ZyXEL Communications NSA-2401 User Manual

NSA-2401
Network Storage Appliance

User’s Guide

Version 1.10 3/2009 Edition 1
LAN1 IP Address 192.168.1.3 LAN2 IP Address 192.168.100.3 Username admin Password 1234
www.zyxel.com

About This User's Guide

About This User's Guide
Intended Audience
This manual is intended for people who want to configure the NSA using the Web Configurator.
Related Documentation
• Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains
information on setting up your network and configuring for Internet access.
• Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary
information.
• Supporting Disk Refer to the included CD for support documents.
• ZyXEL Web Site Please refer to www.zyxel.com
certifications.
for additional support documentation and product
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
Customer Support
In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
NSA-2401 User’s Guide
3

Document Conventions

Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The NSA may be referred to as the “NSA”, the “device” or the “system” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key. “Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
NSA-2401 User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device.
NSA Computer Notebook computer
Server Firewall Switch
Router
NSA-2401 User’s Guide
5

Safety Warnings

Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information.
• ONLY qualified service personnel should service or disassemble this device.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device.
• Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
• If the power adaptor or cord is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning.
• CAUTION: RISK OF EXPLOSION IF BATTERY (on the motherboard) IS REPLACED BY AN INCORRECT TYPE. DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS. Dispose them at the applicable collection point for the recycling of electrical and electronic equipment. For detailed information about recycling of this product, please contact your local city offi ce, your household waste disposal service or the store where you purchased the product.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
6
NSA-2401 User’s Guide
Safety Warnings
Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.
NSA-2401 User’s Guide
7
Safety Warnings
8
NSA-2401 User’s Guide

Contents Overview

Contents Overview
Introduction and Tutorials .....................................................................................................29
Getting to Know Your NSA ........................................................................................................31
Introducing the Web Configurator .............................................................................................. 35
Tutorials .....................................................................................................................................55
Web Configurator ................................................................................................................. 115
Status Screen ..........................................................................................................................117
System Setting Screen ... .... ... ... ... .... ... ... ... ... ........................................................... ... ... ... ... ..... 121
Storage Screens .....................................................................................................................125
Network Screens ..................................................................................................................... 159
Sharing Screens ...................................................................................................................... 173
Protect Screens ....................................................................................................................... 197
Application Screens .................................................................................................................223
Maintenance Screens .............................................................................................................229
Troubleshooting and Specifications ..................................................................................247
Troubleshooting ......................................................................................................................249
Product Specifications ............................................................................................................. 257
Appendices and Index .........................................................................................................263
NSA-2401 User’s Guide
9
Contents Overview
10
NSA-2401 User’s Guide

