This manual is intended for people who want to configure the Product Name [short] using the
web configurator. You should have at least a basic knowledge of TCP/IP networking concepts
and topology.
Related Documentation
• Quick Start Guide
The Quick Start Guide is designed to help you get up and running right away. It contains
information on setting up your network and configuring for Internet access.
• Web Configurator Online Help
Embedded web help for descriptions of individual screens and supplementary
information.
• Supporting Disk
Refer to the included CD for support documents.
• ZyXEL Web Site
Please refer to www.zyxel.com
certifications.
for additional support documentation and product
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for
improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team,
ZyXEL Communications Corp.,
6 Innovation Road II,
Science-Based Industrial Park,
Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
NSA-2400 User’s Guide
3
Page 4
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1Warnings tell you about things that could harm you or your device.
"Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The Product Name [short] may be referred to as the “NSA”, the “device” or the “system”
in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key.
“Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example,
Maintenance > Log > Log Setting means you first click Maintenance in the navigation
panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For
example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000”
or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
NSA-2400 User’s Guide
Page 5
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The NSA icon is not an
exact representation of your device.
NSAComputerNotebook computer
ServerDSLAMFirewall
TelephoneSwitchRouter
NSA-2400 User’s Guide
5
Page 6
Safety Warnings
Safety Warnings
1For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk
of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel should
service or disassemble this device. Please contact your vendor for further information.
• ONLY qualified service personnel should service or disassemble this device.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device.
• Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in
North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
• If the power adaptor or cord is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a
new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a
remote risk of electric shock from lightning.
• CAUTION: RISK OF EXPLOSION IF BATTERY (on the motherboard) IS REPLACED
BY AN INCORRECT TYPE. DISPOSE OF USED BATTERIES ACCORDING TO
THE INSTRUCTIONS. Dispose them at the applicable collection point for the recycling
of electrical and electronic equipment. For detailed information about recycling of this
product, please contact your local city office, your household waste disposal service or the
store where you purchased the product.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
6
This product is recyclable. Dispose of it properly.
Getting to Know Your NSA-2400 (25)
Introducing the Web Configurator (29)
23
Page 24
24
Page 25
CHAPTER 1
Getting to Know Your NSA-2400
This chapter introduces the main features and applications of the NSA-2400 (Network Storage
Appliance).
1.1 NSA-2400 Overview
The NSA-2400 is a device for storing and sharing data that connects directly to your network
via a Gigabit Ethernet port.
Its SATA-I (Serial Advanced Technology Attachment) hard disk serial links are compatible
with all major hard drive manufacturers.
You can expand storage capacity by attaching compatible USB (2.0) drives to the USB ports.
Configure RAID (Redundant Array of Independent Disks) on your NSA-2400 so as your data
is still protected even if one hard disk fails.
You can also protect your valuable data by using the snapshot and backup features on the
NSA-2400.
Note: See the specifications appendix for more detailed information on all features of
the NSA-2400.
The next figure shows an example application for the NSA-2400 in a small office network.
AD is an Active Directory that contains the user names and passwords of all users that are
allowed access to the NSA-2400. Users (U1, U2, U3) can all back up and share data on the
NSA-2400. Important data stored on servers S1 and S2 may be also stored there. In addition to
its internal drives, the NSA-2400 can also extend its storage capacity
It is recommended that the NSA-2400 is placed behind a firewall and/or IDP device to protect
it.
NSA-2400 User’s Guide
25
Page 26
Chapter 1 Getting to Know Your NSA-2400
Figure 1 Example Application
1.1.1 Front Panel LEDs
The front panel LEDs tell you important information about the NSA-2400.
Figure 2 NSA-2400 Front Panel LEDs
Disk Drive LEDs
NSA-2400
LEDs
The following table describes the disk drive LEDs. Refer to the Quick Start Guide to see how
to install and remove hard drives from the disk trays.
"Make sure the NSA-2400 is turned off when you install and remove hard
drives from the NSA-2400.
26
NSA-2400 User’s Guide
Page 27
Chapter 1 Getting to Know Your NSA-2400
This table describes the LEDs related to the hard disks.
Table 1 Disk Drive Leds
LEDCOLOR
PWRGreenOffThe hard disk drive tray is empty or not connected properly.
ALMRedOffThe hard disk drive is working properly if connected.
STAT
US
OnThe hard disk drive is connected properly to the
OnThe hard disk drive has a problem.
DESCRIPTION
NSA-2400.
The following table describes the LEDs related to the NSA-2400 itself.
Table 2 NSA-2400 LEDs
LEDCOLORSTATUSDESCRIPTION
PWRGreenOffThe NSA-2400 is turned off.
OnThe NSA-2400 is turned on and receiving power.
SYSRedOnThe NSA-2400 has passed system tests.
BlinkingThe NSA-2400 is starting up or shutting down.
Quick blinking indicates that your RAID volumes are in
degraded mode.
OrangeOnThe NSA-2400 is in maintenance mode because no disk
volumes exist.
BlinkingFirmware is being upgraded to the NSA-2400.
GreenOnThe NSA-2400 has fully booted and is operating normally.
DIAGRedOffThe DIAG LED is normally off.
BlinkingIt blinks slowly when hard drives are resynching; the SYS
LANGreenOffThe LAN is not connected.
OnThe NSA-2400 has a successful 10/100Mbps Ethernet
BlinkingThe 100M LAN is sending or receiving packets.
OrangeOnThe NSA-2400 has a successful 1000Mbps Ethernet
BlinkingThe 1000M LAN is sending or receiving packets.
LED is green at this time. It turns off after the hard drives
resynch.
It blinks quickly if there is a firmware upgrade or Flash reset
failure; the SYS LED blinks orange (quickly) at this time too.
connection.
connection.
NSA-2400 User’s Guide
27
Page 28
Chapter 1 Getting to Know Your NSA-2400
28
NSA-2400 User’s Guide
Page 29
CHAPTER 2
Introducing the Web
Configurator
This chapter describes how to access the NSA-2400 web configurator and provides an
overview of its screens.
2.1 Web Configurator Overview
The web configurator is an HTML-based management interface that allows easy NSA-2400
setup and management via Internet browser. Use Internet Explorer 6.0, Mozilla firefox 1.0,
Netscape Navigator 7.0 or later versions of these browsers. The recommended screen
resolution is 1024 by 768 pixels or higher.
In order to use the web configurator you need to allow:
• Web browser pop-up windows from your device. Web pop-up blocking is enabled by
default in Windows XP SP (Service Pack) 2.
• JavaScripts (enabled by default).
2.2 Accessing the NSA-2400 Web Configurator
Make sure your NSA-2400 is properly connected and that your computer is in the same subnet
as the NSA-2400 (refer to the Quick Start Guide or the appendices).
2.2.1 Access the NSA-2400 Via NDU
If you don’t know the IP address of the NSA-2400, then use the NDU to find it. Refer to the
Quick Start Guide to see how to install and run the NDU.
NSA-2400 User’s Guide
29
Page 30
Chapter 2 Introducing the Web Configurator
Figure 3 NDU Main Screen
From the NDU main page click the icon under Admin to see the web configurator screen login
screen.
2.2.2 Web Browser Access
Open your browser and type in the IP address of the NSA-2400; 192.168.1.3 is the default IP
address if one has not been assigned by a DHCP server.
Figure 4 NDA URL
2.3 Login
The default user name and password are ‘admin’ and ‘1234’ respectively. Enter your user
name and password, then click Login. Non-admin users can change their passwords by using
the username and password assigned to them in the Sharing > Users screen. See Section 4.4.3
on page 58 for details.
30
NSA-2400 User’s Guide
Page 31
Chapter 2 Introducing the Web Configurator
Figure 5 NSA-2400 Login Screen
If another admin is already logged in, you may force them to log out in the next screen.
Figure 6 Administrator Already Logged In
You should see a screen asking you to change your password (highly recommended) as shown
next. Type a new password (and retype it to confirm) and click Apply or click Skip.
NSA-2400 User’s Guide
31
Page 32
Chapter 2 Introducing the Web Configurator
Figure 7 Change Password Screen
1 If this is your first time to log into the NSA-2400, you will see a screen asking you to
launch the setup wizard. Run the wizard to set up the basic NSA-2400 settings. See the
Quick Start Guide for information on the wizard screens.
Figure 8 Launch Setup Wizard Prompt
2.4 NSA-2400 Main Screen Overview
Admin users first see the Status Overview screen after they log in. See the next chapter for
details on this screen.
32
NSA-2400 User’s Guide
Page 33
Figure 9 NSA-2400 Status Screen
Chapter 2 Introducing the Web Configurator
3
2
4
1
"The web configurator management session automatically times out if it is left
idle for 15 minutes. Simply log back into the NSA-2400 if this happens to you.
2.5 Global NSA-2400 Icons
The icons and language label at the top-right of the screen () are visible from most screens.
You may select the web configurator language from the drop-down list box here. The
following table describes the ‘global’ icons and labels.
Table 3 Global Labels and Icons
LABEL/ICONDESCRIPTION
Click this Help icon to open a web help page specific to the screen you are
currently configuring.
Click this Wizard icon to open a sub-menu of wizard(s).
Click this About icon to view copyright and the model name.
Click this Logout icon at any time to exit the web configurator. This is the same as
clicking the Logout link at the bottom of the Navigation panel.
1
NSA-2400 User’s Guide
33
Page 34
Chapter 2 Introducing the Web Configurator
2
2.5.1 Navigation Panel
The navigation panel on the left of the screen () contains screen links. Click a link to
display sub-links. The sub-links are the same as the screen tabs (), so you can either click a
3
screen tab or a sub link to go to the same screen. There is no sub-link for the overview screen.
Certain screens also contain hyperlinks that allow you to jump to another screen.
Click the Status icon to open the Status screens.
Figure 10 Navigation Panel Links
34
The following table describes the navigation panel screens.
Table 4 Screens Summary
LINKTABFUNCTION
StatusStatus
Overview
Active
Sessions
System LogThis screen displays recent NSA-2400 system logs.
System InfoThis screen displays NSA-2400 hardware and IP address
SharingOverviewThis screen displays statistics on users, groups and shares.
UsersUse this screen to create users who may use the NSA-2400. You
GroupsUse this screen to create groups and add group members.
SharesUse this screen to create shared folders to which you can allow
This screen shows system resources such as CPU usage and
memory being used by the NSA-2400, system status and
2400
internal and external volumes.
This screen displays users who are currently using the NSA-
.
2400
information.
may set user passwords, define storage limits per user, and
associate users to a group(s).
users and/or groups read/write access rights.
NSA-2400 User’s Guide
NSA-
Page 35
Chapter 2 Introducing the Web Configurator
Table 4 Screens Summary (continued)
LINKTABFUNCTION
NetworkOverviewThis screen displays NSA-2400 IP address, CIFS and FTP
information.
TCP/IP Use this screen to assign a dynamic or static IP address and DNS
information as well as an NSA-2400 host name.
Windows/CIFS Use this screen to define a WINS server and choose a workgroup
or domain authentication method.
FTPUse this screen to enable FTP file transfer to/from the NSA-2400,
set the number of FTP connections allowed and an FTP idle
timeout.
ProtectOverviewThis screen displays NSA-2400 backup and snapshot information
BackupUse these screens to create, edit, run, restore and delete backups.
Snapshot Use these screens to create, edit, run, restore and delete
SchedulerUse these screens to set times for repeated runs of backups and
StorageOverviewThis screen displays NSA-2400 volume, disk and snapshot
Vol um e Use the screen to create internal and external volumes. A volume
DiskUse this screen to view internal and external disk information.
