Home
ZyXEL NSA-220 User's Manual
Contents
1. CLASS SEVERITY MESSAGE Network NOTICE 96s is active because of changing Port Group Enable DHCP client Network NOTICE 96s is inactive because of changing Port Group Disable DHCP client Network NOTICE s MTU gt 96s MTU 8 s may not work correctly Network NOTICE s MTU 8 lt s MTU s may not work correctly Network NOTICE Add interface s Network NOTICE Because s link down Default route will not apply until s link up Network NOTICE Because base interface s will be disabled Interface s is disabled now base_ud_iface Network NOTICE Network Config setting is changed Network NOTICE Interface s was disabled Network NOTICE Interface s was enabled Network NOTICE Port Group on s is changed Renew DHCP client Network NOTICE show_sdx Services INFO admin has changed the password Services INFO HTTP management port has changed to s Services INFO Clock has disable daylight saving Services INFO MyClock has enable daylight saving Services INFO MyClock has set timezone to s Services INFO MyClock has set timezone to default Services INFO The date and time are updated from NTP server Services INFO The date and time are updated manually Services INFO The time is updated manually Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to s Services NOTICE NTP server has set
2. Devices Hardware DNS Hosts 5E You may configure network devices associated with d oj physical hardware here Multiple logical devices can be T associated with a single piece of hardware Profile Status Device Nickname Type X Inactive eth0 etho Ethernet 2 Double click on the profile of the network card you wish to configure The Ethernet Device General screen displays as shown NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 113 Red Hat 9 0 KDE Ethernet Device General Ethernet Device General Route Hardware Device Nickname etho 4 Activate device when computer starts Allow all users to enable and disable the device Automatically obtain IP address settings with dhcp DHCP Settings Hostname optional 7 Automatically obtain DNS information from provider Statically set IP addresses Manual IP Address Settings Address Subnet Mask Default Gateway Address 3 Cancel f you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list f you have a static IP address click Statically set IP Addresses and fill in the Address Subnet mask and Default Gateway Address fields 3 Click OK to save the changes and close the Ether
3. The following table describes the labels in this screen Table 17 System gt Storage gt Edit LABEL DESCRIPTION Volume Name For an internal volume type a volume name from 1 to 31 characters The name cannot be the same as another existing external volume Acceptable characters are all alphanumeric characters and spaces underscores and periods The first character must be alphanumeric A Z 0 9 The last character cannot be a space For an external volume type a volume name from 1 to 32 single byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing external volume Apply Click this button to save your changes back to the NSA and rename the volume Cancel Click this button to close this screen without saving your changes 6 5 Volumes and RAID A volume is a storage area on a disk or disks You can create volumes on the internal disks and external disks attached to the USB port s You can spread a volume across internal disks but not between internal and external disks RAID Redundant Array of Independent Disks or JBOD is the storage method that the NSA uses The storage method you use depends on how many disks you have and how many volumes you want to create It s important that you consider this carefully as all data is deleted when you re create a volume Back up your data before deleting or re creating a v
4. 33 Pone I0 My NSA Share TNS MNT LU T T 34 Figure 11 My NSA Share Browsing gt Move to or Copy to nnns 35 Figure 12 My NSA Management Del vier uses esice perd iink ERREUR dX Cu a UR Eu d d as 36 Figure 13 My NSA Change Share Properties cocos te terts anat epe ida a ao Pee Y Ada pt ont Dudas te ee RE pE reta d dna EI vedas 37 Figura gal Ree 40 gnum Wer 41 gersidatciiecuhm i BEIDE D o D om 42 gs EMI ELE RR UE UU I LU UI 45 Foue durs 39 3 NUN METTI NI EI E TE RE TEE TD D T 46 grimbi8 do oie du dee EE 46 Figure 20 Wsere Account Grealed snosi coUa egets god epocilr aoi o Gl aget GU dean RE od 46 geritur deme m IU SES UE 47 Figure 22 Shargs Cedae EXampiE em T 47 Figure 23 Shares gt Create gt Browse gt Create Folder Example ssssssseeees 48 Figure 24 Shares gt Create gt Browse gt New Folder Example sssssseeeeeeeennnneen 48 Foure 25 Shares Create EXxAmplp imoissa siin AA A 49 PONG 2G NGA Top LGI soricina i CC 49 Figure 27 Map Network DIVO sescrisniai aiaa 49 Foure 22 Emer Network Password rosanna 50 Figure 29 Example Share Mapped Folders View ssessssssssssseseeeeeenne nennen 50 Figure 30 FTP Example Typing the FTP Tall 2ecescce ce sasep pci taste tecta tene ek e tma p CE Russe eR n aeppEE Ee ane PEE DRE 51 Figure 31 FTP Example Ente
5. JBOD allows you to combine multiple physical disk drives into a single virtual one so they appear as a single large disk JBOD can be used to turn multiple different sized drives into one big drive For example JBOD could convert 80 GB and 100 GB drives into one large logical drive of 180 GB If you have two JBOD volumes with one disk in each a failure of one disk volume should not affect the other volume disk JBOD read performance is not as good as RAID as only one disk can be read at a time and they must be read sequentially The following figure shows disks in a single JBOD volume Data is not written across disks but written sequentially to each disk until it s full Table 20 JBOD 6 9 2 RAID 0 RAID 0 spreads data evenly across two or more disks data striping with no mirroring nor parity for data redundancy so if one disk fails the entire volume will be lost The major benefit of RAID 0 is performance The following figure shows two disks in a single RAID 0 volume Data can be written and read across disks simultaneously for faster performance Table 21 RAID 0 RAID 0 capacity is the size of the smallest disk multiplied by the number of disks you have configured at RAID 0 on the NSA For example if you have two disks of sizes 100 GB and 200 GB respectively in a RAID 0 volume then the maximum capacity is 200 GB 2 100 GB the smallest disk size and the remaining space 100 GB is unused Typical applic
