USER GUIDE Network Storage System with 2 Bays Model: NAS200
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Drive Bay Doors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Appendix E: Software License Agreement 41 Software in Linksys Products . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Network Storage System with 2 Bays. It features two SATA hard drive bays so you can add storage space to your network. There are also two USB ports that let you add USB hard drives for additional storage space, or you can connect a USB flash disk to access your portable files. (USB hard drives may require external power supplies.
Product Overview Chapter 1 USB 2 The USB 2 port connects to your second USB storage device. Press the USB 2 button to eject the device from the USB 2 port. After the Network Storage System beeps once and the USB 2 LED powers off, you can remove the device. RESET The RESET button has two functions: •• To reset the network settings, such as the IP address, of the Network Storage System, press and hold this button for two seconds.
Configuration Using the Setup Wizard Chapter 2 Chapter 2: Configuration Using the Setup Wizard 3. You have multiple options on this screen: After first-time installation of the Network Storage System with the Setup Wizard (located on the CD-ROM), the Network Storage System is ready for use. However, additional configuration is available with the Setup Wizard and web-based utility.
Configuration Using the Setup Wizard Chapter 2 2. For the public folder, keep the default drive letter, or select a different letter from the drop-down menu. Click Next. 5. The network drive(s) are mapped to your computer. Click Exit to exit the Setup Wizard, or click Next to return to the Welcome screen. Map Network Drive 3. To install the Linksys Network Drive Mapping Utility on your computer, click Yes. Network Drive Mapped The computer has been configured.
Configuration Using the Setup Wizard Chapter 2 1. Click Set up Second Drive. Physical Installation of the Second Hard Drive Set up Second Drive 2. The Setup Wizard explains that these instructions cover the physical installation and drive configuration. Click Next. 4. The Setup Wizard automatically searches for any Network Storage System on your network. If it is not detected, check its cable connections, and make sure it is powered on. Click Search Again to locate the Network Storage System.
Configuration Using the Setup Wizard Chapter 2 5. Select the appropriate configuration for your drive usage: 6. Review the new settings. If they are correct, click Save. If you would like to change them, click Back to return to the previous screen. NOTE: If you change the drive configuration setting (for example, from Separate Disks to RAID 1), both drives will be reformatted and all current data will be erased. Back up any preexisting data before reconfiguring your drives.
Configuration Using the Setup Wizard Chapter 2 8. Click Set up Computer. 12. The network drive(s) are mapped to your computer. Click Exit to exit the Setup Wizard, or click Next to return to the Welcome screen. Set up Computer 9. For the public folder of the second hard drive, keep the default drive letter, or select a different letter from the drop-down menu. Click Next.
Configuration Using the Setup Wizard Chapter 2 2. Click Install. 5. Enter your information in the User Name and Company Name fields. Then select the users of the backup software: •• Anyone who uses this computer (all users) •• Only for me Install Backup Software Click Next. 3. The InstallShield Wizard appears. Click Next. User Information Begin Installation of Backup Software 6. Keep the default installation folder, or click Browse to select a different folder. Click Next. 4.
Configuration Using the Setup Wizard Chapter 2 Double-click the desktop icon to access the software. 3. The Setup Wizard notifies you that a user name and password are required for access. Click OK. Desktop Icon for Backup Software For more information, click Help on the main menu of the backup software. Advanced Setup Follow the instructions to access the web-based utility through the Setup Wizard. 1. Click Advanced Setup. User Name and Password Required 4.
Configuration Using the Setup Wizard Chapter 2 2. Click Yes. 9. The shared folder automatically opens in a separate window. Repeat steps 5-8 to map additional network drives. Install Drive Mapping Utility 3. The Setup Wizard automatically installs the utility. Click OK. 10. To exit the utility, click Close on the Shared Folder Mapping screen. For more information about the utility, refer to “Chapter 4: Use”. User Guide Click this option to access the pdf of this User Guide.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration The web-based utility appears. NOTE: When first installing the Network Storage System, you should use the Setup Wizard on the Setup CD-ROM. If you want to configure advanced settings, use this chapter. After setting up the Network Storage System with the Setup Wizard (located on the CD-ROM), it is ready for use. If you want to change its advanced settings, use the webbased utility.
