Freedom9 4020 user manual To edit an existing shared folder

Page 43

Unauthorized users list includes User2 and User3. If you select Group1 and click “Add (Read-Only)”, Group1 moves to the Authorized groups list, but User2 and User3 do not move to the Authorized users list. This allows you to specify unique access rights for those users. For example, you could select User3 and click “Add (Read/Write)”. This willl mean that everyone in Group1 will have read-only access to the shared folder except User3, who will have read/write access to it. On the Shared Folders page, the group name in the Users with access column is preceded by an @ symbol.

To edit an existing shared folder:

For any shared folder that appears in the Shared folders list or any USB disk, you can change which users can access it and what level of access they have. Shared folders that are created as a result of creating Windows/OS X users do not appear in the Shared folders list and cannot be modified. These folders automatically provide only the associated user with read/write access to that folder.

Note: By default, all users have read/write access to the public folder. You can change the user assignments or access rights for the public folder.

When you add a user to the list of authorized users for a shared folder or USB disk, that change takes effect immediately. However, if you remove a user from the list of authorized users, or if you change the user’s access rights, the change does not take effect until that user disconnects from the shared folder or USB disk, or shuts down the computer.

For example, the user Alice might have read/write access to the Budget shared folder. If Alice is currently connected to that shared folder and you subsequently remove her from the list of authorized users or change her access level to read-only, she will continue to have read/write access to that folder until she disconnects or shuts down her computer. The next time she connects, she will either not have access (if she was removed from the list of authorized users), or she will be able to only view the files there (if her access level was changed).

To change user access to shared folders and USB disks:

1.In the Shared folders list, select the shared folder or USB disk whose user access you want to change.

2.Click “Assign Access”.

3.If you selected a shared folder or a USB disk to which you previously assigned users, go to step 6.

4.If you selected a USB disk to which you did not previously assign users, select the type of

43

Image 43
Contents Rev N0042000 FreeStorCopyright and Trademark Information Table of Contents Stopping a Backup or Recovery in Progress List of Figures 102 Terminology System Benefits and Key FeaturesProduct Specifications Package Contents Front Panel Requirements Rear PanelLAN port Serial ATA hard diskHard Drive Installation Installation and SetupAttaching the Hard Drive to the Tray Welcome Storage System Console InstallationReview your selections and click Next to proceed Figure To complete the installation, click Finish Figure Storage System Console System Setup10 System Initialization Screen 11 Welcome Screen Numbers, and hyphens. To proceed, click Next 15 Network Settings Page 17 Backup Calculator 18 Disk Space Distribution Web Management Interface Home Main MenuHome Connections UsersTo add a new user Add User NFS Add User To edit an existing user GroupsTo remove an existing user Groups To add a new group10 Add Group To edit an existing groupRemoving an existing group 11 Shared Folders Shared FoldersTo add a new shared folder 12 Add Shared Folder 14 NFS Add Shared Folder 15 Cifs Define Folder Permissions 16 NFS Define Folder Permissions To edit an existing shared folder To delete an existing shared folder 17 Backups Managing BackupsDeleting backups To change the recovery CD passwordDeleting a client Email Alerts18 Alerts Firmware Upgrades 19 Firmware USB Devices20 USB System Settings 21 System Network Settings 22 Network FreeStor 4020 User’s Manual 23 Disks Disk ConfigurationFreeStor 4020 User’s Manual 24 Disk Configuration 25 Disks to Back Up 26 Disk Space Distribution Shutting Down Logging Out29 Shut Down File Sharing Using My Computer or Windows ExplorerWindows Clients Using the Storage System Console Linux Clients FTP Clients Macintosh ClientsOther Mac operating systems System Backups with DiskSafe Express System Requirements Installing the Microsoft iSCSI Initiator ISCSI Initiator Warning Installing DiskSafe ExpressNET Framework License Agreement DiskSafe Express License Agreement DiskSafe Express Installation Completed Activating Your License Key Starting DiskSafe ExpressActivating your license without an Internet connection Replacing your existing license 11 DiskSafe Express Disk Selection Protecting Your Disks12 Add Storage System Recommendations13 Storage System Selection 14 Previously Backed Up Page 16 Recover CD Password Manually Backing Up Your Disk Stopping a Backup or Recovery in ProgressChanging the Recovery CD Password Changing the Backup ScheduleSystem Restoration with DiskSafe Express 18 Changing Recovery CD Password DialogRecovering Files From a Backup Page Recovering a Non-System Disk or Partition Recovering a System Disk or Partition Page Page Page Removing Protection Appendix ADisk Configurations Adding Hard Disks Adding hard disks to a linear or normal RAID configuration Figure B-1 Disk Change Notification Take the desired action 100 Removing or Replacing Hard DisksResponding to RAID degradation 102 Figure B-5 Disk Change Notification Page RAID Failure Swapping hard disksTransferring hard disks to a new storage system 105 Viewing the system log Appendix BTroubleshootingMac users Disconnecting from Shared FoldersWindows users Linux users108 Troubleshooting the DeviceResolution 110 Troubleshooting DiskSafe ExpressProblem The Status page indicates that the backup is offline Using DiskSafe Express Creating a Diagnostic FileUsing the recovery CD Appendix CGlossary 115

4020 specifications

The Freedom9 4020 is a cutting-edge network interface device designed for a variety of applications, ranging from home use to small business environments. This versatile device is praised for its robust performance, extensive connectivity options, and user-friendly features, making it an excellent choice for those seeking a reliable network solution.

One of the standout characteristics of the Freedom9 4020 is its advanced wireless capabilities. It supports dual-band Wi-Fi, allowing users to connect to both 2.4 GHz and 5 GHz frequencies. This feature ensures optimal performance by minimizing interference and maximizing speed, making it ideal for high-bandwidth tasks such as streaming and gaming.

In terms of connectivity, the Freedom9 4020 is equipped with multiple Ethernet ports, enabling wired connections for devices that require stable and fast internet access. These ports support Power over Ethernet (PoE), which simplifies installation by eliminating the need for separate power supplies for each connected device. This is particularly beneficial in settings where devices like IP cameras or VoIP phones are deployed.

Another key feature is the device's support for advanced security protocols. The Freedom9 4020 utilizes WPA3 encryption, providing enhanced protection for connected networks. This is crucial in today’s environment, where cybersecurity threats are increasingly prevalent. The device also includes features like a built-in firewall and VPN support, enabling secure remote access for users.

The Freedom9 4020 is designed with scalability in mind. Organizations can seamlessly integrate it into existing networks and expand as their needs grow. This flexibility makes it suitable for various applications, from home automation systems to small business networks.

The user interface is intuitive, featuring a web-based management platform that allows users to monitor and control their network easily. This system provides real-time insights into network performance, making troubleshooting straightforward.

Overall, the Freedom9 4020 stands out as a versatile and powerful networking solution. With its robust wireless performance, extensive connectivity options, strong security features, and user-friendly interface, it meets the demands of modern users looking for reliability and efficiency in their network devices.