity 151   password 36  38  46  change screen 37  changing 46  default 36  forgot  52   Patent 353   path 43   PHP License 340   ping 164   power 89  button 33  consumption 261  failure 89  244  restart 89  resume 89  244  schedule 244   power adaptor pinout 261    power management 242  hard drive sleep time 243    Index    primary domain controller 258  print server 224  226   rename 226   tutorial 104    printer 31  proof of purchase 354    protect 96  197  backup 89  backup tutorial 92  snapshot 89    public key certificate 229  240  editing 240   publish 203   purge 200   PWR LED 32  troubleshooting 250    Q    quota for storage 178    R    RAID 31  125  132  add disk 137  background information 151  data protection 156  degraded 250  down 250  expand JBOD 137  file storage 257  four disks 134  hard drives to use 132  hot spare 137  level 139  levels 132  migrating 110  one disk 133  quick comparison 132  RAID 0 153  RAID 10 154  RAID 5 155  RAID 5 spare 155  remove 136  reshape 137  reshaping 107  resync speed 137  resynching 250  resynchronizing 135  status 134   de
222. etwork And Internet    Gr t Control Panel    Network and Internet p          se Fore PI    File Edit View Tools Help    Control Panel Home  Mi kid and Shuang Center    System and Maintenance a   Konnect to a network      View network computers and devices   Add adevicetothenetwork   Set up file sharing  security   Network and Internet n  Internet Options   Connectto theInternet   Changeyourhomepage   Manage browser add ons    Programs Delete browsing history and cookies    Hardware and Sound          NSA 2401 User   s Guide 279    Appendix B Setting Up Your Computer   s IP Address    4 Click Manage network connections     Figure 219 Windows Vista  Network and Sharing Center    Gr ue    Network and Internet p Network and Sharing Center       File Edit View Tools Help         Network and Sharing Center    View computers and devices    Connect to a network    Set up a ranna chan ar network 4        J        j   j  z hjel    Manage network connections  TWPC99111 Internet    Diagnose ana repair  This computer     a  Not connected    5 Right click Local Area Connection and then select Properties     Figure 220 Windows Vista  Network and Sharing Center    LAN or High Seeed Internet i 4  Collapse group Left Arror    Expand all groups  Collapse all groups    Disable    Status    Diagnose    Bridge Connections    Create shortcut  Delete    Rename    Ka Properties 5    mm       LS During this procedure  click Continue whenever Windows displays a screen  saying that it needs your permiss
223. f   and 2  the combination of Modifications made by that Contributor with its  Contributor Version  or portions of such combination  the licenses granted in Sections 2 2  a   and 2 2  b  are effective on the date Contributor first makes Commercial Use of the Covered  Code     Notwithstanding Section 2 2  b  above  no patent license is granted  1  for any code that  Contributor has deleted from the Contributor Version  2  separate from the Contributor  Version  3  for infringements caused by  1  third party modifications of Contributor Version or  11  the combination of Modifications made by that Contributor with other software  except as  part of the Contributor Version  or other devices  or 4  under Patent Claims infringed by  Covered Code in the absence of Modifications made by that Contributor     3  Distribution Obligations   3 1  Application of License     The Modifications which You create or to which You contribute are governed by the terms of  this License  including without limitation Section 2 2  The Source Code version of Covered  Code may be distributed only under the terms of this License or a future version of this  License released under Section 6 1  and You must include a copy of this License with every  copy of the Source Code You distribute  You may not offer or impose any terms on any  Source Code version that alters or restricts the applicable version of this License or the  recipients    rights hereunder  However  You may include an additional document of
224. f snapshots per volume     A snapshot failure  dues to low disk space for example  generates a critical log  If you enable  the mail log feature and set the level to critical log  the NSA sends an e mail alert     Click Protect  gt  Snapshot in the Navigation panel to display the following screen  Click a  column   s heading cell to sort the table entries by that column   s criteria  Click the heading cell  again to reverse the sort order     Figure 180 Protect  gt  Snapshot  gt  Snapshot Jobs  Snapshot    tr O Fa  amp     Addlob Snapshot Edit Job Take Delete  Image Snapshot Selected  ACCESS Now Jobis       Snapshot Jobs     8 napshot  Images ni    ge Hourly example  volume  Hourly de  WAITING 00        216 NSA 2401 User   s Guide    Chapter 9 Protect Screens    The following table describes the icons in this screen   Table 83 Protect  gt  Snapshot  gt  Snapshot Jobs Icons    DESCRIPTION    Add Job    Click this icon to create a new snapshot job  see also Section 9 2 3 on  page 208      Snapshot Image Access   Click this icon to open a screen where you can define where the NSA  stores the snapshot images  which also determines who can access  them         Snapshot Image Acce    Te allow Only Admin  C By Share Permission    Allow Only Admin  Store all snapshots for all of a disk array   s volumes in  a single snapshots system share  Only the administrator can access the  snapshots share by default  The administrator can change the snapshot  share   s share permissions    By Sh
225. fering the  additional rights described in Section 3 5     3 2  Availability of Source Code     NSA 2401 User   s Guide 343    Appendix D Open Source Licences    Any Modification which You create or to which You contribute must be made available in  Source Code form under the terms of this License either on the same media as an Executable  version or via an accepted Electronic Distribution Mechanism to anyone to whom you made  an Executable version available  and if made available via Electronic Distribution Mechanism   must remain available for at least twelve  12  months after the date it initially became  available  or at least six  6  months after a subsequent version of that particular Modification  has been made available to such recipients  You are responsible for ensuring that the Source  Code version remains available even if the Electronic Distribution Mechanism is maintained  by a third party     3 3  Description of Modifications     You must cause all Covered Code to which You contribute to contain a file documenting the  changes You made to create that Covered Code and the date of any change  You must include  a prominent statement that the Modification is derived  directly or indirectly  from Original  Code provided by the Initial Developer and including the name of the Initial Developer in  a   the Source Code  and  b  in any notice in an Executable version or related documentation in  which You describe the origin or ownership of the Covered Code     3 4  Inte
226. formance  hard  disk capacity usage with data protection in case of disk failure    See Section 6 4 on page 132 and Section 6 9 on page 151 for more  information on storage systems     Disk Name Select which disks should make up this RAID array  A disk can only  belong to one RAID array     RAID Label Specify a name to identify the RAID array  Use 1 to 31 characters  To  avoid confusion  it is highly recommended that each RAID use a unique  name     Acceptable characters are all alohanumeric characters  A Z 0 9  and     spaces            dashes    underscores   and      periods    The first character must be alphanumeric   The last character cannot be a space        Apply Click this button to save your changes back to the NSA   Cancel Click this button to discard your changes and close this screen        6 6 Internal Volume Screen    Click Storage  gt  Internal Storage  gt  Volume to display the internal volume summary screen  as shown  Use this screen to manage the NSA   s internal volumes     The NSA has the following classifications for the status of a volume     e Healthy if the volume is OK and the file system is functioning properly    e Unlocked when the NSA allows access to an encrypted volume    e Locked when the NSA blocks access to an encrypted volume  When a volume is locked   you  the administrator  can enter the password or insert the USB key  whichever you used  to encrypt it  to unlock the volume       Down when a volume is down and cannot be fixed  The volume
227. from  lt http   www php net  gt      THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM    AS IS  AND  ANY EXPRESSED OR IMPLIED WARRANTIES  INCLUDING  BUT NOT LIMITED TO   THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  PARTICULAR PURPOSE ARE DISCLAIMED  IN NO EVENT SHALL THE PHP  DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT   INDIRECT  INCIDENTAL  SPECIAL  EXEMPLARY  OR CONSEQUENTIAL  DAMAGES  INCLUDING  BUT NOT LIMITED TO  PROCUREMENT OF SUBSTITUTE  GOODS OR SERVICES  LOSS OF USE  DATA  OR PROFITS  OR BUSINESS  INTERRUPTION  HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY   WHETHER IN CONTRACT  STRICT LIABILITY  OR TORT  INCLUDING  NEGLIGENCE OR OTHERWISE  ARISING IN ANY WAY OUT OF THE USE OF THIS  SOFTWARE  EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE     This software consists of voluntary contributions made by many individuals on behalf of the  PHP Group     The PHP Group can be contacted via E mail at group   php net  For more information on the  PHP Group and the PHP project  please see  lt http   www php net gt      This product includes the Zend Engine  freely available at  lt http   www zend com gt      The above copyright notice and this permission notice shall be included in all copies or  substantial portions of the Software     THE SOFTWARE IS PROVIDED    AS IS     WITHOUT WARRANTY OF ANY KIND   EXPRESS OR IMPLIED  INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF  MERCHANTABILITY  FITNESS FOR A PARTICULAR PURPOSE AND  NONINFRING
228. fter a power failure before  the NSA turns on     Apply Click this to save your changes in this section   Power On Off Schedule    Enable Power Control Select this option to have the NSA turn itself off and on or reboot  Schedule according to the schedules you configure     Click Edit to go to the screen where you can configure the power control  schedules     Apply Click this to save your changes in this section     11 6 1 Power Control Schedule    Click Maintenance  gt  Power Management  gt  Edit to open this screen  where you can  configure power control schedules to have the NSA turn on  turn off  or reboot at specified  times           Figure 206 Maintenance  gt  Power Management  gt  Edit    Power Control Schedule List    Frequency   Execute Time   Actions      Er       Note     You must click on the apply button for your power control schedule  settings to apply     Add Power Control Shceduler    Type   Reboot       Frequency  Monthly         Execute Time  hh mm   0 sfo    Please select the day       Day    of the month  C  First  gt  Monday           244 NSA 2401 User   s Guide    Chapter 11 Maintenance Screens    The following table describes the labels in this screen   Table 107 Maintenance  gt  Power Management  gt  Edit    LABEL DESCRIPTION    Power Control Schedule   This table lists the power on  power off  and reboot schedules  For   List example  you could have one schedule to turn the NSA on every morning   at 8 00  another schedule to turn it off every eveni
229. ftware    FTP  Print Server  Copy Button    Log   Configuration   SSL   Fw Upgrade  Power Managemen  Shutdown       Chapter 2 Introducing the Web Configurator    Languace Ee    PET AP Fy       System Resource    System Information    cPpUUsage D iiS o  Server Name intern    CPU Sanne Model Name NS4 2401  Temperature Ss  122  F  FUTOWSES V1 00 AFF 0 b5    Version  FAN Speed 1876RPM 2167RPM 00 19 CB B9 FF 45  MAC Address BAe Gs E n  Memory 14 Used    00 19 CB B9 FF 44    Usage 36MB 256MB    FTP Server Enabled    Status  UPS N A  ERR AR        amp  volume Status    Internal Yolume      mo  Healthy 3 SSS 4 30 ne     jbodD1 volumet Normal Used       o Healthy i   74 50 GBTotal 28 50 36 48 GB Total 00 Ho    GBFree                 External Yolume    EUSB FLASH  MB  Used    DRIVE 34CB1 aoe  244 98 MB Total     77     Free    Healthy       Active Sessions       Connected at   IPAddress _  2008 09 09 13 39 30 192 168 1 33      Message    2 6 1 Global Administration Icons    The icons and language label at the top right of the screen   11  are visible from most of the  administration screens  The following table describes the    global    icons and labels     Table 13 Global Labels and Icons    LABEL ICON DESCRIPTION  Select the Web Configurator language from the drop down list box     Help    Click this icon to open a web help page specific to the screen you are currently  configuring     About  Click this icon to view the model name  firmware version and copyright     Wizards  Click t
230. g negligence    contract  or otherwise  shall you  the initial developer  any other contributor  or any distributor  of covered code  or any supplier of any of such parties  be liable to any person for any indirect   special  incidental  or consequential damages of any character including  without limitation   damages for loss of goodwill  work stoppage  computer failure or malfunction  or any and all  other commercial damages or losses  even if such party shall have been informed of the  possibility of such damages  This limitation of liability shall not apply to lability for death or  personal injury resulting from such party s negligence to the extent applicable law prohibits  such limitation  Some jurisdictions do not allow the exclusion or limitation of incidental or  consequential damages  so this exclusion and limitation may not apply to you     10  U S  government end users    The Covered Code is a    commercial item     as that term is defined in 48 C F R  2 101  Oct   1995   consisting of    commercial computer software    and    commercial computer software  documentation     as such terms are used in 48 C F R  12 212  Sept  1995   Consistent with 48  C F R  12 212 and 48 C F R  227 7202 1 through 227 7202 4  June 1995   all U S   Government End Users acquire Covered Code with only those rights set forth herein     11  Miscellaneous    This License represents the complete agreement concerning subject matter hereof  If any  provision of this License is held to be un
231. g table describes the labels in this screen   Table 103 Maintenance  gt  SSL    LABEL DESCRIPTION    Force HT TPs Select the Force HTTPs option to turn on the NSA   s web browser  security  Anyone who connects via HTTPS to the NSA must install the  public key certificate associated with it     The NSA displays a warning screen if applying your change may  disconnect some users  Click Apply if you want to continue     The following users are currently connected  If you  decide to continue  they may be disconnected     s   Share   pceenan isar    Web admin 192 168 1 33  Gonzo Gonzo 192 168  1 33       Performing this operation vill cause some  network services to temporarily disconnect     Install System Default CA   Click Download button to save a copy of the NSA S public key certificate  to your local computer  This is useful for installing the certificate without  having to connect to the NSA  or for sending by email to other users for  them to install prior to logging into the NSA for the first time  After saving  the certificate to your computer  double click it to install it     Note  Each web browser handles certificate installation  differently  See Appendix C on page 299 for more  information    Modify the Existing Select Edit a self signed CA certificate  then follow the on screen    Certificate instructions for creating a public key certificate signed by the NSA as the  local certificate authority     Note  Use certificates created and signed by the NSA if the  devic
232. ge Snapshot Image Name  Image  0  to Increase  Freespace   Snapshot CRIT The following snapshot is Snapshot Size  invalid  0   Its snapshot size is name   1 MB              Storage   INFO Disk 0  is plugged   Disk   Storage   INFO Disk 0  is unplugged   Disk   Storage   INFO An external Mass Storage  Disk device is plugged    Storage   INFO An external Mass Storage  Disk device is unplugged   Storage   INFO Create RAID  raid label  0     RAID Success   Storage   INFO Relabel RAID  Success   RAID   Storage   INFO Delete RAID  Success   RAID   Storage   INFO Start Repairing Degraded Raid   RAID Success   Storage   INFO Modify Rebuild Priority to high   RAID normal low  Success    Storage   INFO Reshape Raid5 by Adding Disk Slog ID  RAID disk 0   Success   Storage   INFO Add Hot Spare disk 0  to Raid    Disk Slog ID  RAID Success   Storage   INFO Remove Hot Spare disk 0  from   Disk Slog ID  RAID Raid  Success   Storage   CRIT Create RAID  raid label  0      RAID FAILED   Storage   CRIT Relabel RAID  FAILED   RAID   Storage   CRIT Delete RAID  FAILED   RAID    268 NSA 2401 User s Guide    Appendix A Log Messages    Table 114 Log Messages  FEATURE   SEVERITY MESSAGE   ARGUMENT S     Storage   CRIT Start Repairing Degraded Raid   RAID FAILED  Storage   CRIT Modify Rebuild Priority to high   RAID normal low  FAILED  Storage   CRIT Reshape Raid5 by Adding Disk Slog ID  RAID disk 0   FAILED  Storage   CRIT Add Hot Spare disk 0  to Raid    Disk Slog ID  RAID FAILED  Storage   CRIT Rem
233. gin    This is the rate of the magnetic heads    seek errors  A failure in the  mechanical positioning system  such as servo damage or a  thermal widening of the disk  results in seek errors  An increasing  number of seek errors indicate the condition of the disk surface  and the mechanical subsystem are worsening     Seek Time i This is an average performance indicator for the seek operations  Performance of the magnetic heads  Mechanical subsystem problems cause  this value to decrease     Power On Hours This is how many hours the hard drive has been in a power on    POH  state  The raw value lists the total number of hours  or minutes  or  seconds depending on the manufacturer     Spin Retry Count This is the total number of spin start retry attempts  This is the  number of attempts to spin up to fully operational speed the hard  drive has made when the first attempt did not succeed  An  increase in this value is an indicator of hard disk mechanical  subsystem problems     10  1    Retries first attempt did not succeed  A decrease in this value is an  indicator of hard disk mechanical subsystem problems     156 NSA 2401 User   s Guide       Recalibration i This is the number of times recalibration was requested when the    Chapter 6 Storage Screens    Table 42 S M A R T  Attributes  continued     ATTRIBUTE     NAME BETTER   DESCRIPTION  This is the number of times the hard drive has gone through a full  power on and power off   This is the number of uncorrected read errors
234. graded 134    NSA 2401 User s Guide 359    Index    down 135  healthy 134  summary 135  three disks 134  two disks 133  recycle bin 194  Redundant Array of Independent Disks  see RAID  ReiserFS 150  related documentation 3  repair 126  replacing disks 128  reset button 257  procedure 52  reset defaults 52  reshape 137  reshaping 107  restart 246  restoring  by backup files 212  by backup files tutorial 102  by backup job 209  by backup job tutorial 99  files 99    restricted   file 190   file example 88   folder 190  restrictions   on folder names 45   on replacing disks 128   on share names 45   on volume names 45  resync speed 137  resynching 134  250  resynchronizing a RAID 135  rights 353    S    S M A R T  129  attributes 156    safety warnings 6  SATA 31  257    scan  external volume 147  internal volume 140    screen  links 49  summary 49  50    secure connections 75  security 68    Self Monitoring  Analysis  and Reporting Technology   see S M A R T     Serial Advanced Technology Attachment  see SATA  server name 119    share 38  174  access 44  83  189  193  anonymous access 193  browsing 40  changing properties 43  configuration 42  conflicting access settings 175  everyone access 193  file path 43  list 186  management details 39  name details 44  name restrictions 45  paths 46  190  recycle bin 194  troubleshooting local user access 253  tutorial 59   shared folder 38   sharing 55   shut down  procedure 33   shutdown 245   sleep time 243   smb 68   snapshot 89  174
235. groups  See Section 8 3 on page 182 for details   e Create and manage shares  See Section 8 4 on page 186 for details     8 1 2 What You Need to Know About The Sharing Screens    Local User Group    A local user or group is one created on the NSA when the NSA is in workgroup mode   A  workgroup is a collection of computers on a Windows network that can share files  printers   Internet access  and so on      Domain User Group    A domain user or group is created on a centralized Windows based domain controller  This list  is used by the NSA when authenticating accounts and or groups that seek access to a share     If a user belongs to different groups with different access rights to the same share  then the  more restrictive access right applies  That is  deny access overrides read access and read write  access  For example  let   s say that user Joe belongs to the Sales group  He has read access to  the MIS share  The Sales group is denied access to the MIS share  however  Therefore  Joe is  also denied access to it due to the fact that he   s in a more restrictive group        LES More restrictive access rights override less restrictive ones        In Conflict    A user account is    in conflict    when the account name that exists on a network attached  storage device also exists on the domain controller  See Section 8 2 0 1 on page 177 for more     NSA 2401 User   s Guide    Chapter 8 Sharing Screens    Share    A share is a set of access permissions mapped to a specific f
236. gt  ACL Configuration  gt  New ACL  gt  Strategy        rrrrrnnnnrvrnnnnrvrvnnnnnevnnnnnrennnnn 86  Figure 72 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL  gt  Strategy  gt  Set ACL              eee 87  Figure 73 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL  gt  Strategy            ccccccceccseseseeeeeseeeeeeeeeaes 88  Figure 74 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL  gt  Strategy             ccccccsseceeseeeeeeeeeeeeeeeeens 88  Figure 75 Maintenance  gt  Power Management       mrannnnnnnnnennnnnnnnnnnnennnnnennnnnnnnnnnnnnnnssennnnnennnnnnnnnnsennnnsvennnn 89  Eee ES EEE ENER EG 90  Figure 77 Protect SN AL cescnssoctiwavnsersiesoviesiassisorsoscias sec raastseericsteecp eens ese 91  Figure 78 Protect  gt  Snapshot  gt  Snapshot Image ACCESS        rrrnrnnrrnvannvnvnnnrnnnnnrrnnnnsrnnnnnrnnnnnrnnnnnsrnnnnnennnn 91  Figure 7o omoa ere EA 92  MSN FE are een 92  Foure GT Protect  gt  Backup  gt  0 JOD  Step EEE 93    18 NSA 2401 User   s Guide    List of Figures    Figures PORN  gt  Backup a cl  Jarra pen 94  Figure 83 Protect  gt  Backup  gt  Add Job  Step 3 secccsctisstcceceicinnsncsictensmectivedenanariciccibactitinsiensdeGrseracaeemereias 95  Figure 84 Protect  gt  Backup  gt  Add Job  Step J sninccossnssevsaersnonunssuiannennceovereninaadsdoantncevexevesbenaieeieapensoxereres 95  Figure 85 Protect  gt  Backup  gt  Add Job  Step 4 Leiden 96  Figure 86 Protect  gt  Backup sesisissisianiedtssnsatadisrantanterdscianioniciercaubissanisaladd
237. gure the NSA to delete old backups     e Keep All Old Backups  Purge is in effect disabled  Select this if  backup space is not a concern   Keep Only __ backups  All backup files older than the last one are  deleted  You will not be able to recover files that existed  only  in those  previous backups  Select this if backup space is limited and recovery  of old files is not important   Keep Backups for _ day s   Backups older than the number of  days you enter here are deleted  0 days means that all old backups  are deleted when a new one is done     Click this button to proceed     9 2 3 1 Editing a Backup Job  Step 2       Figure 172 Protect  gt  Backup  gt  Edit Job  Step 2    Edit          Step 2       Scheduler Settings    Backup Frequency   Monthly t  Start Time hh mm  jo a  jo      Step 1  Please select the monthis  of a year    E January    February E March    April E May    June  E July    August E September E October E November    December    Step 2  Please select the day of the month    C Day     of the month     ThelFirst Monday Elof the month    previous   dene      The following table describes the labels in this screen   Table 75 Protect  gt  Backup  gt  Edit Job  Step 2    LABEL DESCRIPTION  Backup Frequency Select how often the job should run  Hourly  Daily  Weekly  or Monthly      Enter the time  day and or month as appropriate for your selection above   Click this button to return to the preceding screen   Click this button to save your changes back to the N
238. hares  gt  Add Share       dit Share          Share Name  Kermit    volume volumet  111 76 GE J   Make This Share  Kermit m   Owned By cull   Enable This Share Ed   Enable Action Log       Enable  Recycle bin kd    Share Access  Advanced w    ADEN  Now that you have created Kermit   s share  you can go through the steps again to create    another share for Gonzo  For Gonzo   s share  set the Share Access to Keep it private to  owner     3 3 How to Use Shares    Here is how people use the shares you have created  In this example Gonzo creates a folder  named    Strategy    and puts files named 2009 Plan doc and 2010 2014 Plans doc into it     3 3 1 Using a Share with Windows Explorer    Gonzo wants to use his share from his computer at the office     1 Open Windows explorer and click Tools  gt  Map Network Drive to open the Map  Network Drive screen    2 Inthe Folder field  enter two backslashes followed by the IP address of the NSA   192 168 1 35   another backslash  and the name of the share  Gonzo  and click Finish     Figure 28 Mapping a Share    Map Network Drive    l X     Windows can help you connect to a shared network Folder  and assign a drive letter to the connection so that you can  access the Folder using My Computer     Specify the drive letter For the connection and the Folder  that you want to connect to     Drive  fH     Folder   11192  168 1 351G0nzo    Browse         Example  Vserverlshare    Connect using    different user name   Create    shortcut to    We
239. he NSA creates automatic volume names for external  USB  disk volumes  These are a  type of share  so the share name you configure cannot conflict with the external  USB   disk volume names     ExtVol1    or    ExtVol2    are examples of external  USB  disk volume  names    Folder names must be unique  they cannot be the same as other folder names     The minimum character length of a name is one character  that is a name cannot be blank   The maximum character length of share name is 255 characters    Unicode is supported for share names  although your FTP client must support UTF 8  Full  support should be available in all Windows versions after Windows 2000     2 5 6 Share Paths    A share path is the full path to a folder on a volume that will be shared  for example   mynsa   topsecret ugs   This is independent from a    share name    which is the name shown for this  share when accessing the share via CIFS or FTP  The path should start with a      forward  slash  followed by a parent folder  child folders leading to the folder that is to be shared     2 5 7 Password Screen    Click Password to open the following screen  Use this screen to change an account   s  password  Enter a new password and confirm it by re entering it     Figure 14 Password    EL OT SLOT aye New Password m      F     APPIance i  Password  Confirm                te    My NSA Password Administration       Modify Password    Account Name    Old Password    Er       Er            Caution     Please keep
240. he hard disk drive is connected properly to the NSA     Blinking   The NSA is reading data from the hard disk drive or writing data    to it   Off The hard disk drive is working properly if connected     On The hard disk drive has a problem  is not installed  or you have  used the Web Configurator to eject it  shut it down      Blinking   The NSA is resynching or reshaping the hard disk drive        The following table describes the LEDs related to the NSA itself         lt  gt  The SYS LED blinks orange when firmware is being uploaded to the NSA  Do  not turn off or reset the NSA while the firmware update is in progress        Table 2 NSALEDs    COLOR   STATUS   DESCRIPTION       Green Off The NSA is turned off   The NSA is turned on and receiving power     NSA 2401 User   s Guide    Chapter 1 Getting to Know Your NSA    Table 2 NSA LEDs  continued   LED COLOR   STATUS   DESCRIPTION    SYS sams  pe NSA has passed system tests   JE The NSA is starting up or shutting down   Quick blinking indicates a RAID array is in degraded mode   Orange The NSA is unlocking an encrypted volume or there are no  volumes in the NSA     Blinking Firmware is being uploaded to the NSA     The NSA has fully booted and is operating normally     LAN1 LAN2 Green  Off  The LAN is not connected     JED NSA has a successful 10 100 Mbps Ethernet  connection     Blinking   The 100M LAN is sending or receiving packets                       Orange The NSA has a successful 1000 Mbps Ethernet connection   Bli
241. he paa 218  NNN GG me 219    14 NSA 2401 User s Guide    Table of Contents    ee EE ERE RE RE EE 220  Chapter 10  re er eg eg EAA 223  Net APATIIT PEET E AIE A ERPAT 223  10 1 1 What You Can Do In The Application Screens        rrrrrannrnnrnnnnrenvrnnnrvvrnnnnrrnnrnnnnennnnnre 223  10 1 2 What You Need to Know About The Application Screens               cccceeecceeeeeeeeeee eens 223  VET  224  ER ET EEE ENE SE 226  NTP NNN 226  TN 227  10 4 1 Changing the Copy Button Share sanere skrekk 227  Chapter 11  Maintenance Screens Lammssmmsnssnmksennmmibadddkuvkukenunekdlkdiinnkneke nd 229  NI NNN 229  11 1 1 What You Can Do In The Maintenance Screens      rrrnnrrnnnnnrvvvnnnnnnnrrnnnnnnnnnrrnnnnnnnnne 229  11 1 2 What You Need to Know About The Maintenance Screens       rrrrrnnnrvrrnnnnrrnnnnnnennnnn 229  EE RER EE EE EE NE EEE 230  EE TT NN NE NE 232  11 2 2 Log Records Configuration              ccccccssssesccceceeeeeceeeeeeeeeeeeeeeeseeeeseeeeesseeeeeeeeessaaeseeees 232  11 2 3 LE PN MN sessen 233  REE Ne EET GE EE T E 233  TT PN 236  EE pe RE SR EE ET SETE 237  11 3 1 Restoring the Configuration File sette 238  EE ER ERE EEE ER 239  Ge En EE 241  11 6 Power Management jeiicinesnicsecesiarssivescntaesvnabievesavendteneneenssuiceaseatiedensenenecnsaeeeiaiseusnebiatenecren 242  ETP NTN 244  EE 00 EEE EE 245  Part Ill  Troubleshooting and SpecificationS           rwranurrnannvrnnnnvvnnnnunen 247  Chapter 12  TN TV 249  12 1 Troubleshooting Overview 2 2      ccccccssesccccseeeeeceeee
242. he remote NSA   s IP  address  user name  password  and share name     Internal or External Select this to restore files from another volume on the NSA or a USB   Volume connected device  Specify the share name  you can browse for it      Click this button to proceed        NSA 2401 User   s Guide    Chapter 9 Protect Screens    9 3 1 Protect  gt  Restore  Step 2    Figure 177 Protect  gt  Restore  Step 2    Restore    Step Z  Select Restore Point    an recycle       Restored Time    2008 09 08 14 35 45  2008 09 08 14 37 28       The following table describes the labels in this screen   Table 80 Protect  gt  Restore  Step 2    Select Restore Point Select to which backup job and backup time you want to return  The NSA  restores the files included in the backup archive  Files not in the backup    archive are not modified     Click this button to return to the preceding screen   Click this button to proceed        NSA 2401 User s Guide    Chapter 9 Protect Screens    9 3 2 Protect  gt  Restore  Step 3    Figure 178 Protect  gt  Restore  Step 3  eee    Restore    Step 3  Please select which file s   folder s  to restore     Folder Chooser       Selected Folder  EH  4 Gonzo Gonzo Planningz  H     recycle  Gonzo Strategy   El  Planning     G 2010 2014 Plans doc     EG 2009 Plan doc  Strategy    Previous Hest       The following table describes the labels in this screen   Table 81 Protect  gt  Restore  Step 3    LABEL DESCRIPTION  Folder Chooser Select the folders you want to restor
