NSA-220 Network Storage Appliance User’s Guide Version 1.00 3/2007 Edition 1 www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the web configurator. A basic knowledge of TCP/IP networking concepts and topology will be helpful. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. 1 " Warnings tell you about things that could harm you or your device. Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NSA may be referred to as the “NSA”, the “device” or the “system” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device.
Safety Warnings Safety Warnings 1 For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device.
Safety Warnings NSA-220 User’s Guide 7
Safety Warnings 8 NSA-220 User’s Guide
Contents Overview Contents Overview Introduction ............................................................................................................................ 23 Getting to Know Your NSA ........................................................................................................ 25 Web Configurator Basics ........................................................................................................... 29 Tutorials ........................................................
Contents Overview 10 NSA-220 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 4 Safety Warnings........................................................................................................................ 6 Contents Overview .......................................................
Table of Contents 2.6.2 Navigation Panel ........................................................................................................ 40 2.6.3 Main Window .............................................................................................................. 42 2.6.4 Status Messages ........................................................................................................ 42 2.6.5 Common Screen Icons ...........................................................................
Table of Contents 6.4.3 RAID 1 ........................................................................................................................ 67 6.4.4 RAID and Data Protection .......................................................................................... 67 6.5 Disks .................................................................................................................................... 68 6.5.1 External Disks .................................................................
Table of Contents 10.1 Shares Introduction ........................................................................................................... 89 10.1.1 Share Icons .............................................................................................................. 89 10.1.2 Shares Screen ......................................................................................................... 89 10.2 Adding a New Share .......................................................................
Table of Contents 15.3.1 Reset the NSA ........................................................................................................114 15.3.2 Enabling Scripting of Safe ActiveX Controls ...........................................................115 15.4 I Cannot Access The NSA ................................................................................................116 15.5 External USB drives .................................................................................................
Table of Contents 16 NSA-220 User’s Guide
List of Figures List of Figures Figure 1 Example of the NSA in a Home Network ................................................................................. 25 Figure 2 NSA Front Panel ..................................................................................................................... 26 Figure 3 NSA Rear Panel ...................................................................................................................... 27 Figure 4 NDU Main Screen ...............................
List of Figures Figure 39 Delete a Volume Warning Screen .......................................................................................... 62 Figure 40 Create a New Internal Volume .............................................................................................. 69 Figure 41 Edit an Internal Volume ......................................................................................................... 70 Figure 42 Create a New External Volume ..........................................
List of Figures Figure 82 Red Hat 9.0: Checking TCP/IP Properties .......................................................................... 142 Figure 83 Pop-up Blocker ..................................................................................................................... 143 Figure 84 Internet Options: Privacy ...................................................................................................... 144 Figure 85 Internet Options: Privacy .........................................
List of Figures 20 NSA-220 User’s Guide
List of Tables List of Tables Table 1 LEDs ......................................................................................................................................... 27 Table 2 User-level Global Labels and Icons .......................................................................................... 32 Table 3 My NSA ..................................................................................................................................... 33 Table 4 My NSA Share Browsing ........
List of Tables Table 39 Maintenance > Configuration ................................................................................................ 101 Table 40 Maintenance > FW Upgrade ................................................................................................. 102 Table 41 Maintenance > Shutdown ..................................................................................................... 102 Table 42 Overview of Protection Methods .............................................
P ART I Introduction Getting to Know Your NSA (25) Web Configurator Basics (29) Tutorials (43) Status Screen (45) 23
CHAPTER 1 Getting to Know Your NSA This chapter covers the main features and applications of the NSA. 1.1 NSA Overview The NSA (Network Storage Appliance) provides file sharing and data backup for your home network. • • • • Use SATA (Serial Advanced Technology Attachment) I or 3.0 Gbit/s hard disks. RAID (Redundant Array of Independent Disks) protects your data even if a hard disk fails. You can expand the NSA’s storage capacity with USB devices (like hard drives).
Chapter 1 Getting to Know Your NSA " See the product specifications appendix for a more detailed list of NSA features and lists of compatible hard drives and USB devices. Refer to the Quick Start Guide for hardware connections and how to install and remove hard drives from the disk trays. " Turn off and disconnect the NSA before you install or remove internal hard drives. 1.1.1 LEDs The NSA LEDs (lights) tell you important information.
Chapter 1 Getting to Know Your NSA Figure 3 NSA Rear Panel This table describes the NSA’s LEDs. Table 1 LEDs LED COLOR POWER Blue HDD1/ HDD2 Green OrangeA Red SYS Green Red NSA-220 User’s Guide STATUS DESCRIPTION On The NSA is turned on and receiving power. Off The NSA is turned off. On The hard disk drive is connected properly to the NSA. Blinking The NSA is saving data to the hard disk drive. On The NSA detected an error on the hard disk drive (like a bad sector for example).
Chapter 1 Getting to Know Your NSA Table 1 LEDs (continued) LED COLOR STATUS DESCRIPTION LAN Green On The NSA has a successful 10/100Mbps Ethernet connection. Blinking The 100M LAN is sending or receiving packets. Off The NSA does not have a 10/100Mbps Ethernet connection. On The NSA has a successful 1000Mbps Ethernet connection. Blinking The 1000M LAN is sending or receiving packets. Off The NSA does not have a 1000Mbps Ethernet connection. On A USB device is connected to the NSA.
CHAPTER 2 Web Configurator Basics This chapter describes how to access the NSA web configurator and provides an overview of its screens. 2.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy NSA setup and management via Internet browser. Use Internet Explorer 6.0, Mozilla Firefox 1.07, Netscape Navigator 7.0 or later versions of these browsers. The recommended screen resolution is 1024 by 768 pixels or higher.
Chapter 2 Web Configurator Basics Figure 4 NDU Main Screen From the NDU main page click an icon under Admin to see the web configurator screen login screen. 2.2.2 Web Browser Access Open your browser and type in the server name of the NSA (“nsa220” is the default). Figure 5 NSA URL 2.3 Login The default username and password are ‘admin’ and ‘1234’ respectively. Enter your username and password, then click Login. See Chapter 9 on page 85 for how to create other user accounts.
