What's new

New to NAS - Buying Advice for 4-Bay NAS

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Just curious as I've been hearing this a lot: does QNAP have more difficult software to understand than synology. I mean substantially more complicated?

I just switched from Synology to Qnap. IMO the Synology UI looks fancier, but for some reason I could never quite get my head around how different things where grouped so even after years I still ended up searching for whatever I was finding. With Qnap the UI seems more logical and consistant with the exception of "HD Station" which is separated from other apps.

I would imagine both will allow you to do what you want, and it could really be up to preference which one seems easier and more logical.
 
I was considering this after I saw the list for the NAS on this website: http://www.newegg.com/Product/Produ...yMark=False&IsFeedbackTab=true#scrollFullInfo

Quick Question does this have remote access, so when I visit America, will I be able to access my NAS for free? And am I able to give access to other people via a password or some other form of verification. Thanks.

Almost everything has remote access today, as does the TS 453 Pro.

Whether you can access it for free though depends on many factors, including the VPN service you want to use, the ISP's you can connect to in America and the level of interaction and performance you want with the device.

Theoretically? Yes, it should be possible to do what you seem to be asking. The details to get there though may make the water a little more murky though. And may take more cash than 'free'. :)
 
@Sohaib Najam
Be sure to try the on-line demos of the NAS user interface - at the web sites for Synology and QNAP. Maybe others too. But those two are my recommended "short list"

remote access. .. yes. Be sure to buy (low cost) an SSL certificate, install, and allow remote access only with a complex password, and do so for all with admin/root privileges. Also, run access on other than port 22 and other popular hackable ports.

Turn off remote access when not needed.
There's a barrage of hackers - mine was about 20 an hour and my IP address is rather arcane but is in the DNSes and thus is a honeypot being new in the DNS updates.
 
Case in point - here's my current real-time blackhole list for ssh...

Those SSH brute force attacks, they get blackholed for 24 hours... before putting in some rules for fail2ban and ufw, it was thousand plus an hour...

To Action From
-- ------ ----
OpenSSH DENY 58.218.211.166
OpenSSH DENY 189.126.26.114
OpenSSH DENY 188.209.52.16
OpenSSH DENY 180.211.206.75
OpenSSH DENY 121.22.127.70
OpenSSH DENY 109.161.185.91
OpenSSH DENY 117.253.146.231
OpenSSH DENY 109.161.253.243
OpenSSH DENY 118.244.254.16
OpenSSH DENY 117.3.71.234
OpenSSH DENY 84.42.49.34
OpenSSH DENY 218.65.30.61
OpenSSH DENY 201.90.110.178
OpenSSH DENY 117.244.25.48
OpenSSH DENY 177.135.145.86
OpenSSH DENY 218.87.111.109
OpenSSH DENY 87.5.87.198
OpenSSH DENY 187.49.248.177
OpenSSH DENY 109.161.238.108
OpenSSH DENY 117.253.144.234
OpenSSH DENY 46.105.145.133
OpenSSH DENY 188.234.139.74
OpenSSH DENY 109.161.232.164
OpenSSH DENY 87.8.251.253
OpenSSH DENY 217.149.81.243
OpenSSH DENY 117.253.174.21
OpenSSH DENY 117.253.179.67
OpenSSH DENY 94.79.196.62
OpenSSH DENY 182.74.224.194
OpenSSH DENY 117.245.5.42
OpenSSH DENY 117.253.230.18
OpenSSH DENY 117.243.195.21
OpenSSH DENY 46.138.58.0
OpenSSH DENY 79.35.197.221
OpenSSH DENY 117.247.5.121
OpenSSH DENY 87.241.34.11
OpenSSH DENY 125.21.241.130
OpenSSH DENY 109.161.250.104
OpenSSH DENY 109.161.140.134
OpenSSH DENY 195.239.151.238
OpenSSH DENY 92.223.235.183
OpenSSH DENY 212.83.177.91
OpenSSH DENY 85.202.225.22
OpenSSH DENY 113.195.145.12
OpenSSH DENY 92.50.150.14
OpenSSH DENY 115.119.66.246
OpenSSH DENY 5.99.59.186
OpenSSH DENY 61.139.5.22
OpenSSH DENY 91.187.117.230
OpenSSH DENY 195.154.53.81
OpenSSH DENY 119.164.254.57
OpenSSH DENY 218.87.111.118
OpenSSH DENY 31.197.145.82
OpenSSH DENY 218.26.1.82
OpenSSH DENY 81.222.201.5
OpenSSH DENY 85.132.184.79
OpenSSH DENY 177.92.138.96
OpenSSH DENY 177.87.238.189
OpenSSH DENY 69.73.58.36
 
Re deny list... mine shows the username that was attempted. Does yours? Sometimes funny.

I have mine blacklisted indefinitely (until the list fills and they purge oldest)

I also have some domains blacklisted (like China where most attacks come from per my logs).
 
The usernames show up in a different report - Logwatch parses the logs and shows it there - most of the attempts are root, but I've seen a lot of admin, ubnt, and other default usernames - I think they're looking for specific devices out there with known vulnerabilities..

That deny list I posted earlier is from UFW status...
 
Thanks for all of the help everyone, I'm just going to wait a little while to let the NAS drop in price as with the hard drives, it ended up costing above $1400.00. But I'll definitely be going with QNap, as it offers a lot more oomph for the money.
 
I chose to go with a 2-bay rather than a 4-bay. I did not want RAID - I use two volumes, 2 drives. One auto-backs-up the other. And there's a USB3 drive for backup - that's needed no matter what NAS.

Much less expensive than a 4 bay.

I've had this DS212 (Synology) for 2+ years now, updated to latest software. Problem free. It now has 2x 3TB WD red drives (on sale recently for $89.)
 

Similar threads

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top