243. he same sections as part of a whole which is a work based on the Library  the  distribution of the whole must be on the terms of this License  whose permissions for other  licensees extend to the entire whole  and thus to each and every part regardless of who wrote    it  Thus  it is not the intent of this section to claim rights or contest your rights to work written  entirely by you  rather  the intent is to exercise the right to control the distribution of derivative  or collective works based on the Library  In addition  mere aggregation of another work not   based on the Library with the Library  or with a work based on the Library  on a volume of a  storage or distribution medium does not bring the other work under the scope of this License     3  You may opt to apply the terms of the ordinary GNU General Public License instead of this  License to a given copy of the Library  To do this  you must alter all the notices that refer to  this License  so that they refer to the ordinary GNU General Public License  version 2  instead  of to this License   If a newer version than version 2 of the ordinary GNU General Public  License has appeared  then you can specify that version instead if you wish   Do not make any  other change in these notices  Once this change is made in a given copy  it 1s irreversible for  that copy  so the ordinary GNU General Public License applies to all subsequent copies and  derivative works made from that copy  This option is useful when you wish t
244. help 48  home 49    357    Index    logout 38  49  user 52  web help 38    idle timeout 225  hard drive 243    in conflict 173    internal  file system 174  hard drives 39    IP address  default 36    J    JavaScript 35  JBOD 132  152  expand 137  jumbo frames 160  161  164    L    LAN LEDs 33  troubleshooting 251  LAN1 36  LAN2 36  language 48  leave domain 168  LEDs  disk drive 32  front panel 32  NSA 32  troubleshooting 249  Leopard 65  liability 353  license 353  agreement 349  links  to screens 49  Linux 31  local  group 173  user 173  locate 146  lock 141  148  external volume 148  locked volumes 126  log 230  buzzer priority 233  classes 231  237  CSV 236  export 236    records configuration 232  report configuration 233  search 232  severity 237  logging monitoring 261  logical volume 174  manager 174  login  troubleshooting 252  username 36    logout  automatic 37  icon 38  49    Mac 65  MAC address 119    management session  timeout 37  managing  files 40  shares 43    mapping a share 61  mapping shares 61  MDI MDI X 257    message  text box 51    Microsoft Excel 236  migrating a RAID 110  mirror 203  mirroring 151  MIT License 348  mode  domain 177  workgroup 177  model name 48  119  moving share contents 42  Mozilla Public License 341    My NSA 38  changing share properties screen 43  management overview screens 42  screens 37  38  tutorial 63    My Own Shares 39    N    name details 44    358 NSA 2401 User s Guide    NAS 174  navigation panel 49    NDU 35  troubl
245. her NSA   s Backups share can be used  directly by anyone with access to that share     3 7 5 Creating an Archive Backup    To backup the NSA every week to a remote NSA   1 Click Protect  gt  Backup  gt  Add Job     Figure 86 Protect  gt  Backup    Backup       Status      gt  Os ie  ge pA 7  gt       Add Job Edit Job Delete Execute Restore Abort Job  Date Time Selected Job Now Archive   Jobis   Internal Storage  External Storage                         Currently  there are no jobs   TCP IP   Windows CIFS   HFS    Users    Groups  Chares    Backup    NeEs OE       96  NSA 2401 User s Guide    Chapter 3 Tutorials    2 Identify the backup job and select Archive     New files are often added to the shares that you need to back up and existing files are not  frequently changed so select Incremental  The NSA does a full backup first and later  only copies source files that are new and or modified since the last backup  This example  sets the NSA to do another full backup after every four incremental backups     Figure 87 Protect  gt  Backup  gt  Add Job  Step 1  Add anew backup Job    Step 1       Job Information  Job Mame   weekly backup    Job  Description        Backup Type    archive     Full       Incremental    Perform    full backup job after  4 Increments  Max  30     c Synchronization       NSA 2401 User   s Guide    Chapter 3 Tutorials    3 Select the volumel check box to select all the folders and files   Select Remote and enter the other NSA   s address  username  pass
246. her Windows shares  Since DFS is a logical  mapping  the physical location of data becomes transparent to your users and applications     You can use DFS links when accessing the NSA using CIFS  not FTP     Figure 165 Sharing  gt  Shares  gt  DFS    DES Links    DFS Root  shugs207    pa ene ee Name d l    shug2000 172 23 57 202 remote shug delete this link       Note     You must click on apply button if you add or delete a DFS link    Add DFS Links    Link Name  Remote Server IP    Remote Share Name       1194 NSA 2401 User s Guide    Chapter 8 Sharing Screens    The following table describes the labels in this screen   Table 66 Sharing  gt  Shares  gt  DFS    LABEL DESCRIPTION    Link Name Enter a name for the new DFS link  The text may consist of letters        numerals and any printable character found on a typical English language  keyboard   Remote Server IP Enter the remote server s IP address     Remote Share Name Enter a name for the new remote share  The text may consist of letters   numerals and any printable character found on a typical English language       keyboard    Add Link Click this button to add the information in Add DFS Links to the list   Delete This Link Click this button to permanently remove the associated DFS link   Apply Click this to save your changes     Cancel Click this to discard changes and close the window     NSA 2401 User   s Guide 195    Chapter 8 Sharing Screens    196 NSA 2401 User s Guide       Protect Screens    9 1 Protection Method
247. here exists a domain  group with the name  BOB     you cannot create a local group named  bob   If you enter a  group  bob  but use  BOB  when connecting via CIFS or FTP  it will use the account  settings used for    bob        The group name cannot be EVERYONE nor be the same as an existing local or domain  group  Other reserved group names that are not allowed are    e daemon   e disk   e ftp   e nobody     Ip     root   e tty     utm    NSA 2401 User   s Guide 185    Chapter 8 Sharing Screens    8 4 Shares    Click Sharing  gt  Shares to open this screen where you can create and manage shares     Figure 158 Sharing  gt  Shares    5 hares    BIER    Add Share Recycle Edit Share AZL Delete Share  Bin Properties Share Browser    user create volumel Bob private  user create volurne1 Bill private  user create   volumei Jinm private  user create volumel Fred private  user create volurel Sales private  user create volurel Sue private  user create volumel Jeff private  user create volurel nfs private    built in snapshots snapshots advanced       The following table describes the icons in this screen   Table 56 Sharing  gt  Shares Icons    Add Share    Click this icon to open the Add Share screen  where you can create new  shares  See Section 8 4 1 on page 188 for details     Recycle Bin    Click this icon to open the Recycle Bin Configuration screen  See  Section 8 4 3 on page 194 for details     Change Share Properties    Select a share from the list  then click this icon to edi
248. hey enable data transfer with less  overhead  The bigger the frame  the better the network performance     Windows CIFS    Common Internet File System  CIFS  is a standard protocol supported by most operating  systems in order to share files across the network     CIFS runs over TCP IP but uses the SMB  Server Message Block  protocol found in Microsoft  Windows for file and printer access  therefore  CIFS will allow all applications  not just Web  browsers  to open and share files across the Internet     NFS    NFS  Network File System  is a protocol most commonly used on Unix like systems in order  to share files across the network     7 2 TCP IP Screen    Teaming Mode  Here are the teaming mode settings the NSA   s two Gigabit Ethernet interfaces can use   Stand Alone  LANI and LAN2 each use a unique IP address  These IP addresses are    independent of each other     Figure 139 Stand Alone Teaming Mode       Fault Tolerance  LAN2 serves as a backup  fail over  for the LAN1  Both Gigabit Ethernet  interfaces are connected to the same subnet  There is one IP address  If LAN1 loses its  connection  LAN  takes over LAN I s IP address and traffic     160 NSA 2401 User s Guide    Chapter 7 Network Screens    Figure 140 Fault Tolerance Teaming Mode       Load Balancing  This distributes the traffic load across LAN  and LAN2  LAN  and LAN2  are on the same subnet with the same IP address  It also includes backup functionality  fault  tolerance      Figure 141 Load Balancing Teaming
249. hich you want the logs e mailed  This is the  address that appears in the e mail   s From  field     Email Server   Enter the SMTP server the NSA will use to send the e mail   Email Format   Select whether to send e mails as HTML or as plain text     Use SMTP Check this option if your SMTP mail server requires authentication in order to send  Authentication e mails  If so  then you must also fill in the Account and Password fields     User Enter the account name with which you log into your SMTP mail server     Password Enter the password for the account name with which you log into your SMTP mail  server    Password Re enter the password for the account name with which you log into your SMTP   Confirm  mail server to ensure you have entered it correctly     After applying Select this to have the NSA send an e mail so you can may sure the settings are  settings  Senda   correct and the NSA   s sending of e mail is working properly   test email    Apply Click this to save your changes   Cancel Click this to discard changes and close the window     11 2 4 2 Report Setting    This screen lets you configure which types of logs are e mailed during alerts and reports        234 NSA 2401 User s Guide    Chapter 11 Maintenance Screens    Figure 197 Maintenance  gt  Log  gt  Log Report Configuration  gt  Report Setting  Log Report Configuration    ey  a  Eraill Settini    Email Alert    P E C LJ LI LJ C E L C    Alert    Email Report    Report Time weekly Sy  Sunday      at  0     hou
250. his icon to open a sub menu of wizard s            NSA 2401 User   s Guide    Chapter 2 Introducing the Web Configurator    Table 13 Global Labels and Icons  LABEL ICON DESCRIPTION    Home    Click this icon to return to the user level  My NSA  screens        si    Logout    Click this icon at any time to exit the Web Configurator  This is the same as  clicking the Logout link at the bottom of the Navigation panel        2 6 2 Navigation Panel    The navigation panel on the left of the Web Configurator screens   2     contains screen links   Click a minus     link to hide a category   s screen links  Certain screens also contain hyper  links that allow you to jump to another screen     Click the Status icon to open the Status screen     Figure 16 Navigation Panel Links      Status    F       Date Time    Internal Storage  External Storage    TCP IP  Windows CIFS  NFS    Users  Groups  Shares    Backup   Restore  Snapshot  Backup Software    FIP  Print Server  Copy Button    Log    Configuration   SSL   Fw Upgrade  Power Managemen  Shutdown       NSA 2401 User   s Guide 49    Chapter 2 Introducing the Web Configurator    The following table describes the navigation panel links   Table 14 Screens Summary    CATEGORY SUB LINK FUNCTION   Status This screen shows system information  the status of the volumes  and the users who are currently using the NSA   System Setting   Date Time Choose a time zone and or allow the NSA to synchronize with a  time server    Storage Internal View
251. however  they can also apply to Internet Explorer on Windows Vista     1 If your device   s Web Configurator is set to use SSL certification  then the first time you  browse to it you are presented with a certification error     Figure 249 Internet Explorer 7  Certification Error    ir ake   E Certificate Error  Navigation Blocked                       There is    problem with this website s security certificate     The security certificate presented by this website was not issued by a trusted certificate  authority   The security certificate presented by this website was issued for a different website s address     Security certificate problems may indicate an attempt to fool you or intercept any data you  send to the server     We recommend that you close this webpage and do not continue to this website     Click here to close this webpage      Continue to this website  not recommended      More information       2 Click Continue to this website  not recommended      Figure 250 Internet Explorer 7  Certification Error     amp  Continue to this website  not recommended         3 Inthe Address Bar  click Certificate Error  gt  View certificates     Figure 251 Internet Explorer 7  Certificate Error  ov b  l Certificate Error      RJ Certificate invalid  The security certificate presented by this  website has errors     This problem may indicate an attempt to  fool you or intercept any data you send to  the server     We recommend that you close this  webpage     About certific
252. hts under this License  However   parties who have received copies  or rights  from you under this License will not have their  licenses terminated so long as such parties remain in full compliance     5  You are not required to accept this License  since you have not signed it  However  nothing  else grants you permission to modify or distribute the Program or its derivative works  These  actions are prohibited by law if you do not accept this License  Therefore  by modifying or  distributing the Program  or any work based on the Program   you indicate your acceptance of  this License to do so  and all its terms and conditions for copying  distributing or modifying  the Program or works based on it     6  Each time you redistribute the Program  or any work based on the Program   the recipient  automatically receives a license from the original licensor to copy  distribute or modify the  Program subject to these terms and conditions  You may not impose any further restrictions on  the recipients    exercise of the rights granted herein  You are not responsible for enforcing  compliance by third parties to this License     7  If  as a consequence of a court judgment or allegation of patent infringement or for any  other reason  not limited to patent issues   conditions are imposed on you  whether by court  order  agreement or otherwise  that contradict the conditions of this License  they do not  excuse you from the conditions of this License  If you cannot distribute so as to
253. i 49  KE TT 0 EN EEE EE 51  2 6 4 Status Messages aiainciinincaiaticiseeniciucactniacssinnaladisisaidebinnssiadenitsnenabstiadcehabduemasialiadeeeraseds 51  NN NNN eske 51   Fe  eer tee EY aN STETA 52  EE NE NE i E E AN ARR A E EN E ee 52  2 7 2 Reload Factory Default Configuration File vasseemimmomnenvaresmnmdmken  enet 52   Chapter 3  PE A EEE E E E AET EE EN A TE 55   BEE REE EE EE E A ANE EEE A 55   Lg EGP ea EE pees dared EE RE 55  3 2 1 SV User AN ic tacrcncaicieressadsireperaansitapanecisneyeshedsaveiakiensinaysnaclenepesnosastanscneasi 55  ERE AE 9   2 a E ee Meer eee eee Meee S 58  NN Nebe 59   NTN NN 61  3 3 1 Using a Share with Windows Explorer        rrrrnrrnnnnnnorvnnnnnnnnrrnrrnnnnnnrnvnnnnnnnssennnnnnnnnennnnnnn 61  3 3 2 Using a Share with a Web Browser        rrranrnrvrrnnnnrnnnnnnnrvnnnnnrrnnnnnnnennnnnnrrnrnnnsrnnnnnsnsennnnn 62   3 4 How to Find the NSA in OS X    rrrannnrnnnnennnnnennnnnennnnnsennnnnennnnnsnnnnnennnnnsnnnnnsnnnnnsennnnnennnnnennnnnsen 65   NNN keen 68  3 5 1 Configuring Security for Web Configurator Sessions        rrrrrrrrnnrrrvrnnnnrrnrrnnnrenrnnnsrrnnnnn 68  3 5 2 Using PIPES NN to the NSA ee 81  3 5 3 Controlling Access to Shares  Folders  and Files              ccccccccceccesseeeeeeeeeeeeseseeeeeaees 83   PT E E N 89   3 7 Fow to Use Backups and SACI  veken 89  NNN 90  3 7 2 Configuring Snapshot Image ACCESS            ccccccccsseeeceeeeceeeeeeeeeeceeeeeceeeeseaeaeeeeeeeseaaeeeees 91  3 7 3 Using    Snapshot Image to Restore Files sc
254. ibrary  complete source code means all the source code for all modules it contains  plus  any associated interface definition files  plus the scripts used to control compilation and  installation of the library  Activities other than copying  distribution and modification are not  covered by this License  they are outside its scope  The act of running a program using the  Library is not restricted  and output from such a program is covered only if its contents  constitute a work based on the Library  independent of the use of the Library in a tool for  writing it   Whether that is true depends on what the Library does and what the program that  uses the Library does     328 NSA 2401 User s Guide    Appendix D Open Source Licences    1  You may copy and distribute verbatim copies of the Library s complete source code as you  receive it  in any medium  provided that you conspicuously and appropriately publish on each  copy an appropriate copyright notice and disclaimer of warranty  keep intact all the notices  that refer to this License and to the absence of any warranty  and distribute a copy of this  License along with the Library  You may charge a fee for the physical act of transferring a  copy  and you may at your option offer warranty protection in exchange for a fee     2  You may modify your copy or copies of the Library or any portion of it  thus forming a  work based on the Library  and copy and distribute such modifications or work under the  terms of Section I above
255. ield  and then click Apply     Get from Time Server Select this to have the NSA get the time and date from the time server you  select in the Time Server Address field    Time Server Address Select a time server from the drop down list box  Check with your ISP   network administrator if you are unsure of this information    Synchronize Now Click this button for the NSA to retrieve the correct time from the  configured time server right away     Choose the NSA   s time zone     Enable Daylight Saving Daylight saving is a period from late spring to early fall when many  countries set their clocks ahead of normal local time by one hour to gain  more daytime light in the evening     Select this option if you use Daylight Saving Time     Start Date Configure the day and time when Daylight Saving Time starts if you  selected Enable Daylight Saving  The hour field uses the 24 hour  format  Here are a couple of examples    Daylight Saving Time starts in most parts of the United States on the  second Sunday of March  Each time zone in the United States starts  using Daylight Saving Time at 2 A M  local time  So in the United States  you would use March   Second Sunday   at 2 00    Daylight Saving Time starts in the European Union on the last Sunday of  March  All of the time zones in the European Union start using Daylight  Saving Time at the same moment  1 A M  GMT or UTC   So in the  European Union you would select March   Last Sunday   The time you  specify depends on your time zon
256. iew the NSA system logs and configure where to send log and  report emails     Configuration   Manage the NSA configuration file   SSL Configure HTTPS and the NSA   s SSL certificate  F W Upgrade   Upload new firmware to your NSA     Power Set the hard drive sleep timer  Management    Shutdown Restart your NSA or turn it off     Logout Click Logout to exit the Web Configurator  This is recommended  to prevent unauthorized administrator access to the NSA     J UJ  OD pe   2  2  O C  oO D       50 NSA 2401 User s Guide    Chapter 2 Introducing the Web Configurator    2 6 3 Main Window    The Web Configurator   s main window   8   shows the screen you select in the navigation  panel  It is discussed in the rest of this document     The Status screen is the first administration screen to display  See Chapter 4 on page 117 for  more information about the Status screen    2 6 4 Status Messages  The message text box at the bottom of the screen      displays status messages as you  configure the NSA    2 6 5 Common Screen Icons    The following table explains some icons that appear in several configuration screens   Table 15 Common Configuration Screen Icons    ICON DESCRIPTION    wizard    Click this icon to open the Disk Setup Wizard to create a new disk array or volume     Eject  Select a hard drive and click this icon to shut it down  Do this before removing a hard  drive to help increase its usable lifetime     Note  Ejecting a disk from a JBOD or RAIDO array causes the array to
257. igure 146 Network  gt  Windows CIFS  Workgroup             cccccsseeecceeeeeceesceseeecaaaeeeseeeaeeeesseeeeessaeeessaaaes 166  Figure 147 Network  gt  Windows CIFS  Domain  scctesassrarerpeasiasestinssiesciioisrersermasionsanerndisianainaaienths 167  PT E a a a E A E E E E E E ena as EE ene eo ener 168  Figure 149 Network  gt  NFS  gt  Add NFS Share siete recdninieninidinernvi igieiainierininiosducisdaaeNienaneieieneast 169  Figure 150 Network   NFS s NFS Yee carte ira A 170  ETE EEE EEEE E 175  Figure 152 Shanng  gt  Users s Add User eee a e r aO 178  Figure 193 MY NDA eee GN 180  PEE TTF a O a E R 180  Figure 155 Sharing  gt  Users  gt  User Information             ccccccssssssseeeeeeeeeeeeeaaesssseceeeeeeeeseaseeeeeeeeseesaaeageeeess 181  SNE EE 182  Figure 157 Sharing  gt  Groups  gt  Add a New Local Group ssasssmesemsssmamstinejernemnarensievne 184  PO Toe S S Ne 186  Figure 159 Sharing  gt  Shares  gt  Create a New Share       mmrrrrnnnnnnnnnnnsvnnnvvvnnnnnnnnnsennnnnvrnnnnnnnnrnnsennnnnnnnnnnn 188  Figure 160 Sharing  gt  Shares  gt  Create a New Share  gt  Share Access Configuration                 0 cc 189  Figure 161 Sharing  gt  Shares  gt  ACL Configuration             cccccccceeceeeeecceeeaeeeeeeeeeeeeeeaaeasaeeeeeeeeeeeseaeeaeeess 190  Figure 162 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL Configuration          errrnrrrvrnnnnrvennnnvrrennnn 191  Figure 163 Shares  gt  ACL Configuration  gt  New ACL Configuration  gt  ACL Permission                 
258. igure 253 Internet Explorer 7  Certificate Import Wizard             rrrrrrrrnnnrorvrrrnnnnnrrvnrnnnnnnrrnnrnnnnnnsrennnnnsnnee 301    NSA 2401 User   s Guide    List of Figures    Figure 254 Internet Explorer 7  Certificate Import Wizard            rrernrrrannnnrrnnrnnnnnrrvnnnnnnnnnrnnrnnnnnnsennnnnnnnnee 302  Figure 255 Internet Explorer 7  Certificate Import Wizard         rrrrrnnnnrevrnnnnrvnvnnnnvnnrnnnnrnnrnnnrennnnnenrennnnnnenn 302  Figure 256 Internet Explorer 7  Select Certificate Store             cccccccccccccsssseeeeeeeeeeeaueaeeseeeeeeeeeseaaaaaeeeeess 302  Figure 257 Internet Explorer 7  Certificate Import Wizard LQjessumesenmaselnikasekeaniemevieddejninv 303  Figure 258 Internet Explorer 7  Security Warning             cseeeecceceeeeeeeeeceeeeeeseeeeeeeeaeaseeeeeesasaeeeeseeseaseeeeeeees 303  Figure 259 Internet Explorer 7  Certificate Import Wizard           rrnnvvvnnnnnnnvnnrrnnnnnvvnnnnnnnnnvrnnnnnnnnnnrnnnnnnnnnee 304  Figure 260 Internet Explorer 7  Website Identification             rrrrnrrnnnnnnnnrvvnernnnnnnvrnvnvnnnnrnvnnnnnnnnnnvnvnvnnnnsnene 304  Figure 261 Internet Explorer 7  Public Key Certificate File        rrrrrnrrrnnnrnrvnrrrnnnnrvvnvrnnnnnrvvnvnnnnnnnrrnvnnnnnnnee 305  Figure 262 Internet Explorer 7  Open File   Security Warning             ccccccssscceceeessseeeeeeeeesseeeeeeenaseeeeeenes 305  Figure 2693 Internet Explorer 7  Tools ERE 306  Figure 264 Internet Explorer 7  Internet Options               cccccessssecceeesseeeeeeceeeseeeeesee
259. ime  the NSA deletes files according to the purge policy setting before doing the  back up  If space on the backup NSA is a concern  then configure the NSA to delete old  backups     After purging old backups  the NSA does not check if enough space is available before backup  commences  The NSA starts transferring files and if not enough space is available  it issues a  log or alert to tell you that the backup failed  due to lack of space  and deletes any files already  transferred     A full backup copies all files from your NSA to the backup device  It may take some time  depending on how many files you have to back up     See also this related information     e Snapshots Versus Backups on page 199 for a comparison of backups and snapshots   e Section 6 9 8 on page 156 for a comparison of backups and RAID   e Section 9 1 on page 197 for an overview of protection methods available on the NSA        LES To best protect data  back up data to another NSA or computer or an external  hard drive  and store in an off site location        9 2 1 Backup Summary    Click the Backup link in the Navigation panel to access the Protect  gt  Backup summary   screen  This screen shows a list of all backup jobs created and scheduled  You can also edit or  delete an existing backups or create a new one from here  Click a column   s heading cell to sort  the table entries by that column   s criteria  Click the heading cell again to reverse the sort order     NSA 2401 User   s Guide    Chapter 9
260. ini randsi 144  Table 32 Storage  gt  External Storage  gt  Disk ICONS                 cc cccccsseececcceeeeescceseececseneeesceereeeseeseeesscoeeees 146  Table 33 Storage  gt  External Storage   DISK SE 146  Table 34 Storage  gt  External Storage  gt  Volume ICONS ou    eecccceecceeeeeceeeeeeceeeeceeueeeeseeeesseneeeeaeeeeeaes 147  Table 35 Storage  gt  External Storage  gt  Volume        rrrrrnnnnnnnnrnnnnnnnnnnrnnnnnnnnnennnnnnnnnnnnnnrnnnnrrnnnrnnnnseennnnnnn 148  Table 36 Storage  gt  External Storage  gt  Volume Create        rrrrnrnrrnnnnevrrnnnnenrnnnnrrnnrnnnennnnnnnrnnnnnnnennnnnnnene 149  TEN ee 182  TETT 2 aa ee tnenreT Hern Cere eee ee er Mente Pi atRRrTE a RErE Cea ae RoR I S 153    NSA 2401 User   s Guide    List of Tables    FE AN Te 153  TE NN stctargnscn pte ae or tetedecreee cee eatin eee eadevneuiy antici ER 154  TEN en 155  TRES MART MN seisseen e ia 156  Table 43 Network  gt  TCP IP sicsseiccissetecssinsniscvessniserasasdtnaiasenssnnaiensdccinstedsdianmeanienceisasasasianetenediensiessabannaade 163  Table 44 Network   Wind  ows GIFS  EE erorar rns dan r dE SEA EEES E nE ieee 167  TN aea o i NTE EEE E E E T E E T E T 168  TORS NOR S NFS o eae eS a ae eee re Seen eee ee ara OR earn eer eer ee 169  Tables  He s NFo s GU NFS SMIG RE a NE 170  Table 48 Network  gt  NFS  gt  NFS Session       aannnannnnnnnnnnnnnnnnnnnnnnonrrnsnrrrnnrnsenrrsnrnnnnernnrrnnnrrnnrrnnnrrrnnrnnnrrene 171  Toe Se Shaina s gt  Users EOTS EEE 175  Table 50 Sharing  gt  USOS ee EEE a 17
261. ion  of liability     13  Multiple licensed code    Initial Developer may designate portions of the Covered Code as    Multiple Licensed          Multiple Licensed    means that the Initial Developer permits you to utilize portions of the  Covered Code under Your choice of the MPL or the alternative licenses  if any  specified by  the Initial Developer in the file described in Exhibit A     Exhibit A   Mozilla Public License      The contents of this file are subject to the Mozilla Public License Version 1 1  the   License      you may not use this file except in compliance with the License  You may obtain a  copy of the License at http   www mozilla org MPL     Software distributed under the License is distributed on an    AS IS    basis  WITHOUT  WARRANTY OF ANY KIND  either express or implied  See the License for the specific  language governing rights and limitations under the License     The Original Code is  The Initial Developer of the Original Code is  Portions created by are Copyright  C     All Rights Reserved   Contributor s    Alternatively  the contents of this file may be used under the terms of the license  the      __  License      in which case the provisions of     License are applicable instead of  those above  If you wish to allow use of your version of this file only under the terms of the      License and not to allow others to use your version of this file under the MPL  indicate    your decision by deleting the provisions above and replace them with th
262. ion 2 7 on page 52 for  detailed information on the reset button        pa The NDU cannot discover my NSA     NSA 2401 User s Guide       Chapter 12 Troubleshooting    e Confirm that the computer running the NDU has a network connection  See the section on  the NSA   s LAN connection for related information     The computer running the NDU can only discover NSAs in the same subnet  NSAs  connected to the same switch or router as your NDU computer are usually in the same  subnet unless the router is doing subnetting or the switch 1s implementing VLAN    The Genie Backup program uses the same network port as the NDU to discover the NSA     To avoid a port conflict  do not run the Genie Backup Manager at the same time as the  NDU        pa    non admin user wants to change her password        Non admin users can change their passwords directly  See Section 2 5 7 on page 46 for details  on how to do that        o   cannot see or access the Login screen in the Web Configurator        Make sure you are using the correct IP address     e 192 168 1 3 is the default LANI IP address and 192 168 100 1 is the default LAN2 IP  address     e If you changed the IP address  use the new IP address     e If you changed the IP address and have forgotten it  see the troubleshooting  suggestions for    I forgot the IP address for the NSA     on page 251     Check the hardware connections  and make sure the LEDs are behaving as expected  See  the Quick Start Guide and Section 1 1 1 on page 32     
263. ion in  which you bought the device  See http   www zyxel com web contact_us php for contact  information  Please have the following information ready when you contact an office    e Product model and serial number    e Warranty Information    e Date that you received your device    e Brief description of the problem and the steps you took to solve it     NSA 2401 User   s Guide    Document Conventions    Document Conventions    Warnings and Notes    These are how warnings and notes are shown in this User   s Guide         lt  gt  Warnings tell you about things that could harm you or your device           LS Notes tell you other important information  for example  other things you may  need to configure or helpful tips  or recommendations        Syntax Conventions  e The NSA may be referred to as the    NSA     the    device    or the    system    in this User s  Guide   Product labels  screen names  field labels and field choices are all in bold font   e A key stroke is denoted by square brackets and uppercase text  for example   ENTER   means the    enter    or    return    key on your keyboard   e    Enter    means for you to type one or more characters and then press the  ENTER  key      Select    or    choose    means for you to use one of the predefined choices     A right angle bracket   gt    within a screen name denotes a mouse click  For example   Maintenance  gt  Log  gt  Log Setting means you first click Maintenance in the navigation  panel  then the Log sub menu 
264. ion to continue           280 NSA 2401 User s Guide    Appendix B Setting Up Your Computer   s IP Address    6 Select Internet Protocol Version 4  TCP IPv4  and then select Properties     Figure 221 Windows Vista  Local Area Connection Properties          i AEE Area Connection Properties      Networking      Connect using     S Intel R  FROATODD MT Desktop Connection          Configure        This connection uses the Following items        vok  S Client for Microsoft Networks    A E Network Montord Driver     amp  File and Printer ee for Microsoft Networks  h  l    Intern men   arg Internet Protocol Version 4  TER AR v4  re    h  l    Link Laper Topology Discovery                      Mapper LO Driver    l    Link Layer Topology Discovery Responder      Install    Urinstall   Properties J    Description    Transmision Control Protocol  nternet Protocol  The default  wide area network protocol that provides communication  across diverse interconnected networks       OF    Cancel         NSA 2401 User   s Guide 281    Appendix B Setting Up Your Computer   s IP Address    7 The Internet Protocol Version 4  TCP IPv4  Properties window opens     Figure 222 Windows Vista  Internet Protocol Version 4  TCP IPv4  Properties     Internet Protocol Version 4  TCP IPv4  Properties  P  se             General   Alternate Configuration            You can get IP settings assigned automatically if your network supports    Ehis capability  Otherwise  you need to ask your network administrator  