6. 3 After you edit and save the configuration files you must restart the network card Enter network restart inthe etc rc d init d directory The following figure shows an example Figure 119 Red Hat 9 0 Restart Ethernet Card root localhost init d network restart Shutting down interface eth0 Shutting down loopback interface Setting network parameters Bringing up loopback interface Bringing up interface eth0 ooooo0 RRR RR Verifying Settings Enter ifconfig in a terminal screen to check your TCP IP properties Figure 120 Red Hat 9 0 Checking TCP IP Properties root localhost ifconfig eth0 Link encap Ethernet HWaddr 00 50 BA 72 5B 44 inet addr 172 23 19 129 Bcast 172 23 19 255 Mask 255 255 255 0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 717 errors 0 dropped 0 overruns 0 frame 0 TX packets 13 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 100 RX bytes 730412 713 2 Kb TX bytes 1570 1 5 Kb Interrupt 10 Base address 0x1000 root localhost 178 NSA 220 User s Guide Pop up Windows JavaScripts and Java Permissions In order to use the web configurator you need to allow Web browser pop up windows from your device JavaScripts enabled by default Java permissions enabled by default BS Internet Explorer 6 screens are used here Screens for other Internet Explorer versions may vary Internet Explorer Pop up Blockers Y
7. DLNA Server The NSA is a DLNA certified media server that lets DLNA compliant media clients play video audio and photo content files stored on the NSA DLNA Client Software The DLNA certified media client software included on the CD lest your Windows XP computers browser and play media files stored on the NSA NSA 220 User s Guide pss Chapter 16 Product Specifications Table 52 Firmware Features RAID File Storage Use RAID 0 if you want pure write speed and or maximum capacity for your drives and or you have other means of protecting your data Use RAID 1 if you have two drives and want to mirror primary data to the second drive If one drive fails replace it and then re synchronize to recover all data User Passwords Configure a password for an individual User to restrict access to the NSA Client Support Data can be shared among all Windows Mac Linux and UNIX users that have FTP client software or CIFS file sharing support such as Samba for Linux and UNIX users The NSA is also a DLNA certified media server that lets DLNA compliant media clients play video audio and photo content files stored on the NSA HTTP Access the NSA using a regular web connection HTTP DHCP Dynamic Host Configuration Protocol DHCP Dynamic Host Configuration Protocol allows the NSA to obtain an IP address and subnet mask at start up from a centralized DHCP server Altern
8. Type The icon in this column identifies the entry as a folder or a file The folder with an arrow pointing up is for the link that takes you to the next higher layer in the share s folder tree Name This column identifies the names of folders and files in the share Click Up One Level to go to the next higher layer in the share s folder tree Click a file s file name to open the file or save it to your computer Click a folder s name to display the folder s contents Size This column displays a file s size in bytes Modified Date This column displays the last time the file or folder was changed in year month day hour minute second format Close Click this button to return to the My NSA screen 2 5 2 My NSA Share Browsing Move to or Copy to Screen Select a folder or file in the My NSA share browsing screens and click the Move to button or the Copy to button to display a screen like the following Use this screen to select the target path for moving or copying the folder or file Figure 11 My NSA Share Browsing gt Move to or Copy to Select a folder Shares public Path ixi Browse Files with same filename will be overwritten Yes ose The following table describes the labels in this screen Table 5 My NSA Share Browsing Move to or Copy to LABEL DESCRIPTION Shares Select the target share Path Select a folder on the NSA You can also browse see Secti
9. Disable transcoding recommended If there are no volumes in the system media server can not be enabled when system starts Unpublished Shares Published Shares i z Pen selected stares Unpublish selected stare EJ Enable iTunes Server The following table describes the labels in this screen Table 25 Applications gt Media Server LABEL DESCRIPTION Media Server Name This is the name of the NSA media server on the network It is the same as the NSA s server name This name lets media clients distinguish between multiple media servers on your network Disable Enable Media Server Turn on the media server to let DLNA compliant media clients on your network play media files located in the published shares NSA 220 User s Guide Chapter 8 Application Screens Table 25 Applications Media Server LABEL DESCRIPTION Disable Enable Disable transcoding to improve the performance of the NSA transcoding However disabling may cause certain media clients to fail when displaying non JPEG photos In the case of the media client included on the CD with the NSA TIFF and GIF images will not be properly displayed Enabling transcoding allows these files to be shown properly but slows down the NSA s performance Unpublished Shares This list box displays the shares that the NSA does not share with the media clients Publish Selected Shar
10. My NSA Password Download Service My NSA VAULT MM M j My Own Shares HOTITEON BTW TS TT P AODEM e e public video photo music 4 Click Add Channel NSA 220 User s Guide 57 Chapter 3 Tutorials Figure 45 Broadcatching Tutorial Applications Broadcatching Broadcatching QNS Z Add Delete Refresh Edit Channel hannel Channel Channel Broadcatching Completed Q Seeding J Downloading Queved G Pause EJ Error G Missing File Start downloading fij Delete Item PhotoWalkthrough com Autlasl 2nn7 clas Eu Outlook SharePoint and B 2007 06 20 Ven aer cet I know what Ennio re GRACE ai 5 Right click the URL field and Figure 46 Broadcatching Tutorial e Subscribe to Channel Feed Please enter the url address of the feed you want to subscribe to select Fase 55 Paste Link p M Undo Download Policy cut ie A Ie kie 4 Il Delete Policy ER 7 Manual I 4 C Keep last Select Al o onl HP Build Gallery E amp FlashGot Options gt b Add a Keyword For this Search gt inn7 01 25 This episode is a reco 6 The URL displays in the URL field 7 Select a policy for what items to download This example uses Manual so you will be able to select individual items to download later 8 Select a policy for what items to delete This example keeps the most rece
