NSA320 2-Bay Digital Media Server Default Login Details Web Address nsa320 User Name admin Password 1234 Firmware Version 4.01 Edition 1, 06/2010 www.zyxel.com www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the Web Configurator. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http://www.adobe.com. • Use the PDF’s bookmarks to quickly navigate to the areas that interest you.
About This User's Guide Documentation Feedback Send your comments, questions or suggestions to: techwriters@zyxel.com.tw Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan. Need More Help? More help is available at www.zyxel.com. • Download Library Search for the latest product updates and documentation from this link.
About This User's Guide Customer Support Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office. • Product model and serial number. • Warranty Information. • Date that you received your device.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NSA may be referred to as the “NSA”, the “device” or the “system” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device. Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate.
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device. • Do NOT open the device or unit.
Contents Overview Contents Overview User’s Guide ........................................................................................................................... 21 Getting to Know Your NSA ........................................................................................................ 23 NAS Starter Utility ...................................................................................................................... 29 Web Configurator Basics ....................................
Contents Overview 10 NSA320 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 6 Safety Warnings........................................................................................................................ 8 Contents Overview .......................................................
Table of Contents 3.2 Accessing the NSA Web Configurator ................................................................................. 49 3.2.1 Access the NSA Via NAS Starter Utility ..................................................................... 49 3.2.2 Web Browser Access ................................................................................................. 50 3.3 Login ...................................................................................................................
Table of Contents 4.9 Download Service Tutorial ................................................................................................... 94 4.9.1 Copying/Pasting a Download Link ............................................................................. 94 4.9.2 Installing the Link Capture Browser Plugin ................................................................ 97 4.9.3 Using the Link Capture Browser Plugin ................................................................... 102 4.9.
Table of Contents 7.2.1 Disk Replacement Restrictions ................................................................................ 160 7.2.2 Storage Screen ........................................................................................................ 161 7.3 Creating an Internal Volume .............................................................................................. 163 7.3.1 Volume Status ...........................................................................................
Table of Contents 9.9.1 Print Server Rename ............................................................................................... 215 9.10 The Copy/Sync Button Screen ........................................................................................ 216 9.11 Technical Reference ........................................................................................................ 217 9.11.1 Sharing Media Files on Your Network ................................................................
Table of Contents 10.10.1 Backup: Step 1 .................................................................................................... 263 10.10.2 Backup: Step 2 .................................................................................................... 265 10.10.3 Backup: Step 3 .................................................................................................... 268 10.10.4 Backup: Step 4 ......................................................................................
Table of Contents 13.1 Overview .......................................................................................................................... 307 13.2 What You Can Do ............................................................................................................ 307 13.3 The Groups Screen ........................................................................................................ 307 13.3.1 Adding or Editing a Group .....................................................
Table of Contents Chapter 16 Protecting Your Data............................................................................................................. 347 16.1 Overview .......................................................................................................................... 347 16.2 Protection Methods .......................................................................................................... 347 16.3 Configuration File Backup and Restoration .........................
Table of Contents Appendix D Importing Certificates........................................................................................ 411 Appendix E Open Source Licences...................................................................................... 443 Appendix F Legal Information .............................................................................................. 589 Index................................................................................................................
Table of Contents 20 NSA320 User’s Guide
P ART I User’s Guide 21
CHAPTER 1 Getting to Know Your NSA 1.1 Overview This chapter covers the main features and applications of the NSA. Use the NSA to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA. • Use the COPY/SYNC button to copy or synchronize files between the NSA and USB devices like card readers, MP3 players, mass storage devices, and digital cameras without using a computer. • Have the NSA handle large file downloads.
Chapter 1 Getting to Know Your NSA Figure 1 Example of the NSA in a Home Network NSA Above is the NSA in a home network. Users back up and share data on the NSA. The DMA-2500 plays the NSA’s media files on the TV. A USB hard drive provides extra storage space and files are copied directly from the USB mass storage device to the NSA. Place the NSA behind a firewall and/or IDP (Intrusion Detection and Prevention) device to protect it from attacks from the Internet.
Chapter 1 Getting to Know Your NSA 1.3 LEDs The NSA LEDs (lights) tell you important information. Figure 2 NSA Front Panel This table describes the NSA’s LEDs. Table 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned on and receiving power. Off The NSA is turned off. On The NSA has fully started and is operating normally. Blinking The NSA is starting up. Blinking The NSA is upgrading the firmware.
Chapter 1 Getting to Know Your NSA Table 1 LEDs (continued) LED COLOR STATUS DESCRIPTION HDD1/ HDD2 Green On The hard disk drive is connected properly to the NSA. Blinking The NSA is saving data to the hard disk drive. On The NSA detected an error on the hard disk drive (like a bad sector for example). The NSA automatically tries to recover a bad sector, but the LED stays red until the NSA restarts. Off The NSA cannot detect a hard disk in the disk bay.
Chapter 1 Getting to Know Your NSA 1.3.2 RESET Button Use the RESET button on the rear panel to restore the NSA’s default settings. Figure 3 The RESET Button Press 1 Beep 2 Beeps 5 more seconds Release to Reset IP Address Password Release to Clear All Settings • Press the RESET button until you hear one beep (after about two seconds), then release it. You will hear one more beep after you release the button. This resets the NSA’s IP address and password to the default values.
Chapter 1 Getting to Know Your NSA 28 NSA320 User’s Guide
CHAPTER 2 NAS Starter Utility 2.1 Overview This chapter describes the NAS Starter Utility. Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it. Make sure you have a backup of any existing data in the hard disk before installing it in the NSA. Using the initialization wizard formats the hard disk and deletes all data in the process. There is a NAS Starter Utility available for Windows XP, Windows Vista, or Windows 7.
Chapter 2 NAS Starter Utility Start the NAS Starter Utility (click the icon in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility). The first time you open the NAS Starter Utility the discovery screen appears as follows. Figure 4 NAS Discovery The following table describes the labels in this screen. Table 2 NAS Discovery LABEL DESCRIPTION Refresh Click this to refresh the screen. The NAS Starter Utility does not automatically refresh.
Chapter 2 NAS Starter Utility 2.4 Main NAS Starter Utility Screen The main NAS Starter Utility screen displays after you select a NSA in the NSA Discovery screen. Figure 5 NAS Starter Utility Main Screen The following table describes the labels in this screen. Table 3 NAS Starter Utility Main Screen LABEL DESCRIPTION Discovery Click this to use the NSA Discovery screen (Section 2.3 on page 29) to find and select the NSA on your network to which you want to connect.
Chapter 2 NAS Starter Utility Table 3 NAS Starter Utility Main Screen LABEL DESCRIPTION Play Media Files from Home Screen Click this to enjoy your media files though your web browser. See Section 3.4 on page 52 for details on the Home screen. Show the directory of the NSA Click this to open the NSA’s file directory in Windows Explorer. See Section 2.5.3 on page 42 for details. Run the Initialization Wizard Click this to set up the NSA for the first time. See Section 2.5 on page 32 for details.
Chapter 2 NAS Starter Utility Choose Default Configuration (recommended) or manual configuration. Use the manual option if you need to name the NSA to configure specific network settings. Click Next. Figure 7 Initialization Wizard: Wizard Type 2.5.1 Default Configuration 1 The NAS Starter Utility checks the Internet connection.
Chapter 2 NAS Starter Utility 2 Type a new administrator password (and retype it to confirm). If you do not want to change the administrator password, you can leave the fields blank and just click Next. Figure 9 Change Admin Password 3 Specify usernames and passwords for the individuals you want to be able to access the NSA.
Chapter 2 NAS Starter Utility 4 Check your settings. If they are OK, click Next. Otherwise click Back. If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual. Figure 11 Confirm Settings 5 Wait while the NAS Starter Utility configures the NSA. Figure 12 Setting the NAS After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA’s shares (see Section 2.5.
Chapter 2 NAS Starter Utility click Finish to return to the main NAS Starter Utility screen (see Section 2.4 on page 31). Figure 13 Setting the NAS 2.5.2 Manual Configuration 1 Set up the NSA’s basic network configuration first.
Chapter 2 NAS Starter Utility The following table describes the labels in this screen. Table 4 NAS Starter Utility > Config LABEL DESCRIPTION Get IP automatically from DHCP server Select this if the NSA is automatically assigned an IP address from the ISP or a DHCP server in your network. Assign IP Manually Select this if you want to assign the NSA a fixed IP address, subnet mask and default gateway. Note: Do not configure an IP address that is already in use in your network.
Chapter 2 NAS Starter Utility 3 The NAS Starter Utility checks the Internet connection. Figure 16 Check Network Connection 4 Type a new administrator password (and retype it to confirm) and click Next. If you do not want to change the administrator password, you can leave the fields blank and just click Next.
Chapter 2 NAS Starter Utility 5 Specify a name to uniquely identify the NSA on your network. Choose the time zone of your location. This sets the time difference between your time zone and Greenwich Mean Time (GMT). Figure 18 Create User Accounts 6 Select how to configure the hard disks. Figure 19 Create User Accounts With only one hard disk installed, just click Next.
Chapter 2 NAS Starter Utility • RAID 0: Use this if you want maximum speed for your disks, and/or you have other means of protecting your data. RAID 0 has the fastest read and write performance but if one disk fails you lose all your data from both disks. 7 This screen lists the shares the NAS Starter Utility creates on the NSA by default. Select the ones you want to use as network drives in Windows Explorer.
Chapter 2 NAS Starter Utility 9 If the settings are OK, click Next. Otherwise click Back. If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual. Figure 22 Confirm Settings 10 Wait while the NAS Starter Utility configures the NSA. Figure 23 Setting the NAS After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA’s shares (see Section 2.5.
Chapter 2 NAS Starter Utility click Finish to return to the main NAS Starter Utility screen (see Section 2.4 on page 31). Figure 24 Setting the NAS 2.5.3 Directory of the NAS Enter the administrator user name and password and click Login. Figure 25 Login The utility opens the NSA’s directory in Windows Explorer.
Chapter 2 NAS Starter Utility 2.6 Import Files or Folders with zPilot In the main NAS Starter Utility screen click Import files or folders with zPilot to be able to drag and drop files from your computer to the NSA. Enter the administrator user name and password and click Login. Figure 27 Login The zPilot icon displays. Figure 28 zPilot Drag files onto the zPilot icon to move them to the NSA. zPilot automatically sorts music, photo, and video files into the Music, Photo, and Video folders.
Chapter 2 NAS Starter Utility Double-click the zPilot icon to display the NAS Starter Utility screen with status details about the file transfers. Click the “x” button next to a file entry to stop transferring the file. Click Clean Up to clear completed transfers from the list. Figure 30 zPilot Showing Transfer Rate 2.7 Add a Network Drive to My Computer In the main NAS Starter Utility screen click Add a network drive to My Computer to add the NSA as a network drive in your computer’s Windows Explorer.
Chapter 2 NAS Starter Utility Windows Explorer (My Computer) where you can access and use it like your computer’s other drives. Figure 32 Network Drive Mapping 2.8 Manage the Device In the main NAS Starter Utility screen click Manage the Device to log into the NSA’s administration screens where you can manage the NSA. Enter the administrator user name and password and click Login. Figure 33 Login See Section 3.5 on page 66 for more on the administration screens. 2.
Chapter 2 NAS Starter Utility Click Configure network setting in the main utility screen to display the following screen. Figure 34 NAS Starter Utility > Configure network setting The following table describes the labels in this screen. Table 5 NAS Starter Utility > Config LABEL DESCRIPTION NAS Name Specify a name to uniquely identify the NSA on your network. You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character.
Chapter 2 NAS Starter Utility If your Internet connection requires you to enter a user name and password to connect to the Internet, select Enable PPPoE Connection and enter your user name and password.
Chapter 2 NAS Starter Utility 48 NSA320 User’s Guide
CHAPTER 3 Web Configurator Basics 3.1 Overview This chapter describes how to access the NSA web configurator and provides an overview of its screens. The web configurator is an HTML-based management interface that allows easy NSA setup and management using an Internet browser. Use Internet Explorer 6.0 or Mozilla Firefox 2.00, or later versions of these browsers. The recommended screen resolution is 1024 by 768 pixels or higher.
Chapter 3 Web Configurator Basics Guide for how to install and run the NAS Starter Utility. See Chapter 2 on page 29 for more information on the NAS Starter Utility. Figure 36 NAS Starter Utility Main Screen 3.2.2 Web Browser Access Configure the server name of your NSA using the Network Configuration screen (Section 2.9 on page 45) of the NAS Starter Utility. Open your browser and type in the server name of the NSA (“nsa320” by default). Figure 37 NSA URL 3.
Chapter 3 Web Configurator Basics Then click Login. See Chapter 12 on page 301 for how to create other user accounts. Figure 38 NSA Login Screen If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore.
Chapter 3 Web Configurator Basics 3.4 Home Screens All users (including the administrator) first see the Home screen after logging in. Figure 40 Home Note: If you did not select the option to stay logged in for two weeks when you logged in, the web configurator management session automatically times out if it is left idle for 15 minutes. Simply log back into the NSA if this happens to you. The main Home screen displays icons for the various features you can access.
Chapter 3 Web Configurator Basics Table 6 Main Home Screen Icons (continued) ICON DESCRIPTION Administrators can use Application Zone to install, access, and manage the NSA’s applications. Use System to edit general system settings or log into the administrator advanced configuration screens. Note: Your browser may need Windows Media Player and VLC plugins installed to play music and video files. To get the VLC plugins, you have to download and install VLC (use the .exe file).
Chapter 3 Web Configurator Basics Here are some Home screen descriptions. A music screen is shown here as an example. Other screens work in a similar way. Figure 41 Music Screen A B C D This table describes common labels in the Home media screens. Not every item displays in every screen. Table 8 Home Media Screens 54 LABEL DESCRIPTION A Click a letter to go to the first item starting with that letter. B View files. Double-click an item to play it.
Chapter 3 Web Configurator Basics Table 8 Home Media Screens LABEL DESCRIPTION D Select the sorting criteria: Artist - Sort music by artist. All - All of the menu’s files display here. Genre - Sort music by category. Folder - List the folders containing music files. Album - List the identified music albums. Current Playlist - Show the playing and queued songs. The NSA categorizes files into genres and albums according to the information stored in your files.
Chapter 3 Web Configurator Basics 3.4.2 Exif and Google Maps (Photos) Click a photo’s EXIF button to display or hide the photo’s Exchangeable image file format (Exif) data. Figure 43 Exif Information If a photo’s Exif data includes GPS location data, click the latitude or longitude link to display the location in Google Maps. Click Clear to delete the markers of other photos and only display the current photo’s marker.
Chapter 3 Web Configurator Basics 3.4.3 Slideshow and CoolIris (Photos) In a Photo menu click the SlideShow button to display the menu’s files as a slideshow. Move your cursor over the slideshow’s screen to display full screen, previous, pause, and next buttons for controlling the slideshow. Figure 45 Slideshow When the CoolIris plugin is installed in your browser, click the Launch CoolIris button to display your photos as a 3-D wall for quick browsing. 3.4.
Chapter 3 Web Configurator Basics 3.4.4.2 My Favorite Use Favorite > My Favorite to create, edit, and play playlists. These playlists are specific to the NSA and cannot be used in external music players. Figure 46 Favorite > My Favorite This table describes labels in this menu. Table 9 Favorite > My Favorite LABEL DESCRIPTION New Click this to create a new playlist. Edit Double-click a playlist or select it and click Edit to go to a screen where you can remove songs from the playlist.
Chapter 3 Web Configurator Basics can map a share to a network drive for easy and familiar file transfer for Windows users. • A folder icon with a hand indicates a share. • The administrator owns and manages the public shares. • Double-click a media file to open it. Double-click other types of files to be able to save them. • Click to the right of a file or folder name to select it. • Use the [SHIFT] key to select a range of entries. Hold down the [CTRL] key to select multiple individual entries.
Chapter 3 Web Configurator Basics Table 10 File Browser (continued) LABEL DESCRIPTION Last Modified This column displays the last time the file or folder was changed (in year-month-day hour:minute:second format). Create New Folder Click this to open the following screen where you can create a new folder within the share. Specify a name to identify the folder. See Section 3.4.6 on page 62 for more information on folder names. Click Apply to create a folder or click Cancel to exit this screen.
Chapter 3 Web Configurator Basics 3.4.5.1 Configure Share Screen In the File Browser screen, select a share and click Configure Share to open the following screen where you can see and configure share management details. Figure 48 File Browser > Configure Share The following table describes the labels in the this screen. Table 11 File Browser > Configure Share LABEL DESCRIPTION Share Name Configure a name to identify this share.
Chapter 3 Web Configurator Basics Table 11 File Browser > Configure Share (continued) LABEL DESCRIPTION Share Access Select who can access the files in the share and how much access they are to be given. If you publish the share to the media server or the web, all users will have at least read-only access to the share, regardless of what you configure here. Select Keep it private to owner to allow only the share owner to read files in the share, delete files in the share and save files to the share.
Chapter 3 Web Configurator Basics • Unicode is supported for share names, although your FTP client must support UTF-8. Full support should be available in all Windows versions after Windows 2000. 3.4.7 Application Zone Administrators can click Application Zone to go to a screen where you can enable or disable various applications for file sharing and downloading. Figure 49 Application Zone The following table describes the labels in the this screen.
Chapter 3 Web Configurator Basics Table 12 Application Zone (continued) LABEL DESCRIPTION Pause Select the Flickr or Youtube Uploadr entry and click this to pause current uploading. Resume will resume current uploading. Resume Select the Flickr or Youtube Uploadr entry and click this to resume current uploading. 3.4.8 System Settings Click System > Settings to open the following screen. Use this screen to change general settings and an account password.
Chapter 3 Web Configurator Basics The following table describes the labels in this screen. Table 13 System > Settings LABEL DESCRIPTION Double Click Behavior Setting Select Replace current playlist and start to play to have double clicking a song cause the NSA to immediately stop any currently playing song and start playing the double-clicked song. Select Append to current playlist to have double clicking a song add a song to the end of the current playlist.
Chapter 3 Web Configurator Basics 3.5 Administration Screens The System > Administration link displays when you log in as the administrator. Click System > Administration in the Home screen to open the advanced administration screens. The Status screen is the first advanced administration screen that displays. Figure 51 Status 1 2 3 4 3.5.1 Global Administration Icons The icons and language label at the top-right of the screen ( 1 ) are visible from most of the administration screens.
Chapter 3 Web Configurator Basics 3.5.2 Navigation Panel The navigation panel on the left of the Web Configurator screen ( 2 ) contains screen links. Click a link to display sub-links. There are no sub-links for the Status screen. Certain screens also contain hyper links that allow you to jump to another screen. The following table describes the navigation panel screens.
Chapter 3 Web Configurator Basics Table 15 Screens Summary (continued) LINK SCREEN FUNCTION Applications FTP Server Enable FTP file transfer to/from the NSA, set the number of FTP connections allowed, an FTP idle timeout, and the character set. Media Server Enable or disable the sharing of media files and select which shares to share. Download Service Have the NSA handle large file downloads.