Chapter 2 Web Configurator Basics Figure 6 NSA Login Screen You should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore. Figure 7 Change Password Screen 2.4 User-level Screens Overview All users (including the administrator) first see the user-level access My NSA screen after login.
Chapter 2 Web Configurator Basics Figure 8 My NSA " The web configurator management session automatically times out if it is left idle for 15 minutes. Simply log back into the NSA if this happens to you. The icons and language label at the top-right of the screen ( 1 ) are visible from most screens. Use the tabs at the top of the screen to navigate between the user-level screens and menus. The following table describes the ‘global’ icons and tabs in the user-level screens.
Chapter 2 Web Configurator Basics 2.5 My NSA Screen Use the My NSA screens to manage your shares and access the files in folders to which you have access. A share is a set of user access permissions for a specific folder on a volume (gives someone access to a folder). It is equivalent to the Windows concept of a shared folder, but the access rights are independent of the folder (you configure the share and the folder separately).
Chapter 2 Web Configurator Basics 2.5.1 My NSA Share Browsing Screen Click My NSA and then click a share to open the following screen. Use the My NSA share browsing screens to see and access share contents. Figure 10 My NSA Share Browsing The following table describes the labels in this screen. Table 4 My NSA Share Browsing LABEL DESCRIPTION Current location This is the name of the share and folder path that you are in. Type The icon in this column identifies the entry as a folder or a file.
Chapter 2 Web Configurator Basics Figure 11 My NSA Management Overview The following table describes the labels in the this screen. Table 5 My NSA Management Overview LABEL DESCRIPTION Share Owner The share belongs to (and is managed by) this user account. The share owner controls access rights to the share. Location The share is for a folder on this volume. Path This is the share’s file path. Share Browsing Click this link to see and access the share’s contents.
Chapter 2 Web Configurator Basics Figure 12 My NSA Change Share Properties The following table describes the labels in the this screen. Table 6 My NSA Change Share Properties 36 LABEL DESCRIPTION Share Name Configure a name to identify this share. Type a share name from 1 to 255 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing local share. See Section 2.5.4 on page 37 for more information on share names.
Chapter 2 Web Configurator Basics Table 6 My NSA Change Share Properties (continued) LABEL DESCRIPTION Read Only This appears when you set the Share Access to Advanced. Select this column’s radio button in a user account’s row to give the user read-only access to the share. This allows the user to view or copy files in the share, but not delete files in the share or save files to the share. Select the check box at the top of the column to give all of the users readonly access to the share.
Chapter 2 Web Configurator Basics 2.5.5 Share Paths A share path is the full path to a folder on a volume that will be shared, for example, /mynsa/ topsecret/ugs/. This is independent from a “share name” which is the name shown for this share when accessing the share via CIFS or FTP. The path should start with a '/' (forward slash) followed by a parent folder, child folders leading to the folder that is to be shared.
Chapter 2 Web Configurator Basics Figure 13 Password The following table describes the labels in this screen. Table 7 Password LABEL DESCRIPTION Change Password New Password Create a new password for this user. You can type from one to 14 singlebyte (no Chinese characters allowed for example) ASCII characters. Retype to confirm You must type the exact same password that you just typed in the above field. Apply Click this button to save your changes back to the NSA.
Chapter 2 Web Configurator Basics Figure 14 Status 1 3 2 4 2.6.1 Global Administration Icons The icons and language label at the top-right of the screen ( 1 ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels. Table 8 Global Labels and Icons LABEL/ICON DESCRIPTION Language Select the web configurator language from the drop-down list box. Click this Help icon to open a web help page specific to the screen you are currently configuring.
Chapter 2 Web Configurator Basics Click the Status icon to open the Status screens. Figure 15 Navigation Panel Links The following table describes the navigation panel screens. Table 9 Screens Summary LINK TAB Status FUNCTION This screen shows system information, the status of the volumes, and the users who are currently using the NSA. System Setting Server Name Use this screen to specify the NSA’s server name and workgroup name.
Chapter 2 Web Configurator Basics 2.6.3 Main Window The main window ( 3 ) shows the screen you select in the navigation panel. It is discussed in the rest of this document. Right after you log in, the Status screen is displayed. See Chapter 4 on page 51 for more information about the Status screen. 2.6.4 Status Messages The message text box at the bottom of the screen ( 4 ) displays status messages as you configure the NSA. 2.6.
CHAPTER 3 Tutorials This chapter provides tutorials that show how to use the NSA. 3.1 Tutorials Introduction The following tutorials cover how you use the NSA for file sharing. This chapter assumes you have already followed the Quick Start Guide instructions to perform initial setup and configuration (so you have a working volume). See the Quick Start Guide for how to play media files using the included DLNA-compliant media client software.
Chapter 3 Tutorials Figure 17 Users 3 Configure the screen as follows and write down the username and password to give to Jimmy. If the username and password are the same as Jimmy’s Windows login, Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn’t get to configure the whole NSA. Click Apply to create the account. Figure 18 Users > Create Example 4 The account now displays in the Users screen.
Chapter 3 Tutorials 1 In the NSA’s administration web configurator screens, click Shares > Create a New Share. Figure 20 Shares 2 Specify a name for the share and select which volume it should be on. Then click Browse. Figure 21 Shares > Create Example 3 Type a name for a new folder and click Create Folder. Figure 22 Shares > Create > Browse > Create Folder Example 4 Select the new folder and click Apply.
Chapter 3 Tutorials Figure 23 Shares > Create > Browse > New Folder Example 5 Configure the screen as follows and click Apply. Figure 24 Shares > Create Example Now that Bob has created Jimmy’s share, he can go through the steps again to create another share for Kevin. Then he can see the rest of the tutorials for how to use the shares. 3.
