LAN1 IP Address192.168.1.3
LAN2 IP Address192.168.100.3
Usernameadmin
Password1234
www.zyxel.com
About This User's Guide
About This User's Guide
Intended Audience
This manual is intended for people who want to configure the NSA using the Web
Configurator.
Related Documentation
• Quick Start Guide
The Quick Start Guide is designed to help you get up and running right away. It contains
information on setting up your network and configuring for Internet access.
• Web Configurator Online Help
Embedded web help for descriptions of individual screens and supplementary
information.
• Supporting Disk
Refer to the included CD for support documents.
• ZyXEL Web Site
Please refer to www.zyxel.com
certifications.
for additional support documentation and product
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for
improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team,
ZyXEL Communications Corp.,
6 Innovation Road II,
Science-Based Industrial Park,
Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
Customer Support
In the event of problems that cannot be solved by using this manual, you should contact your
vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in
which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact
information. Please have the following information ready when you contact an office.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
NSA-2401 User’s Guide
3
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1Warnings tell you about things that could harm you or your device.
"Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The NSA may be referred to as the “NSA”, the “device” or the “system” in this User’s
Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key.
“Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example,
Maintenance > Log > Log Setting means you first click Maintenance in the navigation
panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For
example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000”
or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
NSA-2401 User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The NSA icon is not an
exact representation of your device.
NSAComputerNotebook computer
ServerFirewallSwitch
Router
NSA-2401 User’s Guide
5
Safety Warnings
Safety Warnings
1For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk
of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel should
service or disassemble this device. Please contact your vendor for further information.
• ONLY qualified service personnel should service or disassemble this device.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device.
• Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in
North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
• If the power adaptor or cord is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a
new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a
remote risk of electric shock from lightning.
• CAUTION: RISK OF EXPLOSION IF BATTERY (on the motherboard) IS REPLACED
BY AN INCORRECT TYPE. DISPOSE OF USED BATTERIES ACCORDING TO THE
INSTRUCTIONS. Dispose them at the applicable collection point for the recycling of
electrical and electronic equipment. For detailed information about recycling of this
product, please contact your local city offi ce, your household waste disposal service or the
store where you purchased the product.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
6
NSA-2401 User’s Guide
Safety Warnings
Your product is marked with this symbol, which is known as the WEEE mark. WEEE
stands for Waste Electronics and Electrical Equipment. It means that used electrical and
electronic products should not be mixed with general waste. Used electrical and
electronic equipment should be treated separately.
NSA-2401 User’s Guide
7
Safety Warnings
8
NSA-2401 User’s Guide
Contents Overview
Contents Overview
Introduction and Tutorials .....................................................................................................29
Getting to Know Your NSA ........................................................................................................31
Introducing the Web Configurator .............................................................................................. 35
Figure 15 Status .................................................................................................................................... 48
Figure 22 Groups .................................................................................................................................... 58
Figure 23 Sharing > Groups > Add Share .............................................................................................. 59
Table 16 Status Icons ...........................................................................................................................118
Table 17 Status .....................................................................................................................................118
Table 18 System Setting > Date/Time .................................................................................................121
Table 19 Storage > Internal Storage > Status ...................................................................................... 127
Getting to Know Your NSA (31)
Introducing the Web Configurator (35)
29
30
CHAPTER 1
Getting to Know Your NSA
1.1 NSA-2401 Overview
The NSA (Network Storage Appliance) allows secure storage and management of data on
your network. Windows, Apple, or Linux users can access data on it as if it was on their own
computers. The NSA’s two Gigabit Ethernet ports can connect to two different LANs. Users
on either LAN (or connected through the Internet) can back up and share data on the NSA.
Two USB ports let you share USB printers and use external USB hard drives for extra storage
space.
Figure 1 NSA Overview
LAN1
LAN2
USB1
USB2
• The NSA’s SATA II (Serial Advanced Technology Attachment) hard disk serial links are
compatible with all major hard drive manufacturers.
• RAID (Redundant Array of Independent Disks) protects your data even if a hard disk fails.
• The snapshot and backup features let you further protect your data.
• The NSA offers powerful security features. Use HTTPS or FTPES for secure file
transfers. Create encrypted volumes so an attacker who removes the physical drive still
cannot read the data. The NSA can also record all user access to files and folders.
• The NSA lets you publish or mirror files to another NSA as a backup that others can
access (at a branch office for example).
• See the specifications appendix for a more detailed list of NSA features.
NSA-2401 User’s Guide
31
Chapter 1 Getting to Know Your NSA
1.1.1 Front Panel LEDs
The front panel LEDs tell you important information about the NSA.
Figure 2 NSA Front Panel LEDs
Disk Drive LEDs
The following table describes the disk drive LEDs. Refer to the Quick Start Guide to see how
to install and remove hard drives from the disk trays.
Table 1 Disk Drive LED s
LEDCOLORSTATUSDESCRIPTION
PWRGreenOffThe hard disk drive tray is empty or not connected properly.
ALMRedOffThe hard disk drive is working properly if connected.
LEDs
OnThe hard disk drive is connected properly to the NSA.
BlinkingThe NSA is reading data from the hard disk drive or writing data
to it.
OnThe hard disk drive has a problem, is not installed, or you have
used the Web Configurator to eject it (shut it down).
BlinkingThe NSA is resynching or reshaping the hard disk drive.
The following table describes the LEDs related to the NSA itself.
1The SYS LED blinks orange when firmware is being uploaded to the NSA. Do
not turn off or reset the NSA while the firmware update is in progress!
Table 2 NSA LEDs
LEDCOLORSTATUSDESCRIPTION
PWRGreenOffThe NSA is turned off.
OnThe NSA is turned on and receiving power.
32
NSA-2401 User’s Guide
Chapter 1 Getting to Know Your NSA
Table 2 NSA LEDs (continued)
LEDCOLORSTATUSDESCRIPTION
SYSRedOnThe NSA has passed system tests.
BlinkingThe NSA is starting up or shutting down.