11. The following table describes the labels in these screens Table 13 System Setting gt Server Name LABEL DESCRIPTION Server Name Enter a name to identify your NSA on the network in this field You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character The name must begin with an alphabetic character a z and is NOT case sensitive Description Add text here to describe the NSA if the Server Name field was not enough Use up to 61 characters You can use all characters except the following lt gt Workgroup Name A workgroup is a group of computers on a network that can share files These user accounts are maintained on the NSA Type your workgroup name in this field You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character The name must begin with an alphabetic character a z and is NOT case sensitive Apply Click here to save your changes back to the NSA 5 3 Date Time Use this screen to select a time zone and a time server from which your NSA can get the time and date This time is then used in NSA logs and alerts 5 3 1 Time Lag Time lag occurs when the time on the NSA falls behind the time on the time server This may happen if the time server is no longer reachable if the NSA is shut down often the NSA internal battery keeps time when the NSA is shut down and this may cause possible
12. The software requires Windows XP See the Quick Start Guide for how to install the media client software and the requirement details 13 2 Using the Media Client Software Refer to the Quick Start Guide and the help Start gt All Programs gt DigiOn gt Help for details on how to use the media client software NSA 220 User s Guide Chapter 13 Media Client Software NSA 220 User s Guide Memeo Autobackup Software This chapter introduces the Memeo Autobackup software included on the CD 14 1 Memeo Autobackup Introduction Use the Memeo Autobackup software included on the CD to automatically back up selected files from your computer to the NSA whenever you modify the files You can have Memeo backup specific files folders of files or types of files Install the included DLNA compliant Memeo Autobackup software on your Windows 2000 or later computers to let them browse and play files stored on the NSA The software requires Windows XP See the Quick Start Guide for how to install the Memeo Autobackup software and the requirement details 14 2 Using the Memeo Autobackup Software Refer to the Quick Start Guide for how to use the Memeo Autobackup software The software also includes help that you can display by clicking the help link in the screens NSA 220 User s Guide Chapter 14 Memeo Autobackup Software NSA 220 User s Guide PART V Troubleshooting and Specifications eshooting
13. This Product includes expiate and krb5 software under the MIT License The MIT License Copyright c year copyright holders Permission is hereby granted free of charge to any person obtaining a copy of this software and associated documentation files the Software to deal in the Software without restriction including without limitation the rights to use copy modify merge publish distribute sublicense and or sell copies of the Software and to permit persons to whom the Software is furnished to do so subject to the following conditions NSA 220 User s Guide Appendix D Open Source Licences The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE NOTE Some components of the NSA incorporate source code covered under the Apache License GPL License LGPL License BSD License Open SSL License OpenLDAP License PHP License and MIT License To obtain the source code covered under those Lice
14. machine readable source code for the Library including whatever changes were used in the work which must be distributed under Sections 1 and 2 above and if the work is an executable linked with the Library with the complete machine readable work that uses the Library as object code and or source code so that the user can modify the Library and then relent to produce a modified executable containing the modified Library It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions b Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compatible with the version that the work was made with c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above for a charge no more than the cost of performing this distribution d If distribution of the work is made by offering access to copy from a designated place offer equivalent access to copy the above specified materials from the same place e Verify that t
15. 2 Enter your password and click Login Figure 31 FTP Example Enter the Password x gt Could not login to the FTP server with the user name and password specified FTP Server nsa220 User Name Password After you login you can return to this FTP server easily by adding it to your Favorites List E Login Anonymously E Save Password mn 3 Now you can access files and copy files from to your local computer s drives to or from this network folder Figure 32 FTP Example Logged In File Edit View Favorites Tools Help 42Back gt Qisearch Gyrolders lt 4 Um GE X A Eee Address IET ftp nsa220 C admin Jimmy nsa220 music a _ _ photo Server nsa220 Ca public User Name Jimmy Ga video Click here to learn about browsing FTP sites File Folder File Folder File Folder File Folder File Folder File Folder Name sefte 5 wea e d 1 18 2007 6 23 AM 1 22 2007 7 43 AM 1 18 2007 6 23 AM 1 18 2007 6 23 AM 1 18 2007 6 23 AM 1 18 2007 6 27 AM 3 1 5 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator 1 Log into the NSA web configurator see Section 2 3 on page 30 using your username and password 1 Even though the admin share displays user accounts cannot access it unless you change it s share access settings NSA
16. Cancel Click Cancel to close this screen without saving your changes 8 9 Web Publishing Web publishing lets you publish shares containing folders and files on the NSA so people can access the files using a web browser without having to log into the My NSA screens This way you can share files with others without them having to know and enter a user name and password For example if you want to share photos in a FamilyPhotos share you could web publish it and others could use a web browser to access the photos at http my NS A s IP Address MyWeb FamilyPhotos BES The NSA does not use any security for the files in the published folders It is not recommended to publish shares if you do not have the NSA behind a good hardware based firewall See Section 8 5 2 1 on page 94 for more on firewalls Additionally you can use HTML editing software not included to create an index html or index htm file to define and customize how your website works and looks 8 9 1 Accessing Web published Shares from the Internet You need to use a public address to access the NSA s web published shares from the Internet If your NSA uses a private IP address you may need to use the public IP address of your Internet gateway and configure NAT or port forwarding on your Internet gateway and possibly firewall rules in order to let people access the NSA s web published shares from the Internet NSA 220 User s Guide Cha