MaintenanceOverviewThis screen displays NSA-2400 date and time, log alert, HTTPS
Date/TimeUse this screen to chose a time zone and/or allow the NSA-2400
Log AlertUse this screen to configure when/where to send e-mail alerts,
SecurityUse this screen to change the NSA-2400 login password and
ConfigurationUse this screen to back up and/or restore the NSA-2400
F/W UpgradeUse this screen to upload new firmware to your NSA-2400.
ShutdownUse this screen to restart the NSA-2400 or shut it down.
LogoutClick Logout to exit the web configurator. This is recommended to
snapshots.
snapshots.
information.
is a fixed amount of storage on a disk.
(SSL) and firmware version information.
to synchronize with a time server.
and what mail server to use.
configure secure web connections to the NSA-2400 using HTTPS.
configuration file and/or enable the NSA-2400 reset button to
return the NSA-2400 to its default admin password and IP
address.
prevent unauthorized administrator access to the NSA-2400.
2.5.2 Status Messages
At the bottom of the screen the message text box () displays status messages as you
configure the NSA-2400.
NSA-2400 User’s Guide
4
35
Page 36
Chapter 2 Introducing the Web Configurator
2.5.3 Common Screen Icons
The following table explains some icons that appear in several configuration screens.
Table 5 Common Configuration Screen Icons
ICONDESCRIPTION
Click the Edit icon to go to a screen where you can change the configuration settings
of an entry.
Click the Remove icon to delete an entry from the list.
Click the Details icon to jump to related item’s configuration screen.
This is a user icon. Please see the sharing screens chapter for detailed information on
variants of this icon.
This is a group icon. Please see the sharing screens chapter for detailed information
on variants of this icon.
This is a share icon. Please see the sharing screens chapter for detailed information
on variants of this icon.
This icon represents a Healthy volume.
This icon represents a Degraded volume. Click the Repair icon to fix a degraded
RAID volume after you have replaced the faulty disk.
This icon represents a Down volume. Click the Initialize icon to create a volume.
This icon represents a Healthy disk.
Click the Scan Disk icon to scan a hard disk drive for file system errors.
Click the Expand Volume icon to expand a volume by up to the amount of snapshot
reserved space less the amount of space currently being used by snapshots.
Click the Unmount icon to unmount a volume
when two volumes of the same
name exist. See Section 7.7.4 on page 109 for details.
Click the Mount icon to mount a volume when two volumes of the same name
exist. See Section 7.7.4 on page 109 for details.
Click the Disconnect icon before you remove an external hard drive so that you do
not lose data that is being transferred to or from that hard drive.
Click the Initialize icon for the NSA-2400 to create a volume on the (external) hard
drive.
36
Click the Locate icon to cause the LED on the external storage device to blink.
Click the Repair icon to resychronize a RAID volume after you replace a faulty hard
disk.
NSA-2400 User’s Guide
Page 37
Table 5 Common Configuration Screen Icons (continued)
ICONDESCRIPTION
Click the Schedule icon to set a time for a backup or snapshot to run.
In the Backup screen this is the Run Now icon used to perform a backup
immediately.
Click the Cancel icon to stop a backup while it is running.
Click the Take Now icon to take a snapshot immediately
Click the Images icon to see a summary of all snapshots available.
2.6 Forgot Your Password
If you forget your password, you could have the NSA-2400 e-mail your password to you if
you configured your e-mail address and mail server on the NSA-2400. Alternatively, if you
didn’t configure an e-mail address, then you will have to reset the NSA-2400.
Chapter 2 Introducing the Web Configurator
2.6.1 NSA-2400 Sends Password
If you enter a wrong password, the NSA-2400 displays the following screen. Click the Forgot
Your Password link to display the Forgot Your Password screen.
Figure 11 Wrong Password
Click Continue to have the NSA-2400 e-mail a randomly generated password to the e-mail
address you configured.
NSA-2400 User’s Guide
37
Page 38
Chapter 2 Introducing the Web Configurator
Figure 12 Generate Password
Click login to go to the NSA-2400 screen and enter the new e-mailed password there. You
should change this password and then write down your new password and put it in a safe
place.
Log in With New Password
2.6.2 Reset the NSA-2400
Alternatively, if you forget your password or cannot access the web configurator, use the
RESET button at the front of the NSA-2400. You will NOT lose all NSA-2400 configurations
but the IP address, subnet mask and admin password are all returned to the factory defaults.
"You should check that the RESET button is enabled in the Maintenance >
Configuration screen.
2.6.2.1 Procedure To Use The Reset Button
1 Press and hold the RESET button until you hear a beep, and then release it.
38
NSA-2400 User’s Guide
Page 39
Chapter 2 Introducing the Web Configurator
2 The NSA-2400 automatically restarts to complete the reset.
NSA-2400 User’s Guide
39
Page 40
Chapter 2 Introducing the Web Configurator
40
NSA-2400 User’s Guide
Page 41
PART II
Status, Sharing and
Network
Status Screens (43)
Sharing Screens (51)
Network Screens (71)
41
Page 42
42
Page 43
CHAPTER 3
Status Screens
This chapter introduces the Status screens of the NSA.
3.1 Status Overview Screen
The Status Overview screen is the first main web configurator screen you see after you log in
(and complete the wizard the first time). To view the status screens, click the Status icon on
the top-left of the navigation panel.
The following table describes the labels in this screen.
Table 6 System Overview
LABELDESCRIPTION
System Resources
NSA-2400 User’s Guide
Select a number of seconds or None from the drop-down list box to
refresh all screen statistics automatically at the end of each time interval.
Click the Refresh icon to immediately refresh the status screen statistics.
Alternatively, click this button to immediately refresh the status screen
statistics.
43
Page 44
Chapter 3 Status Screens
Table 6 System Overview (continued)
LABELDESCRIPTION
CPU UsageThis displays CPU usage by all current processes since the last update. If
CPU TemperatureThis displays the current temperature of the NSA CPU. If the temperature
Memory UsageThis number shows how much of the NSA's total memory is being used.
Open SessionsThis shows the current number of active sessions. It is useful when you
UPSThis field displays whether an Uninteruptable Power Supply (UPS) is
System Status
System NameThis displays the name which helps you find the NSA on the network.
Firmware Version This is the NSA firmware version and the date created. Click the update
System UptimeThis is the total time the NSA has been on since your last power-up.
System TimeThis displays the date (month/date/year) and time (hours/minutes/
Current IPThis displays the NSA’s IP address.
Last Few Error
Messages
Volume StatusA volume is a storage area on a single disk or spread across a number of
Internal VolumeThis displays the volumes created on the NSA hard drives.
External VolumeThis displays the volumes created on USB hard drives connected to the
Volume NameThis field shows the NSA-generated name for the volume.
Disk ConfigurationThis field (also known as Typ e) shows what type of data storage system
too many users are using the NSA then the NSA may appear sluggish.
is not within range (about 0
NSA overheats for example, turn it off and let it cool down. Make sure the
fans are working and it is in a well ventilated place.
want to restart or shutdown the NSA so you can tell if there are users
currently connected to the NSA. You should then contact each user to
make sure that they disconnect from the NSA before you restart or shut it
down. Click the view details link to go to the System Status > Active Sessions screen.
being used. A UPS is advisable to protect sensitive data stored on the
NSA in the event of a power outage.
A battery meter displays what percentage Uninteruptable
(UPS) battery power remains when an APC UPS is connected to an NSA
USB port and is turned on. Power from the UPS is used when power from
the mains is down and while the UPS has battery power.
Power from the mains is used when the mains power returns; the APC
UPS battery is recharged then too. This field displays N/A when no UPS
is connected to the NSA or it is turned off.
Click the update link to go to the Network > TCP/IP screen. Click the
Modify button after the Server Name label in that screen to go to the
Network > Windows/CIFS in which you can change the Server Name.
You can enter up to 15 alphanumeric characters with minus signs allowed
but not as the last character. The name must begin with an alphabetic
character (a-z) and is NOT case sensitive.
link to go to the Maintenance > Firmware Upgrade screen from which
you can upload new firmware.
seconds). Click the update link to go to the Maintenance > Date/Time
screen from which you can change the system time.
This displays the most recent (nine) error messages generated by the
NSA. Click on a log entry to go to the Status > System Log screen.
disks within a single file system.
NSA. USB ports are numbered in the order that you insert USB devices.
(a RAID type or JBOD) the volume is using. For external drives, it may
show REGULAR or OK meaning that the NSA can read the volume but
the volume wasn’t created on the NSA.
O
to 85O C) the NSA may malfunction. If the
Power Supply
44
NSA-2400 User’s Guide
Page 45
Table 6 System Overview (continued)
LABELDESCRIPTION
DisksFor external drives, this field shows USB1 for the first external hard drive
you connect to the NSA (regardless of which USB port), USB2 for the
second and USB3 for the third.
Disk UsageThis field shows total disk size, the percentage of the volume being used
and the percentage that is available.
3.2 Active Sessions Screen
The Active Sessions screen shows how many users are currently connecting to the NSA via
CIFS and FTP (not web configurator).
Figure 13 Status > Active Sessions
Chapter 3 Status Screens
The following table describes the labels in this screen.
Table 7 Active Sessions
LABELDESCRIPTION
TypeThis shows whether it’s a Windows/CIFS or FTP connection to the NSA.
Share NameThis displays the shared folder name on the NSA that the user is
User NameThis displays the name of the user connected to the NSA if one is defined
Connected AtThis displays the date and time the user last connected to the NSA in day,
IP AddressThis displays the IP address of the computerconnected to the NSA.
connected to for CIFS sessions and is blank for FTP sessions.
and ANONYMOUS CIFS or ANONYMOUS FTP otherwise.
month, date, hour, minute, second, year format.
3.2.1 Session Example (Windows)
Open windows explorer and type two back slashes followed by the NSA name or IP address.
Initially you can only read and write to the Public folder until you create shares on the NSA.
This session is then displayed as shown in Figure 13 on page 45.
Figure 14 Session Example (Windows)
NSA-2400 User’s Guide
45
Page 46
Chapter 3 Status Screens
3.3 System Log
The following screen displays all NSA logs. There are at most 128 entries in the log. Older
logs are removed by the system. You cannot download the log file via FTP or CIFS.
See the User Guide appendices for example log messages.
Figure 15 Status > System Log
46
The following table describes the labels in this screen.
Table 8 System Logs
LABELDESCRIPTION
View All LogsThe screen always shows all logs by default. Choose a specific log
category and then click Filter to view logs for just that category.
FilterClick this button to just view log types selected in the list box above.
Time This shows the date and time the log was created.
NSA-2400 User’s Guide
Page 47
Chapter 3 Status Screens
Table 8 System Logs (continued)
LABELDESCRIPTION
ClassThis displays the log category; see Table 9 on page 47.
SeverityThis displays how serious the log is rated by the NSA. See Table 10 on
MessageThis displays a description of the log.
First/PrevUse these hyperlinks to navigate to the first or previous log page.
Next/LastUse these hyperlinks to navigate to the next or final log page.
Purge all LogsClick this button to erase all logs from the NSA. This may be advisable
Edit Log Alert SettingsClick this button to jump to the Maintenance > Log Alert page from
page 47 for more information.
when there is not much hard drive space on the NSA available.
where you can decide when to send alerts and where to send e-mails.
The following table shows information on log categories.
Table 9 Log Categories
LOG
CATEGORY
NetworkThis log category shows information on network configuration, setting changes
FTPThis log category shows FTP session related information.