265. iously saved login information that may be different to NSA login     Check that the array in which the share resides  exists and is not down or degraded  If the  array is down or degraded  see Section 12 2 on page 249     e If the user is using DFS links  then he can only access the NSA using CIFS and not FTP   Check that the share has not been disabled             pa   cannot import domain user or user group information even though testing of  the connection to the domain controller is OK        e Check the NSA   s DNS setting  The DNS server the NSA is using must be able to resolve  the domain controller   s address  If the domain controller uses a private IP address  the  NSA needs to use a private DNS server  If the domain controller uses a public IP address   the NSA needs to use a public DNS server     NSA 2401 User   s Guide    Chapter 12 Troubleshooting    e Leave the domain and re join it        pa A domain user can t access a share        In addition to the checks listed previously for local users  check that the domain controller is  turned on and connected to the network           A user can access a share but cannot access individual folders or files within  the share        Check the Access Control List  ACL  of read write permissions associated with the share   s  specific files and or folders  Account names added to the list are linked to the files and folders  that they are allowed to access  along with what kinds of actions they are allowed to perform  with
266. is field displays whether the group is a local group or a domain group     Group Name This field displays the group name     8 3 1 Add a New Local Group  amp  Change Group Properties    To create a local group  click Sharing  gt  Groups  gt  Add Group   To edit an existing local group  click Sharing  gt  Groups  gt  Edit Group     The group creation and group editing screens are identical in appearance     Figure 157 Sharing  gt  Groups  gt  Add a New Local Group    Add a New Local Group    Group Name       Description      Available User s   Group Membership    Group Membership       The following table describes the labels in this screen   Table 55 Sharing  gt  Groups  gt  Add a New Local Group    LABEL DESCRIPTION    Group Name Enter a local group name  The text may consist of up to 16 letters   numerals and any printable character found on a typical English language  keyboard  with certain limitations due to the nature of the NSA system     See Section 8 3 1 1 on page 185 for more details on account names     Group Membership Choose which user accounts should be added to or removed from this    group  You can select multiple user accounts by holding the  Ctrl  key  while you Click    A group is a set of users that have common NSA access rights  A user  can belong to more than one group     Description Enter details about the user group  The text may consist of up to 110  letters  numerals and any printable character found on a typical English  language keyboard except quo
267. is the NSA firmware version and the date created  Click the Update  link to go to the Maintenance  gt  FW Upgrade screen where you can  upload new firmware     MAC Address This displays the unique network adapter Media Access Control numbers  of the NSA   s Ethernet ports  Every device on your network has a different  MAC address     FTP Server Status This lets you know whether the FTP server is enabled or disabled     Click the Edit icon to go to the Applications  gt  FTP screen where you can  change your FTP settings     Velie Sat a    Internal Volume This displays the disk arrays and volumes created on the hard drives  installed in the NSA   The first icon represents a disk array  The text below the icon shows the  array s status  Healthy  Resynching  Degraded or Down   followed by  it s name  type  total storage capacity  and free storage capacity   The second column of icons represents the storage volumes on the array     CPU Temperature          Firmware Version          The text below the icon shows the volume   s status  Healthy  Locked   Unlocked  or Down     The following columns display the volume   s name  whether the volume is  encrypted  CRYPTO  or not  NORMAL   the total size of the volume  how  much is currently in use  and how much is still available        NSA 2401 User   s Guide 119    Chapter 4 Status Screen    Table 17 Status  continued   LABEL DESCRIPTION    External Volume This displays the volumes created on USB hard drives connected to the    NSA  USB
268. ission screen  See Section 8 4 2 2 on page 192 for details     Unrestricted Folder  This is a folder that has no ACL permission set     Restricted Folder  7 This is a folder that has ACL permissions set   i Unrestricted File    This is a file that has no ACL permissions set   E Restricted File  7 This is a file that has its ACL permissions set        NSA 2401 User   s Guide 191    Chapter 8 Sharing Screens    The following table describes the labels in this screen     Table 63 Sharing  gt  Shares  gt  Create a New Share  gt  Share Access Configuration    LABEL DESCRIPTION    Type This indicates whether the item in the list is a folder or file  as well as  whether it is locked or unlocked    Name This indicates the file or folder   s name on the share    Size This indicates the file or folder   s size on the share in kilobytes     Modified Date This indicates when the file or folder was last altered on the share  When  a file is uploaded to the NSA that is classified as a    modification    as it is  considered newly written data by the device        Close Click this to close the screen     8 4 2 2 ACL Permissions    Use this screen to set who can access the selected folder or file     Figure 163 Shares  gt  ACL Configuration  gt  New ACL Configuration  gt  ACL Permission  OO    ACL Permission    Target  Test MyTest  ACL Options      _  Apply to all directories and files under this folder     Available User s  Groupts      lt LOCALUSERS gt   lt LOCALUSERS gt   admin  lt DOMAIN
269. ity is  another way to allow data recovery in the event of disk failure using calculations rather  than duplicating the data  If you have    n    pieces of data  parity computes an extra piece of  data  The   n 1    pieces of data are stored on    n 1   drives  If you lose any one of the    n 1     pieces of data  you can recreate it from the    n    that remain  regardless of which piece is    NSA 2401 User   s Guide    Chapter 6 Storage Screens    lost  Parity protection is used with striping  and the    n    pieces of data are typically the  blocks or bytes distributed across the drives in the array  The parity information can either  be stored on a separate  dedicated drive  or be mixed with the data across all the drives in  the array        LES In the following figures  A1  A2  A3 and so on are blocks of data from the A file   Similarly  B1  B2  B3 and C1  C2  C3 ar blocks of data from the B and C files        6 9 2 JBOD    e Minimum number of disks  I  e Total capacity  Sum of the member disks    e Advantages  Maximum storage capacity  especially for disks of mixed sizes  Flexibility   you can add disks to the JBOD    e Disadvantages  Not as fast or reliable as RAID     JBOD allows you to combine multiple physical disk drives into a single virtual one  so they  appear as a single large disk  JBOD can be used to turn several different sized drives into one  big drive  For example  JBOD could convert 100 GB  200 GB  250 GB  and 500 GB drives  into one large logical drive
270. l parts during  operation   L This is the total number of load cycles     This is the total time that the magnetic heads actuator has had a    Ww  OW  OW  OW   load  not been in the parking area    OW    227   Torque  Amplification    L       Count  228   Power Off  Retract Cycle  230   GMR Head  Amplitude    240   Head Flying  Hours    250   Read Error Retry   Low  Rate    This is how many times the magnetic armature was automatically  retracted because the power was cut     This is the amplitude of thrashing  or the distance of repetitive    Low  forward and reverse head motion    OW    This is the hard drive   s temperature     This is the total time that the head has been positioning     This is the number of errors in reading from the disk     NSA 2401 User   s Guide       Network Screens    This chapter discusses the network screens     7 1 Network Screens Overview    Use the network screens to configure the NSA   s network settings so computers can access it     7 1 1 What You Can Do in the Network Screens    e Use the TCP IP screen  Section 7 2 on page 160  to configure the NSA   s TCP IP network  connection settings such as the teaming mode and IP addresses    e Use the Windows CIFS screens  Section 7 3 on page 164  to configure CIFS settings  such as your Windows CIFS server name and workgroup name so programs like Windows  Explorer can access the NSA    e Use the NFS screens  Section 7 4 on page 168  to configure NFS settings so computers  using the NFS file system
271. ld service or disassemble this device    Make sure to connect the cables to the correct ports    Place connecting cables carefully so that no one will step on them or stumble over them   Always disconnect all cables from this device before servicing or disassembling    Use ONLY an appropriate power adaptor or cord for your device    Connect the power adaptor or cord to the right supply voltage  for example  110V AC in  North America or 230V AC in Europe     Do NOT allow anything to rest on the power adaptor or cord and do NOT place the  product where anyone can walk on the power adaptor or cord    Do NOT use the device if the power adaptor or cord is damaged as it might cause  electrocution    If the power adaptor or cord is damaged  remove it from the power outlet    Do NOT attempt to repair the power adaptor or cord  Contact your local vendor to order a  new one    Do not use the device outside  and make sure all the connections are indoors  There is a  remote risk of electric shock from lightning    CAUTION  RISK OF EXPLOSION IF BATTERY  on the motherboard  IS REPLACED  BY AN INCORRECT TYPE  DISPOSE OF USED BATTERIES ACCORDING TO THE  INSTRUCTIONS  Dispose them at the applicable collection point for the recycling of  electrical and electronic equipment  For detailed information about recycling of this  product  please contact your local city office  your household waste disposal service or the  store where you purchased the product    Do NOT obstruct the device ventilation
272. lders in the target that are  different From the source content will be DELETED       re vou sure the target is empty     Cancel      5 For this example  assume the connection to the German branch office is a good one and  not many files need to be backed up so leave the compression off     e Turn on the encryption to protect these sensitive files during the transfer  The final  files stored on the remote NSA will be unencrypted  usable      e Restrict the bandwidth usage to 256 KB s to stop the archives from using all of your  network connection   s available bandwidth     e You don   t have to configure a purge policy for a synchronization backup   e Click Next     Figure 84 Protect  gt  Backup  gt  Add Job  Step 3    Add anew backup Job    Step 3    Compression    C Yes  ir Mo  Encryption    Use Encrypted Connection  G Yes    C no      Bandwidth   256 KBs  0   No Limit   Purge Policy    te Keep All Old Backup files  z Keep Only the last   backup files 1 30     C keep Backups For   day sif1 3650           NSA 2401 User   s Guide 95     Chapter 3 Tutorials    6 Schedule the backup to occur every morning at 3 00 and click Done     Figure 85 Protect  gt  Backup  gt  Add Job  Step 4  Add anew backup Job    Step 4       Scheduler    Backup Day     sid    Frequency    Start    H a  Time  hhirmd  i jo    Every how many days  fi       You do not need to use a special restore process to use the files a synchronization backup  creates  The copy of files that the NSA creates on the ot
273. le describes the labels in this screen   Table 26 Storage  gt  Internal Storage  gt  RAID  LABEL DESCRIPTION  Label This field shows the name of the array     RAID Level This field shows which type of data storage system  a RAID level or    JBOD  the array is using  See Section 6 4 on page 132 for details on the       different levels     Capacity This field shows the total size of the array  how much is currently in use   and how much is still available     Disk This field shows the hard disks that are in the array     Hot Spare If the array has a standby disk  this field identifies it     6 5 1 Creating a New RAID    Click the Create icon in the RAID screen as shown in Figure 128 on page 135 to create a new  RAID array     Figure 129 Storage  gt  Internal Storage  gt  RAID  gt  Create    RAID Level  raid           diski    disk   disk3 disk4    RAID Label         Disk Mame    ud es    138 NSA 2401 User   s Guide    Chapter 6 Storage Screens    The following table describes this screen   Table 27 Storage  gt  Internal Storage  gt  RAID  gt  Create    LABEL DESCRIPTION    RAID Level Use JBOD or RAID 0 if you want maximum capacity and or maximum  speed for your disks  and or you have other means of protecting your  data    Use RAID 1 to mirror primary data to another disk s  with high  performance    Use RAID 5 with three disks to balance performance  hard disk capacity  usage with data protection in case of disk failure    Use RAID 10  or RAID 5 with four disks to balance per
274. les  By default  only the  administrator can access the snapshot images  You want to allow users to access snapshot  images in the shares that they use     Click Protect  gt  Snapshot  gt  Snapshot Image Access to open the following screen  Then  select User Share Permissions and click Apply     Figure 78 Protect  gt  Snapshot  gt  Snapshot Image Access  PEPPER ee    Snapshot Image Access Settings    C Allow Only Admin       User Share Permissions  Ollow other users to access images    Inside each share in     snap share  folder         3   3 Using a Snapshot Image to Restore Files  To use a snapshot to restore files  use the MyNSA screens  CIFS  Windows Explorer   or FTP    to browse to the folder named    snap share        Open or copy the folder or file that you want to  restore     NSA 2401 User   s Guide 91    Chapter 3 Tutorials    For example  Gonzo accidently overwrote his 2009 Plan doc file     Use Windows Explorer to browse to the Gonzo share   The Quick Start Guide covers how to  map a share to a Windows network drive      Figure 79 Using a Snapshot Image      Address    I snap shareltake  080904160008 hourly example SyearPlan  Folders    p l pr z  EE Gonzo on  172 23 37 110   1   a        4   2009 Plan doc    HC SyearPlan   2010 201 4 Plans dac    HO         This folder is Online    PP PP GJ Strategic Fartners l o   e There is a snap share folder with a folder for each snap shot of volume contents to which  Gonzo has access  A snap shot folder   s name identifies 
275. lets you continue  Yes in this example         Figure 102 Printer Connected to NSA  Windows Explorer Warning  EF    i  Before you can use the printer 11192 168 1 21Canon PRT 1  it must be set up on your computer  Do you want Windows to set up the printer and continue  this operation        6 If your computer does not already have the printer   s driver installed  you will need to  install it  In this example  click OK     Figure 103 Printer Driver Needed    Connect to Printer       7 Use the wizard screens to install the printer driver on the computer  You may need to get  the file from the printer   s CD or the printer manufacturer   s website  the driver is not  installed on the NSA         LES You must install the printer driver on each computer that will use the printer        NSA 2401 User   s Guide 105    Chapter 3 Tutorials    Figure 104 Applications  gt  Print Server  x    Select the manufacturer and model of your printer   fF your printer came with  an installation disk  click Have Disk  If your printer is not listed  consult your  printer documentation for a compatible printer     Manufacturers  Printers     AGFA   rccuset vad  3  AGFA AccusetSF v  z 3  AGFA Accuset 800  AGFA AccuSet 8005F   52 3  AGFAa Accuset 8005F v2013 108  AGFA Accuset 1000     AGFAa AccuSet 10005F v  2 3       Have Disk       i Cancel      After the driver installation finishes  the computer is ready to use the printer  Select the printer  in an application to use it to print  Browse to the NS
276. levels are low        BS If the new hard drives have any data you want to keep  back it up to another    location before you install them  Adding these hard drives to a disk array  formats them so all data stored on them will be lost        To migrate a RAIDS array to a higher capacity hard drive     110 NSA 2401 User s Guide    Chapter 3 Tutorials  1 Click Storage  gt  Internal Storage  gt  Disk to list the installed disks  Select a disk to  replace first  disk 1 in this example  and click Eject     Figure 114 Storage  gt  Internal Storage  gt  Disk    Internal Storage    aN    Wizards         Status           Type   Ype RAID Array Model Name Capacity      raids rald5sDiD3D4 WDC WOSO00484V5 002TB 01 0 465 76 GB  Healthy       2 Click Apply     Figure 115 Storage  gt  Internal Storage  gt  Disk  gt  Eject  Eject Disk      re you sure to eject the disks     Performing this operation will cause some network    services to temporarily disconnect        Cancel       3 Remove the hard drive  The NSA sounds an audible alarm     4 Log out of the Web Configurator and then back in  The Log Message screen shows that  the RAID is degraded  click Turn Off Buzzer to stop the audible alarm  Then click OK  to continue     Figure 116 Storage  gt  Internal Storage  gt  Disk  gt  Eject    Log Message    Time   class  severity    Messane    q 2008 09 01    14 44 02 storage emerg There is    RAID Degraded     EE   Turn OG Burzer       NSA 2401 User s Guide    Chapter 3 Tutorials    5 Open the ad
277. llectual Property Matters   a  Third Party Claims    If Contributor has knowledge that a license under a third party s intellectual property rights is  required to exercise the rights granted by such Contributor under Sections 2 1 or 2 2   Contributor must include a text file with the Source Code distribution titled    LEGAL    which  describes the claim and the party making the claim in sufficient detail that a recipient will  know whom to contact  If Contributor obtains such knowledge after the Modification is made  available as described in Section 3 2  Contributor shall promptly modify the LEGAL file in all  copies Contributor makes available thereafter and shall take other steps  such as notifying  appropriate mailing lists or unscrupulous  reasonably calculated to inform those who received  the Covered Code that new knowledge has been obtained      b  Contributor Apes    If Contributor s Modifications include an application programming interface and Contributor  has knowledge of patent licenses which are reasonably necessary to implement that API   Contributor must also include this information in the legal file      c  Representations     Contributor represents that  except as disclosed pursuant to Section 3 4  a  above  Contributor  believes that Contributor s Modifications are Contributor s original creation s  and or  Contributor has sufficient rights to grant the rights conveyed by this License     3 5  Required Notices     You must duplicate the notice in Exhibit 
278. llowing example uses Konqueror 3 5 on openSUSE 10 3  however the screens apply to  Konqueror 3 5 on all Linux KDE distributions     1 If your device   s Web Configurator is set to use SSL certification  then the first time you  browse to it you are presented with a certification error     2 Click Continue     Figure 289 Konqueror 3 5  Server Authentication    4  Server Authentication  Konqueror        The server certificate failed the authenticity test   172 20 37 202        Continue    3 Cancel         3 Click Forever when prompted to accept the certificate     Figure 290 Konqueror 3 5  Server Authentication      Server Authentication   Konqueror    Would you like to accept this certificate forever without  being prompted       Forever         4 Click the padlock in the address bar to open the KDE SSL Information window and  view the web page   s security details     Figure 291 Konqueror 3 5  KDE SSL Information    al   amp  KDE SSL Information   Konqueror     ag Current connection is secured with SSL     Chain     Peer certificate  Issuer     Organization  ZyXEL Organization  ZyXEL  Organizational unit  XYZ200 Organizational unit  XYZ200  Country  US Country  US   Common name  172 23 37 202 Common name  172 23 37 202                IP address  172 23 37 202   URL  https   172 23 37 202 lo0ginwrap  ht mi   Certificate state  Certificate is self signed and thus may not be trustworthy   Valid from  Wednesday 21 May 2008 06 42 35 am GMT   Valid until  Saturday 21 May 2011 06 42
279. lower USB port is USB2     It is recommended that you use a USB device to store a volume key only  and not also use it for storage           Create USB Drive Click this button to go to screens you can use to create a password for  unlocking the volume and store the password on a connected USB  device  You also use the screens to create copies of the USB key     Note  Create duplicate USB keys now since you cannot  make them later        Apply Click this button to create the volume   Click this button to discard your changes and close this screen     6 6 2 USB Key Creation    When you create a volume encrypted by a USB key  click the Create USB Drive button to  open a series of screens for creating a volume encryption password and storing it on a  connected USB device     6 6 2 1 Selecting the USB Device    When you click the Create USB Drive button a screen displays  Select the USB device on  which to create the USB key and click Next  Click a column   s heading cell to sort the table  entries by that column   s criteria  Click the heading cell again to reverse the sort order     NSA 2401 User   s Guide 143       Chapter 6 Storage Screens    Figure 132 Selecting the USB Device    Create a new USB Key       The following table describes this screen   Table 31 Selecting the USB Device    LABEL DESCRIPTION    Name This field shows USB1  USB2  and so on for disks connected to the  NSA   s USB ports     Type This shows whether or not the device has an encrypted volume     Model Na
280. lowing table describes the labels in this screen   Table 58 Sharing  gt  Shares  gt  Create a New Share    Share Name Enter the name of the shared folder  The text may consist of 1 to 255  characters  See Appendix on page 44    Select a volume for the share to be located on     Make This Share Owned   Select an owner for the share     By  Enable This Share Select this to activate the share     Enable Action Log Select to keep a log of all actions performed on files folders in the share   These actions include whenever anyone adds or removes a folder  and  reads  writes  or deletes a file     Enable Recycle Bin Select this to create a recycle bin on the share  Whenever a user with  sufficient permissions deletes a file or folder  it is stored here until it can  be deleted permanently     By default  the recycle bin is enabled  This ensures that any inadvertently  deleted data can be recovered  Because the NSA file system uses XFS   the data recovery depends on the system administrator   s use of a volume  manager  As such  this feature is enabled automatically until explicitly  disabled in order to facilitate file restoration should the need arise    Be sure to use the recycle bin configuration screen  Section 8 4 3 on page  194  to clear out the recycle bin periodically or else its host volume will fill  up and users will not be able to store any new files on it     Share Access Choose whether the share is public or private  or choose Advanced to  open the Share Access Config
281. lt gateway address in this field     DNS  Domain Name System  is for mapping a domain name to its corresponding  IP address and vice versa  The DNS server is extremely important because    without it  you must know the IP address of a machine before you can access it  If  you have the IP address es  of the DNS server s   enter them        Dynamic Select the checkbox to have the DHCP server automatically assign a DNS server  address to your NSA     Static Select the checkbox to choose a static DNS server address  Type the DNS  server IP address es  into the fields below     Primary DNS   Type a primary DNS server IP address   Server   Secondary Type a secondary DNS server IP address   DNS Server    Jumbo Frames Jumbo frames improve network performance  You must have a 1 Gbps  Gigabit  Ethernet  network that supports jumbo frames  Select the largest size of frame  that all of your network devices  including computer Ethernet cards and switches   hubs  or routers  support     Note  If you enable jumbo frames on the NSA in a network that  does not support them  you will lose access to the NSA  If  this occurs  you will have to restore the factory default    UD  Z  Op     configuration     Network  Diagnostic Tool    Use this section to test the network connection to a particular IP address or  domain name  Select an address or type it into the field  Then click Ping to have  the NSA send a packet to test the network connection  If the NSA is able to    ping     the host  the netw
282. lume  gives someone  access to a folder   It is similar to a shared folder in Windows  but the access rights are  independent of the folder  you configure the share and the folder separately   You can map a  share to a network drive for easy and familiar file transfer for Windows users     38  NSA 2401 User s Guide    Chapter 2 Introducing the Web Configurator    The main My NSA screen displays the shares to which you have access     Figure 8 My NSA Screen  Language  2 a    E    Password Administration    Ba My NSA    My Shares    Jason Jirga      gd  HuulEie    ji    USB Card I              Other Shares    Currently  there are no other shares that are accessible to you on the system                       The following table describes this screen   Table 4 My NSA Screen    LABEL DESCRIPTION    My Own Shares These are the shares that you own  and manage   The share icons are folder  shaped  Click a share icon to access the share   s contents     System Share  This icon displays for a system share created by the NSA     User created Share  This icon displays for a user created share     External  USB  Share   This icon displays for a share on an external  USB  device  An  external share   s icon disappears if the share is not currently  available  because the USB device was removed for example      The administrator owns and manages the public shares     Click this button to see and configure the management details for a share     Other Shares These are other shares on the inte
283. me This is the device   s model name that uniquely identifies it in the NSA     Capacity This field shows the device   s storage size     Next Click this button to proceed   Cancel       Click this button to discard your changes and close this screen     6 6 2 2 Creating a Duplicate USB Key  Strongly Recommended     Use these screens to create extra copies of your USB key in case one is lost  damaged  or    stolen  Without a USB key  you cannot access the volume if it becomes locked  All of the  volume   s data will be unusable     1 Select Yes to copy the USB key to another USB device  After the duplicate USB key    creation completes  you return to this screen so you can make another  Click No when  you are done making USB key copies     Figure 133 Creating a Duplicate USB Key    Create Duplicate USB Key    USB Key had been created  Please keep it in safe place   Do you want to duplicate other USB key    fille suggest creating usb keys more than two       ves      no       2 The NSA ejects  stops  the USB device  Remove the USB key and click Next     144 NSA 2401 User s Guide    Chapter 6 Storage Screens    Figure 134 Creating a Duplicate USB Key  Eject    Create Duplicate USB Key    USB  has ejected now   Please remove USB2       3 Insert a different USB key and click Next     Figure 135 Creating a Duplicate USB Key  Insert  Create Duplicate USB Key    please plug in USBZ       After the duplicate USB key creation completes  you return to the first USB key duplication  scr
284. ministration screens  In the Status screen the RAID array shows up as    degraded     Figure 117 Status  RAID Degraded    CPU Usage    CPU  Temperature    FAN Speed 1254RPM 1934RPM  Memory U OE i e  EE Sees d 31MB 256MB       Server Name nsaz401 d    Model Name WS4 2401    Firmware Version 1 00 AFF O01b4 ok   00 19 CB  02 90 63  BEE Bre Ene    Enabled d     MAC Address    FTP Server  Status    Internal Yolume    Degraded    raidSoibsb4   volumedl Normal  raids Healthy   223 56 GBTotal 110 75  GBFree     Status File System Disk s  Disk Usage    Install the new hard drive  In this example it   s in disk drive bay 2     Bee 40 06 MR   Used    111 76 GB Total   100  Free       O     7 The NSA automatically repairs a degraded RAID if you insert an empty disk without an  existing file system  Otherwise  after you insert a disk you must go to the Storage  gt   Internal Storage  gt  RAID screen and click Repair     Figure 118 Storage  gt  Internal Storage  gt  RAID    Internal Storage    i   cai      r    Wizards Create Rename Delete Resync Add Disk Remove  Speed Hot Spare       8 Select the disk you want to use to repair the RAID and click Apply     Figure 119 Storage  gt  Internal Storage  gt  RAID  gt  Repair  SS    Repair          NSA 2401 User   s Guide    Chapter 3 Tutorials    9 The RAID   s status displays as Recovering     Figure 120 Storage  gt  Internal Storage  gt  RAID    Internal Storage    i   pr   i    2      Wizards Create Rename Delete Repair Resyne Add Disk Remove 
285. n Type from 0 to 60 characters to further describe this backup     Archive Select this to make a separate copy of the source files for each backup   The backup copy can be on this NSA  another NSA  or a computer that  uses CIFS    Full copies all of the source files at each backup  This provides the most  protection but also requires the most storage space    Incremental copies only source files that are new and or modified since  the last backup  The first backup is a full backup  The NSA also does a full  backup at the backup interval you specify  You can manually delete  backup files  but you must keep the latest full backup to be able to restore  the files later        Synchronization Select this to keep updating a single copy of the source files to the target   At the time of writing the target must be another NSA 2401   Publish makes a copy of the source files  Additional files in the target  folder can remain     Mirror makes the target folder identical to the source folder  The NSA  deletes any other files in the target folder     Next Click this button to proceed     NSA 2401 User s Guide 203    Chapter 9 Protect Screens    9 2 2 1 Creating a Backup Job  Step 2    Figure 168 Protect  gt  Backup  gt  Add  Step 2    Add    new backup Job    volumet    ER d volume  BHO  Gonzo  EO  Kermit  EH  Strategy  EO  Business Plan    Sales    a m          Remote    Remote NSA  Address    Username  Password    Share Name    Local    External    Previous          NSA 2401 User   s G
286. n a display generated by the Derivative  Works  if and wherever such third party notices normally appear  The contents of the  NOTICE file are for informational purposes only and do not modify the License  You may add  Your own attribution notices within Derivative Works that You distribute  alongside or as an  addendum to the NOTICE text from the Work  provided that such additional attribution  notices cannot be construed as modifying the License  You may add Your own copyright  statement to Your modifications and may provide additional or different license terms and  conditions for use  reproduction  or distribution of Your modifications  or for any such  Derivative Works as a whole  provided Your use  reproduction  and distribution of the Work  otherwise complies with the conditions stated in this License     5  Submission of Contributions  Unless You explicitly state otherwise  any Contribution  intentionally submitted for inclusion in the Work by You to the Licensor shall be under the  terms and conditions of this License  without any additional terms or conditions   Notwithstanding the above  nothing herein shall supersede or modify the terms of any separate  license agreement you may have executed with Licensor regarding such Contributions     6  Trademarks  This License does not grant permission to use the trade names  trademarks   service marks  or product names of the Licensor  except as required for reasonable and  customary use in describing the origin of the Work