Chapter 3 Web Configurator Basics 3.5.3 Main Window The main window ( 3 ) shows the screen you select in the navigation panel. It is discussed in the rest of this document. The Status screen is the first administration screen to display. See Chapter 5 on page 149 for more information about the Status screen. 3.5.4 Status Messages The message text box at the bottom of the screen as you configure the NSA. ( 4 ) displays status messages 3.5.
Chapter 3 Web Configurator Basics Table 16 Common Configuration Screen Icons (continued) ICON DESCRIPTION Down This represents a down volume. Scan Disk Click this to scan a hard disk for file system errors. Eject Click this before you remove an external hard drive so that you do not lose data that is being transferred to or from that hard drive. Locate Click this to cause the LED on the external storage device to blink.
CHAPTER 4 Tutorials 4.1 Overview This chapter provides tutorials that show how to use the NSA.
Chapter 4 Tutorials 72 1 Click Start > Control Panel. Set View by to Category and click Network and Internet. 2 Click View network computers and devices.
Chapter 4 Tutorials 3 The NSA icon displays twice because the NSA is both a media server and a storage device. Double-click either NSA icon to open the Web Configurator login screen. 4.2.1 If the NSA Icon Does Not Display The network containing the NSA must be set as a home or work network in order for the NSA icons to display. If the network containing the NSA displays as “Public”: 1 Click Network and Sharing Center and then the network’s link (circled in the figure).
Chapter 4 Tutorials 2 Use the Set Network Location screen to set the network’s location to home or work. 4.2.2 NSA Icon Right-click Options Right-click the NSA’s icon to see these options: • Install/Uninstall: Click Install to add the NSA as a device in your computer. After you install the NSA you can see it in the computer’s list of devices (see Section 4.5 on page 78. Click Uninstall to remove the NSA from the list of devices installed in your computer.
Chapter 4 Tutorials • Properties opens a window of NSA details and troubleshooting information. • Manufacturer identifies the company that produced the NSA. • Model identifies the NSA model. • Model number identifies the NSA model number. • Device webpage shows the IP address for accessing the Web Configurator. • Serial number is unavailable because the NSA does not have one. • MAC address is the NSA’s unique physical hardware address (MAC). You need the MAC address to register the product at myZyXEL.com.
Chapter 4 Tutorials 1 Click Start > Control Panel > View network status and tasks (or Network and Sharing Center if you view the Control Panel by icons). 2 Click See full map (1 in the figure). The network containing the NSA must be set as a home or work network in order to use the full map feature.
Chapter 4 Tutorials 3 Double-click the NSA’s icon to open the Web Configurator login screen. See Section 4.2.2 on page 74 for the NSA icon’s right-click options.
Chapter 4 Tutorials 4.4 Playing Media Files in Windows 7 In Windows 7, the NSA automatically displays as a library in Windows Media Player. Figure 52 NSA in Windows Media Player 4.5 Windows 7 Devices and Printers After you use the NSA’s network icon’s install option you can manage the NSA from the Windows 7 Devices and Printers folder. Click Start > Control Panel > Hardware and Sound > Devices and Printers. Select the NSA icon to display information about the NSA.
Chapter 4 Tutorials icon to open a properties window (see page 75). Right-click the icon to display these options: • Download NAS Starter Utility downloads the NSA’s Starter Utility. It lets you find, set up, and manage the NSA as well as copy files to it and access the files on it. See Chapter 2 on page 29 for details. • Create shortcut has Windows make a desktop shortcut to this screen. • Troubleshoot opens Windows’ device troubleshooting wizard.
Chapter 4 Tutorials 4.5.1 Windows 7 Desktop Shortcut This is the NSA’s desktop shortcut. Double-click it to open a properties window (see page 75). 1 Right-click the NSA’s desktop shortcut icon to see these options: • Open file location takes you to the Windows 7 Devices and Printers folder. • Download NAS Starter Utility downloads the NSA’s Starter Utility. It lets you find, set up, and manage the NSA as well as copy files to it and access the files on it. See Chapter 2 on page 29 for details.
Chapter 4 Tutorials • Cut removes this shortcut so you can paste it somewhere else. • Copy copies the shortcut so you can paste it somewhere else. • Create shortcut has Windows make a desktop shortcut to this icon. • Delete sends the shortcut to the recycle bin. • Rename lets you change the name of the shortcut. • Troubleshoot opens Windows’ device troubleshooting wizard. • Remove device removes the NSA from the Windows 7 Devices and Printers folder.
Chapter 4 Tutorials 4.6.1 Creating a RAID 1 Volume This storage method allows recovery of data if your hard disk fails. To create a RAID 1 volume, you must install two SATA hard disks in your NSA. There are two ways to create a RAID 1 volume: • Click the Migrate button - If you already have a SATA hard disk with a volume and you later install a second SATA hard disk in your NSA, use the Migrate button to convert the existing JBOD volume to a RAID 1 volume.
Chapter 4 Tutorials 1 In the Storage > Volume screen, click Create an Internal Volume. 2 In the Disk Configuration screen, you can select the storage method. • Type in the Volume Name for your RAID 1 volume. The volume name can be 1 to 31 characters (a-z, 0-9, " " [spaces], "_", and "."). • Choose RAID 1 and click Apply. This deletes all existing data in the SATA hard disk. Make sure you have a backup of any existing data in the hard disk.
Chapter 4 Tutorials 3 The Storage > Volume screen displays with your RAID 1 volume. 4.7 Deleting a Volume Delete an existing volume in your NSA by doing the following steps. 84 1 In the Storage > Volume screen, select the volume you want to delete and click the delete icon. 2 A confirmation window appears as follows. Click Yes.
Chapter 4 Tutorials This deletes all existing data in the volume. Make sure you have a backup of any existing data in the hard disk. 4.8 File Sharing Tutorials The following sections cover using the NSA for file sharing. This chapter assumes you have already followed the Quick Start Guide instructions to perform initial setup and configuration (so you have a working volume). See the rest of this User’s Guide for details on configuring the NSA’s various screens. 4.8.
Chapter 4 Tutorials 86 2 Click Sharing > Users to open the Users screen. Then click Add User. 3 Configure the screen as follows and write down the username and password to give to Jimmy. If the username and password are the same as Jimmy’s Windows login, Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn’t get to configure the whole NSA. Click Apply to create the account.
Chapter 4 Tutorials Now that Bob has created Jimmy’s account, he can go through the steps again to create another account for Kevin. After both accounts are created, he can go to Section 4.8.2 on page 87 to create shares for Jimmy and Kevin. 4.8.2 Creating a Share Suppose Bob has already created separate accounts for his sons Jimmy and Kevin. Now Bob wants to create a share for each son. He also wants to make sure that each son can only access his own share (to keep them from deleting each other’s files).
Chapter 4 Tutorials 3 Configure the screen as follows to give Jimmy full access right to the share. Then click Apply to create the share. Now that Bob has created Jimmy’s share, he can go through the steps again to create another share for Kevin. 4.8.3 Creating a Group After creating user accounts for Jimmy and Kevin, Bob wants to create a group for his sons and another one for the parents.
Chapter 4 Tutorials 2 Specify a name for the group. Select the user(s) you want to add to the group from the Available User(s) list and click Add Selected User(s). Configure the screen as follows. Then click Apply to create the group. Now that Bob has created a group for Jimmy and Kevin, he can go through the steps again to create another group for the parents. Then he can see the rest of the tutorials for how to use the groups in assigning access rights to shares. 4.8.
Chapter 4 Tutorials 90 3 Select the network drive that you want to map the NSA to from the Drive list box. This example uses I. Then browse to and select the share on the NSA. Click Finish. 4 Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login.
Chapter 4 Tutorials 5 After the mapping is done, you can then simply copy and paste or drag and drop files from/to your local computer’s drives to or from this network folder. Just like the NSA’s share was another folder on your computer. Now that Bob has mapped Jimmy’s share to Jimmy’s computer, he can go through the steps again to map Kevin’s share to Kevin’s computer. 4.8.5 Accessing a Share Using FTP You can also use FTP to access the NSA.
Chapter 4 Tutorials 92 2 Enter your password and click Login. 3 Now you can access files and copy files from/to your local computer’s drives to or from this network folder.
Chapter 4 Tutorials 4.8.6 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator. 1 Log into the NSA web configurator (see Section 3.3 on page 50) using the appropriate user name and password (this example uses Jimmy’s) and click File Browser. Click a share (the Jimmy share in this example) to see the top level of the share’s contents. 2 Click a folder’s file name to browse the folder. You can open files or copy them to your computer.
Chapter 4 Tutorials 4.9 Download Service Tutorial This tutorial covers using the NSA to download a file from the Internet. Use this same procedure for BitTorrent downloads as well as regular HTTP (web) and FTP downloads. See Section 9.11.2 on page 219 for more on the download service. 4.9.1 Copying/Pasting a Download Link 1 Open your Internet browser (this example uses Internet Explorer). 2 Find a download link for the file you want. In this example, www.zyxel.
Chapter 4 Tutorials 3 Right-click the download link and select Copy Shortcut in Internet Explorer (or Copy Link Location in Firefox). 4 Log into the NSA web configurator (see Section 3.3 on page 50) using the administrator account and click Application Zone and the Application Zone > Download Service link. 5 Click Add.
Chapter 4 Tutorials 6 Right-click the URL field and select Paste. 7 The URL displays in the URL field. Click Apply. 8 After a few moments, the download task appears in the Download Service screen’s Active tab. The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share’s download folder. See Section 4.8.4 on page 89, Section 4.8.5 on page 91, or Section 4.8.6 on page 93 for how to access a share.
Chapter 4 Tutorials 4.9.2 Installing the Link Capture Browser Plugin In addition to copying and pasting a download link to the Download Service screen, you can also install a link capture browser plugin in your web browser. Use the plugin to easily add a download link to the NSA’s download service. See Section 9.11.3 on page 219 for more on the link capture browser plugin. Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7.
Chapter 4 Tutorials 98 3 Select a location to save the plugin and click Install. Close the screen once the installation is complete. 4 Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting.
Chapter 4 Tutorials 5 Enter the NSA’s web address (nsa320 by default) and click Apply. A warning message displays asking for confirmation. Click OK to apply the setting. Firefox 1 Open Firefox. 2 Open the folder containing the link capture browser plugin. 3 To install the plugin, drag and drop the plugin to Firefox.
Chapter 4 Tutorials 100 4 The following screen displays. Click Install Now. 5 You need to restart Firefox after the installation.
Chapter 4 Tutorials 6 When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’s web address. 7 Enter the NSA’s web address (nsa320 by default) and click OK.
Chapter 4 Tutorials 4.9.3 Using the Link Capture Browser Plugin Once you install the plugin, you may begin sending download links to the NSA from your web browser. This example shows how to send a download link to the NSA’s download service using the link capture browser plugin. 102 1 Open your Internet browser (this example uses Firefox). 2 Find a download link for the file you want. In this example, www.zyxel.
Chapter 4 Tutorials 4 The login screen shows up. Enter your NSA’s login information and click Login to send the link to the download service. A confirmation message displays. 5 Log into the NSA web configurator (see Section 3.3 on page 50) using the administrator account and click Application Zone and the Application Zone > Download Service link.
Chapter 4 Tutorials 6 The download task appears in the Download Service screen’s Active or Queue tab. It may appear in the Completed tab if the NSA already finished downloading the file or it may appear in the Error tab if the NSA failed to download the file. By default the NSA stores all downloads in the admin share’s download folder. See Section 4.8.4 on page 89, Section 4.8.5 on page 91, or Section 4.8.6 on page 93 for how to access a share. 4.9.
Chapter 4 Tutorials Note: If power failure occurs during the active download period, the NSA will verify whether the downloaded files were damaged. If a file is corrupted, the NSA will download the file again. If the file is intact but not completely downloaded, the NSA will resume the download task after it restarts. 3 When it is not the download time, you see a message in the Download Service screen, indicating the active download period.
Chapter 4 Tutorials • Click Edit IP Filter. Use an online IP filter table from http:// www.bluetack.co.uk/config/level1.gz for example to protect BitTorrent downloads. Enter the URL in the Update IP Filter from the Internet Every Week field. 4.9.5 Using Download Service Notification Use an RSS feed reader on your computer to keep track of files the NSA has downloaded. The following examples show how to subscribe to the NSA’s download service notifications. See Section 9.11.
Chapter 4 Tutorials Internet Explorer 7 Example 1 After you activate download service notification, click the RSS feed icon. 2 The following screen displays. Select Subscribe to this feed. 3 The following screen displays. Click Subscribe.
Chapter 4 Tutorials 4 Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Firefox Example 108 1 After you activate download service notification, click the RSS feed icon. 2 The following screen displays. Select Live Bookmarks from the drop-down list and click Subscribe Now.
Chapter 4 Tutorials 3 The following screen displays. Select Bookmarks Menu and click Add. 4 From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list.
Chapter 4 Tutorials 4.10 Broadcatching Tutorial Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV Internet television channel. See Section 9.8 on page 206 for more on the broadcatching service. 1 Open your Internet browser (this example uses Firefox). 2 Find the link for the RSS feed containing the channel you want to add.
Chapter 4 Tutorials 3 Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer). 4 Log into the NSA web configurator (see Section 3.3 on page 50) using the administrator account and click Administration > Applications > Broadcatching. 5 Click Add Channel.
Chapter 4 Tutorials 6 Right-click the URL field and select Paste. 7 The URL displays in the URL field. 8 Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later. 9 Select a policy for what items to delete. This example keeps the most recent 10 items. 10 Click Apply.
Chapter 4 Tutorials 11 After a few moments, the channel appears in the Broadcatching screen where you can select items you want to download. The NSA saves the items you download in a folder named after the channel. By default, the channel folders are created in the admin share’s download folder. The NSA’s media server feature makes it easy for users on your network to play the broadcatching files you download. See Section 9.11.1 on page 217 for more on the media server. 4.
Chapter 4 Tutorials 5 On your computer, open your CIFS file sharing program (Windows Explorer for example) and browse to the NSA. Double-click the printer’s icon. 6 If you get a warning screen, click the option that lets you continue (Yes in this example). 7 If your computer does not already have the printer’s driver installed, you will need to install it. In this example, click OK. 8 Use the wizard screens to install the printer driver on the computer.
Chapter 4 Tutorials After the driver installation finishes, the computer is ready to use the printer. Select the printer in an application to use it to print. Browse to the NSA using a CIFS program (like Windows Explorer) and double-click the printer’s icon to open the printer’s queue of print jobs. Note: Repeat steps 5 to 8 on your other computers so they can also use the printer. 4.
Chapter 4 Tutorials 3 Press and release the COPY/SYNC button on the NSA’s front panel to start copying files. 4 The copied files can be found in a new folder in the photo share. The name of this folder is the date (yyyy-mm-dd) and time (hh-mm-ss) when the folder is created. 5 The NSA also automatically uploads the copied files to Flickr. r 4.13 FTP Uploadr Tutorial FTP Uploadr can automatically upload files saved on the NSA to a remote FTP server. Amy wants to share files on her NSA with Susan.
Chapter 4 Tutorials at home, so Susan has to set her NSA as an FTP server for Amy to automatically send files using FTP Uploadr. l Susan’s NSA Amy’s NSA To set the NSA as an FTP server, click Applications > FTP to open the FTP screen. Select Enable FTP and click Apply. Susan also has to create a user account and share on her NSA for Amy to upload files. The share is used for files uploaded from Amy’s NSA. Amy will then use the following information to configure FTP Uploadr on her NSA.
Chapter 4 Tutorials This is how Amy would set up the NSA’s FTP Uploadr. 118 1 Click Applications > Auto Upload > FTP Uploadr to open the FTP Uploadr screen. Select Enable FTP Uploadr and click Apply to turn on FTP Uploadr. 2 Click Add Server. 3 Enter the information as describe in Table 17 on page 117. Click Apply to add the server.
Chapter 4 Tutorials 4 In the FTP Uploadr screen, click Preferences to configure the auto upload settings. 5 Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List.
Chapter 4 Tutorials 6 Amy also set the Bandwidth Limit to 20KB/s so that the upload doesn’t slow down her Internet connection. Now Amy has set up FTP Uploadr to send files to Susan’s NSA. Every time Amy adds new files or renames files in the video share, these new or modified files will be uploaded automatically to the Amy share on Susan’s NSA. Similarly, Susan can go through the steps described above to configure FTP Uploadr on her NSA.
Chapter 4 Tutorials 4.14 Web Configurator’s Security Sessions These tutorials show you how to configure security for the NSA’s Web Configurator sessions. You will customize the NSA’s self-signed SSL certificate and distribute it to your users. 4.14.1 Customizing the NSA’s Certificate 1 Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit.
Chapter 4 Tutorials 122 2 Next, let’s modify the certificate by changing the Common Name to this NSA’s host name of “nsa”, the Organization to “ZyXEL” and the Key Length to 2048. 3 The NSA restarts its network services and returns you to the login screen.
Chapter 4 Tutorials 4.14.2 Downloading and Installing Customized Certificate 1 Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. 2 Save the file to your computer.
Chapter 4 Tutorials 124 3 Find the certificate file on your computer and double-click it. 4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix D on page 411 for other examples. In the Certificate dialog box, click Install Certificate.
Chapter 4 Tutorials 5 In the Certificate Import Wizard, click Next. 6 Leave Automatically select certificate store based on the type of certificate selected and click Next.
Chapter 4 Tutorials 126 7 In the Completing the Certificate Import Wizard screen, click Finish. 8 If you are presented with another Security Warning, click Yes. 9 Finally, click OK when presented with the successful certificate installation message.
Chapter 4 Tutorials 4.14.3 Turn on the NSA’s Web Security Now that you have customized the NSA’s certificate and installed it in your computer, you can turn on security for your Web Configurator sessions. This example uses Firefox 3.0. See Appendix D on page 411 for more information on browsers and certificates. 1 Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply.
Chapter 4 Tutorials 128 2 A warning screen pops up if applying your change may disconnect some users. Click Apply to continue. 3 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning.
Chapter 4 Tutorials 4 Click Add Exception. 5 Click Get Certificate.
Chapter 4 Tutorials 6 130 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View.
Chapter 4 Tutorials 7 The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close.
Chapter 4 Tutorials 8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. 9 The login screen displays. Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs.
Chapter 4 Tutorials security exception (as in steps 6 to 7 on pages 130 to 131). See the next section for how to use FTPES with the NSA for secure FTP transfers. 4.15 Using FTPES to Connect to the NSA This section covers how to use FTP over Explicit TLS/SSL with the NSA for secure FTP transfers. Before you go through this section, read Section 4.14 on page 121 to configure HTTPS. This example uses FileZilla. 1 Open FileZilla and click File > Site Manager > New Site.
Chapter 4 Tutorials 2 A security warning screen displays. The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). If they match, click OK. The shares and folders to which Gonzo has access display. Now you can use FTP to securely transfer files to or from the NSA.