Chapter 3 Tutorials 2 Select the network drive that you want to map NSA to from the Drive list box. This example uses I. Then browse to and select the share on the NSA. Click Finish. Figure 26 Map Network Drive 3 Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login.
Chapter 3 Tutorials 3.5 Accessing a Share Using FTP You can also use FTP to access the NSA. Suppose Jimmy is temporarily using a different computer and wants to access his share without mapping it to the computer. This is how he would do it. 1 Open the FTP client (Windows Explorer is used here) and type “ftp://username@server” where “username” is the account’s username and “server” is the NSA’s IP address or server name. Figure 29 FTP Example: Typing the FTP Target 2 Enter your password and click Login.
Chapter 3 Tutorials Figure 31 FTP Example: Logged In 3.6 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator. 1 Log into the NSA web configurator (see Section 2.3 on page 30) using your username and password. Figure 32 My NSA User Login 2 Click a share to see the top level of the share’s contents. Here is the Jimmy share.
Chapter 3 Tutorials Figure 33 My NSA User Login 3 Click a folder’s file name to browse the folder. You can open files or copy them to your computer. However at the time of writing you cannot use the web configurator to upload files to the NSA (use CIFS or FTP to upload files, see Section 3.4 on page 46 and Section 3.5 on page 48). 4 Click the logout icon when your are done (see Table 2 on page 32).
CHAPTER 4 Status Screen This chapter introduces the NSA Status screen. 4.1 Status Screen The Status screen is the first main web configurator screen you see after you log in to the administrator screens. To view the status screens, click Status on the top-left of the navigation panel.
Chapter 4 Status Screen The following table describes the labels in this screen. Table 11 Status LABEL DESCRIPTION Status Click Status to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the edit icon to go to the screen where you can configure this. Model Name This displays which model this NSA device is. Firmware Version This is the NSA firmware version.
Chapter 4 Status Screen Table 11 Status (continued) LABEL DESCRIPTION Connected At This displays the date and time the user last connected to the NSA in year, month, day, hour, minute, second format. IP Address This displays the IP address of the computer connected to the NSA. 4.1.1 Session Example (Windows) Open windows explorer and type two back slashes followed by the NSA name or IP address.
Chapter 4 Status Screen 54 NSA-220 User’s Guide
P ART II Status, System, Storage, and Network System Setting Screens (57) Storage Screens (61) Network Screen (73) 55
CHAPTER 5 System Setting Screens This chapter discusses the system setting screens. 5.1 System Setting Screens This section gives an overview of the various features included in the system setting screens. Use the system setting screens to: • Specify the NSA’s Windows/CIFS server name and workgroup name. • Chose a time zone and/or allow the NSA to synchronize with a time server. • Create and edit volumes (see Chapter 6 on page 61 for details). 5.1.
Chapter 5 System Setting Screens Figure 36 System Setting > Server Name The following table describes the labels in these screens. Table 12 System Setting > Server Name LABEL DESCRIPTION Server Name Enter a name to identify your NSA on the network in this field. You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character. The name must begin with an alphabetic character (a-z) and is NOT case sensitive.
Chapter 5 System Setting Screens 5.3.2 Date/Time Screen Click the System Setting link in the navigation panel and then click the Date/Time link to access the System Setting > Date/Time screen. Figure 37 System Setting > Date/Time The following table describes the labels in this screen. Table 13 System Setting > Date/Time LABEL DESCRIPTION Current System Date Time Setting Current Time This field displays the time of your NSA. Current Date This field displays the date of your NSA.
Chapter 5 System Setting Screens Table 13 System Setting > Date/Time (continued) LABEL DESCRIPTION Time Server Address Select a time server from the drop-down list box or select Specify my own time server and enter the time server you wish to use in the field below. Check with your ISP/network administrator if you are unsure of this information. Synchronize Now Click this button for the NSA to retrieve the correct time from the configured time server right away.
CHAPTER 6 Storage Screens This chapter covers storage systems, volumes and disks on the NSA. 6.1 Storage Introduction Use the Storage screens to create and manage NSA volumes (internal and external) and disks. • See Section 6.3 on page 62 for more information on volumes. • See Section 6.5 on page 68 for more information on disks. 6.2 Storage Overview Screen Click Storage in the Navigation panel to display the following screen.
Chapter 6 Storage Screens The following table describes the labels in this screen. Table 14 Storage > Overview LABEL DESCRIPTION Internal/External Volume These tables display information on all internal volumes (created on NSA internal disk drives) and external volumes (created on external disk drives attached to the NSA USB ports). See the volume screen for field details. Create an Internal Volume Click this to format internal hard drives and create a new volume. All data on the disk(s) will be lost.
Chapter 6 Storage Screens " Back up your data before deleting or re-creating a volume! For example if you originally have one disk configured at JBOD, and you then install another disk and want to configure the two disks to use RAID 1, you should first back up all your data on the two disks (see the Memeo Autobackup utility on the included CD) and then restore your data later after you create the new volume type.
Chapter 6 Storage Screens • Choose RAID 0 if performance matters more than data security. RAID 0 has the fastest read and write performance but if one disk fails you lose all your data on the volume. It has fast performance as it can read and write to two disks simultaneously. Performance may matter more than data security to gamers for example. This method may also be acceptable for data that is already backed up somewhere else. • Choose RAID 1 if data security is more important than performance.
Chapter 6 Storage Screens " " You should not restart the NSA while the NSA is resychronizing a volume as this will cause the synchronization to begin again after the NSA fully reboots. You can access data on a RAID volume while it is resychronizing, but it is not recommended. 6.4 RAID This section contains theoretical background on JBOD and the RAID levels used on the NSA. Skip to the next section if you already understand RAID and know what storage system you want to use on the NSA.