Quick blinking indicates a RAID array is in degraded mode.
OrangeOnThe NSA is unlocking an encrypted volume or there are no
BlinkingFirmware is being uploaded to the NSA.
GreenOnThe NSA has fully booted and is operating normally.
LAN1/LAN2GreenOffThe LAN is not connected.
OnThe NSA has a successful 10/100 Mbps Ethern e t
BlinkingThe 100M LAN is sending or receiving packets.
OrangeOnThe NSA has a successful 1000 Mbps Ethernet connection.
BlinkingThe 1000M LAN is sending or receiving packets.
COPY GreenOnA USB device is connected to the NSA.
BlinkingThe NSA is copying files from the USB device.
RedOnCopying files from the USB device failed. Press the COPY
OffNo USB device is connected.
volumes in the NSA.
connection.
button to set the COPY LED back to green.
1.1.2 Power Button
Press the power button on the front panel to turn the NSA on and off.
• To turn the NSA on: press the power button and release it.
• To turn the NSA off, press the power button in and hold it until you hear a beep. Then
release the button. The SYS light blinks red until the NSA is shut down.
• If the above shut-down procedure does not work (which may happen if the NSA has
crashed), hold the power button in a few more seconds until you hear a second beep. The
NSA turns off immediately.
1.1.3 COPY Button
Use the COPY button on the front panel to copy files from a connected USB device to the
NSA. Use the Applications > Copy Button screen (Section 10.4 on page 227) to choose
where the NSA stores the files. The name of the folder created for the copied files consists of
the date and time of the copy in year_month_day_hour_minute_second format.
NSA-2401 User’s Guide
33
Chapter 1 Getting to Know Your NSA
34
NSA-2401 User’s Guide
CHAPTER 2
Introducing the Web
Configurator
This chapter describes how to access the NSA Web Configurator and provides an overview of
its screens.
2.1 Web Configurator Overview
The Web Configurator is an HTML-based management interface that allows easy NSA setup
and management via Internet browser. Use Internet Explorer 6.0, Mozilla firefox 1.0,
Netscape Navigator 7.0 or later versions of these browsers. The recommended screen
resolution is 1024 by 768 pixels or higher.
In order to use the Web Configurator you need to allow JavaScripts.
2.2 Accessing the NSA Web Configurator
Make sure your NSA is properly connected (refer to the Quick Start Guide).
2.2.1 Access the NSA Using the NDU
If you don’t know the IP address of the NSA, then use the NDU to find it. Refer to the Quick
Start Guide to see how to install and run the NDU.
NSA-2401 User’s Guide
35
Chapter 2 Introducing the Web Configurator
Figure 3 NDU Main Screen
From the NDU main page click the icon under Admin to see the Web Configurator screen
login screen.
2.2.2 Web Browser Access
Open your browser and type in the IP address of the NSA. If the NSA does not get IP
addresses from a DHCP server, the default LAN1 IP address is 192.168.1.3 and the default
LAN2 IP address is 192.168.100.3.
Figure 4 NDA URL
2.3 Login
The default user name and password are ‘admin’ and ‘1234’ respectively. Enter your user
name and password, then click Login. Non-admin users can change their passwords by using
the username and password in the My NSA > Password screen. See Section 2.5.7 on page 46
for details.
36
NSA-2401 User’s Guide
Chapter 2 Introducing the Web Configurator
Figure 5 NSA Login Screen
You should see a screen asking you to change your password (highly recommended) as shown
next. Type a new password (and retype it to confirm) and click Apply or click Skip.
Figure 6 Change Password Screen
"The Web Configurator session automatically times out after 15 minutes.
Simply log back into the NSA if this happens to you.
2.4 User-level Screens Overview
All users (including the administrator) first see the user-level access My NSA screen after
login.
NSA-2401 User’s Guide
37
Chapter 2 Introducing the Web Configurator
Figure 7 My NSA
The icons and language label at the top-right of the screen are visible from most screens. Use
the tabs at the top of the screen to navigate between the user-level screens and menus. The
following table describes the ‘global’ icons and tabs in the user-level screens.
Table 3 User-level Global Labels and Icons
LABEL/ICONDESCRIPTION
LanguageSelect th e Web Configurator l anguage from the drop-down list box.
HelpClick the Help icon to open a web help page specific to the screen you are
currently configuring.
LogoutClick the Logout icon at any time to exit the Web Configurator.
My NSAClick this tab to go to screens where you can manage your shares and access the
files on public shares. The administrator must go into the administration screens to
manage other user’s shares.
PasswordClick this tab to go to a screen where you can change your password.
AdministrationThis tab displays when you log in as the admin istrator. Click the tab to go to
screens where you can manage advanced configurations.
2.5 My NSA Screen
Use the My NSA screens to manage your shares and access the files in folders to which you
have access.
38
A share is a set of user access permissions for a specific folder on a volume (gives someone
access to a folder). It is similar to a shared folder in Windows, but the access rights are
independent of the folder (you configure the share and the folder separately). You can map a
share to a network drive for easy and familiar file transfer for Windows users.
NSA-2401 User’s Guide
Chapter 2 Introducing the Web Configurator
The main My NSA screen displays the shares to which you have access.
Figure 8 My NSA Screen
The following table describes this screen.
Table 4 My NSA Screen
LABELDESCRIPTION
My Own SharesThese are the shares that you own (and manage). The share icons are folder
shaped. Click a share icon to access the share’s contents.
System Share
This icon displays for a system share created by the NSA.
User-created Share
This icon displays for a user-created share.
External (USB) Share
This icon displays for a share on an external (USB) device. An
external share’s icon disappears if the share is not currently
available (because the USB device was removed for example).
The administrator owns and manages the public shares.
ConfigureClick this button to see and configure the management details for a share.
Other SharesThese are other shares on the internal hard drives or external (USB) devices that
you can access (but not manage).