Table of Contents

Table of Contents
About This User's Guide..........................................................................................................3
Document Conventions............................................................................................................4
Safety Warnings ........................................................................................................................6
Contents Overview ...................................................................................................................9
Table of Contents....................................................................................................................11
List of Figures.........................................................................................................................17
List of Tables...........................................................................................................................25
Part I: Introduction and Tutorials ......................................................... 29
Chapter 1
Getting to Know Your NSA.....................................................................................................31
1.1 NSA-2401 Overview . .... ... ... ... .... ... .......................................................... ... ... .... ... ................31
1.1.1 Front Panel LEDs ................................................... .... ... ... ... ... .... ... ... ... .... ...................32
1.1.2 Power Button .......................... ... ... .... ... .......................................................... ... ... .... ... 33
1.1.3 COPY Button ....................... ... ... ... .... .......................................................... ... ... ... .... ...33
Chapter 2
Introducing the Web Configurator ........................................................................................35
2.1 Web Configurator Overview .................................................................................................35
2.2 Accessing the NSA Web Configurator ............. ... .... ... ... ... .... ... ... ... ....................................... 35
2.2.1 Access the NSA Using the NDU ................................................................................ 35
2.2.2 Web Browser Access ................ ... ........................................................... ... ... ... ... .... ... 36
2.3 Login .......................................... ... ... .......................................................... ... .......................36
2.4 User-level Screens Overview ...................... ... ... .... .......................................................... ... 37
2.5 My NSA Screen ...................................................................................................................38
2.5.1 My NSA Share Browsing Screen ........................................... .... ... ... ... .... ...................40
2.5.2 My NSA Share Browsing Move to or Copy to Screen ................................................42
2.5.3 My NSA Share Configuration ................. ... .... ... ... ....................................................... 42
2.5.4 My NSA Change Share Properties Screen ................................................................43
2.5.5 Share and Folder Names .................... ... ... .... ... ... ... .... ... ... .......................................... 45
2.5.6 Share Paths ........... ... ... .... ... .......................................................... ... ... .... ... ... ... ... .......46
2.5.7 Password Screen ...................................................................................................... 46
NSA-2401 User’s Guide
11
Table of Contents
2.6 Administration Screens .... ... ... .... ... ... ... ... .... ... ... .......................................................... ... ....... 47
2.6.1 Global Administration Icons ....................................................................................... 48
2.6.2 Navigation Panel ....................... ... .... ..........................................................................49
2.6.3 Main Window .......................... ... .......................................................... .... ... ... ... ... .......51
2.6.4 Status Messages .......... .... ... .......................................................... ... .......................... 51
2.6.5 Common Screen Icons ..................... ... ... ... .......................................................... .... ... 51
2.7 NSA RESET Button ............................................................................................................. 52
2.7.1 Reset ................................................ ... ... .......................................................... .......... 52
2.7.2 Reload Factory Default Configuration File ................................................................. 52
Chapter 3
Tutorials...................................................................................................................................55
3.1 Overview ............. .......................................................... ... .... ... ... .......................................... 55
3.2 How to Configure Sharing ...................................................................................................55
3.2.1 Setting Up User Accounts ............ .... ... .......................................................... ... ... .... ... 55
3.2.2 Setting Up Groups .................. ... ... .... .......................................................... ... ... ... .... ... 58
3.2.3 Setting Up Shares ............... ... ... ... ........................................................... ... ... ... ... .... ... 59
3.3 How to Use Shares .............................................................................................................. 61
3.3.1 Using a Share with Windows Explorer ................... .... ... ... ... ... .... ... ............................. 61
3.3.2 Using a Share with a Web Browser ................................................................. ... .... ... 62
3.4 How to Find the NSA in OS X .............................................................................................. 65
3.5 How to Configure Security ...................................................................................................68
3.5.1 Configuring Security for Web Configurator Sessions .................................................68
3.5.2 Using FTPES to Connect to the NSA .........................................................................81
3.5.3 Controlling Access to Shares, Folders, and Files ...................................................... 83
3.6 Power Resume ......... .... ... ... ... .......................................................... .... ... ... ... .... ... ... ... ... ....... 89
3.7 How to Use Backups and Snapshots ..................................................................................89
3.7.1 Creating a Snapshot Job ............................................................................................90
3.7.2 Configuring Snapshot Image Access .........................................................................91
3.7.3 Using a Snapshot Image to Restore Files .................................. ................... ............. 91
3.7.4 Creating a Synchronization Backup ........................................................................... 92
3.7.5 Creating an Archive Backup ....................................................................................... 96
3.7.6 Restoring Archived Files by Backup Job .................................................................... 99
3.7.7 Restoring by Backup Files ........ ... .... ... ... ... .... ... ... ..................................................... 102
3.8 Printer Server Tutorial ............................................. ........................................................... 104
3.9 How to Increase the NSA’s Storage Capacity .................................................................... 106
3.9.1 Connecting External USB Hard Drives .................................................................... 107
3.9.2 Adding an Internal Hard Drive to an Existing Disk Array .......................................... 107
3.9.3 Using a Disk Array’s Increased Capacity ...... ... ... ... .................................................. 1 09
3.9.4 Migrating a RAID to Higher Capacity Hard Drives ....................................................110
Part II: Web Configurator .....................................................................115
12
NSA-2401 User’s Guide
Table of Contents
Chapter 4
Status Screen....................................................................................................................... 117
4.1 Status Screen ..... ... ... .... ... ... ... .... ... .......................................................... ... ... .... ... ...............117
Chapter 5
System Setting Screen.........................................................................................................121
5.1 Date/Time ........... ... ... .... ... ... ... .... ... .......................................................... ... ... .... ... ... ........... 121
5.1.1 Time Lag .......................................... ... ... ... .... ... ........................................................ 122
Chapter 6
Storage Screens...................................................................................................................125
6.1 Storage Screens Overview ..................................... ... ... ... .... ... ... ........................................ 125
6.1.1 What You Can Do in the Storage Screens ...............................................................125
6.1.2 What You Need to Know About Storage ....................................... ... ... .... ... ... ... ... .... . 125
6.2 Internal Storage Status Screen ..................................... ... .... ... ... ... ... .... ... ... ... .... ... ..............127
6.3 Disk ..................................................................... .... ........................................................... 128
6.3.1 Internal Disks Screen ............................................................................................... 128
6.3.2 S.M.A.R.T Screen .................................. ... .... ... ... ... .... ... ........................................... 129
6.4 Arrays ........................... .......................................................... ... ........................................ 132
6.4.1 RAID Levels ..................................... ... ... .......................................................... ... .... . 132
6.4.2 Array Status .............................................................................................................. 134
6.5 RAID Screen ................. .......................................................... ... ... ... .... ... ... ... .... ... ..............135
6.5.1 Creating a New RAID ...............................................................................................138
6.6 Internal Volume Screen .....................................................................................................139
6.6.1 Creating or Editing an Internal Volume ......................... ... ... ... .... ... ... ... .... .................142
6.6.2 USB Key Creation .................. ... .......................................................... .... ... ... ... ... .....143
6.7 External Storage Disk Screen ................................................. ... ... ... .... ... ... ... .... ... ... ... ... .... . 145
6.8 External Volume Screen ....................................................................................................147
6.8.1 Creating or Editing an External Volume ................................................................... 149
6.9 Technical Reference . .... ... ... ... .... ... ... ... .......................................................... .... ... ... ... ... ..... 151
6.9.1 Storage Terminology ........................................ ... ... .... ... ... ... ... .................................. 151
6.9.2 JBOD ................... ... ... ... .... ... ... .......................................................... ... .... .................152