17. Table 30 Applications gt Broadcatching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to copy the URL of the channel s feed and click this button A screen opens for you to subscribe to the feed When you are done the feed s channel and contents display in the Applications gt Broadcatching screen Delete Channel Select a channel and click Delete Channel to remove the channel from the NSA Any of the channel s items that you have already downloaded stay in the channel s folder in the admin share s download folder Refresh Select a channel and click Refresh Channel to check for new files Channel Edit Channel Select a channel and click Edit Channel to open a screen where you can set the channel s download and delete policies The table lists channels and their files Click a column s heading to sort the entries by that criteria Channel Name This identifies the channel A channel displays in red if there was an error the last time the NSA attempted to connect to it When this happens you can select the channel and click Refresh Channel to have the NSA reattempt to connect to it Select a channel to see its available files A indicates an abbreviated name Hold your cursor over the name to display the full name NSA 220 User s Guide Chapter 8 Application Screens Table 30 Applications Broadcatching LABEL DESCRIPTION Item Name These are
18. WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR NSA 220 User s Guide Appendix D Open Source Licences INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein if any are the property of their respective owners This Product includes OpenLDAP software under the OpenLDAP Public License The OpenLDAP Public License Version 2 8 17 August 2003 Redistribution and use of this software and associated documentation Software with or without modification are permitted provided that the following con
19. or derived from the Work and for which the editorial revisions annotations elaborations or other modifications represent as a whole an original work of authorship For the purposes of this License Derivative Works shall not include works that remain separable from or merely link or bind by name to the interfaces of the Work and Derivative Works thereof Contribution shall mean any work of authorship including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner For the purposes of this definition submitted means any form of electronic verbal or written communication sent to the Licensor or its representatives including but not limited to communication on electronic mailing lists source code control systems and issue tracking systems that are managed by or on behalf of the Licensor for the purpose of discussing and improving the Work but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as Not a Contribution Contributor shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work 2 Grant of Copyright License Subject to th
20. that may not be possible by e mail H 323 TCP 1720 NetMeeting uses this protocol HTTP TCP 80 Hyper Text Transfer Protocol a client server protocol for the world wide web HTTPS TCP 443 HTTPS is a secured http session often used in e commerce ICMP User Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes ICQ UDP 4000 This is a popular Internet chat program IGMP MULTICAST User Defined 2 Internet Group Management Protocol is used when sending packets to a specific group of hosts IKE UDP 500 The Internet Key Exchange algorithm is used for key distribution and management IRC TCP UDP 6667 This is another popular Internet chat program MSN Messenger TCP 1863 Microsoft Networks messenger service uses this protocol NEW ICQ TCP 5190 An Internet chat program NEWS TCP 144 A protocol for news groups NFS UDP 2049 Network File System NFS is a client server distributed file service that provides transparent file sharing for network environments NNTP TCP 119 Network News Transport Protocol is the delivery mechanism for the USENET newsgroup service PING User Defined 1 Packet INternet Groper is a protocol that sends out ICMP echo requests to test whether or not a remote host is reachable POPS3 TCP 110 Post Office Protocol version 3 lets a client computer get e mail from a POP3 server through a temporary connection TCP IP or other PPTP TCP 1723 Point to Point Tunneling Protocol e
21. you need to create a whole new volume on both drives NSA 220 User s Guide Chapter 15 Troubleshooting e The LAN LED by the LAN port is off Make sure the Ethernet cable is connected properly to the NSA and connected to another Ethernet device Make sure the other device is turned on If it s connected directly to a computer make sure that the computer network card is working ping 127 0 0 1 on the computer Use another Ethernet cable If you re connecting to a Gigabit Ethernet make sure you re using an 8 wire Ethernet cable fthe problem continues contact the vendor See Section 1 1 1 on page 26 for a description of NSA LEDs 15 3 NSA Login and Access e forgot the server name of the NSA The default server name is nsa220 Use the NDU NSA Discovery Utility to discover your NSA If you have admin privileges you can directly change the IP address of the NSA using the NDU fthe server name has changed and you don t have the NDU see Section 15 3 1 on page 146 to use the RESET button to return the default setting e cannot get to the NSA login screen Use the NDU NSA Discovery Utility to discover your NSA If you have admin privileges you can directly change the IP address of the NSA using the NDU If you used the RESET button the NSA may have a new IP address Close and reopen the NDU to discover the NSA Make sure the NSA is turned on If you are trying
22. 14 20 22 172 23 37 113 NSA 220 User s Guide Chapter 4 Status Screen The following table describes the labels in this screen Table 12 Status LABEL DESCRIPTION Status Click Status to refresh the status screen statistics System Information Server Name This displays the name which helps you find the NSA on the network Click the edit icon to go to the screen where you can configure this Model Name This displays which model this NSA device is Firmware Version This is the NSA firmware version Click the update link to go to the Maintenance Firmware Upgrade screen from which you can upload new firmware Click the edit icon to go to the screen where you can upload new firmware MAC Address This displays the NSA s unique physical hardware address MAC You need the MAC address to register the product at myZyXEL com Customer support may also request it for troubleshooting purposes Media Server Status This shows whether the media server function is enabled or disabled It must be enabled for media clients to play content files stored on the NSA Click the edit icon to go to the screen where you can configure this FTP Server Status This shows whether the FTP server function is enabled or disabled It must be enabled to use FTP file transfer to from the NSA Click the edit icon to go to the screen where you can configure this Web Publishing Status This show