CIFSThis log category shows Windows/CIFS session related information.
SecurityThis log category shows information on user account changes, web sessions and
StorageThis log category shows disk, volume and RAID information.
QuotaThis log category shows quota control information.
SystemThis log category shows all other system related messages.
DESCRIPTION
and so on.
so on.
The following table shows information on log severity levels Levels range from 0 to 6 with 0
being the most severe level log and 6 being an informational log only. Log levels are not
displayed in the logs and are for your reference only.
Table 10 Log Severity Levels
LEVELDESCRIPTION
0Emergency
1Alert
2Critical
3Error
4Warning
5Notice
6Info
See the appendices for a table of example log messages.
NSA-2400 User’s Guide
47
Page 48
Chapter 3 Status Screens
3.4 System Info
Use this screen to view detailed NSA system and hardware information.
Figure 16 System Info
The following table describes the labels in this screen.
Tabl e 11 System Info
LABELDESCRIPTION
System NameThis displays the name which helps you find the NSA on the network.
Model NameThis displays the NSA model name.
Firmware VersionThis is the NSA firmware version and the date created. Click the update
BIOS Version
RomFile Checksum
ZLD Checksum
Core Checksum
CPU InfoThis displays the type of CPU the NSA has.
Flash Memory SizeThis displays the amount of non-volatile flash memory. Flash memory is
RAM Memory SizeThis displays the amount of (volatile) RAM. The NSA uses RAM during
Hardware Reset ButtonThis displays whether the reset button is enabled or not. Use the reset
IP AddressThis displays the NSA’s IP address.
IP Subnet MaskThis displays the NSA’s subnet mask.
Default GatewayThis displays the NSA’s default gateway.
Click the update link to go to the Network> TCP/IP screen. Click the
Modify button after the Server Name label in that screen to go to the
Network > Windows/CIFS in which you can change the Server Name.
You can enter up to 15 alphanumeric characters with minus signs allowed
but not as an end character. The name must begin with an alphabetic
character (a-z) and is not case sensitive.
link to go to the Maintenance > Firmware Upgrade screen from which
you can upload new firmware.
These four fields are to verify that a correct version of the firmware has
been installed. Customer support may also request this information to
help with troubleshooting.
used for storing NSA firmware and configuration files.
system runtime.
button to restore the factory default user name to “admin”, default
password to “1234”, default IP address to 192.168.1.3 with subnet mask
of 255.255.255.0
Maintenance > Configuration screen.
. Check that the reset button is enabled in the
48
NSA-2400 User’s Guide
Page 49
Chapter 3 Status Screens
Tabl e 11 System Info (continued)
LABELDESCRIPTION
MAC AddressThis displays the NSA’s unique physical hardware address (MAC). You
need the MAC address to register the product at myZyXEL.com.
Customer support may also request it for troubleshooting purposes.
UPS InfoThis field displays whether an Uninteruptable Power Supply (UPS) is
being used. A UPS is advisable to protect sensitive data stored on the
NSA in the event of a power outage.
A battery meter displays what percentage Uninteruptable
(UPS) battery power remains when an APC UPS is connected to an NSA
USB port and is turned on. Power from the UPS is used when power from
the mains is down and while the UPS has battery power.
Power from the mains is used when the mains power returns; the APC
UPS battery is recharged then too. This field displays N/A when no UPS
is connected to the NSA or it is turned off.
Power Supply
NSA-2400 User’s Guide
49
Page 50
Chapter 3 Status Screens
50
NSA-2400 User’s Guide
Page 51
CHAPTER 4
Sharing Screens
This chapter introduces the Sharing screens of the NSA.
4.1 Sharing Introduction
Use the Sharing screens to:
• Create and manage user accounts. Users are people who have access rights to the NSA and
can store files there for later retrieval.
• Create and manage groups. A group is a set of users.
• Create and manage shares. A share is a set of users/groups access permissions mapped to a
specific folder on a volume. It is equivalent to the Windows concept of a shared folder, but
is independent of the folder. You can map a share to a network drive for easy and familiar
file transfer for Windows users.
4.2 Sharing Overview
A Local user or group is a one created on the NSA when the NSA is in Workgroup mode.
Domain users and groups are created on a centralized Windows-based domain controller. This
list is used by the NSA when authenticating users and/or groups that seek access to a share.
If a user belong to different groups with different access rights to the same share, then the
more restrictive access right would apply, that is deny access overrides read access, overrides
read-write access. For example, user Joe belongs to the Sales group. He has read access to the
MIS share. The Sales group are denied access to this MIS share. Therefore, Joe is also denied
access to the MIS share.
"More restrictive access rights override less restrictive ones.
4.2.1 In Limbo and In Conflict
If a user or group is deleted in the domain controller, (but not on the NSA) then it appears as in
limbo on the NSA.
NSA-2400 User’s Guide
51
Page 52
Chapter 4 Sharing Screens
A conflict users is a local user that has the same user name as that of a user on a domain
controller
mode) and later you change to domain mode where you create (or there are already) identical
users and groups, then they appear as in conflict on the NSA.
. For example, if you first create local users and groups on the NSA (in Workgroup
"You cannot set a disk quota for users that are in conflict.
If you started in Domain mode and later you switch to Workgroup mode, the NSA will allow
you to create user names and group names that already exist on the domain controller.
If the conflicting domain user’s password and local user’s password are NOT the same, than
the two users are treated as two distinct users when using CIFS. Therefore, when using CIFS,
each user can only access shares to which they have been given access rights.
However, if the domain user’s password and local user’s password are also the same, then
only shares set to be accessible by the local user are actually accessible by both the domain
user and local user. The NSA has no way to distinguish these two users as their passwords and
user names are exactly the same.
"During a conflict users situation, the local user takes precedence ONLY if the
domain user and local user’s passwords are the same.
The situation is different for conflicting users when using FTP. For FTP if there are conflict
users, there will be no way for the FTP server to differentiate between the two user names.
Therefore, both domain user and local user can log in through FTP using their respective
passwords (regardless of whether they are the same or not) and be able to access all shares
accessible by EITHER the local user or domain user.
"It is possible for the conflicting domain user to log in via FTP and access
shares that are supposed to be only accessible by the conflicting LOCAL user
and vice versa.
4.2.1.1 In Limbo and In Conflict Example
Suppose there is a local user named u1 and a domain user named u1.
• Share 1 is configured to be only accessible by the local user u1.
• Share 2 is configured to be only accessible by the domain user u1.
• Share 3 is configured to be accessible by BOTH the local and domain u1.
52
NSA-2400 User’s Guide
Page 53
The table below shows the actual accessibility of the above shares for the conflict users (local
and domain u1) both when they have the same and when they have different passwords.
Table 12 In Limbo and In Conflict Example
CONFLICT USER U1 SHARE1SHARE 2SHARE 3
Different PasswordsCIFS: Accessible by
Local u1 only.
FTP: Accessible by
Domain AND Local
u1.
Same PasswordsCIFS: Accessible by
Domain AND Local
u1.
FTP: Accessible by
Domain AND Local
u1.
4.2.2 Sharing Overview Screen
Click the Sharing link in the Navigation panel to access the Sharing > Overview screen. This
is the first screen displayed.
CIFS: Accessible by
Domain u1 only.
FTP: Accessible by
Domain AND Local u1.
CIFS: Inaccessible by
either User or Domain
u1.
FTP: Accessible by
Domain AND Local u1.
Chapter 4 Sharing Screens
CIFS: Accessible by
Domain u1 AND Local u1.
FTP: Accessible by
Domain AND Local u1.
CIFS: Accessible by
Domain AND Local u1.
FTP: Accessible by
Domain AND Local u1.
Figure 17 Sharing > Overview
The following table describes the labels in this screen.
Table 13 Sharing Overview
LABELDESCRIPTION
Users
Total Number of Users This field displays the total number of user accounts created on the NSA
and/or a centralized Windows-based domain controller.
Total Number of Local
Users
Total Number of CIFS
Domain Users
This field displays the total number of users with accounts created on the
NSA.
This field displays the total number of users created on a centralized
Windows-based domain controller when the NSA is functioning in
Domain mode.
NSA-2400 User’s Guide
53
Page 54
Chapter 4 Sharing Screens
Table 13 Sharing Overview (continued)
LABELDESCRIPTION
Number of Users in
Limbo
Number of Conflict
Users
Groups
Total Number of
Groups
Number of Local
Groups
Number of Domain
Groups
Number of Groups in
Limbo
Number of Conflict
Groups
Shares
Number of SharesThis field displays the total number of shares (default and created) on the
Number of Auto
Shares
Number of Disabled
Shares
Number of
Unavailable Shares
This field displays the number of users who were once on the domain
controller but the NSA (in Domain mode) is currently unable to determine
if the user still exists on the domain controller. This may happen if he/she
has been deleted on the domain controller or the NSA is unable to
connect to the domain controller. In the latter case, all domain users
would be in limbo.
A conflict users is a local user that has the same user name as that of a
user on a domain controller.
there are.
This field displays the total number of groups created on the NSA and/or a
centralized Windows-based domain controller.
This field displays the total number of groups created on the NSA when
the NSA is in Workgroup mode.
This field displays the total number of groups created on a centralized
Windows-based domain controller when the NSA is functioning in
Domain mode.
This field displays the number of groups who were once on the domain
controller but the NSA (in Domain mode) is currently unable to determine
if the group still exists on the domain controller. This may happen if the
group has been deleted on the domain controller or the NSA is unable to
connect to the domain controller. In the latter case, all domain groups
would be in limbo.
A conflict group is a local group that has the same group name as that of
a group on a domain controller.
groups there are.
NSA.
Auto shares are shares that are automatically created by the NSA for
supported external USB hard drives that are not backup drives.This field
displays the number of these type external USB hard drives attached to
the NSA.
This field displays the number of shares that have been disabled on the
NSA.
If a shared folder is deleted or moved, the share appears as 'unavailable'
on the NSA. This field displays the number of such shares.
This field displays how many identical users
This field displays how many identical
4.3 Users
54
Use this screen to create and manage users who can store files on the NSA.
NSA-2400 User’s Guide
Page 55
4.3.1 User Icons
The following table describes the user icons.
Table 14 User Icons
ICONDESCRIPTION
This is an enabled local user icon.
This is an enabled domain user icon.
This is a local user in conflict icon.
This is a domain user in limbo icon.
This is a disabled local user icon. You cannot disable a domain user.
4.3.2 Users Summary Screen
Click the Sharing link in the Navigation panel and then click the Users link or the Users tab
to access the Sharing > Users screen.
Chapter 4 Sharing Screens
Figure 18 Sharing > Users
The following table describes the labels in this screen. See Table 14 on page 55 for icon
details.
Table 15 Sharing > Users
LABELDESCRIPTION
StatusThis icon displays whether the account is enabled, disabled, in conflict or
TypeThis field displays whether the user is a local user with an account created
User NameThis field displays the user name created when you add a new user.
QuotaThis field displays the maximum amount of storage space this user may
GroupsThis field displays the group(s) this user belongs to on the NSA.
in limbo.
on the NSA or a domain user created on a domain controller or active
server directory.
admin is the default NSA super user and cannot be deleted.
occupy on the NSA. It is unlimited if none is specified.
NSA-2400 User’s Guide
55
Page 56
Chapter 4 Sharing Screens
Table 15 Sharing > Users (continued)
LABELDESCRIPTION
ActionsThis label displays the allowable action for that user.
Add a New Local UserClick this button to go to a screen to create a new user on the NSA.