Chapter 4 Tutorials 4.16.1 Creating an Archive Backup To backup the NSA every week to a remote NSA: 1 Click Protect > Backup > Add Job. Figure 53 Protect > Backup 2 Identify the backup job and select Archive. New files are often added to the shares that you need to back up and existing files are not frequently changed so select Incremental. The NSA does a full backup first and later only copies source files that are new and/or modified since the last backup.
Chapter 4 Tutorials 3 Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection.
Chapter 4 Tutorials 4 In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the target NSA so you can leave the encryption off, too. Have the NSA keep 3 backups. Figure 56 Protect > Backup > Add Job: Step 3 5 Set the frequency to Weekly. Schedule the backup for 5:00 every Saturday morning.
Chapter 4 Tutorials 4.16.2 Creating a Synchronization Backup To create a synchronization backup: 1 Click Protect > Backup > Add Job. Figure 57 Protect > Backup Name the backup job and select Synchronization. You want only your current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder.
Chapter 4 Tutorials 2 Select the folder that needs to be mirrored (your Private folder in this example) and Remote. • Enter the other NSA’s address and administrator password. • Click Show target content to display the remote NSA’s contents. • Select the destination on the remote NSA (Backups in this example). • Click Next. Figure 59 Protect > Backup > Add Job: Step 2 3 Click OK in the warning dialog box.
Chapter 4 Tutorials • Turn on the encryption to protect these sensitive files during the transfer. The final files stored on the remote NSA will be unencrypted (usable). • Restrict the bandwidth usage to 256 KB/s to stop the archives from using all of your network connection’s available bandwidth. • You don’t have to configure a purge policy for a synchronization backup. • Click Next. Figure 61 Protect > Backup > Add Job: Step 3 5 Schedule the backup to occur every morning at 3:00 and click Done.
Chapter 4 Tutorials 4.16.3 Restoring Archived Files by Backup Job If you have backup jobs for which the NSA has already performed backups, you can restore the files based on the backup job. Do the following: 1 Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 63 Protect > Backup 2 Select which backup to use and click Next.
Chapter 4 Tutorials 3 Select the files and folders you want to restore and click Next. Figure 65 Protect > Backup > Restore Archive: Step 2 4 Select the original location and click Done.
Chapter 4 Tutorials 5 The NSA restores the files into the share. When it finishes you can access the files. Figure 67 Protect > Backup > Restore Archive: Progress 4.16.4 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore archived files by the backup job. In this example, the NSA’s RAID array failed. You’ve replaced the hard drives and reconfigured the RAID. To restore by backup files: 1 Click Protect > Restore.
Chapter 4 Tutorials 2 Select the backup job and backup time and click Next. Figure 69 Protect > Restore: Step 2 3 Select everything in the share except the recycle folder. Click Next.
Chapter 4 Tutorials 4 Browse to the folder where you want to put the files. Click Done. Figure 71 Protect > Restore: Step 4 5 The NSA restores the files and you can use them again.
Chapter 4 Tutorials 146 NSA320 User’s Guide
P ART II Technical Reference 147
CHAPTER 5 Status Screen 5.1 Overview This chapter describes the Status screen, which is the first advanced administration screen that displays. 5.2 The Status Screen Click Administration in the Home screens (Section 3.5 on page 66) to open the Web Configurator. You can also view the status screen, by clicking Status on the top-left of the navigation panel.
Chapter 5 Status Screen Figure 72 Status The following table describes the labels in this screen. Table 18 Status LABEL DESCRIPTION Status Click this to refresh the status screen statistics. System Information 150 Server Name This displays the name which helps you find the NSA on the network. Click the Edit icon to go to the screen where you can configure this. Model Name This displays which model this NSA device is. Firmware Version This is the NSA firmware version.
Chapter 5 Status Screen Table 18 Status (continued) LABEL DESCRIPTION Media Server Status This shows whether the media server function is enabled or disabled. It must be enabled for media clients to play content files stored on the NSA. Click the Edit icon to go to the screen where you can configure this. FTP Server Status This shows whether the FTP server function is enabled or disabled. It must be enabled to use FTP file transfer to/from the NSA.
Chapter 5 Status Screen Table 18 Status (continued) LABEL DESCRIPTION External Volume This displays the volumes created on USB hard drives connected to the NSA. USB disks are numbered in the order that you insert USB devices. Click the Edit icon to open the Storage screen. You can create and edit the external volume. See Chapter 7 on page 159 for more details. Status This icon indicates whether the volume is healthy, degraded, or down. Name This field shows the name for the volume.
CHAPTER 6 System Setting 6.1 Overview This chapter gives an overview of the various features included in the system setting screens. You can identify your NSA on the network and set the time that the NSA follows for its scheduled tasks/logs. 6.2 What You Can Do • Use the Server Name screen (Section 6.4 on page 154) to specify the NSA’s server and workgroup names. • Use the Date/Time screen (Section 6.5 on page 155) to set up date/time and choose a time zone for the NSA. 6.
Chapter 6 System Setting • power surges occur. The NSA gives no warning if time lag occurs. You should resynchronize the time after a power surge or after you have shut down the NSA several times. 6.4 The Server Name Screen Click System Setting > Server Name to open the following screen. Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup. Note: CIFS cannot be disabled on the NSA.
Chapter 6 System Setting Table 19 System Setting > Server Name (continued) LABEL DESCRIPTION Apply Click this to save your changes. Reset Click this to restore previously saved settings. 6.5 The Date/Time Screen Use this screen to select a time zone and a time server from which your NSA can get the time and date. This time is then used in NSA logs and alerts. Click the System Setting link in the navigation panel and then click the Date/ Time link to access the Date/Time screen.
Chapter 6 System Setting Table 20 System Setting > Date/Time (continued) LABEL DESCRIPTION Manual Select this radio button to enter the time and date manually. When you enter the time settings manually, the NSA uses the new setting once you click Apply. Note: If you enter time settings manually, they revert to their defaults when power is lost. New Date (yyyymm-dd) This field displays the last updated date from the time server or the last date configured manually.
Chapter 6 System Setting Table 20 System Setting > Date/Time (continued) LABEL DESCRIPTION Start Date Configure the day and time when Daylight Saving Time starts if you selected Enable Daylight Saving. The hour field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time starts in most parts of the United States on the second Sunday of March. Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time.
Chapter 6 System Setting 158 NSA320 User’s Guide
CHAPTER 7 Storage 7.1 Overview Several NSA features require a valid internal volume. This chapter covers the management of volumes and disks (both internal and external). Use the Storage screen (Section 7.2 on page 160) to display information on all volumes, create internal and external volumes, and configure the volume’s properties. 7.1.1 What You Need to Know About Storage Volume A volume is a storage area on a disk or disks.
Chapter 7 Storage 7.2 The Storage Screen The Storage screen allows you to create and edit volumes in the NSA. 7.2.1 Disk Replacement Restrictions See the Quick Start Guide for information on replacing disks in the NSA. When replacing a disk in a degraded or down RAID volume, the new disk must be at least the same size or bigger than the other disks that are already in the RAID volume, so as all data in the volume can be restored.
Chapter 7 Storage 7.2.2 Storage Screen Click Storage > Volume in the navigation panel to display the following screen. Use this screen to display internal and external volumes on the NSA. Note: It is recommended to scan the volume every three months or 32 reboots. Figure 75 Storage > Volume The following table describes the labels in this screen.
Chapter 7 Storage Table 21 Storage > Volume (continued) LABEL DESCRIPTION Capacity This field shows total disk size, the percentage of the volume being used and the percentage that is available. Actions This field displays icons allowing you to edit, scan, repair, expand, migrate, or delete a volume. You can also locate or eject an external volume. Note: If you delete a volume, all data in the volume disk(s) is erased. You see a warning screen before you delete a volume.
Chapter 7 Storage 7.3 Creating an Internal Volume Click the Create an Internal Volume button in the Storage screen as shown in Figure 75 on page 161 to open the following screen. Use this screen to create a new NSA internal disk drive volume. Note: Creating a volume formats the hard drive. All data on the disk will be lost.
Chapter 7 Storage The following table describes the labels in this screen. Table 22 Storage > Create an Internal Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters. To avoid confusion, it is highly recommended that each volume use a unique name. Acceptable characters are all alphanumeric characters, " " [spaces], "_" [underscores], and "." [periods]. The first character must be alphanumeric (A-Z 0-9). The last character cannot be a space " ".
Chapter 7 Storage • Recovering appears when repairing a RAID 1 volume. (A RAID1 volume was once degraded, but you have installed a new disk and the NSA is restoring the RAID1 volume to a healthy state.) • Degraded when a volume is currently down, but can be fixed. Data access may be slower from a degraded volume, so it’s recommended that you replace the faulty disk and repair the volume as soon as you can. • Inactive when a disk is missing from a RAID 0 volume or a two-disk JBOD volume.
Chapter 7 Storage The following table describes the labels in this screen. Table 23 Storage > Edit LABEL DESCRIPTION Volume Name For an internal volume, type a volume name from 1 to 31 characters. To avoid confusion, it is highly recommended that each volume use a unique name. Acceptable characters are all alphanumeric characters and " " [spaces], "_" [underscores], and "." [periods]. The first character must be alphanumeric (A-Z 0-9). The last character cannot be a space " ".
Chapter 7 Storage The following table describes the labels in this screen. Table 24 Storage > Create an External Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters. The name cannot be the same as another existing external volume. Acceptable characters are all alphanumeric characters and " " [spaces], "_" [underscores], and "." [periods]. The first character must be alphanumeric (A-Z 0-9). The last character cannot be a space " ".
Chapter 7 Storage 7.6 Storage Technical Reference This section provides some background information about the topics covered in this chapter. 7.6.1 Volumes and RAID A volume is a storage area on a disk or disks. You can create volumes on the internal disks and external disks attached to the USB port(s). You can spread a volume across internal disks but not between internal and external disks. RAID (Redundant Array of Independent Disks) or JBOD is the storage method that the NSA uses.
Chapter 7 Storage 7.6.2 Choosing a Storage Method for a Volume The following is a guide to help you choose a storage method for the various number of disks supported on the NSA. See Section 7.6.3 on page 169 for theoretical background on JBOD and the RAID levels used on the NSA. Typical applications for each method are also shown there. One Disk If you only have one disk, you must use JBOD. All disk space is used for your data - none is used for backup.
Chapter 7 Storage • Mirroring In a RAID system using mirroring, all data in the system is written simultaneously to two hard disks instead of one. This provides 100% data redundancy as if one disk fails the other has the duplicated data. Mirroring setups always require an even number of drives.
Chapter 7 Storage shows disks in a single JBOD volume. Data is not written across disks but written sequentially to each disk until it’s full. Table 26 JBOD A1 B1 A2 B2 A3 B3 A4 B4 DISK 1 DISK 2 RAID 0 RAID 0 spreads data evenly across two or more disks (data striping) with no mirroring nor parity for data redundancy, so if one disk fails the entire volume will be lost. The major benefit of RAID 0 is performance. The following figure shows two disks in a single RAID 0 volume.
Chapter 7 Storage figure shows two disks in a single RAID 1 volume with mirrored data. Data is duplicated across two disks, so if one disk fails, there is still a copy of the data. Table 28 RAID 1 A1 A1 A2 A2 A3 A3 A4 A4 DISK 1 DISK 2 As RAID 1 uses mirroring and duplexing, a RAID 1 volume needs an even number of disks (two or four for the NSA). RAID 1 capacity is limited to the size of the smallest disk in the RAID array.
CHAPTER 8 Network 8.1 Overview This chapter discusses the network configuration screens. The Network screens allow you to configure TCP/IP and PPPoE settings for the NSA. 8.2 What You Can Do • Use the TCP/IP screen (Section 8.4 on page 175) to assign the NSA a dynamic or static IP address and DNS information. • Use UPnP port mapping (Section 8.5 on page 178) to automatically configure your Internet gateway’s firewall and Network Address Translation (NAT) to allow access to the NSA from the Internet.
Chapter 8 Network PPPoE Point-to-Point Protocol over Ethernet (PPPoE) allows the NSA to establish a direct Internet connection if you do not have a router. PPPoE is a dial-up connection. You need a username and password from your Internet Service Provider (ISP) to set up the connection. Jumbo Frames Jumbo frames are Ethernet frames larger than 1500 bytes. They enable data transfer with less overhead. The bigger the frame, the better the network performance.
Chapter 8 Network In the following example, the NSA has jumbo frames enabled and set to 8KB frames. This means the computer, notebook computer, and switch must also have jumbo frames enabled and be capable of supporting 8KB frames. Figure 80 Jumbo Frames 8.4 The TCP/IP Screen Use the TCP/IP screen to have the NSA use a dynamic or static IP address, subnet mask, default gateway and DNS servers. Click Network > TCP/IP in the navigation panel to open the following screen.
Chapter 8 Network Note: If you change the NSA’s IP address, you need to log in again after you apply changes. Figure 81 Network > TCP/IP The following table describes the labels in this screen. Table 29 Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NSA get IP address information automatically. If no IP address information is assigned, the NSA uses Auto-IP to assign itself an IP address and subnet mask.
Chapter 8 Network Table 29 Network > TCP/IP (continued) LABEL Default Gateway DESCRIPTION Type a default gateway address in this field. DNS DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. If you have the IP address(es) of the DNS server(s), enter them. Dynamic Select the option to have the NSA get a DNS server address automatically. Static Select this option to choose a static DNS server address.
Chapter 8 Network 8.5 UPnP Port Mapping Screen Use UPnP (Universal Plug and Play) port mapping to allow access from the WAN to services you select on the NSA. It is recommended that you place the NSA behind an Internet gateway firewall device to protect the NSA from attacks from the Internet (see RAID and Data Protection on page 172 for firewall type suggestions). Many such Internet gateways use UPnP to simplify peer-to-peer network connectivity between devices.
Chapter 8 Network 8.5.1 UPnP and the NSA’s IP Address It is recommended that the NSA use a static IP address (or a static DHCP IP address) if you will allow access to the NSA from the Internet. The UPnP-created NAT mappings keep the IP address the NSA had when you applied your settings in the UPnP Port Mapping screen. They do not automatically update if the NSA’s IP address changes. Note: WAN access stops working if the NSA’s IP address changes. For example, if the NSA’s IP address was 192.168.1.
Chapter 8 Network CIFS (Windows File Sharing) Common Internet File System (CIFS) is a standard protocol supported by most operating systems in order to share files across the network. Using UPnP port mapping for CIFS allows users to connect from the Internet and use programs like Windows Explorer to access the NSA’s shares to copy files from the NSA, delete files on the NSA, or upload files to the NSA from the Internet.
Chapter 8 Network access services on the NSA. You can set which port Internet users need to use to access a specific service on the NSA. Note: Some Internet gateways will delete all UPnP mappings after reboot. So if the Internet gateway reboots, you may need to use this screen again to re-apply the UPnP port mapping. Figure 85 Network > UPnP > Port Mapping The following table describes the labels in this screen.
Chapter 8 Network Table 30 Network > UPnP > Port Mapping (continued) LABEL DESCRIPTION Enable WAN Access Select this check box to have UPnP configure your Internet gateway to allow access from the Internet to the NSA’s service. If you clear this check box, people will not be able to access the NSA’s service from the Internet unless you manually configure the Internet gateway’s firewall and NAT rules to allow access.
Chapter 8 Network Click Network > PPPoE in the navigation panel to open the following screen. Figure 86 Network > PPPoE The following table describes the labels in this screen. Table 31 Network > PPPoE LABEL DESCRIPTION Status Status This field displays the status of PPPoE connection. IP Address This field displays the IP address of your PPPoE connection. IP Subnet Mask This field displays the IP subnet mask of your PPPoE connection.
Chapter 8 Network 184 NSA320 User’s Guide
CHAPTER 9 Applications 9.1 Overview This chapter discusses the features in the Application screens. The NSA contains various applications for file sharing and downloading. 9.2 What You Can Do • Use the FTP Server screen (Section 9.4 on page 188) to configure settings for FTP file transfers to/from the NSA. • Use the Media Server screen (Section 9.5 on page 190) to share files with media clients. • Use the Download Service screen (Section 9.6 on page 191) to download files from the Internet.
Chapter 9 Applications 9.3 What You Need to Know FTP File Transfer Protocol (FTP) is a file transfer service that operates on the Internet. A system running the FTP server accepts commands from a system running an FTP client. FTP is not a secure protocol. Your file transfers could be subject to snooping.
Chapter 9 Applications iTunes Server The NSA iTunes server feature lets you use Apple’s iTunes software on a computer to play music and video files stored on the NSA. You can download iTunes from www.apple.com. Download Service The NSA’s download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA. This can free up your computer’s system resources. The NSA can download using these protocols.
Chapter 9 Applications RSS RSS (Really Simple Syndication) is a format for delivering frequently updated digital content. A channel uses a feed to deliver its contents (items). Subscribe the NSA to a feed to be able to download the contents. 9.4 FTP Server Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA and download files from the NSA. Click Applications > FTP to open the following screen. Figure 88 Applications > FTP The following table describes the labels in this screen.
Chapter 9 Applications Table 32 Applications > FTP LABEL DESCRIPTION Connection Limit Enter the maximum number of concurrent FTP connections allowed on the NSA in this field. The connection limit is 20. Idle Timeout Enter the length of time that an FTP connection can be idle before timing out. The timeout limit is 300 minutes. Port Number This is the port number used by the NSA for FTP traffic.
Chapter 9 Applications 9.5 The Media Server Screen The Media Server screen allows you to share files with media clients. Click Applications > Media Server to open the following screen. Use this screen to select shares to publish (share with media clients like the DMA-2500 and iTunes) and turn the iTunes server on or off. Figure 89 Applications > Media Server The following table describes the labels in this screen.
Chapter 9 Applications Table 33 Applications > Media Server LABEL DESCRIPTION Number of Videos This is how many video files the media server has to share out to media clients. Publish Select this to have the media server share a share’s media files with media clients. Share Name This column lists names of shares on the NSA. Publish Music Tracks Select this to give media clients access to the share’s music files. Publish Photos Select this to give media clients access to the share’s photo files.
Chapter 9 Applications The following table describes the labels in this screen. Table 34 Applications > Download Service LABEL DESCRIPTION Enable Download Service Use this option (and click the Apply button) to turn the download service off or on. If you turn off the service, all downloads are paused. Files currently downloading are queued. Turning on the download service resumes downloads (or restarts them if they are not able to resume).
Chapter 9 Applications Table 34 Applications > Download Service (continued) LABEL DESCRIPTION Active Click this to see the list of files the NSA is currently downloading or sharing with other BitTorrent users. The NSA handles a maximum of 10 active tasks at a time (or fewer depending on how much of the NSA’s system memory is available). If you add more, they appear in the Inactive tab. BitTorrent downloads may appear in the Inactive tab for a while before showing in the Downloading tab.
