Feeds
80%

ZyXel NSA-2400 network attached storage box

Four-drive central storage for your LAN

The Power of One Infographic

Plug the machine in, hook it up to your network - in our case, the Register Hardware wireless router - turn it on and, after a minute while it starts up, you're ready to go. All the NSA-2400's configuration options can be accessed through a web browser, so it's easy to manage on a cross-platform network. Well, almost. If your router automatically hands out network addresses, you'll need to run ZyXel's NSA Discovery Utility to sniff out the box's IP number so you can type it into your browser. Unfortunately, the utility is Windows only.

ZyXel NSA-2400 NAS box
Zyxel's NSA-2400: drive status screen
Click for full-size image

You can, of course, administer the NSA-2400 using more Windows-only software, but we chose to do it through the browser. This displays the customary status display, along with, on the left-hand side of the screen, hierarchical menu access to the various groups of settings: users, the network, the drives, back-up and maintenance.

However, you're more likely to set up the NAS box by running the set-up Wizard, which guides you through the basics: configure how the NSA-2400 connects to the network, set up the drives, decide whether you want to enable FTP access, choose how the NSA-2400 logs problems - and whether you want it to email reports, set the server's clock, and finally add users and groups.

You'll need to access the settings directly if you want to set up things like back-up routines - to back up the back-up to another NSA-2400 or an external hard drive, if you have one big enough - save data change snapshots, make a copy of the configuration files and so on.

The browser screens are well laid out, but we found them frequently slow to load, leaving us wondering if anything was going to happen.

Assigning private space to named users is straightforward. You can give each of them a quota, though the NSA-2400 will happily let you assign more storage than it has available. You can also set up public and shared folders on the NSA-2400, and again that's easy to do. Sharing is handled using SMB/CIFS.

Disk setup can only be run through the Wizard, which makes sense since you're probably only going to want to do this once. Thoughtfully, ZyXel separated the drive and the system set-up into two Wizards - though the latter will invoke the former if you want it to - making it easy to change the drive configuration without running through the complete set-up process. That said, the Wizard doesn't automatically recreate users' private spaces after you've reconfigured the drive, leaving you to add all these back manually. User and Group data is retained.

Top three mobile application threats

Next page: Verdict

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.