287. n conflict on the NSA        LES You cannot set a disk quota for users that are in conflict        If you started in Domain mode and later you switch to Workgroup mode  the NSA will allow  you to create user names and group names that already exist on the domain controller     If the conflicting domain user   s password and local user   s password are NOT the same  than  the two users are treated as two distinct users  Therefore  each user can only access shares to  which they have been given access rights     However  if the domain user   s password and local user   s password are also the same  then  only shares set to be accessible by the local user are actually accessible by both the domain  user and local user  The NSA has no way to distinguish these two users as their passwords and  user names are exactly the same        BS During a conflict situation  the local user takes precedence ONLY if the domain  user and local user   s passwords are the same        NSA 2401 User   s Guide    Chapter 8 Sharing Screens    8 2 1 Create a New Account  amp  Change Account Properties    To create an account  click Sharing  gt  Users  gt  Add User   To edit an existing local user account  click Sharing  gt  Users  gt  Edit User     The account creation and account editing screens are identical in appearance     Figure 152 Sharing  gt  Users  gt  Add User  a    Add User  Username  New Password    Password  Confirm     Quota  per volume   volumet  111 76 GB       lo MB  0 means unlimited
288. n of such executables  When a  work that uses the Library    uses material  from a header file that is part of the Library  the object code for the work may be a derivative  work of the Library even though the source code is not  Whether this is true is especially  significant if the work can be linked without the Library  or if the work is itself a library  The  threshold for this to be true is not precisely defined by law  If such an object file uses only  numerical parameters  data structure layouts and accessories  and small macros and small  inline functions  ten lines or less in length   then the use of the object file is unrestricted   regardless of whether it is legally a derivative work   Executables containing this object code  plus portions of the Library will still fall under Section 6   Otherwise  if the work is a  derivative of the Library  you may distribute the object code for the work under the terms of  Section 6  Any executables containing that work also fall under Section 6  whether or not they  are linked directly with the Library itself     6  As an exception to the Sections above  you may also combine or link a    work that uses the  Library    with the Library to produce a work containing portions of the Library  and distribute  that work under terms of your choice  provided that the terms permit modification of the work  for the customer s own use and reverse engineering for debugging such modifications  You  must give prominent notice with each copy 
289. n of the Covered Code is available under the terms of this License   including a description of how and where You have fulfilled the obligations of Section 3 2   The notice must be conspicuously included in any notice in an Executable version  related  documentation or collateral in which You describe recipients    rights relating to the Covered  Code  You may distribute the Executable version of Covered Code or ownership rights under a  license of Your choice  which may contain terms different from this License  provided that  You are in compliance with the terms of this License and that the license for the Executable  version does not attempt to limit or alter the recipient s rights in the Source Code version from  the rights set forth in this License  If You distribute the Executable version under a different  license You must make it absolutely clear that any terms which differ from this License are  offered by You alone  not by the Initial Developer or any Contributor  You hereby agree to  indemnify the Initial Developer and every Contributor for any liability incurred by the Initial  Developer or such Contributor as a result of any such terms You offer     3 7  Larger Works     You may create a Larger Work by combining Covered Code with other code not governed by  the terms of this License and distribute the Larger Work as a single product  In such a case   You must make sure the requirements of this License are fulfilled for the Covered Code     4  Inability to Comply 
290. n user   domain seconds to  group s   It took  2  seconds  group take when  import  domain  user and  group    CIFS   INFO Import Domain User and Group   number of number of  domain Description success   0  user s     domain user   domain   1  group s   description group  description    GIFS  share  NOTICE _   Delete share  0  ShareName    1        CIFS   share   NOTICE Add new disabled share  0  for   Share Name   Folder Volume  unshared folder   1  in volume  Name Name   2     CIFS   share   NOTICE Recycle bin disabled  Remove   Share Name  recycle bin folder in share   0      NSA 2401 User   s Guide 265       Appendix A Log Messages    Table 114 Log Messages    FEATURE  SEVERITY MESSAGE   ARGUMENT S   NOTICE Purge all files in recycle bin Share Name  folder in share   0      Expire recycle bin finish for Share Name   How log it  share 10   process time   1   seconds  remove  2  file   3     CIFS   share    CIFS   share   INFO  takes to  process    bytes     this recycle  bin       CIFS   user  CIFS   user    CIFS   user   NOTICE The user  0  from  1  has  attempted to change the user   2  password but old password    verification fail        CIFS   user    CIFS    group    CIFS    group    COPY BIN    NOTICE Add new group  0   Group Name    NOTICE Copy Button   Can not get    configuration for Copy Button    COPY BTN   NOTICE Copying content of  0  to  1   USB   Internal   USB    Start Path Internal    Path    Copying content of  0  to  1   USB   Internal   USB    Failed P
291. name that uniquely identifies the backup  It is read   only     Job Description Type from 0 to 60 characters to further describe this backup   Backup Type This field displays what kind of backup is to be performed  It is read only   Source folder s  file s  Specify the path of the folders and files to back up     Backup Target These fields display where the backups are to be saved to   Target path    Compression Compression reduces the size of the file that you want to back up  Backup  is then faster  but restoring may be slower  so if backup space is nota  concern and recovery speed is  then turn off compression     Encryption You can have the NSA use a password to encrypt the backup files        208 NSA 2401 User s Guide    Chapter 9 Protect Screens    Table 74 Protect  gt  Backup  gt  Edit Job  Step 1  continued   LABEL DESCRIPTION    Bandwidth For backups to a remote NSA  you can restrict the bandwidth to help  prevent the backups from using all of your network connection   s available  bandwidth  This is more important when backing up to a remote NSA or  computer through the Internet     Purge Policy These fields display for archive backups  Select a policy for deleting  archive backups  This purge runs first before a new backup is done  For  example  if you have a backup scheduled to begin at midnight  then at  that time  the NSA checks these settings and deletes files accordingly  before backup takes place  If soace on the backup NSA or disk is a    concern  then confi
292. nd charge a fee for  acceptance of support   warranty  indemnity  or other liability obligations and or rights consistent with this License   However  in accepting such obligations  You may act only on Your own behalf and on Your  sole responsibility  not on behalf of any other Contributor  and only if You agree to indemnify   defend  and hold each Contributor harmless for any liability incurred by  or claims asserted  against  such Contributor by reason of your accepting any such warranty or additional liability     END OF TERMS AND CONDITIONS  Version 1 1    Copyright  c  1999 2003 The Apache Software Foundation  All rights reserved     NSA 2401 User   s Guide    Appendix D Open Source Licences    Redistribution and use in source and binary forms  with or without modification  are permitted  provided that the following conditions are met     Redistributions of source code must retain the above copyright notice  this list of conditions  and the following disclaimer     Redistributions in binary form must reproduce the above copyright notice  this list of  conditions and the following disclaimer in the documentation and or other materials provided  with the distribution     The end user documentation included with the redistribution  if any  must include the  following acknowledgment     This product includes software developed by the Apache  Software Foundation  http   www apache org       Alternately  this acknowledgment may  appear in the software itself  if and wherever s
293. nd the NSA checks this list when authenticating  users and or groups that seek access to a share  This is suitable for a large number of CIFS  users where accounts are stored on an external server     A domain is organized in levels and is administered as a unit with common rules and  procedures  Each domain has a unique name  You must be logged on as an administrator to  your local computer and have a valid user name and password to join your computer to a  domain  If you do not know which user name and password to use  contact your network  administrator     The NSA automatically synchronizes its time and date with those on the external domain  controller     Active Directory Example    The next figure shows an example application for the NSA in a small office network  AD is an  Active Directory that contains the user names and passwords of all users that are allowed  access to the NSA  Users  U1  U2  U3  can all back up and share data on the NSA  Important  data stored on servers S1 and S2 may be also stored there  It is recommended that you place  the NSA behind a firewall and or IDP device for protection     NSA 2401 User   s Guide 165    Chapter 7 Network Screens    Figure 145 Active Directory Example Application  AD       7 3 1 Windows CIFS Screen  Click Network  gt  Windows CIFS to display this screen     Figure 146 Network  gt  Windows CIFS  Workgroup     Server Identification    Server Name  rsa2401  Description       i  Note   Modifying your Server Name will affect
294. neral  Public Licenses are designed to make sure that you have the freedom to distribute copies of  free software  and charge for this service if you wish   that you receive source code or can get    it if you want it  that you can change the software and use pieces of it in new free programs   and that you are informed that you can do these things     To protect your rights  we need to make restrictions that forbid distributors to deny you these  rights or to ask you to surrender these rights  These restrictions translate to certain  responsibilities for you if you distribute copies of the library or if you modify it     For example  if you distribute copies of the library  whether gratis or for a fee  you must give   the recipients all the rights that we gave you  You must make sure that they  too  receive or can  get the source code  If you link other code with the library  you must provide complete object  files to the recipients  so that they can re link them with the library after making changes to the  library and recompiling it  And you must show them these terms so they know their rights     We protect your rights with a two step method   1  we copyright the library  and  2  we offer  you this license  which gives you legal permission to copy  distribute and or modify the  library     To protect each distributor  we want to make it very clear that there is no warranty for the free  library  Also  if the library is modified by someone else and passed on  the recipient
295. ng at 18 00  and a third  schedule to have it reboot every Friday at 14 00  Click a column   s heading  cell to sort the schedules by that column   s criteria  Click the heading cell  again to reverse the sort order     Type This field displays whether the power control schedule has the NSA turn  on  turn off  or reboot     Frequency This field shows how often  monthly  weekly  or daily  the NSA is to apply  this power control schedule     Execute Time This field shows when the NSA is to use this power control schedule   when the NSA is to turn on  turn off  or reboot    a Delete  Click this to remove a power control schedule from the list   Add Power Control Use this part of the screen to configure power on  power off  and reboot  Schedule times     Type Select whether this power control schedule has the NSA turn on  turn off   or reboot    Frequency Select whether the NSA is to apply this power control schedule entry on a  monthly  weekly  or daily basis     Execute Time Enter the time  day  and or day of the month as appropriate for this power  control schedule entry  Leave more than 10 minutes between the  execution times of the entries    If the NSA turns off or restarts while a user is transferring files to or from  the NSA  the transfer fails  The user will need to restart the transfer   The NSA skips a scheduled restart or power off if the execution time  comes while the NSA is doing any of the following    e Resynchronizing a RAID   e Upgrading firmware   e Replacing
296. ng screens use the default Ubuntu 8 installation        BS Make sure you are logged in as the root administrator        Follow the steps below to configure your computer IP address in GNOME     1 Click System  gt  Administration  gt  Network     Figure 234 Ubuntu 8  System  gt  Administration Menu    ol       a fr   Authorizations    ne  Hardware Drivers   lt  Help and Support  JE        About GNOME    43 About Ubuntu     9  quit       Hardware Testing    pa Language Support  E Login Window    2 When the Network Settings window opens  click Unlock to open the Authenticate  window   By default  the Unlock button is greyed out until clicked   You cannot make  changes to your configuration unless you first enter your admin password     Figure 235 Ubuntu 8  Network Settings  gt  Connections    Tal Network Settings      7  Location     Connections   General   DNS   Hosts    Point to point connec     This network interface is not c                   NSA 2401 User   s Guide 289    Appendix B Setting Up Your Computer   s IP Address    3 Inthe Authenticate window  enter your admin account name and password then click  the Authenticate button     Figure 236 Ubuntu 8  Administrator Account Authentication    Authenticate    System policy prevents  modifying the configuration  An application is atternpting to perform an action    that requires privileges  Authentication as one of the  users below is required to perform this action     i C EEEE  chris      gt  Details       4 Inthe Network
297. nge their passwords by using  the username and password in the My NSA  gt  Password screen  See Section 2 5 7 on page 46  for details     36  NSA 2401 User s Guide    Chapter 2 Introducing the Web Configurator    Figure 5 NSA Login Screen    Z  XEL NSA 2401    Welcome to NS4 2401  Enter Username password and click to login     Username     Password         maximum of 14 alphanumeric  printable characters  no single and double quotes       i  Note   Please turn on the Javascript and Activex control setting on  Internet Explorer     Login   Reset         Copyright 2008 by ZyXEL Communications Corp        You should see a screen asking you to change your password  highly recommended  as shown  next  Type a new password  and retype it to confirm  and click Apply or click Skip     Figure 6 Change Password Screen    fi vn Admin Info      s a security precaution  it is highly recommended that you change the admin  password     New Password    Password  Confirm          a masimum of 14 alphanumeric  printable characters  no single and double quotes    Apply   Ignore      B Copyright 2008 by ZyXEL Communications Corp        BS The Web Configurator session automatically times out after 15 minutes   Simply log back into the NSA if this happens to you        2 4 User level Screens Overview    All users  including the administrator  first see the user level access My NSA screen after  login     NSA 2401 User   s Guide    Chapter 2 Introducing the Web Configurator    Figure 7 My NSA    BEE
298. nking The 1000M LAN is sending or receiving packets   COPY Green On A USB device is connected to the NSA        bus The NSA is copying files from the USB device     Copying files from the USB device failed  Press the COPY  button to set the COPY LED back to green     Of  No USB device is connected           1 1 2 Power Button    Press the power button on the front panel to turn the NSA on and off        To turn the NSA on  press the power button and release it    e To turn the NSA off  press the power button in and hold it until you hear a beep  Then  release the button  The SYS light blinks red until the NSA is shut down    e If the above shut down procedure does not work  which may happen if the NSA has  crashed   hold the power button in a few more seconds until you hear a second beep  The  NSA turns off immediately     1 1 3 COPY Button    Use the COPY button on the front panel to copy files from a connected USB device to the  NSA  Use the Applications  gt  Copy Button screen  Section 10 4 on page 227  to choose  where the NSA stores the files  The name of the folder created for the copied files consists of  the date and time of the copy in year_month_day_hour_minute_second format     NSA 2401 User   s Guide    Chapter 1 Getting to Know Your NSA    34 NSA 2401 User s Guide       Introducing the Web  Configurator    This chapter describes how to access the NSA Web Configurator and provides an overview of  its screens     2 1 Web Configurator Overview    The Web Configurato
299. nnnnnnnnnneennnnnnnnsnnee 112  Figure 119 Storage  gt  Internal Storage  gt  RAID  gt  Repair       rurrrnnnnnevvnnnnnenennnnnvnennnnnenennnnnennnnnnnenennnnusnnenen 112  Figure 120 Storage  gt  Internal Storage  gt  RAID         0  ccccccsscssecesccsscaseecececscsesseceeecsedaesecnsctenssnarsetscuseneranss 113  ge ee ae T ec NNN 117  Fig  re 122 System Seming   Date IME EE aiiai 121  Figure 123 Disks  RAIDS  and VOWS savsss ere Genesee 125  Figure 124 Storage  gt  Internal Storage  gt  Status         rrrrrrrrrrnnnnnnrrrrrnnnnnnrrnrnnnnnnsrrnnnnnnnnnsrenrnnnnnenennnnnnnnusnee 127    NSA 2401 User   s Guide 19    List of Figures    Figure 125 Storage  gt  ntemal Storage  gt  DISK siessressetrarernessveniareripeiairenestaawisientaiemamweteacia 128  Figure 126 Storage  gt  Internal Storage  gt  Disk  gt  S M A R T   Brief Summary          rrrrnnnnnnnrnnnnrrnnnnnvennnnn 130  Figure 127 Storage  gt  Internal Storage  gt  Disk  gt  S M A R T   Full Summary         rrrrrrrnnrnrrrnnnnrernnnnnnnnnnn 131  Figure 128 Storage  gt  Internal Storage  gt  RAID caecs cscs icaetintdvaciolaidanadaietearetoiaeiicsiotatdeians Naisecsiaiiabasueiees 135  Figure 129 Storage  gt  Internal Storage  gt  RAID  gt  Create          mrmmmeerrrvrrrrrrrrvevrrrrsnrrrrerrrrererrrrnnne 138  Figure 130 Storage  gt  Internal Storage  gt  Volume      rrnnnrnnnnnnnnnnnvnnnnnnnnnsnnvnnnnnnssrnnnnnnnnnrrnnnnnnnnnnnennnnnnnssee 140  Figure 131 Storage  gt  Internal Storage  gt  Volume  gt  Create       mmmrrnnnrnrerv
300. nnrenrrnnnnnnennn 284  Figure 226 Mac OS X 10 4  Network Preferences  gt  TCP IP Tab         rrrrnnrannnnnnnnnnnnnnnnnnnrennnnnnnnnnnnnsrennnnn 284  Figure 227 Mac OS X 10 4  Network Preferences  gt  Ethernet        rrrnnrrnnnnnnrnnnnnnovnrrnnnnnnvrnnrnnnnnnrennnnnnnnner 285  Fe 228 Mac OS X 104A  NKL eee 285  Figure 229 Mac OS X 10 5  Apple NENU esse erin ra ENA EAEE EEEE eee 286  Figure 230 Mac OS X 10 5  Systems Preferences       rrrrrrnnnnnnrrnnnnnnnnnrrnnrrnnnnnrrnnnnnnnnnnennrnnnnnnssennrnnnnnnennn 286  Figure 231 Mac OS X 10 5  Network Preferences  gt  Ethernet        rrrrnnrnnrnnnrnnnnnnovrrnnnnnnnernnrnnnnnnrennnnnnnnner 287  Figure 232 Mac OS X 10 5  Network Preferences  gt  Ethernet              cccccsscccecssseceeceeeeeeeeeeseeeeseaeeeeeeaeees 288  Poue NNN OS STR NN LUY wcsaviscrexssncrrencrenrsecrepinscnyaiieisereaavienstosneiersyesetreieraanemeaviaeiean 288  Figure 234 Ubuntu 8  System  gt  Administration Menu             cccccccccccceseececeeeeeeeeaeeeeeeeeeeeeeseaaeeesesaneeeesaaes 289  Figure 235 Ubuntu 8  Network Settings  gt  Connections vumenesmenstsuensetsniensmesenmnneinie  e 289  Figure 236 Ubuntu 8  Administrator Account Authentication           rrrrrnnnrnornnnnrrrrrnnnrrrrrnnnnrnnrnnnnrennnnnrennnnn 290  Figure 237 Ubuntu 8  Network Settings  gt  Connections         rrrrrrrnnnnnnrrnnrrrnnnnnnvnnnnnnnnnnnnvrnnnnnssenrrnnnnnnennn 290  Figure 238 Ubuntu 8  Network Settings  gt  Properties        rrrrrrrrrnnnrrnnrnnnnrrnvnnnrrnnrnnnrennnnnnnrennnnnnenrnn
301. ns of TLS SSL certificate settings will restart network services       Edit a self signed CA certificate  Stepl Edit the Self signed Certificate    Download the self signed CA file  E  ont HA      StepS Double click on the CA file to install it into your browser    C Create a Certificate To Be Authorized By My Own Certificate Authority       2 Save the file to your computer     Figure 46 Downloading the NSA s Certificate    Opening CA cer x     You have chosen to open    CA cer    which is     Security Certificate  From  http f 192 168 1 35    what should Firefox do with this File         Open with Browse         E FlashGat    T Do this automatically For files like this From now on           NSA 2401 User   s Guide 71    Chapter 3 Tutorials    3 Find the certificate file on your computer and double click it     Figure 47 Downloading the NSA   s Certificate       am    im   My Metwork  Places    Rec  cle Bin       4 Install the certificate  The rest of the steps in this section are an example of installing a  certificate in Windows  See Appendix C on page 299 for other examples  In the  Certificate dialog box  click Install Certificate     Figure 48 Certificate    Certificate                      General   Details    Certification Path      Certificate Information    This CA Root certificate is not trusted  To enable trust   install this certificate in the Trusted Root Certification  Authorities store     Issued to  nsaz401    Issued by  nsa2401    Valid from 5 20 2008 to 5 20
302. nsennnnn 291  Figure 239 Ubuntu 8  Network Settings  gt  DNS       rurnnrennnnnnnnnnnnnnennnnnnnsnnnnnnnennnnnnnsnnnnnnnsnnnnnnnnennnnssennnnnnn 291  FUP UN NNK TN ae eedeeeid se 292  Figure 241 openSUSE 10 3  K Menu  gt  Computer Menu       rrrnnnnnnnnnnonnnnnnnnnnnsnnnnnnnnnnennrnnnnnnsrennnnnnnnsseene 293  Figure 242 openSUSE 10 3  K Menu  gt  Computer Menu       rrrnnnnnnnnnnovnnnnnnnnnnrnnnnnnnnnnnnnrnnnnnnssrnnrnnnnnsseene 293  Figure 243 openSUSE 10 3  YaST NNN arken 294  Figure 244 openSUSE 10 3  Network Settings            cccccccccccsssseeccceseeeeceeeececseaueeessseaseeessageeeessenseesssagss 294  Figure 245 openSUSE 10 3  Network Card Setup              ccccccccccesssseceeeeeeeeseeceeeseeeeeeeeeeeeeaeeeeeeeeaeeneeeeess 295  Figure 246 openSUSE 10 3  Network Settings Lasse dela elticha edie kes 296  Figure 247 openSUSE 10 3  KNetwork Manager               cccccccceeeeeeeeceeeeeeeeeeeeceeeeeeeeesesaeeeeeeeesseeeeeeeeeeaas 297  Figure 248 openSUSE  Connection Status   KNetwork Manager            ccccssecceeeeeeeeeeeeeeeeeeaeeeesaeeeesaees 297  Figure 249 Internet Explorer 7  Certification Error               cccccccccccssseeceeeeeeeeeeeeeeeceeeeeeeeeseuaaaeeeesssaaaeeeeeess 300  Figure 250 Internet Explorer 7  Certification Error Luren 300  Figure 251 Internet Explorer 7  Certificate Error asi ichsasicraridinteisnsiiaianatiieiiaeria eelisiioieitaniasieeidiudig 300  Figure 252 Internet Explorer 7  Cerificate eee eee eee eee nee one ae eel een eRe ee EEE Ree ena 301  F
303. nt names are     e All leading and trailing spaces are removed automatically   e Multiple spaces within names are converted to a single space     e Account names are case insensitive  The account name cannot be the same  regardless of  the letter case  as an existing local account or domain account  For example  if there exists  a domain account with the name  BOB   you cannot create a local account named    bob     If  you enter an account  bob  but use  BOB  when connecting via CIFS or FTP  it will use the  account settings used for  bob      e The account name cannot be the same as a system account name such as FTP or  EVERYONE nor be the same as an existing local or domain account  Other reserved user  names that are not allowed are     e bin   e daemon   e ftp   e anonymous  e nobody   e root   e pc guest    NSA 2401 User   s Guide    Chapter 8 Sharing Screens    e admin    8 2 1 2 Account Password Management    Non admin users may change their passwords themselves by logging into the NSA Web  Configurator using the username and password as defined in the Create New Account screen   After logging in  select the Password tab in the account toolbar     Figure 153 My NSA          My Own Shares    Nason Sori  APP lance     There are no my own shares on the system     Other Shares    There are no other accessible shares on the system           In the Password tab  create a new password and then click Apply     Figure 154 Password          Account Name    Asr as Old Password  
304. nymous 193  ANONYMOUS FTP 193  253  anonymous FTP access 225  Apache License 323  Apple 31  65  archive 96  203  array 125   degraded 126   down 126   repair 126   resynching 134    B    backup 89  96  200  archive 96  203  bandwidth 206  compression 206  create 202  edit 208  encryption 206  mirror 203  publish 203  purge settings 207  purging 200  restore by files 212  restore by job 209  software 220  synchronization 203    Index    Index    synchronization tutorial 92  troubleshooting 254  tutorial 92    backup files  restoring files by 102    backup job  restoring files by 99    backups  purge settings 209  versus snapshots 199    bandwidth 206  browsers 35  browsing shares 40  BSD 340    buzzer 233  troubleshooting 251    C    capacity 106   using 109  certificate 229  240   editing 240   tutorial 69   verifying 79  certifications 260  353   notices 353   viewing 354  change password 37  CIFS 160  164  Comma Separated Value  see CVS  Common Internet File System  see CIFS  common screen icons 51  compatible hard disks 259  compression 206    configuration file  backup 237  maintenance 237  restore 237    configuration file backup 198  conflict user 177   conflict  in 173   conflicting access settings 175  conflicting settings 175  connection limit 225    NSA 2401 User   s Guide    Index    copied files folder format 33  COPY  button 33  227  folder format 33  LED 33  share 227  COPY LED  troubleshooting 255  copying 33  42  copyright 48  353  CPU  temperature 119  usage 
305. o copy part of the  code of the Library into a program that is not a library     4  You may copy and distribute the Library  or a portion or derivative of it  under Section 2  in  object code or executable form under the terms of Sections   and 2 above provided that you  accompany it with the complete corresponding machine readable source code  which must be  distributed under the terms of Sections   and 2 above on a medium customarily used for  software interchange  If distribution of object code is made by offering access to copy from a  designated place  then offering equivalent access to copy the source code from the same place  satisfies the requirement to distribute the source code  even though third parties are not    NSA 2401 User   s Guide 329    Appendix D Open Source Licences    compelled to copy the source along with the object code     5  A program that contains no derivative of any portion of the Library  but is designed to work  with the Library by being compiled or linked with it  1s called a  work that uses the Library      Such a work  in isolation  is not a derivative work of the Library  and therefore falls outside the  scope of this License     However  linking a    work that uses the Library    with the Library creates an executable that is  a derivative of the Library  because it contains portions of the Library   rather than a    work  that uses the library     The executable is therefore covered by this License  Section 6 states  terms for distributio
306. o disable this   option if you connect   to different networks    Name Server 3       9 Click Finish to save your settings and close the window        NSA 2401 User   s Guide    Appendix B Setting Up Your Computer s IP Address    Verifying Settings    Click the KNetwork Manager icon on the Task bar to check your TCP IP properties  From  the Options sub menu  select Show Connection Information     Figure 247 openSUSE 10 3  KNetwork Manager                      7 Disable Wireless ne KNetworkManager  ri Wired Devices    t F    63 Switch to Offline Mode  X Wired Network    T Show Connection Information        Dial Up Connections    Configure    2  Options       When the Connection Status   KNetwork Manager window opens  click the Statistics tab  to see if your connection is working properly     Figure 248 openSUSE  Connection Status   KNetwork Manager    Connection Status   KNetworkManager     2  Device   Sy Addresse   Y  Statistics      Received Transmitted  Bytes 2317441 841875  MBytes 2 2 0 8  Packets 3621 3140  Errors g 0    Dropped 0 0    KBytes s 0 0 0 0       NSA 2401 User s Guide 297    Appendix B Setting Up Your Computer s IP Address    298 NSA 2401 User s Guide       Importing Certificates    This appendix shows you how to import public key certificates into your web browser     Public key certificates are used by web browsers to ensure that a secure web site is legitimate   When a certificate authority such as VeriSign  Comodo  or Network Solutions  to name a few   rec
307. o reverse the sort order        The following table describes the labels in this screen   Table 21 Storage  gt  Internal Storage  gt  Disk    LABEL DESCRIPTION  Name This field shows disk1  disk2  disk3  and or disk4 for disks installed in  the NSA disk trays labelled 1  2  3 and 4 respectively     Model Name This is the hard drive model number that uniquely identifies a hard drive   Capacity This field shows the size of the hard disk     Type This shows the kind of array to which the disk belongs  See Section 6 4  on page 132 for details        6 3 2 S M A R T Screen    Click Storage  gt  Internal Storage  gt  Disk to display the disk summary screen  Select a disk  and click the S M A R T  icon to display the following screen  This screen provides details  about the drive and its status     NSA 2401 User   s Guide 129    Chapter 6 Storage Screens    Figure 126 Storage  gt  Internal Storage  gt  Disk  gt  S M A R T   Brief Summary        Device Info Format Brief Summary Ra    Temperature 29 ac     Health Good  Performance Good       Detail Information    Device Model WOE WOSO0044V5 002TBO  Serial Number WO WCAaSUO984565  Firmware Version 01 01601    User Capacity 467 00 GB   Not in smartctl database  for details use   P  showall    474 Version 8    Device    Exact ATA specification draft version not  indicated   Local Time Mon May 19 11 06 46 2008 GMT   SMART support Available   device has SMART capability   SMART support Enabled    474 Standard    The following table describ
308. o the same subnet  There is one IP address  If  LAN1 loses its connection  LAN2 takes over the IP address and traffic     Load Balancing  Select this option to use both Gigabit Ethernet interfaces on the  same subnet with the same IP address  The NSA distributes the traffic load  across both interfaces     Link Aggregation  Select this option to use IEEE 802 3ad port link aggregation  to combine the two Gigabit Ethernet interfaces into a single logical link  Connect  both Gigabit Ethernet interfaces to the same device  The peer device must also  have IEEE 802 3ad port link aggregation enabled for the two interfaces  connected to the NSA  Both interfaces use the same IP address  If one interface  loses its connection  the NSA continues to use the other interface     LAN Use this section to configure the NSA   s IP address or IP addresses  configure  LAN1 and LAN2 separately when the Teaming Mode is set to Stand Alone    Dynamic Select the Dynamic checkbox to have a DHCP server automatically assign an IP    address to your NSA  If none is assigned  then the NSA reverts to the default IP  address of 192 168 1 3           NSA 2401 User   s Guide 163    Chapter 7 Network Screens    Table 43 Network  gt  TCP IP  LABEL DESCRIPTION    Static Select the Static checkbox for the NSA to use fixed TCP IP information  You  must fill in all of the following fields     IP Address Type an IP address in this field    IP Subnet Type an IP subnet mask in this field   Mask    Gateway Type a defau