23. 192 168 11 12 168 95 1 1 Provided by DHCP Server Subnet Mask 255 255 254 0 Router 192 168 10 11 Search Domains Optional DHCP Client ID Optional Example apple com earthlink net Ethernet Address 00 05 02 43 93 ff Click the lock to prevent further changes 4 For statically assigned settings do the following From the Configure box select Manually Type your IP address in the IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your gateway in the Router address box 5 Click Apply Now and close the window 6 Restart your computer if prompted NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Verifying Settings Check your TCP IP properties in the Network window Linux This section shows you how to configure your computer s TCP IP settings in Red Hat Linux 9 0 Procedure screens and file location may vary depending on your Linux distribution and release version BES Make sure you are logged in as the root administrator Using the K Desktop Environment KDE Follow the steps below to configure your computer IP address using the KDE 1 Click the Red Hat button located on the bottom left corner select System Setting and click Network Figure 112 Red Hat 9 0 KDE Network Configuration Devices RANetwork Configuration File Profile Help f B 8 Fe x New Edit Copy Delete Activate Deactivate
24. 8 0 2 Web Publishing Port NQImDGE iei rtt terret neret ta ta ES 102 ETE VUBD Pubie TAM SCHOL anis xcti rnai ass nase aR aa bao pn dad a 102 BH NS PID ERE ES IMPIS casei otio Ere UU Od e Dado eun dste nce FOU gU ur Disd a dee L did dote Lv dia ber Unida End 104 Ce Rie pec pope A 105 xc EC NT T DT rennet res 106 NIMES heecie esie T MNT D S 106 NSA 220 User s Guide 13 Table of Contents 8 14 Adding or Editing a Broadcatching Channel sessirnir 108 ga Pomer SIDE Loans etie aan dssa arr E ars a Ks iO dir pec beadur dne a ORE LER 109 Bb Fim OBIUBEDEPBSIY 1o s e eiat ed ipt coa EE qu code beate boe eset s GR ER dde 110 aS PIN GE Pe IN NS cd tec oreet oia MH Pa vu Lio ILLA ELE LIE 110 Part Ill User Accounts and Shares eeeeeeeee rennen nnns 113 Chapter 9 WS OFS cities 115 9 1 User Accounts Inti ODD uei mestre lr kic aaa re rine ka Cat 115 g2 Usore Overview GEOG ie ec ES cose aeie emi ccce Ba Ee coe deme Eos ecd ree bed s cesus 115 go ser ICONS cuui edes vase amado sve ecd cix ad age ape dee uy ated vius nad dod guage ued ct d ears 116 9 3 dig or Omni dr MIL sdtesteoniostat pet itat bo cTdroatat ne Viene tn cu eb Ron Cte tup cioe ntn on mR SEE BOUE 116 SECNMIEE T TI TOTO ITE TERRENT EN 117 9 4 Delete Account Screen ssssssssssssseseseneeetesnnenhretesenenesisisssste siiis adis a sessi sss aaneen nnne nana 118 Chapter 10 Sep WCU S uini t ELEME ID 119 TH Shares IMIG HUE caciescoaeeelicue Se Seal ca iube bec
25. Apply Figure 40 Download Service Tutorial Apply Pasted Link Add Download Task From URL Q Source URL J zyxel comDownloadLibary_ShortNameiP 2301 RL P1 Cidatasheet P 2301RL P1C_2 pdf Torrent File l Browse Q Default Destination Volume v Path admin download Sa y Caution Do not use the NSA for illegal downloads Illegal downloading or sharing of files can result in severe civil and criminal penalties You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof ZyXEL takes NO responsibility or liability for your use of the download service feature 8 After a few moments the download task appears in the Download Service screen s Active tab Figure 41 Download Service Tutorial Download Task Added a Applications Download Service Download Service Enable Download Service X e o E3 Downloading Add Delete Pause Preferences O Seeding aae 2 Inactive Completed Emor Name Complete 1Seeds Peers Download Upload time Left priority The download appears in the Completed tab when it is done By default the NSA stores all downloads in the admin share s download folder See Section 3 1 3 on page 49 Section 3 1 4 on page 50 or Section 3 1 5 on page 51 for how to access a share NSA 220 User s Guide Chapter 3 Tutorials 3 3 Broadcatching Tutor
26. Firefox 1 07 and later versions A Limits may vary depending on user share resource usage The following list which is not exhaustive illustrates the standards and recommendations supported in the NSA Table 55 Supported Standards and Recommendations CSS level 1 Cascading Style Sheets CSS level 2 revision 1 Cascading Style Sheets CSS 2 1 DATETIME Date and Time Formats W3C World Wide Web Consortium Note M Wolf and C Wicksteed 15 September 1997 Revised 27 August 1998 See http www w3 org TR 1998 NOTE datetime 19980827 DLNA v1 Server The DLNA Digital Living Network Alliance group of companies works to make products compatible and able to work in a home network in order to make digital living easy and seamless DLNA clients play files stored on DLNA servers ECMA 262 The original ECMAScript standard also known as JavaScript ECMA 262 Edition 2 The ECMAScript standard s second revision also ISO standard 16262 ECMA 262 Edition 3 The ECMAScript standard s third revision corresponds to JavaScript 1 5 ECMA 357 ECMAScript for XML E4X See also the E4X errata HTML 3 2 Reference Specification The HyperText Markup Language HTML HTML 4 01 Specification Defines the HyperText Markup Language HTML the publishing language of the World Wide Web ISO 3166 1 Country names official short names in English in alphabetical order
27. GMT Date Time Setup Manual Select this radio button to enter the time and date manually When you enter the time settings manually the NSA uses the new setting once you click Apply Note If you enter time settings manually they revert to their defaults when power is lost New Time hh mm ss This field displays the last updated time from the time server or the last time configured manually When you set Time and Date Setup to Manual enter the new time in this field and then click Apply New Date yyyy mm This field displays the last updated date from the time server or the last dd date configured manually When you set Time and Date Setup to Manual enter the new date in this field and then click Apply Get from Time Server Select this check box to have the NSA get the time and date from the time server you select in the Time Server Address field Synchronize Now Click this button for the NSA to retrieve the correct time from the configured time server right away NSA 220 User s Guide Chapter 5 System Setting Screens Table 14 System Setting gt Date Time continued LABEL DESCRIPTION Time Server Address Select a time server from the drop down list box or select Specify my own time server and enter the time server you wish to use in the field below Check with your ISP network administrator if you are unsure of this information Synchronize Now Click th