Chapter 9 Applications Table 34 Applications > Download Service (continued) LABEL Seeds DESCRIPTION Seeds apply to BitTorrent downloads. This is the number of computers that are sharing the complete file that you are downloading. This value is in the format “Leeches(Seeds)” where Leeches refer to peers that do not have a complete copy of the file yet and are still downloading; Seeds refer to peers that have the complete file. Peers Peers apply to BitTorrent downloads.
Chapter 9 Applications 9.6.1 Adding a Download Task Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 4.9 on page 94 provides a tutorial on adding a download task. Figure 91 Applications > Download Service > Add The following table describes the labels in this screen. Table 35 Applications > Download Service > Add LABEL DESCRIPTION Source URL Paste the URL of the file you want to download into this field.
Chapter 9 Applications Table 35 Applications > Download Service > Add LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 9 Applications Table 35 Applications > Download Service > Add LABEL DESCRIPTION Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. 9.6.2 Configuring General Settings Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period.
Chapter 9 Applications The following table describes the labels in this screen. Table 36 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded.
Chapter 9 Applications Table 36 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION • • • • Current Location - This is the location of the selected folder. Folder Name - Enter a new folder name and click to create it. Type - This identifies the item as a file or folder. Name - This is the name of the folder/file. Select a folder. If you don’t select a folder, a forward slash (/) displays in the Path field.
Chapter 9 Applications 9.6.3 Configuring the BitTorrent Settings Click Applications > Download Service > Preferences > BitTorrent to open the following screen. Use this screen to configure BitTorrent settings. Figure 93 Applications > Download Service > Preferences > BitTorrent The following table describes the labels in this screen. Table 37 Applications > Download Service > Preferences > BitTorrent LABEL DESCRIPTION Port Number Assign a port number for BitTorrent downloads.
Chapter 9 Applications Table 37 Applications > Download Service > Preferences > BitTorrent LABEL DESCRIPTION Maximum Number of Active Connections Specify how many active connections are allowed on the NSA. Enter a number from 1 to 500. This specifies the number of computers that can connect to the NSA to download files being shared by the NSA. Keep Sharing While With BitTorrent, the NSA starts sharing a file while you are downloading it.
Chapter 9 Applications Click Edit IP Filter in the Applications > Download Service > Preferences > BitTorrent screen. Figure 94 Applications > Download Service > Preferences > BitTorrent > Edit IP Filter The following table describes the labels in this screen. Table 38 Applications > Download Service > Preferences > BitTorrent > Edit IP Filter LABEL DESCRIPTION Enable IP Filter Click this to enable or disable IP filtering for BitTorrent downloads.
Chapter 9 Applications 9.6.5 Displaying the Task Information Select an item on the list and click Task Info. Use this screen to check detailed information about the task. Figure 95 Applications > Download Service > Task Info The following table describes the labels in this screen. Table 39 Applications > Download Service > Task Info LABEL DESCRIPTION Status This is the current status of the task. Name This is the name of the task. Size This is the size of the file to be downloaded.
Chapter 9 Applications Table 39 Applications > Download Service > Task Info LABEL DESCRIPTION Time Left This is the time remaining to complete the task. Priority Use this field to set the priority for downloading the task. Select Auto to have the NSA automatically determine the task’s priority. Select High to have the NSA download this file before the other files. Comment Enter a description for this task. Click Apply to save the description.
Chapter 9 Applications The following table describes the labels in this screen. Table 40 Applications > Web Publishing LABEL DESCRIPTION Web Publishing Disable / Enable Web Publishing Turn on web publishing to let people access files in the published shares using a web browser, without having to log into the Home screens. Support HTTPS Select this to allow users to use web browser security for connections to the web-published shares.
Chapter 9 Applications 9.8 The Broadcatching Screen This screen displays the NSA’s subscribed channels and the associated contents. • The NSA saves a channel’s downloaded items in a folder named after the channel. • The NSA creates the channel folders in the same destination as the download service. See Section 9.6.2 on page 197 to change the destination for saving downloads. • The NSA’s media server feature makes it easy for users on your network to play the broadcatching files you download.
Chapter 9 Applications The following table describes the labels in this screen. Table 41 Applications > Broadcatching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button. A screen opens for you to subscribe to the feed. When you are done, the feed’s channel and contents display in the Applications > Broadcatching screen. Delete Channel Select a channel and click Delete Channel to remove the channel from the NSA.
Chapter 9 Applications Table 41 Applications > Broadcatching LABEL DESCRIPTION Published Date This is when the file was made available for download. Description This is the publishers introduction for the file. Actions Start Downloading: Click this to add the file to the NSA’s download queue or check the file’s status in the NSA’s download service. Click the Delete icon to remove the file from the channel’s list. 9.8.1 Adding a Broadcatching Channel At the time of writing, the NSA supports RSS 2.
Chapter 9 Applications Click Applications > Broadcatching > Add Channel to open the following screen. Use the Add Channel screen to subscribe the NSA to a channel’s feed so you can view the channel. You also select policies for downloading and deleting the channel’s items. Section 4.10 on page 110 provides a tutorial on adding a broadcatching channel. Figure 99 Applications > Broadcatching > Add Channel The following table describes the labels in this screen.
Chapter 9 Applications Table 42 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Delete Policy Set how the NSA handles deleting the items downloaded from the channel. Manual: Only delete individual files you select later in the Broadcatching screen. Keep last N of items: Select this to set the NSA to only keep a number of the channel’s most recent files. When this number has been reached, if the NSA downloads another file from the channel, it deletes the oldest file from the NSA.
Chapter 9 Applications Table 42 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. • • Share - Select the share from the list. Path - Type the folder location in the share directly or click Browse to open the following screen and navigate to the file’s location.
Chapter 9 Applications 9.8.2 Editing a Broadcatching Channel Click Applications > Broadcatching, then select a channel and click Edit Channel to open a similar Edit screen. Use the Edit Channel screen to change the download or delete policies. Figure 100 Applications > Broadcatching > Edit Channel The following table describes the labels in this screen.
Chapter 9 Applications Table 43 Applications > Broadcatching > Edit Channel LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 9 Applications Table 43 Applications > Broadcatching > Edit Channel LABEL DESCRIPTION Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. 9.9 The Print Server Screen Use the Print Server screen to view and manage the NSA’s list of printers and print jobs. Click Applications > Print Server to open the following screen. Figure 101 Applications > Print Server The following table describes the labels in this screen.
Chapter 9 Applications 9.9.1 Print Server Rename Click Applications > Print Server and a printer’s Rename icon to open the following screen. Use this screen to change the name the NSA uses for the printer. Figure 102 Applications > Print Server > Rename The following table describes the labels in this screen. Table 45 Applications > Print Server > Rename LABEL DESCRIPTION Name Type a new name to identify the printer. The name must be unique from all the other names of printers connected to the NSA.
Chapter 9 Applications 9.10 The Copy/Sync Button Screen The Copy/Sync button on the front panel allows you to copy or synchronize files between a connected USB device and the NSA. Click Applications > Copy/Sync Button to open the following screen. Figure 103 Applications > Copy/Sync Button The following table describes the labels in this screen. Table 46 Applications > Copy/Sync Button LABEL DESCRIPTION Copy Settings NSA Copy Target Select the NSA share to use with the copy function.
Chapter 9 Applications Table 46 Applications > Copy/Sync Button LABEL Backup Target DESCRIPTION Select a share in which to save the backup files. Note: The NSA will not create a new folder to store the backup files. It is recommended to create a specific share (such as “backup”) for backup purposes. Sync Settings NSA Sync Target Select the NSA share to use with the synchronization function.
Chapter 9 Applications electronics companies that works to make products compatible in a home network. • Publish shares to let others play the contained media files. • The media server is a convenient way to share files you download using the broadcatching service (see Section 9.8 on page 206). • Hardware-based media clients like the DMA-2500 can also play the files. See Section 18.4 on page 380 for the supported multimedia file formats.
Chapter 9 Applications 9.11.2 Download Service The NSA’s download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA. This can free up your computer’s system resources. The download service also handles your broadcatching downloads. See Section 9.8 on page 206 for information on broadcatching. The NSA can download using these protocols. • HTTP: The standard protocol for web pages.
Chapter 9 Applications The following screen displays how the plugin works. Figure 105 Link Capture Browser Plugin Instead of copying and pasting a file’s URL to the NSA’s download service, you can right-click on the URL in the web browser and select Send to NSA. The URL is then added to the NSA’s download service list. See Section 4.9.2 on page 97 and Section 4.9.3 on page 102 for tutorials about installing and using the link capture browser plugin.
Chapter 9 Applications Note: The download service notification only keeps track of files downloaded via BitTorrent. Figure 106 Download Service Notification 9.11.5 BitTorrent Security When you download using BitTorrent, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall.
Chapter 9 Applications Ideally your firewall should have the following: • Stateful packet inspection to control access between the Internet and your network and protect your NSA (and computers) from hacking attacks. • IDP (Intrusion Detection and Prevention) to detect malicious packets within normal network traffic and take immediate action against them. • Anti-virus to check files you download for computer viruses.
Chapter 9 Applications set this up (see the firewall’s manual for details). You may also have to configure a corresponding firewall rule. Figure 109 Firewall Configured to Allow Incoming BitTorrent Requests 9.11.6 Web Publishing Example This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet.
Chapter 9 Applications 1 Click Applications > Web Publishing and configure the screen as shown (enable the web publishing and move FamilyPhotos over to Published Shares) and click Apply. Figure 110 Applications > Web Publishing (Example) 2 Now open your web browser and type in the address of the NSA’s FamilyPhotos web page. In this example, the NSA’s IP address is 192.168.1.33, and the name of the web-published share is FamilyPhotos. So you would enter “http:// 192.168.1.
Chapter 9 Applications • Click a file’s link to open the file. • Right-click a file’s link and select Save Target As.. (in Internet Explorer) to save a copy of the file. • Click a label in the heading row to sort the files by that criteria. • To customize how the page looks and works, create an index.html or index.htm file and store it in the share. 9.11.
Chapter 9 Applications your Internet gateway specifically for allowing access to the web-published shares and another separate set of rules for accessing the NSA’s web configurator. 9.11.8 Channel Guides for Broadcatching Here are some popular broadcatching channel guide web sites. Note: ZyXEL does not endorse these web sites and is not responsible for any of their contents. Use these or any other web sites at your own risk and discretion. • http://www.zencast.com/ • http://www.miroguide.
Chapter 9 Applications 9.11.9 Printer Sharing The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA’s USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers.
Chapter 9 Applications 9.11.10 Copying Files You can copy files from a USB device to the NSA or from the NSA to a USB device. Simply press and release the COPY/SYNC button to start copying files. See Section 9.10 on page 216 for details about configuring the copy settings. The following figure illustrates how copying files works when you copy files from a USB device to the NSA. The same concept applies when you copy files from the NSA to a USB device.
Chapter 9 Applications 9.11.11 Synchronizing Files Synchronization makes the contents on the target device identical to the ones on the source device. You can synchronize files from a USB device to the NSA or from the NSA to a USB device. In addition, you may also synchronize files in both directions simultaneously. Press and hold the COPY/SYNC button until you hear a beep to synchronize files. See Section 9.10 on page 216 for details about configuring the synchronization settings.
Chapter 9 Applications USB <-> NSA When you synchronize files in both directions simultaneously, both storage devices transfer unique files to one another. Files with the same file name are synchronized according to their modification date/time. The difference in modification time between the two files has to be greater than five minutes. More recently modified files overwrite the older ones during synchronization.
CHAPTER 10 Package Management 10.1 Overview Package Management can be used to set up more useful applications in your NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps. 10.2 What You Can Do • Use the Package Management screen (Section 10.4 on page 232) to download and install applications from the web. • Use the eMule screens (Section 10.5 on page 236) to configure the server, task and search settings for the eMule application.
Chapter 10 Package Management • Gallery - This web-based application allows your NSA to host pictures. You can upload images in your local computer or shares to this application. Use the administrator account of your NSA to log in to the Gallery console. The administrator can then create accounts for other users. • NFS - NFS (Network File System) is a file-sharing protocol most commonly implemented on Unix-like systems. • PHP-MySQL-phpMyAdmin - This tool can be used to manage MySQL through the web.
Chapter 10 Package Management Click Applications > Package Management to open the following screen. Figure 117 Applications > Package Management The following table describes the labels in this screen. Table 47 Applications > Package Management LABEL DESCRIPTION Package Management Retrieve List From Internet Click this to retrieve a list of available packages from the ZyXEL website.
Chapter 10 Package Management Table 47 Applications > Package Management LABEL Status DESCRIPTION This is the current status of the application. It shows: • • • • • • Not Installed - This displays for applications that have not been installed by the NSA. Installing (%) - This displays when the application is being installed. It also shows the percent of the package already installed. Built-in - This displays for applications installed by the NSA that you can configure in the NSA Web Configurator.
Chapter 10 Package Management 10.4.1 Displaying the Package Information Select an item on the list and click Package Info. Use this screen to check detailed information about the task. Figure 118 Applications > Package Management > Package Info The following table describes the labels in this screen. Table 48 Applications > Package Management > Package Info LABEL DESCRIPTION Status This is the current status of the application.
Chapter 10 Package Management Table 48 Applications > Package Management > Package Info LABEL DESCRIPTION Description This shows a brief description of the item. Close Click this to close the screen. 10.5 eMule Screens Use these screens to manage the eMule application in your NSA. eMule is a peerto-peer (P2P) file-sharing console that lets you download files from the Internet. It works with eDonkey and Kad networks. 10.5.1 eMule Server Screen Use this screen to configure the eMule server.
Chapter 10 Package Management Table 49 Applications > eMule > Server LABEL DESCRIPTION My Info Select a server from the list and click this to view the details and connection status of the server. Refer to Section 10.5.4 on page 239 for the My Info screen. Connect Click this to connect to the selected server or a random server if no server is selected. Disconnect Select a server from the list and click this to disconnect from the server.
Chapter 10 Package Management Click Add in the Applications > eMule > Server screen to add a server. Figure 121 Applications > eMule > Server: Add The following table describes the labels in this screen. Table 50 Applications > eMule > Server: Add LABEL DESCRIPTION Server IP Select this if you know the server name, IP address and port number of the eMule server you want to add. Server Name Enter the server name. IP Address Enter the IP address of the server.
Chapter 10 Package Management The following table describes the labels in this screen. Table 51 Applications > eMule > Server: Edit LABEL DESCRIPTION Server Name Enter the server name. IP Address Enter the IP address of the server. Port Number Enter the port number of the server. Apply Click this to apply your changes. Cancel Click this to return to the previous screen without saving. 10.5.
Chapter 10 Package Management Table 52 Applications > eMule > Server: MyInfo LABEL DESCRIPTION Kad This shows the status of the NSA’s connection to the Kad network: Connected or Not Connected. Kad is a shortcut for Kademlia network, which does not use servers to store files or user information in order to run a peer-to-peer network. Instead it employs peers/clients as small “servers” and runs queries through these peers. Download Speed This shows the current download speed of the eMule client.
Chapter 10 Package Management Table 53 Applications > eMule > Task LABEL DESCRIPTION Add Click this to add a download task (ED2K link) to the list. Refer to Section 10.5.6 on page 242 for the Add Task screen. Preferences Click this to open a screen where you can set the default location for saving downloaded files. You can also configure your eMule download settings. Refer to Section 10.5.7 on page 244 for the Preferences screen.
Chapter 10 Package Management Table 53 Applications > eMule > Task LABEL DESCRIPTION Transferred This shows what percent of the file the NSA has uploaded to other peers. This column is available in the Uploading tab. Upload Speed This shows the upload speed of the NSA. This column is available in the Uploading tab. Requests This shows the number of requests for a shared file. This column is available in the Shared Files tab.
Chapter 10 Package Management Click Add in the Applications > eMule > Task screen to add a task. Figure 126 Applications > eMule > Task: Add The following table describes the labels in this screen. Table 54 Applications > eMule > Task: Add LABEL DESCRIPTION Source ED2K Link Paste the ED2K link of the file you want to download into this field. The ED2K link identifies files in the eMule network. It starts with ed2k:// and may contain the name and size of the file you want to download.
Chapter 10 Package Management Table 54 Applications > eMule > Task: Add LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. • • Share - Select the destination share from the drop-down list. Path - This field displays the share folder’s path.
Chapter 10 Package Management Click Applications > eMule > Task > Preferences to open the following screen. Figure 127 Applications > eMule > Task > Preferences The following table describes the labels in this screen. Table 55 Applications > eMule > Task > Preferences LABEL DESCRIPTION Username Username Enter your user name that identifies the NSA in the eMule network.
Chapter 10 Package Management Table 55 Applications > eMule > Task > Preferences LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. • • Share - Select the destination share from the drop-down list. Path - This field displays the share folder’s path.
Chapter 10 Package Management Table 55 Applications > eMule > Task > Preferences LABEL DESCRIPTION Edit IP Filter Click this to edit the IP Filter. IP filtering prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs. Refer to Section 10.5.8 on page 247 to view and configure the Edit IP Filter screen. Apply Click this to save your changes. Reset Click this to clear the fields. Cancel Click this to return to the previous screen without saving. 10.
Chapter 10 Package Management 10.5.9 Share Browsing Use this screen to view a list of files that are still being downloaded by the NSA. The files are located in the eMule\Temp folder in the Admin share by default. Click Applications > eMule > Task > Browse Incomplete Downloads to open the following screen. Figure 129 Applications > eMule > Task > Browse Incomplete Downloads The following table describes the labels in this screen.
Chapter 10 Package Management Table 57 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Rename Select a folder or file and click this to open a screen. Enter the name you want and click OK to make the changes. Note: When you change a file name, make sure you keep the file extention. Delete Select a file/folder from the list and click this to open a warning screen. Click Yes to delete the file/folder, or click No to close the screen.
Chapter 10 Package Management Click Task Info in Applications > eMule > Task screen to open the following. Figure 130 Applications > eMule > Task: Task Info The following table describes the labels in this screen. Table 58 Applications > eMule > Task: Task Info LABEL DESCRIPTION Status This shows the current status of the task - Waiting or Downloading. Name This shows the file name of the file associated with the task. You can change this file name by entering the new name and clicking Apply. part.
Chapter 10 Package Management Table 58 Applications > eMule > Task: Task Info LABEL DESCRIPTION Seen Complete This shows the last time a source with the complete file was online. Close Click this to exit the screen. 10.5.11 eMule Search Screen Use this screen to search for files available in an eMule server using keywords and other parameters, such as file type, file size and extension names. Click Applications > eMule > Search to open the following screen.
Chapter 10 Package Management Table 59 Applications > eMule > Search LABEL DESCRIPTION Download Select a file from the results and click this to start downloading the file. This table shows the results of the search. File Name This shows the name of the file(s) that match the criteria you have set. File Size This shows the size of the file(s) that match the criteria you have set. Source This shows how many peers are currently available to share this file so that the NSA can download it. 10.
