Part iv: maintenance and protecting data – ZyXEL Communications NSA210 User Manual

Page 17

Advertising
background image

Table of Contents

NSA210 User’s Guide

17

14.2 What You Can Do ............................................................................................................ 293
14.3 The Shares Screen ......................................................................................................... 294

14.3.1 Adding or Editing Share ........................................................................................ 296
14.3.2 Configuring Advanced Share Access .................................................................... 297
14.3.3 Public and ANONYMOUS Share Access Rights ................................................... 298

14.4 The Recycle Bin Configuration Screen ........................................................................... 299

14.4.1 Recycle Bins .......................................................................................................... 299
14.4.2 Configuring Recycle Bins ....................................................................................... 299

14.5 The Share Browser Screen ............................................................................................ 300

14.5.1 Moving or Copying Files ........................................................................................ 302

Part IV: Maintenance and Protecting Data......................................... 303

Chapter 15
Maintenance Screens ........................................................................................................... 305

15.1 Overview .......................................................................................................................... 305
15.2 What You Can Do ............................................................................................................ 305
15.3 The Power Management Screen .................................................................................... 306

15.3.1 Editing the Power Control Schedule Screen ......................................................... 308

15.4 The Log Screen .............................................................................................................. 310

15.4.1 Report Config Screen ............................................................................................. 311
15.4.2 Email Setting ......................................................................................................... 311
15.4.3 Report Setting ....................................................................................................... 312
15.4.4 Syslog Server Setting ............................................................................................ 313

15.5 The Configuration Screen ............................................................................................... 314
15.6 SSL Certification ............................................................................................................. 315

15.6.1 Modifying or Creating a Certificate ........................................................................ 317

15.7 The Firmware Upgrade Screen ..................................................................................... 318
15.8 The Shutdown Screen .................................................................................................... 319
15.9 Technical Reference ........................................................................................................ 319

15.9.1 Log Classes ........................................................................................................... 320
15.9.2 Log Severity Levels ................................................................................................ 320
15.9.3 Log Messages ........................................................................................................ 320

Chapter 16
Protecting Your Data ............................................................................................................ 329

16.1 Overview .......................................................................................................................... 329
16.2 Protection Methods .......................................................................................................... 329
16.3 Configuration File Backup and Restoration ..................................................................... 330
16.4 Memeo Autobackup ......................................................................................................... 330

16.4.1 Memeo Autobackup Installation and Setup ............................................................ 330

Advertising