28. IntelligentStick 1 001 video Printers NSA 220 User s Guide Chapter 4 Status Screen NSA 220 User s Guide PART ll System Setting and Applications System Setting Screens This chapter discusses the system setting screens 5 1 System Setting Screens This section gives an overview of the various features included in the system setting screens Use the system setting screens to Specify the NSA s Windows CIFS server name and workgroup name Chose a time zone and or allow the NSA to synchronize with a time server Create and edit volumes see Chapter 6 on page 73 for details 5 1 14 Windows CIFS Common Internet File System CIFS is a standard protocol supported by most operating systems in order to share files across the network e CIFS is included by default in Windows and Mac OSX operating systems Youcan use Samba with Linux to use CIFS CIFS transfers use security 5 2 Server Name Click System Setting Server Name to open the following screen Use this screen to configure your CIFS settings In this screen you can set your server name and specify if your NSA is a part of a workgroup or domain CIFS cannot be disabled on the NSA NSA 220 User s Guide Chapter 5 System Setting Screens Figure 56 System Setting gt Server Name System Setting Server Name Server Identification Server Name nsa220 Description Workgroup Name nsa220
29. Nai a pen Open in New Window Save Target As Print Target Gut ications Corp Al Add to Favorites Properties 4 Log into the NSA web configurator see Section 2 3 on page 30 using the administrator account and click Download Service Figure 37 Download Service Tutorial My NSA eo uw Password Administration Download Service fo L My NSA S x N pe My Own Shares AONE STA AMANTE public video photo mae 5 Click Add Figure 38 Download Service Tutorial Download Service Download Service Enable Download Service apply Ve re E3 Downloading 9 G Seeding Soe statas ee ee ee 6 Right click the URL field and select Paste NSA 220 User s Guide Chapter 3 Tutorials Figure 39 Download Service Tutorial Paste Link Add Download Task From URL Q Source URL C Torrent File Le Browse Default Destination Volume v Path admin download s A Caution Do not use the NSA for illegal downloads Illegal downloading or sharing of files can result in severe civil and criminal penalties You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof ZyXEL takes NO responsibility or liability for your use of the download service feature Select All Apply cancel 7 The URL displays in the URL field Click
30. The NSA is turned off HDD1 Green On The hard disk drive is connected properly to the NSA MODE Blinking The NSA is saving data to the hard disk drive Orange On The NSA detected an error on the hard disk drive like a bad sector for example The NSA automatically tries to recover a bad sector but the LED stays orange until the NSA restarts Blinking The hard disk drive connection came loose or the NSA detected an error on the hard disk drive like a bad sector for example and is saving data to the hard disk drive Red On la hard disk drive has failed and the NSA can no longer detect it Off The NSA cannot detect a hard disk in the disk bay SYS Green On The NSA has fully started and is operating normally Blinking The NSA is starting up Red On The NSA has failed NSA 220 User s Guide Chapter 1 Getting to Know Your NSA Table 1 LEDs continued LED COLOR STATUS DESCRIPTION LAN Green On The NSA has a successful 10 100 Mbps Ethernet connection Blinking The 100M LAN is sending or receiving packets Off The NSA does not have a 10 100 Mbps Ethernet connection Yellow On The NSA has a successful 1000 Mbps Ethernet connection Blinking The 1000 M LAN is sending or receiving packets Off The NSA does not have a 1000 Mbps Ethernet connection COPY Green On A USB device is connected to the NSA Blinking The NSA is copying files from the USB device Red
31. UNIX server TACACS UDP 49 Login Host Protocol used for Terminal Access Controller Access Control System TELNET TCP 23 Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments It operates over TCP IP networks Its primary function is to allow users to log into remote host systems TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP but uses the UDP User Datagram Protocol rather than TCP Transmission Control Protocol VDOLIVE TCP 7000 Another videoconferencing solution NSA 220 User s Guide Appendix C Common Services NSA 220 User s Guide Open Source Licences Information herein is subject to change without notice Companies names and data used in examples herein are fictitious unless otherwise noted No part may be reproduced or transmitted in any form or by any means electronic or mechanical for any purpose except the express written permission of ZyXEL Communications Corporation This Product includes software developed by the Apache Software Foundation under Apache License Apache License Version 2 0 January 2004 http www apache org licenses TERMS AND CONDITIONS FOR USE REPRODUCTION AND DISTRIBUTION 1 Definitions License shall mean the terms and conditions for use reproduction and distribution as defined by Sections 1 through 9 of this document Licensor s
32. User s Guide 223 Appendix F Customer Support Regular Mail ZyXEL Communications Czech s r o Modransk 621 143 01 Praha 4 Modrany Cesk Republika Denmark Support E mail support zyxel dk Sales E mail sales zyxel dk Telephone 45 39 55 07 00 Fax 45 39 55 07 07 Web www zyxel dk Regular Mail ZyXEL Communications A S Columbusvej 2860 Soeborg Denmark Finland Support E mail support zyxel fi Sales E mail sales zyxel fi Telephone 358 9 4780 8411 Fax 358 9 4780 8448 Web www zyxel fi Regular Mail ZyXEL Communications Oy Malminkaari 10 00700 Helsinki Finland France E mail info zyxel fr Telephone 33 4 72 52 97 97 Fax 33 4 72 52 19 20 Web www zyxel fr Regular Mail ZyXEL France 1 rue des Vergers Bat 1 C 69760 Limonest France Germany Support E mail support zyxel de Sales E mail sales zyxel de Telephone 49 2405 6909 69 Fax 49 2405 6909 99 Web www zyxel de Regular Mail ZyXEL Deutschland GmbH Adenauerstr 20 A2 D 52146 Wuerselen Germany Hungary Support E mail support 9 zyxel hu Sales E mail info 9 zyxel hu Telephone 36 1 3361649 Fax 36 1 3259100 Web www zyxel hu Regular Mail ZyXEL Hungary 48 Zoldlomb Str H 1025 Budapest Hungary NSA 220 User s Guide Appendix F Customer Support India Support E mail support 9 zyxel in Sales E mail sales zyxel in Telephone 91 11 30888144 to 91 11 30888153 Fax 91 11