Chapter 10 Package Management The following table describes the labels in this screen. Table 60 Network > DyDNS LABEL DESCRIPTION Gateway Information Internal Address This shows the IP address assigned to the NSA by the gateway in your local network. External Address This shows the IP address of the NSA that can be accessed in the Wide Area Network (WAN). Note that this is not assigned by the DyDNS server. Configuration Enable DyDNS Select this to use dynamic DNS.
Chapter 10 Package Management Click Network > NFS to open the following screen. Figure 133 Network > NFS The following table describes the labels in this screen. Table 61 Network > NFS LABEL DESCRIPTION NFS Service Enable NFS Server Click this to employ NFS in your NSA. Disable NFS Server Click this to stop using NFS. Add NFS Share Click this to add an NFS share. This makes all NFS shares unavailable. Refer to Section 10.7.1 on page 255 for the Add NFS Share screen.
Chapter 10 Package Management You see a warning screen before you delete a volume. Figure 134 Delete an NFS Share 10.7.1 Add/Edit NFS Share Use this screen to add or edit an NFS share. Note: Some attributes of the NFS share cannot be edited. Click Add or Edit in the Network > NFS screen to open the following: Figure 135 Network > NFS: Add/Edit The following table describes the labels in this screen.
Chapter 10 Package Management Table 62 Network > NFS: Add/Edit LABEL DESCRIPTION DN/IP Filter Enter the domain name(s) or IP address(es) that can have access to the NFS share. Enter ‘*’ to make the share available to all users in the network. You can also enter a wildcard, such as ‘*.domain.com’ to indicate that all users within that network have access to the share. Select the access rights you want to grant to each domain name or IP address you enter and click Add.
Chapter 10 Package Management 10.8 SMART Screen Use this screen to view indicators of your NSA’s hard disk(s) health. Self Monitoring, Analysis, and Reporting Technology (S.M.A.R.T) detects and reports the reliability of hard disks using standard indicators (called “attributes”), to help you anticipate possible disk failures. Note: The fields included the screens may vary depending on the hard disk that you use. Click Storage > S.M.A.R.T to open the following screen. Figure 137 Storage > S.M.A.R.
Chapter 10 Package Management Table 64 Storage > S.M.A.R.T LABEL DESCRIPTION Performance This shows your hard disk’s performance. Refer to Section 10.8.2 on page 259 for more information on how S.M.A.R.T determines your hard disk’s condition. This displays: • • Type Good - This shows when you compare each Value with the Threshold Value and all the Value is greater than the Threshold Value.
Chapter 10 Package Management Table 65 Storage > S.M.A.R.T: Brief Summary LABEL DESCRIPTION Health This describes the overall health of the volume based on S.M.A.R.T diagnostics. Performance This shows your hard disk’s performance. Refer to Section 10.8.2 on page 259 for more information on how S.M.A.R.T determines your hard disk’s condition. This displays: • • Good - This shows when you compare each Value with the Threshold Value and all the Value is greater than the Threshold Value.
Chapter 10 Package Management The following table describes the labels in this screen. Table 66 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION ID This is the identification number used to tag a hard disk attribute. This is standard across all S.M.A.R.T-enabled storage devices. However it depends on the storage vendor which attributes it will allow S.M.A.R.T to diagnose. Attribute Name This refers to an attribute of the hard disk that S.M.A.R.T can assess.
Chapter 10 Package Management Table 66 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION When Failed This column indicates when (if ever) the attribute failed. An attribute has failed if the normalized value is less than or equal to the threshold. • • • -: This displays if the attribute is not failing now and has never failed in the past. FAILING_NOW: This displays if the attribute’s current normalized value is less than or equal to the threshold.
Chapter 10 Package Management Click Protect > Backup to open the following screen. Figure 140 Protect > Backup The following table describes the labels in this screen. Table 67 Protect > Backup LABEL DESCRIPTION Backup Add Job Click this to create and customize a backup job. Edit Job Select a backup job in the list and click this to make some changes to it. Delete Selected Job(s) Select a backup job in the list and click this to delete it.
Chapter 10 Package Management 10.10.1 Backup: Step 1 Use this screen to specify the job information and back up type. Click Add Job in the Protect > Backup screen to open the following: Figure 141 Protect > Backup: Step 1 The following table describes the labels in this screen. Table 68 Protect > Backup: Step 1 LABEL DESCRIPTION Job Information Job Name Enter a name to identify the backup job. Job Description Enter a short description (up to 100 keyboard characters) for the backup job.
Chapter 10 Package Management Table 68 Protect > Backup: Step 1 LABEL DESCRIPTION Backup Type Choose the backup type that you want the NSA to implement for the backup job. Archive - This is a backup of the source folder in an archive format. Once you backup your files in the target folder, you cannot access the files individually unless you have the extracting tool used by the NSA. If there are existing files in the target folder prior to the NSA’s backup job, the files remain undisturbed.
Chapter 10 Package Management 10.10.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored.
Chapter 10 Package Management The following table describes the labels in this screen. Table 69 Protect > Backup: Step 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files. Click to close a folder in the tree. This is useful if there are many folders or files that you wish to hide from view. Click to select a folder or file to back up.
Chapter 10 Package Management Table 69 Protect > Backup: Step 2 LABEL DESCRIPTION Remote Select this to back up to another device. For Archives: The remote device can be another NSA in the network. Fill in the following fields in order to be able to access it. • • • • Remote NSA Address Username Password Share Name Click Test Connection to see if your NSA can communicate with the remote device.
Chapter 10 Package Management 10.10.3 Backup: Step 3 Use this screen to specify compression, encryption and purge policies for the backup job. This step is only available if you are doing an archive backup or a synchronization backup to a remote target. Figure 143 Protect > Backup: Step 3 The following table describes the labels in this screen. Table 70 Protect > Backup: Step 3 LABEL DESCRIPTION Compression Select Yes if you want NSA to compress the files for your backup. Otherwise, choose No.
Chapter 10 Package Management Table 70 Protect > Backup: Step 3 LABEL DESCRIPTION Purge Policy The NSA maintains the files that have been included in your backups. However to save hard disk space, you can choose to delete files that have been included in previous backups. • • • Select Keep All Old Backup files to store all files that have been included in previous backups. If you want to store a certain number of backup files, select Keep Only the last n backup files (1-30).
Chapter 10 Package Management Table 71 Protect > Backup: Step 4 LABEL DESCRIPTION Every how many hours? This is only available if you selected Hourly as your backup frequency. Select every how many hours the NSA performs the backup job. On which minute of the hour? This is only available if you selected Hourly as your backup frequency. Select the minute (from 0 to 59) in an hour when the NSA performs the backup job.
Chapter 10 Package Management 10.10.6 Edit Job: Step 1 Click Protect > Backup. Select a backup job from the list and click Edit Job to open the following. Figure 145 Protect > Backup > Edit: Step 1 The following table describes the labels in this screen. Table 72 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Job Settings Job Name This field is read-only and shows the name of the backup job. Job Description Enter a short description for the backup job.
Chapter 10 Package Management Table 72 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Compression This field is read-only and shows whether the backup employs compression. Compression reduces the size of the file that you want to back up. Backup is then faster, but restoring may be slower, so if backup space is not a concern and recovery speed is, then turn off compression. Encryption This field is read-only and shows whether the backup employs encryption.
Chapter 10 Package Management The following table describes the labels in this screen. Table 73 Protect > Backup > Edit: Step 2 LABEL DESCRIPTION Scheduler Settings Backup Frequency Edit this by selecting from Hourly, Daily, Weekly and Monthly backup intervals. The screen changes depending on the item you select. Every how many hours? This is only available if you selected Hourly as your backup frequency. Select every how many hours the NSA performs the backup job.
Chapter 10 Package Management 10.10.9 Restore Archive: Step 1 Click Protect > Backup screen (Section 10.10 on page 261). You can restore a previous backup job by selecting a backup job from the list and clicking Restore Archive. Figure 147 Protect > Backup > Restore Archive: Step 1 The following table describes the labels in this screen. Table 74 Protect > Backup > Restore Archive: Step 1 LABEL DESCRIPTION Step 1.
Chapter 10 Package Management 10.10.10 Restore Archive: Step 2 Use this screen to select the folder where the archive you want to restore is located. Figure 148 Protect > Backup > Restore Archive: Step 2 The following table describes the labels in this screen. Table 75 Protect > Backup > Restore Archive: Step 2 LABEL DESCRIPTION Step 2. Please select which file(s)/folder(s) to restore. Folder Chooser Select the folder where the backup you want to restore is located.
Chapter 10 Package Management 10.10.11 Restore Archive: Step 3 Use this screen to select the location in the NSA where you want to restore your backup. Figure 149 Protect > Backup > Restore Archive: Step 3 The following table describes the labels in this screen. Table 76 Protect > Backup > Restore Archive: Step 3 LABEL DESCRIPTION Step 3. Set a restore target and start restoring Original Location Select this to restore the files to their original location in the NSA.
Chapter 10 Package Management 10.11 Restore Screen Use this screen to restore previous backups made with the NSA, including archives and folders from internal, external or remote NSAs to the NSA. 10.11.1 Restore: Step 1 You can access this screen by clicking Protect > Restore. Figure 150 Protect > Restore: Step 1 The following table describes the labels in this screen. Table 77 Protect > Restore: Step 1 LABEL DESCRIPTION Step 1.
Chapter 10 Package Management Table 77 Protect > Restore: Step 1 LABEL DESCRIPTION Browse Click this to select where the previous backup that you want to restore is located. • • • • Volume - Select a volume from the list. Current Location - This is the location of the selected folder. Type - This identifies the item as a file or folder. Name - This is the name of the folder/file. Click Apply to save your settings and Cancel to close the screen. Next Click this to go to the next screen. 10.11.
Chapter 10 Package Management The following table describes the labels in this screen. Table 78 Protect > Restore: Step 2 LABEL DESCRIPTION Step 2. Select Restore Point If you selected Remote NSA for the backup you want to restore, you can see a list of all the backups you performed in the Job Name table. If you selected Internal or External Volume for the backup you want to restore, you can see a list of restore times for the backups you performed in the Restored Time table.
Chapter 10 Package Management The following table describes the labels in this screen. Table 79 Protect > Restore: Step 3 LABEL DESCRIPTION Step 3. Please select which file(s)/folder(s) to restore. Folder Chooser Select the folder where the backup you want to restore is located. Selected Folder This shows the path of the folder you selected. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. 10.11.
Chapter 10 Package Management The following table describes the labels in this screen. Table 80 Protect > Restore: Step 4 LABEL DESCRIPTION Step 3. Set a restore target and start restoring Browse Click this to select a folder where you want to place the restored files. • • • • Volume - Select a volume from the list. Current Location - This is the location of the selected folder. Type - This identifies the item as a file or folder. Name - This is the name of the folder/file.
Chapter 10 Package Management S.M.A.R.T. attributes and their definitions vary by manufacturer, refer to the hard drive manufacturer for details about the attributes your hard drive supports. Table 81 S.M.A.R.T. Attributes ATTRIBUTE NAME BETTE R 01 Read Error Rate Low Shows the rate of hardware read errors. If this is not zero, there is a problem with the disk surface or the read/write heads. 02 Throughput Performance High This is the hard drive’s general (overall) throughput performance.
Chapter 10 Package Management Table 81 S.M.A.R.T. Attributes (continued) ID ATTRIBUTE NAME BETTE R 19 0 Airflow Temperature Low This indicates the temperature of the airflow measured by a Western Digital hard drive. 19 0 Temperature Difference from 100 High This indicates the value of 100 - the temperature in degrees Celsius. Manufacturers can set a minimum threshold that corresponds to a maximum temperature. 19 1 G-sense error rate Low This is the number of mistakes caused by impact loads.
Chapter 10 Package Management Table 81 S.M.A.R.T. Attributes (continued) ATTRIBUTE NAME BETTE R 20 5 Thermal Asperity Rate (TAR) Low 20 6 Flying Height This is the height of the hard drive’s read/write heads above the disk surface. 20 7 Spin High Current This is the quantity of high current used to spin up the drive. 20 8 Spin Buzz This is the number of buzz routines to spin up the drive.
CHAPTER 11 Auto Upload 11.1 Overview This chapter discusses the features in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family. You can link the NSA to your Flickr and/or YouTube account and select shares for the NSA to upload.
Chapter 11 Auto Upload FTPES (File Transfer Protocol over Explicit TLS/SSL) File Transfer Protocol over Explicit TLS/SSL (FTPES) is a file transfer service that uses TLS (Transport Layer Security) or Secure Socket Layer (SSL) for secure transfers across the Internet. 11.4 The Flickr/YouTube Screen Use this screen to upload photos and videos to your Flickr and YouTube accounts. Click Applications > Auto Upload > Flickr/YouTube to open the following screen.
Chapter 11 Auto Upload 11.4.1 Configuring the Flickr Settings In the Applications > Auto Upload > Flickr/YouTube screen, select Flickr from the list and then click the Config button. The following screen displays if you have not authorized the NSA to use a Flickr account. Click OK to continue the authorization process. Figure 155 Linking NSA to Flickr The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account’s information and click Sign In.
Chapter 11 Auto Upload The following page displays asking for your authorization. Click OK, I’LL ALLOW IT to establish a link between the NSA and your Flickr account. Figure 157 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA web configurator. Click Get Ready in the following screen to complete the authorization process.
Chapter 11 Auto Upload Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen.
Chapter 11 Auto Upload The following table describes the labels in this screen. Table 83 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) LABEL DESCRIPTION Flickr Account Configuration Username This field displays the Flickr account authorized for the auto upload feature. Photo Space Usage This shows how much storage space for photos (in size and percentage) you have used and how much space is still available on your Flickr account.
Chapter 11 Auto Upload Table 83 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) (continued) LABEL DESCRIPTION Add Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. • • Share - Select the share from the list. Path - Type the folder location in the share directly or click Browse to open the following screen and navigate to the folder’s location.
Chapter 11 Auto Upload Table 83 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) (continued) LABEL DESCRIPTION Default Safety Level Assign a safety level to your files. Select Safe if the contents of your files are suitable for the general public. Select Moderate if the contents of your files may be offensive to some people. Select Restricted if the contents of your files are not suitable for certain people, such as children or your colleagues.
Chapter 11 Auto Upload Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen.
Chapter 11 Auto Upload The following table describes the labels in this screen. Table 84 Applications > Auto Upload > Config (YouTube) LABEL DESCRIPTION Youtube Account Configuration Username Switch User This field displays the Youtube account authorized for the auto upload feature. Click this to use a different YouTube account for the auto upload feature. Folder Selection Folder Watch List This table displays a list of shares and folders selected for auto upload.
Chapter 11 Auto Upload Table 84 Applications > Auto Upload > Config (YouTube) (continued) LABEL DESCRIPTION Add Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. • • Share - Select the share from the list. Path - Type the folder location in the share directly or click Browse to open the following screen and navigate to the folder’s location. • • Current Location - This is the location of the selected folder.
Chapter 11 Auto Upload 11.5 The FTP Uploadr Screen The FTP Uploadr feature uploads files stored in the NSA to FTP servers. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family. You can link the NSA to the FTP server or the FTP server on another NSA and select shares or folders for the NSA to upload. The NSA uploads the files stored in the specified shares to the FTP server.
Chapter 11 Auto Upload The following table describes the labels in this screen. Table 85 Applications > Auto Upload > FTP Uploadr LABEL DESCRIPTION Enable FTP Uploadr Use the check box to enable or disable the FTP Uploadr. Click Apply to save your changes. When you disable the FTP Uploadr, a screen opens requesting confirmation. Select the check box to stop any current or queued uploads.
Chapter 11 Auto Upload 11.5.1 Adding or Editing an FTP Server Entry Use this screen to add or edit an FTP server entry for auto upload. In the FTP Uploadr screen, click the Add Server or Edit Server button to open the following screen. Figure 163 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server The following table describes the labels in this screen.
Chapter 11 Auto Upload 11.5.2 The FTP Uploadr Preferences Screen Use this screen to configure the general settings for the FTP Uploadr. In the FTP Uploadr screen, click the Preferences icon to open the following screen. Figure 164 Applications > Auto Upload > FTP Uploadr > Preferences The following table describes the labels in this screen.
Chapter 11 Auto Upload Table 87 Applications > Auto Upload > FTP Uploadr > Preferences (continued) LABEL DESCRIPTION Add Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. • • Share - Select the share from the list. Path - Type the folder location in the share directly or click Browse to open the following screen and navigate to the folder’s location. • • Current Location - This is the location of the selected folder.
CHAPTER 12 Users 12.1 Overview This chapter introduces the Users screens of the NSA. Use the Users screens to create and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. • Assign individual users specific access rights for specific shares. Users are people who have access rights to the NSA and can store files there for later retrieval. A user can: • Manage shares that he owns. • Change his own password.
Chapter 12 Users 12.3 The Users Screen Click Sharing > Users to display the screen shown next. Use this screen to create and manage accounts for users who can store files on the NSA. Figure 165 Sharing > Users The following table describes the labels in this screen. Table 88 Sharing > Users LABEL DESCRIPTION Add User Click this to open a screen where you can configure a new user account. Refer to Section 12.3.2 on page 304 to see the screen. Search Click this to display a search field.
Chapter 12 Users Table 88 Sharing > Users (continued) LABEL DESCRIPTION Delete Selected Users Select an account and click this to open a screen where you can delete the user account. User Info Select an account and click this to open a screen displaying the amount of storage space used by the account. You can also check the account’s membership in any groups. Refer to Section 12.4 on page 306 to see the screen.
Chapter 12 Users 12.3.2 Adding or Editing an Account Use this screen to create or edit a NSA user account with NSA access password. Click the Add User button in the Users screen to open the following screen. Click the Edit User button in the screen shown previously to edit an existing account. Figure 166 Sharing > Users > Add or Edit a User The following table describes the labels in this screen.
Chapter 12 Users Table 90 Users > Add or Edit a User (continued) LABEL DESCRIPTION Available Group(s) This field lists the groups created on the NSA to which the selected account does not belong. Group Membership This field lists the groups that the selected account belongs to. Add Selected Group(s) Select a group from the Available Groups list and click this to add the account to that group.
Chapter 12 Users • anonymous • nobody • root • pc-guest • admin • password 12.4 Displaying User Info Use this screen to display a user’s information. In the Users screen, select an account and click User Info to open the following screen. Figure 167 Sharing > Users > User Info The following table describes the labels in this screen. Table 91 Sharing > Users > User Info LABEL DESCRIPTION Username This field displays the selected username.
CHAPTER 13 Groups 13.1 Overview This chapter introduces the Groups screens. Use the Groups screens to create and manage groups. You can assign users to groups and grant individual groups access rights to specific shares. 13.2 What You Can Do • Use the main Groups screen (Section 13.3 on page 307) to display and manage a list of groups created on the NSA. • Use the Add Group screen (Section 13.3.1 on page 309) to create new groups. • Use the Edit Group screen (Section 13.3.
