ZyXEL Communications NSA210 Home Theater Server User Manual


 
Table of Contents
NSA210 User’s Guide
17
14.2 What You Can Do ............................................................................................................ 293
14.3 The Shares Screen ......................................................................................................... 294
14.3.1 Adding or Editing Share ........................................................................................ 296
14.3.2 Configuring Advanced Share Access .................................................................... 297
14.3.3 Public and ANONYMOUS Share Access Rights ................................................... 298
14.4 The Recycle Bin Configuration Screen ........................................................................... 299
14.4.1 Recycle Bins .......................................................................................................... 299
14.4.2 Configuring Recycle Bins ....................................................................................... 299
14.5 The Share Browser Screen ............................................................................................ 300
14.5.1 Moving or Copying Files ........................................................................................ 302
Part IV: Maintenance and Protecting Data......................................... 303
Chapter 15
Maintenance Screens ...........................................................................................................305
15.1 Overview .......................................................................................................................... 305
15.2 What You Can Do ............................................................................................................ 305
15.3 The Power Management Screen .................................................................................... 306
15.3.1 Editing the Power Control Schedule Screen ......................................................... 308
15.4 The Log Screen .............................................................................................................. 310
15.4.1 Report Config Screen ............................................................................................. 311
15.4.2 Email Setting ......................................................................................................... 311
15.4.3 Report Setting ....................................................................................................... 312
15.4.4 Syslog Server Setting ............................................................................................ 313
15.5 The Configuration Screen ............................................................................................... 314
15.6 SSL Certification ............................................................................................................. 315
15.6.1 Modifying or Creating a Certificate ........................................................................ 317
15.7 The Firmware Upgrade Screen ..................................................................................... 318
15.8 The Shutdown Screen .................................................................................................... 319
15.9 Technical Reference ........................................................................................................ 319
15.9.1 Log Classes ........................................................................................................... 320
15.9.2 Log Severity Levels ................................................................................................ 320
15.9.3 Log Messages ........................................................................................................ 320
Chapter 16
Protecting Your Data ............................................................................................................329
16.1 Overview .......................................................................................................................... 329
16.2 Protection Methods .......................................................................................................... 329
16.3 Configuration File Backup and Restoration ..................................................................... 330
16.4 Memeo Autobackup ......................................................................................................... 330
16.4.1 Memeo Autobackup Installation and Setup ............................................................ 330