309. ocol  The default  wide area network  protocol that provides communication  across diverse interconnected networks         Show icon in notification area when connected       NSA 2401 User   s Guide 2771    Appendix B Setting Up Your Computer   s IP Address    5 The Internet Protocol TCP IP Properties window opens     Figure 215 Windows XP  Internet Protocol  TCP IP  Properties    Internet Protocol  TCP IP  Properties       General   lterate Configuration     Tou can get IP settings assigned automatically if your network  supports  this capability  Otherwise  you need to ask your network  administrator for  the appropriate IP settings        Obtain an IP address automatically    O  Use the following IP address        Obtain ONS server address automatically        Use the following DNS server addresses       Advanced            6 Select Obtain an IP address automatically if your network administrator or ISP  assigns your IP address dynamically     Select Use the following IP Address and fill in the IP address  Subnet mask  and  Default gateway fields if you have a static IP address that was assigned to you by your  network administrator or ISP  You may also have to enter a Preferred DNS server and  an Alternate DNS server  if that information was provided     7 Click OK to close the Internet Protocol  TCP IP  Properties window   8 Click OK to close the Local Area Connection Properties window     Verifying Settings  1 Click Start  gt  All Programs  gt  Accessories  gt  Command 
310. of discussing and  improving the Work  but excluding communication that is conspicuously marked or otherwise  designated in writing by the copyright owner as    Not a Contribution           Contributor    shall mean Licensor and any individual or Legal Entity on behalf of whom a  Contribution has been received by Licensor and subsequently incorporated within the Work     2  Grant of Copyright License  Subject to the terms and conditions of this License  each  Contributor hereby grants to You a perpetual  worldwide  non exclusive  no charge  royalty   free  irrevocable copyright license to reproduce  prepare Derivative Works of  publicly  display  publicly perform  sublicense  and distribute the Work and such Derivative Works in  Source or Object form     3  Grant of Patent License  Subject to the terms and conditions of this License  each  Contributor hereby grants to You a perpetual  worldwide  non exclusive  no charge  royalty   free  irrevocable  except as stated in this section  patent license to make  have made  use  offer  to sell import  and otherwise transfer the Work  where such license applies only to those patent  claims licensable by such Contributor that are necessarily infringed by their Contribution s   alone or by combination of their Contribution s  with the Work to which such Contribution s   was submitted  If You institute patent litigation against any entity  including a cross claim or  counterclaim in a lawsuit  alleging that the Work or a Contribution in
311. of the work that the Library is used in it and that  the Library and its use are covered by this License  You must supply a copy of this License  If  the work during execution displays copyright notices  you must include the copyright notice  for the Library among them  as well as a reference directing the user to the copy of this  License  Also  you must do one of these things  a  Accompany the work with the complete  corresponding    machine readable source code for the Library including whatever changes were used in the  work  which must be distributed under Sections 1 and 2 above   and  if the work is an  executable linked with the Library  with the complete machine readable  work that uses the  Library     as object code and or source code  so that the user can modify the Library and then  relent to produce a modified executable containing the modified Library   It is understood that  the user who changes the contents of definitions files in the Library will not necessarily be  able to recompile the application to use the modified definitions   b  Use a suitable shared  library mechanism for linking with the Library  A suitable mechanism is one that  1  uses at  run time a    copy of the library already present on the user s computer system  rather than copying library  functions into the executable  and  2  will operate properly with a modified version of the  library  if the user installs one  as long as the modified version is interface compatible with the  version th
312. older Windows operating systems  Supports  volume and file sizes of up to 2 GB   ntfs  The newest Windows file system   Linux file systems    ext2  Older file system    ext3  The same as EXT2  but adds a journaled file system and is more  robust    reiserfs  Offers better performance for small files    xfs  Offers good performance for larger files  You can also have the  NSA encrypt a volume that uses the xfs file system     Select this check box and an option from the drop down list box to encrypt  the volume  This option is only available when you create a volume using  the xfs file system     The NSA automatically locks an encrypted volume if the NSA restarts or  loses power or the disk is removed  An administrator can also manually  lock the volume  Once a volume is locked  no one can use it again until an  administrator unlocks it     password  Select this option to manually enter a password for unlocking  this volume  You can also enter a password prompt  You will need to  manually re enter the key every time the NSA restarts     USB key  Select this option to have the NSA create a password for  unlocking the volume and store the password on  another  connected  USB device  Note that if the volume is later locked  the NSA automatically  unlocks it if the USB device containing the key is inserted when the NSA  restarts     At start up  if a USB key is inserted  the NSA automatically unlocks any  volumes encrypted by it     The password fields display if you choose to enc
313. older on a volume  It is equivalent  to the Windows concept of a shared folder  You must have an internal volume before you can  create shares     Volume    A volume is a storage area on a single disk or spread across a number of disks  typically  known as a disk array  or RAID  within a single file system     XFS    XFS is journaled file system that allows for files as large as 16 terabytes  Due to the system   s  design  it does not easily support snapshots  Instead  it was designed with the intention that a  logical volume manager would handle the snapshot snapshot restoration process  The NSA   2401 utilizes XFS for its internal file system     Logical Volume    A logical volume is the portion of a physical hard disk drive that allows data to be written and  read  It is represented in your computer   s operating system as a drive with a letter and is sub   divided into its component files and folders  For example  on a typical home computer the  logical volume that exists on the hard drive that hosts the Windows operating system is most  often labeled the    C    drive  A physical hard disk drive can contain a single logical volume or  it can be partioned into multiple logical volumes  Furthermore  with the assistance of a logical  volume manager  a logical volume can actually span multiple physical hard disk drives     Logical Volume Manager    A logical volume manager is tool that allows system administrators greater flexibility in  setting up and managing their system 
314. olume only read write operation    FAILED   Storage   CRIT Cancel Internal Volume Scan    Volume FAILED   Storage   CRIT Scan External Volume  FAILED   Volume   Storage   CRIT Cancel External Volume Scan    Volume FAILED   Storage   CRIT Eject External Disk   0    disk id   Volume FAILED   Storage   CRIT Detected Disk 0  I O error    Volume    NOTICE Hostname is set to  0  Ld       NOTICE System description is changed  EMERG Temperature is too high     NSA 2401 User   s Guide 271    Appendix A Log Messages    Table 114 Log Messages    FEATURE   SEVERITY MESSAGE   ARGUMENT S     System EMERG Temperature exceeds the upper  bound and may cause  damage System is going to  shutdown    INFO Temperature is back to normal  EG   System EMERG Fan speed is too low and may  cause damage   System ERR Fan speed is lower than normal  speed     INFO Fan speed is normal  me  System INFO Device is shutdown by  administrator  System NOTICE The system was shutdown  abnormally        PWR BTN NOTICE System is shutdown by power  button   UPS EMERG Remaining battery charge below  limit on UPS  Doing shutdown    USB NOTICE An external APC UPS device is  plugged    USB NOTICE An external APC UPS device is  unplugged    USB NOTICE An external Printer device is  plugged    USB NOTICE An external Printer device is  unplugged    USB NOTICE An external USB hub device is  plugged    USB NOTICE An external USB hub device is  unplugged    System   INFO CGI  File uploaded  File name    File Name File Size   FW
315. olumn   s  criteria  Click the heading cell again to reverse the sort order     The following table describes the labels in this screen   Table 69 Protect  gt  Backup    LABEL DESCRIPTION    Status This field shows whether the backup job is currently running or waiting to  run  The percent complete also displays for a currently running job        This is the name of the backup   Job Description This is some extra descriptive text on the backup   Backup Info This field displays the backup   s type  source  and target     Scheduler Info This field displays the backup   s frequency  the time it was last run in  and  whether or not it succeeded   and when it is scheduled to run again  The  times use yyyy mm dd hh mm ss format        9 2 2 Creating a Backup Job    In the Protect  gt  Backup screen  click the Add Job icon to create a new backup job     Figure 167 Protect  gt  Backup  gt  Add Job  Step 1  Add anew backup Job    Step 1      Job Information  Job Name    i    Job  Description       Backup Type    archive     Full    f Incremental    C Synchronization       202 NSA 2401 User   s Guide    Chapter 9 Protect Screens    The following table describes the labels in this screen   Table 70 Protect  gt  Backup  gt  Add Job  Step 1    LABEL DESCRIPTION    Job Name This is a required field that uniquely identifies the backup  Type from 1 to  15 characters  You can use alphanumeric characters  A Z 0 9  and        underscores   The first character must be a letter     Job Descriptio
316. olumn shows data if your connection is working properly     Figure 240 Ubuntu 8  Network Tools  Devices   Network Tools Pa  en    Tool Edit Help    Network device     IP Information    Protocol IP Address Netmask   Prefix Broadcast Scope      Pv4 10 4 2 15 255  255 255 0 10 0 2 255  IPy amp  feg0  a00 27fHfe30 elfc 64 Link    Interface Information Interface Statistics  Hardware address  08 00 27 30 e 1 6c theres  684 6 KiB  Multicast  Enabled Transmitted packets  1425  MTU  1500 Transmission errors  0  Link speed  not available Received bytes  219 5 KIB  State  Active Received packets  1426  Reception errors  0    Collisions  0          292 NSA 2401 User s Guide    Appendix B Setting Up Your Computer   s IP Address    Linux  openSUSE 10 3  KDE     This section shows you how to configure your computer   s TCP IP settings in the K Desktop  Environment  KDE  using the openSUSE 10 3 Linux distribution  The procedure  screens and  file locations may vary depending on your specific distribution  release version  and individual  configuration  The following screens use the default openSUSE 10 3 installation        BS Make sure you are logged in as the root administrator        Follow the steps below to configure your computer IP address in the KDE   1 Click K Menu  gt  Computer  gt  Administrator Settings  YaST    Figure 241 openSUSE 10 3  K Menu  gt  Computer Menu  seen OOOO O    Applications u          Administrator Settings    oy  Q Install Software     7  System Information    S
317. on  IDP   Intrusion Detection and Prevention   and anti virus  like  ZyXEL s ZyWALL USG products for example    Configure strong user passwords and Access Control  List  ACL  settings  See Chapter 8 on page 173 for  details     Use HTTPS for Web Configurator access to the NSA   see Section 11 4 on page 239      Theft of files by removing the physical hard   Store sensitive data in encrypted NSA volumes  see  drives  page Encrypted Volumes on page 126         NSA 2401 User   s Guide    Chapter 9 Protect Screens    9 1 1 What You Can Do in the Protect Screens    e Use the Backup screens  Section 9 2 on page 200  to back up data and restore backup files  by archive backup job     e Use the Restore screens  Section 9 3 on page 212  to restore by backup files   e Use the Snapshot screens  Section 9 4 on page 215  to create and manage snapshot jobs     e Use the Backup Software screen  Section 9 5 on page 220  to locate the Genie Backup  Manager license keys     9 1 2 What You Need to Know About Protection Methods    Configuration File Backup and Restoration    BES    Use the Maintenance  gt  Configuration menus to create a file of your NSA configurations  such as passwords  shares and volumes created  network settings and so on  If you   re going to  do some major configuration changes  then it is advisable to create a configuration backup file   If things go wrong after you make the configuration changes  you can always go back to the  previous configuration by restoring an earli
318. on to open the New ACL Configuration screen  See Section  8 4 2 1 on page 191 for details    Modify ACL    Click this icon to open the ACL Permission screen  See Section 8 4 2 2  on page 192 for details     i Reset ACL  r Click this to reset the ACL permissions on the selected file or folder   Restricted Folder  This is a folder that has ACL permissions set   Restricted File  This is a file that has ACL permissions set        190 NSA 2401 User   s Guide    Chapter 8 Sharing Screens    The following table describes the labels in this screen   Table 61 Sharing  gt  Shares  gt  Create a New Share  gt  Share Access Configuration    Type This indicates whether the item in the list is a folder or file  as well as  whether it is locked or unlocked     ACL Path This indicates the file or folder path and name on the share   Click this to close the screen     8 4 2 1 New ACL Configuration    This screen allows you to create a new ACL configuration        Figure 162 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL Configuration    ACL Configuration    ow    Set ACL    Current Location   Tam    2008 05 09 09 37 47  2008 05 09 0937 40  2008 05 09 093726  2008 05 09 09  37 34  2008 05 08 16 47 46    127 035 MB 2008 05 08 1647 44       The following table describes the icons in this screen   Table 62 Sharing  gt  Shares  gt  ACL Configuration  gt  New ACL Configuration Icons    DESCRIPTION    Set ACL    Select a file or folder from the list  then Click this icon to open the ACL  Perm
319. ong with what kinds of actions they are allowed to perform  with those files and folders  delete  move  rename  and so on     e The user   s computer may already be connected to another of the NSA   s shares using a  different user name and or password  This can happen without the user realizing it if the  user   s computer automatically connects to a share at logon  Right click any other  connected shares and click Disconnect  Then re attempt to connect to the desired share     Check if the share has an ANONMYOUS or EVERYONE access right  If the user is  already logged into a share using her username and password  she will NOT be able to  access a share that has ANONYMOUS FTP only access rights  as these require    no  login       In this case she should log out and try to access the share again without logging in   See Section 8 4 2 3 on page 193 for more details    Check if the shared folder is a subfolder of another  parent  share  Check that the parent  share   s access rights do not conflict with the subfolder share  It is recommended that you  do not create subfolder shares     Check if the user belongs to a group with conflicting access rights  DENY always takes   precedence  If you allow a user FULL access to a share but set his group to DENY  then  he will NOT be able to access the share    The local user should check if there are any existing mapped network drives to the NSA   He may need to disconnect existing CIFS connections as new CIFS connection may use   prev
320. ons  gt  FTP    Enable FTF  l     Connection  Connection Limit  10 Limit  60  Max     Timeout   Idle Timeout  15 Minutes 300    minutes       Enable Anonymous FTP Access     i  Note     To configure a share to allow anonymous FTP access go to the configure shares  page and modify a share s access rights to allow the user    Anonymous FTP        Character Set      UTF 8  E       The following table describes the labels in this screen   Table 88 Applications  gt  FTP    LABEL DESCRIPTION   Enable FTP Select this to allow users to connect to the NSA via FTP  This also enables  FTP over Explicit TLS  FTPES   You can use FTP or FTPES to send files  to the NSA or get files from the NSA    Connection Limit Enter the maximum number of concurrent FTP connections allowed on the  NSA in this field    Idle Timeout Enter the length of time that an FTP connection can be idle before being  disconnected by the NSA     Enable Anonymous FTP   Select this to allow any user to log into the NSA using    FTP    or   Access    anonymous    as a username and no password  Any other name is  considered a username  so must be valid and have a corresponding  correct password     Character Set Select the appropriate language encoding here If the NSA   s folders or file  names do not display correctly in your FTP client  The NSA uses UTF 8  format for FTP by default    This setting applies to all FTP client connections to the NSA  It does not  affect your Windows CIFS connections  it will not correct the 
321. ooting    e Make sure the Ethernet cable is connected properly to the NSA and connected to another   Ethernet  device  Make sure the other device is turned on  If it   s connected directly to a  computer  make sure that the computer network card is working  ping 127 0 0 1 on the  computer     e Use another Ethernet cable  If you   re connecting to a Gigabit Ethernet  make sure you    re  using an 8 wire Ethernet cable    e If the problem continues  contact the vendor     See Section 1 1 1 on page 32 for a description of NSA LEDs               hear a buzzer sound coming from the NSA        e By default when the NSA generates an emergency log  it also sounds an audible alarm to  warn you    e Log into the Web Configurator  You will be presented with a screen that displays the log  and lets you disable the buzzer     12 3 NSA Login and Access         pa I forgot the IP address for the NSA           e 192 168 1 3 is the default LANI IP address and 192 168 100 1 is the default LAN2 IP  address    e Use the NDU  NSA Discovery Utility  to discover your NSA  If you have admin  privileges  you can directly change the IP address of the NSA using the NDU    e If you changed the default password and you don   t have the NDU  use the RESET button  at the front of the NSA  Refer to Section 2 7 on page 52 for detailed information on the  reset button        pa I forgot the password        e The default password is 1234     e You may have to reset the NSA password or configuration   see Sect
322. oped by the Apache Software Foundation under Apache License     Apache License    Version 2 0  January 2004    http   www apache org licenses     TERMS AND CONDITIONS FOR USE  REPRODUCTION  AND DISTRIBUTION  1  Definitions        License    shall mean the terms and conditions for use  reproduction  and distribution as  defined by Sections I through 9 of this document        Licensor    shall mean the copyright owner or entity authorized by the copyright owner that is  granting the License        Legal Entity    shall mean the union of the acting entity and all other entities that control  are  controlled by  or are under common control with that entity  For the purposes of this  definition        control    means  1  the power  direct or indirect  to cause the direction or management of such  entity  whether by contract or otherwise  or  11  ownership of fifty percent  50   or more of  the outstanding shares  or  111  beneficial ownership of such entity        You     or    Your        shall mean an individual or Legal Entity exercising permissions granted by  this License        Source    form shall mean the preferred form for making modifications  including but not  limited to software source code  documentation source  and configuration files        Object    form shall mean any form resulting from mechanical transformation or translation of  a Source form  including but not limited to compiled object code  generated documentation   and conversions to other media types    
323. or selling of Original Code  to make  have made  use  practice  sell  and offer  for sale  and or otherwise dispose of the Original Code  or portions thereof  the licenses  granted in this Section 2 1  a  and  b  are effective on the date Initial Developer first  distributes Original Code under the terms of this License     Notwithstanding Section 2 1  b  above  no patent license is granted  1  for code that You  delete from the Original Code  2  separate from the Original Code  or 3  for infringements  caused by  i  the modification of the Original Code or 11  the combination of the Original Code  with other software or devices     2 2  Contributor Grant     Subject to third party intellectual property claims  each Contributor hereby grants You a  world wide  royalty free  non exclusive license under intellectual property rights  other than  patent or trademark  Licensable by Contributor  to use  reproduce  modify  display  perform   sublicense and distribute the Modifications created by such Contributor  or portions thereof   either on an unmodified basis  with other Modifications  as Covered Code and or as part of a  Larger Work  and under Patent Claims infringed by the making  using  or selling of  Modifications made by that Contributor either alone and or in combination with its  Contributor Version  or portions of such combination   to make  use  sell  offer for sale  have  made  and or otherwise dispose of  1  Modifications made by that Contributor  or portions  thereo
324. ork connection is OK        Click Apply to save your TCP IP configurations  After you click Apply  the NSA  restarts  Wait until you see the Login screen or until the NSA fully boots and then  use the NDU to rediscover it     Reset Click Reset to begin configuring this screen afresh     Apply       7 3 Windows CIFS    BS    Use this screen to configure your CIFS settings  In this screen you can set your server name  and specify if your NSA is a part of a workgroup or domain        CIFS is always enabled on the NSA        NSA 2401 User   s Guide       Chapter 7 Network Screens       BS The NSA automatically restarts its network services after you apply changes in  the TCP IP or Windows CIFS screens        Workgroup Security Mode    A workgroup is a group of computers on a network that can share files  On the NSA  use  Workgroup Security Mode if the user names and passwords for these computers are  maintained on the NSA  This is suitable for users using the Common Internet File System   CIFS  protocol for remote file access in a small to medium sized office     Windows Domain Security Mode    A domain is a group of computers that are part of a network and share a common directory  database  On the NSA  use Windows domain security mode if you want centralized  management of shared resources  services and user on a centralized Windows based domain  controller  You can create users and groups on the centralized Windows based domain  controller such as an active server directory  a
325. other library facilities not covered by this License  and distribute such a  combined library  provided that the separate distribution of the work based on the Library and  of the other library facilities is otherwise permitted  and provided that you do these two things   a  Accompany the combined library with a copy of the same work based on the Library   uncombined with any other library facilities  This must be distributed under the terms of the  Sections above  b  Give prominent notice with the combined library of the fact that part of it 1s  a work based on the Library  and explaining where to find the accompanying uncombined  form of the same work     8  You may not copy  modify  sublicense  link with  or distribute the Library except as  expressly provided under this License  Any attempt otherwise to copy  modify  sublicense   link with  or distribute the Library is void  and will automatically terminate your rights under  this License  However  parties who have received copies  or rights  from you under this  License will not have their licenses terminated so long as such parties remain in full  compliance     9  You are not required to accept this License  since you have not signed it  However  nothing  else grants you permission to modify or distribute the Library or its derivative works  These  actions are prohibited by law if you do not accept this License  Therefore  by modifying or  distributing the Library  or any work based on the Library   you indicate your a
326. ove Hot Spare disk 0  from   Disk Slog ID  RAID Raid  FAILED  Storage   EMERG There is a RAID Degraded  RAID  Storage   CRIT Please check disk 0   Which disk to  RAID check when  degrade  Storage   NOTICE Auto Repair Degraded RAID by   Disk Slog ID  RAID disk 0   Storage   NOTICE Raid Rebuild Percentage   0     20 40 60 80   RAID 100  Storage   INFO Create Internal Normal Volume   Volume Name   Size  Volume  101   Size  1 MB   SUCCESS  Storage   INFO Create Internal Crypto Volume   Volume Name   Size  Volume  101   Size  1 MB  using  PASSWD  SUCCESS  Storage   INFO Create Internal Crypto Volume   Volume Name   Size  Volume   0   using USB Key   Size  1 MB   SUCCESS  Storage   INFO Create External Normal Volume   Volume Name   Filesystem  Volume  101    1    SUCCESS type    Storage   INFO Create External Crypto Volume   Volume Name   Filesystem  Volume  101    1   using PASSWD   SUCCESS    Storage   INFO Create External Crypto Volume   Volume   0   using USB Key   1     SUCCESS   Storage   INFO Delete Volume  SUCCESS   Volume   Storage   INFO Create USB Key  SUCCESS   Volume   Storage   INFO Duplicate USB Key  SUCCESS   Volume   Storage   INFO Rename Internal Volume to Volume Name   Volume   O    SUCCESS               Volume Name   Filesystem       Storage   INFO Expand Volume  Increased Size  Volume Size  0 MB   SUCCESS   Storage   INFO Lock Internal Volume   Volume SUCCESS    NSA 2401 User   s Guide    Appendix A Log Messages    Table 114 Log Messages    FEATURE   SEVERITY M
327. own   locked  or degraded  If it is  then see Section 12 2 on page 249             The snapshot or backup does not run at the time configured        e Check that the correct time is configured on the NSA     e Check that the NSA is able to access the time server from which it gets the time  see  Chapter 5 on page 121     12 6 External USB Disks         m The COPY LED is red           Copying files from a USB device failed  The USB device may not be compatible with the  NSA  Press the COPY button to set the COPY LED back to green  Try saving the files onto a  computer and then from the computer to the NSA  through the network connection      NSA 2401 User   s Guide    Chapter 12 Troubleshooting    256 NSA 2401 User s Guide       Product Specifications    See also the Getting to Know Your NSA chapter for a general overview of the key features     13 1 Feature Tables    These are the main external physical features   Table 109 Physical Features    2 USB Ports Expand storage capacity by attaching compatible USB  version 2   hard drives to the USB ports     2 Gigabit Ethernet Ports The 10 100 1000 Mbps auto negotiating Ethernet ports allow the  NSA to detect the speed of incoming transmissions and adjust  appropriately without manual intervention  They allow data transfers  of either 100 Mbps or 1000 Mbps in either half duplex or full duplex  mode depending on your Ethernet network  Use 8 wire Ethernet  cables for Gigabit connections  The ports are also auto crossover   MDI MDI X 
328. page 299 for more information on browsers and certificates     1 Close your web browser and open it again to reset its session with the NSA  Log in and  click Maintenance  gt  SSL  Select Force HTTPS and click Apply     Figure 54 Maintenance  gt  SSL    Force HTTPS  TLS SSL  Connections    A Caution     Modifications of TLS SSL certificate settings will restart network  Services     4 Force HTTPs    Install System Default CA    This action will install the system default C4 in the trusted CA list of your browser    Stepi Download the default CA file   Benissa    Step  Double click on the CA file to install it into your browser    Modify the Existing Certificate    fi Caution     Modifications of TLS SSL certificate settings will restart network services       Edit a self signed C4 certificate  Stepl Edit the Self signed Certificate    Step  Download the self signed CA file    Beris    Step3 Double click on the CA file to install it into your browser       C Create a Certificate To Be Authorized By My Own Certificate Authority       NSA 2401 User s Guide 15    Chapter 3 Tutorials    2 A warning screen pops up if applying your change may disconnect some users  Click  Apply to continue     Figure 55 Maintenance  gt  SSL  gt  Force HTTPS Warning    DT  Warning Confirmation    The following users are currently connected  If you  decide to continue  they may be disconnected     Username   IP Address    admin 192 168 1 33  Gonzo 192 168  1 33       Performing this operation vill cau
329. peed 119  FAT16 150  FAT32 150  FCC interference statement 353  file   access 85   browsing 40   path 43   restricted 88   security 85   storage system 260   system 150   troubleshooting access 254  File Transfer Protocol over Explicit TLS  see FTPES  File Transfer Protocol  see FTP    files  deleting 41  FileZilla 81  fingerprint 79  firmware 241  specifications 260    upgrade 241  version 1  119  200    folder 38  40  access 85  browsing 40  name restrictions 45  security 85  troubleshooting access 254  folders  copying 42  deleting 41  moving 42  forgot password 251  front panel LEDs 32    FTP 81  223  224  anonymous access 225  character set 225  connection limit 225  idle timeout   FTP 225  over Explicit TLS 81  settings 169    FTPES 81  223    NSA 2401 User s Guide    Index    FTPES   FTP over explicit TLS SSL 82    G    Genie Backup Manager 258  license keys 220  port conflict 198  Gigabit Ethernet 31  257  global  icons 38  48  labels 38  GNU GENERAL PUBLIC LICENSE 333  GNU LESSER GENERAL PUBLIC LICENSE 326  group  name restrictions 185  group names 185  groups 58  182    H    hard drive 125  external 39  internal 39  manufacturers 31  recommendations 132  see also disk  sleep time 243  hardware specifications 259  help icon 48  home icon 49  hot spare 137  155  HTTP over SSL  see HTTPS  HTTPS 75  229  239  humidity 260  hyper links 49  HyperText Transfer Protocol over Secure Socket  Layer  see HTTPS    icons 38  about 48  administration 48  common 51  global 38  48  
330. penSSL   Your Certificates   icati   Peer SSL Certificates i    Organization   Common Name      Remove      Verify  Proxy    Stylesheets a     Organization  ZyXEL    Organization  zy   m  23 Organizational unit  XYZ200 A    Oraanizational unit  XYZ    C t Om sten rv tie bz  4   MA el 4    gt   o      Valid from  Wednesday 21 May 2008 06 42 35 am GMT       Valid until  Saturday 21 May 2011 06 42 35 am GMT  Browser Identification  Cache                                  Policy      Permanently    Vg     Until  gt   Reject  Plugins    J  Prompt    MDS digest  3F 9A 76 6E A9 F5 07 41 BE 4C 8B 8B A2 D3 F0 2F  Performance       Accept                                          Help    Defaults   w OK         4 The next time you go to the web site that issued the public key certificate you just  removed  a certification error appears        BS There is no confirmation when you remove a certificate authority  so be  absolutely certain you want to go through with it before clicking the button           NSA 2401 User   s Guide    Appendix C Importing Certificates    NSA 2401 User   s Guide       Open Source Licences    Information herein is subject to change without notice  Companies  names  and data used in  examples herein are fictitious unless otherwise noted  No part may be reproduced or  transmitted in any form or by any means  electronic or mechanical  for any purpose  except the  express written permission of ZyXEL Communications Corporation     This Product includes software devel