Chapter 6 Storage Screens lost. Parity protection is used with striping, and the “n” pieces of data are typically the blocks or bytes distributed across the drives in the array. The parity information can either be stored on a separate, dedicated drive, or be mixed with the data across all the drives in the array. " In the following figures, A1, A2, A3 and so on are blocks of data from the A file. Similarly, B1, B2, B3 and C1, C2, C3 ar blocks of data from the B and C files. 6.4.
Chapter 6 Storage Screens RAID 0 capacity is the size of the smallest disk multiplied by the number of disks you have configured at RAID 0 on the NSA. For example, if you have two disks of sizes 100 GB and 200 GB respectively in a RAID 0 volume, then the maximum capacity is 200 GB (2 * 100 GB, the smallest disk size) and the remaining space (100 GB) is unused.
Chapter 6 Storage Screens • Keep another copy of important files (preferably in another location). 6.5 Disks Here is information on the NSA internal disks and external disks attached to the USB port(s). 6.5.1 External Disks You may connect USB storage devices that support the following file systems to the NSA. • Windows File Systems: NTFS (read only), FAT32 and FAT16. If your USB storage device uses a NTFS file system, then the NSA can read files from it, but cannot write files to it.
Chapter 6 Storage Screens If you do not want to keep the data on a disk that you will remove, it is recommended that you delete the volume before you remove the disk. If you remove a disk(s) without deleting its volume and you later put the disk(s) back in a different volume, you may have more than one volume with the same name. For example, suppose you have two disks, Disk A and Disk B and you create two JBOD volumes, volume1 (with Disk A) and volume2 (Disk B).
Chapter 6 Storage Screens Table 19 Create a New Internal Volume (continued) LABEL DESCRIPTION Apply Click this button to save your changes back to the NSA and create the volume. Cancel Click this button to begin configuring this screen afresh. 6.7 Editing an Internal Volume Click an internal volume’s Edit icon in the Volume screen as shown in Figure 38 on page 61 to change the internal disk drive volume’s name. Figure 41 Edit an Internal Volume The following table describes the labels in this screen.
Chapter 6 Storage Screens " Creating a volume formats the drive. All data on the disk will be lost. Figure 42 Create a New External Volume The following table describes the labels in this screen. Table 21 Create a New External Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters. The name cannot be the same as another existing external volume. Acceptable characters are all alphanumeric characters and " " [spaces], "_" [underscores], and "." [periods].
Chapter 6 Storage Screens Figure 43 Edit an External Volume The following table describes the labels in this screen. Table 22 Edit an External Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing external volume. Type This displays External Volume indicating that the volume is on an external device connected to a NSA USB port.
CHAPTER 7 Network Screen This chapter discusses the network configuration screen. 7.1 Network Settings Use the network configuration screen to assign the NSA a dynamic or static IP address and DNS information. 7.1.1 IP Address The NSA needs an IP address to communicate with the media servers on your network. The NSA can get an IP address automatically if you have a device on your network that gives them out. Or you can assign the NSA a static (fixed) IP address. 7.1.
Chapter 7 Network Screen Figure 44 Network > Network Config The following table describes the labels in this screen. Table 23 Network Config > Network Config LABEL DESCRIPTION IP Address Obtain an IP address automatically Select this option to have the NSA get IP address information automatically. If no IP address information is assigned, the NSA uses Auto-IP to assign itself an IP address and subnet mask. For example, you could connect the NSA directly to your computer.
Chapter 7 Network Screen Table 23 Network Config > Network Config LABEL DESCRIPTION Apply Click Apply to save your TCP/IP configurations. After you click Apply, the NSA restarts. Wait until you see the Login screen or until the NSA fully boots and then use the NDU to rediscover it. Cancel Click Cancel to begin configuring this screen afresh.
Chapter 7 Network Screen 76 NSA-220 User’s Guide
CHAPTER 8 Application Screens This chapter discusses the application screens. 8.1 Application Screens Use the application screens to: • Enable FTP file transfer to/from the NSA, set the number of FTP connections allowed and an FTP idle timeout. • Enable or disable the media server and select which shares to publish (share with media clients). 8.2 FTP File Transfer Protocol (FTP) is an Internet file transfer service that operates on the Internet and over TCP/IP networks.
Chapter 8 Application Screens Figure 45 Applications > FTP The following table describes the labels in this screen. Table 24 Applications > FTP LABEL DESCRIPTION FTP Enable FTP Select the Enable FTP check box to allow users to connect to the NSA via FTP; otherwise clear the check box. Connection Limit Enter the maximum number of concurrent connections allowed on the NSA in this field. Idle Timeout Enter the length of time that an FTP connection can be idle before timing out.
Chapter 8 Application Screens 8.5 Media Server Screen Click Applications > Media Server to open the following screen. Use this screen to turn the media server off and on and see which shares the NSA will publish (share with media clients). Figure 46 Applications > Media Server The following table describes the labels in this screen. Table 25 Applications > Media Server LABEL DESCRIPTION Media Server Name This is the name of the NSA media server on the network. It is the same as the NSA’s server name.
Chapter 8 Application Screens 80 NSA-220 User’s Guide
P ART III User Accounts and Shares Users (83) Shares (89) 81
CHAPTER 9 Users This chapter introduces the Users screens of the NSA. 9.1 User Accounts Introduction Use the Users screens to create and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. • Assign individual users specific access rights for specific shares. Users are people who have access rights to the NSA and can store files there for later retrieval. A user can: • Manage shares that he owns.
Chapter 9 Users Figure 47 Users The following table describes the labels in this screen. Table 26 Users LABEL DESCRIPTION Accounts List Create a New Account Click this button to open a screen where you can configure a new user account. This screen lists the users configured on the NSA. Click a user icon to see details about the user. Account Type This field displays whether the selected account is an administrator account or a user account.
Chapter 9 Users 9.3 Adding or Editing a User Account Click the Create a New Account button in the Users screen to create a new NSA user account with NSA access password. Click the Change Account Properties button in the screen shown previously to edit an existing account. 9.3.1 Add or Edit a User Account Screen Use this screen to add a user account. Figure 48 Users > Add or Edit an Account The following table describes the labels in this screen.