4.4 Adding a New User
Use this screen to add local users. Domain users must be added on the domain server. Click
the Add a New Local User button in the screen shown previously to create a new NSA user
account with NSA access password.
4.4.1 User Names
Enter a user name from one to 32 characters. The first character must be alphabetical (case
insensitive, [A-Z a-z]); numeric characters are not allowed as the first character.
The user name can only contain the following characters:
• Alphanumeric A-z 0-9 (there is no unicode support)
• Spaces
• _ [underscores]
•. [periods]
• - [dashes]
Other limitations on user names are:
• All leading and trailing spaces are removed automatically.
• Multiple spaces within names are converted to a single space.
• User names are case insensitive. The user name cannot be the same (no matter the letter
case) as an existing local user or domain user. For example, if there exists a domain user
with the name 'BOB', you cannot create a local user named 'bob'. If you enter a user 'bob'
but use 'BOB' when connecting via CIFS or FTP, it will use the account settings used for
'bob'.
• The user name cannot be the same as a system user name such as ANONYMOUS_CIFS, ANONYMOUS_FTP, EVERYONE nor be the same as an existing local or domain user.
Other reserved user names that are not allowed are:
•bin
•daemon
•ftp
•ftpguest
• nobody
•root
•smbguest
•admin
56
NSA-2400 User’s Guide
Page 57
4.4.2 Add a New User Screen
Figure 19 Add a New User
Chapter 4 Sharing Screens
The following table describes the labels in this screen.
Table 16 Add a New User
LABELDESCRIPTION
New User Information
EnabledYou must select this check box in order for this user to be able to access
the NSA.
User NameType a user name from 1 to 32 single-byte ASCII characters. See Section
4.4.1 on page 56 for more details on user names.
Email Address (optional)Enter a valid e-mail address for this user. You can use up to 200
PasswordCreate a password associated with this user. You can type from one to 14
Password (confirm)You must type the exact same password that you just typed in the above
QuotaThis is the maximum amount of space this user is allowed per volume.
alphanumeric characters (periods and the underscore are also allowed)
without spaces.
single-byte (no Chinese characters allowed for example) ASCII
characters.
Non-admin users can change their passwords by logging into the NSA
web configurator using the username and password as defined here.
After logging in, the Change Password screen is displayed. Enter a new
password in that screen and confirm it by re-entering it. Non-admin users
do not see other web configurator screens.
field.
Type a positive whole number (no floats, no negatives) as the maximum
amount of storage (in MB) this user may use on the NSA. 0 MB means
unlimited storage. The quota cannot exceed 500000000 MB.
NSA-2400 User’s Guide
57
Page 58
Chapter 4 Sharing Screens
Table 16 Add a New User (continued)
LABELDESCRIPTION
New Group MembershipYou need to first create groups on the NSA. A group is a set of users that
Available GroupsThese are the groups that have been created on the NSA. Select the
Group MembershipThese are the groups that the user already belongs to on the NSA. Select
Add Selected
Group(s)
Remove Selected
Group(s)
ApplyClick this button to save your changes back to the NSA.
CancelClick this button to begin configuring this screen afresh.
have common NSA access rights. A user can belong to more than one
group. More restrictive access rights override less restrictive ones.
Choose what groups this user should be added to or removed from. You
can select multiple groups by holding the [Ctrl] key while you click.
group(s) that you want the user to join and then click the Add Selected Group(s) button. You need to click Apply for the changes to take effect.
the group(s) that you want the user to leave and then click the Remove Selected Group(s) button. You need to click Apply for the changes to
take effect.
Select the group(s) that you want the user to join from the Available Groups list and then click the Add Selected Group(s) button. You need
to click Apply for the changes to take effect.
Select the group(s) that you want the user to leave from the Group Membership list and then click the Remove Selected Group(s) button.
You need to click Apply for the changes to take effect.
"User-group membership edits are also updated in the corresponding Sharing
> Groups > Edit Group screen.
4.4.3 User Password Management
Non-admin users may change their passwords themselves by logging into the NSA web
configurator using the username and password as defined in the previous screen. After logging
in, the Change Password screen is displayed. Enter a new password in that screen and
confirm it by re-entering it.
Figure 20 User Password Management
58
NSA-2400 User’s Guide
Page 59
Chapter 4 Sharing Screens
"Non-admin users do not see other web configurator screens.
4.5 Groups
Use this screen to create and manage groups. A group is a set of users.
4.5.1 Group Icons
The following group icons display under Status in the Group Summary screen.
Table 17 Group Icons
ICONDESCRIPTION
This is a local group icon. Groups cannot be disabled.
This is a domain group icon. Groups cannot be disabled.
This is a local group in conflict icon.
This is a domain group in limbo icon.
4.5.2 Groups Summary Screen
Click the Sharing link in the Navigation panel and then click the Groups link or the Groups
tab to access the Sharing > Groups screen.
Figure 21 Sharing > Groups
NSA-2400 User’s Guide
59
Page 60
Chapter 4 Sharing Screens
The following table describes the labels in this screen. See Table 17 on page 59 for icon
details.
Table 18 Sharing > Groups
LABELDESCRIPTION
StatusThis icon displays whether the group is enabled, in conflict or in limbo.
Groups cannot be disabled.
TypeThis field displays whether the group is a local group created on the NSA
or a domain group created on a domain controller or active server
directory.
Group NameThis field displays the group name created when you add a new group.
ActionsThis label displays the edit and remove icons for all groups created on the
Add a New Local GroupClick this button to go to a screen to create a new group on the NSA.
NSA. Click the Edit icon to edit the corresponding existing group. Click
the Remove icon to delete it.
4.6 Adding a New Group
Click the Add a New Local Group button in the screen shown previously to create a new
group with specified NSA access rights.
4.6.1 Group Names
Enter a group name from one to 16 characters. The first character must be alphabetical (case
insensitive, [A-Z a-z]); numeric characters are not allowed as the first character.
The group name can only contain the following characters:
• alphanumeric A-z 0-9 (there is no unicode support)
• Spaces
• _ [underscores]
•. [periods]
• - [dashes]
Other limitations on group names are:
• All leading and trailing spaces are removed automatically.
• Multiple spaces within names are converted to a single space.
• Group names are case insensitive. The group name cannot be the same (no matter the
case) as an existing local group or domain group. For example, if there exists a domain
group with the name 'BOB', you cannot create a local group named 'bob'. If you enter a
group 'bob' but use 'BOB' when connecting via CIFS or FTP, it will use the account
settings used for 'bob'.
The group name cannot be ANONYMOUS_CIFS, ANONYMOUS_FTP, EVERYONE nor
be the same as an existing local or domain group. Other reserved group names that are not
allowed are:
60
•daemon
•disk
•ftp
NSA-2400 User’s Guide
Page 61
• nobody
•lp
•root
• tty
•utm
4.6.2 Add A New Group Screen
Figure 22 Add a New Group
Chapter 4 Sharing Screens
The following table describes the labels in this screen.
Table 19 Add Group
LABELDESCRIPTION
New Group Information
Group NameType a group name from 1 to 16 single-byte ASCII characters. The first
Group MembershipA group is a set of users that have common NSA access rights. A user
Available UsersThese are the users that have been created on the NSA. Select the
Group MembershipThese are the users that already belong to this group on the NSA. Select
Add Selected User(s)Select the user(s) that you want to join this group from the Available
character must be alphabetical [A-Z a-z] (case insensitive) and cannot be
a number. See Section 4.6.1 on page 60 for more information on group
names.
can belong to more than one group.Choose what users should be added
to or removed from this group. You can select multiple users by holding
the [Ctrl] key while you click.
user(s) that you want to join this group and then click the Add Selected User(s) button. You need to click Apply for the changes to take effect.
the user(s) that you want to leave this group and then click the Remove Selected User(s) button. You need to click Apply for the changes to take
effect.
Users list and then click the Add Selected User(s) button. You need to
click Apply for the changes to take effect.
NSA-2400 User’s Guide
61
Page 62
Chapter 4 Sharing Screens
Table 19 Add Group (continued)
LABELDESCRIPTION
Remove Selected
User(s)
ApplyClick this button to save your changes back to the NSA.
CancelClick this button to begin configuring this screen afresh.
Select the user(s) that you want to leave this group from the Group Membership list and then click the Remove Selected User(s) button.
You need to click Apply for the changes to take effect
"Group-user membership edits are also updated in the corresponding Sharing
> Users > Edit User screen.
4.7 Shares
Use this screen to create and manage shares. A share is a set of users/groups access
permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept
of a shared folder, but is independent of the folder.
4.7.1 Share Icons
These are the share icons you will see in this screen.
Table 20 Share Icons
ICONDESCRIPTION
This is an available share icon.
This is an unavailable share icon.
This is a disabled share icon.
4.7.2 Share Summary Screen
Click the Sharing link in the Navigation panel and then click the Shares link or the Shares
tab to access the Sharing > Shares screen. The default shares on the NSA are shown in the
following figure.
62
NSA-2400 User’s Guide
Page 63
Chapter 4 Sharing Screens
Figure 23 Sharing > Shares
The following table describes the labels in this screen. See Table 20 on page 62 for icon
details.
Table 21 Sharing > Shares
LABELDESCRIPTION
StatusThis icon displays whether the share is available, unavailable or disabled.
The default backup and snapshot shares cannot be deleted.
Share Name This displays the name of the shared folder on the NSA.
VolumeThis displays which storage area (volume) the share was created. The
default shares are on volume1.
PathThis displays the location of the shared folder on the NSA. Forward
CommentThis is some description of the share as the (limited) share name may not
ActionsThis displays the edit and delete icons for all shares created on the NSA.
Add a New ShareClick this button to go to a screen to create a new share on the NSA.
slashes are used as path (folder tree branch) separators. Share paths that
no longer exist are shown in red.
be obvious enough for users to recognize clearly.
Click the Edit icon to edit the corresponding existing share. Click the
Remove icon to delete it.
4.8 Adding a New Share
Click the Add a New Share button in the screen shown previously to create a new shared
folder with optional access password.
4.8.1 Share Names
The share name can only contain the following characters:
• Alphanumeric A-z 0-9 (there is no unicode support)
• Spaces
• _ [underscores]
•. [periods]
• - [dashes]
Other limitations on share names include:
NSA-2400 User’s Guide
63
Page 64
Chapter 4 Sharing Screens
• All leading and trailing spaces are removed automatically.
• Multiple spaces within names are converted to a single space.
• Share names must be unique (they cannot be the same as other share names).
• Share names cannot use names reserved for “automatic shares” of external USB disk
volumes be unique, for example, “USB[0-9]{1,2}”, that is, a share named “USB”
followed by a one or two digit number).
• The minimum character length of a share name is one character, that is a share name
cannot be blank.
• The maximum character length of share name is 255 characters.
4.8.2 Share Paths
A share path is the full path to a folder on a volume that will be shared, for example, /mynsa/
topsecret/ugs/. This is independent from a “share name” which is the name shown for this
share when accessing the share via CIFS or FTP. The path should start with a '/' (forward
slash) followed by a parent folder, child folders leading to the folder that is to be shared.
The share path can include all characters including unicode characters (that is, you can use
Chinese folder names for example) except for the following characters:
• \ [backslash] this will be converted to forward slash and interpreted as a path delimiter
• / [forward slash] this is always interpreted as a path delimiter, so a folder cannot include it
in its folder name
•: [colon]
•* [asterisk]
• ? [question mark]
• “[double quote]
• < [less than]
• > [greater than]
•| [pipe]
Please also note the following as regards share paths:
• If the share path is missing the root path slash (the first forward slash), the system will
automatically add the initial slash.
