Справочник Пользователя для ZyXEL Communications NSA-2401
NSA-2401 User’s Guide
197
C
H A P T E R
9
Protect Screens
9.1 Protection Methods Overview
This chapter introduces different ways of protecting data on the NSA and explains how to use
the Protect screens to create and schedule snapshots and backups.
the Protect screens to create and schedule snapshots and backups.
There are a variety of ways to protect your data on the NSA. Below is a summary table of
preventative steps you should do in advance to protect against various problems.
preventative steps you should do in advance to protect against various problems.
Table 67 Protection Methods Overview
PROBLEM
RECOMMENDED PREVENTATIVE ACTION
Unexpected NSA behavior after
configuration changes
configuration changes
Back up the NSA configuration file before you make
major configuration changes.
major configuration changes.
(On Your Computer)
Corrupt data files
Data infected by virus
Data files incorrectly deleted or modified
Corrupt data files
Data infected by virus
Data files incorrectly deleted or modified
Use the Genie Backup Manager.
Use anti-virus software on your computer.
Use anti-virus software on your computer.
(On the NSA)
Corrupt data files
Data infected by virus
Data files incorrectly deleted or modified
Corrupt data files
Data infected by virus
Data files incorrectly deleted or modified
Create regular snapshots (recommended for volumes
with data that changes often).
Use anti-virus software on your computer to scan files
from others before saving them on the NSA.
You can also use anti-virus software on your computer
to scan the NSA for viruses.
with data that changes often).
Use anti-virus software on your computer to scan files
from others before saving them on the NSA.
You can also use anti-virus software on your computer
to scan the NSA for viruses.
(On the NSA)
Hard drive malfunction.
Hard drive malfunction.
Use RAID.
NSA malfunction
Network down
Natural disaster such as a fire or earthquake
occurs where your NSA is located
Network down
Natural disaster such as a fire or earthquake
occurs where your NSA is located
Back up data to another NSA or computer or an external
USB hard drive.
USB hard drive.
Hacking
Place the NSA behind a hardware-based firewall. Ideally
the firewall should include deep packet inspection, IDP
(Intrusion Detection and Prevention), and anti-virus (like
ZyXEL’s ZyWALL USG products for example).
Configure strong user passwords and Access Control
List (ACL) settings. See
the firewall should include deep packet inspection, IDP
(Intrusion Detection and Prevention), and anti-virus (like
ZyXEL’s ZyWALL USG products for example).
Configure strong user passwords and Access Control
List (ACL) settings. See
for
details.
Use HTTPS for Web Configurator access to the NSA
(see
Use HTTPS for Web Configurator access to the NSA
(see
).
Theft of files by removing the physical hard
drives.
drives.
Store sensitive data in encrypted NSA volumes (see
page
page