331. penSSL Project  All rights reserved     Redistribution and use in source and binary forms  with or without modification  are permitted  provided that the following conditions are met     Redistributions of source code must retain the above copyright notice  this list of conditions  and the following disclaimer     Redistributions in binary form must reproduce the above copyright notice  this list of  conditions and the following disclaimer in the documentation and or other materials provided  with the distribution     All advertising materials mentioning features or use of this software must display the  following acknowledgment   This product includes software developed by the OpenSSL  Project for use in the OpenSSL Toolkit   http   www openssl org         The names    OpenSSL Toolkit    and    OpenSSL Project    must not be used to endorse or  promote products derived from this software without prior written permission  For written  permission  please contact openssl core Qopenssl org     Products derived from this software may not be called    OpenSSL    nor may    OpenSSL     appear in their names without prior written permission of the OpenSSL Project     Redistributions of any form whatsoever must retain the following acknowledgment      This product includes software developed by the OpenSSL Project for use in the OpenSSL  Toolkit  http   www openssl org         THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT    AS IS  AND ANY  EXPRESSED OR IMPLIED WARRANTIES  INCLUDI
332. pload its log files to the syslog server   Server   Server Address   Enter the syslog server   s IP address in this field when the Enable Syslog Server  option is selected     Syslog Choose the type of logs to upload to the syslog server  See Section 11 2 0 1 on  page 231 for information on the different log classes    Apply Click this to save your changes   Cancel Click this to discard changes and close the window        11 2 5 Export Log    Click Maintenance  gt  Log and then select a log from the list  To export it  click the Export  Log icon  Your web browser prompts you to download the log file as a CSV  Comma  Separated Value  file type  which is compatible with Microsoft Excel and other spreadsheet  software     236  NSA 2401 User   s Guide    Chapter 11 Maintenance Screens    11 3 Configuration    Click Maintenance  gt  Configuration to open a screen where you can backup and restore the  NSA configuration settings or restore the device to its factory default settings     Figure 199 Maintenance  gt  Configuration  Backup Current Configuration Settings    Click the Backup button to save the current configuration of our system to your local computer        Include Volume Encryption Settings    To restore    previously saved configuration file to your system  browse to the location of the  configuration file and click Restore   Stepl Restore File         Croce   MEN    Step  Select Restore Type   Restore Configuration    Restore Volume Encryption Settings    Reset to Defa
333. printable characters  no single and double quotes       i  Note     Please turn on the Javascript and Activex control setting on  Internet Explorer     Login   Reset       Copyright 2008 by ZyXEL Communications Corp     2 Click the Gonzo share     Figure 33 Gonzo s My NSA Screens    Es    Password    he My NSA    My Shares    Meer Stora m  Applianes 5    Gonzo   angi aa    Other Shares       NSA 2401 User   s Guide    Chapter 3 Tutorials    3 Open the Strategy share     Figure 34 Gonzo Share Screen    Share Browsing    t SG     Create Folder Upload Delete Move Copy    Current Location     Gonzo    recycle 2008 09 16 09 37 36  Strategy 2008 09 16 09 43 04          NSA 2401 User s Guide    Chapter 3 Tutorials    4 Click Upload     Figure 35 Strategy Folder Screen    ii   co    r z      E       ile            Create Folder Upload Delete Move Copy    Current Location   Gonzo Strategy    m  l        2009 Plan doc 35 00 KB 2008 09 04 15 17 07       5 Browse to the 2010 2014 Plans doc file and click Apply     Figure 36 Upload Files Screen    Upload Files    File 1   Browse       File 2   Browse       File 3   Browse         File 4   Browse       File 5   Browse         Cl Mote  The size of uploaded files can t be more than 2 GB        3 4 How to Find the NSA in OS X    Here   s how to find the NSA 2401 OS X  This example uses Mac OS X 10 5  Leopard      NSA 2401 User s Guide 65    Chapter 3 Tutorials    1 Click the Finder icon in the dock     Figure 37 Opening the Finder    Finder  
334. pts  cause a reallocation  not read errors  This can be difficult to test  since only direct I O writes to the disk cause reallocations  not  cached writes          198   Uncorrectable  Sector Count    Low This is the number of errors reading or writing a sector that were  not correctable  An increase in this value is an indicator of disk  surface defects or mechanical subsystem problems     199   UltraDMA CRC  Error Count    Low This is the number of data transfer errors through the interface  cable according to the ICRC  Interface Cyclic Redundancy  Check      Write Error Rate     Low This is the total number of errors in writing sectors   Multi Zone Error    200       Rate    This is the number of read write head off track errors  If the value  is not zero  make a backup     This is the number of data address mark errors  This could also  be a different  manufacturer specific attribute     This is the number of ECC  Error Correction Code  errors     201   Soft Read Error  Rate   202   Data Address  Mark Errors   203   Run Out Cancel    204   Soft ECC  Correction    L  L  L    OW  OW  OW  Ow This is the number of errors corrected by software ECC  Error  Correction Code      NO      O1    Low    Thermal Asperity  Rate  TAR     This is the number of thermal asperity errors  Thermal asperity is  a read signal spike caused by sensor temperature rise due to       touching the disk surface or contaminant particles     This is the height of the hard drive   s read write heads abov
335. pying  distribution and modification follow  Pay close  attention to the difference between a    work based on the library    and a    work that uses the  library     The former contains code derived from the library  whereas the latter must be  combined with the library in order to run     GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR  COPYING  DISTRIBUTION AND MODIFICATION    0  This License Agreement applies to any software library or other program which contains a  notice placed by the copyright holder or other authorized party saying it may be distributed  under the terms of this Lesser General Public License  also called  this License         Each licensee is addressed as    you        A    library    means a collection of software functions and or data prepared so as to be  conveniently linked with application programs  which use some of those functions and data   to form executables  The    Library     below  refers to any such software library or work which  has been distributed under these terms  A    work based on the Library    means either the  Library or any derivative work under copyright law  that is to say  a work containing the  Library or a portion of it  either verbatim or with modifications and or translated  straightforwardly into another language   Hereinafter  translation is included without  limitation in the term  modification          Source code    for a work means the preferred form of the work for making modifications to it   For a l
336. r is an HTML based management interface that allows easy NSA setup  and management via Internet browser  Use Internet Explorer 6 0  Mozilla firefox 1 0   Netscape Navigator 7 0 or later versions of these browsers  The recommended screen  resolution 1s 1024 by 768 pixels or higher     In order to use the Web Configurator you need to allow JavaScripts     2 2 Accessing the NSA Web Configurator    Make sure your NSA is properly connected  refer to the Quick Start Guide      2 2 1 Access the NSA Using the NDU    If you don   t know the IP address of the NSA  then use the NDU to find it  Refer to the Quick  Start Guide to see how to install and run the NDU     NSA 2401 User   s Guide    Chapter 2 Introducing the Web Configurator    Figure 3 NDU Main Screen         gt      He          neaddll  1921 68 1 34          Local IP  192 168 1 33  C  Copyright 2008 by Zus EL Communications Corp    From the NDU main page click the icon under Admin to see the Web Configurator screen  login screen   2 2 2 Web Browser Access    Open your browser and type in the IP address of the NSA  If the NSA does not get IP  addresses from a DHCP server  the default LANI IP address is 192 168 1 3 and the default  LAN2 IP address is 192 168 100 3     Figure 4 NDA URL  File Edit Viem Favorites Tools Help       sack x  gt  m   f   Pp Search       2 3 Login    The default user name and password are    admin    and    1234 respectively  Enter your user  name and password  then click Login  Non admin users can cha
337. raded array  so it   s recommended that you  replace the faulty disk and repair the array as soon as you can    Down   Indicates that a disk array is down and cannot be fixed    Healthy   Green indicates a healthy volume  The volume is OK and the file system  is functioning properly    Locked Volume   Indicates that the volume has been locked with encryption  The password  is set the first time the volume is locked    Unlocked Volume    Indicates that the volume has an encryption layer than can be activated  on the fly  The first time you lock a volume this encryption layer is created     Down    Indicates that a volume is down and can not be fixed    The following table describes the labels in this screen   Table 17 Status    LABEL DESCRIPTION    CPU Usage This displays a summary of CPU usage by all current processes     Click the Refresh icon to update this display  It also automatically  updates itself every 10 seconds        Note  If too many users are using the NSA then the NSA  may appear sluggish           118 NSA 2401 User s Guide    Chapter 4 Status Screen    Table 17 Status  continued   LABEL DESCRIPTION    This displays the current temperature near the NSA   s CPU  The NSA  generates an emergency log if the temperature goes out of the normal  operating range  If the temperature goes even higher  the NSA shuts  down automatically to avoid damage from overheating  If the NSA  overheats  make sure the fans are working and it is in a well ventilated  place    Click the
338. reate       up to four JBOD arrays   e one or two JBOD arrays and one RAID 0 or RAID I array   e two RAID 0 arrays or two RAID I arrays   e one RAID 0 array and one RAID I array   e one RAID 5 array  with three disks  and one JBOD array   e one array using one of RAID 10  RAID 5 or RAID5_ 3   hot spare    e RAID 10  RAID 1  0  offers maximum data security but just 50  of the storage  space  RAID 10  RAID 1 0  is a nested RAID where two RAID I arrays are stored on  the physical disks with a RAID 0 array on top  You can recover all data even if two  disks  not in the same RAID 1 array  fail  If two disks in the same RAID 1 array fail   then all data in the array is lost  If two disks in different RAID I arrays fail  then you  effectively have a RAID 0 configuration    e RAID 5 provides more storage space and protection against up to one disk failure   RAID 5 uses 75  of the available space for your data  All data can be recovered if one  disk fails  If two disks fail then  all data in the array is lost  If one disk fails  the array  is degraded and will perform more slowly than a healthy array  You should replace the  faulty disk and re synchronize the array to attain previous performance    e RAIDS  with hot spare  automatically recovers the array if a disk fails  It operates as a  three disk RAID 5 array with the fourth disk on standby  If a disk in the 3 disk RAID5  array fails  the NSA automatically uses the standby disk to re synchronize the array so  it gets back to opera
339. reproduce the above copyright notice  this list of  conditions and the following disclaimer in the documentation and or other materials provided  with the distribution     Neither the name of the University nor of the Laboratory may be used to endorse or promote  products derived from this software without specific prior written permission     THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS    AS IS   AND ANY EXPRESS OR IMPLIED WARRANTIES  INCLUDING  BUT NOT LIMITED  TO  THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  PARTICULAR PURPOSE ARE DISCLAIMED  IN NO EVENT SHALL THE REGENTS  OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT  INDIRECT  INCIDENTAL   SPECIAL  EXEMPLARY  OR CONSEQUENTIAL DAMAGES  INCLUDING  BUT NOT  LIMITED TO  PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES  LOSS OF  USE  DATA  OR PROFITS  OR BUSINESS INTERRUPTION  HOWEVER CAUSED  AND ON ANY THEORY OF LIABILITY  WHETHER IN CONTRACT  STRICT  LIABILITY  OR TORT INCLUDING NEGLIGENCE OR OTHERWISE  ARISING IN  ANY WAY OUT OF THE USE OF THIS SOFTWARE  EVEN IF ADVISED OF THE  POSSIBILITY OF SUCH DAMAGE     This Product includes php software under the PHP License    The PHP License  version 3 0  Copyright  c  1999   2006 The PHP Group  All rights reserved     Redistribution and use in source and binary forms  with or without modification  is permitted  provided that the following conditions are met     1  Redistributions of source code must retain the above copyright notice  this list of conditions  an
340. rhood      ere Neighborhood  Network HK pees Neighborhood    iDisk    m    Neighborhood     Applications DBA Guss Neighborhood  ST Utilities HU nnn Neighborhood         Server  Recent Folders P desktop ae   Mac Server    Go to Folder    OEG  Connect to Server      K          NSA 2401 User   s Guide 67    Chapter 3 Tutorials    4 When the Connect to Server dialog box opens  type smb    and the IP address of your  NSA 2401 or click Browse to find it in your network  Click Connect     Figure 41 Connecting to the NSA   A Network  a Eo   im     View Quick Look  Name Date Modified   11800 nb    A ONO Connect to Server    Server Address     7 108   smb   172 16 37 108      ote de     h HD      Favorite Servers       Browse           Min       5 Once connected  you can now access the NSA from the finder or directly from the  desktop     3 5 How to Configure Security    Use these tutorials to help you secure your NSA  See also Chapter 6 on page 125 for details on  encrypting volumes     3 5 1 Configuring Security for Web Configurator Sessions    These tutorials show you how to configure security for the NSA   s Web Configurator sessions   You will customize the NSA   s self signed SSL certificate and distribute it to your users     68 NSA 2401 User s Guide    Chapter 3 Tutorials    3 5 1 1 Customizing the NSA   s Certificate    1 Click Maintenance  gt  SSL and then select Edit a self signed CA certificate and click  Edit     Figure 42 Maintenance  gt  SSL    Force HTTPS  TLS SSL  Conn
341. riginally have two disks configured in a RAID 1 array  and you then buy  two more disks and want to configure all four at RAID 5  you should first back up all your data  on those disks  see the Genie Backup Manager utility on the included CD  and then restore  your data later after you create the new array     Below is a table that summarizes some attributes of the various array levels as supported on  the NSA  For capacity and storage efficiency     S    is the size of the smallest drive in the array   and    N    is the number of drives in the array    Performance rankings are approximations    Table 24 RAID Array Levels Quick Comparison    Write Performance YYY YYY    A  Storage efficiency means what percent of the possible storage capacity can be used  This table assumes all  drives in a RAID array are of identical size  A JBOD array provides capacity equal to the sum of all disks in the  array        The following is a guide to help you choose a RAID level depending on how many disks you  have installed in the NSA  See Section 6 9 on page 151 for technical background on JBOD and  the RAID levels used on the NSA     One Disk    With only one disk  you must use JBOD  All disk space is used for your data   none is used for  backup  If the disk fails  then you lose all the data on that array  You can later add another disk  to your one disk JBOD array  without having to re create shares  access rights and so on  or  create a different JBOD array  and create new shares  acces
342. rmware is being uploaded to the NSA  Do  not turn off or reset the NSA while the firmware update is in progress        Figure 204 Maintenance  gt  FW Upgrade    Firmware Upgrade    To Upgrade the firmware  browse to the location of the binary  BIN  upgrade file and click Upload  Upgrade files    can be downloaded from the website  If the upgrade file is compressed   2IP file   you must first extract the  binary  BIM  file  In some cases  YOU may need to reconfigure this device after upgrading     You are currently using firmware version  1 00 4FF  0jb4    Firmware File    Browse            The following table describes the labels in this screen   Table 105 Maintenance  gt  FW Upgrade    LABEL DESCRIPTION  Enter the location of the firmware file you want to upload     Browse Click this open a Browse dialog box to find the file on your computer if  you don t want to manually enter the location     Click this to upload the new firmware     The NSA automatically restarts after you upgrade  Wait until the restart  completes before accessing the NSA again  If you interrupt the upgrade   then the NSA may become unusable     Click this to begin configuring this screen afresh        11 6 Power Management    Click Maintenance  gt  Power Management to open this screen  where you can set the NSA   s  power management settings     242 NSA 2401 User s Guide    Chapter 11 Maintenance Screens    Figure 205 Maintenance  gt  Power Management    a  Hard Drive Sleep Time Settings     i  Note  Se
343. rnal hard drives or external  USB  devices that  you can access  but not manage         NSA 2401 User   s Guide 39    Chapter 2 Introducing the Web Configurator    2 5 1 My NSA Share Browsing Screen    Click My NSA and then click a share to open the following screen  Use the My NSA share  browsing screens to see and access share contents    e Click a folder   s name to go into the folder    e Click a file   s name to be able to save the file to your computer    e Click the play icon to play the file  At the time of writing this is only for MP3 files    e Click to the right of a file or folder name to select it     e Use the  SHIFT  key to select a range of entries  Hold down the  CTRL  key to select  multiple individual entries     Figure 9 My NSA Share Browsing    Share Browsing    gr    Create Folder Upload Delete Move Copy    Current Location  Test          MyTest 2008 07 21 08 45 37  Example 2008 07 21 08 44 24  CIMG3822 1PG 2008 07 21 08 45 54  CIMG3823 1PG 2008 07 21 08 45 56       The following table describes the icons in this screen   Table 5 My NSA Share Browsing Icons    ICON DESCRIPTION    Create Folder  Click this icon to open a screen where you can create a new folder        Create Folder    Folder Name         Upload    Click this button to copy a file from your computer to this location in the  NSA     40 NSA 2401 User s Guide          Chapter 2 Introducing the Web Configurator    Table 5 My NSA Share Browsing Icons  continued   ICON DESCRIPTION    Delete  Sel
344. rnal volume 147  file system 150  key 142  143  149  locate 146  lock 148  scan 147  unlock 148  volume 149    user 46   access permissions 38   accounts 55   conflict user disk quota 177   conflict users 177   group names 185   groups 182   icon 52   list 175   name restrictions 179   non admin 180   password management 46   passwords 258   quota 178   screens 37   storage quota 178  user level screens 49  username 36  using   increased RAID capacity 109  UTF 8 45    V    volume 125  174  choosing a storage method 133  create 142  149  creating 138  crypto 141  148  down 139  edit 142  encryption 126  healthy 139  lock 141    NSA 2401 User   s Guide 361    Index    locked 126  139   name restrictions 45  password 142  149  RAID 1 153   scan 140   status 134   summary 139   unlock 140  141  146  unlocked 126  139  USB key 142  143  149    W    warranty 354  period 354   web browsers  share access tutorial 62  supported 261    Web Configurator 35  browsers 35  logout 38  49  troubleshooting access 252    web help 48  icon 38    web security 75  Windows 31    Windows domain  administrator 167  administrator password 168  leave 168  security mode 165    Windows Explorer 61  workgroup 177  258  workgroup security mode 165    write performance 91  218  affected by snapshots 91  218    X    XFS 150  174    Z    ZyXEL Communications Corporation 353    ZyXEL Limited Warranty  Note 354    362 NSA 2401 User s Guide    
345. rnannennnnnennnnnennnn 220  Table 87 Protect  gt  Snapshot  gt  Snapshot Images _                 0  cccsecceeceseseeceesesesescecescuseseeeeseeseseeeesseeeses 220  TENT jr 225  Table S9 Applicalions   Prini Se crosses oo ee ti ee eesti 226  Table 90 Applications  gt  Print Server  gt  Rename ae ktenknkk daa 227  Table 91 Appicalons   CODY BUTOI aS 227  Table 92 Applicat  ns  gt   Copy Button   EGIT cnisicieicanccnieeuniienstenaninnninnaernseriemcniens 228  Table 93 Applications  gt  Copy Button  gt  Edit ciccscaccic tie cascpiecevecnctinicanannctpicapensniuianengeledceeaocuigiaerseaotieismened  228  Table 94 Maintenance  gt  Log ICONS      rrurrrrrnnrennnnnenrnanernannernnnnnrnnanennnansennansennanssnnansannnunnnnnansennnssennnessennnn 230  Table 95 Maintenance  gt  Log  gt  Search Filters hen Gd   232  Table 96 Maintenance  gt  Log  gt  Log Config  gt  Log Records Configuration               ccccceseceeeeeeeeeeeeeeeeeees 233  Table 97 Maintenance  gt  Log  gt  Log Config  gt  Buzzer Priority          rrrrnennnnnennnnnerrnanernnnnnrnnnnrnnnnnrennnnsennnnne 233  Table 98 Maintenance  gt  Log  gt  Log Report Configuration  gt  Mail Setting          rrrrrrerrnnnenrnnnrenrannennnnnennnn 234  Table 99 Maintenance  gt  Log  gt  Log Report Configuration  gt  Report Setting        rrrrrrrnnnnennnnnvnnnnnenvnnnennnn 235  Table 100 Maintenance  gt  Log  gt  Log Report Configuration  gt  Syslog Server Setting          rrrrrrnnrrvvrnnnnre 236  Table 101 Maintenance  gt  Configuration ua
346. rray display under the array   s volumes     NSA 2401 User   s Guide       Chapter 6 Storage Screens    Table 19 Storage  gt  Internal Storage  gt  Status  continued   LABEL ICON DESCRIPTION    Hot Spare This is the array   s standby drive if it has one     There are not disks     displays if the array does not have a standby drive        These are installed disks that do not already belong to a disk array     6 3 Disk    You can view information on the NSA internal disks in this screen     Disk Replacement Restrictions    See the Quick Start Guide for information on replacing disks in the NSA  When replacing a  disk in a degraded or down RAID array  the new disk must be at least the same size or bigger  than the array   s smallest disk  so the NSA can restore all data in the array  For optimal  performance  all disks in the array should be the same model  capacity  and speed     For example  if you have RAID with 250 GB disks  you must put in a 250 GB or bigger disk as  a replacement in order to restore all original data in that array  If you use a bigger disk  the  extra space on the disk will not be used        BS The NSA automatically repairs a degraded RAID if you insert an empty disk  without an existing file system  Otherwise  when you replace a disk you must  go to the Storage  gt  Internal Storage  gt  RAID screen  select the degraded  array  and click Repair        6 3 1 Internal Disks Screen    Click Storage  gt  Internal Storage  gt  Disk to display the following 
347. rrnnnnnrvrrrrnnnnnrrrvrrnnnnnrennnnnnnnnnnnnn 142  Figure 132 Selecting tbe USB Device vha 144  Fig  re 139 Cressing a Duplicate USB KOy    nisaidia a Eaa ai 144  Figure 134 Creating a Duplicate USB Key  Eject        rrnrrrnevvrnnnnnrrevvvnnnnnnrvvnnnnnnnnvnnnvnnnnnrrnnnnnnnnsrnennnnnnnsee 145  Figure 135 Creating a Duplicate USB Key  Insert      mmmmnnnrrrrnnnnnnnnrnrovvnvvnnnnnnnnrsrrnnnnnvrnnnnnnennsssnnnnnnnnnnssenn 145  Figure 136 Storage  gt  External Storage  gt  Disk ois ccrentictoranesdawtarancrtiaissearevioaoraansyadionancctiaidarsanetaeserumanic 145  Figure 137 Storage  gt  External Storage  gt  Volume     rrrrnnnnnnnnnnnnnnnnnnnnernnnnnnnnnnnnnnnnnnnnnennnnnnnnnsrennnnnnnnnennn 147  Figure 138 Storage  gt  External Storage  gt  Volume  gt  Create       mmrrnnnrnrvvvvrnnnnervvnrnnnnnnrrnvvnnnnnnrrnnnnnnnnnnnnn 149  Figure 139 Stand Alone Teaming Mode scccsrisasraradincnass raanandsnareadsdanssiaeiincereraciainaisninabarielnaaraiaied 160  Figure 140 Fault Tolerance Teaming Mode    sa   snannnnnnnnnnnnnnnnesnnnnsnnnnrenrnrrrnrnreernnneranrnrenrrneennnreennreeenntenene 161  Fe 141 Loa Balancing Teaming MOGE asked Ea 161  Figure 142 Link Aggregation Teaming Mode      rrrrnnnnnnnnnnnnnnnnnnnnnvnnnnnnnnnsnnvnnnnnnssvnnnnnnnnassnnnnnnnnnennnnnnnnusene 161   A PM gg EE rere seein it erate oe NE i 162  FOWO ee Pl aie   TOR Pusse enee  163  Figure 145 Active Directory Example Application         rrrrnnnrrnvrnnnnvvennnnvrrrnnnnnrennnnnereenrnnerrennnnerrennnnereennnnnn 166  F
348. rs  0 sy minutes      a FP a O    L Li Li a    Report       The following table describes the labels in this screen   Table 99 Maintenance  gt  Log  gt  Log Report Configuration  gt  Report Setting  LABEL DESCRIPTION    Alert Select the kind of log s  to be sent out during mail alerts  Alerts are issued when a  critical or system event requires immediate attention  See Section 11 2 0 1 on page  231 for information on the different log classes     Report Time Set the frequency with which log files are mailed out     Report Select the kind of log s  to be sent out during mail reports  Reports are issued at  set intervals  See Section 11 2 0 1 on page 231 for information on the different log  classes    Apply Click this to save your changes    Click this to discard changes and close the window           NSA 2401 User   s Guide    Chapter 11 Maintenance Screens    11 2 4 3 Syslog Server Setting  This screen lets you set up the NSA to upload log files to a syslog server     Figure 198 Maintenance  gt  Log  gt  Log Report Configuration  gt  Syslog Server Setting    Log Report Configuration    Report Setting Syslog Server Setting       Enable Syslog Server  Server Address   s    Please select which log categories you wish to include in the log report     Syslog       The following table describes the labels in this screen   Table 100 Maintenance  gt  Log  gt  Log Report Configuration  gt  Syslog Server Setting    LABEL DESCRIPTION   Enable Syslog Select this option to have the NSA u
349. rts or labor  and to whatever  extent it shall deem necessary to restore the product or components to proper operating  condition  Any replacement will consist of a new or re manufactured functionally equivalent  product of equal or higher value  and will be solely at the discretion of ZyXEL  This warranty  shall not apply if the product has been modified  misused  tampered with  damaged by an act  of God  or subjected to abnormal working conditions     Note    Repair or replacement  as provided under this warranty  is the exclusive remedy of the  purchaser  This warranty is in lieu of all other warranties  express or implied  including any  implied warranty of merchantability or fitness for a particular use or purpose  ZyXEL shall in  no event be held liable for indirect or consequential damages of any kind to the purchaser     To obtain the services of this warranty  contact your vendor  You may also refer to the  warranty policy for the region in which you bought the device at http   www zyxel com web   support warranty info php    Registration    Register your product online to receive e mail notices of firmware upgrades and information  at www zyxel com     354 NSA 2401 User s Guide    A    about icon 48  access   configuration 44  189  Access Control List  see ACL  accessing share contents 40  account names 179  ACL 85  174  175  190  Active Directory  see AD  active sessions 120  AD 165  add disk 137  administration screens 38  47  ALM LED 32   troubleshooting 250  ano
350. rvrrnnnnrnnnnnnnrnnnnnsennnnnnnen 125  HE NEA Storage Status FN tdcievra ves sveiscixtrwinvesremnduaieeiarasdeeetssiantanisiarsdsdeesanetaerderdies 127  EE EEE ERE NE 128  KR PTE EE EE EE EEEE 128  LENIN 129  FE eee aeiiae dikei iniaa kaana iE 132  MILL vr 132  EEE EEE NK 134  PANNEN  135  Cem BR ERE EE TE Te mere sree ee 138  Go Merai roume Soo een eee ene Meee one ee a 139  6 6 1 Creating or Editing an Internal Volume        rrrnrnnnnnnnnnnnnnvnnnnnnnrnvnnnnnvnnnnnnnennnnnnnnnnnnnnnene 142  GJE EE ERE EE 143  6 7 External Storage Disk Screen          rrrrnnnrannnnrrvnnnnnnnnrrennnnnnnnsrnnrnnnnnnsennnnnnnnssrnnnnnnnnssennnnnnsnsennn 145  DE JE aC EE EE NR 147  6 8 1 Creating or Editing an External Volume         rrrnnnannnrnrnnnnnnnnnnnnvnnnnnnnennnnnnsnnnnnnnennnnnnnene 149  TN NNN een ee pene a One er ene rien a oer errs ne printer ernnnr er 151  ee EE RENEE 151  ENN 152  EE go EE EE EE EE EE 153  EE EE EE too ieccieeces  153  DET Lenkene 154  SE REE EEE EEE oceme E 155  NN ET 155  Doo RAD and Dala PN Beep renner eenien e ia ir 156  Cra ARAO AG 156  Chapter 7  E E AR 159  TA Nolwork Screens IVI PE EE ia eaa Eaa 159    NSA 2401 User   s Guide    Table of Contents    7 1 1 What You Can Do in the Network Screens icc eset sisiatvisdvereciavavecsavidtervorianedvaresneveres 159  7 1 2 What You Need to Know About the Network Screens       rrrrrnnnnnnnnvrnrnnnnrrrrnnnnnnrrnennnn 159  RTP NNN 160  TEN PEN 162  MN S osiinsa niaaa eiaa aaki iak ai 164  Tal GE POE 166  FE DE EEE EEE 
351. rypt the volume by  manually entering a password  Enter a password for encrypting the  volume        Password  Confirm  Re type the password to make sure you entered it correctly   Password Prompt Enter a hint to help you recall the password if you forget it     USB Key    The USB field and button display if you choose to encrypt the volume by  USB key  Select a USB key device that you created previously or select a  USB device that you want to make into a USB key     If the USB device is not already connected  connect it and click the    Refresh icon     The NSA   s upper USB port is USB1 and its lower USB port is USB2     It is recommended that you use a USB device to store a volume key only  and not also use it for storage        NSA 2401 User   s Guide       Chapter 6 Storage Screens    Table 36 Storage  gt  External Storage  gt  Volume Create  continued   LABEL DESCRIPTION    Create USB Drive Click this button to go to screens you can use to create a password for  unlocking the volume and store the password on a connected USB  device  You also use the screens to create copies of the USB key  See  Section 6 6 2 on page 143 for details     Note  Create duplicate USB keys now since you cannot  make them later  Without a USB key  you cannot  access the volume if it becomes locked  All of the  volume   s data will be unusable        Apply Click this button to save your changes back to the NSA   Click this button to discard your changes and close this screen     6 9 Technical 
352. s  Backups are more reliable than snapshots    2 Backups are more reliable than snapshots  So have backups available in case snapshots  become invalid     3 Backups may require several hours depending on the amount of data you have to back up   it   s a good idea to schedule backups at non peak times   so you should take a snapshot  of your data before the backup is run  If a file becomes corrupt during the backup  you  can still revert to the previous snapshot and back up again    4 If files to be backed up are open at the time of the backup  then make sure that snapshots  are allowed  If they are allowed and files are open at the time the backup is run  then  backup first takes a snapshot and then copies the files from this snapshot        BS A backup proceeds without the snapshot if there is not enough space for the  snapshot  but if an open file changes during the backup  the backup fails        NSA 2401 User   s Guide 199    Chapter 9 Protect Screens    Finding Out More  See Chapter 6 on page 125 for more information on RAID     See Section 3 7 on page 89 for backup and snapshot tutorials     9 2 NSA Backup Screens    Use the Protect  gt  Backup menus to create data backups to another volume  an external USB  disk drive  or a computer or another NSA over the network     The NSA deletes old backups according to the backup job   s purge policy  see Section 9 2 2 on  page 202  before creating a new backup  If you have a backup scheduled to begin at midnight   then at that t