NSA-2401 User’s Guide
39
Chapter 2 Introducing the Web Configurator
2.5.1 My NSA Share Browsing Screen
Click My NSA and then click a share to open the following screen. Use the My NSA share
browsing screens to see and access share contents.
• Click a folder’s name to go into the folder.
• Click a file’s name to be able to save the file to your computer.
• Click the play icon to play the file. At the time of writing this is only for MP3 files.
• Click to the right of a file or folder name to select it.
• Use the [SHIFT] key to select a range of entries. Hold down the [CTRL] key to select
multiple individual entries.
Figure 9 My NSA Share Browsing
40
The following table describes the icons in this screen.
Table 5 My NSA Share Browsing Icons
ICON
DESCRIPTION
Create Folder
Click this icon to open a screen where you can create a new folder.
Upload
Click this button to copy a file from your computer to this location in the
NSA.
NSA-2401 User’s Guide
Chapter 2 Introducing the Web Configurator
Table 5 My NSA Share Browsing Icons (continued)
ICON
DESCRIPTION
Delete
Select a folder(s) or file(s) and click this icon to remove the folder(s) or
file(s).
Move
The administrator can select a folder or file and click this button to move it
to another location within this share or another share that you can access.
Copy
The administrator can select a folder or file and click this button to move
create a copy of it in another location within this share or another share
that you can access.
Sort
Click a column’s heading cell to sort the table entries by that column’s
criteria. Click the heading cell again to reverse the sort order.
Up One Level
Click this icon to go to the next higher layer in the share’s folder tree.
Folder
Click this icon to browse the folder.
File
Click this icon to select a file.
The following table describes the labels in this screen.
Table 6 My NSA Share Browsing
LABELDESCRIPTION
Current locationThis is the name of the share and folder path that you are in.
TypeThe icon in this column identifies the entry as a folder or a file.
NameThis column identifies the names of folders and files in the share.
SizeThis column displays a file’s size.
Modified DateThis column displays the last time the file or folder was changed (in year-
CloseClick this button to return to the My NSA screen.
NSA-2401 User’s Guide
The folder with an arrow pointing up is the link that takes you to the next
higher layer in the share’s folder tree.
Click a file’s name to open the file or save it to your computer.
Click a folder’s name to display the folder’s contents.
month-day hour:minute:second format).
41
Chapter 2 Introducing the Web Configurator
2.5.2 My NSA Share Browsing Move to or Copy to Screen
The administrator can select a folder or file in the My NSA share browsing screens and click
the Move to button or the Copy to button to display a share browsing screen like the
following. Use the share browsing screen to select the target path for moving or copying the
folder or file.
Figure 10 My NSA Share Browsing > Move to (or Copy to)
The following table describes the labels in this screen.
Table 7 My NSA Share Browsing > Move to (or Copy to)
LABELDESCRIPTION
SharesSelect the target share.
PathSelect a folder on the NSA. You can also browse to find or create a folder on the NSA or
YesClick this button to move or copy the file.
CloseClick this button to return to the My NSA share browsing screen.
type the location of the folder using forward slashes as branch separators.
2.5.3 My NSA Share Configuration
Use the My NSA share configuration screens to see and configure share management details.
Click My NSA and then the Configure button of one of your shares to open the following
screen. This screen displays a share’s management details.
Figure 11 My NSA Share Configuration
42
NSA-2401 User’s Guide
Chapter 2 Introducing the Web Configurator
The following table describes the icons in this screen.
Table 8 My NSA Share Configuration Icons
ICON
DESCRIPTION
Share
This is the share icon followed by the name of the share.
User
This is the icon for the owner of the share.
Share Browsing
Click this icon or link to see and access the share’s contents.
Edit Share
Click this icon or link to configure the share’s management details.
Delete Share
Click this icon or link to remove the share and its contents.
The following table describes the labels in the this screen.
Table 9 My NSA Share Configuration
LABELDESCRIPTION
Share OwnerThe share belongs to (and is managed by) this user account. The share
owner controls access rights to the share.
LocationThe share is for a folder on this volume.
PathThis is the share’s file path.
2.5.4 My NSA Change Share Properties Screen
Use the My NSA Change Share Properties screen to configure share management details.
Click My NSA and a share’s Configure button. Then click Edt Share to open the following
screen. This screen displays a share’s management details.
Figure 12 My NSA Change Share Properties
The following table describes the labels in the this screen.
Table 10 My NSA Change Share Properties
LABELDESCRIPTION
Share Name Enter the name of the shared folder. The text may consist of 1 to 255 characters.
See Share Name Details on page 44 for more information.
VolumeSelect a volume for the share to be located on.
NSA-2401 User’s Guide
43
Chapter 2 Introducing the Web Configurator
Table 10 My NSA Change Share Properties (continued)
LABELDESCRIPTION
Make this share
owned by
Enable this shareSelect this to activate the share.
Enable action logSelect this to keep a log of all actions performed on the share.
Enable recycle-bin Select this to create a recycle bin on the share. Whenever a user with sufficient
Share AccessChoose whether the share is public or private, or choose Advanced to open the
ApplyClick this to save your changes.
CancelClick this to discard changes and close the window.
Select an owner for the share.
permissions deletes a file or folder, it is stored here until it is deleted permanently.
Share Access Configuration screen (see Section 2.5.4.1 on page 44).
Share Name Details
Use any character except double quotes (“), single quotes (‘), slashes (\ or /), square brackets ([
]), colons (:), semi-colons (;), angle brackets (< >), the plus sign (+), semi-colons (;), commas
(,), question marks (?), asterisks (*), and the equals sign (=).
• All leading and trailing spaces are removed automatically.
• Multiple spaces within names are converted to a single space.
• Share names must be unique (they cannot be the same as other share names).
• Share names cannot use names reserved for “automatic shares” of external USB disk
volumes be unique, for example, “USB[0-9]{1,2}”, that is, a share named “USB”
followed by a one or two digit number).
2.5.4.1 Share Access Configuration
This screen allows you to assign permissions to a share.