Chapter 13 Groups Click Sharing > Groups to display the screen shown next. Figure 168 Sharing > Groups The following table describes the labels in this screen. Table 92 Sharing > Groups 308 LABEL DESCRIPTION Add Group Click this to open a screen where you can configure a new group. Search Click this to display a search field. Type the name of a group and then click Search to look up the group you specified. Click Clear to close the search function.
Chapter 13 Groups Table 92 Sharing > Groups (continued) LABEL DESCRIPTION Display Number Click the drop-down menu to set how many groups you want to display in one screen. Go to Page Click the drop-down menu to select a page number. Jump to a different page to display and access more groups. Status Group Name This field displays the group icon. This field displays the group names created on the NSA. 13.3.1 Adding or Editing a Group Use this screen to create or edit a NSA group.
Chapter 13 Groups 13.3.2 Group Names Enter a group name from 1 to 32 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characters are not allowed as the first character. The group name can only contain the following characters: • Alphanumeric A-z 0-9. Unicode usernames are supported with CIFS logins, but not FTP or web configurator logins. • Spaces • _ [underscores] • .
CHAPTER 14 Shares 14.1 Overview A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder. You can map a share to a network drive for easy and familiar file transfer for Windows users. 14.2 What You Can Do • Use the Shares screen (Section 14.3 on page 312) to navigate a list of shares created on the NSA. • Use the Add Shares screen (Section 14.3.1 on page 314) to create additional shares on the NSA.
Chapter 14 Shares 14.3 The Shares Screen Click Sharing > Shares in the navigation panel to open the following screen. This screen lists all shares created on the NSA. Figure 170 Sharing > Shares The following table describes the labels in this screen. Table 94 Sharing > Shares 312 LABEL DESCRIPTION Add Share Click this to create a new share. Settings Click this to turn support for Windows offline file synchronization on or off. Recycle Bin Click this to configure recycle bins.
Chapter 14 Shares Table 94 Sharing > Shares (continued) LABEL DESCRIPTION Status This field displays the share icons. represents a Built-in share on a volume on the internal hard drives. represents a Predefined or User-Created share on a volume on the internal hard drives. represents an Auto or User-Created share on a volume on the external (USB) devices. represents a disabled share that no user can access. represents a missing share.
Chapter 14 Shares 14.3.1 Adding or Editing Share Click Add Share to create a new share. In the Shares screen, select a share and click Edit Share to open the following screen. Use this screen to create or edit a share. Figure 171 Shares > Add Share (or Edit Share) The following table describes the labels in this screen. Table 95 Shares > Add Share (or Edit Share) LABEL DESCRIPTION Share Name Type a share name from 1 to 239 single-byte (no Chinese characters allowed for example) ASCII characters.
Chapter 14 Shares Table 95 Shares > Add Share (or Edit Share) (continued) LABEL DESCRIPTION Share Access Assign access rights (full, read only or deny) to users or groups. If you publish the share to the media server or the web, all users will have at least read-only access to the share, regardless of what you configure here. Keep it private to owner means only the share owner (selected above) can access the share.
Chapter 14 Shares The following table describes the labels in this screen. Table 96 Sharing > Shares > Add Share (or Edit Share) > Advanced LABEL DESCRIPTION Available Users/Groups This field lists the users/groups to which you can assign access rights. Authority Use this field to assign access rights to users/groups. Full Control gives users/groups full access (read, write and execute) to all files contained within this share.
Chapter 14 Shares This feature may be useful if you connect to the NSA occasionally from a remote location. Note: Disable oplocks to improve the NSA’s performance unless you need to use the Windows offline file feature. If you do use the Windows offline file feature with the NSA, use it with a share containing only the files you need to access while offline. In the Sharing > Shares screen, click Settings to open the Setting screen. Enable oplocks to support Windows offline file synchronization.
Chapter 14 Shares 14.5 The Recycle Bin Configuration Screen Use this screen to periodically clean up items in all recycle bins. 14.5.1 Recycle Bins Recycle bins in the NSA help users recover accidentally deleted files or folders in the shares. When you delete an item, a recycle folder is created within the share to hold the deleted item. Every share can have its own recycle folder. You must enable the recycle-bin function to recycle deleted items.
Chapter 14 Shares 14.6 The Share Browser Screen Use this screen to create folders, upload files, and edit files within the share. Figure 175 Sharing > Shares > Share Browser The following table describes the labels in this screen. Table 99 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder Type a folder name and click Apply to make a new folder. The name can be 1 to 239 single-byte (no Chinese characters allowed for example) ASCII characters.
Chapter 14 Shares Table 99 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Rename Select a folder or file and click this to open a screen. Enter the name you want and click OK to make the changes. Note: When you change a file name, make sure you keep the file extention. Delete Select a file/folder from the list and click this to open a warning screen. Click Yes to delete the file/folder, or click No to close the screen.
Chapter 14 Shares 14.6.1 Moving or Copying Files Use this screen to move or copy files to another share. In the Share Browser screen, select a file or folder and click Move or Copy to open the following screen. Figure 176 Sharing > Shares > Share Browser > Move (or Copy) The following table describes the labels in this screen. Table 100 Sharing > Shares > Share Browser > Move (or Copy) LABEL DESCRIPTION Shares Select the destination share from the drop-down list.
Chapter 14 Shares 322 NSA320 User’s Guide
CHAPTER 15 Maintenance Screens 15.1 Overview This chapter discusses the Maintenance screens. The Maintenance screens allow you to manage system configurations. 15.2 What You Can Do • Use the Power screen (Section 15.3 on page 324) to configure power settings for the NSA, including power saving, UPS, power on/off after power failure, power on/off schedule, and Wake on LAN. • Use the Log screen (Section 15.4 on page 328) to check the system’s logs. • Use the Configuration screen (Section 15.
Chapter 15 Maintenance Screens 15.3 The Power Screen Use this screen to manage power settings for the NSA. Click Maintenance > Power to display the following screen. Figure 177 Maintenance > Power The following table describes the labels in this screen. Table 101 Maintenance > Power LABEL DESCRIPTION Power Management Turn off hard disk(s) Enter the number of minutes the NSA will sit idle before spinning the hard disks down to sleep. The default power-off time is 15 minutes.
Chapter 15 Maintenance Screens Table 101 Maintenance > Power (continued) LABEL DESCRIPTION Minimum UPS Capacity When you use an APC Uninterruptible Power Supply (UPS) with a USB connection to the NSA, the NSA shuts itself down if the APC UPS’s battery charge gets down to the percentage you specify in this field. This allows the NSA to shut down properly and avoid data loss caused by a power failure when the UPS stops supplying power. A setting around 50% is recommended.
Chapter 15 Maintenance Screens 15.3.1 Editing the Power Control Schedule Screen Click Maintenance > Power Management > Edit to open this screen. Use this screen to configure power control schedules to have the NSA turn on, turn off, or reboot at specified times. Figure 178 Maintenance > Power Management > Edit The following table describes the labels in this screen.
Chapter 15 Maintenance Screens Table 102 Maintenance > Power Management > Edit (continued) LABEL DESCRIPTION Type Select whether this power control schedule has the NSA turn on, turn off, or reboot. Frequency Select whether the NSA is to apply this power control schedule entry on a monthly, weekly, or daily basis. Execute Time (hh:mm) Enter the time, day, and/or day of the month as appropriate for this power control schedule entry.
Chapter 15 Maintenance Screens 15.4 The Log Screen Click Maintenance > Log to open the following screen. Use this screen to display all NSA logs. There are at most 512 entries in the log. Older logs are removed by the system. You cannot download the log file via FTP or CIFS. Figure 179 Maintenance > Log The following table describes the labels in this screen. Table 103 Maintenance > Log LABEL DESCRIPTION Refresh Click this to update the log display.
Chapter 15 Maintenance Screens 15.4.1 Report Config Screen In the Log screen, click Report Config to do the following: • Use the Email Setting screen (Section 15.4.2 on page 329) to enable and configure e-mail alerts from the NSA. • Use the Report Setting screen (Section 15.4.3 on page 330) to select the type of alerts you want to receive through e-mail and schedule when the NSA e-mails the alerts. • Use the Syslog Server Setting screen (Section 15.4.
Chapter 15 Maintenance Screens Table 104 Maintenance > Log > Report Config: Email Setting (continued) LABEL DESCRIPTION Password Enter the password for the e-mail server. Password (Confirm) Re-enter the password to confirm it. After apply settings, send a test email Click this to have the NSA send a test e-mail to the settings you have entered. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. 15.4.
Chapter 15 Maintenance Screens 15.4.4 Syslog Server Setting You can enable the syslog server and select the categories to include in the log report. In the Report Config screen, click the Syslog Server Setting tab to open the following screen. Figure 182 Maintenance > Log > Report Config: Syslog Server Setting The following table describes the labels in this screen.
Chapter 15 Maintenance Screens 15.5 The Configuration Screen Click Maintenance > Configuration to open the following screen. Use this screen to backup or restore the NSA configuration settings. Figure 183 Maintenance > Configuration The following table describes the labels in this screen. Table 107 Maintenance > Configuration LABEL DESCRIPTION Backup Current Configuration Settings Backup Restore Configuration Click this to save the current configuration of the NSA to your computer.
Chapter 15 Maintenance Screens 15.6 SSL Certification Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that was issued by a known certificate authority.
Chapter 15 Maintenance Screens The following table describes the labels in this screen. Table 108 Maintenance > SSL LABEL DESCRIPTION Force HTTPs Select the Force HTTPs option to turn on the NSA’s web browser security. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it. Note: The NSA will restart the web configurator after you click Apply. The NSA displays a warning screen if applying your change may disconnect some users.
Chapter 15 Maintenance Screens 15.6.1 Modifying or Creating a Certificate When you select the Edit a self-signed CA certificate option, then click the Edit button, a screen opens to allow you to make adjustments to the NSA’s public key certificate. The screen is also the same for the Create a certificate authorized by other CA option. Figure 185 Maintenance > SSL > Create or Edit a Certificate The following table describes the labels in this screen.
Chapter 15 Maintenance Screens Table 109 Maintenance > SSL > Create or Edit a Certificate LABEL DESCRIPTION Apply Click this to save your changes. Cancel Click this to discard changes and close the window. 15.7 The Firmware Upgrade Screen Use this screen to upgrade the NSA firmware. You should first have downloaded the latest firmware files from the ZyXEL website. Do not turn off the NSA while it is upgrading the firmware or you may render it unusable.
Chapter 15 Maintenance Screens Table 110 Maintenance > FW Upgrade (continued) LABEL DESCRIPTION Periodically Check for Latest Firmware Automatically Select this to have the NSA regularly check ZyXEL’s server for updated firmware. The NSA notifies you at login if a new firmware is available. Click Apply to save this field’s setting. Check for Latest Firmware Now Click this to check ZyXEL’s server for updated firmware. 15.
Chapter 15 Maintenance Screens When you click the Shutdown button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the shutdown. Figure 189 Maintenance > Shutdown > Confirm Shutdown 15.9 Technical Reference This section provides technical background information on the topics discussed in this chapter. 15.9.1 Log Classes The following table shows information on log classes.
Chapter 15 Maintenance Screens Table 113 Log Severity Levels (continued) LEVEL DESCRIPTION 2 Critical 3 Error 4 Warning 5 Notice 6 Info 15.9.3 Log Messages Here are some example log messages. Table 114 Log Messages CLASS SEVERITY MESSAGE Auto upload INFO %s is queued. Auto upload INFO %s uploaded (Flickr or YouTube Upload). Auto upload WARNING error uploading "%s" (%s): %s Auto upload INFO %s will not be uploaded to %s for there is already a duplicate file.
Chapter 15 Maintenance Screens Table 114 Log Messages (continued) 340 CLASS SEVERITY MESSAGE Copy/Sync Button INFO [USB Sync] Deleting %s from Internal Volume. Copy/Sync Button INFO [USB Sync] Deleting %s from USB. Copy/Sync Button INFO [USB Sync] Deleting %s from USB Recursively. Copy/Sync Button INFO [USB Sync] Finished. Elapsed Time %s Seconds. Copy/Sync Button INFO [USB Sync] Moving %s from Internal Volume to Backup Folder.
Chapter 15 Maintenance Screens Table 114 Log Messages (continued) CLASS SEVERITY MESSAGE Download Service INFO Download service set max BT upload rate to %d KB/s by user Download Service INFO Download service set max download slot to %d Download Service INFO Download service set seeding time to %d minutues Download Service INFO Download service set TCP port to %d and UDP port to %d Download Service INFO Download service set torrent monitor location to %s Download Service INFO Download s
Chapter 15 Maintenance Screens Table 114 Log Messages (continued) 342 CLASS SEVERITY MESSAGE Download Service WARNING Download service default torrent location does not exist. Load default Groups NOTICE Add new group %s. Groups NOTICE Delete group %s. Network NOTICE %s is active because of changing Port Group. Enable DHCP client. Network NOTICE %s is inactive because of changing Port Group. Disable DHCP client. Network NOTICE %s MTU > (%s MTU - 8), %s may not work correctly.
Chapter 15 Maintenance Screens Table 114 Log Messages (continued) CLASS SEVERITY MESSAGE Services NOTICE FTP server stops Services NOTICE FTP server starts Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to '%s' Services NOTICE NTP server has set to null Services NOTICE The NTP service is disabled. Services NOTICE The NTP service is enabled.
Chapter 15 Maintenance Screens Table 114 Log Messages (continued) 344 CLASS SEVERITY MESSAGE Storage INFO Create External Normal Volume [%s] (%s): SUCCESS Storage INFO Create Internal Volume [%s] (%s): SUCCESS Storage INFO Rename External Volume to [%s]: SUCCESS Storage INFO Scan External Volume: SUCCESS Storage INFO Scan Internal Volume (%s operation): SUCCESS System INFO NTP update failed System INFO NTP updates successfully from %s System INFO NTP fails to update from %s Sys
Chapter 15 Maintenance Screens Table 114 Log Messages (continued) CLASS SEVERITY MESSAGE Backup/ Restore ERROR When query remote target [%s]: %s Backup/ Restore INFO Backup job [%s] successfully Backup/ Restore ERROR When backup [%s]: %s Backup/ Restore ERROR When backup [%s], error happens: %s Backup/ Restore INFO Start to restore backup job [%s]. Backup/ Restore INFO Restore backup job [%s] successfully.
Chapter 15 Maintenance Screens 346 NSA320 User’s Guide
CHAPTER 16 Protecting Your Data 16.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 16.2 Protection Methods There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.
Chapter 16 Protecting Your Data 16.3 Configuration File Backup and Restoration Use the Maintenance > Configuration menus to create a file of your NSA configurations such as passwords, shares and volumes created, network settings and so on. If you’re going to do some major configuration changes, then it is advisable to create a configuration backup file.
Chapter 16 Protecting Your Data 1 Since a computer restart is required, close your other files and programs before installing the Memeo Autobackup software. 2 Insert the included CD into your CD-ROM drive. Click the Tools icon in the screen that displays. Then click Memeo Instant Backup Software. Note: If this screen does not display, use Windows Explorer (My Computer) to go to the CD-ROM (commonly drive D). Double-click setup.exe. 3 Follow the instructions to install the software.
Chapter 16 Protecting Your Data 6 In this screen, select the items that you want to back up. Figure 192 Backup Items 7 This screen lists the items you selected for backup. Confirm your selections and click Next.
Chapter 16 Protecting Your Data 8 Specify a name for your backup plan (or just use the default). Click Next and then Done. Figure 194 Backup Plan Name 16.4.2 Using Memeo Autobackup After the Initial Setup After you have installed and configured Memeo Autobackup, double-click the icon in the system tray to open the program’s start screen. If the icon is not displayed, you can click Start > Programs > Memeo Autobackup > Memeo Autobackup to start it.
Chapter 16 Protecting Your Data 352 NSA320 User’s Guide
CHAPTER 17 Troubleshooting 17.1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories.
Chapter 17 Troubleshooting • Make sure you are using the power adaptor or cord included with the NSA. • Make sure the power adaptor or cord is connected to the NSA and plugged in to an appropriate power source. Make sure the power source is turned on. • Turn the NSA off and on. • If the problem continues, contact the vendor. An HDD LED is off. The HDD LED is off when the NSA cannot detect a hard drive in the drive bay. Replace or install a hard drive. See Installing or replacing a hard disk.
Chapter 17 Troubleshooting • If you are using a single-disk JBOD volume, you need to create a new volume on the new drive. • If you are using a two-disk JBOD volume, you need to create a whole new volume on both drives. The LAN LED (by the LAN port) is off. • Make sure the Ethernet cable is connected properly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on.
Chapter 17 Troubleshooting 17.3 NAS Starter Utility The NAS Starter Utility cannot discover my NSA. • Close the NAS Starter Utility and reopen it. • Check your hardware connections and make sure they are set up correctly. • Only one instance of the NAS Starter Utility can run on your computer. Make sure you close any duplicate windows for this application. • Wait for the SYS LED to stop blinking before clicking Discover. • Confirm that the computer running the NAS Starter Utility has a network connection.
Chapter 17 Troubleshooting I have at least two NSAs in my network, how do I identify which one I want to configure in the NAS Starter Utility screens. If you have several NSAs connected to your computer/network, give each a unique name. You may have to disconnect all but one and use the NAS Starter Utility to rename it. Then connect another NSA and rename it and continue to connect and rename the NSAs one-by-one until they are all connected and each has a unique name.
Chapter 17 Troubleshooting • The default server name is nsa320, if you have changed the server name, use the new one. • If the server name has been changed and you do not know the new server name, see the troubleshooting suggestions for I forgot the server name of the NSA. • If it still doesn’t work, try using the NAS Starter Utility. • Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.3 on page 25.
Chapter 17 Troubleshooting 17.4.1 Enabling Scripting of Safe ActiveX Controls If pages of the web configurator do not display properly in Internet Explorer, check that scripting of safe ActiveX controls is enabled. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 196 Internet Options: Security 2 Click the Custom Level... button. 3 Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default).
Chapter 17 Troubleshooting 4 Click OK to close the window. Figure 197 Security Settings - Script Safe ActiveX Controls I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly. The default username is admin, and the default password is 1234. These fields are casesensitive, so make sure [Caps Lock] is not on. • Turn the NSA off and on. • If this does not work, see Section 1.3.2 on page 27 to reset the device.
Chapter 17 Troubleshooting 17.5 I Cannot Access The NSA I cannot access a share. • Check that the NSA is turned on and connected to the network. Try to ping the NSA or use the NAS Starter Utility to discover it. • Make sure you have used the NAS Starter Utility to initialize your NSA. See Chapter 2 on page 29 for more information. • Check that you entered your login name and password correctly. • Check that the share exists and check its access settings.
Chapter 17 Troubleshooting • Check the Access Control List (ACL) of read/write permissions associated with specific files and/or folders. Account names added to the list are linked to the files and folders that they are allowed to access, along with what kinds of actions they are allowed to perform with those files and folders (delete, move, rename, and so on). • The user’s computer may already be connected to another of the NSA’s shares using a different user name and/or password.