Chapter 9 Users • • • • Spaces _ [underscores] . [periods] - [dashes] Other limitations on usernames are: • All leading and trailing spaces are removed automatically. • Multiple spaces within names are converted to a single space. • Usernames are case insensitive. The username cannot be the same (no matter the letter case) as an existing user. For example, if a user exists with the name 'BOB', you cannot create a user named 'bob'.
Chapter 9 Users The following table describes the labels in this screen. Table 29 Users > Change Password LABEL DESCRIPTION New Password Create a new password for this user. You can type from one to 14 singlebyte (no Chinese characters allowed for example) ASCII characters. See Section 9.3.2 on page 85 for more details on usernames. Retype to confirm You must type the exact same password that you just typed in the above field. Apply Click this button to save your changes back to the NSA.
Chapter 9 Users 88 NSA-220 User’s Guide
CHAPTER 10 Shares This chapter introduces the Shares screens of the NSA. 10.1 Shares Introduction Use the Shares screens to create and manage shares. A share is a set of user access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder, but is independent of the folder. You can map a share to a network drive for easy and familiar file transfer for Windows users. 10.1.1 Share Icons These are the share icons.
Chapter 10 Shares Figure 51 Shares The following table describes the labels in this screen. See Table 31 on page 89 for icon details. Table 32 Shares LABEL DESCRIPTION Create a New Share Click this button to add a share. External Shares These are shares on the external (USB) devices. Share Owner This is the name of the user account to which this share belongs. Share Type This field displays built-in for system shares. You cannot delete these shares (these are the public and admin shares).
Chapter 10 Shares Figure 52 Shares > Add Share The following table describes the labels in this screen. Table 33 Shares > Add Share LABEL DESCRIPTION Share Name Type a share name from 1 to 255 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing local share. See Section 2.5.4 on page 37 for more information on share names.
Chapter 10 Shares Table 33 Shares > Add Share (continued) LABEL Deny DESCRIPTION Select this check box next to a user to deny him or her any access (they cannot read, modify nor execute) to all files contained within this share. Select the check box in the heading row to select all users. Note: No one can use the share if you deny access to all users. Thus denying all users access is not recommended.
Chapter 10 Shares The following table describes the labels in this screen. Table 34 Share Path Browse LABEL DESCRIPTION Folder Name This section lists the volume’s existing folders. Select the one for which you want to create a share. You can also click the folder’s name to navigate to a sub-folder within the folder. Create Folder Type a folder name and click Create Folder to make a new folder. The name can be 1 to 255 single-byte (no Chinese characters allowed for example) ASCII characters.
Chapter 10 Shares 94 NSA-220 User’s Guide
P ART IV Protection, Media Client, Maintenance, & Troubleshooting Maintenance Screens (97) Protecting Your Data (105) Media Client Software (107) Troubleshooting (111) 95
CHAPTER 11 Maintenance Screens This chapter discusses the Maintenance screens. 11.1 Maintenance Overview Use the maintenance screens to: • • • • View logs Manage the NSA configuration file Upload new firmware Restart or shut down your NSA 11.2 Log Click Maintenance > Log to display the following screen. The Log screen displays all NSA logs. There are at most 128 entries in the log. Older logs are removed by the system. You cannot download the log file via FTP or CIFS.
Chapter 11 Maintenance Screens Table 35 Maintenance > Log (continued) LABEL DESCRIPTION # This is the log entry’s number in the list according to the currently selected sort order. Time This shows the date and time the log was created. Click the top of the column to sort by oldest or newest. Class This displays the log category; see Table 36 on page 98 for details. Severity This displays how serious the log is rated by the NSA. See Table 37 on page 98 for more information.
Chapter 11 Maintenance Screens 11.5 Log Messages Here are some example log messages. Table 38 Log Messages CLASS SEVERITY MESSAGE Network NOTICE %s is active because of changing Port Group. Enable DHCP client. Network NOTICE %s is inactive because of changing Port Group. Disable DHCP client. Network NOTICE %s MTU > (%s MTU - 8), %s may not work correctly. Network NOTICE (%s MTU - 8) < %s MTU, %s may not work correctly. Network NOTICE Add interface %s.
Chapter 11 Maintenance Screens Table 38 Log Messages (continued) CLASS SEVERITY MESSAGE Services INFO Clock timezone is set to default Services INFO Clock daylight saving is enabled Services INFO Clock daylight saving is disabled Shares NOTICE Add new share %s. Shares NOTICE Delete share %s. Shares NOTICE Delete share %s.
Chapter 11 Maintenance Screens Figure 55 Maintenance > Configuration The following table describes the labels in this screen. Table 39 Maintenance > Configuration LABEL DESCRIPTION Backup Current Configuration Settings Backup Restore Configuration Click Backup to save the current configuration of the NSA to your computer. A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit. After you restore a configuration, if a share path does not exist, then it appears be in red.
Chapter 11 Maintenance Screens The following table describes the labels in this screen. Table 40 Maintenance > FW Upgrade LABEL DESCRIPTION Firmware Upgrade Firmware File Browse Type the location of the firmware file you want to upload Click Browse to find the file on your computer Upgrade Click Upgrade to upload the new firmware. The NSA automatically restarts after you upgrade. Wait until the restart completes before accessing the NSA again.
Chapter 11 Maintenance Screens When you click the Shutdown button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the shutdown.
Chapter 11 Maintenance Screens 104 NSA-220 User’s Guide
CHAPTER 12 Protecting Your Data This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 12.1 Protection Methods There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.
Chapter 12 Protecting Your Data " Configuration File Backup and Restoration does not affect data (your files and folders), volumes on the NSA. 12.1.2 Memeo Autobackup Use the Memeo Autobackup software (included on the CD) on your computer to schedule and manage backups. You can backup from your computer to the NSA. You can also backup from one NSA on your network to another.