Advanced Configuration Chapter 3 Login My Files > My Downloads The login you use to access your files is displayed. If the Download Manager feature has been enabled through the Administration > System Options screen and your login has Download Manager access, then the My Downloads screen will be available. Configure download tasks on this screen. My Files > Files Shared Folders The Files screen displays a list of shared folders that you can access, according to your user account.
Advanced Configuration Chapter 3 My Files > Personal Info Change your password on this screen. Folders Browser –– Current Folder Select the location of the shared folder that you want to specify as the current folder. –– New Folder To create a new folder, enter its name, and then click Create. Select the new folder from the list, and its path appears in the Current Folder field. Click Apply to save the location. Click Close to exit this screen.
Advanced Configuration Chapter 3 Disk Status Information about the hard drive(s) is displayed. Internal Disks Volume Mode The disk configuration is displayed. Volume Status The format status of each hard drive is displayed. Disk 1-2, LVM, RAID 1, or RAID 0 The amount of free and total space is displayed. Information The Model number and Status of each hard drive are displayed. External Disks Log File Click Refresh for the most up-to-date information. Click Clear to remove all entries.
Advanced Configuration Chapter 3 •• Password Enter the password this user will use to access the Network Storage System. •• Verify Password Enter the password again. •• Allow Download Manager Access If you want to allow this user to use the Download Manager, then select this option. •• Allow Download Manager Access If you want to allow this user to use the Download Manager, then select this option.
Advanced Configuration Chapter 3 Administration > Shared Folders The Shared Folders screen allows you to create and manage shared folders. Within a shared folder, users with access to that shared folder can create other folders and files. Folders Browser –– Current Folder Select the location of the shared folder that you want to specify as the current folder. –– New Folder To create a new folder, enter its name, and then click Create.
Advanced Configuration Chapter 3 •• Location The location cannot be changed. •• WINS •• Display Name Change the display name of the folder. •• DDNS Punctuation and other special characters (for example, * / | \ ) cannot be used in the name. •• Description Change the description of the folder. Click Save to save your changes, or click Cancel to clear your changes.
Advanced Configuration Chapter 3 •• Network Mask Enter the Network or Subnet Mask, which must match the Subnet Mask of the other devices on your network. The default is 255.255.255.0. Gateway If you have a router on your network, enter its IP address. The default is 192.168.1.1. DNS Server Obtain DNS Server Addresses from DHCP Server If you have a router or other DHCP server on your network, select this option. Use Fixed DNS Server Addresses If you want to set specific DNS settings, select this option.
Advanced Configuration Chapter 3 DDNS •• NTP Server To use a pre-selected NTP server, select The Network Storage System offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address, so you can locate the Network Storage System without knowing its dynamic Internet IP address. For example, assign the Network Storage System the fixed host and domain name of www.mystorage.com.
Chapter 3 Scheduled Shutdown Shutdown Select the day and time you want the automatic shutdown to occur. Keep the default, Never, if you want to manually initiate the shutdown. (When the Network Storage System is shut down, you will have to manually power on the Network Storage System.) Shutdown Now Click this option to shut down the Network Storage System immediately.
Advanced Configuration Chapter 3 Current Firmware Use this section to search for updated firmware. Restore Click Restore to restore a previously saved configuration file. The Restore Configuration File screen appears. Current Firmware Version The firmware version of the Network Storage System is displayed. Check for Upgrade Click this option to visit the Linksys website, www.linksys.com, and check for updated firmware. Follow the on-screen instructions.
Advanced Configuration Chapter 3 Directory The path and name of the selected folder are displayed. All If you wish, each directory can be limited to a specific media type. The default setting, All, scans for all content types. Select the appropriate media type(s): All, Music, Picture, or Video. Content Scan Specify the scan behavior of the media server.
Advanced Configuration Chapter 3 WARNING: Before you format drive(s), back up pre-existing data because all data on your drive(s) will be erased when they are formatted. remaining memory, and additional partitions cannot be created. Click Apply to save your changes, or click Cancel to clear all changes. NOTE: The settings on this screen will vary depending on the disk configuration. A single drive is listed as Disk 1. Two drives are listed as Disk 1 and 2 when they are configured as Separate Disks.