6.9.3 RAID 0 ....................... ... .... ... ... ... ... ........................................................... ... ... ...........153
6.9.4 RAID 1 ....................... ... .... ... ... ... ... ........................................................... ... ... ...........153
6.9.5 RAID 10 ..................... ... .... ... ... ... ... ........................................................... ... ... ...........154
6.9.6 RAID 5 ....................... ... .... ... ... ... ... ........................................................... ... ... ...........155
6.9.7 Hot-spare ..... ... .... ... ... .......................................................... ... .... ... ... ........................155
6.9.8 RAID and Data Protection ........................................................................................ 156
6.9.9 S.M.A.R.T Attributes .... .... ... ... ... ... .... ... ... ............................................................. .... . 156
Chapter 7
Network Screens...................................................................................................................159
7.1 Network Screens Overview ............................................................................................... 159
NSA-2401 User’s Guide
13
Table of Contents
7.1.1 What You Can Do in the Network Screens .............................................................. 159
7.1.2 What You Need to Know About the Network Screens ..... ... ... .... ... ... ... .... ... ... ... ... .... . 159
7.2 TCP/IP Screen .......... .... ... ... ... .... .......................................................... ... ... ... .... .................160
7.2.1 Configuring the TCP/IP Screen ........................................... ... .... ... ... ... .... ... ..............162
7.3 Windows/CIFS .................................... ... .... ... ... .......................................................... ........164
7.3.1 Windows/CIFS Screen .............. ... .... ... ... .......................................................... ... .... . 166
7.4 NFS Screen ........... ... ........................................................... ... ... ... ... .... .............................. 168
7.4.1 Add or Edit NFS Share Screen ................................................................................169
7.4.2 NFS Session Screen ................................................................................................ 170
Chapter 8
Sharing Screens.............................................................................................................. ......173
8.1 Overview ............. .......................................................... ... .... ... ... ........................................ 173
8.1.1 What You Can Do In The Sharing Screens ... ................................ ........................... 173
8.1.2 What You Need to Know About The Sharing Screens ............................ ... ... ... ... .... . 173
8.2 Users ............................ ... .......................................................... ... ..................................... 175
8.2.1 Create a New Account & Change Account Properties ............................... ... ... ... .... . 178
8.2.2 View User Information ..............................................................................................181
8.3 Groups ....................................... ... ... .......................................................... ... .... .................182
8.3.1 Add a New Local Group & Change Group Properties ............ ............. ............. ........ 184
8.4 Shares ............................. ... ... .......................................................... .... .............................. 186
8.4.1 Create a New Share & Edit a Share ....................................................................... 188
8.4.2 ACL Configuration ...................................................... ... ... ... ..................................... 190
8.4.3 Recycle Bin ......................................... ... ... .... ... ... ... .... ..............................................194
8.4.4 DFS ..................... ... .......................................................... ... ... .................................. 194
Chapter 9
Protect Screens.....................................................................................................................197
9.1 Protection Methods Overview ............................................................................................ 197
9.1.1 What You Can Do in the Protect Screens ................................................................ 198
9.1.2 What You Need to Know About Protection Methods ............................................... . 198
9.2 NSA Backup Screens ........................................................................................................200
9.2.1 Backup Summary ............................................. ... ..................................................... 200
9.2.2 Creating a Backup Job ............................................................................................. 202
9.2.3 Editing a Backup Job ............................................................................................... 208
9.2.4 Restoring by Backup Job .................................... ... .... ... ... ... ... .... .............................. 209
9.3 Restoring by Backup Files ......................................... ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .....212
9.3.1 Protect > Restore: Step 2 ......................................................................................... 213
9.3.2 Protect > Restore: Step 3 ......................................................................................... 214
9.3.3 Protect > Restore: Step 4 ......................................................................................... 215
9.4 Snapshots ........... ... ... .... ... .......................................................... ... ... .... ... ... ........................215
9.4.1 Creating/Editing Snapshots ................. ... ... .... ... ... ... .... ... ... ........................................ 218
9.4.2 Snapshot Images .......................................................................................... ... ... .... . 219
14
NSA-2401 User’s Guide
Table of Contents
9.5 Backup Software Screen ....... .... ... ... ... ... .............................................................. ... ... ........220
Chapter 10
Application Screens .............................................................................................................223
10.1 Overview .......................................................................................................................... 223
10.1.1 What You Can Do In The Application Screens .. ... .... ... ... ... ... .... ... ... ........................ 223
10.1.2 What You Need to Know About The Application Screens ......................................223
10.2 FTP ..................................................................................................................................224
10.3 Print Server ...................................................................................................................... 226
10.3.1 Print Server Rename ............................ .......... ............. ............. ............. ............ ..... 226
10.4 Copy Button ..................................................................................................................... 227
10.4.1 Changing the Copy Button Share .......................................................................... 227
Chapter 11
Maintenance Screens..........................................................................................................229
11.1 Overview ..........................................................................................................................229
11.1.1 What You Can Do In The Maintenance Screens .................................................... 229
11.1.2 What You Need to Know About The Maintenance Screens ................................... 229
11.2 Log ..................................................................................................................................230
11.2.1 Search ....................................................................................................................232
11.2.2 Log Records Configuration ............. ...................... ....................... ...................... ..... 232
11.2.3 Log Buzzer Priority Configuration ...... ....................... ...................... ....................... . 233
11.2.4 Report Configuration .............................................................................................. 233
11.2.5 Export Log ..............................................................................................................236
11.3 Configuration .................................................................................................................... 237
11.3.1 Restoring the Configuration File .............................................................................238
11.4 SSL .................................................................................................................................. 239
11.5 Firmware Upgrade ...........................................................................................................241
11.6 Power Management .........................................................................................................242
11.6.1 Power Control Schedule ......................................................................................... 244
11.7 Shutdown .........................................................................................................................245
Part III: Troubleshooting and Specifications..................................... 247
Chapter 12
Troubleshooting...................................................................................................................249
12.1 Troubleshooting Overview ...............................................................................................249
12.2 Power, Hardware Connections, and LEDs .... ... .... ... ... ... .... ... ........................................... 249
12.3 NSA Login and Access ...................................................................................................251
12.4 Users Cannot Access the NSA ........................................................................................ 253
12.5 Backups and Snapshots ..................................................................................................254
NSA-2401 User’s Guide
15
Table of Contents
12.6 External USB Disks .........................................................................................................255
Chapter 13
Product Specifications.........................................................................................................257
13.1 Feature Tables ................................................................................................................. 257
13.2 Specification Tables .........................................................................................................259
13.3 Power Consumption ........................................................................................................261
Part IV: Appendices and Index ........................................................... 263
Appendix A Log Messages...................................................................................................265
Appendix B Setting Up Your Computer’s IP Address...........................................................275
Appendix C Importing Certificates........................................................................................299
Appendix D Open Source Licences .....................................................................................323
Appendix E Legal Information ..............................................................................................353
Index.......................................................................................................................................355
16
NSA-2401 User’s Guide