CHAPTER 13 Media Client Software This chapter introduces the media client software included on the CD. 13.1 Media Client Introduction The NSA can function as a server to allow DLNA (Digital Living Network Alliance) compliant media clients to play files. The DLNA is a group of leading personal computer and electronics companies that works to make products compatible and able to work in a home network in order to make digital living easy and seamless.
Chapter 13 Media Client Software 108 NSA-220 User’s Guide
CHAPTER 14 Memeo Autobackup Software This chapter introduces the Memeo Autobackup software included on the CD. 14.1 Memeo Autobackup Introduction Use the Memeo Autobackup software included on the CD to automatically back up selected files from your computer to the NSA whenever you modify the files. You can have Memeo backup specific files, folders of files, or types of files.
Chapter 14 Memeo Autobackup Software 110 NSA-220 User’s Guide
CHAPTER 15 Troubleshooting 15.1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • • • • • • Power, Hardware, Connections, and LEDs NSA Login and Access Reset the NSA I Cannot Access The NSA External USB drives Media Server Functions 15.2 Power, Hardware, Connections, and LEDs V The NSA PWR LED does not turn on (no LEDs are on). • Make sure the NSA is turned on.
Chapter 15 Troubleshooting Orange means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector, but the LED stays orange until the NSA restarts. Even if the hard drive still functions, it is recommended that you replace it since errors are a sign that the hard drive may fail soon. See Installing or replacing a hard drive V An HDD LED is red. Red means the hard drive has failed and the NSA can no longer detect it.
Chapter 15 Troubleshooting • Make sure the Ethernet cable is connected properly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it’s connected directly to a computer, make sure that the computer network card is working (ping 127.0.0.1 on the computer). • Use another Ethernet cable. If you’re connecting to a Gigabit Ethernet, make sure you’re using an 8-wire Ethernet cable. • If the problem continues, contact the vendor. See Section 1.1.
Chapter 15 Troubleshooting • Make sure your computer’s IP address is in the same subnet as the NSA’s IP address. You can use the NDU to find the NSA’s IP address. See Appendix B on page 129 for how to change your computer’s IP address. Skip this if you know that there are routers between your computer and the NSA. • Ping the NSA from your computer. Make sure your computer’s Ethernet adapter is installed and functioning properly.
Chapter 15 Troubleshooting • The computer running the NDU can only discover NSAs in the same subnet. NSAs connected to the same switch or router as your NDU computer are usually in the same subnet unless the router is doing subnetting or the switch is implementing VLAN. • The Memeo Autobackup program uses the same network port as the NDU to discover the NSA. To avoid a port conflict, do not run the Memeo Autobackup program at the same time as the NDU. • Close the NDU and reopen it. 15.3.
Chapter 15 Troubleshooting Figure 61 Security Settings - Script Safe ActiveX Controls V I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly. The default username is admin, and the default password is 1234. These fields are case-sensitive, so make sure [Caps Lock] is not on. • Turn the NSA off and on. • If this does not work, see Section 15.3.1 on page 114 to reset the device.
Chapter 15 Troubleshooting • Check that the NSA is turned on and connected to the network. Try to ping the NSA or use the NDU to discover it. • Check that you entered your login name and password correctly. • Check that the share exists and check its access settings. • Check if the shared folder is a subfolder of another (parent) share. Check that the parent share’s access rights do not conflict with the subfolder share. It is recommended that you do not create subfolder shares.
Chapter 15 Troubleshooting 15.6 Media Server Functions V I set the media server function to publish a folder, but some of the files in the folder do not display in the list on the media client. Files with formats that are not supported on the media server may not display in the list. See Appendix A on page 126 for the file formats that the media server supports. V I published a folder with the media server function, but the media client does not play some of the files (or does not play them properly).
P ART V Appendices and Index Product Specifications (121) Setting up Your Computer’s IP Address (129) Open Source Licences (151) Legal Information (181) Customer Support (183) Index (187) 119
APPENDIX A Product Specifications See also Chapter 1 on page 25 for a general overview of the key features. Feature Tables Physical Features These are the main external physical features. Table 43 Physical Features USB Ports 2 USB (version 2) ports. Copy files directly to the NSA from compatible USB devices like card readers, MP3 players, memory sticks, and digital cameras without using a computer. Expand the NSA’s storage capacity with compatible USB devices (like hard drives).
Appendix A Product Specifications Table 44 Firmware Features RAID File Storage Use RAID 0 if you want pure write speed and/or maximum capacity for your drives, and/or you have other means of protecting your data. Use RAID 1 if you have two drives and want to mirror primary data to the second drive. If one drive fails, replace it and then re-synchronize to recover all data. User Passwords Configure a password for an individual User to restrict access to the NSA.
Appendix A Product Specifications Table 45 NSA Hardware Specifications (continued) Maximum Storage Capacity 1.5 TB (with two 750 GB hard drives installed) is the largest storage capacity that has been tested as of this writing. The NSA theoretically supports up to 17.6 TB per volume for a maximum possible capacity of 35.2 TB with two 17.6 TB drives configured as JBOD volumes.
Appendix A Product Specifications Table 46 NSA Firmware Specifications (continued) Supported Clients Windows 2000 Professional/Server Windows XP Home/Professional Windows 2003 Windows Vista Linux Maximum Number of Users Allowed 100A Maximum Number of Concurrent FTP Sessions 20A Maximum Number of Concurrent CIFS Sessions 20A System Management Remote Management via Web Configurator (HTTP) NSA Discovery Utility (NDU) Logging/Monitoring Centralized Logs Firmware Upgrade Web Configurator Web Browse
Appendix A Product Specifications Table 47 Supported Standards and Recommendations RFC 1001 (STD-19) - Protocol standard for NetBIOS service on a TCP/UDP transport: Concepts and methods RFC 1002 (STD-19) - Protocol standard for NetBIOS service on a TCP/UDP transport: Detailed specifications RFC 1034 (STD-13) - Domain names - concepts and facilities RFC 1035 (STD-13) - Domain names - implementation and specification RFC 1305 Network Time Protocol (NTP version 3) RFC 1415 FTP-FTAM Gateway Specifica
Appendix A Product Specifications Supported Media Server Content Formats The following describes the details about the files that the NSA media server can publish.