Advanced Configuration Chapter 3 Self-Monitoring Analysis and Reporting Technology (S.M.A.R.T.) can warn you of impending drive problems before the drive fails. Disk 1-2, LVM, RAID 1, or RAID 0 The S.M.A.R.T. status of the drive is displayed. Click Test Now to begin the S.M.A.R.T. check. Standby The drive(s) go into standby mode after the specified period of idle time. During standby mode, the Network Storage System uses less energy and emits less heat. If the fan powers off, then noise is also reduced.
Chapter 3 Advanced Configuration Maximum Security Mirroring (RAID 1) Disk 1 is mirrored into Disk 2. Total capacity is equal to the capacity of the smaller disk. NOTE: Mirroring (RAID 1) and Striping (RAID 0) require two hard drives. Maximum Speed Striping (RAID 0) Disk 1 and Disk 2 are striped into one logical volume. Total capacity is equal to two times the smaller capacity of the two disks. Click Save to save your change.
Use Chapter 4 Chapter 4: Use This chapter describes access rights, access methods, and use of USB storage devices. WARNING: Do not block the air vents, and do not stack devices on top of the Network Storage System; otherwise, overheating can occur. (Air vents are located on the sides of the Network Storage System. Keep the area around the Network Storage System clear.) Web Access To access the Network Storage System from any computer using a web browser, follow these instructions: 1.
Use Chapter 4 NOTE: The Download Manager feature lets you specify download tasks for the Network Storage System. The advantage is that the Network Storage System can run the download task separately, without using your computer. For example, if you order a movie online, then you can have the Network Storage System—instead of your computer—download the movie. My Files > Files The Files screen displays a list of folders that you can access, according to your user account.
Use Chapter 4 4. Enter your new password in the New Password and Confirm New Password fields. 5. Click Save to save your new password, or click Cancel to clear your change. Folders Browser –– Current Folder Select the location of the shared folder that you want to specify as the current folder. –– New Folder To create a new folder, enter its name, and then click Create. Select the new folder from the list, and its path appears in the Current Folder field. Click Apply to save the location.
Use Chapter 4 2. After the Network Storage System beeps once and the appropriate USB LED powers off, disconnect the device. 3. The Shared Folder Mapping screen appears. Select the appropriate Network Storage System. You can also use the Network Drive Mapping Utility to remove the device. This is explained in the following section, “How to Use the Network Drive Mapping Utility”.
Use Chapter 4 How to Remove a USB Storage Device Program Folder 1. Right-click the icon in the system tray. 2. Click Safely Remove USB Device. If the utility is inactive, its icon is not displayed in the system tray. 3. Select the appropriate USB storage device, and click Eject. If you do not see the device you want, click Refresh. If you need to map a shared folder or USB storage device, or you need to remove a USB storage device, then proceed to the “Activate the Utility” section.
Appendix A Appendix A: Troubleshooting The Setup Wizard does not detect any Network Storage Systems. Follow these instructions until your problem is solved: 1. Make sure the Network Storage System is powered on. 2. Check the cable connections of the Network Storage System. 3. Make sure your computer and the Network Storage System are on the same network segment. (If you do not have a router, then skip this step.) 4. In all Windows operating systems, the TCP/IP protocol is installed by default.
Appendix A NOTE: Windows uses the computer name as the default user name on the login screen. To create a new Windows user name, enter a new user name and password on the login screen. Troubleshooting WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com You connected the USB flash disk to the Network Storage System and mapped it as a drive. Now you have disconnected the USB flash disk from the Network Storage System and connected it directly to your computer.
Specifications Appendix B Appendix B: Specifications Model NAS200 Standards IEEE 802.3, IEEE 802.3u Ports Power, Ethernet, USB 1, USB 2 Buttons Power, USB 1, USB 2, RESET, BACK UP LEDs Power, Ethernet, Disk (Act, Full, 1, 2), USB 1, USB 2 Cabling Type UTP CAT5 or Better Security Features User Name and Password for Both System Administration and File Access Environmental Dimensions 6.69" x 4.49" x 7.68" (170 x 114 x 195 mm) Weight 1.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix C Warranty Information rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Appendix D Appendix D: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix E your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulat
Appendix E GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
Appendix E c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix E 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix E GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix E freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix E Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Appendix E Software License Agreement b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. 8.
Software License Agreement Appendix E software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
Appendix E Software License Agreement OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights reserved. Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). 1.
Appendix E Software License Agreement DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.