Available Users/GroupsThis displays a list of users and groups that have not yet been assigned
an authority level for the share. You can assign users and groups by
selecting them and clicking the right arrow.
Full
Read Only
Deny
ApplyClick this to save your changes.
CancelClick this to discard changes and close the window.
Assign users and groups one of the following authority levels.
Full - Grants read/write privileges.
Read Only - Grants read-only privileges; files and folders cannot be
modified, moved, or removed.
Deny - Removes all privileges; files and folders cannot be read,
modified, moved, or removed.
You can remove users from any given authority level by selecting them
and clicking the left arrow.
2.5.5 Share and Folder Names
The name can only contain the following characters:
• Alphanumeric (A-z 0-9) and Unicode.
The NSA allows FTP access to shares, folders or files with names encoded in the UTF-8
(8-bit UCS/Unicode Transformation Format) format. So your FTP client must support
UTF-8 in order to access shares, folders or files on the NSA with Unicode names.
• Spaces
• _ [underscores]
NSA-2401 User’s Guide
45
Chapter 2 Introducing the Web Configurator
•. [periods]
• - [dashes]
Other limitations include:
• All leading and trailing spaces are removed automatically.
• Multiple spaces within names are converted to a single space.
• Share names must be unique (they cannot be the same as other share names).
• The NSA creates automatic volume names for external (USB) disk volumes. These are a
type of share, so the share name you configure cannot conflict with the external (USB)
disk volume names. “ExtVol1” or “ExtVol2” are examples of external (USB) disk volume
names.
• Folder names must be unique (they cannot be the same as other folder na mes).
• The minimum character length of a name is one character, that is a name cannot be blank.
• The maximum character length of share name is 255 characters.
• Unicode is supported for share names, although your FTP client must support UTF-8. Full
support should be available in all Windows versions after Windows 2000.
2.5.6 Share Paths
A share path is the full path to a folder on a volume that will be shared, for example, /mynsa/
topsecret/ugs/. This is independent from a “share name” which is the name shown for this
share when accessing the share via CIFS or FTP. The path should start with a '/' (forward
slash) followed by a parent folder, child folders leading to the folder that is to be shared.
2.5.7 Password Screen
Click Password to open the following screen. Use this screen to change an account’s
password. Enter a new password and confirm it by re-entering it.
Figure 14 Password
46
NSA-2401 User’s Guide
The following table describes the labels in this screen.
Table 12 Password
LABELDESCRIPTION
Account NameType the user name of the account for which you want to change the
password.
Old PasswordType the user’s curren t password.
New PasswordCreate a new password for the user. You can type from one to 14 single-
byte (no Chinese characters allowed for example) ASCII characters.
Retype to confirmYou must type the exact same password that you just typed in the above
field.
ApplyClick this button to save your changes back to the NSA.
CancelClick this button to begin configuring this screen afresh.
2.6 Administration Screens
The Administration tab displays when you log in as the administrator. Click Administration
in the My NSA screens to open the advanced administration screens.
Chapter 2 Introducing the Web Configurator
The first time you access the administration screens, the setup wizard opens. See the online
help for details on the setup wizard screens. After you configure the setup wizard, the Status
screen displays when you enter the advanced administration screens.
NSA-2401 User’s Guide
47
Chapter 2 Introducing the Web Configurator
Figure 15 Status
2
3
1
4
2.6.1 Global Administration Icons
The icons and language label at the top-right of the screen () are visible from most of the
administration screens. The following table describes the ‘global’ icons and labels.
Table 13 Global Labels and Icons
LABEL/ICONDESCRIPTION
LanguageSelect th e Web Configurator l anguage from the drop-down list box.
Help
Click this icon to open a web help page specific to the screen you are currently
configuring.
About
Click this icon to view the model name, firmware version and copyright.
Wizards
Click this icon to open a sub-menu of wizard(s).
1
48
NSA-2401 User’s Guide
Table 13 Global Labels and Icons
2
LABEL/ICONDESCRIPTION
Home
Click this icon to return to the user-level (My NSA) screens.
Logout
Click this icon at any time to exit the Web Configurator. This is the same as
clicking the Logout link at the bottom of the Navigation panel.
2.6.2 Navigation Panel
The navigation panel on the left of the Web Configurator screens () contains screen links.
Click a minus (-) link to hide a category’s screen links. Certain screens also contain hyper
links that allow you to jump to another screen.
Click the Status icon to open the Status screen.
Figure 16 Navigation Panel Links
Chapter 2 Introducing the Web Configurator
NSA-2401 User’s Guide
49
Chapter 2 Introducing the Web Configurator
The following table describes the navigation panel links.
Table 14 Screens Summary
CATEGORYSUB-LINKFUNCTION
StatusThis screen shows system information, the status of the volumes,
System SettingDate/TimeChoose a time zone and/or allow the NSA to synchronize with a
StorageInternal
Storage
External
Storage
NetworkTCP/IP Configure the NSA’s teaming mode, IP address, and DNS
Windows/CIFS Specify the NSA’s server name and workgroup name and choose
NFSConfigure NFS settings so computers with Unix or Linux operating
SharingUsersCreate users who may use the NSA. Y ou may set user passwords,
GroupsCreate user groups and add group members.
SharesCreate shared folders to which you can allow users and/or groups
ProtectBackupCreate and manage data backups to an external USB disk drive or
RestoreRestore a previous backup from another NSA or external USB
Snapshot Create and manage snapshots (records of changes to an internal
Backup
Software
ApplicationsFTPEnable FTP file transfer to/from the NSA, set the number of FTP
Print ServerView and manage the NSA’s list of printers and print jobs.
Copy ButtonConfigure the copy button share location.
MaintenanceLog View the NSA system logs and configure where to send log and
ConfigurationManage the NSA configuration file.
SSLConfigure HTTPS and the NSA’s SSL certificate.
F/W UpgradeUpload new firmware to your NSA.
Power
Management
and the users who are currently using the NSA.
time server.
View and configure the NSA’s installed disks, RAIDs, and
volumes.