• If the share path is missing the end trailing slash, the system will automatically add the
trailing slash.
• If the share path has '\' (backslashes) instead of '/' (forward slashes) they will all be
automatically converted to forward slashes.
• Share paths are case insensitive. If a share path already exists on the volume, for example,
/My/Little/Corner/Of/The/World/) but the entered share path is the same as the existing
path except the character case does not match (for example, /MY/liTTle/CORNER/oF/
THe/wOrLd/), then the NSA automatically converts the path to match to the existing
path's case. This is done because folder paths for CIFS on Windows systems are case
insensitive. Case insensitivity does not include some special characters, so ë will not be
converted to Ë, neither ê to Ê, and so on.
• The maximum share path length is 600 characters (the entire path string including slashes)
• The share path cannot be blank
64
NSA-2400 User’s Guide
Page 65
Chapter 4 Sharing Screens
• You cannot have an empty folder name, that is, two consecutive slashes (for example, '/
My//Corner/')
• Each individual folder in the path (that is, the content between the slashes) cannot exceed
255 characters
4.8.3 Share Comments
Share comments are optional, so they can be blank. The maximum character length of a share
comment is 255 characters. Share comments can contain any character except for the
following:
• “[double quote]
• ` [backquote]
• < [less than]
• > [greater than]
4.8.4 EVERYONE & ANONYMOUS Share Access Rights
With an EVERYONE access right, you still need to log in. Every local user with an account
on the NSA can access this share using their username and password. Users with accounts on a
domain server cannot access shares with EVERYONE access rights.
With ANONYMOUS CIFS, no login is required. If you enter a valid user name but wrong
password, the session is rejected. If the user name is invalid, then the session is considered
'anonymous'.
With ANONYMOUS FTP, you must enter either 'anonymous' or 'ftp' as the user name. Any
other name is considered a user name, so must be valid and have a corresponding correct
password.
"If you are already logged into a share using your username and password, you
will NOT be able to access a share that has ANONYMOUS CIFS or
ANONYMOUS FTP only access rights (as these require ‘no login’). If this is not your intention, it is recommended you set EVERYONE AND
ANONYMOUS CIFS and/or ANONYMOUS FTP access rights to these type
shares.
4.8.5 DFS
Distributed File System (DFS) is a network server component that makes it easier for you to
find and manage data on your network. Through DFS, you can build a single hierarchical file
system whose contents are distributed throughout your organization’s WAN. It permits shares
to be hierarchically connected to other Windows shares. Since DFS is a logical mapping, the
physical location of data becomes transparent to your users and applications.
You can use DFS links when accessing the NSA using CIFS, not FTP.
NSA-2400 User’s Guide
65
Page 66
Chapter 4 Sharing Screens
4.8.6 Add A New Share Screen
Figure 24 Add a New Share
66
The following table describes the labels in this screen.
Table 22 Add Share
LABELDESCRIPTION
New Share Information
Enabled You must select this check box in order for a user or group to be able to
access this share on the NSA.
Share NameType a share name from 1 to 255 single-byte ASCII characters. The name
cannot be the same as another existing local share. See Section 4.8.1 on
page 63 for more information on share names.
NSA-2400 User’s Guide
Page 67
Chapter 4 Sharing Screens
Table 22 Add Share (continued)
LABELDESCRIPTION
VolumeYou should have already created volumes (a single accessible storage
area with a single file system) on the NSA.
Path Type the location of the share on the NSA using forward slashes as
branch separators. See Section 4.8.2 on page 64 for more information on
share paths.
Comment Type some suitable descriptive text to further identify the share (in
New Share Access Rights Use this part of the screen to assign access rights (full, read only or deny)
Available Users/
Groups
Give Full Access ->Select users and/or groups (you can select multiple users by holding the
Give Read Only
Access ->
Deny Any Access ->Select users and/or groups (you can select multiple users by holding the
addition to its name) on the network. The comment text appears next to
the share folder in Windows. See Section 4.8.3 on page 65 for more
information on share comments.
to users and/or groups. EVERYONE means every local user who has an
account on the NSA. ANONYMOUS means every user including people
who do NOT have accounts on the NSA.
See Section 4.8.4 on page 65 for more information on EVERYONE and
ANONYMOUS share access rights.
This box lists all users and groups created on the NSA.
[Ctrl] key while you click) from the Available Users/Groups list box and
then click this button to allow them full access (read, write and execute) to
all files contained within this share.
Select users and/or groups (you can select multiple users by holding the
[Ctrl] key while you click) from the Available Users/Groups list box and
then click this button to allow them read-only access (they cannot modify
nor execute) to all files contained within this share.
[Ctrl] key while you click) from the Available Users/Groups list box and
then click this button to deny them any access (they cannot read, modify
nor execute) to all files contained within this share. This share is not
visible to those users and/or groups who access the NSA via FTP.
Share Access Rights These boxes list what users and/or groups have what access rights to this
Full Access:Select users and/or groups (you can select multiple users by holding the
Read Access:Select users and/or groups (you can select multiple users by holding the
Deny Access:Select users and/or groups (you can select multiple users by holding the
NSA-2400 User’s Guide
Note: Where access conflict arises between users and/or
groups, the most restrictive access right applies.
share.
[Ctrl] key while you click) from this list box and then click the Remove Selected button to no longer allow them access to files contained within
this share. These users and/or groups are then available to have other
access rights to this share if you want.
[Ctrl] key while you click) from this list box and then click the Remove Selected button to no longer allow them access to files contained within
this share. These users and/or groups are then available to have other
access rights to this share if you want.
[Ctrl] key while you click) from this list box and then click the Remove Selected button to deny them access to files contained within this share.
These users and/or groups are then available to have other access rights
to this share if you want.
67
Page 68
Chapter 4 Sharing Screens
Table 22 Add Share (continued)
LABELDESCRIPTION
Remove SelectedSelect users and/or groups (you can select multiple users by holding the
DFS LinksDistributed File System (DFS) is a share of other shares.
Set as DFS Root A DFS root is a local share that serves as the starting point and host to
Link NameThe name can be the same as another existing DFS link name. Name
Remote ServerType the IP address or domain name of the remote server.
Remote Share NameThis name should follow the same restrictions as an NSA file name in
ActionClick the corresponding button to add or remove a DFS link.
ApplyClick this button to save your changes back to the NSA.
CancelClick this button to begin configuring this screen afresh.
[Ctrl] key while you click) from one of the Full Access, Read Only Access or Deny Access list boxes and then click this button to no longer
allow them access to files contained within this share. These users and/or
groups are then available to have other access rights to this share if you
want.
other shares. Any shared resource can be published into the DFS name
space.
restrictions are the same as for share names (see Section 4.8.1 on page
63).
order for it to work properly with the NSA.
The following screen is an example of the default public share. Note that for anonymous CIFS
users, no login is required (see Section 4.8.4 on page 65 for more information).
68
NSA-2400 User’s Guide
Page 69
Figure 25 Public Share
Chapter 4 Sharing Screens
NSA-2400 User’s Guide
69
Page 70
Chapter 4 Sharing Screens
70
NSA-2400 User’s Guide
Page 71
CHAPTER 5
Network Screens
This chapter discusses the network screens.
5.1 Network Screens
This section gives an overview of the various features included in the network configuration
screens.
Use the network screens to:
• View the network information
• Configure your TCP/IP information and DNS server address.
• Change your Windows/CIFS server name and workgroup name.
• Enable FTP and set connection limits.
5.2 Network Introduction
Click the Network link in the Navigation panel to access the Network > Overview screen.
This is the first screen displayed.
"You can click on the edit icons to go to the appropriate page to change the
settings, or you can click on the appropriate tabs or navigation panel links
instead.
5.2.1 IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, so too do computers on a
LAN share one common network number.
Where you obtain your network number depends on your particular situation. If the ISP or
your network administrator assigns you a block of registered IP addresses, follow their
instructions in selecting the IP addresses and the subnet mask. The subnet mask specifies the
network number portion of an IP address.
NSA-2400 User’s Guide
71
Page 72
Chapter 5 Network Screens
5.2.2 DHCP
DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual
clients to obtain TCP/IP configuration at start-up from a server. You can configure the NSA as
a DHCP client which means it is set to receive an IP address from a DHCP server. The NDU
can help you discover the IP address of the NSA.
Alternatively, configure a static IP address for the NSA.
5.2.3 Windows/CIFS
Common Internet File System (CIFS) is a standard protocol supported by most operating
systems in order to share files across the network.
CIFS runs over TCP/IP but uses the SMB (Server Message Block) protocol found in Microsoft
Windows for file and printer access; therefore, CIFS will allow all applications, not just Web
browsers, to open and share files across the Internet.
5.2.4 FTP
File Transfer Protocol (FTP) is an Internet file transfer service that operates on the Internet and
over TCP/IP networks. A system running the FTP server accepts commands from a system
running an FTP client. The service allows users to send commands to the server for uploading
and downloading files.
5.3 Network Overview Screen
Figure 26 Network > Overview
72
NSA-2400 User’s Guide
Page 73
Chapter 5 Network Screens
The following table describes the labels in this screen.
Table 23 Network > Overview
LABELDESCRIPTION
IP Information
ModeThis field displays whether the NSA is receiving an IP address from a
DHCP server (Dynamic) or whether it is assigned a static IP address.
DHCP ServerIf the NSA is receiving an IP address from a DHCP server, this field
displays the IP address of the DHCP (Dynamic Host Configuration
Protocol) server. See Section 5.2.2 on page 72 for more details.
IP AddressThis field displays the NSA IP address.
IP Subnet MaskThe subnet mask specifies the network number portion of an IP address.
Default GatewayIf you select Dynamic IP in the TCP/IP screen the default gateway will be
Windows/CIFS
Information
Server NameThis is the name of the NSA device.
ModeThis shows the Windows/CIFS mode, either Workgroup or Domain.
Workgroup NameThis field displays your workgroup name.
Domain ProtocolThis field displays the windows domain protocol you are using. Select
DomainThis is the domain name you have entered.
FTP Information
Enable FTPThis field displays whether or not the NSA allows FTP connections.
Connection LimitThis is the maximum number of sessions allowed to access the NSA
Idle TimeoutThis field shows the length of time in seconds that the FTP connection
Enable AnonymousThis displays whether users are allowed to log into the NSA using an
If you select Dynamic IP in the TCP/IP screen the subnet mask will be
assigned by the DHCP server. If you select Static IP then your subnet
mask will be what you type into this field. See Section 5.2.1 on page 71 for
more details about IP subnet mask.
assigned by the DHCP server. If you select Static IP then you must type a
gateway IP address in this field.
NT4 Domain or Active Directory Domain in the Windows/CIFS screen.
simultaneously via FTP. A single user may have multiple concurrent
sessions.
can be idle before timing out.
‘FTP’ user name or ‘anonmyous’ without giving a password.
5.4 TCP/IP Screen
Use the Network >TCP/IP screen to an NSA dynamic or static IP address, subnet mask,
default gateway and DNS servers.
"The NSA automatically restarts after you apply changes in the TCP/IP or
Windows/CIFS screens.
NSA-2400 User’s Guide
73
Page 74
Chapter 5 Network Screens
Figure 27 NSA Rebooting
Click the Network link in the Navigation panel and then click the TCP/IP link or the TCP/IP
tab to access the Network > TCP/IP screen.
Figure 28 Network > TCP/IP
74
The following table describes the labels in this screen.
