ZyXEL NSA-2401 User Guide - Page 258

Product Specifications, NSA-2401 User's Guide, Firmware Features continued, Change Password

Page 258 highlights

Chapter 13 Product Specifications Table 110 Firmware Features (continued) Disk Quota Use the disk quota feature to stop one user(s) from using up all disk capacity by setting a limit on how much storage space he/she may use. User Passwords Configure a password for an individual User to restrict access to the NSA. Non-admin users can change their own passwords by accessing the Web Configurator. The Change Password screen appears when a username other than "admin" is entered. Volume Encryption The NSA can create encrypted volumes so an attacker who removes the physical drive still cannot read the data. ACL The Access Control List (ACL) defines user read/write permissions for specific files and/or folders. Storage Event Logs The NSA can keep detailed records of all user access to files and folders. Workgroup and Domain Security Modes For Windows or Mac OSX users (using the Common Internet File System (CIFS) protocol for remote file access) you can configure Workgroup mode requiring users to log in with a user name and password. These user and group accounts are maintained on the NSA. For a large number of CIFS users where accounts are stored on an external server, you can use Domain security mode (Primary Domain Controller) Client Support Data can be shared among all Windows, Mac, Linux, and UNIX users that have FTP client software or CIFS file sharing support (such as Samba for Linux and UNIX users). IEEE 802.3d Ethernet Failover LAN2 can backup LAN1. If LAN1 loses its connection, LAN2 takes over LAN1's IP address and traffic. IEEE 802.3d Ethernet Load The NSA can distribute the traffic load across LAN1 and LAN2. Balance HTTP/HTTPS Access the NSA using a regular web connection (HTTP) or an encrypted web connection (HTTPS) using secure socket layer (SSL). SSL Certificate Manager The NSA can generate certificates and certificate requests. DHCP (Dynamic Host Configuration Protocol) DHCP (Dynamic Host Configuration Protocol) allows the NSA to obtain an IP address and subnet mask at start-up from a centralized DHCP server. Alternatively, you can give the NSA a static IP address and subnet mask. Full Network Management The embedded Web Configurator is an platform-independent webbased utility that allows you to easily access the NSA's management settings. Firmware Upload and Configuration File Management Upload new firmware to the NSA using the Web Configurator. You can also back up and restore the NSA configuration file containing all its settings to/from your computer. NSA Discovery Utility (NDU) Use the NDU from a Windows computer to find NSA(s) in your network, access the NSA login page, change its IP address configuration or map to a Windows network drive. Genie Backup Manager Genie Backup Manager is a tool for Windows users to create (and schedule) backups of data stored on their Windows computer to an NSA. S.M.A.R.T. The NSA can use the S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) monitoring system to detect and report on hard drive reliability indicators to help anticipate hard drive failures. 258 NSA-2401 User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362

Chapter 13 Product Specifications
NSA-2401 User’s Guide
258
Disk Quota
Use the disk quota feature to stop one user(s) from using up all disk
capacity by setting a limit on how much storage space he/she may
use.
User Passwords
Configure a password for an individual
User
to restrict access to the
NSA. Non-admin users can change their own passwords by
accessing the Web Configurator. The
Change Password
screen
appears when a username other than “admin” is entered.
Volume Encryption
The NSA can create encrypted volumes so an attacker who removes
the physical drive still cannot read the data.
ACL
The Access Control List (ACL) defines user read/write permissions for
specific files and/or folders.
Storage Event Logs
The NSA can keep detailed records of all user access to files and
folders.
Workgroup and Domain
Security Modes
For Windows or Mac OSX users (using the Common Internet File
System (CIFS) protocol for remote file access) you can configure
Workgroup
mode requiring users to log in with a user name and
password. These user and group accounts are maintained on the
NSA. For a large number of CIFS users where accounts are stored on
an external server, you can use
Domain
security mode (Primary
Domain Controller)
Client Support
Data can be shared among all Windows, Mac, Linux, and UNIX users
that have FTP client software or CIFS file sharing support (such as
Samba for Linux and UNIX users).
IEEE 802.3d Ethernet
Failover
LAN2 can backup LAN1. If LAN1 loses its connection, LAN2 takes
over LAN1’s IP address and traffic.
IEEE 802.3d Ethernet Load
Balance
The NSA can distribute the traffic load across LAN1 and LAN2.
HTTP/HTTPS
Access the NSA using a regular web connection (HTTP) or an
encrypted web connection (HTTPS) using secure socket layer (SSL).
SSL Certificate Manager
The NSA can generate certificates and certificate requests.
DHCP (Dynamic Host
Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol) allows the NSA to
obtain an IP address and subnet mask at start-up from a centralized
DHCP server. Alternatively, you can give the NSA a static IP address
and subnet mask.
Full Network Management
The embedded Web Configurator is an platform-independent web-
based utility that allows you to easily access the NSA’s management
settings.
Firmware Upload and
Configuration File
Management
Upload new firmware to the NSA using the Web Configurator. You
can also back up and restore the NSA configuration file containing all
its settings to/from your computer.
NSA Discovery Utility (NDU)
Use the NDU from a Windows computer to find NSA(s) in your
network, access the NSA login page, change its IP address
configuration or map to a Windows network drive.
Genie Backup Manager
Genie Backup Manager is a tool for Windows users to create (and
schedule) backups of data stored on their Windows computer to an
NSA.
S.M.A.R.T.
The NSA can use the S.M.A.R.T. (Self-Monitoring, Analysis, and
Reporting Technology) monitoring system to detect and report on
hard drive reliability indicators to help anticipate hard drive failures.
Table 110
Firmware Features (continued)