View and configure the NSA’s USB-connected disks and volumes.
settings. You can also perform a ping test.
a workgroup or domain authentication method.
systems can access the NSA.
define storage limits per user, and associate users to a group(s).
read/write access rights.
another NSA over the network.
hard drive connected to the NSA.
volume at a particular moment in time).
Use this screen to display the backup software license keys.
connections allowed, an FTP idle timeout, and the character set.
report emails.
Set the hard drive sleep timer.
50
ShutdownRestart your NSA or turn it off.
LogoutClick Logout to exit the Web Configurator. This is recommended
to prevent unauthorized administrator access to the NSA.
NSA-2401 User’s Guide
2.6.3 Main Window
Chapter 2 Introducing the Web Configurator
The Web Configurator’s main window () shows the screen you select in the navigation
panel. It is discussed in the rest of this document.
The Status screen is the first administration screen to dis play. See Chapter 4 on page 117 for
more information about the Status screen.
2.6.4 Status Messages
The message text box at the bottom of the screen () displays status messages as you
configure the NSA.
2.6.5 Common Screen Icons
The following table explains some icons that appear in several configuration screens.
Table 15 Common Configuration Screen Icons
ICONDESCRIPTION
wizard
Click this icon to open the Disk Setup Wizard to create a new disk array or volume.
Eject
Select a hard drive and click this icon to shut it down. Do this before removing a hard
drive to help increase its usable lifetime.
3
4
Note: Ejecting a disk from a JBOD or RAID0 array causes the array to
fail.
RAID
This icon represents a disk array. See the chapter on the stor age screens for more
details.
Volume
This icon represents a storage volume. See the chapter on the storage screens for
more details.
Disk
This icon shows the status of a hard disk. See the chapter on the storage screens for
more details.
Create
If you have disk space available for a new disk array, then click this icon to open a
screen where you can create a new disk array.
Delete
Select an entry and click this icon to remove the entry.
Edit
Select an entry and click this icon to modify it’s settings.
NSA-2401 User’s Guide
51
Chapter 2 Introducing the Web Configurator
Table 15 Common Configuration Screen Icons (continued)
ICONDESCRIPTION
User
This is a user icon. See the chapter on the sharing screens for details on variants of
this icon.
Share
This is a share icon. See the chapter on shares for details on variants of this icon.
2.7 NSA RESET Button
Use the RESET button on the front panel of the NSA to reset either just the NSA’s admin
password and IP address settings or the whole factory default configuration file. Use an object
such as an unfolded paper clip to press the RESET button.
"Ideally you should back up the current NSA configuration file before resetting
or reloading the factory default configuration file.
2.7.1 Reset
Do the following to only reset the administrator password and IP address settings to the
defaults.
Press the RESET button and hold it for two seconds (you will hear one beep) and release it.
The NSA sounds another single beep after you release the button as confirmation.
2.7.2 Reload Factory Default Configuration File
Do the following to reload the factory default configuration file. This resets the admin
password and IP address settings to the default settings AND erases all other configurations
such as user/group/share names, passwords, and share access rights.
Press the RESET button and hold it for ten seconds (you will hear three beeps) and release it.
The NSA sounds three more beeps after you release the button as confirmation.
52
NSA-2401 User’s Guide
Figure 17 Reset and Reload Timeline
BeepBeep Beep
Chapter 2 Introducing the Web Configurator
0210
Press
button
Release Release
to resetto reload and restart
Seconds
"The NSA automatically restarts to complete reloading the factory default
configuration file.
NSA-2401 User’s Guide
53
Chapter 2 Introducing the Web Configurator
54
NSA-2401 User’s Guide
CHAPTER 3
Tutorials
3.1 Overview
These tutorials show you how to perform the following common tasks:
• How to Configure Sharing: page 55
• How to Use Shares: page 61
• How to Find the NSA in OS X: page 65
• How to Configure Security: page 68
• Power Resume: page 89
• How to Use Backups and Snapshots: page 89
• How to Increase the NSA’s Storage Capacity: page 106
3.2 How to Configure Sharing
This section covers how to create user accounts, groups, and shares.
You can customize account permissions to give different users different levels of access to
individual files and folders hosted on the NSA. For example, if you intend to use the NSA
within a single department you may decide to give all the members of that department read
and write access to all the files located on it. You could also decide to give management read
and write access to some files and give other employees read-only access. Using the tools built
into the ZyXEL Web Configurator, you can do just this.
3.2.1 Setting Up User Accounts
As the administrator of the NSA, one of the first tasks you will want to do is set up accounts
for everyone who needs to use it. Suppose you need accounts for a vice president named
Gonzo and a manager named Kermit. Do the following to create a user account.
NSA-2401 User’s Guide
55
Chapter 3 Tutorials
1 Log into the Web Configurator using your administrator Username and Password.
Figure 18 Administrator Login
2 In the My NSA screen, click Administration.
Figure 19 My NSA
56
NSA-2401 User’s Guide
Chapter 3 Tutorials
3 Once the Web Configurator workspace appears, click Sharing > Users to open the user
account management area.
Figure 20 Sharing > Users
4 Click Add Account to open the Create a New Acc ount screen.
Figure 21 Sharing > Users > Create a New Account
NSA-2401 User’s Guide
57
Chapter 3 Tutorials
• Enter an account name and password.
• Set how many megabytes of storage the account can use in each of the NSA’s
volumes. You can set a different quota for each volume. A value of “0” MB means
unlimited storage.
• Enter the user’s e-mail address and any details or identifying information specific to
the user account.
• Select the groups to which you want to assign this account.
• Click Apply.
5 Repeat these steps for the other user accounts you need.
3.2.2 Setting Up Groups
After you create accounts, the next thing you’ll want to do is organize the user accounts into
groups. This example creates a senior management group with vice president Gonzo as a
member. You can add other members later.