List of Figures

List of Figures
Figure 1 NSA Overview .......................................................................................................................... 31
Figure 2 NSA Front Panel LEDs ............................................................................................................. 32
Figure 3 NDU Main Screen ....................................................................................................................36
Figure 4 NDA URL .................................................................................................................................. 36
Figure 5 NSA Login Screen ....................................................................................................................37
Figure 6 Change Password Screen ........................................................................................................ 37
Figure 7 My NSA ................................................................................................................................... 38
Figure 8 My NSA Screen .......................................................................................................................39
Figure 9 My NSA Share Browsing .........................................................................................................40
Figure 10 My NSA Share Browsing > Move to (or Copy to) .................................................................. 42
Figure 11 My NSA Share Configuration ................................................................................................ 42
Figure 12 My NSA Change Share Properties ........................................................................................ 43
Figure 13 My NSA Change Share Properties > Share Access Configuration ................... ... ... ... ... .... ... 45
Figure 14 Password ............................................................................................................................... 46
Figure 15 Status .................................................................................................................................... 48
Figure 16 Navigation Panel Links ...........................................................................................................49
Figure 17 Reset and Reload Timeline .................................................................................................... 53
Figure 18 Administrator Login ................................................................................................................ 56
Figure 19 My NSA .................................................................................................................................. 56
Figure 20 Sharing > Users ...................................................................................................................... 57
Figure 21 Sharing > Users > Create a New Account ............... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... 57
Figure 22 Groups .................................................................................................................................... 58
Figure 23 Sharing > Groups > Add Share .............................................................................................. 59
Figure 24 Shares .................................................................................................................................... 59
Figure 25 Sharing > Shares > Add Share ..............................................................................................60
Figure 26 Share Access Configuration ...................................... ................................................ .............60
Figure 27 Sharing > Shares > Add Share ..............................................................................................61
Figure 28 Mapping a Share .................................................................................................................... 61
Figure 29 Entering the Share Username and Password ........................................................................ 62
Figure 30 Creating a Folder ................................... ................ ................. ................ ............. ................... 62
Figure 31 Using the Folder ..................................................................................................................... 62
Figure 32 User Login ....................... ... ... ... .... ... .......................................................... ... ... .......................63
Figure 33 Gonzo’s My NSA Screens ......................................................................................................63
Figure 34 Gonzo Share Screen ..............................................................................................................64
Figure 35 Strategy Folder Screen ........................................................................................................... 65
Figure 36 Upload Files Screen ..................... ... ... ... ... .... ... ... ... .... ... ... ... .... ................................................ 65
Figure 37 Opening the Finder ............................. ... ... .... ... ... ... .... ... ... ... .... ... ............................................. 66
Figure 38 Displaying the NSA ................................................................................................................ 66
NSA-2401 User’s Guide
17
List of Figures
Figure 39 Displaying the NSA ................................................................................................................ 67
Figure 40 Alternate Method for Displaying the NSA ............................................................................... 67
Figure 41 Connecting to the NSA ........................................................................................................... 68
Figure 42 Maintenance > SSL .............................................................................................................. 69
Figure 43 Maintenance > SSL > Edit a Self-Signed Certificate ................................................ ............. 69
Figure 44 Maintenance > SSL > Edit a Self-Signed Certificate ................................................ ............. 70
Figure 45 Maintenance > SSL .............................................................................................................. 71
Figure 46 Downloading the NSA’s Certificate ....................... .................................... ............................. 71
Figure 47 Downloading the NSA’s Certificate ....................... .................................... ............................. 72
Figure 48 Certificate ............................................................................................................................... 72
Figure 49 Certificate Import Wizard: Welcome ....................................................................................... 73
Figure 50 Certificate Import Wizard: Certificate Store ............................................................................ 73
Figure 51 Certificate Import Wizard: Finish ............................................................................................74
Figure 52 Security Warning ................... ... .... ... ... ... ... .... ... ... ... .... ... ... ... .................................................... 74
Figure 53 Certificate Import Wizard: Successful .................................................................................... 74
Figure 54 Maintenance > SSL .............................................................................................................. 75
Figure 55 Maintenance > SSL > Force HTTPS Warning ........................................ ...... ....... ... ...... ....... ... 76
Figure 56 Firefox: Secure Connection Failed ......................................................................................... 76
Figure 57 Firefox: Secure Connection Failed ......................................................................................... 77
Figure 58 Firefox: Add Security Exception .............................................................................................77
Figure 59 Firefox: Add Security Exception .............................................................................................78
Figure 60 Firefox: Add Security Exception .............................................................................................79
Figure 61 Firefox: Add Security Exception .............................................................................................80
Figure 62 HTTPS Login ..........................................................................................................................81
Figure 63 FileZilla Site Manager .................................... ... ... ................................................................. 82
Figure 64 FileZilla Unknown Certificate Warning ..................................... ......... .......... .......... ......... ....... 83
Figure 65 Sharing > Shares ................................................ ....................................................................83
Figure 66 Sharing > Shares > Edit Share .............................. .... ... ... ... .... ... ... ... ... .................................... 84
Figure 67 Share Access Configuration ...................................... ................................................ .............84
Figure 68 Sharing > Shares ................................................ ....................................................................85
Figure 69 Sharing > Shares > ACL Configuration ..................................................................................85
Figure 70 Sharing > Shares > ACL Configuration > New ACL ............... ................................................ 86
Figure 71 Sharing > Shares > ACL Configuration > New ACL > Strategy ............................................. 86