Table 24 Network > TCP/IP
LABELDESCRIPTION
Server Name
Server NameThis field shows the name you assigned to your NSA.
ModifyClick the Modify button to take you to the Windows/CIFS screen (the next tab)
where you can change your server name.
Network IP
Address
DynamicSelect the Dynamic checkbox to have a DHCP server automatically assign an IP
address to your NSA. If none is assigned, then the NSA reverts to the default IP
address of 192.168.1.3.
StaticSelect the Static checkbox for the NSA to use fixed TCP/IP information. You
MUST fill in all the following fields.
IP AddressType an IP address in this field.
NSA-2400 User’s Guide
Page 75
Chapter 5 Network Screens
Table 24 Network > TCP/IP
LABELDESCRIPTION
IP Subnet
Mask
Default
Gateway
DNSDNS (Domain Name System) is for mapping a domain name to its corresponding
DynamicSelect the checkbox to have the DHCP server automatically assign a DNS server
StaticSelect the checkbox to choose a static DNS server address. Type the DNS
Primary DNS
Server
Secondary
DNS Server
ApplyClick Apply to save your TCP/IP configurations. After you click Apply, the NSA
Type an IP subnet mask in this field.
Type a default gateway address in this field.
IP address and vice versa. The DNS server is extremely important because
without it, you must know the IP address of a machine before you can access it. If
you have the IP address(es) of the DNS server(s), enter them.
address to your NSA.
server IP address(es) into the fields below.
Type a primary DNS server IP address.
Type a secondary DNS server IP address.
restarts. Wait until you see the Login screen or until the NSA fully boots and then
use the NDU to rediscover it.
5.5 Windows/CIFS
Use this screen to configure your CIFS settings. In this screen you can set your server name,
your WINS server, and specify if your NSA is a part of a workgroup or domain.
"CIFS cannot be disabled on the NSA.
"The NSA automatically restarts after you apply changes in the TCP/IP or
Windows/CIFS screens.
5.5.1 Workgroup Security Mode
A workgroup is a group of computers on a network that can share files. On the NSA, use
Workgroup Security Mode if the user names and passwords for these computers are
maintained on the NSA. This is suitable for users using the Common Internet File System
(CIFS) protocol for remote file access in a small-to-medium sized office.
NSA-2400 User’s Guide
75
Page 76
Chapter 5 Network Screens
5.5.2 Windows Domain Security Mode
A domain is a group of computers that are part of a network and share a common directory
database. On the NSA, use Windows Domain Security Mode if you want centralized
management of shared resources, services and user on a centralized Windows-based domain
controller. You can create users and groups on the centralized Windows-based domain
controller such as an active server directory, and the NSA checks this list when authenticating
users and/or groups that seek access to a share. This is suitable for a large number of CIFS
users where accounts are stored on an external server.
A domain is organized in levels and is administered as a unit with common rules and
procedures. Each domain has a unique name. You must be logged on as an administrator to
your local computer and have a valid user name and password to join your computer to a
domain. If you do not know which user name and password to use, contact your network
administrator.
"The NSA time and date must be the same as the time and date on the external
domain controller if the NSA is using one to import users and groups.
5.5.3 Windows/CIFS Screen
Figure 29 Network > Windows/CIFS_Workgroup
76
NSA-2400 User’s Guide
Page 77
Figure 30 Network > Windows/CIFS_Domain
Chapter 5 Network Screens
The following table describes the labels in these screens.
Table 25 Network > Windows/CIFS
LABELDESCRIPTION
Server Name
Server NameEnter a name to identify your NSA on the network in this field. The NSA
WINSYou can specify a WINS server which the NSA will use to resolve names
WINS ServerEnter the WINS server name in this field.
Windows/CIFS
NSA is a member of A workgroup is a group of computers on a network that can share
Workgroup NameType your workgroup name in this field if you selected Workgroup from
Windows Domain
Protocol
Domain Server
Address
Windows Domain
Administrator
restarts after you change the NSA.
to IP addresses.
files.These user accounts are maintained on the NSA.
A domain is a group of computers that are part of a network and share a
common directory database. Domain users and groups are created on a
centralized Windows-based domain controller.
Select either Workgroup or Domain from the drop-down list box.
the field above.
The following fields apply if you selected Domain.
Select a windows domain protocol if you selected Domain above. Choose
NT4 Domain if your server uses a Windows NT operating system and
Active Directory Domain if it uses a Windows 2000 or later operating
system.
Type the IP address of the Windows server domain controller or a preWindows 2000 domain name.
Administrator is the default Windows Domain Administrator.
NSA-2400 User’s Guide
77
Page 78
Chapter 5 Network Screens
Table 25 Network > Windows/CIFS (continued)
LABELDESCRIPTION
Windows Domain
Administrator
Password
ApplyClick here to save your changes back to the NSA.
5.6 FTP Screen
Use this screen to configure your NSA FTP settings. In this screen you can enable or disable
FTP, set a connection limit, idle timeout, and enable or disable anonymous FTP access. See
Section 5.2.4 on page 72 for more details on FTP.
Figure 31 Network > FTP
Type a password associated with the Windows Domain Administrator.
The following table describes the labels in this screen.
Table 26 Network > FTP
LABELDESCRIPTION
FTP
Enable FTPSelect the Enable FTP checkbox to allow users to connect to the NSA via
FTP; otherwise clear the check box.
Connection LimitEnter the maximum number of concurrent connections allowed on the
Idle TimeoutEnter the length of time that an FTP connection can be idle before timing
Enable Anonymous FTP
Access
ApplyClick Apply to save your settings to the NSA.
NSA in this field.
out.
Select Enable Anonymous FTP Access to allow any user to log into the
NSA using ‘FTP’ or ‘anonmyous’ as a user name and no password. Any
other name is considered a user name, so must be valid and have a
corresponding correct password.
This chapter compares the different ways of protecting data on the NSA-2400 and explains
how to use the Protect screens to create and schedule snapshots and external backups.
6.1 Protection Methods
There are a variety of ways to protect your data on the NSA-2400. Below is a summary table
of what can be done in each situation.
Table 27 Overview of Protection Methods
SITUATIONACTION
Unexpected NSA-2400 behavior after
configuration changes
Need to transfer data from your computer to the
NSA after volume(s) have been created
Corrupt data files
Data infected by virus
Data files incorrectly deleted or modified
Hard drive malfunction.Use RAID.
NSA malfunction
Network down
Natural disaster such as a fire or earthquake
occurs where your NSA-2400 is located
Back up the NSA-2400 configuration file before you
make major configuration changes.
Use the Genie Backup Manager.
Create regular snapshots.
Back up data to another NSA or external USB hard
drive.
The following sections describe these methods in more detail. See Section 7.4 on page 100 for
more information on RAID.
6.1.1 Configuration File Backup and Restoration
Use the Maintenance > Configuration menus to create a file of your NSA configurations
such as passwords, shares and volumes created, network settings and so on. If you’re going to
do some major configuration changes, then it is advisable to create a configuration backup file.
If things go wrong after you make the configuration changes, you can always go back to the
previous configuration by restoring an earlier configuration file.
If you forgot the NSA password, then reset the device to go back to the factory default
configuration.
NSA-2400 User’s Guide
81
Page 82
Chapter 6 Protect Screens
"Configuration File Backup and Restoration does not affect data (your files and
folders), volumes on the NSA.
6.1.2 Genie Backup Manager
Use the Genie Backup Manager to transfer data from your computer to the NSA. You could
use Genie Backup Manager to back up from one NSA to another NSA but it’s recommended
you use the NSA Protect > Backup to do this (see Section 6.1.4 on page 83) as the latter
would be faster.
"The Genie Backup program uses the same network port as the NDU to
discover the NSA. To avoid a port conflict, do not run the Genie Backup
Manager at the same time as the NDU.
6.1.3 Snapshots
A snapshot is a record of changes to a (internal) volume at a particular moment in time. As it
only records changes to files made in a volume, it’s faster and takes up less space than a
backup. Snapshots are good for data that changes often and needs to have high availability. If
files within a volume become infected or corrupted, you can revert the volume back to a
previous snapshot.
You can only create snapshots of a complete volume, not a single file or folder within a
volume. If a volume is restored to a previous snapshot, then all files in that snapshot are
returned to the state they were in at the time of the snapshot.
When you roll back to a previous snapshot, all intermediate snapshots between the rollback
and the present are deleted. For example, say you had daily snapshots scheduled. Today is
Friday and you decide to roll back to Monday's snapshot. Then the snapshots from Tuesday,
Wednesday and Thursday are deleted after the rollback is completed.
You can continue to work, while the snapshot is taken. It's a good idea to save your open files
first before taking a snapshot. Snapshots may get progressively slower as more are done but
they are still very fast compared to backups (as only block changes are recorded).
6.1.3.1 Some Important Notes on Snapshots
1 Snapshots cannot be taken on external volumes or internal volumes using the BACKUP
storage system.
2 If the reserved space for snapshots runs out, then all snapshots (including previously
created ones) are lost. Make sure that you reserve enough space for snapshots.
3 Since a snapshot is a record of changes, if very large files (typically over 1GB) are
transferred onto the volume, then that ‘change’ may be larger than the reserved space for
the snapshot causing it to become invalid.
82
NSA-2400 User’s Guide
Page 83
4 A snapshot just takes up as much space as it needs (within the reserved space). Reserved
snapshot space can be decreased later, but not increased, so it's better to start off with a
(not too) big reserved space.
5 If the disk associated with a volume fails, then all snapshots in that volume are lost.
6 The purging of snapshots occurs after the next snapshot is taken (unlike backup purges
which occur before backup is done).
7 You cannot create snapshots with volumes created using this NSA-2400 release 1 (v1.00
AFA.0 C0) firmware. To overcome this, create a new volume using release 2 firmware,
copy the old volume data over to the new volume and then recreate the old volume. If
you don’t have enough space to create a new volume, then use the Genie Backup
Manager to transfer data from your old volume to your computer, recreate the old
volume, and then use the Genie Backup Manager again to back up data from your
computer to the newly created volume.
8 Up to 30 snapshots are allowed in total on the NSA.
9 The NSA uses EVMS (Enterprise Volume Management System) to create snapshots.
6.1.3.2 Snapshots Versus Backups
See Section 6.1.4 on page 83 for more information on backups.
1 A snapshot only records changes to files within a volume, so it’s faster and takes up less
space than backup.
2 You must create a snapshot of a complete volume, not on a single file or folder as you
can do with a backup.
Chapter 6 Protect Screens
It’s a good idea to take both snapshots and backups for the following reasons:
1 Snapshots may become invalid, so it’s good to also have backups available in case that
happens.
2 Backups may require several hours depending on the amount of data you have to back up
(it’s a good idea to schedule backups at non-peak times), so you should take a snapshot
of your data before the backup is run. If a file becomes corrupt during the backup, you
can still revert to the previous snapshot and back up again.
3 If files to be backed up are open at the time of the backup, then make sure that snapshots
are allowed. If they are allowed and files are open at the time the backup is run, then
backup first takes a snapshot and then copies the files from this snapshot.
"If not enough snapshot space is left then the backup will cause your snapshots
to become invalid. The backup will still proceed without the snapshot but if the
open file changes during the backup, then the backup will fail.
6.1.4 NSA Backup
Use the Protect > Backup menus to create data backups to an external USB disk drive or
another NSA over the network. Backup disks must be formatted by the NSA as a disk of type
BACKUP. You cannot back up to other file systems such as NTFS, FAT, or FAT32.