1 Click Sharing > Groups > Add Group.
Figure 22 Groups
58
NSA-2401 User’s Guide
2 Specify a name for the group. Select Gonzo and click Add Selected User(s) to include
Gonzo in the group. Click Apply.
Figure 23 Sharing > Groups > Add Share
3.2.3 Setting Up Shares
Chapter 3 Tutorials
You’ve created accounts for Gonzo and Kermit and now you want to create a share for each of
them. You also have a senior management group. You want to allow the users in the senior
management group to access both shares while Kermit can access his own share.
1 Click Sharing > Shares > Add Share.
Figure 24 Shares
NSA-2401 User’s Guide
59
Chapter 3 Tutorials
2 Specify a name for the share and select the volume it should be on. Select Kermit as the
Figure 25 Sharing > Shares > Add Share
3 Include Senior-Management under Full and click Apply. This way both Kermit and
Figure 26 Share Access Configuration
owner and set the Share Access to Advanced and click Edit.
the senior managers have full access to the share.
60
NSA-2401 User’s Guide
Chapter 3 Tutorials
4 Back in the Edit Shares screen, click Apply.
Figure 27 Sharing > Shares > Add Share
Now that you have created Kermit’s share, you can go through the steps again to create
another share for Gonzo. For Gonzo’s share, set the Share Access to Keep it private to owner.
3.3 How to Use Shares
Here is how people use the shares you have created. In this example Gonzo creates a folder
named “Strategy” and puts files named 2009-Plan.doc and 2010-2014-Plans.doc into it.
3.3.1 Using a Share with Windows Explorer
Gonzo wants to use his share from his computer at the office.
1 Open Windows explorer and click Tools > Map Network Drive to open the Map
Network Drive screen.
2 In the Folder field, enter two backslashes followed by the IP address of the NSA
(192.168.1.35), another backslash, and the name of the share (Gonzo) and click Finish.
Figure 28 Mapping a Share
NSA-2401 User’s Guide
61
Chapter 3 Tutorials
3 Enter Gonzo’s username and password and click OK.
Figure 29 Entering the Share Username and Password
4 Now Gonzo can use the share like a drive on his computer. Click File > New > Folder
Figure 30 Creating a Folder
and create a folder named “Strategy”.
5 Copy and paste the 2009-Plan.doc file into the Strategy folder.
Figure 31 Using the Folder
3.3.2 Using a Share with a Web Browser
Now Gonzo wants to use his web browser to add the 2010-2014-Plans.doc file to his Strategy
folder.
62
NSA-2401 User’s Guide
Chapter 3 Tutorials
1 Open Firefox and enter http://192.168.1.35 to open the login screen. Enter Gonzo’s
username and password and clicks Login.
Figure 32 User Login
2 Click the Gonzo share.
Figure 33 Gonzo’s My NSA Screens
NSA-2401 User’s Guide
63
Chapter 3 Tutorials
3 Open the Strategy share.
Figure 34 Gonzo Share Screen
64
NSA-2401 User’s Guide
4 Click Upload.
Figure 35 Strategy Folder Screen
Chapter 3 Tutorials
5 Browse to the 2010-2014-Plans.doc file and click Apply.
Figure 36 Upload Files Screen
3.4 How to Find the NSA in OS X
Here’s how to find the NSA-2401 OS X. This example uses Mac OS X 10.5 (Leopard).
NSA-2401 User’s Guide
65
Chapter 3 Tutorials
1 Click the Finder icon in the dock.
Figure 37 Opening the Finder
2 Select All under Shared in the sidebar. An entry for the NSA appears in the Network
list.
Figure 38 Displaying the NSA
66
NSA-2401 User’s Guide
Chapter 3 Tutorials
3 Click the triangle beside the NSA’s name to display the shares that Gonzo can use.
Figure 39 Displaying the NSA
Alternatively, you can also connect directly to the NSA from the Go Menu in the
Finder. Simply click Go > Connect to Server.
Figure 40 Alternate Method for Displaying the NSA
NSA-2401 User’s Guide
67
Chapter 3 Tutorials
4 When the Connect to Server dialog box opens, type smb:// and the IP address of your
Figure 41 Connecting to the NSA
5 Once connected, you can now access the NSA from the finder or directly from the
NSA-2401 or click Browse to find it in your network. Click Connect.
desktop.
3.5 How to Configure Security
Use these tutorials to help you secure your NSA. See also Chapter 6 on page 125 for details on
encrypting volumes.
3.5.1 Configuring Security for Web Configurator Sessions
These tutorials show you how to configure security for the NSA’s Web Configurator sessions.
You will customize the NSA’s self-signed SSL certificate and distribute it to your users.
68
NSA-2401 User’s Guide
3.5.1.1 Customizing the NSA’s Certificate
1 Click Maintenance > SSL and then select Edit a self-signed CA certificate and click
Edit.
Figure 42 Maintenance > SSL
Chapter 3 Tutorials
2 Next, let’s modify the certificate by changing the Common Name to this NSA’s IP
address of 192.168.1.35, the Organization to “Test” and the Key Length to 2048.
Figure 43 Maintenance > SSL > Edit a Self-Signed Certificate
NSA-2401 User’s Guide
69
Chapter 3 Tutorials
3 The NSA restarts its network services and returns you to the login screen.
Figure 44 Maintenance > SSL > Edit a Self-Signed Certificate
70
NSA-2401 User’s Guide
3.5.1.2 Downloading and Installing the NSA’s Customized Certificate
1 Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click
Download.
Figure 45 Maintenance > SSL
Chapter 3 Tutorials
2 Save the file to your computer.
Figure 46 Downloading the NSA’s Certificate
NSA-2401 User’s Guide
71
Chapter 3 Tutorials
3 Find the certificate file on your computer and double-click it.
Figure 47 Downloading the NSA’s Certificate
4 Install the certificate. The rest of the steps in this section are an example of installing a
Figure 48 Certificate
certificate in Windows. See Appendix C on page 299 for other examples. In the
Certificate dialog box, click Install Certificate.
