16
Protecting Your Data
16.1 Overview
This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD.
16.2 Protection Methods
There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.
Table 115 Overview of Protection Methods
SITUATION | ACTION |
Unexpected NSA behavior after | Back up the NSA configuration file before you |
configuration changes | make major configuration changes. |
|
|
Need to transfer data from your | Use the Memeo Autobackup program. |
computer to the NSA after volume(s) |
|
have been created |
|
|
|
Data infected by virus | Use |
| scan files before saving them onto the NSA. |
| Although this may be slow so you may want |
| to schedule it to occur while no one is using |
| the NSA. |
| Use a firewall with |
| your network. |
|
|
Hard drive malfunction. | Use RAID. |
|
|
NSA malfunction | Back up data to another NSA or external USB |
Network down | hard drive. |
| |
Natural disaster such as a fire or |
|
earthquake occurs where your NSA is |
|
located |
|
|
|
The following sections describe these methods in more detail. See Section 7.6.3 on page 169 for more information on RAID.
| 347 |
NSA320 User’s Guide | |
|
|