Chapter 17 Troubleshooting In addition to the checks listed previously for local users, check that the domain controller is turned on and connected to the network. A user can access a share but cannot access individual folders or files within the share. • Check the Access Control List (ACL) of read/write permissions associated with the share’s specific files and/or folders.
Chapter 17 Troubleshooting 17.9 File Transfer I want to transfer my file(s) from my local computer or storage device to the NSA. • After you initialize your hard disk, you can directly access the folders in your NSA and transfer files in the same way you transfer files in your local computer: 1 On your Windows computer, click Start > Run or open a web browser. 2 Enter \\nsa320 (default) or the Server Name you assigned the NSA. This shows you the folders in the NSA.
Chapter 17 Troubleshooting 17.10 Networking I want to control who can access my folder(s)/file(s). • If you are an administrator, you can configure a user’s access rights. Use the Shares screen (Section 14.3 on page 312) to do this. • If you enabled Web Publishing for a folder, anyone on your network can play the media files in the published shares. No user name and password or other form of security is used. The media server is enabled by default with the video, photo, and music shares published.
Chapter 17 Troubleshooting • The firmware installed in your NSA includes the features mentioned in Section 3.5.2 on page 67. This does not include the applications you can install using the Package Management screen. • You can use the Package Management screen (Chapter 10 on page 231) to install more applications from a web location (specified in the firmware) to your NSA.
Chapter 17 Troubleshooting 2 Go to Applications > Media Server. Make sure the share containing the music files is published and the iTunes server option is enabled. 3 If an iTunes client is connected, the NSA’s iTunes server function scans the published media server folders for files every three minutes. Leave iTunes connected to the NSA for three minutes. Then use the NSA’s eject button (as shown next) to disconnect. Figure 198 iTunes Eject Button 4 Then click the NSA’s link to reconnect.
Chapter 17 Troubleshooting I cannot use iTunes to play files located on my NSA. 1 Make sure the files are a format supported by iTunes. See Section 18.5 on page 381. 2 If you have files from the iTunes Store that use DRM, you need to use your Apple account ID and password to authorize other computers to play the files. Apple permits you to authorize up to five computers at a time. To authorize a computer, open iTunes and click Store > Authorize Computer.
Chapter 17 Troubleshooting I cannot find the download files. By default, the Download Service and Broadcatching features store downloaded files as follows: • BitTorrent jobs are stored in /*/incoming (where ‘*’ is a folder that you have set.) • HTTP/FTP jobs are stored in /* (where ‘*’ is a folder that you have set.) • All jobs triggered by RSS channels create the subfolder in /* using the channel name where it store all files downloaded from that channel (where ‘*’ is a folder that you have set.
Chapter 17 Troubleshooting • If Firefox access to the share does not work, check that you did not set the Web publishing feature to use one of the following ports. (Firefox blocks these ports by default.
Chapter 17 Troubleshooting 2a If the log message displays “no such file or directory”, the file may have been removed from the NSA. Make sure the file still exists in the watch folder. 2b If the log message displays “filename is queued”, the file may still be waiting for auto upload. Check the grace period setting in the service’s Configuration screen. You can set a smaller grace period to shorten the queue time.
Chapter 17 Troubleshooting You need to be connected to an eMule server before you can use the Search screen. Wait for the NSA to connect to a server before configuring the Search screen. I want to know how my hard disk is performing. Use S.M.A.R.T. (Self Monitoring, Analysis, and Reporting Technology) to monitor hard disks. It detects and reports the reliability of hard disks using standard indicators, enabling administrators to anticipate possible disk failures.
CHAPTER 18 Product Specifications See also Chapter 1 on page 23 for a general overview of the key features. 18.1 Physical Features These are the main external physical features. Table 117 Physical Features USB Ports 3 USB (version 2) ports. Copy or sync files directly from the NSA to compatible USB devices like card readers, MP3 players, mass storage devices, and digital cameras without using a computer. Copy or sync files directly from a USB device to the NSA.
Chapter 18 Product Specifications Table 117 Physical Features (continued) Power Button Press the Power button for one second to turn it on. Turn off the NSA before unplugging it. Press the Power button for 3 seconds until you hear one beep, then release it. The NSA goes starts to shutdown its software and turns off. Press the Power button for 5 seconds until you hear two beeps, then release it. The NSA turns off immediately.
Chapter 18 Product Specifications 18.2 Firmware Features These are some of the main firmware features of the NSA. Table 118 Firmware Features DLNA Server The NSA is a DLNA-compliant media server that lets DLNAcompliant media clients play video, audio, and photo content files stored on the NSA. RAID File Storage Use RAID 1 if you have two drives and want to mirror primary data to the second drive. If one drive fails, replace it and then re-synchronize to recover all data.
Chapter 18 Product Specifications Table 118 Firmware Features (continued) Auto Upload The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. It is a convenient way to share media files with your friends and family. You can link the NSA to your Flickr and/or YouTube account and select shares for the NSA to upload. The NSA uploads the media files stored in the specified shares to your Flickr and/or YouTube account.
Chapter 18 Product Specifications Table 119 NSA Hardware Specifications (continued) Default Password 1234 Dimensions 108 (W) x 205 (D) x147 (H) mm (4.3 (W) x 5.8 (D) x 8.1 (H) inch) Weight 1.02 kg (2.25 lb.) without hard drives Drive Bays Two Compatible Hard Disks SATA I and SATA II 3.0 Gbit/s (Serial Advanced Technology Attachment) compatible hard drives. Maximum Number of Folders Per Share The NSA’s media server function can detect up to 8,000 folders within a single published share.
Chapter 18 Product Specifications Table 120 NSA Firmware Specifications (continued) Network File Sharing Protocol CIFS/SMB for Windows HTTP for web browser FTP, FTPES (TLS explicit mode) Network Security Authentication Share level Supported Operating Systems Windows XP (SP2, SP3) Windows Vista (32 bit) Windows 7 (32 and 64 bit) Maximum Number of Users Allowed 256A Maximum Number of Groups Allowed 128B Maximum Number of Concurrent FTP Sessions 128A Maximum Number of Concurrent CIFS Sessions 32A
Chapter 18 Product Specifications Table 121 Supported Standards and Recommendations (continued) ECMA-262 Edition 2 The ECMAScript standard’s second revision; also ISO standard 16262. ECMA-262 Edition 3 The ECMAScript standard’s third revision; corresponds to JavaScript 1.5. ECMA-357 ECMAScript for XML (E4X). See also the E4X errata. HTML 3.2 Reference Specification The HyperText Markup Language (HTML). HTML 4.
Chapter 18 Product Specifications Table 121 Supported Standards and Recommendations (continued) RFC 4248 The telnet URI Scheme RFC 793 (STD-7) - Transmission Control Protocol RFC 959 (STD-9) - File Transfer Protocol SATA SATA I and SATA II 3.0 Gbit/s (Serial Advanced Technology Attachment) compatible hard drives. UPnP Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. USB 2.
Chapter 18 Product Specifications Table 122 Supported Media Server Content Formats (continued) CATEGORY FILE TYPE EXTENSION Music MP3 mp3, mpa Ogg Vorbis ogg RealMedia ra, ram WAVE wav Windows Media Audio wma Matroska mka Photo Monkeys Audio ape MP1 mp1 MP4 mp4, m4a, m4p PCM pcm LPCM lpcm DTS dts AC3 ac3 Free Lossless Audio Codec flac Au au AAC aac 3GPP 3gp, 3g2 AIFF aif, aiff RIFF-based MIDI rmi Playlist wpl, pls, asx, wax, m3u Bitmap bmp JPEG jpe, jpeg, jpg
Chapter 18 Product Specifications Note: These are results from a laboratory test and are for your reference only. Table 123 Power Consumption in Watts (W) 382 POWER MODE POWER CONSUMPTION Access Mode 32.
APPENDIX A Setting Up Your Computer’s IP Address Note: Your specific NSA may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix A Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 384 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon.
Appendix A Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix A Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings 1 Click Start > All Programs > Accessories > Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel.
Appendix A Setting Up Your Computer’s IP Address 3 Click Change adapter settings. 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings 1 Click Start > All Programs > Accessories > Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. 3 The IP settings are displayed as follows.
Appendix A Setting Up Your Computer’s IP Address 396 NSA320 User’s Guide
APPENDIX B Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 201 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 202 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 203 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 204 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 205 Security Settings - Java Scripting Java Permissions 402 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 206 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window. Figure 207 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 406 NSA320 User’s Guide
APPENDIX C Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix C Common Services Table 124 Commonly Used Services (continued) 408 NAME PROTOCOL PORT(S) DESCRIPTION ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.
Appendix C Common Services Table 124 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL (GRE) User-Defined 47 PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCMD TCP 512 Remote Command Service.
Appendix C Common Services Table 124 Commonly Used Services (continued) 410 NAME PROTOCOL PORT(S) DESCRIPTION TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution.
APPENDIX D Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix D Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 210 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix D Importing Certificates 3 In the Address Bar, click Certificate Error > View certificates. Figure 212 Internet Explorer 7: Certificate Error 4 In the Certificate dialog box, click Install Certificate.
Appendix D Importing Certificates 5 In the Certificate Import Wizard, click Next. Figure 214 Internet Explorer 7: Certificate Import Wizard 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9.
Appendix D Importing Certificates 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 216 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix D Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 218 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes.
Appendix D Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 220 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 222 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix D Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click Tools > Internet Options. Figure 224 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix D Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 226 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 227 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix D Importing Certificates 6 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix D Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix D Importing Certificates 3 The certificate is stored and you can now connect securely to the Web Configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click Tools > Options. Figure 231 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix D Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 233 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 234 5 Firefox 2: Certificate Manager Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information.
Appendix D Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click Tools > Options. Figure 235 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix D Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 237 4 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 238 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix D Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix D Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click Tools > Preferences.
Appendix D Importing Certificates 2 In Preferences, click Advanced > Security > Manage certificates.
Appendix D Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 243 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix D Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 245 6 Next, click OK. Figure 246 7 Opera 9: Install authority certificate Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix D Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click Tools > Preferences. Figure 247 Opera 9: Tools Menu 2 In Preferences, Advanced > Security > Manage certificates.
Appendix D Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 249 4 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix D Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 250 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 251 Konqueror 3.
Appendix D Importing Certificates 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 252 Konqueror 3.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 253 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 254 Konqueror 3.
Appendix D Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page’s security details.
Appendix D Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 256 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 257 Konqueror 3.
Appendix D Importing Certificates Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button.
Appendix D Importing Certificates 442 NSA320 User’s Guide
APPENDIX E Open Source Licences End-User License Agreement for “NSA320” WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix E Open Source Licences You have no ownership rights in the Software. Rather, you have a license to use the Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement. 3.
Appendix E Open Source Licences 5.Confidentiality You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own most confidential information.
Appendix E Open Source Licences THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME. YOU SHALL NOT EXPORT THE SOFTWARE, DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS.
Appendix E Open Source Licences NOTE: Some components of this product incorporate source code covered under the open source code licenses. Further, for at least three (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical Support (support@zyxel.com.
Appendix E Open Source Licences Public License is the better strategy to use in any particular case, based on the explanations below. When we speak of free software, we are referring to freedom of use, not price.
Appendix E Open Source Licences derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License.
Appendix E Open Source Licences software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".
Appendix E Open Source Licences part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Appendix E Open Source Licences significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work.
Appendix E Open Source Licences include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system.
Appendix E Open Source Licences License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all.
Appendix E Open Source Licences NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/ OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Appendix E Open Source Licences Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it.
Appendix E Open Source Licences work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you".
Appendix E Open Source Licences each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
Appendix E Open Source Licences 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License.
Appendix E Open Source Licences spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation.
Appendix E Open Source Licences This Product includes mediainfo software under below license MediaInfo(Lib) License Version 1.1, 3 January 2010 Copyright 2002-2010 MediaArea.net SARL. All rights reserved. Redistribution and use in source and binary forms, without modification, are permitted provided that the following conditions are met: 1.Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
Appendix E Open Source Licences This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3 of the GNU General Public License, supplemented by the additional permissions listed below. 0. Additional Definitions. As used herein, “this License” refers to version 3 of the GNU Lesser General Public License, and the “GNU GPL” refers to version 3 of the GNU General Public License.
Appendix E Open Source Licences •b) under the GNU GPL, with none of the additional permissions of this License applicable to that copy. 3. Object Code Incorporating Material from Library Header Files. The object code form of an Application may incorporate material from a header file that is part of the Library.
Appendix E Open Source Licences •e) Provide Installation Information, but only if you would otherwise be required to provide such information under section 6 of the GNU GPL, and only to the extent that such information is necessary to install and execute a modified version of the Combined Work produced by recombining or relinking the Application with a modified version of the Linked Version.
Appendix E Open Source Licences GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation, Inc. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works.
Appendix E Open Source Licences Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable.
Appendix E Open Source Licences An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License.
Appendix E Open Source Licences All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.
Appendix E Open Source Licences You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: •a) The work must carry prominent notices stating that you modified it, and giving a relevant date. •b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7.
Appendix E Open Source Licences software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. •c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.
Appendix E Open Source Licences If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information.
Appendix E Open Source Licences •b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or •c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or •d) Limiting the use for publicity purposes of names of licensors or authors of the material; or •e) Declining
Appendix E Open Source Licences Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.
Appendix E Open Source Licences A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”.
Appendix E Open Source Licences third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent l
Appendix E Open Source Licences If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty.
Appendix E Open Source Licences Copyright © 2007 Free Software Foundation, Inc. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works.
Appendix E Open Source Licences for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users. Finally, every program is threatened constantly by software patents.
Appendix E Open Source Licences the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion. 1. Source Code. The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work.
Appendix E Open Source Licences given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law. You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force.
Appendix E Open Source Licences •a) The work must carry prominent notices stating that you modified it, and giving a relevant date. •b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”. •c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy.
Appendix E Open Source Licences •c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.
Appendix E Open Source Licences characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM).
Appendix E Open Source Licences •c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or •d) Limiting the use for publicity purposes of names of licensors or authors of the material; or •e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or •f) Requiring indemnification of licensors and authors of that material by anyon
Appendix E Open Source Licences this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10. 9.
Appendix E Open Source Licences A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version.
Appendix E Open Source Licences primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007. Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law. 12. No Surrender of Others' Freedom.
Appendix E Open Source Licences Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
Appendix E Open Source Licences and each file should have at least the “copyright” line and a pointer to where the full notice is found. Copyright (C) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
Appendix E Open Source Licences The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, your program's commands might be different; for a GUI interface, you would use an “about box”. You should also get your employer (if you work as a programmer) or school, if any, to sign a “copyright disclaimer” for the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see .
Appendix E Open Source Licences THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This Product includes flac software under FDL license GNU Free Documentation License Version 1.2, November 2002 Copyright (C) 2000,2001,2002 Free Software Foundation, Inc.
Appendix E Open Source Licences below, refers to any such manual or work. Any member of the public is a licensee, and is addressed as "you". You accept the license if you copy, modify or distribute the work in a way requiring permission under copyright law. A "Modified Version" of the Document means any work containing the Document or a portion of it, either copied verbatim, or with modifications and/or translated into another language.
Appendix E Open Source Licences and JPG. Opaque formats include proprietary ormats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML, PostScript or PDF produced by some word processors for output purposes only.
Appendix E Open Source Licences long as they preserve the title of the Document and satisfy these conditions, can be treated as verbatim copying in other respects. If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages.
Appendix E Open Source Licences C. State on the Title page the name of the publisher of the Modified Version, as the publisher. D. Preserve all the copyright notices of the Document. E. Add an appropriate copyright notice for your modifications adjacent to the other copyright notices. F. Include, immediately after the copyright notices, a license notice giving the public permission to use the Modified Version under the terms of this License, in the form shown in the Addendum below. G.
Appendix E Open Source Licences If the Modified Version includes new front-matter sections or appendices that qualify as Secondary Sections and contain no material copied from the Document, you may at your option designate some or all of these sections as invariant. To do this, add their titles to the list of Invariant Sections in the Modified Version's license notice.These titles must be distinct from any other section titles.
Appendix E Open Source Licences 6. COLLECTIONS OF DOCUMENTS You may make a collection consisting of the Document and other documents released under this License, and replace the individual copies of this License in the various documents with a single copy that is included in the collection, provided that you follow the rules of this License for verbatim copying of each of the documents in all other respects.
Appendix E Open Source Licences its Title (section 1) will typically require changing the actual title. 9. TERMINATION You may not copy, modify, sublicense, or distribute the Document except as expressly provided for under this License. Any other attempt to copy, modify, sublicense or distribute the Document is void, and will automatically terminate your rights under this License.
Appendix E Open Source Licences with the Invariant Sections being LIST THEIR TITLES, with the Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST. If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the situation.
Appendix E Open Source Licences Code. 1.6. "Initial Developer" means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A. 1.7. "Larger Work" means a work which combines Covered Code or portions thereof with code not governed by the terms of this License. 1.8. "License" means this document. 1.8.1.
Appendix E Open Source Licences and apparatus claims, in any patent Licensable by grantor. 1.11. "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice.
Appendix E Open Source Licences (a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and (b) under Patents Claims infringed by the making, using or selling of Original Code, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Code (or p
Appendix E Open Source Licences and/or as part of a Larger Work; and (b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: 1) Modifications made by that Contributor (or portions thereof); and 2) the combination of Modifications made by that Contributor with its Contributor Version
Appendix E Open Source Licences Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute. You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder.
Appendix E Open Source Licences the Modification is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code. 3.4. Intellectual Property Matters (a) Third Party Claims.
Appendix E Open Source Licences (c) Representations. Contributor represents that, except as disclosed pursuant to Section 3.4(a) above, Contributor believes that Contributor's Modifications are Contributor's original creation(s) and/or Contributor has sufficient rights to grant the rights conveyed by this License. 3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code.
Appendix E Open Source Licences 3.6. Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code, and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License, including a description of how and where You have fulfilled the obligations of Section 3.2.
Appendix E Open Source Licences Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Code. 4. Inability to Comply Due to Statute or Regulation.
Appendix E Open Source Licences version. You may also choose to use such Covered Code under the terms of any subsequent version of the License published by Netscape. No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License. 6.3. Derivative Works.
Appendix E Open Source Licences LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 8. TERMINATION. 8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License.
Appendix E Open Source Licences Sections 2.1 and/or 2.2 automatically terminate at the expiration of the 60 day notice period specified above. (b) any software, hardware, or device, other than such Participant's Contributor Version, directly or indirectly infringes any patent, then any rights granted to You by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the date You first made, used, sold, distributed, or had made, Modifications made by that Participant. 8.3.
Appendix E Open Source Licences ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES.
Appendix E Open Source Licences District of California, with venue lying in Santa Clara County, California, with the losing party responsible for costs, including without limitation, court costs and reasonable attorneys' fees and expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. 12.
Appendix E Open Source Licences compliance with the License. You may obtain a copy of the License at http://www.mozilla.org/MPL/ Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. The Original Code is ______________________________________. The Initial Developer of the Original Code is ________________________.