NSA-2400 User’s Guide
83
Page 84
Chapter 6 Protect Screens
"NSA backup can only be done to another NAS with the same firmware version
or an external USB disk that was formatted as 'Backup' volume type.
The NSA does not check if enough space is available before backup commences. The NSA
first starts transferring files and if not enough space is available, then it issues a log or alert to
tell you that the backup failed (due to lack of space) and deletes any files already transferred.
The NSA deletes old backups first before a new backup is done (Purge). If you have a backup
scheduled to begin at midnight, then at that time, the NSA checks your Purge settings and
deletes files according to those settings before the actual backup takes place. If space on the
backup NSA is a concern, then configure the NSA to delete old backups.
A full backup copies all files from your NSA to the backup device. It may take some time
depending on how many files you have to back up.
It is not possible to run programs (like FDISK), that access the disk directly, while backup is
running.
See also this related information:
• Section 6.1.3.2 on page 83 for a comparison of backups and snapshots.
• Section 7.4.7 on page 105 for a comparison of backups and RAID.
• Section 6.1 on page 81 for an overview of protection methods available on the NSA-2400.
"To best protect data, you should back up data to another NSA or an external
hard drive, and store in an off site location.
6.2 Protect Overview Screen
Click the Protect link in the navigation panel to see an overview of the Protect screens. Use
the Backup screens to create new backups or edit existing ones. Use the Snapshot screens to
create new snapshots or edit existing ones. Use the Scheduler screens to automate backups or
snapshots. Either click on a link in the overview screen or a sub-link in the navigation panel to
go to the related screen.
The Protect > Overview screen shows you how many backups, snapshots and schedules you
have created or configured.
84
NSA-2400 User’s Guide
Page 85
Figure 32 Protect > Overview
6.3 Backup Summary
Click the Backup link in the Navigation panel to access the Protect > Backup summary
screen that shows a list of all backups created and scheduled. You can also edit or delete an
existing backup or create a new one from here.
Figure 33 Protect > Backup
Chapter 6 Protect Screens
The following table describes the labels in this screen.
Table 28 Protect > Backup
LABELDESCRIPTION
Job NameThis is the name of the backup
DescriptionThis is some extra descriptive text on the backup
Backup TypeThis displays normal backup type.
ActionsUse these icons to schedule, immediately run or edit or an existing
Add a New Backup JobClick this button to create a new backup (see also Section 6.3.3 on page
RestoreClick this button to restore a previous backup from another NSA or
Delete Selected JobsSelect the check boxes of backups you want to delete and then click this
NSA-2400 User’s Guide
backup.
88).
external USB hard drive connected to the NSA.
button to delete those files on the backup NSA or external USB hard drive
connected to the NSA.
85
Page 86
Chapter 6 Protect Screens
6.3.1 Schedule Backups
Click the schedule icon in the Action column in the Protect > Backupscreen to schedule that
backup. (You can also do this in the Protect > Scheduler screen, but if you do it in the
Protect > Backup screen, then specific related backup information is already entered.)
"Scheduler queues backups if a different backup is already going on at the time
a backup is scheduled.
Figure 34 Protect > Backup > Schedule
See the Protect > Scheduler screen (Section 6.4 on page 93) in this User’s Guide for more
information on these fields.
Click the Run Now icon in the Action column in the Protect > Backupscreen to immediately
perform that backup. Click the Cancel button if you want to stop the backup.
Figure 35 Protect > Backup > Run Now
6.3.2 Creating/Editing Backups
Click the edit icon in the Action column in the Protect > Backupscreen to edit that backup or
click Add a New Backup Job to create a new backup.
86
NSA-2400 User’s Guide
Page 87
Figure 36 Protect > Backup > Edit
Chapter 6 Protect Screens
The following table describes the labels in this screen.
Table 29 Protect > Backup > Edit
LABELDESCRIPTION
Backup Job Name:This is a required field that uniquely identifies the backup. Type from one
Backup Job Description:Type from 0 to 60 characters to further describe this backup.
Where to Backup
Backup TargetChoose where to save the backup.
Remote NSAIf you chose to back up to another NSA, then fill in the following fields in
External DiskYou only see this option if an external USB hard drive is connected to the
What to Backup
Files/Folders to
backup:
to 32 characters. All characters are allowed except /:"'*?<>\.
order to be able to access it. Click Test Connection to see if both NSAs
can communicate.
•Remote NSA Address
•User Name
•Password
•Backup Share Path
NSA (for example USB1 ExtVolume 1)
This textbox shows the volume and path of the folder or files that you want
to back up.
NSA-2400 User’s Guide
87
Page 88
Chapter 6 Protect Screens
Table 29 Protect > Backup > Edit (continued)
LABELDESCRIPTION
ModifyClick Modify and then browse to the files and shares that you want to
Advanced Settings
Backup Method:A Normal backup is a complete copy of all files and folders selected.
Use CompressionCompression reduces the size of the file that you want to back up. Backup
Purge Settings:Use Purge to delete old backups. This purge policy applies to this specific
ApplyClick this button to save your changes back to the NSA.
CancelClick this button to begin configuring this screen afresh.
back up.
is then faster, but restoring may be slower, so if backup space is not a
concern and recovery speed is, then turn off compression.
backup only, unlike snapshot purge policies which apply to all snapshots.
Purge runs first before a new backup is done. For example, if you have a
backup scheduled to begin at midnight, then at that time, the NSA checks
these settings and deletes files accordingly before backup takes place. If
space on the backup NSA or disk is a concern, then configure the NSA to
delete old backups.
•Keep All Old Backups: Purge is in effect disabled. Select this if
backup space is not a concern.
•Keep only last backup files: All backup files older than the last one
are deleted. You will not be able to recover files that existed (only) in
those previous backups. Select this if backup space is limited and
recovery of old files is not important.
•Keep backups for a period of day(s): Backups older than the
number of days you enter here are deleted. 0 days means that all old
backups are deleted when a new one is done.
6.3.3 Restoring Backups
Click the Restore button in the Protect > Backupscreen to replace existing files with files
saved previously.
88
NSA-2400 User’s Guide
Page 89
Figure 37 Protect > Backup > Restore
Chapter 6 Protect Screens
The following table describes the labels in this screen.
Table 30 Protect > Backup > Restore
LABELDESCRIPTION
Restore Source
Restore TargetChoose from where to save the backup.
Remote NSAIf you chose to restore from another NSA, then type in its IP address here.
External DiskIf you chose to restore from an external USB hard drive then choose
What to RestoreChoose which previously saved backup to restore here.
Restore Settings
Restore MethodChoose whether files in the backup should replace existing file.s
Restore LocationChoose whether to restore files to their original location on the NSA-2400
ApplyClick this button to save your changes back to the NSA.
CancelClick this button to begin configuring this screen afresh.
6.3.4 Snapshot Summary
which one to restore from here.
•Do NOT replace existing files
•Always replace files
or specify a different location (on the NSA-2400)
•Original Location
•Alternative Location
Click the Protect link in the Navigation panel, then click the Snapshot sublink to access the
Protect > Snapshot summary screen.
NSA-2400 User’s Guide
89
Page 90
Chapter 6 Protect Screens
Figure 38 Protect > Snapshot
The following table describes the labels in this screen.
Table 31 Protect > Snapshot
LABELDESCRIPTION
Job NameThis is the name of the snapshot.
VolumeA snapshot must be on done on a complete volume, and not a single file
ActionsUse these icons to see all snapshot images taken so far (icon at the top of
Add a New Snapshot JobClick this button to create a new snapshot (see Section 6.3.7 on page 92).
Delete Selected JobsSelect the check boxes of snapshots you want to delete and then click this
Purge PolicyClick this button to display a screen where you can configure when to
or folder.
the column), schedule, immediately run or edit an existing snapshot.
button to delete them.
delete old snapshots.
6.3.5 Schedule Snapshots
Click the schedule icon in the Action column in the Protect > Snapshot screen to schedule
that snapshot. (You can also do this in the Protect > Scheduler screen, but if you do it in the
Protect > Snapshot screen, then specific related snapshot information is already entered.)
90
You can also do this within the create/edit snapshot screen (see Section
6.3.7 on page 92 for details on these fields).
NSA-2400 User’s Guide
Page 91
Chapter 6 Protect Screens
Figure 39 Protect > Snapshot > Schedule
See the Protect > Scheduler screen (Section 6.4 on page 93) in this User’s Guide for more
information on these fields.
Click the Run Now icon in the Action column in the Protect > Snapshotscreen to
immediately perform that snapshot. A screen pops up asking you to confirm.
Figure 40 Protect > Snapshot > Run Now
6.3.6 Creating/Editing Snapshots
Click the edit icon in the Action column in the Protect > Snapshotscreen to edit that
snapshot or click Add a New Snapshot Job to create a new snapshot.
Figure 41 Protect > Snapshot > Create/Edit
The following table describes the labels in this screen.
Table 32 Protect > Snapshot > Create/Edit
LABELDESCRIPTION
Snapshot Job Name:This is a required field that uniquely identifies the snapshot. Type from
one to 32 characters. All characters are allowed except \/:"'*?<>.
Snapshot Job Description: Type from 0 to 60 characters to further describe this snapshot.
Volume SelectionA snapshot must be on done on a complete volume, and not a single file
Take Snapshots ofWhen creating a new snapshot, onlyvolumes that are already created on
ApplyClick this button to save your changes back to the NSA.
CancelClick this button to begin configuring this screen afresh.
6.3.7 Purging Snapshots
Click the Purge Policy button in the Protect > Snapshotscreen to define a rule for
automatically deleting snapshots.
Purge policies apply to all snapshots, unlike backup purge policies which apply only to
specific backups.
Purge policies always run before new snapshots are taken.
Figure 42 Protect > Snapshot > Create/Edit
or folder. If a file in a volume become infected or corrupted, you must
revert the whole volume back to its status in a previous snapshot.
the NSA are available.
92
The following table describes the labels in this screen.
Table 33 Protect > Snapshot > Create/Edit
LABELDESCRIPTION
Purge Settings:Purge settings are run each time a snapshot is scheduled.
•Do Nothing (all snapshots will be invalid): No new snapshots can
be taken until you manually delete old snapshots.
•Delete Oldest Snapshot First: The oldest snapshot will be deleted
each time a new snapshot is scheduled.
•Delete Largest Snapshot First: The largest snapshot will be deleted
each time a new snapshot is scheduled. As a snapshot is a file of
changes since your previous snapshots, selecting this option may
cause problems with rollback later.
ApplyClick this button to save your changes back to the NSA.
CancelClick this button to begin configuring this screen afresh.
NSA-2400 User’s Guide
Page 93
6.4 Scheduler Screens
Use these screens to automatically run backups or snapshots at the configured times. It is
recommended you schedule large backups for times when your network is not busy, such as at
night. If two events are configured to run at the same time, then one must wait until the other
finishes running.
The scheduler uses the dates and times you configured on the primary NSA (not the backup)
Maintenance > Date/Time screen. Some backups or snapshots may not run if you change the
NSA date and time after having configured schedules.
6.4.1 Scheduler Screen
Click the Protect link in the Navigation panel and then click the Scheduler sub-link to access
the Protect > Scheduler summary screen.
Figure 43 Protect > Scheduler
Chapter 6 Protect Screens
The following table describes the labels in this screen.
Table 34 Protect > Scheduler
LABELDESCRIPTION
StatusThis fields shows whether the backup or snapshot has been run yet..
Job NameThis is the name of the backup or snapshot that’s scheduled to be run
TypeThis displays whether the schedule is for a backup or a snapshot.
ScheduleThis shows the days and times the backup or snapshot will run.