Figure 72 Sharing > Shares > ACL Configuration > New ACL > Strategy > Set ACL ............................ 87
Figure 73 Sharing > Shares > ACL Configuration > New ACL > Strategy ............................................. 88
Figure 74 Sharing > Shares > ACL Configuration > New ACL > Strategy ............................................. 88
Figure 75 Maintenance > Power Management ......................................................................................89
Figure 76 Protect > Snapshot ............ ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... .................................................... 90
Figure 77 Protect > Snapshot > Add Job ..............................................................................................91
Figure 78 Protect > Snapshot > Snapshot Image Access ........................ ............................................. 91
Figure 79 Using a Snapshot Image ........................................................................................................92
Figure 80 Protect > Backup ..................................... .... ... ... ... .... ... ... ... .... ... ............................................. 92
Figure 81 Protect > Backup > Add Job: Step 1 . ... ... .... ... ... ... .... ... ... ....................................................... 93
18
NSA-2401 User’s Guide
List of Figures
Figure 82 Protect > Backup > Add Job: Step 2 . ... ... .... ... ... ... .... ... ... ....................................................... 94
Figure 83 Protect > Backup > Add Job: Step 3 . ... ... .... ... ... ... .... ... ... ....................................................... 95
Figure 84 Protect > Backup > Add Job: Step 3 . ... ... .... ... ... ... .... ... ... ....................................................... 95
Figure 85 Protect > Backup > Add Job: Step 4 ......................................................................................96
Figure 86 Protect > Backup ..................................... .... ... ... ... .... ... ... ... .... ... ............................................. 96
Figure 87 Protect > Backup > Add Job: Step 1 . ... ... .... ... ... ... .... ... ... ....................................................... 97
Figure 88 Protect > Backup > Add Job: Step 2 . ... ... .... ... ... ... .... ... ... ....................................................... 98
Figure 89 Protect > Backup > Add Job: Step 3 . ... ... .... ... ... ... .... ... ... ....................................................... 99
Figure 90 Protect > Backup > Add Job: Step 4 . ... ... .... ... ... ... .... ... ... ....................................................... 99
Figure 91 Protect > Backup ..................................... .... ... ... ... .... ... ... ... .... ... ........................................... 100
Figure 92 Protect > Backup > Restore Archive: Step 1 .................................................. .... ... ... ... ... .... . 100
Figure 93 Protect > Backup > Restore Archive: Step 2 .................................................. .... ... ... ... ... .... . 101
Figure 94 Protect > Backup > Restore Archive: Step 3 .................................................. .... ... ... ... ... .... . 101
Figure 95 Protect > Backup > Restore Archive: Progress ..................................... .............................. 102
Figure 96 Protect > Restore: Step 1 ............................................... ... .... ... ... ... ... .... .............................. 102
Figure 97 Protect > Restore: Step 2 ............................................... ... .... ... ... ... ... .... .............................. 103
Figure 98 Protect > Restore: Step 3 ............................................... ... .... ... ... ... ... .... .............................. 103
Figure 99 Protect > Restore: Step 4 ............................................... ... .... ... ... ... ... .... .............................. 104
Figure 100 Printer Sharing .................................................................................................................. 104
Figure 101 Printer Connected to NSA: Windows Explorer ..................................................................105
Figure 102 Printer Connected to NSA: Windows Explorer Warning .................................................... 105
Figure 103 Printer Driver Needed ........................................................................................................ 105
Figure 104 Applications > Print Server ................................................................................................106
Figure 105 Printer Screen in Windows Explorer ..................................................................................106
Figure 106 Connecting a USB Hard Drive ............................................................................................107
Figure 107 Storage > External Storage > Disk ....................................................................................107
Figure 108 Storage > Internal Storage > Disk ..................................................................................... 108
Figure 109 Storage > Internal Storage > RAID .................................................................................... 108
Figure 110 Storage > Internal Storage > RAID > Add Disk .................................................................. 109
Figure 111 Storage > Internal Storage > Disk ...................................................................................... 109
Figure 112 Storage > Internal Storage > Volume ..................................................................................110
Figure 113 Storage > Internal Storage > Volume > Edit .......................................................................110
Figure 114 Storage > Internal Storage > Disk .......................................................................................111
Figure 115 Storage > Internal Storage > Disk > Eject ................................................. ... .... .................. 111
Figure 116 Storage > Internal Storage > Disk > Eject ...........................................................................111
Figure 117 Status: RAID Degraded .......................................................................................................112
Figure 118 Storage > Internal Storage > RAID .....................................................................................112
Figure 119 Storage > Internal Storage > RAID > Repair ......................................................................112
Figure 120 Storage > Internal Storage > RAID .....................................................................................113
Figure 121 Status Screen ......................................................................................................................117
Figure 122 System Setting > Date/Time ...............................................................................................121
Figure 123 Disks, RAIDs, and Volumes ...............................................................................................125
Figure 124 Storage > Internal Storage > Status ...................................................................................127
NSA-2401 User’s Guide
19
List of Figures
Figure 125 Storage > Internal Storage > Disk ..................................................................................... 128
Figure 126 Storage > Internal Storage > Disk > S.M.A.R.T. (Brief Summary) ..................................... 130
Figure 127 Storage > Internal Storage > Disk > S.M.A.R.T. (Full Summary) ......................................131
Figure 128 Storage > Internal Storage > RAID .................................................................................... 135
Figure 129 Storage > Internal Storage > RAID > Create ....................................................................138
Figure 130 Storage > Internal Storage > Volume ................................................................................140
Figure 131 Storage > Internal Storage > Volume > Create ...... ... ........................................................ 142
Figure 132 Selecting the USB Device .................................................................................................144
Figure 133 Creating a Duplicate USB Key ..........................................................................................144
Figure 134 Creating a Duplicate USB Key: Eject ................................................................................145
Figure 135 Creating a Duplicate USB Key: Insert ...............................................................................145
Figure 136 Storage > External Storage > Disk ....................................................................................145
Figure 137 Storage > External Storage > Volume ............................................................................... 147
Figure 138 Storage > External Storage > Volume > Create ................................................................ 149
Figure 139 Stand Alone Teaming Mode ...............................................................................................160
Figure 140 Fault Tolerance Teaming Mode ..........................................................................................161
Figure 141 Load Balancing Teaming Mode ..........................................................................................161
Figure 142 Link Aggregation Teaming Mode ........................................................................................ 161
Figure 143 Jumbo Frames ...................................................................................................................162
Figure 144 Network > TCP/IP ...............................................................................................................163
Figure 145 Active Directory Example Application .................................................................................166