33. and Busine a EREEREER ee 2007 09 05 Rich Mogull from Securosis com did me the EGNetwork Security Pod personal favor of co hosting the show tonight 13 45 Rich bring More 09 According to Daniel Miessler my post on his Only testing for 10 au pz up comparison between the CISSP and the GSEC ur 00 30 was a defense More AE I ve held my CISSP for coming on 5 years now I Repeat after me Th zoor 08 3 earned my CCNA around the same time Tur 14 34 though More mE When I went to post tonight s podcast I Time for a minor hea 2007 06 29 encountered an API error from ScribeFire A qr 14 32 5 quick More BE Tonight s podcast is an interview with Marc Network Security Pod eon oes 23 Maifrett Chief Technology Officer for Eeye Digi E More 2007 08 29 The folks at DriveSavers have been recovering Who do you call when 05 12 data from crashed burnt and flooded hard drives Im s f More PeR Earlier this year Gartner started enforcing a Securosis is back on apioa 2o policy of no blogging for their analysts It s un m More 08 As Brian Krebs points out the Groucho Marx I don t want to bel 2001 am eu comment I don t want to belong to any Tur 23 33 More 2007 08 22 Winn Schwartau is a character and the brains Network Security Pod 13 51 behind Security Jeopardy every year at Defcon I Gf met h More B X The following table describes the labels in this screen
34. as given in ISO 3166 1 and the corresponding ISO 3166 1 alpha 2 code elements ISO 639 2 Two letter and three letter language code sets MIMETYPES IANA registered content types MIME types See the IANA web site ftp ftp isi edu in notes iana assignments media types NSA 220 User s Guide Chapter 16 Product Specifications Table 55 Supported Standards and Recommendations ISO 15740 Picture Transfer Protocol PTP from the International imaging Industry Association allows you to transfer pictures from digital cameras or other devices without needing additional device drivers RFC 1001 STD 19 Protocol standard for NetBIOS service on a TCP UDP transport Concepts and methods RFC 1002 STD 19 Protocol standard for NetBIOS service on a TCP UDP transport Detailed specifications RFC 1034 STD 13 Domain names concepts and facilities RFC 1035 STD 13 Domain names implementation and specification RFC 1305 Network Time Protocol NTP version 3 RFC 1415 FTP FTAM Gateway Specification RFC 1510 The Kerberos Network Authentication Service V5 RFC 1738 Uniform Resource Locators URL RFC 1808 Relative Uniform Resource Locators RFC 1945 The Hypertext Transfer Protocol HTTP 1 0 RFC 2131 Dynamic Host Configuration Protocol RFC 2396 Uniform Resource Identifier URI RFC 2396 Uniform Resource Identifiers URI Generic Syntax RFC 2616 Hypertext Transfer Protoc
35. ee MM MI MEM DM M EDT DEEP EU Md UMS 63 LEE UII Er cM D o E E E E E EE EE E 63 MAS pesson Examnple WinNdOWS REN 65 Part Il System Setting and Applications 67 Chapter 5 System Seltihgd SOOMES inediti tatit eek eaa IR EAA AMARAS KE RE MMRIRMARDMIAR MU KE M IR UEM lE 69 5 yim DOE OTROS Super dnas eig Mna dur edd ee ME Dagk darin ria deem qa e Re 69 NECI PSY PE 69 g2 Server rum atudd 69 e MINES ER E A A IT E A A E O E EAT I essa E 70 oso EE e 70 Bor paler TME GAEE dara ERE SR NA 70 Chapter 6 Sage SCEN iiaa aa ai a cet he A 73 Gah Sotiris IOS BE aaisan e a e RE PUN 73 Ga orage Ovario Rc p e 73 63 Creating an intemal MINS oca ies quis Mut opera ak EE sor sania se aiiatas Eau kk a uL i RUE a 74 Bar EHI 8 eg Ug arr s esit elitum terre ener eter rte ced dbi een rrr eet nt enter nent rte ter tet nee tt nr 76 us valumes SIN RAID Lusso reu deritcu aa ecc mpra E 76 12 NSA 220 User s Guide Table of Contents 6 5 1 Choosing A Storage Method For a Volume ssssessssseeeeeeeeennnn 77 rp NN css vada Mop An I 6 6 Disk Replacement Restrictions aM 78 6 6 1 Resychronizing or Recovering a RAID 1 Volume ec eeeeecceceesseeeeeeeeseeeeeeeeeseneees 79 6 6 2 Disk Replacement and Volume Labels ccscsccvaccacheociscnesecsesscsbeencistammackonsiddhedeberscspeeneian 79 GF Created ah mide ET 79 PA Ee c em TT T E E EN E A A A 80 ORA ees Ee TT 81 ERU BUD iuias
36. exact representation of your device ene NSA Computer Notebook computer ES a Server Television Firewall i iL Ill Router Switch Internet Internet NSA 220 User s Guide Safety Warnings Safety Warnings gt For your safety be sure to read and follow all warning notices and instructions Do NOT use this product near water for example in a wet basement or near a swimming pool Do NOT expose your device to dampness dust or corrosive liquids Do NOT store things on the device Do NOT install use or service this device during a thunderstorm There is a remote risk of electric shock from lightning Connect ONLY suitable accessories to the device Do NOT open the device or unit Opening or removing covers can expose you to dangerous high voltage points or other risks ONLY qualified service personnel should service or disassemble this device Please contact your vendor for further information ONLY qualified service personnel should service or disassemble this device Make sure to connect the cables to the correct ports Place connecting cables carefully so that no one will step on them or stumble over them Always disconnect all cables from this device before servicing or disassembling Use ONLY an appropriate power adaptor or cord for your device Connect the power adaptor or cord to the right supply voltage for example 110V AC in North America or 230V AC in E
37. gives you specific legal rights and you may also have other rights that vary from country to country Registration Register your product online to receive e mail notices of firmware upgrades and information at www zyxel com for global products or at www us zyxel com for North American products 222 NSA 220 User s Guide Customer Support Please have the following information ready when you contact customer support Required Information 66 0 Product model and serial number Warranty Information Date that you received your device Brief description of the problem and the steps you took to solve it is the prefix number you dial to make an international telephone call Corporate Headquarters Worldwide Support E mail support zyxel com tw Sales E mail sales zyxel com tw Telephone 886 3 578 3942 Fax 886 3 578 2439 Web www zyxel com www europe zyxel com FTP ftp zyxel com ftp europe zyxel com Regular Mail ZyXEL Communications Corp 6 Innovation Road II Science Park Hsinchu 300 Taiwan Costa Rica Support E mail soporte zyxel co cr Sales E mail sales zyxel co cr Telephone 506 2017878 Fax 506 2015098 Web www zyxel co cr FTP ftp zyxel co cr Regular Mail ZyXEL Costa Rica Plaza Roble Escaz Etapa El Patio Tercer Piso San Jos Costa Rica Czech Republic E mail info cz zyxel com Telephone 420 241 091 350 Fax 420 241 091 359 Web www zyxel cz NSA 220