353. s Guide    Chapter 3 Tutorials    3 7 1 Creating a Snapshot Job    Here   s an example of configuring hourly snapshots for a volume   1 Click Protect  gt  Snapshot  gt  Add Job     Figure 76 Protect  gt  Snapshot    ss Protect  Snapshot        Snapshot    Status    i PIG   Ga    Add Job J Snapshot Edit Job Take Delete    Date Time Image Snapshot Selected  ACCESS Now Jobisi    Internal Storage Snapshot Jobs    External Storage  TCPFIP  Windows CIFS  HFS    Users  Groups  Shares    Backup   Restore  Snapshot  Backup Software          NSA 2401 User   s Guide    Chapter 3 Tutorials    2 Enter a name for the job  select the volume of which to take snapshots  set the number of    snapshot images to keep  2 in this example   For the frequency  set it to occur every  hour  Click Apply        LES It s strongly recommended to set the maximum amount of snapshots setting    as low as possible as a high amount of snapshots can significantly reduce the  volume   s file write performance        Figure 77 Protect  gt  Snapshot  gt  Add Job  Add a New Snapshot Job    Job Mame  hourly example  Volume Name  volume   x   Max  Number of Snapshot Imagefs  2 w    Frequency Hourly i    Every how many hours   1    On which minute of the hour  o 5    Cl Mote     You can edit the related settings in the  Snapshot Image Access  menu or go to  Sharing page to edit the    snapshots    share        3   2 Configuring Snapshot Image Access    Taking a snapshot creates an image file that you use to restore fi
354. s Overview    This chapter introduces different ways of protecting data on the NSA and explains how to use  the Protect screens to create and schedule snapshots and backups     There are a variety of ways to protect your data on the NSA  Below is a summary table of  preventative steps you should do in advance to protect against various problems     Table 67 Protection Methods Overview  PROBLEM RECOMMENDED PREVENTATIVE ACTION     PREVENTATIVE ACTION    Unexpected ea behavior after Back up the r A configuration file before you make  configuration changes major configuration changes      On Your Computer  Use the Genie Backup Manager    Corrupt data files Use anti virus software on your computer   Data infected by virus   Data files incorrectly deleted or modified     On the NSA  Create regular snapshots  recommended for volumes   Corrupt data files with data that changes often     Data infected by virus Use anti virus software on your computer to scan files  from others before saving them on the NSA    You can also use anti virus software on your computer  to scan the NSA for viruses      On the NSA  Use RAID   Hard drive malfunction     NSA malfunction Back up data to another NSA or computer or an external  Network down USB hard drive     Data files incorrectly deleted or modified    Natural disaster such as a fire or earthquake  occurs where your NSA is located    Hacking Place the NSA behind a hardware based firewall  Ideally  the firewall should include deep packet inspecti
355. s for most software are designed to take away your freedom to share and change it   By contrast  the GNU General Public License is intended to guarantee your freedom to share  and change free software  to make sure the software is free for all its users  This General  Public License applies to most of the Free Software Foundation s software and to any other  program whose authors commit to using it   Some other Free Software Foundation software is  covered by the GNU Library General Public License instead   You can apply it to your  programs  too     When we speak of free software  we are referring to freedom  not price  Our General Public  Licenses are designed to make sure that you have the freedom to distribute copies of free  software  and charge for this service if you wish   that you receive source code or can get it if  you want it  that you can change the software or use pieces of it in new free programs  and that  you know you can do these things     To protect your rights  we need to make restrictions that forbid anyone to deny you these rights  or to ask you to surrender the rights  These restrictions translate to certain responsibilities for  you if you distribute copies of the software  or if you modify it  For example  if you distribute  copies of such a program  whether gratis or for a fee  you must give the recipients all the rights  that you have  You must make sure that they  too  receive or can get the source code  And you  must show them these terms so the
356. s if the current normalized  value of the attribute is less than or equal to the threshold     Updated This indicates when the hard drive updates the value for this attribute   Always means the hard drive updates this attribute during normal  operation and during offline activities  Offline means the hard drive only  updates this attribute when no one is accessing the hard drive           NSA 2401 User   s Guide    Chapter 6 Storage Screens    Table 23 Storage  gt  Internal Storage  gt  Disk  gt  S M A R T   Full Summary   continued   LABEL ICON DESCRIPTION    When Failed This column indicates when  if ever  the attribute failed  An attribute has  failed if the normalized value is less than or equal to the threshold        This displays if the attribute is not failing now and has never failed in the  past     FAILING NOW  This displays if the attribute s current normalized value is  less than or equal to the threshold     In_the_past  This displays if the attribute   s current normalized value is    greater than the threshold but the worst recorded value is less than or  equal to the threshold     Raw Value This is the attribute   s unprocessed raw data  These values show exact  amounts of time or numbers of attempts or errors  The meaning to the raw  values is specific to the hard drive manufacturer  Table 42 on page 156  has some information about whether a higher or lower individual raw  S M A R T  attribute value is better        OK Click this button to close the screen  
357. s leaving the domain  You must  also enter the Windows domain administrator password  This option is  only available with active directory domains   Click Forcefully Leave Domain to have the NSA leave the domain  without notifying the Windows server domain controller     Apply Click here to save your changes back to the NSA   Click Reset to begin configuring this screen afresh        7 4 NFS Screen    Click Network  gt  NFS to display the NFS screen  Configure this screen to let computers use  NFS to access the NSA   Figure 148 Network  gt  NFS    NFS Service      gt  E      9 Z 8    Enable Disable Add NFS NFS Edit NFS Delete  NFS NFS Share Session Share NFS  Server Server Shares        The following table describes the icons in this screen   Table 45 Network  gt  NFS Icons    ICON DESCRIPTION    Enable NFS Server   gt  Click this icon to allow access to the NFS shares     Disable NFS Server  Click this icon to stop access to the NFS shares     Click this icon to create a new NFS share        KE ne    168 NSA 2401 User s Guide    Chapter 7 Network Screens    Table 45 Network  gt  NFS Icons  continued   ICON DESCRIPTION  Edit NFS Share    Select an existing NFS share and click this icon to open a screen where  you can change the share   s settings     NFS Session    Click this icon to open a screen that shows who is currently connected to  the NSA using NFS     Delete NFS Share s   Select an existing NFS share and click this icon to remove the share     Sort   Click a column  
358. s rights and so on      Two Disks   You may choose JBOD  RAID 0 or RAID 1  With two disks you could create       one or two JBOD arrays    e JBOD gives flexibility and maximum disk space usage  You can later add another disk  to your JBOD array  without having to re create shares  access rights and so on  or  create a different JBOD array  and create new shares  access rights and so on      e one RAID 0 or RAID I array    e RAID 0 offers higher performance but no data security  It has the fastest read and  write performance since it reads and writes to both disks simultaneously  but if one  disk fails you lose all your data in the array  Performance may matter more than data  security to gamers for example  This method may also be acceptable for data that is  already backed up somewhere else     e RAID 1 offers data security  although the performance is slower than RAID 0  Since  RAID 1 mirrors data onto a second disk  you can recover all data if one disk fails     NSA 2401 User   s Guide    Chapter 6 Storage Screens    Three Disks    Choose a combination of JBOD and or RAID 0 or RAID 1 for the reasons already outlined   With three disks you could create      up to three JBOD arrays   e one RAID I array with a hot spare      one single disk JBOD array and one two disk RAID 0 or one two disk RAID 1 array   e one RAID 5 array    Four Disks    In addition to the JBOD  RAID 0 and RAID I choices  you may choose RAID 10  RAID 5 or  RAIDS  3   hot spare   With four disks you could c
359. s should  know that what they have is not the original version  so that the original author s reputation  will not be affected by problems that might be introduced by others     Finally  software patents pose a constant threat to the existence of any free program  We wish  to make sure that a company cannot effectively restrict the users of a free program by  obtaining a restrictive license from a patent holder  Therefore  we insist that any patent license  obtained for a version of the library must be consistent with the full freedom of use specified  in this license     Most GNU software  including some libraries  is covered by the ordinary GNU General Public  License  This license  the GNU Lesser General Public License  applies to certain designated  libraries  and is quite different from the ordinary General Public License  We use this license  for certain libraries in order to permit linking those libraries into non free programs     When a program is linked with a library  whether statically or using a shared library  the  combination of the two is legally speaking a combined work  a derivative of the original  library  The ordinary General Public License therefore permits such linking only if the entire  combination fits its criteria of freedom  The Lesser General Public License permits more lax  criteria for linking other code with the library     NSA 2401 User   s Guide 327    Appendix D Open Source Licences    We call this license the    Lesser    General Public Lic
360. schedule interval     Next Run Time This field displays the schedule for the next snapshot in yyyy mm dd  hh mm ss format        9 4 1 Creating Editing Snapshots    In the Protect  gt  Snapshot screen  click the Create Job icon to open the following screen  Use  this screen to create a new snapshot job  You can also select an existing snapshot job in the  Protect  gt  Snapshot screen and click the Edit Job icon        BES It s strongly recommended to set the Maximum Number of Snapshots    Image s  as low as possible as a high amount of snapshots can significantly  reduce the NSA s file write performance        See Table 112 on page 260 for the maximum number of snapshots allowed in the NSA     You can only create one snapshot job per volume     Figure 181 Protect  gt  Snapshot  gt  Add Job          Job Name   P   Volume Name  volume  l     Max  Number of Snapshot Image s  f       Frequency  Hourly         Every how many hours          On which minute of the hour  Q E    Cl Note     You can edit the related settings in the  Snapshot Image Access  menu or go to  Sharing page to edit the    snapshots    share     218 NSA 2401 User s Guide    Chapter 9 Protect Screens    The following table describes the labels in this screen   Table 85 Protect  gt  Snapshot  gt  Add Job    LABEL DESCRIPTION    Job Name This is a required field that uniquely identifies the snapshot  Type from 1  to 15 characters  You can use alphanumeric characters  A Z 0 9  and       underscores   The first char
361. screen  This screen  provides information on disks installed in the NSA     Figure 125 Storage  gt  Internal Storage  gt  Disk          aw      rh    Wizards Eject SM  AGT   IEEE a     jbod jbodD1D4D3 Seagate STIL2082745 3 42 111 79 GB    Healthy    DE           jbod jbodDIiD4D3 WDC WDOSO0044VS 002TB 01 0 465 76 GB  Healthy    amet jbod jbodD1iD4D3 Seagate ST32508208C0E 3 40 232 859 GB  Healthy    128 NSA 2401 User s Guide    Chapter 6 Storage Screens    The following table describes the icons in this screen   Table 20 Storage  gt  Internal Storage  gt  Disk Icons    DESCRIPTION    Wizards    Click this icon to open the Disk Setup Wizard to create a new disk array  or volume     Select a hard drive and click this icon to shut it down  Do this before  removing a hard drive to help increase its usable lifetime     Note  Ejecting a disk from a JBOD or RAIDO array causes  the array to fail and the data to be lost       re you sure you want to eject this disk     Performing this operation will cause some  network services to temporarily disconnect     Select a hard drive and click this icon to display details about the drive  and its status  The S M A R T   Self Monitoring  Analysis  and Reporting  Technology  monitoring system detects and reports on hard drive  reliability indicators to help anticipate failures  This feature can be useful  for troubleshooting     Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again t
362. scribes this screen   Table 30 Storage  gt  Internal Storage  gt  Volume Create    LABEL DESCRIPTION   RAID Label Select the disk array upon which you want to create the volume  This  option is only available when you create a volume    Volume Name Type a volume name from 1 to 31 characters  To avoid confusion  it is    highly recommended that each volume use a unique name   Acceptable characters are all alphanumeric characters  A Z 0 9  and        spaces            dashes    _   underscores   and      periods    The first character must be alphanumeric   The last character cannot be a space           Size Enter the number of megabytes to use for the volume  Click the screen to  update the Available Capacity display  You can edit a volume later to  make it larger  but not smaller   You may want to leave some capacity on    the array un allocated to volumes since the NSA uses that space to store  snapshots  So the bigger the volumes are  the less space there is for  snapshots  See Chapter 9 on page 197 for more on snapshots     Available Capacity This field shows the total storage space available on the array and how  much of it this volume will take up        NSA 2401 User   s Guide       Chapter 6 Storage Screens    Table 30 Storage  gt  Internal Storage  gt  Volume Create  continued   LABEL DESCRIPTION    Encrypted Select this check box and an option from the drop down list box to encrypt  the volume  This option is only available when you create a volume   The NSA automati
363. se some  network services to temporarily disconnect        3 The NSA logs you out and automatically redirects your formerly non secure  HTTP   connection to a secure  HTTPS  connection  Your browser may give you a warning    about the device   s public key certificate  Add an exception to allow your browser to  bypass the warning     Figure 56 Firefox  Secure Connection Failed    Secure Connection Failed  192 168  1 35 uses an invalid security certificate     The certificate is not trusted because itis self signed   The certificate is only valid for nsa2401     Error code  sec error Untrusted issuer       This could be    problem with the server s configuration  or it could be someone  trying to impersonate the server       If you have connected to this server successfully in the past  the error may be  temporary  and you can try again later     Or vou can add an exception             76 NSA 2401 User s Guide    Chapter 3 Tutorials    4 Click Add Exception     Figure 57 Firefox  Secure Connection Failed    Secure Connection Failed    192 168  1 35 uses an invalid security certificate     The certificate is not trusted because itis self signed   The certificate is only valid for nsa2401     Error code  sec error Untrusted issuer       This could be a problem with the server s configuration  or it could be someone  trying to impersonate the server       If you have connected to this server successfully in the past  the error may be  temporary  and you can try again later     Yo
364. ssion or under your control  ZyXEL may terminate this License  Agreement for any reason  including  but not limited to  if ZyXEL finds that you have violated  any of the terms of this License Agreement  Upon notification of termination  you agree to  destroy or return to ZyXEL all copies of the Software and Documentation and to certify in  writing that all known copies  including backup copies  have been destroyed  All provisions  relating to confidentiality  proprietary rights  and non disclosure shall survive the termination  of this Software License Agreement     12 General    This License Agreement shall be construed  interpreted and governed by the laws of Republic  of China without regard to conflicts of laws provisions thereof  The exclusive forum for any  disputes arising out of or relating to this License Agreement shall be an appropriate court or  Commercial Arbitration Association sitting in ROC  Taiwan  This License Agreement shall  constitute the entire Agreement between the parties hereto  This License Agreement  the rights  granted hereunder  the Software and Documentation shall not be assigned by you without the  prior written consent of ZyXEL  Any waiver or modification of this License Agreement shall  only be effective if it is in writing and signed by both parties hereto  If any part of this License  Agreement is found invalid or unenforceable by a court of competent jurisdiction  the  remainder of this License Agreement shall be interpreted so as to reason
365. support This field displays whether or not the hard drive has SMART monitoring  turned on    Click this button to close the screen     130 NSA 2401 User s Guide    Device This field displays whether or not the hard drive is in the Control and  Monitor Utility for SMART disks database       Chapter 6 Storage Screens    6 3 2 1 S M A R T Full Summary    Set the Device Info Format field to Full Summary to display advanced details about the  drive and its status  Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order     Figure 127 Storage  gt  Internal Storage  gt  Disk  gt  S M A R T   Full Summary        Device Info Format Full Summary H  11 Calibration Retry Count 0x0012 Always  197 Current_Pending Sector 0x0012 Old age Always  193 Load Cycle Count Ox0032 Old age Always  200 Multi Zone Error Rate 0x0008 Old age Offline    198 Offline Uncorrectable 0x0010 Old age Offline  192 Power Off Retract Count 0x0032 Old age Always  1  Power Cycle Count Ox0032 Old age Always  q Power On Hours Ox0032 Old age Always  1 Raw Read Error Rate OxO00f Pre fail Always  196 Reallocated_Event_Count 0x0032 Old age Always  5 Reallocated Sector Ct 0x0033 Pre fail Always    The following table describes this screen   Table 23 Storage  gt  Internal Storage  gt  Disk  gt  S M A R T   Full Summary     LABEL ICON DESCRIPTION    Device Info Format Select Brief Summary to display basic information about the drive and its 
366. t  Internal Storage  gt  DISK ICONS ooo    ecccceecceseeeceeeeeeeeeeeceteeceeseueeeseuseecsueeessaeeesenes 129  Table 21 Storage  gt  Internal Storage  gt  Disk       rrrrrrunnnennnnnnvnnnrnnnnnnnnnnnrennnnnnsnnnnnnnennnnnanennnnnnennnnnnseennnnnnee 129  Table 22 Storage  gt  Internal Storage  gt  Disk  gt  S M A R T   Brief Summary         rrerrnnnnornrnnnnnnnnnnnrennnnnre 130  Table 23 Storage  gt  Internal Storage  gt  Disk  gt  S M A R T   Full Summary         rrerrrrnnroerrnnnrennrnnnneennnnnre 131  Table 24 RAID Array Levels Quick Comparison                 cssseeeeeeeseeccecceceecececeeseeceaeeasaaseesseeeeeeeeeeeeeeeeeess 133  Table 25 Storage  gt  Internal Storage  gt  RAID lconS cctv ctsessercisnsmradresrareycewardideverravimaraaveraiecmnaiware 136  Table 26 Storage  gt  Internal Storage  gt  RAID ccesecavecdesenccescedensecsaheegeaccseuienaeccadiadiecsndeaneuseecteceemuererenbened 138  Table 27 Storage  gt  Internal Storage  gt  RAID  gt  Create      mrrmrrvvrrannrrvevvvnnnnnrernnnnnnnsrvnvrnnnnnssrnvnnnnnsseennnnn 139  Table 28 Storage  gt  Internal Storage  gt  Volume ICONS          ccc cceeccccceccaseeeeeeceeeeeeeeeesaeeeeeeeeeaeaeeeeeessaaaees 140  Table 29 Storage  gt  Internal Storage  gt  Volume        rrrnerrrrnnnnrrrnnrrnnnnsrnnnnnnnnnsrennnnnnnnrsenrnnanssrnnnnnnnnennnnnne 141  Table 30 Storage  gt  Internal Storage  gt  Volume Create ooo    eeccccscccccseeceeeeececeeeeeeseeeeeseeseseeeeeeseeeeesees 142  labie g1 Selecting the USB DEVICE je GG GAS eiii er
367. t  continued   LABEL DESCRIPTION    Group Membership Choose the groups to which you want to assign this account  You can  select multiple groups by holding the  Ctrl  key while you click   Before a user can be assigned a group  you must first create one or more  on the NSA  A group is a set of users that have common NSA access  rights  A user can belong to more than one group     More restrictive access rights override less restrictive ones   Available Groups These are the groups that have been created on either the NSA or the    domain controller  Select the group s  that you want the account to join  and then click the Add Selected Group s  button     You need to click Apply for the changes to take effect     Group Membership These are the groups that the account already belongs to on either the  NSA or domain controller  Select the group s  that you want the account  to leave and then click the Remove Selected Group s  button     You need to click Apply for the changes to take effect     Apply Click this to save your changes     Cancel Click this to discard changes and close the dialog box        8 2 1 1 Account Names  Enter an account name from   to 14 characters  The first character must be alphabetical  case  insensitive   A Z a z    numeric characters are not allowed as the first character     The account name can only contain the following characters     e Alphanumeric A z 0 9  e Spaces   e      underscores    e    periods    e    dashes     Other limitations on accou
368. t  you  may begin to access the system with its new firmware     This page will TRY to automatically redirect you to the web configurator when the restart  has completed     If you are not redirected please do so manually by clicking the link below or typing the  new host address in your browser s address bar  If you continue to have problems  connecting  please use the NDU  Network Discovery Utility  tool to discover it        11 4 SSL    Click Maintenance  gt  SSL to open this screen  where you can turn on HTTPS  create a public    key certificate  or upload a public key certificate that was issued by a known certificate  authority     Figure 202 Maintenance  gt  SSL    Force HTTPS  TLS SS5L  Connections    fi Caution     Modifications of TLS SSL certificate settings will restart network services        Force HTTPs    Install System Default CA    This action will install the system default C4 in the trusted CA list of your browser    Stepi Download the default CA file feediglesjel    Step  Double click on the CA file to install it into your browser    Modify the Existing Certificate    A Caution     Modifications of TLS SSL certificate settings will restart network services        Edit a self signed CA certificate  Stepl Edit the Self signed Certificate    StepS Double click on the CA file to install it into your browser    C Create a Certificate To Be Authorized By My Own Certificate Authority          NSA 2401 User s Guide    Chapter 11 Maintenance Screens    The followin
369. t Setting        rrrrrnnrrrnrnnnvrerrnnnrvennnnn 235  Figure 198 Maintenance  gt  Log  gt  Log Report Configuration  gt  Syslog Server Setting            rrrrrrvrrnnnnrrr 236  Figure 199 Maintenance  gt  Configuration hv 237  Figure 200 Maintenance  gt  Configuration  gt  Restore isicsississiscessescavasasecsercareciaiereaiessasersbsesteiansasaveasereees 238  Figure 201 Maintenance  gt  Configuration  gt  Restore  gt  Restarting              cccccecseeeeeeceeeeeeeeeeeeeeeeaeeeeseaeees 239  Poue cos Te EEE EE cers eee iepop ernie erin inn 239  Figure 203 Maintenance  gt  SSL  gt  Edit a Self Signed Certificate         rrrrrranrrrrvrnnnrnvrrrnnnrrvrnnnnrenrnnnnrennnnn 241  Figure 204 Maintenance  gt  FW Upgrade      rrrrnnnnrnnvnnnnnennnnnnnnnnnnnnnennnnnnnrnnnnnnernnnnnnsernnnnnernnnnnsssnnnnnsssennnnn 242  Figure 205 Maintenance  gt  Power Management       rrrnrnnannennnnnrnnnnnnvnvnnnrnnnnnrnvnnnnnnnnnnennnnnsnnnnnennnnsennnnnsene 243  Figure 206 Maintenance  gt  Power Management  gt  Edit       mrunnrnnnnnnrnnnnnennnnnrnnnnnnnnnnnnennnnnsnnnnnnnnnnnnennnnsene 244  Figure 207 Mamtenance TN ccc eee 246  Figure 208 Maintenance  gt  Shutdown  gt  Confirm Restart           rrrrrrnnnnnnnnrrrnrnnnnnnovnnnnnnnnnrrnnnnnnnnnsennnnnnnnnee 246  Figure 209 Maintenance  gt  Shutdown  gt  Confirm Shutdown         rernrnnnnrvnvnnnnnrvrnnnnnvnvnnnnrennnnnnnennnnnrennnnn 246  Fe PAR TT F  L  Saarem itari aE DANT EEEN REKO NEEE OEREIN 261    NSA 2401 User   s Guide    List of Figures    TE Ge
370. t either the Original Code or another well known  available Covered Code  of the Contributor s choice  The Source Code can be in a compressed or archival form   provided the appropriate decompression or de archiving software is widely available for no  charge     1 12     You     or  Your     means an individual or a legal entity exercising rights under  and  complying with all of the terms of  this License or a future version of this License issued under  Section 6 1  For legal entities     You    includes any entity which controls  is controlled by  or is  under common control with You  For purposes of this definition     control    means  a  the  power  direct or indirect  to cause the direction or management of such entity  whether by  contract or otherwise  or  b  ownership of more than fifty percent  50   of the outstanding  shares or beneficial ownership of such entity     2  Source Code License     2 1  The Initial Developer Grant     342 NSA 2401 User s Guide    Appendix D Open Source Licences    The Initial Developer hereby grants You a world wide  royalty free  non exclusive license   subject to third party intellectual property claims under intellectual property rights  other than  patent or trademark  Licensable by Initial Developer to use  reproduce  modify  display   perform  sublicense and distribute the Original Code  or portions thereof  with or without  Modifications  and or as part of a Larger Work  and under Patents Claims infringed by the  making  using 
371. t issued the public key certificate you just  removed  a certification error appears     3 12 NSA 2401 User   s Guide    Appendix C Importing Certificates    Opera  The following example uses Opera 9 on Windows XP Professional  however  the screens can  apply to Opera 9 on all platforms     1 If your device   s Web Configurator is set to use SSL certification  then the first time you  browse to it you are presented with a certification error     2 Click Install to accept the certificate     Figure 278 Opera 9  Certificate signer not found    Certificate signer not found    The root certificate for this server is not registered  You may install  this certificate  Accept install     1172 20 37 202      The root certificate from  172 20 37 202  is not known to  Opera  Opera cannot decide if this certificate can be trusted        3 The next time you visit the web site  click the padlock in the address bar to open the  Security information window to view the web page   s security details     Figure 279 Opera 9  Security information    SQZyXEL  US            s   Secure site  The connection to 172  20 37  202 is secure     Certificate summary  Holder  172 20 37 202  ZyXEL  Issuer  172 20 37 202  ZYXEL  Expires  05 21 2011  Encryption protocol  TLS v1 0 256 bit AES  1024 bit DHE RSA SHA           NSA 2401 User   s Guide    Appendix C Importing Certificates    Installing a Stand Alone Certificate File in Opera    Rather than browsing to a ZyXEL Web Configurator and installing a public
372. t its settings  See  Section 8 4 2 on page 190 for details     ACL Properties    Click this icon to open the ACL Configuration screen  where you can set  up an Access Control List  See Section 8 4 2 on page 190 for details           NSA 2401 User   s Guide    Chapter 8 Sharing Screens    Table 56 Sharing  gt  Shares Icons  continued   ICON DESCRIPTION    Delete Share  Select a share from the list  then click this icon to remove it            6 Delete Share Ruroh   a ee    Delete all content associated with this share     Do you wish to proceed     DFS    Click this icon to open the DFS Links screen  See Section 8 4 4 on page  194 for details on creating DFS links     Share Browser    Select a share from the list  then click this icon to view its folder and file  structure  You can also add  remove  and move files and folders within a  share  See Section 2 5 1 on page 40 for details on browsing screens     Click a column   s heading cell to sort the table entries by that column   s  criteria  Click the heading cell again to reverse the sort order     ACL Active   Indicates that an ACL is being used to manage the files in this share   Available Share   Indicates the share can be used for file and folder management     Unavailable Share   Indicates the share cannot be used because the NSA cannot find the  physical location of the share    Disabled Share    Indicates the share is no longer functional  If this happens  talk to your  network administrator           The following ta
373. t the Hard Drive Sleep Time to 0 minute s  to Disable        caution  When your Hard Drive s  are asleep  it may take some time to wake up  the hard drive s   which may cause services to be non responsive for a brief period  of time     Hard Drive Sleep Time lo minutes    Minimum UPS Capacity    Minimum UPS Capacity  50 Yo     i  Note  This feature will not work now because there is no UPS control cable  connected     i  Note  The NSA automatically shuts down if the UPS s remaining charge gets down  to this level     Power On After Power Failure       keep Former Status  If the system was on when the power failed  it restarts automatically when the power is  restored  If it was off  it stays off     f Always Power On  The system restarts automatically when the power is restored     f Always Power Off    The system will not restart after power failure  You must press the power button manually to  restart it     Power On f Off Schedule    Enable Power Control  Schedule       The following table describes the labels in this screen   Table 106 Maintenance  gt  Power Management    LABEL DESCRIPTION  Hard Drive Sleep Time Settings    Hard Drive Sleep Time Enter the number of minutes the NSA will sit idle before spinning the hard  disks down to sleep     Apply Click this to save your changes in this section   Minimum UPS Capacity    Minimum UPS Capacity When you use an APC Uninterruptible Power Supply  UPS  with a USB  connection to the NSA  the NSA shuts itself down if the APC UPS 
374. t the holder is  Tim Hudson  tjh cryptsoft com      Copyright remains Eric Young s  and as such any Copyright notices in the code are not to be  removed  If this package is used in a product  Eric Young should be given attribution as the  author of the parts of the library used  This can be in the form of a textual message at program  startup or in documentation  online or textual  provided with the package     Redistribution and use in source and binary forms  with or without modification  are permitted  provided that the following conditions are met     Redistributions of source code must retain the copyright notice  this list of conditions and the  following disclaimer     Redistributions in binary form must reproduce the above copyright notice  this list of  conditions and the following disclaimer in the documentation and or other materials provided  with the distribution     All advertising materials mentioning features or use of this software must display the  following acknowledgement        This product includes cryptographic software written by Eric Young  eay  cryptsoft com        The word  cryptographic  can be left out if the routines from the library being used are not  cryptographic related        If you include any Windows specific code  or a derivative thereof  from the apps directory   application code  you must include an acknowledgement        This product includes software written by Tim Hudson  tjh cryptsoft com           THIS SOFTWARE IS PROVIDED BY ERIC