Appendix A Product Specifications Table 49 Power Consumption in Watts (W) POWER SOURCE SYSTEM BOOT UP SYSTEM READ/WRITE SYSTEM IDLE 240V/50Hz 58.14W 31.2W 23.9W 120V/60Hz 57.76W 29.3W 25.1W 100V/60Hz 58.14W 30.0W 25.1W Compatible Hard Disks The following hard disks have been tested and are known to be compatible with the NSA. Table 50 BRAND MODEL CAPACITY INTERFACE Western Digital WD1600JS 160 GB SATA 3.0 Gbit/s Seagate ST3200827AS 200 GB SATA 3.
Appendix A Product Specifications 128 NSA-220 User’s Guide
APPENDIX B Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your computer. Windows 3.1 requires the purchase of a third-party TCP/IP application package.
Appendix B Setting up Your Computer’s IP Address Figure 62 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add. 2 Select Adapter and then click Add. 3 Select the manufacturer and model of your network adapter and then click OK.
Appendix B Setting up Your Computer’s IP Address Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically. • If you have a static IP address, select Specify an IP address and type your information into the IP Address and Subnet Mask fields. Figure 63 Windows 95/98/Me: TCP/IP Properties: IP Address 3 Click the DNS Configuration tab.
Appendix B Setting up Your Computer’s IP Address Figure 64 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’s IP address, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add. 5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Restart your computer when prompted.
Appendix B Setting up Your Computer’s IP Address Figure 65 Windows XP: Start Menu 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 66 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties.
Appendix B Setting up Your Computer’s IP Address Figure 67 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 68 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). • If you have a dynamic IP address click Obtain an IP address automatically.
Appendix B Setting up Your Computer’s IP Address Figure 69 Windows XP: Internet Protocol (TCP/IP) Properties 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: • In the IP Settings tab, in IP addresses, click Add. • In TCP/IP Address, type an IP address in IP address and a subnet mask in Subnet mask, and then click Add.
Appendix B Setting up Your Computer’s IP Address Figure 70 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.
Appendix B Setting up Your Computer’s IP Address Figure 71 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT). 11 Restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
Appendix B Setting up Your Computer’s IP Address Figure 72 Macintosh OS X: Apple Menu 2 Click Network in the icon bar. • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure list. Figure 73 Macintosh OS X: Network 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box.
Appendix B Setting up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties in the Network window. Linux This section shows you how to configure your computer’s TCP/IP settings in Red Hat Linux 9.0. Procedure, screens and file location may vary depending on your Linux distribution and release version. " Make sure you are logged in as the root administrator. Using the K Desktop Environment (KDE) Follow the steps below to configure your computer IP address using the KDE.
Appendix B Setting up Your Computer’s IP Address Figure 75 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address, click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields. 3 Click OK to save the changes and close the Ethernet Device General screen.
Appendix B Setting up Your Computer’s IP Address Figure 77 Red Hat 9.0: KDE: Network Configuration: Activate 7 After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen. Using Configuration Files Follow the steps below to edit the network configuration files and set your computer IP address. 1 Assuming that you have only one network card on the computer, locate the ifconfigeth0 configuration file (where eth0 is the name of the Ethernet card).
Appendix B Setting up Your Computer’s IP Address Figure 80 Red Hat 9.0: DNS Settings in resolv.conf nameserver 172.23.5.1 nameserver 172.23.5.2 3 After you edit and save the configuration files, you must restart the network card. Enter./network restart in the /etc/rc.d/init.d directory. The following figure shows an example. Figure 81 Red Hat 9.0: Restart Ethernet Card [root@localhost init.
APPENDIX C Pop-up Windows In order to use the web configurator you may need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Internet Explorer Pop-ups You may have to disable pop-up blocking (allow pop-ups) in order to use your device web configurator. Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow pop-up blocking and create an exception for your device’s IP address.
Appendix C Pop-up Windows Figure 84 Internet Options: Privacy 3 Click Apply to save this setting. Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen.
Appendix C Pop-up Windows Figure 85 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites.
Appendix C Pop-up Windows 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 87 Internet Options: Security 2 3 4 5 6 146 Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default).
Appendix C Pop-up Windows Figure 88 Security Settings - Java Scripting Java Permissions 1 2 3 4 5 From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. Click OK to close the window.
Appendix C Pop-up Windows JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows 150 NSA-220 User’s Guide
APPENDIX D Open Source Licences Notice Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes software developed by the Apache Software Foundation under Apache License. Apache License Version 2.
Appendix D Open Source Licences “Derivative Works” shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.
Appendix D Open Source Licences distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License.
Appendix D Open Source Licences Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Appendix D Open Source Licences The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it.
Appendix D Open Source Licences We call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.
Appendix D Open Source Licences 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.
Appendix D Open Source Licences compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.
Appendix D Open Source Licences required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
Appendix D Open Source Licences contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
Appendix D Open Source Licences END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, autofs, device-mapper, evms, exim. Lm_sensors, mdadm, pam_mount, raidtools, samba, sg_utils, smartmontools, vsftpd, xfsprogs and Linux kernel software under GPL license. GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc.
Appendix D Open Source Licences 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
Appendix D Open Source Licences 3.
Appendix D Open Source Licences directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
Appendix D Open Source Licences INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein, if any, are the property of their respective owners.
Appendix D Open Source Licences Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License ======== Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved.
Appendix D Open Source Licences Original SSLeay License -------------------------------Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’s SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to.
Appendix D Open Source Licences This Product include mod_ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix D Open Source Licences 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group.