Appendix E Open Source Licences This Product includes DBD-mysql software under below license Copyright (c) 2003 Rudolf Lippan Copyright (c) 1997-2003 Jochen Wiedmann You may distribute under the terms of either the GNU General Public License or the Artistic License, as specified in the Perl README file.
Appendix E Open Source Licences common command code (sg_cmds_basic.[hc] and sg_cmds_extra.[hc]) and later utilities. They are Copyright: Douglas Gilbert. The author's intention is that the BSD licensed code can be used freely by others. On Debian systems, the complete text of the BSD License can be found in `/usr/share/common-licenses/BSD'. This Product includes DBI software under below license The DBI module is Copyright (c) 1994-2008 Tim Bunce. Ireland. All rights reserved.
Appendix E Open Source Licences o Transition o Acknowledgements INTRODUCTION The Boost Software License specifies the terms and conditions of use for those Boost libraries that it covers. Currently, some Boost libraries have their own licenses. The hope is that eventually all Boost libraries will be covered by the Boost Software License. In the meantime, all libraries comply with the Boost License requirements. HISTORY As Boost grew, it became unmanageable for each Boost file to have its own license.
Appendix E Open Source Licences obtaining a copy of the software and accompanying documentation covered by this license (the "Software") to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following: The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, m
Appendix E Open Source Licences will want to carefully review each license, even if they've been told that they're all standard. I would expect that, unless we're remarkably brilliant (or lucky) in drafting the standard Boost license, the standard license won't satisfy the legal departments of all corporations. I imagine that some will, for instance, absolutely insist that licensors provide a warranty of title and provide indemnification for third-party intellectual property infringement claims.
Appendix E Open Source Licences How should Boost programmers apply the license to source and header files? Add a comment based on the following template, substituting appropriate text for the italicized portion: // Copyright Joe Coder 2004 - 2006. // Distributed under the Boost Software License, Version 1.0. // // (See accompanying file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) Please leave an empty line before and after the above comment block.
Appendix E Open Source Licences detailed wording was rejected as not being legally necessary, and reducing readability. Why is the "disclaimer" paragraph of the license entirely in uppercase? Capitalization of these particular provisions is a US legal mandate for consumer protection. (Diane Cabell) Does the copyright and license cover interfaces too? The conceptual interface to a library isn't covered.
Appendix E Open Source Licences TRANSITION To ease the transition of the code base towards the new common license, several people decided to give a blanket permission for all their contributions to use the new license. This hopefully helps maintainers to switch to the new license once the list contains enough names without asking over and over again for each change. Please consider adding your name to the list. ACKNOWLEDGEMENTS Dave Abrahams led the Boost effort to develop better licensing.
Appendix E Open Source Licences with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
Appendix E Open Source Licences Yes! libcurl does not put any restrictions on the program that uses the library. 6.4 I have a program that uses LGPL libraries, can I use libcurl? Yes! The LGPL license doesn't clash with other licenses. 6.5 Can I modify curl/libcurl for my program and keep the changes secret? Yes! The MIT/X derivate license practically allows you to do almost anything with the sources, on the condition that the copyright texts in the sources are left intact. 6.
Appendix E Open Source Licences code. You do not have to reveal or make public that you are using libcurl within your app. As can be seen here: http://curl.haxx.se/docs/companies.html and elsewhere, more and more companies are discovering the power of libcurl and take advantage of it even in commercial environments. This Product includes httpd software under below license Apache HTTP Server Copyright 2008 The Apache Software Foundation.
Appendix E Open Source Licences Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
Appendix E Open Source Licences and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).
Appendix E Open Source Licences "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License.
Appendix E Open Source Licences Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark,
Appendix E Open Source Licences or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.
Appendix E Open Source Licences of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability.
Appendix E Open Source Licences END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format.
Appendix E Open Source Licences For the mod_mime_magic component: /* * mod_mime_magic: MIME type lookup via file magic numbers * Copyright (c) 1996-1997 Cisco Systems, Inc. * * This software was submitted by Cisco Systems to the Apache Group in July * 1997. Future revisions and derivatives of this source code must * acknowledge Cisco Systems as the original contributor of this module. * All other licensing and usage conditions are those of the Apache Group.
Appendix E Open Source Licences * * 2. The origin of this software must not be misrepresented, either by * explicit claim or by omission. Since few users ever read sources, credits * must appear in the documentation. * * 3. Altered versions must be plainly marked as such, and must not be * misrepresented as being the original software. Since few users ever read * sources, credits must appear in the documentation. * * 4. This notice may not be removed or altered.
Appendix E Open Source Licences * httpd@ncsa.uiuc.edu * * Copyright (C) 1995, Board of Trustees of the University of Illinois * ***************************************************************** ******* * * md5.c: NCSA HTTPd code which uses the md5c.c RSA Code * * Original Code Copyright (C) 1994, Jeff Hostetler, Spyglass, Inc. * Portions of Content-MD5 code Copyright (C) 1993, 1994 by Carnegie Mellon * University (see Copyright below).
Appendix E Open Source Licences * and that both that copyright notice and this permission notice * appear in supporting documentation, and that the name of Carnegie * Mellon University not be used in advertising or publicity * pertaining to distribution of the software without specific, * written prior permission. Carnegie Mellon University makes no * representations about the suitability of this software for any * purpose. It is provided "as is" without express or implied * warranty.
Appendix E Open Source Licences * Permission to use, copy, modify, and distribute this material * for any purpose and without fee is hereby granted, provided * that the above copyright notice and this permission notice * appear in all copies, and that the name of Bellcore not be * used in advertising or publicity pertaining to this * material without the specific, prior written permission * of an authorized representative of Bellcore.
Appendix E Open Source Licences Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc.
Appendix E Open Source Licences */ /* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc.
Appendix E Open Source Licences * can do whatever you want with this stuff. If we meet some day, and you think * this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp * ---------------------------------------------------------------------------*/ For the srclib\apr-util\crypto\apr_md4.c component: * This is derived from material copyright RSA Data Security, Inc. * Their notice is reproduced below in its entirety. * * Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991.
Appendix E Open Source Licences * software for any particular purpose. It is provided "as is" * without express or implied warranty of any kind. * * These notices must be retained in any copies of any part of this * documentation and/or software. */ For the srclib\apr-util\include\apr_md4.h component: * * This is derived from material copyright RSA Data Security, Inc. * Their notice is reproduced below in its entirety. * * Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All * rights reserved.
Appendix E Open Source Licences * * RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this * software for any particular purpose. It is provided "as is" * without express or implied warranty of any kind. * * These notices must be retained in any copies of any part of this * documentation and/or software. */ For the srclib\apr-util\test\testmd4.c component: * * This is derived from material copyright RSA Data Security, Inc.
Appendix E Open Source Licences * These notices must be retained in any copies of any part of this * documentation and/or software. */ For the srclib\apr-util\xml\expat\conftools\install-sh component: # # install - install a program, script, or datafile # This comes from X11R5 (mit/util/scripts/install.sh).
Appendix E Open Source Licences # # Copyright 1991 by the Massachusetts Institute of Technology # # Permission to use, copy, modify, distribute, and sell this software and its # documentation for any purpose is hereby granted without fee, provided that # the above copyright notice appear in all copies and that both that # copyright notice and this permission notice appear in supporting # documentation, and that the name of M.I.T.
Appendix E Open Source Licences Written by: Philip Hazel University of Cambridge Computing Service, Cambridge, England. Phone: +44 1223 334714. Copyright (c) 1997-2004 University of Cambridge All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix E Open Source Licences IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix E Open Source Licences is not removed. This software is provided "as is" and any express or implied waranties, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall Zeus Technology Ltd.
Appendix E Open Source Licences Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permissio
Appendix E Open Source Licences Copyright (c) 2000, 2001, 2002, 2003, 2004 by Martin C. Shepherd. All rights reserved.
Appendix E Open Source Licences WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder. This Product includes libtorrent-rasterbar software under below license Copyright (c) 2003 - 2007, Arvid Norberg All rights reserved.
Appendix E Open Source Licences THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix E Open Source Licences * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
Appendix E Open Source Licences with different Copyright notices) all the files are: Copyright (C) 1998-2003 Daniel Veillard. All Rights Reserved.
Appendix E Open Source Licences The following individuals contributed in part to the Network Time Protocol Distribution Version 4 and are acknowledged as authors of this work. 1.Mark Andrews Leitch atomic clock controller 2.Bernd Altmeier hopf Elektronik serial line and PCI-bus devices 3.Viraj Bais and Clayton Kirkwood port to WindowsNT 3.5 4.Michael Barone GPSVME fixes 5.
Appendix E Open Source Licences 20.Glenn Hollinger GOES clock driver 21.Mike Iglesias DEC Alpha port 22.Jim Jagielski A/UX port 23.Jeff Johnson massive prototyping overhaul 24.Hans Lambermont or ntpsweep 25.Poul-Henning Kamp Oncore driver (Original author) 26.
Appendix E Open Source Licences 40.Rob Neal Bancomm refclock and config/parse code maintenance 41.Rainer Pruy monitoring/trap scripts, statistics file handling 42.Dirce Richards Digital UNIX V4.0 port 43.Wilfredo Sánchez added support for NetInfo 44.Nick Sayer SunOS streams modules 45.Jack Sasportas
Appendix E Open Source Licences 2. Redistributions in binary form must reproduce all prior and current copyright notices, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of any author may not be used to endorse or promote products derived from this software without their specific prior written permission.
Appendix E Open Source Licences * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS.
Appendix E Open Source Licences might fall under other licenses. The details here are unclear. We do not worry about the licensing of the documentation and build code so much because none of these things are part of the core deliverable SQLite library. All of the deliverable code in SQLite has been written from scratch. No code has been taken from other projects or from the open internet.
Appendix E Open Source Licences insufficient. You must also send by surface mail a copyright release signed by a company officer. A signed original of the copyright release should be mailed to: Hwaci 6200 Maple Cove Lane Charlotte, NC 28269 USA A template copyright release is available in PDF or HTML. You can use this release to make future changes Copyright Release for Contributions To SQLite SQLite is software that implements an embeddable SQL database engine.
Appendix E Open Source Licences 1.I dedicate to the public domain any and all copyright interest in the SQLite software that was publicly available on the SQLite website (http://www.sqlite.org/ ) prior to the date of the signature below and any changes or enhancements to the SQLite software that I may cause to be published on that website in the future. I make this dedication for the benefit of the public at large and to the detriment of my heirs and successors.
Appendix E Open Source Licences === asctime.c========== === date.c ========== /* * Copyright (c) 1985, 1987, 1988 The Regents of the University of California. * All rights reserved.
Appendix E Open Source Licences /* ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur David Olson. */ ================== ====== logwtmp.c ===== /* * Copyright (c) 1988 The Regents of the University of California. * All rights reserved.
Appendix E Open Source Licences ** 1996-06-05 by Arthur David Olson. ====== private.h ===== ======tzfile.h ===== ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur David Olson. ====== tzfile.h ===== This Product includes crypto++ software under below license License The License of Crypto++ is somewhat unusual amongst open source projects. A distinction is made between the library as a compilation (i.e.
Appendix E Open Source Licences and their use is subject to additional licenses included in these files. mars.cpp - Copyright 1998 Brian Gladman. All other files in this compilation are placed in the public domain by Wei Dai and other contributors. I would like to thank the following authors for placing their works into the public domain: Joan Daemen - 3way.cpp Leonard Janke - cast.cpp, seal.cpp Steve Reid - cast.cpp Phil Karn - des.cpp Andrew M. Kuchling - md2.cpp, md4.cpp Colin Plumb - md5.
Appendix E Open Source Licences they provide to Wei Dai will be considered public domain and not copyrighted unless it includes an explicit copyright notice. 3. Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error-free, and Wei Dai is under no obligation to provide any services, by way of maintenance, update, or otherwise.
Appendix E Open Source Licences This Product includes wxWidgets software under below license Licence Background wxWidgets is currently licensed under the "wxWindows Licence" pending approval of the "wxWidgets Licence" which will be identical apart from the name. The wxWindows Licence is essentially the L-GPL (Library General Public Licence), with an exception stating that derived works in binary form may be distributed on the user's own terms.
Appendix E Open Source Licences your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public Licence for more details. You should have received a copy of the GNU Library General Public Licence along with this software, usually in a file named COPYING.LIB. If not, write to the Free Software Foundation, Inc.
Appendix E Open Source Licences accordingly. 4. If you write modifications of your own for this library, it is your choice whether to permit this exception to apply to your modifications. If you do not wish that, you must delete the exception notice from such code and/or adjust the licensing conditions notice accordingly.
Appendix E Open Source Licences are (c) of their respective authors, and are included in Squeezebox Server per their respective licenses. - Certain ancillary programs included in the Squeezebox Server distribution on our web site are licensed to us only for direct distribution to end-users. These include the Windows installer and Activestate binaries. - Squeezebox firmare may not be redistributed under any circumstances. It is (c) Slim Devices, and additonally contains code which is (c) Ubicom.
Appendix E Open Source Licences modified source files can be found at http://www.slimdevices.com/opensource/fixed_math.tar.gz. - The following applies to Squeezebox2 distribution: This product is protected by certain intellectual property rights of Microsoft Corporation. Use or distribution of such technology outside of this product is prohibited without a license from Microsoft or authorized Microsoft subsidiary.
Appendix E Open Source Licences When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.
Appendix E Open Source Licences patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0.
Appendix E Open Source Licences source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
Appendix E Open Source Licences License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole.
Appendix E Open Source Licences source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for sof
Appendix E Open Source Licences If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.
Appendix E Open Source Licences original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7.
Appendix E Open Source Licences patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices.
Appendix E Open Source Licences Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10.
Appendix E Open Source Licences 12.
Appendix E Open Source Licences #-----------------------------------------------------------------The Code2000 font is copyright James Kass, distributed by permission of the author. Details about Code2000 may be found in Graphics/CODE2000.HTM This Product includes php software under below license • PHP 4 and PHP 5 are distributed under the PHP License v3.01, copyright (c) the PHP Group. • This is an Open Source license, certified by the Open Source Initiative.
Appendix E Open Source Licences the documentation and/or other materials provided with the distribution. 3. The name "PHP" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact group@php.net. 4. Products derived from this software may not be called "PHP", nor may "PHP" appear in their name, without prior written permission from group@php.net.
Appendix E Open Source Licences ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix E Open Source Licences a) the GNU General Public License as published by the Free Software Foundation; either version 1, or (at your option) any later version, or b) the "Artistic License". For those of you that choose to use the GNU General Public License, my interpretation of the GNU General Public License is that no Perl script falls under the terms of the GPL unless you explicitly put said script under the terms of the GPL yourself.
Appendix E Open Source Licences Roelofs. Portions relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellson (ellson@lucent.com). Portions relating to gdft.c copyright 2001, 2002 John Ellson (ellson@lucent.com). Portions copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Pierre-Alain Joye (pierre@libgd.org). Portions relating to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane.
Appendix E Open Source Licences limited to implied warranties of merchantability and fitness for a particular purpose, with respect to this code and accompanying documentation. Although their code does not appear in gd, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions.
Appendix E Open Source Licences 588 NSA320 User’s Guide
APPENDIX F Legal Information Copyright Copyright © 2010 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix F Legal Information • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix F Legal Information including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http:// www.zyxel.com/web/support_warranty_info.php.
Appendix F Legal Information 592 NSA320 User’s Guide
Index Index status 193 URL 195, 243 FTP 186, 188, 285 activation 188 anonymous access 189 passive mode transfer 189 media server 186, 190 configuration 190 iTunes server 186, 217, 218 print server 227 configuration 214 name 215 web publishing 187, 204, 225 activation 205 example 223 port number 225 Numerics 3-D photo wall 57 A access rights 62 Flickr 291 shares 315, 316 YouTube 295 activation download service 192 Flickr/YouTube 286 FTP 188 FTP Uploadr 297 recycle bins 61, 314 web publishing 205 ANONYMOUS
Index backup settings 332 groups 308, 309 shares 312, 314 users 302, 304 volumes 163, 166 bandwidth limit 300 BitTorrent 187 IP filtering 201, 202 protection 221, 222 re-seeding 192 settings 200 torrent files 195, 219 health 203 info-hash 204 trackers 204 broadcatching 187, 206 adding channels 192, 207, 208 channel guides 226 RSS 188 D data protection 172 date 155 diagnostic tool 177 diagnostic tools 177 discovery 29 browser plugin, capturing link 219 disk S.M.A.R.T.
Index E FTPES - FTP over explicit TLS/SSL 133 FTPS 133, 286 Exchangeable image file format, see Exif Exif 56 explicit TLS/SSL 133 G external volumes 166 global icons 53, 66 GMT 156 F Google Maps 56 fan speed 151 grace period 291, 295, 300 file troubleshooting access 363 groups 307 adding 308, 309 editing 309 membership 304, 309 names 310 searching 308 file browser configure share 61 share browser 58 File Transfer Protocol over Explicit TLS, see FTPES GPS 56 File Transfer Protocol over TLS, see
Index shares 62 volumes 165 workgroup 154 K Ken Burns 65 NAS Starter Utility 29, 49 navigation panel 67 L lag, time 153 language 65 latitude 56 LEDs 25 link capture browser plugin 219 login 50 logs 328 longitude 56 network 173 diagnostic tools 177 DNS 173, 177 HTTP port 177 IP address 173 jumbo frames 174, 177 PPPoE 174, 183 activation 183 TCP/IP 175 network connection test 177 notifications download service activation 192 notifications, download service 220 M maintenance 323 backup settings 332 logs 3
Index public key certificate 334 editing 335 R RAID 164, 168 degraded 165 RAID 0 169, 171 RAID 1 169, 171, 172 recovering 160 replacing disks 160 resynchronization 160 recycle bins 318 activation 61, 314 configuration 312, 318 related documentation 3 replacing disks 160 reset 27, 332 restoring by backup files tutorial 143 by backup job tutorial 141 files 141 restoring settings 332 RSS 188 download service notifications 220 S S.M.A.R.T.
Index striping 170 login 360 media files 366 NAS Starter Utility 356 overview 353 user share access 361 web configurator access 357 synchronization 216, 229 configuration 216 directions 217 single direction 229 tutorial 138 two directions 230 system date/time 155 login 50 master browser 154 password 51 reset 27 server name 154 settings 153 status 150 time lag 153 workgroup name 154 system settings 64 U Universal Plug and Play. See UPnP.
Index duplexing 170 mirroring 170 parity 170 striping 170 W web configurator 49 icons 53 login 50 navigation panel 67 password 51, 64 status 66 web publishing 187, 204, 225 activation 205 example 223 port number 225 troubleshooting 369 web security 127 wizard 32 workgroup name 154 Y YouTube 285 access rights 295 activation 286 authorization 292 configuration 292, 293 grace period 295 video category 295 Z zPilot 43 NSA320 User’s Guide 599