Figure 146 Network > Windows/CIFS (Workgroup) ............................................................................. 166
Figure 147 Network > Windows/CIFS (Domain) ...................................................................................167
Figure 148 Network > NFS .................................................................................................................. 168
Figure 149 Network > NFS > Add NFS Share ....................................................................................169
Figure 150 Network > NFS > NFS Session ........................................................................................170
Figure 151 Sharing > Users .................................................................................................................. 175
Figure 152 Sharing > Users > Add User ............................................................................................. 178
Figure 153 My NSA ........................................................................................................................... 180
Figure 154 Password ............................................................................................................................ 180
Figure 155 Sharing > Users > User Information ................................................................................... 181
Figure 156 Sharing > Groups ............................................................................................................... 182
Figure 157 Sharing > Groups > Add a New Local Group ....................... .............................................. 1 84
Figure 158 Sharing > Shares ................................................................................................................186
Figure 159 Sharing > Shares > Create a New Share ........................ ................................................. .188
Figure 160 Sharing > Shares > Create a New Share > Share Access Configuration .........................189
Figure 161 Sharing > Shares > ACL Configuration ..............................................................................190
Figure 162 Sharing > Shares > ACL Configuration > New ACL Configuration .................................... 191
Figure 163 Shares > ACL Configuration > New ACL Configuration > ACL Permission ...... ... ... ... ... .... . 192
Figure 164 Sharing > Shares > Configuration ......................................................................................194
Figure 165 Sharing > Shares > DFS ....................................................................................................194
Figure 166 Protect > Backup ............................................................................................................... 201
Figure 167 Protect > Backup > Add Job: Step 1 .................................................................................202
20
NSA-2401 User’s Guide
List of Figures
Figure 168 Protect > Backup > Add: Step 2 ........................................................................................ 204
Figure 169 Protect > Backup > Add Job: Step 3 .................................................................................206
Figure 170 Protect > Backup > Add Job: Step 4 ..................................................................................207
Figure 171 Protect > Backup > Edit Job: Step 1 ............................................. ............. ............. ........... 208
Figure 172 Protect > Backup > Edit Job: Step 2 ............................................. ............. ............. ........... 209
Figure 173 Protect > Backup > Restore Archive: Step 1 ..................................................................... 210
Figure 174 Protect > Backup > Restore Archive: Step 2 ......................................................................211
Figure 175 Protect > Backup > Restore Archive: Step 3 ......................................................................211
Figure 176 Protect > Restore: Step 1 ..................................................................................................212
Figure 177 Protect > Restore: Step 2 ..................................................................................................213
Figure 178 Protect > Restore: Step 3 ..................................................................................................214
Figure 179 Protect > Restore: Step 4 ..................................................................................................215
Figure 180 Protect > Snapshot > Snapshot Jobs ................................................................................ 216
Figure 181 Protect > Snapshot > Add Job .......................................................................................... 218
Figure 182 Protect > Snapshot > Snapshot Images .................................... ................................ ........ 219
Figure 183 Protect > Backup Software ................................. ....................................... ........................ 221
Figure 184 Printer Sharing .................................................................................................................. 224
Figure 185 Applications > FTP ............................................................................................................ 225
Figure 186 Applications > Print Server ................................................................................................226
Figure 187 Applications > Print Server > Rename ..............................................................................226
Figure 188 Applications > Copy Button ............................................................................................... 227
Figure 189 Applications > Copy Button > Edit ..................................................................................... 228
Figure 190 Maintenance > Log ............................................................................................................. 230
Figure 191 Maintenance > Log ............................................................................................................. 231
Figure 192 Maintenance > Log > Log Classes .....................................................................................231
Figure 193 Maintenance > Log > Search Filters ............................................. ... .... ... ... ... .... ... ... ... ........232
Figure 194 Maintenance > Log > Log Config > Log Records Configuration ........................................ 232
Figure 195 Maintenance > Log > Log Config > Buzzer Priority ............................................................233
Figure 196 Maintenance > Log > Log Report Configuration > Mail Setting ............... ... ... .... ... ... ... ... .....234
Figure 197 Maintenance > Log > Log Report Configuration > Report Setting ..................................... 235
Figure 198 Maintenance > Log > Log Report Configuration > Syslog Server Setting .......................... 236
Figure 199 Maintenance > Configuration ............................................................................................237
Figure 200 Maintenance > Configuration > Restore ............................................................................238
Figure 201 Maintenance > Configuration > Restore > Restarting ...................................................... . 239
Figure 202 Maintenance > SSL ..........................................................................................................239
Figure 203 Maintenance > SSL > Edit a Self-Signed Certificate ........................................................ .241
Figure 204 Maintenance > FW Upgrade ............................................................................................. 242
Figure 205 Maintenance > Power Management ............................................................. .... ... ... ... ........243
Figure 206 Maintenance > Power Management > Edit ....................................................................... 244
Figure 207 Maintenance > Shutdown ............................................................. ..................................... 246
Figure 208 Maintenance > Shutdown > Confirm Restart ........................................ ... ... ... .....................246
Figure 209 Maintenance > Shutdown > Confirm Shutdown ................................................................. 246
Figure 210 Power Adaptor Pinout. .......................................................................................................261
NSA-2401 User’s Guide
21
List of Figures
Figure 211 Windows XP: Start Menu ....................................................................................................276
Figure 212 Windows XP: Control Panel ...............................................................................................276
Figure 213 Windows XP: Control Panel > Network Connections > Properties ......................... ... ... .... . 277
Figure 214 Windows XP: Local Area Connection Properties ............................................................... 277
Figure 215 Windows XP: Internet Protocol (TCP/IP) Properties .................. ... ... .... ... ... ... .....................278
Figure 216 Windows Vista: Start Menu ................................................................................................. 279
Figure 217 Windows Vista: Control Panel ............................................................................................ 279
Figure 218 Windows Vista: Network And Internet ................................................................................ 279
Figure 219 Windows Vista: Network and Sharing Center ..................................................................... 280
Figure 220 Windows Vista: Network and Sharing Center ..................................................................... 280
Figure 221 Windows Vista: Local Area Connection Properties ............................................................ 281