Appendix D Open Source Licences 1.2. “Contributor Version” means the combination of the Original Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor. 1.3. “Covered Code” means the Original Code or Modifications or the combination of the Original Code and Modifications, in each case including portions thereof. 1.4.
Appendix D Open Source Licences The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and under Patents Claims infringed by the making, using or se
Appendix D Open Source Licences Any Modification which You create or to which You contribute must be made available in Source Code form under the terms of this License either on the same media as an Executable version or via an accepted Electronic Distribution Mechanism to anyone to whom you made an Executable version available; and if made available via Electronic Distribution Mechanism, must remain available for at least twelve (12) months after the date it initially became available, or at least six (6)
Appendix D Open Source Licences Contributor. You must make it absolutely clear than any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer. 3.6. Distribution of Executable Versions.
Appendix D Open Source Licences Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License published by Netscape. No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License. 6.3.
Appendix D Open Source Licences any software, hardware, or device, other than such Participant's Contributor Version, directly or indirectly infringes any patent, then any rights granted to You by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the date You first made, used, sold, distributed, or had made, Modifications made by that Participant. 8.3.
Appendix D Open Source Licences As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability. 13.
Appendix D Open Source Licences The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
Appendix D Open Source Licences 4.Restrictions You may not publish, display, disclose, sell, rent, lease, modify, store, loan, distribute, or create derivative works of the Software, or any part thereof. You may not assign, sublicense, convey or otherwise transfer, pledge as security or otherwise encumber the rights and licenses granted hereunder with respect to the Software.
Appendix D Open Source Licences DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. 8.
Appendix D Open Source Licences 180 NSA-220 User’s Guide
APPENDIX E Legal Information Copyright Copyright © 2007 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix E Legal Information Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page. ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
APPENDIX F Customer Support Please have the following information ready when you contact customer support. Required Information • • • • Product model and serial number. Warranty Information. Date that you received your device. Brief description of the problem and the steps you took to solve it. Corporate Headquarters (Worldwide) • • • • • • • Support E-mail: support@zyxel.com.tw Sales E-mail: sales@zyxel.com.tw Telephone: +886-3-578-3942 Fax: +886-3-578-2439 Web Site: www.zyxel.com, www.europe.zyxel.
Appendix F Customer Support Denmark • • • • • • Support E-mail: support@zyxel.dk Sales E-mail: sales@zyxel.dk Telephone: +45-39-55-07-00 Fax: +45-39-55-07-07 Web Site: www.zyxel.dk Regular Mail: ZyXEL Communications A/S, Columbusvej, 2860 Soeborg, Denmark Finland • • • • • • Support E-mail: support@zyxel.fi Sales E-mail: sales@zyxel.fi Telephone: +358-9-4780-8411 Fax: +358-9-4780 8448 Web Site: www.zyxel.
Appendix F Customer Support • • • • Telephone: +7-3272-590-698 Fax: +7-3272-590-689 Web Site: www.zyxel.kz Regular Mail: ZyXEL Kazakhstan, 43, Dostyk ave.,Office 414, Dostyk Business Centre, 050010, Almaty, Republic of Kazakhstan North America • • • • • • • Support E-mail: support@zyxel.com Sales E-mail: sales@zyxel.com Telephone: +1-800-255-4101, +1-714-632-0882 Fax: +1-714-632-0858 Web Site: www.us.zyxel.com FTP Site: ftp.us.zyxel.com Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St.
Appendix F Customer Support • Web Site: www.zyxel.es • Regular Mail: ZyXEL Communications, Arte, 21 5ª planta, 28033 Madrid, Spain Sweden • • • • • • Support E-mail: support@zyxel.se Sales E-mail: sales@zyxel.se Telephone: +46-31-744-7700 Fax: +46-31-744-7701 Web Site: www.zyxel.se Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden Ukraine • • • • • • Support E-mail: support@ua.zyxel.com Sales E-mail: sales@ua.zyxel.
Index Index A about icon 40 accessing share contents 34 accessing the web configurator 29 administration screens 32, 39 anonymous access rights 92 ANONYMOUS FTP 92 apache license 151 C certifications 123, 181 notices 181 viewing 182 change password 31 changing configuration settings 42 checking disks 42 common screen icons 42 compatibility 25 compatible hard disks 122 computer’s IP Address 129 configuration file backup 101 restore 101 configuring entries 42 contact information 183 copied files folder form
Index FCC interference statement 181 file path 35, 36 file storage system 123 file system errors 42 finding external storage devices 42 finding the NSA 52 firmware specifications 123 firmware upgrade 101 firmware version 52 folder 33 name restrictions 37 folder format of copied files 28 format of copied files folder 28 formats supported 126 FTP server status 52 G Gigabit Ethernet 25, 121 global icons 32, 40 global labels 32 global NSA icons 40 GMT 60 GNU GENERAL PUBLIC LICENSE 161 GNU LESSER GENERAL PUBLI
Index to screens 40 locate icon icons locate 42 log 97 classes 98 screen 97 severity 98 logging/monitoring 124 login username 30 logout icon 32, 40 O OK 64 open source licences 151 Open SSL License 165, 166 OpenLDAP 165 OpenLDAP Public License 165 operating humidity 123 operating temperature 123 P M MAC address 52 Manage It 33 management session timeout 32 managing shares 35 MDI/MDI-X 121 media server 107, 124 configuration 107 software 107, 124 status 52 Memeo AutoBackup 122 messages 42 MIT License 176
Index return material authorization (RMA) 182 rights 181 RMA 182 S safety warnings 6 SATA 25 SATA 3.
Index down 42, 64 healthy 42, 64 inactive 64 name restrictions 37 OK 64 resync 64 status 64 volume icon 42 volume name 52 volume status 52 W warranty 182 period 182 web browsers supported 124 web configurator 29 browsers 29 logout 32, 40 web help 40 web help icon 32 Z ZyXEL Communications Corporation 181 ZyXEL Limited Warranty Note 182 BSD 168 NSA-220 User’s Guide 191
Index 192 NSA-220 User’s Guide