72
NSA-2401 User’s Guide
5 In the Certificate Import Wizard, click Next.
Figure 49 Certificate Import Wizard: Welcome
Chapter 3 Tutorials
6 Leave Automatically select certificate store based on the type of certificate selected
and click Next.
Figure 50 Certificate Import Wizard: Certificate Store
NSA-2401 User’s Guide
73
Chapter 3 Tutorials
7 In the Completing the Certificate Import Wizard screen, click Finish.
Figure 51 Certificate Import Wizard: Finish
8 If you are presented with another Security Warning, click Yes.
Figure 52 Security Warning
9 Finally, click OK when presented with the successful certificate installation message.
Figure 53 Certificate Import Wizard: Successful
74
NSA-2401 User’s Guide
3.5.1.3 Turn on the NSA’s Web Security
Now that you have customized the NSA’s certificate and installed it in your computer, you can
turn on security for your Web Configurator sessions. This example uses Firefox 3.0. See
Appendix C on page 299 for more information on browsers and certificates.
1 Close your web browser and open it again to reset its session with the NSA. Log in and
click Maintenance > SSL. Select Force HTTPS and click Apply.
Figure 54 Maintenance > SSL
Chapter 3 Tutorials
NSA-2401 User’s Guide
75
Chapter 3 Tutorials
2 A warning screen pops up if applying your change may disconnect some users. Click
Figure 55 Maintenance > SSL > Force HTTPS Warning
3 The NSA logs you out and automatically redirects your formerly non-secure (HTTP)
Apply to continue.
connection to a secure (HTTPS) connection. Your browser may give you a warning
about the device’s public key certificate. Add an exception to allow your browser to
bypass the warning.
Figure 56 Firefox: Secure Connection Failed
76
NSA-2401 User’s Guide
4 Click Add Exception.
Figure 57 Firefox: Secure Connection Failed
Chapter 3 Tutorials
5 Click Get Certificate.
Figure 58 Firefox: Add Security Exception
NSA-2401 User’s Guide
77
Chapter 3 Tutorials
6 Before you add an exception, verify that the device to which you are trying to connect is
Figure 59 Firefox: Add Security Exception
providing the correct certificate. Click View.
78
NSA-2401 User’s Guide
Chapter 3 Tutorials
7 The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA
to your computer. (Double-click the NSA’s certificate file and then click Details and
look at the Thumbprint). Click Close.
Figure 60 Firefox: Add Security Exception
NSA-2401 User’s Guide
79
Chapter 3 Tutorials
8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click
Figure 61 Firefox: Add Security Exception
Cancel.
80
NSA-2401 User’s Guide
9 The login screen displays.
Figure 62 HTTPS Login
Chapter 3 Tutorials
Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so
by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s
certificate so they can check it before adding a security exception (as in steps 6 to 7 on pages
78 to 79). See the next section for how to use FTPES with the NSA for secure FTP transfers.
3.5.2 Using FTPES to Connect to the NSA
This section covers how to use FTP over Explicit TLS with the NSA for secure FTP transfers.
Before you go through this section, read Section 3.5.1 on page 68 to configure HTTPS. This
example uses FileZilla.
NSA-2401 User’s Guide
81
Chapter 3 Tutorials
1 Open FileZilla and click File > Site Manager > New Site.
Figure 63 FileZilla Site Manager
• Configure the Host field with the NSA’s address.
• Set the Servertype to FTPES - FTP over explicit TLS/SSL.
• Configure the account name and password.
• Click Connect.
82
NSA-2401 User’s Guide
Chapter 3 Tutorials
2 A security warning screen displays. The SHA1 fingerprint must match the NSA’s
certificate you downloaded from the NSA to your computer. (Double-click the NSA’s
certificate file and then click Details and look at the Thumbprint). If they match, click
OK.
Figure 64 FileZilla Unknown Certificate Warning
The shares and folders to which Gonzo has access display. Now you can use FTP to securely
transfer files to or from the NSA. Use a secure method to let your users know the correct
fingerprint for the NSA’s certificate so they can check it before adding a security exception.
3.5.3 Controlling Access to Shares, Folders, and Files
Gonzo wants to give Kermit and the senior management group read-only access to the
Strategy folder. However Kermit is not to see the 2010-2014-Plans file. The following
sections show how to configure the “Gonzo” share’s access settings and Access Control List
(ACL) settings.
3.5.3.1 Configuring the Share’s Access
First you need to give Kermit and the senior management read-only access to the share.
1 Click Sharing > Shares. Select the Gonzo share and click Edit Share.
Figure 65 Sharing > Shares
NSA-2401 User’s Guide
83
Chapter 3 Tutorials
2 Set the Share Access to Advanced and click Edit.
Figure 66 Sharing > Shares > Edit Share
3 Move Senior-Management and Kermit to Read Only. Click Apply in this screen and
Figure 67 Share Access Configuration
again in the edit screen.
84
NSA-2401 User’s Guide
3.5.3.2 Setting the ACL to Deny Access to a File
Now you need to stop Kermit from accessing the 2010-2014-Plans file.
1 Select the Gonzo share, and click ACL Properties.
You are done configuring the 2010-2014-Plans.doc file’s ACL settings. Only Gonzo can edit
or delete the files in the Strategy folder. Kermit and any member of the senior management
group can log into the NSA and view the contents of the Strategy folder, although Kermit
cannot see the 2010-2014-Plans.doc file.
88
NSA-2401 User’s Guide
3.6 Power Resume
T o keep the NSA operating as much of the time as possible, do the following to have the NSA
automatically restart when the power comes back on after a power failure.
Click Maintenance > Power Management. Select Always Power On and click Apply.
Figure 75 Maintenance > Power Management
Chapter 3 Tutorials
3.7 How to Use Backups and Snapshots
Use the NSA’s backup and snapshot features to backup your files and folders.
• Do snapshots frequently (hourly or daily for example) since they are faster than backups.
Snapshots help protect against accidental file loss or damage caused by hackers.
• Schedule backups for times when the network is not busy (like at night or on weekends).