Figure 222 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties ...................................282
Figure 223 Mac OS X 10.4: Apple Menu .............................................................................................. 283
Figure 224 Mac OS X 10.4: System Preferences ................................................................................. 283
Figure 225 Mac OS X 10.4: Network Preferences ............................................................................... 284
Figure 226 Mac OS X 10.4: Network Preferences > TCP/IP Tab. ........................................................284
Figure 227 Mac OS X 10.4: Network Preferences > Ethernet ................ ................................... ........... 285
Figure 228 Mac OS X 10.4: Network Utility .......................................................................................... 285
Figure 229 Mac OS X 10.5: Apple Menu .............................................................................................. 286
Figure 230 Mac OS X 10.5: Systems Preferences ............................................................................... 286
Figure 231 Mac OS X 10.5: Network Preferences > Ethernet ................ ................................... ........... 287
Figure 232 Mac OS X 10.5: Network Preferences > Ethernet ................ ................................... ........... 288
Figure 233 Mac OS X 10.5: Network Utility .......................................................................................... 288
Figure 234 Ubuntu 8: System > Administration Menu ..........................................................................289
Figure 235 Ubuntu 8: Network Settings > Connections ...................... .... .............................................. 2 89
Figure 236 Ubuntu 8: Administrator Account Authentication ................................................................ 290
Figure 237 Ubuntu 8: Network Settings > Connections ...................... .... .............................................. 2 90
Figure 238 Ubuntu 8: Network Settings > Properties ........................................................................... 291
Figure 239 Ubuntu 8: Network Settings > DNS ...................................................................................291
Figure 240 Ubuntu 8: Network Tools ....................................................................................................292
Figure 241 openSUSE 10.3: K Menu > Computer Menu .....................................................................293
Figure 242 openSUSE 10.3: K Menu > Computer Menu .....................................................................293
Figure 243 openSUSE 10.3: YaST Control Center ..............................................................................294
Figure 244 openSUSE 10.3: Network Settings ....................................................................................294
Figure 245 openSUSE 10.3: Network Card Setup ...............................................................................295
Figure 246 openSUSE 10.3: Network Settings ....................................................................................296
Figure 247 openSUSE 10.3: KNetwork Manager ................................................................................. 297
Figure 248 openSUSE: Connection Status - KNetwork Manager ........................................................297
Figure 249 Internet Explorer 7: Certification Error ................................................................................ 300
Figure 250 Internet Explorer 7: Certification Error ................................................................................ 300
Figure 251 Internet Explorer 7: Certificate Error ........................ ................ ................ ................ ........... 300
Figure 252 Internet Explorer 7: Certificate ............................................................................................ 301
Figure 253 Internet Explorer 7: Certificate Import Wizard .................................................................... 301
22
NSA-2401 User’s Guide
List of Figures
Figure 254 Internet Explorer 7: Certificate Import Wizard .................................................................... 302
Figure 255 Internet Explorer 7: Certificate Import Wizard .................................................................... 302
Figure 256 Internet Explorer 7: Select Certificate Store .................................................. .... .................302
Figure 257 Internet Explorer 7: Certificate Import Wizard .................................................................... 303
Figure 258 Internet Explorer 7: Security Warning ............................................ .......... ...... .......... ........... 303
Figure 259 Internet Explorer 7: Certificate Import Wizard .................................................................... 304
Figure 260 Internet Explorer 7: Website Identification .................................. ............................. ........... 304
Figure 261 Internet Explorer 7: Public Key Certificate File ........................................ ... ... .... ... ..............305
Figure 262 Internet Explorer 7: Open File - Security Warning ... ... ... ... .... ... ... ........................................ 305
Figure 263 Internet Explorer 7: Tools Menu ......................................................................................... 306
Figure 264 Internet Explorer 7: Internet Options ..................................................................................306
Figure 265 Internet Explorer 7: Certificates .......................................................................................... 307
Figure 266 Internet Explorer 7: Certificates .......................................................................................... 307
Figure 267 Internet Explorer 7: Root Certificate Store .......................................................................... 307
Figure 268 Firefox 2: Website Certified by an Unknown Authority .......................................................308
Figure 269 Firefox 2: Page Info ............................................................................................................ 308
Figure 270 Firefox 2: Tools Menu ......................................................................................................... 309
Figure 271 Firefox 2: Options ............................................................................................................... 309
Figure 272 Firefox 2: Certificate Manager ...........................................................................................310
Figure 273 Firefox 2: Select File ........................... ................ ................. ................ ..............................310
Figure 274 Firefox 2: Tools Menu ..........................................................................................................311
Figure 275 Firefox 2: Options ................................................................................................................311
Figure 276 Firefox 2: Certificate Manager ...........................................................................................312
Figure 277 Firefox 2: Delete Web Site Certificates .............................................................................. 312
Figure 278 Opera 9: Certificate signer not found ................................................................................. 313
Figure 279 Opera 9: Security information ............................................................................................. 313
Figure 280 Opera 9: Tools Menu .......................................................................................................... 314
Figure 281 Opera 9: Preferences ......................................................................................................... 314
Figure 282 Opera 9: Certificate manager ............................................................................................315
Figure 283 Opera 9: Import certificate .................................................................................................315
Figure 284 Opera 9: Install authority certificate ........................ ........................................................... 316
Figure 285 Opera 9: Install authority certificate ........................ ........................................................... 316
Figure 286 Opera 9: Tools Menu .......................................................................................................... 317
Figure 287 Opera 9: Preferences ......................................................................................................... 317
Figure 288 Opera 9: Certificate manager ............................................................................................318
Figure 289 Konqueror 3.5: Server Authentication ................................................................................319
Figure 290 Konqueror 3.5: Server Authentication ................................................................................319
Figure 291 Konqueror 3.5: KDE SSL Information ................................................................................ 319
Figure 292 Konqueror 3.5: Public Key Certificate File ..................... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .....320
Figure 293 Konqueror 3.5: Certificate Import Result ............................................................................320
Figure 294 Konqueror 3.5: Kleopatra ...................................................................................................320
Figure 295 Konqueror 3.5: Settings Menu ............................................................................................321
Figure 296 Konqueror 3.5: Configure ...................................................................................................321
NSA-2401 User’s Guide
23
List of Figures
24
NSA-2401 User’s Guide