375. tation marks        184 NSA 2401 User s Guide    Chapter 8 Sharing Screens    Table 55 Sharing  gt  Groups  gt  Add a New Local Group  continued   LABEL DESCRIPTION    Available Users These are the user accounts that have been created on either the NSA or  the domain controller  Select the user s  that you want to join the group  and then click the Add Selected Users  button     You need to click Apply for the changes to take effect     Group Membership These are the groups that the account already belongs to on the NSA   Select the group s  that you want the user to leave and then click the  Remove Selected Group s  button     You need to click Apply for the changes to take effect     Apply Click this to save your changes   Click this to discard changes and close the dialog box        8 3 1 1 Group Names  Enter a group name from   to 16 characters  The first character must be alphabetical  case  insensitive   A Z a z    numeric characters are not allowed as the first character     The group name can only contain the following characters     e alphanumeric A z 0 9  there is no unicode support   e Spaces   e      underscores    e    periods    e    dashes     Other limitations on group names are     e All leading and trailing spaces are removed automatically   e Multiple spaces within names are converted to a single space     e Group names are case insensitive  The group name cannot be the same  no matter the  case  as an existing local group or domain group  For example  if t
376. ted  volume     Restore Click this to replace the selected NSA configuration settings with those in  the file you uploaded           NSA 2401 User   s Guide 237    Chapter 11 Maintenance Screens    Table 101 Maintenance  gt  Configuration  DESCRIPTION    Reset to Default Click this to restore the NSA to its factory default settings     11 3 1 Restoring the Configuration File       When restoring a previously saved configuration file  you are presented with a warning screen  if any users are connected     Figure 200 Maintenance  gt  Configuration  gt  Restore  O O    Warning Confirmation  The following users are connecting  do you sure to continuet If you continue to  do  they will be disconnected     admin 192 168 3 1    A Performing this operation will cause some network services to  temporarily disconnect        The following table describes the labels in this screen   Table 102 Maintenance  gt  Configuration    LABEL DESCRIPTION  Type Indicates the kind of connection the user has to the NSA   Share Name Indicates the share to which the user is currently connected     Apply       If the NSA is free of all connections  then configuration file loads and the NSA restarts itself     238 NSA 2401 User   s Guide    Chapter 11 Maintenance Screens    Figure 201 Maintenance  gt  Configuration  gt  Restore  gt  Restarting    Restarting           current Status  Waiting for completion of system restart       The system is currently restarting now  After the system has completed restar
377. the take number of the individual  snapshot  the time the snapshot was taken  in year month  day  hour  minute  second  format  and the name of the snapshot job     e The take4_080904160008_hourly_example folder contains a 5yearPlan folder with a  2009 Plan doc file  Gonzo can open the 2009 Plan doc file or copy it to another location     3 7 4 Creating a Synchronization Backup    Gonzo has an important folder that the German branch office uses on a daily basis  Because  Gonzo updates the files frequently  you decide to create a backup job that has the NSA publish  the contents of the folder to an NSA in the German branch office  To create a synchronization  backup     1 Click Protect  gt  Backup  gt  Add Job     Figure 80 Protect  gt  Backup      Status           Protect   Backup    Delete Execute Restore Abort Job  Date Time Selected Job Now Archive   Jobis  Internal Storage a   ae Pee Tafa  External Storage TE   Name  Description STMT   Currently  there are no jobs    TCP IP  Windows CIFS  HFS    Users    Groups  Chares    Backup   nestore  Snapshot  Backup Software    92 NSA 2401 User s Guide       Chapter 3 Tutorials    2 Name the backup job and select Synchronization     Gonzo wants only his current set of files in the remote NSA   s folder  so you select    Mirror to make the target folder identical to the source folder  The NSA deletes any  other files in the target folder     Figure 81 Protect  gt  Backup  gt  Add Job  Step 1  Add    new backup Job    Step 1      Job
378. this license  No use of any covered code is authorized hereunder  except under this disclaimer     8  Termination    8 1  This License and the rights granted hereunder will terminate automatically if You fail to  comply with terms herein and fail to cure such breach within 30 days of becoming aware of  the breach  All sublicenses to the Covered Code which are properly granted shall survive any  termination of this License  Provisions which  by their nature  must remain in effect beyond  the termination of this License shall survive     8 2  If You initiate litigation by asserting a patent infringement claim  excluding declaratory  judgment actions  against Initial Developer or a Contributor  the Initial Developer or  Contributor against whom You file such action is referred to as  Participant     alleging that     such Participant s Contributor Version directly or indirectly infringes any patent  then any and  all rights granted by such Participant to You under Sections 2 1 and or 2 2 of this License  shall  upon 60 days notice from Participant terminate prospectively  unless if within 60 days  after receipt of notice You either   1  agree in writing to pay Participant a mutually agreeable  reasonable royalty for Your past and future use of Modifications made by such Participant  or   11  withdraw Your litigation claim with respect to the Contributor Version against such  Participant  If within 60 days of notice  a reasonable royalty and payment arrangement are not  mutually 
379. ting at healthy array speed as quickly as possible  RAIDS  with  hot spare  uses 50  of the available space for your data     6 4 2 Array Status    You  the administrator  can see the status of an array in the Status  or Storage  gt  Internal  Storage  gt  RAID screens     The NSA has the following classifications for the status of an array     e Healthy if all disks in the array are OK and the file system is functioning properly   e Resynching when you create or repair a RAID array     e Degraded when an array is damaged  a hard drive has failed   but can be fixed  The array  is still operational but at risk since all of the array   s data may be lost if a second hard drive  fails  Data access may be slower from a degraded array  so it   s recommended that you  replace the faulty disk and repair the array as soon as you can     134 NSA 2401 User s Guide    Chapter 6 Storage Screens    e Down when an array is down and cannot be fixed  The array cannot be used and the data is  lost  Replace the faulty disk s  and recreate the array  volumes  and sharing configuration     If an array is down  users can no longer transfer files to from the array   s shares  If an array is  degraded  then file transfer to from the shares in the degraded array will be slower        BS Although there is no explicit message from CIFS that tells users an array is  degraded or down  you can have the NSA send the administrator an email  alert        Resynchronizing and Reshaping    The NSA resynchroniz
380. tion and or use of the Program is restricted in certain countries either by  patents or by copyrighted interfaces  the original copyright holder who places the Program  under this License may add an explicit geographical distribution limitation excluding those  countries  so that distribution is permitted only in or among countries not thus excluded  In  such case  this License incorporates the limitation as if written in the body of this License     9  The Free Software Foundation may publish revised and or new versions of the General  Public License from time to time  Such new versions will be similar in spirit to the present  version  but may differ in detail to address new problems or concerns  Each version is given a  distinguishing version number  If the Program specifies a version number of this License  which applies to it and    any later version     you have the option of following the terms and  conditions either of that version or of any later version published by the Free Software  Foundation  If the Program does not specify a version number of this License  you may choose  any version ever published by the Free Software Foundation     10  If you wish to incorporate parts of the Program into other free programs whose distribution  conditions are different  write to the author to ask for permission  For software which is  copyrighted by the Free Software Foundation  write to the Free Software Foundation  we  sometimes make exceptions for this  Our decision will be
381. to the  defaults     Press the RESET button and hold it for two seconds  you will hear one beep  and release it   The NSA sounds another single beep after you release the button as confirmation     2 7 2 Reload Factory Default Configuration File    Do the following to reload the factory default configuration file  This resets the admin  password and IP address settings to the default settings AND erases all other configurations  such as user group share names  passwords  and share access rights     Press the RESET button and hold it for ten seconds  you will hear three beeps  and release it   The NSA sounds three more beeps after you release the button as confirmation     NSA 2401 User   s Guide    Chapter 2 Introducing the Web Configurator    Figure 17 Reset and Reload Timeline    Beep Beep Beep  0 2 10 Seconds  Press Release Release  button to reset to reload and restart       The NSA automatically restarts to complete reloading the factory default  configuration file        NSA 2401 User s Guide    Chapter 2 Introducing the Web Configurator    54 NSA 2401 User s Guide       Tutorials    3 1 Overview    These tutorials show you how to perform the following common tasks     How to Configure Sharing  page 55   How to Use Shares  page 61   How to Find the NSA in OS X  page 65   How to Configure Security  page 68   Power Resume  page 89   How to Use Backups and Snapshots  page 89   How to Increase the NSA   s Storage Capacity  page 106    3 2 How to Configure Sharing    This se
382. u should not add an exception if you are using an internet connection that you do not trust  completely or if you are not used to seeing    warning For this server     Get me out of here    Add Exception         5 Click Get Certificate        Figure 58 Firefox  Add Security Exception    Add Security Exception x     You are about to override how Firefox identifies this site   A Legitimate banks  stores  and other public sites will not ask you to do this     4    Server    Location    gere et RE  Get Certificate  Certificate Status    T  view       7 Permanently store this exception    Confirm Security Exception Cancel            NSA 2401 User   s Guide 11    Chapter 3 Tutorials    6 Before you add an exception  verify that the device to which you are trying to connect is  providing the correct certificate  Click View     Figure 59 Firefox  Add Security Exception    Add Security Exception   x     You are about to override how Firefox identifies this site   DN Legitimate banks  stores  and other public sites will not ask you to do this     Server    Location    https  1192 168 1 35     Certificate Status      This site attempts to identify itself with invalid information     Wrong Site   Certificate belongs to    different site  which could indicate an identity theft   Unknown Identity   Certificate is not trusted  because it hasn t been verified by a recognized authority     IY Permanently store this exception    Confirm Security Exception   Cancel            78 NSA 2401 User  
383. uch third party acknowledgments normally  appear     The names    Apache    and  Apache Software Foundation    must not be used to endorse or  promote products derived from this software without prior written permission  For written  permission  please contact apache   apache org     Products derived from this software may not be called    Apache     nor may    Apache    appear in  their name  without prior written permission of the Apache Software Foundation     THIS SOFTWARE IS PROVIDED    AS IS  AND ANY EXPRESSED OR IMPLIED  WARRANTIES  INCLUDING  BUT NOT LIMITED TO  THE IMPLIED WARRANTIES  OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE  DISCLAIMED  IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR  ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT  INDIRECT  INCIDENTAL   SPECIAL  EXEMPLARY  OR CONSEQUENTIAL DAMAGES  INCLUDING  BUT NOT  LIMITED TO  PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES  LOSS OF  USE  DATA  OR PROFITS  OR BUSINESS INTERRUPTION  HOWEVER CAUSED  AND ON ANY THEORY OF LIABILITY  WHETHER IN CONTRACT  STRICT  LIABILITY  OR TORT INCLUDING NEGLIGENCE OR OTHERWISE  ARISING IN  ANY WAY OUT OF THE USE OF THIS SOFTWARE  EVEN IF ADVISED OF THE  POSSIBILITY OF SUCH DAMAGE     This software consists of voluntary contributions made by many individuals on behalf of the  Apache Software Foundation  For more information on the Apache Software Foundation   please see  lt http   www apache org  gt      Portions of this software are based upon public domain software
384. uide    Chapter 9 Protect Screens    The following table describes the labels in this screen   Table 71 Protect  gt  Backup  gt  Add Job  Step 2    LABEL DESCRIPTION    Backup Source Select an  internal  volume and the folders and files to back up using this  tree interface    Click     to browse through folders  sub folders and files    Click     to close a folder in the tree  This is useful if there are many folders   or files that you wish to hide from view    Click  _  to select a folder or file to back up  This also selects all sub    folders and files    Click    to deselect the folder or file  This also de selects all sub folders   and files    Mere        and Mere       appear when there are too many folders files to   display  Click the arrows to scroll up or down through the folders files    L4 for a folder means all sub folders and files and new folders files added   later will be backed up    for a file means the file will be backed up     a grayed out check box  for a folder means that only some sub folders  and files under the folder will be backed up  Newly added folders files will  NOT be backed up       4 means the file structure is still loading  Please wait for the folders files   to display    Note  If you select to back up an entire folder  4 and then de   select a sub folder or file within that folder  the main  folder icon will turn 4 and any new sub folders and  files added to this main folder after the initial backup  configuration will NOT be backed 
385. ult       The following table describes the labels in this screen   Table 101 Maintenance  gt  Configuration    Include Volume Select this to have the configuration file include settings for unlocking the  Encryption Settings encrypted volumes  either by manually entering a password or using a  USB key   The password itself is not saved in the configuration file     Backup Click this button to save the current NSA configuration to your computer   Your browser prompts you to save the file   Restore Configuration      Browse Click this button to locate a previously saved configuration file on your  computer or network location     Upload Click this button to load the previously saved configuration file to the NSA   This does not automatically apply the configuration file   s settings     Restore Configuration   After you upload a configuration file to the NSA  select this to replace the  NSA   s general configuration settings with the settings in the file you  uploaded  This does not include the volume encryption settings     Restore Volume This option is available if you included the volume encryption settings   Encryption Settings when you backed up the configuration  Select this and an encrypted  volume s  to restore the settings for unlocking the encrypted volume s    This restores the unlocking settings to what they were when you created  the backup  So whatever the encrypted volume   s password or USB key  was when you created the backup  use the same to unlock the encryp
386. up    A list of your select folders and files displays below the selection fields     Backup Target Choose where to save the backup     Remote Select this to back up to another device   For Archives   The remote device can be another NSA or a computer that supports  CIFS  Fill in the following fields in order to be able to access it   e Remote NSA Address  e Username  e Password  e Share Name  Click Test Connection to see if your NSA can communicate with the  remote device   For Synchronization        The remote device must be another NSA compatible with the NSA   s  synchronization feature  Fill in the following fields in order to be able to  access It     e Remote NSA Address   e Username   e Remote Admin   s Password   Click Show target content to connect to the remote NSA so you can  select the target share for the backup     Local Select this to back up the files to another volume on the NSA  Select the  folder where you want to store the backup files  It is recommended that  the target be on a different disk array from the source volume to provide  protection in the event that the source drive fails   NSA 2401 User   s Guide 205       Chapter 9 Protect Screens    Table 71 Protect  gt  Backup  gt  Add Job  Step 2  continued   DESCRIPTION    External If there is an external USB hard drive connected to the NSA  for example  USB1 ExtVolume 1   you can select a backup target on the external USB  hard drive     Click this button to return to the preceding screen   Click this 
387. uration screen   NSA 2401 User s Guide       Chapter 8 Sharing Screens    Table 58 Sharing  gt  Shares  gt  Create a New Share  continued   DESCRIPTION    Apply Click this to save your changes   Click this to discard changes and close the window     8 4 1 1 Share Access Configuration    This screen allows you to assign permissions to a share        Figure 160 Sharing  gt  Shares  gt  Create a New Share  gt  Share Access Configuration  EOE    Share Access Configuration    Available User s  Groupts      lt LOCALUSERS gt   lt LOCALUSERS gt   anonymous ftp  lt DOMAINUSERS gt   admin  lt LOCALGROUPS gt    lt DOMAINUSERS gt   lt DOMAINGROUPS gt    lt LOCALGROUPS gt        BYemMone   Example    Test   lt DOMAINGROUPS gt      Read Only     lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt      lt LOCALUSERS gt    lt DOMAINUSERS gt    lt LOCALGROUPS gt    lt DOMAINGROUPS gt     Ei     Note     Tou may select multiple users groups by using Ctrl   Click        The following table describes the labels in this screen   Table 59 Sharing  gt  Shares  gt  Create a New Share  gt  Share Access Configuration    Available Users Groups This displays a list of users and groups that have not yet been assigned  an authority level for the share  You can assign users and groups by  selecting them and clicking the right arrow     Full Assign users and groups one of the following authority levels   Read Only Full   Grants read write privileges   Deny Read Only   Grants rea
388. ure 11 My NSA Share Configuration  ZyXEL i ES    My NSA Password Administration       Bi My NSA    Hasans Styre Na bo    ANSIEN     gt  Share Owner  A admin  I     gt  Location  volumet     gt  Fath   i data  Sf  oagdcTest      Share Browsing  E Edit Share    Ti Delete Share    42 NSA 2401 User s Guide    Chapter 2 Introducing the Web Configurator    The following table describes the icons in this screen   Table 8 My NSA Share Configuration Icons    DESCRIPTION    Share  This is the share icon followed by the name of the share     i    User     This is the icon for the owner of the share     Share Browsing  EN Click this icon or link to see and access the share   s contents    Edit Share  g Click this icon or link to configure the share   s management details   H Delete Share   Click this icon or link to remove the share and its contents     The following table describes the labels in the this screen   Table 9 My NSA Share Configuration    Share Owner The share belongs to  and is managed by  this user account  The share  owner controls access rights to the share        The share is for a folder on this volume     This is the share s file path     2 5 4 My NSA Change Share Properties Screen    Use the My NSA Change Share Properties screen to configure share management details     Click My NSA and a share   s Configure button  Then click Edt Share to open the following  screen  This screen displays a share   s management details        Figure 12 My NSA Change Share Properties  
389. vely in one RAID 5 array  then the maximum capacity is 450  GB  3   150 GB  the smallest disk size  and the remaining space  300 GB  is unused     Typical applications for RAID 10 are transaction processing  relational database applications   enterprise resource planning and other business systems  For write intensive applications   RAID 1 or RAID 1 0 are probably better choices  as the performance of RAID 5 will begin to  substantially decrease in a write heavy environment     6 9 7 Hot spare    A RAID I or RAID 5 array with a hot spare operates as a three disk RAID 1 or RAID 5 array  with the fourth disk on standby  The standby disk automatically comes into play if a disk in the  array fails  The advantage of a hot spare is that if a disk fails  then the array resynchronizes  automatically with the standby disk and operates at healthy array speed after the  resynchronization        S You need four hard disks installed to use RAID 10  RAID 5 or RAID 5 with hot   spare        NSA 2401 User   s Guide    Chapter 6 Storage Screens    6 9 8 RAID and Data Protection    If a hard disk fails and you   re using a RAID 1  RAID 10  or RAID 5 array then your data will  still be available  but at degraded speeds until you replace the hard disk that failed and re   synchronize the array   However  RAID cannot protect against file corruption  virus attacks   files incorrectly deleted or modified  or the NSA malfunctioning  See Section 9 1 on page 197  for what you should use in these cases
390. vice  pursuant to Part 15 of the FCC Rules  These limits are designed to provide reasonable  protection against harmful interference in a residential installation  This device generates   uses  and can radiate radio frequency energy  and if not installed and used in accordance with  the instructions  may cause harmful interference to radio communications  However  there is  no guarantee that interference will not occur in a particular installation     Notices    Changes or modifications not expressly approved by the party responsible for compliance  could void the user s authority to operate the equipment     This Class B digital apparatus complies with Canadian ICES 003     NSA 2401 User   s Guide    Appendix E Legal Information    Cet appareil num  rique de la classe B est conforme a la norme NMB 003 du Canada     Viewing Certifications    1 Go to http   www zyxel com   2 Select your product on the ZyXEL home page to go to that product s page     3 Select the certification you wish to view from this page     ZyXEL Limited Warranty    Zy XEL warrants to the original end user  purchaser  that this product is free from any defects  in materials or workmanship for a period of up to two years from the date of purchase  During  the warranty period  and upon proof of purchase  should the product have indications of failure  due to faulty workmanship and or materials  ZyXEL will  at its discretion  repair or replace the  defective products or components without charge for either pa
391. ware screen     This screen provides you with your Genie Backup Manager Lite license key and directions to  find the Genie Backup Manager Server license key  You may need to use this screen if you  cannot locate your license keys     You can also locate your license keys on the back of the envelope of the CD that came with  your NSA     For more information about Genie Backup Manager please see Genie Backup Manager on  page 198     220 NSA 2401 User s Guide    Chapter 9 Protect Screens    Figure 183 Protect  gt  Backup Software    Backup Software    Genie Backup Manager is Windows backup software developed by Genie Soft  It is bundled with each  NSA Storage unit     This is not the same as server to server  NSA to NSA  backup feature which can be accessed here     M5A 2401 provides an unlimited license for GBM Lite version and ONE license for GBM Server version  backup software       Genie Backup Manager LITE Serial Number  Product License Key        Genie Backup Manager Server Serial Number  Product License Keyj   The serial number  Product License Key  for Genie Backup Manager Server can be found on     label located on the bottom of the NSA device           NSA 2401 User s Guide    Chapter 9 Protect Screens    NSA 2401 User   s Guide       Application Screens    10 1 Overview    This chapter introduces the NSA Application screens     10 1 1 What You Can Do In The Application Screens    e Configure settings for FTP file transfers to from the NSA  See Section 10 2 on page 22
392. with the information you received as to the offer to distribute corresponding  source code   This alternative is allowed only for noncommercial distribution and only if you  received the program in object code or executable form with such an offer  in accord with  Subsection b above   The source code for a work means the preferred form of the work for  making modifications to it  For an executable work  complete source code means all the  source code for all modules it contains  plus any associated interface definition files  plus the  scripts used to control compilation and installation of the executable  However  as a special  exception  the source code distributed need not include anything that is normally distributed   in either source or binary form  with the major components  compiler  kernel  and so on  of  the operating system on which the executable runs  unless that component itself accompanies  the executable  If distribution of executable or object code is made by offering access to copy  from a designated place  then offering equivalent access to copy the source code from the  same place counts as distribution of the source code  even though third parties are not  compelled to copy the source along with the object code     4  You may not copy  modify  sublicense  or distribute the Program except as expressly  provided under this License  Any attempt otherwise to copy  modify  sublicense or distribute  the Program 18 void  and will automatically terminate your rig
393. word  and share name   If you want to make sure the remote NSA is reachable  click Test Connection     Figure 88 Protect  gt  Backup  gt  Add Job  Step 2    Add anew backup Job     volume     Fl Rd volume  Gonzo  Kermit  Strategy  Business Plan       Gs  Username  admin  Password   0   Share Name  Backups Oo    f  External    Previous          NSA 2401 User   s Guide    Chapter 3 Tutorials    4 In this example  the target NSA is on the LAN so leave the compression off     Security is already configured on the target NSA so you can leave the encryption off   too     Have the NSA keep 3 backups     Figure 89 Protect  gt  Backup  gt  Add Job  Step 3  Add anew backup Job    Step 3       Compression    C Tes     ho       Encryption    f Yes    ng       Purge Policy  c Keep All Old Backup files  o Keep Only the last  3 backup files 1 30     C keep Backups For   daylsif1 3650        5 Set the frequency to Weekly  Schedule the backup for 5 00 every Saturday morning     Figure 90 Protect  gt  Backup  gt  Add Job  Step 4  Add anew backup Job  Step 4        Scheduler    Backup Frequency  Weekly E    Start       Time hh mm   3  i 0     Every how many weeks   1  1 52    on every   Sunday   Monday    Tuesday    wednesday    Thursday   Friday    Saturda       3 7 6 Restoring Archived Files by Backup Job    If you have backup jobs for which the NSA has already performed backups  you can restore  the files based on the backup job  Gonzo accidently deleted all of the files in his share and  ne
394. y know their rights     We protect your rights with two steps   1  copyright the software  and  2  offer you this license  which gives you legal permission to copy  distribute and or modify the software  Also  for  each author s protection and ours  we want to make certain that everyone understands that  there is no warranty for this free software  If the software is modified by someone else and  passed on  we want its recipients to know that what they have is not the original  so that any  problems introduced by others will not reflect on the original authors  reputations     Finally  any free program is threatened constantly by software patents  We wish to avoid the  danger that re distributors of a free program will individually obtain patent licenses  in effect  making the program proprietary  To prevent this  we have made it clear that any patent must  be licensed for everyone s free use or not licensed at all     The precise terms and conditions for copying  distribution and modification follow   TERMS AND CONDITIONS FOR COPYING  DISTRIBUTION AND MODIFICATION    NSA 2401 User   s Guide    Appendix D Open Source Licences    0  This License applies to any program or other work which contains a notice placed by the  copyright holder saying it may be distributed under the terms of this General Public License   The    Program     below  refers to any such program or work  and a    work based on the  Program    means either the Program or any derivative work under copyright l
395. yed per page    Go to Page Select a page number of logs to display     Previous  amp  Next   Click Previous to cycle back through the pages of logs  and Next to cycle forward  through them  If only one page exists  then clicking either of these simply refreshes  the page     Click this button to export the selected log s               11 2 0 1 Log Classes  The NSA keeps detailed records of all activity that occurs on it  These records  or logs  are  organized according to    class     The following table describes the different log classes   Figure 192 Maintenance  gt  Log  gt  Log Classes    OG CLASS DESCRIPTION    Action log If you enable the action log feature for a share s   this class shows information  about when users upload or download files or folders or create folders     User This class shows information on user account access to the NSA   Share This class shows information on shares being created or deleted        NSA 2401 User   s Guide    Chapter 11 Maintenance Screens    Figure 192 Maintenance  gt  Log  gt  Log Classes  continued   CLASS DESCRIPTION    LOG  Application This class shows information about the NSA s FTP  print server  and copy button  applications     This log class shows information about all backup related activity     11 2 1 Search    Click the Maintenance  gt  Log  gt  Search icon to display the search filters        Figure 193 Maintenance  gt  Log  gt  Search Filters  Type   View Al Logs 7 Severity    B Keyword s        Time    E fo Shoursfo 
396. ystem Folders    Home Folder    S p       2 My Documents  es Network Folders           UP 2 4G Media  2 0 GB available     Favorites Applications Computer History Leave                User zyxel on linux h20z openSUSE  2 When the Run as Root   KDE su dialog opens  enter the admin password and click OK   Figure 242 openSUSE 10 3  K Menu  gt  Computer Menu      Run as root  KDE su       Please enter the Administrator  root   password to continue     Command   sbinfyast2    Password                   Ignore                                 NSA 2401 User   s Guide 293    Appendix B Setting Up Your Computer s IP Address    3 When the YaST Control Center window opens  select Network Devices and then click  the Network Card icon     Figure 243 openSUSE 10 3  YaST Control Center  YaST Control Center   linux h207    File Edit Help    D software    Kat Network Services      Novell App  rmor    fe   w4 Security and Users    G    3  Miscellaneous      Search            4 When the Network Settings window opens  click the Overview tab  select the  appropriate connection Name from the list  and then click the Configure button     Figure 244 openSUSE 10 3  Network Settings    Ol vrastz  linux h20z           Network Card 8  Network Settings  Overview   Obtain an overview of       installed network cards    Global Options   Overview   Hostname DNS   Routing     Additionally  edit their   configuration    IP Address   Adding a Network AMD PCnet  Fast 79C971 DHCP   Card    Press Add to configure 
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
  Copyright © All rights reserved. 
   Failed to retrieve file