ZyXEL NSA-2401 User Guide - Page 165

TCP/IP, Windows/CIFS, Workgroup Security Mode, Windows Domain Security Mode, Active Directory Example

Page 165 highlights

Chapter 7 Network Screens " The NSA automatically restarts its network services after you apply changes in the TCP/IP or Windows/CIFS screens. Workgroup Security Mode A workgroup is a group of computers on a network that can share files. On the NSA, use Workgroup Security Mode if the user names and passwords for these computers are maintained on the NSA. This is suitable for users using the Common Internet File System (CIFS) protocol for remote file access in a small-to-medium sized office. Windows Domain Security Mode A domain is a group of computers that are part of a network and share a common directory database. On the NSA, use Windows domain security mode if you want centralized management of shared resources, services and user on a centralized Windows-based domain controller. You can create users and groups on the centralized Windows-based domain controller such as an active server directory, and the NSA checks this list when authenticating users and/or groups that seek access to a share. This is suitable for a large number of CIFS users where accounts are stored on an external server. A domain is organized in levels and is administered as a unit with common rules and procedures. Each domain has a unique name. You must be logged on as an administrator to your local computer and have a valid user name and password to join your computer to a domain. If you do not know which user name and password to use, contact your network administrator. The NSA automatically synchronizes its time and date with those on the external domain controller. Active Directory Example The next figure shows an example application for the NSA in a small office network. AD is an Active Directory that contains the user names and passwords of all users that are allowed access to the NSA. Users (U1, U2, U3) can all back up and share data on the NSA. Important data stored on servers S1 and S2 may be also stored there. It is recommended that you place the NSA behind a firewall and/or IDP device for protection. NSA-2401 User's Guide 165

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362

Chapter 7 Network Screens
NSA-2401 User’s Guide
165
The NSA automatically restarts its network services after you apply changes in
the
TCP/IP
or
Windows/CIFS
screens.
Workgroup Security Mode
A workgroup is a group of computers on a network that can share files. On the NSA, use
Workgroup Security Mode if the user names and passwords for these computers are
maintained on the NSA. This is suitable for users using the Common Internet File System
(CIFS) protocol for remote file access in a small-to-medium sized office.
Windows Domain Security Mode
A domain is a group of computers that are part of a network and share a common directory
database. On the NSA, use Windows domain security mode if you want centralized
management of shared resources, services and user on a centralized Windows-based domain
controller. You can create users and groups on the centralized Windows-based domain
controller such as an active server directory, and the NSA checks this list when authenticating
users and/or groups that seek access to a share. This is suitable for a large number of CIFS
users where accounts are stored on an external server.
A domain is organized in levels and is administered as a unit with common rules and
procedures. Each domain has a unique name. You must be logged on as an administrator to
your local computer and have a valid user name and password to join your computer to a
domain. If you do not know which user name and password to use, contact your network
administrator.
The NSA automatically synchronizes its time and date with those on the external domain
controller.
Active Directory Example
The next figure shows an example application for the NSA in a small office network. AD is an
Active Directory that contains the user names and passwords of all users that are allowed
access to the NSA. Users (U1, U2, U3) can all back up and share data on the NSA. Important
data stored on servers S1 and S2 may be also stored there. It is recommended that you place
the NSA behind a firewall and/or IDP device for protection.