List of Tables

List of Tables
Table 1 Disk Drive LEDs ........................................................................................................................32
Table 2 NSA LEDs ................................................................................................................................. 32
Table 3 User-level Global Labels and Icons ..........................................................................................38
Table 4 My NSA Screen ........................................................................................................................39
Table 5 My NSA Share Browsing Icons ................................................................................................. 40
Table 6 My NSA Share Browsing ..........................................................................................................41
Table 7 My NSA Share Browsing > Move to (or Copy to) ............ ... ... .................................................... 42
Table 8 My NSA Share Configuration Icons ..........................................................................................43
Table 9 My NSA Share Configuration .................................................................................................... 43
Table 10 My NSA Change Share Properties .........................................................................................43
Table 11 My NSA Change Share Properties > Share Access Configuration ........................................ 45
Table 12 Password ................................................................................................................................ 47
Table 13 Global Labels and Icons ........ ... .... ... ... ... ... .... ... ... ... .... ... ... ....................................................... 48
Table 14 Screens Summary ..................................................................................................................50
Table 15 Common Configuration Screen Icons ................. ... .............................................................. ... 51
Table 16 Status Icons ...........................................................................................................................118
Table 17 Status .....................................................................................................................................118
Table 18 System Setting > Date/Time .................................................................................................121
Table 19 Storage > Internal Storage > Status ...................................................................................... 127
Table 20 Storage > Internal Storage > Disk Icons .............................................................................. 129
Table 21 Storage > Internal Storage > Disk ........................................................................................ 129
Table 22 Storage > Internal Storage > Disk > S.M.A.R.T. (Brief Summary) ....................................... 130
Table 23 Storage > Internal Storage > Disk > S.M.A.R. T. (Full Summary) .................................... .... . 131
Table 24 RAID Array Levels Quick Comparison .................................................................................. 133
Table 25 Storage > Internal Storage > RAID Icons .............................................................................136
Table 26 Storage > Internal Storage > RAID ...................................................................................... 138
Table 27 Storage > Internal Storage > RAID > Create ....................................................................... 139
Table 28 Storage > Internal Storage > Volume Icons .........................................................................140
Table 29 Storage > Internal Storage > Volume ................................................................................... 141
Table 30 Storage > Internal Storage > Volume Create ....................................................................... 142
Table 31 Selecting the USB Device .....................................................................................................144
Table 32 Storage > External Storage > Disk Icons .............................................................................146
Table 33 Storage > External Storage > Disk ....................................................................................... 146
Table 34 Storage > External Storage > Volume Icons ........................................................................ 147
Table 35 Storage > External Storage > Volume ..................................................................................148
Table 36 Storage > External Storage > Volume Create ...................................................................... 149
Table 37 JBOD .................................................................................................................................... 152
Table 38 RAID 0 .................................................................................................................................. 153
NSA-2401 User’s Guide
25
List of Tables
Table 39 RAID 1 .................................................................................................................................. 153
Table 40 RAID 10 ................................................................................................................................ 154
Table 41 RAID 5 .................................................................................................................................. 155
Table 42 S.M.A.R.T. Attributes ............................................................................................................. 156
Table 43 Network > TCP/IP ............................................... ... .... ... ... ... .... ... ... ........................................ 163
Table 44 Network > Windows/CIFS ..................................................................................................... 167
Table 45 Network > NFS Icons ............................................................................................................ 168
Table 46 Network > NFS ...................................................................................................................... 169
Table 47 Network > NFS > Add NFS Share ........................................................................................170
Table 48 Network > NFS > NFS Session ............................................................................................ 171
Table 49 Sharing > Users Icons ........................................................................................................... 175
Table 50 Sharing > Users ....................................................................................................................176
Table 51 Sharing > Users > Create a New Account ............................................................................ 178
Table 52 Sharing > Users > User Information > Quota List .................................................................181
Table 53 Sharing > Groups Icons ........................................................................................................182
Table 54 Sharing > Groups .................................................................................................................. 183
Table 55 Sharing > Groups > Add a New Local Group ....................................................................... 184
Table 56 Sharing > Shares Icons .............................................. ... ... ... .... ... ... ... ... .... ... ... ... .... ... ..............186
Table 57 Sharing > Shares ...... ... .... ... ... ... .... ... ... ... ... .... ........................................................................187
Table 58 Sharing > Shares > Create a New Share .............................................................................188
Table 59 Sharing > Shares > Create a New Share > Share Access Configuration ............................. 189
Table 60 Sharing > ACL Configuration Icons .......................................................................................190
Table 61 Sharing > Shares > Create a New Share > Share Access Configuration ............................. 191
Table 62 Sharing > Shares > ACL Configuration > New ACL Configuration Icons .............................191
Table 63 Sharing > Shares > Create a New Share > Share Access Configuration ............................. 192
Table 64 Shares > ACL Configuration > New ACL Configuration > ACL Permission .......................... 193
Table 65 Shares > ACL Configuration > New ACL Configuration > ACL Permission .......................... 194
Table 66 Sharing > Shares > DFS .......................................................................................................195
Table 67 Protection Methods Overview ............................................................................................... 197
Table 68 Protect > Backup Icons ........................................................................................................ 201
Table 69 Protect > Backup ................................................................................................................. 202
Table 70 Protect > Backup > Add Job: Step 1 .................................................................................... 203
Table 71 Protect > Backup > Add Job: Step 2 .................................................................................... 205
Table 72 Protect > Backup > Add Job: Step 3 .................................................................................... 206
Table 73 Protect > Backup > Add Job: Step 4 .................................................................................... 207
Table 74 Protect > Backup > Edit Job: Step 1 ..................... .... ... ... ... .... ... ... ... ... .... ... ... ........................208
Table 75 Protect > Backup > Edit Job: Step 2 ..................... .... ... ... ... .... ... ... ... ... .... ... ... ........................209
Table 76 Protect > Backup > Restore Archive: Step 1 ................................................... .... ... ... ... ... .... . 210
Table 77 Protect > Backup > Restore Archive: Step 2 ................................................... .... ... ... ... ... .... .. 211
Table 78 Protect > Backup > Restore Archive: Step 3 ................................................... .... ... ... ... ... .... . 212
Table 79 Protect > Restore: Step 1 ............................................. ........................................................ 212
Table 80 Protect > Restore: Step 2 ............................................. ........................................................ 213
Table 81 Protect > Restore: Step 3 ............................................. ........................................................ 214
26
NSA-2401 User’s Guide
List of Tables
Table 82 Protect > Restore: Step 4 ............................................. ........................................................ 215
Table 83 Protect > Snapshot > Snapshot Jobs Icons .........................................................................217
Table 84 Protect > Snapshot > Snapshot Jobs ................................................................................... 218
Table 85 Protect > Snapshot > Add Job ........................ ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ........ 219
Table 86 Protect > Snapshot > Snapshot Images Icons .....................................................................220
Table 87 Protect > Snapshot > Snapshot Images ..............................................................................220
Table 88 Applications > FTP ........... ... ... ... .... ... ... ... ... .... ... .....................................................................225
Table 89 Applications > Print Server ............................................ ... ... .... ... ... ... ... .... ... ... ... .... ... ..............226
Table 90 Applications > Print Server > Rename .................................................................................. 227
Table 91 Applications > Copy Button ................................................................................................... 227
Table 92 Applications > Copy Button > Edit ........................................................................................ 228
Table 93 Applications > Copy Button > Edit ........................................................................................ 228
Table 94 Maintenance > Log Icons ....... ... .... ... ... ... ... .... ............................................................. ...........230
Table 95 Maintenance > Log > Search Filters ..................................................................................... 232
Table 96 Maintenance > Log > Log Config > Log Records Configuration ........................................... 233
Table 97 Maintenance > Log > Log Config > Buzzer Priority .............................................................. 233
Table 98 Maintenance > Log > Log Report Configuration > Mail Setting ........................................... . 234
Table 99 Maintenance > Log > Log Report Configuration > Report Setting ........................................ 235
Table 100 Maintenance > Log > Log Report Configuration > Syslog Server Setting ..........................236
Table 101 Maintenance > Configuration ..............................................................................................237
Table 102 Maintenance > Configuration ..............................................................................................238
Table 103 Maintenance > SSL ............................................................................................................240
Table 104 Maintenance > Configuration ..............................................................................................241
Table 105 Maintenance > FW Upgrade ...............................................................................................242
Table 106 Maintenance > Power Management ................................................................................... 243
Table 107 Maintenance > Power Management > Edit ......................................................................... 245
Table 108 Maintenance > Shutdown ................................................................................................... 246
Table 109 Physical Features ...............................................................................................................257
Table 110 Firmware Features ..............................................................................................................257
Table 111 NSA Hardware Specifications ................................... ... ... ... .... ... ... ... ... .................................. 259
Table 112 NSA Firmware Specifications ..............................................................................................260
Table 113 Power Consumption in Watts (W) .......................................................................................261
Table 114 Log Messages ..................................................................................................................... 265
NSA-2401 User’s Guide
27
List of Tables
28
NSA-2401 User’s Guide
PART I
Introduction and
Tutorials
Getting to Know Your NSA (31) Introducing the Web Configurator (35)
29
30
Loading...
+ 332 hidden pages