Last RunThis shows the date and time the backup or snapshot was last run.
Next RunThis shows the date and time the backup or snapshot will run next..
ActionClick the edit icon to edit an existing schedule or the delete icon to delete
Create a ScheduleClick this button to create a new schedule.
automatically.
it.
6.4.2 Scheduler Create/Edit Screen
Click the Create a New Scheduled Task button in the Protect > Scheduler screen to create a
new schedule. Click the edit icon in the Protect > Scheduler screen to edit an existing
schedule.
NSA-2400 User’s Guide
93
Page 94
Chapter 6 Protect Screens
Figure 44 Protect > Scheduler > Create/Edit
The following table describes the labels in this screen.
Table 35 Protect > Scheduler > Create/Edit
LABELDESCRIPTION
Edit a Scheduler
Job Type:Select whether the schedule is for a backup or snapshot. Backup is
List of Backup JobsThe following table displays information on the backups or snapshots you
Job NameThis displays the name of the backup or snapshot to be scheduled.
Job DescriptionThis displays the description you typed for the backup.
Backup TypeThis displays normal.
Display JobsClick this button to show details of the job selected.
RepeatsSelect how often the job should run (Daily, Weekly or Monthly)
TimeEnter the time, day and/or month as appropriate for your selection above.
ApplyClick this button to save your changes back to the NSA.
CancelClick this button to begin configuring this screen afresh.
selected in this screen
have created.
94
NSA-2400 User’s Guide
Page 95
CHAPTER 7
Storage Screens
This chapter covers storage systems, volumes and disks on the NSA-2400.
7.1 Storage Introduction
Use the Storage screens to create and manage NSA-2400 volumes (internal and external),
disks and reserve snapshot space.
• See Section 7.3 on page 97 for more information on volumes.
• See Section 7.7 on page 108 for more information on disks.
7.2 Storage Overview Screen
Click the Storage link in the Navigation panel to access the Storage > Overview screen. This
is the first screen displayed.
NSA-2400 User’s Guide
95
Page 96
Chapter 7 Storage Screens
Figure 45 Storage > Overview
The following table describes the labels in this screen.
Table 36 Storage > Overview
LABELDESCRIPTION
Internal/External VolumeThese tables display information on all internal volumes (created on NSA
Volume Name The NSA creates the volume name automatically.
StatusThis field shows whether the volume is Healthy, Resynching, Waiting
Disk ConfigurationThis field shows which data storage system the volume is using.
Disk UsageThis field shows how many bytes of space on the volume are being used.
Internal/External Disk This table displays information on all internal disk drives and external disk
Disk NameThe NSA creates the disk name automatically depending on how many
Model NameThis is the hard disk number that identifies the disk.
VolumeThis field shows the volume to which the disk belongs.
Disk ConfigurationThis field shows the volume storage system to which that disk belongs.
internal disk drives) and external volumes (created on external disk drives
attached to the NSA USB ports). See the volume screen for field details.
Resynch, Degraded or Down.
drives (attached to the USB port(s)).
disks you installed in the NSA.
96
NSA-2400 User’s Guide
Page 97
Table 36 Storage > Overview (continued)
LABELDESCRIPTION
CapacityThis field shows the size of the disk in GB.
StatusThis field displays OK if the (physical) disk is readable and Down if no
7.3 Volumes and RAID
A volume is a storage area on a disk or disks. You can create volumes on the internal disks
and external disks attached to the USB port(s). You can spread a volume across internal disks
but not between internal and external disks.
RAID (Redundant Array of Independent Disks) or JBOD is the storage method that the NSA2400 uses. The storage method you use depends on how many disks you have and how many
volumes you want to create. It’s important that you consider this carefully as all data is deleted
when you re-create a volume.
Chapter 7 Storage Screens
data can be read from it. If Down, the disk may need to be scanned for
errors or replaced. If it needs to be repaired or replaced, then you will
have to resynchronize the volume.
"Back up your data before deleting or re-creating a volume!
For example if you originally have two disks configured at RAID 1, and you then buy two
more disks and want to configure all four at RAID 5, you should first back up all your data on
those disks (see the Genie Backup Manager utility on the included CD) and then restore your
data later after you create the new volume type.
Below is a table that summarizes some attributes of the various RAID levels as supported on
the NSA-2400. For capacity and storage efficiency, “S” is the size of the smallest drive in the
array, and “N” is the number of drives in the array.
Storage efficiency assumes all drives are of identical size.
Performance rankings are approximations.
Table 37 RAID Quick Comparison
RAID Level01510
Number of Disks2,3,4244
CapacityS*NS*N/2S*(N-1)S*N/2
Storage Efficiency100%50%(N-1)/N50%
Fault ToleranceNoneYYYYYYYYYYY
AvailabilityYYYYYYYYYYYYY
Read PerformanceYYYYYYYYYYYYYYY
Write PerformanceYYYYYYYYYYYY
NSA-2400 User’s Guide
97
Page 98
Chapter 7 Storage Screens
7.3.1 Choosing A Storage Method For a Volume
The following is a guide to help you choose a storage method for the various number of disks
supported on the NSA-2400. See Section 7.4 on page 100 for theoretical background on JBOD
and the RAID levels used on the NSA-2400. Typical applications for each method are also
shown there.
7.3.1.1 One Disk
If you only have one disk, you must use JBOD. All disk space is used for your data - none is
used for backup. If the disk fails, then you lose all the data on that volume (disk).
7.3.1.2 Two Disks:
You may choose JBOD, RAID 0 or RAID 1. With two disks you could create:
• up to two JBOD volumes
• one RAID 0 or RAID 1 volume
• Choose JBOD for flexibility and maximum usage of disk space for data. You can
either add an additional disk to your one-disk JBOD volume (and so don’t have to recreate shares, access rights etc.) or create a different JBOD volume (and create new
shares, access rights etc.).
• Choose RAID 0 if performance matters more than data security. RAID 0 has the
fastest read and write performance but if one disk fails you lose all your data on the
volume. It has fast performance as it can read and write to two disks simultaneously.
Performance may matter more than data security to gamers for example. This method
may also be acceptable for data that is already backed up somewhere else.
• Choose RAID 1 if data security is more important than performance. Since RAID 1
mirrors data onto a second disk, you can recover all data even if one disk fails, but the
performance is slower than RAID 0.
7.3.1.3 Three Disks
Choose a combination of JBOD and/or RAID 0 or RAID 1 for the reasons already outlined.
With three disks you could create:
• up to three JBOD volumes
• one JBOD volume and one RAID 0 or RAID 1 volume
7.3.1.4 Four Disks
In addition to the JBOD, RAID 0 and RAID 1 choices, you may choose RAID 10, RAID 5 or
RAID5_SPARE. With four disks you could create:
• up to four JBOD volumes
• one or two JBOD volumes and one RAID 0 or RAID 1 volume
• two RAID 0 volumes or two RAID 1 volumes
• one RAID 0 volume and one RAID 1 volume
• one volume using one of RAID 10, RAID 5 or RAID5_SPARE
• Choose RAID 10 for maximum data security but with just 50% of the available space
for your data. You can recover all data even if two disks (not in the same RAID 1
array) fail. If two disks in the same RAID 1 array fail, then all data in the volume is
lost. If two disks in different RAID 1 arrays fail, then you effectively have a RAID 0
configuration.
98
NSA-2400 User’s Guide
Page 99
• Choose RAID 5 if you need more disk space available for data and if up to one disk
failure is acceptable. RAID 5 uses 75% of the available space for your data. All data
can be recovered if one disk fails. If two disks fail then, all data in the volume is lost.
If one disk fails, the volume is degraded and will perform more slowly than a healthy
volume. You should shut down the NSA, replace the faulty disk and then
resynchronize the volume to attain previous performance.
• Choose RAID5_SPARE if you need the volume to recover as soon as possible in the
event of a disk failure. RAID5_SPARE operates as a RAID 5 with three disks while
the fourth disk is on standby. The standby disk automatically comes into play if a disk
in the 3-disk RAID5 volume fails. The advantage of RAID5_SPARE over RAID 5 is
that if a disk fails, then the volume resynchronizes automatically with the standby disk
and operates at healthy volume speed after the resynchronization. RAID5_SPARE
uses 50% of the available space for your data.
7.3.1.5 External Disks
You can configure JBOD or BACKUP on external USB disks. Choose BACKUP if you
intend to use the backup menus to copy data from the NSA internal drive(s) to an external
USB drive.
Chapter 7 Storage Screens
7.3.2 Volume Status
You (the administrator) can see the status of a volume in the Status, Storage > Overview or
Storage > Volume screens.
The NSA-2400 has the following classifications for the status of a volume:
• Healthy if all disks in the volume are OK and the file system is functioning properly.
• Resynching when you create or repair a RAID volume.
• Waiting Resync when there is already another volume resynchronizing. Only one
volume can resynchronize at one time.
• Degraded when a volume is currently down, but can be fixed. Data access may be slower
from a degraded volume, so it’s recommended that you replace the faulty disk and repair
the volume as soon as you can.
• Down when a volume is down and can not be fixed.
A down RAID volume cannot be used until you repair or replace the faulty disk(s) in the
volume. Degraded means one of the disks in the RAID volume is not available but the volume
can still be used. For a degraded volume, you should replace the faulty disk as soon as possible
to obtain previous performance. See your Quick Start Guide for more information on replacing
a disk. If there is already another volume resynchronizing, then you will see Waiting Resync
as the volume status.
If it’s down, then the only indication is that they can no longer transfer files to/from the shares
in the down volume. If it’s degraded, then file transfer to/from the shares in the degraded
volume will be slower.
"There is no explicit message from CIFS that tells users their volume is
degraded or down.
NSA-2400 User’s Guide
99
Page 100
Chapter 7 Storage Screens
7.3.3 Resynchronizing a RAID 1 or 5 Volume
Resynchronizing a RAID 1 or 5 Volume is done block-by-block, so the time it takes depends
more on the size of your hard drive(s) than the amount of data you have on them.
"You should not restart the NSA while the NSA is resychronizing a volume as
this will cause the synchronization to begin again after the NSA fully reboots.
"You can access data on a RAID volume while it is resychronizing, but it is not
recommended.
7.4 RAID
This section contains theoretical background on JBOD and the RAID levels used on the NSA-
2400. Skip to the next section if you already understand RAID and know what storage system
you want to use on the NSA-2400.
Redundant Array of Independent Disks (RAID) is a method of storing data on multiple disks
to provide a combination of greater capacity, reliability, and/or speed. JBOD (Just a Bunch Of
Disks) is not a RAID storage method but it is included in this discussion.
These are some terms that you need to know in order to understand storage systems.
•Mirroring
In a RAID system using mirroring, all data in the system is written simultaneously to two
hard disks instead of one. This provides 100% data redundancy as if one disk fails the
other has the duplicated data. Mirroring setups always require an even number of drives.
• Duplexing
Like in mirroring, all data is duplicated onto two distinct physical hard drives but in
addition it also duplicates the hardware that controls the two hard drives (one of the drives
would be connected to one adapter and the other to a second adapter).
• Striping
Striping is the breaking up of data and storing different data pieces on each of the drives in
an array. This allows faster reading and writing as it can be done simultaneously across
disks. Striping can be done at the byte level, or in blocks. Byte-level striping means that
the first byte of the file is sent to the first drive, then the second to the second drive, and so
on. Block-level striping means that each file is split into blocks of a certain size and those
are distributed to the various drives. The size of the blocks used is also called the stripe
size (or block size).
• Parity
100
NSA-2400 User’s Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.