For example, you might do daily backups of important individual files or folders and a
weekly general archive. You can save backups to another location so your files can
survive even if the original RAID or NSA fails.
NSA-2401 User’s Guide
89
Chapter 3 Tutorials
3.7.1 Creating a Snapshot Job
Here’s an example of configuring hourly snapshots for a volume.
1 Click Protect > Snapshot > Add Job.
Figure 76 Protect > Snapshot
90
NSA-2401 User’s Guide
Chapter 3 Tutorials
2 Enter a name for the job, select the volume of which to take snapshots, set the number of
snapshot images to keep (2 in this example). For the frequency, set it to occur every
hour. Click Apply.
"It’s strongly recommended to set the maximum amount of snapshots setting
as low as possible as a high amount of snapshots can significantly reduce the
volume’s file write performance.
Figure 77 Protect > Snapshot > Add Job
3.7.2 Configuring Snapshot Image Access
Taking a snapshot creates an image file that you use to restore files. By default, only the
administrator can access the snapshot images. You want to allow users to access snapshot
images in the shares that they use.
Click Protect > Snapshot > Snapshot Image Access to open the following screen. Then
select User Share Permissions and click Apply.
To use a snapshot to restore files, use the MyNSA screens, CIFS (Windows Explorer), or FTP
to browse to the folder named “snap-share”. Open or copy the folder or file that you want to
restore.
NSA-2401 User’s Guide
91
Chapter 3 Tutorials
For example, Gonzo accidently overwrote his 2009-Plan.doc file.
Use Windows Explorer to browse to the Gonzo share. (The Quick Start Guide covers how to
map a share to a Windows network drive).
Figure 79 Using a Snapshot Image
• There is a snap-share folder with a folder for each snap-shot of volume contents to which
Gonzo has access. A snap-shot folder’s name identifies the take number of the individual
snapshot, the time the snapshot was taken (in year month, day, hour, minute, second
format) and the name of the snapshot job.
• The take4_080904160008_hourly_example folder contains a 5yearPlan folder with a
2009-Plan.doc file. Gonzo can open the 2009-Plan.doc file or copy it to another location.
3.7.4 Creating a Synchronization Backup
Gonzo has an important folder that the German branch office uses on a daily basis. Because
Gonzo updates the files frequently , you decide to create a backup job that has the NSA publish
the contents of the folder to an NSA in the German branch office. To create a synchronization
backup:
1 Click Protect > Backup > Add Job.
Figure 80 Protect > Backup
92
NSA-2401 User’s Guide
Chapter 3 Tutorials
2 Name the backup job and select Synchronization.
Gonzo wants only his current set of files in the remote NSA’s folder, so you select
Mirror to make the target folder identical to the source folder. The NSA deletes any
other files in the target folder.
Figure 81 Protect > Backup > Add Job: Step 1
NSA-2401 User’s Guide
93
Chapter 3 Tutorials
3 Select the folder that needs to be mirrored (the Gonzo share’s Strategic-Partners folder
Figure 82 Protect > Backup > Add Job: Step 2
in this example) and Remote.
• Enter the other NSA’s address and administrator password.
• Click Show target content to display the remote NSA’s contents.
• Select the destination on the remote NSA (Backups in this example).
• Click Next.
94
NSA-2401 User’s Guide
Chapter 3 Tutorials
4 Click OK in the warning dialog box.
Figure 83 Protect > Backup > Add Job: Step 3
5 For this example, assume the connection to the German branch office is a good one and
not many files need to be backed up so leave the compression off.
• Turn on the encryption to protect these sensitive files during the transfer. The final
files stored on the remote NSA will be unencrypted (usable).
• Restrict the bandwidth usage to 256 KB/s to stop the archives from using all of your
network connection’s available bandwidth.
• You don’t have to configure a purge policy for a synchronization backup.
• Click Next.
Figure 84 Protect > Backup > Add Job: Step 3
NSA-2401 User’s Guide
95
Chapter 3 Tutorials
6 Schedule the backup to occur every morning at 3:00 and click Done.
Figure 85 Protect > Backup > Add Job: Step 4
You do not need to use a special restore process to use the files a synchronization backup
creates. The copy of files that the NSA creates on the other NSA’s Backups share can be used
directly by anyone with access to that share.
3.7.5 Creating an Archive Backup
To backup the NSA every week to a remote NSA:
1 Click Protect > Backup > Add Job.
Figure 86 Protect > Backup
96
NSA-2401 User’s Guide
Chapter 3 Tutorials
2 Identify the backup job and select Archive.
New files are often added to the shares that you need to back up and existing files are not
frequently changed so select Incremental. The NSA does a full backup first and later
only copies source files that are new and/or modified since the last backup. This example
sets the NSA to do another full backup after every four incremental backups.
Figure 87 Protect > Backup > Add Job: Step 1
NSA-2401 User’s Guide
97
Chapter 3 Tutorials
3 Select the volume1 check box to select all the folders and files.
Figure 88 Protect > Backup > Add Job: Step 2
Select Remote and enter the other NSA’s address, username, password, and share name.
If you want to make sure the remote NSA is reachable, click T est Connection.
98
NSA-2401 User’s Guide
Chapter 3 Tutorials
4 In this example, the target NSA is on the LAN so leave the compression off.
Security is already configured on the target NSA so you can leave the encryption of f,
too.
Have the NSA keep 3 backups.
Figure 89 Protect > Backup > Add Job: Step 3
5 Set the frequency to Weekly. Schedule the backup for 5:00 every Saturday morning.
Figure 90 Protect > Backup > Add Job: Step 4
3.7.6 Restoring Archived Files by Backup Job
If you have backup jobs for which the NSA has already performed backups, you can restore
the files based on the backup job. Gonzo accidently deleted all of the files in his share and
needs to do the following to restore them.
NSA-2401 User’s Guide
99
Chapter 3 Tutorials
1 Click Protect > Backup screen, select a backup job and click Restore Archive.