38. iTunes connected to the NSA for three minutes Then use the NSA s eject button as shown next to disconnect Figure 98 iTunes Eject Button File Edit Controls View Store Advanced Help iTunes LIBRARY fa Music Movies E TV Shows Podcasts 12 iy Radio STORE 3 iTunes Store SHARED nsa220 4 Then click the NSA s link to reconnect Figure 99 iTunes Reconnected File Edit Controls Yiew Store Advanced Help LIBRARY SDR2007 08 22 SlashdotReview 13 53 Andrew McCaskey a Mt SDR2007 08 23 SlashdotReview 14 52 Andrew McCaskey Slashdot Rew SDR2007 08 26 SlashdotReview 14 31 Andrew McCaskey Slashdot Rev TV Shows SDR2007 08 27 SlashdotReview 13 19 Andrew McCaskey Slashdot Revi v Podcasts e SDR2007 08 28 SlashdotReview 15 04 Andrew McCaskey Slashdot Rev j Radio SDR2007 08 29 SlashdotReview 13 04 Andrew McCaskey Slashdot Rev SDR2007 08 30 SlashdotReview 14 06 Andrew McCaskey Slashdot Rev STORE R2007 09 03 SlashdotReview 14 21 Andrew McCaskey Slashdot Rev iTunes Store SDR2007 09 04 SlashdotReview 13 16 Andrew McCaskey Slashdot Rev SHARED TfttF 153 John Arnold Braving E 11 23 Christoph Marquardt http www tfttF170 Photocast Network Rou 1 05 44 Christoph Marquardt tipsfromthetq STIQTOO Yahoo Audio Search 6 24 Ed Vawter 4 VPLAYLISTS E PhotoWalkthrou
39. ic ap c dca separe agna oue Les com E Qc be mv Sc UC RAS Ore OUS Dabam E Led GR 119 deme Rr sees NN RR RS TTE 119 TOL SMV SOCON 5 225 2 0062 ou cep MM EEOdMENEI AIRE EID EMEL D EID 119 pig AMIR or Editing AS ceeds t 120 10 2 1 Public and ANONYMOUS Share Access Rights cccceseeeeeeeeeeneeseeeeeeeneeeees 122 10 3 Sate Palli Bronse SOOO 42 es ebecl itat tee ER e ocu oda Rada too RD te dreca Ee atat Luo eda ixatula s 122 Part IV Maintenance Protecting Data and Media Client 125 Chapter 11 Maintenatice SO eS ese ioc eoe diete E s iur E EDEN geese LEE E MD EE ELSE 127 TE ot PANNE B OV MEN seeds cc eat crus cop dance pale vance dunes faac EUH bt caceltbaart os coe aa etie tcd oar kac un 127 y cA Ur TUN 127 TR uEG Ie 7 cC E 128 1155 Log Sayani LEVER essei eret e enda alacri bota ERG a nac RR A 128 Ai Ah NS ISS erm 129 TLO TOUR ATIONW Meer E ccecutenecnd ae saree seca ited aa baad Gin a N ance ne teed eg 131 umalpi LOO E 131 TES SAEN oaia a a O 132 Chapter 12 Protecting Your Dalase aaa A NAA EA AARRE 135 NSA 220 User s Guide Table of Contents TE PSO SINGS A A pa ox dar eoo d abr seated dong d ae aad aae cc t 135 12 1 1 Configuration File Backup and Restoration i e siniou 135 12 12 aeg AUTOBACKUP 136 Chapter 13 Lei i e 9 Y M 137 doct Modia Cien IMEOdUCION auia dades ain a a Ku bo Dedi oda Fasc dcr l
40. is allowing other BitTorrent users to download it Downloading The NSA is getting the file Queued The download is waiting in line for the NSA to download it Pause The download has been manually stopped Select it and click Resume to continue it Error The NSA was not able to complete the download Select it and click Resume to reattempt the download Name This identifies the download file A indicates an abbreviated name Hold your cursor over the name to display the full name Complete 96 This is the percentage of the file that the NSA has downloaded Location This appears in the Completed tab It displays the path for where the file is saved Seeds Seeds apply to BitTorrent downloads This is the number of computers that are sharing the complete file that you are downloading Peers Peers apply to BitTorrent downloads This is the number of other computers that are also downloading and sharing the file you are downloading Download Speed This is how fast the NSA is getting the file It is normal for a BitTorrent download to start out with a slow download speed since it has to set up numerous connections The speed should increase as the download progresses and decrease near the end of the download Upload Speed This is how fast the NSA is sending the file to other BitTorrent users NSA 220 User s Guide Chapter 8 Application Screens Table 26 Applic
41. m xa gm amp 44 NSA 220 User s Guide Tutorials This chapter provides tutorials that show how to use the NSA 3 1 File Sharing Tutorials The following sections cover using the NSA for file sharing This chapter assumes you have already followed the Quick Start Guide instructions to perform initial setup and configuration so you have a working volume See the Quick Start Guide for how to play media files using the included DLNA compliant media client software See the rest of this User s Guide for details on configuring the NSA s various screens 3 1 1 Creating a User Account Bob wants to create accounts for his sons Jimmy and Kevin This is how he would do it 1 Log into the NSA web configurator see Section 2 3 on page 30 and click Administration to go to the configuration screens Figure 17 My NSA E Administration C Download Service Password VALL LM MN DOME MT Tu KSA AN Manes My Own Shares public cea Gao 2 Click Users to open the Users screen Then click Add Account NSA 220 User s Guide Chapter 3 Tutorials Figure 18 Users NSA 220 E System Setting Server Name Date Time Storage Network gt Used Space TCP IP Applications I FTP Media Server gt Account Type Download Service Web Publishing I Broadcatching D fares Fh Maintenance 3 Configur
42. may not use the Software or any part thereof in the operation of a service bureau or for the benefit of any other person or entity You may not cause assist or permit any third party to do any of the foregoing 5 Confidentiality You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own most confidential information You agree to reasonably communicate the terms and conditions of this License Agreement to those persons employed by you who come into contact with the Software and to use reasonable best efforts to ensure their compliance with such terms and conditions including without limitation not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software 6 No Warranty THE SOFTWARE IS PROVIDED AS IS TO THE MAXIMUM EXTENT PERMITTED BY LAW ZyXEL DISCLAIMS ALL WARRANTIES OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING WITHOUT LIMITATION IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ZyXEL DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET ANY REQUIREMENTS OR NEEDS YOU MAY HAVE OR THAT THE SOFTWARE WILL OPERATE ERROR FREE OR IN AN UNINTERUPTED FASHION OR THAT ANY DEFECTS OR ERRORS IN THE SOFTWARE WILL BE CORRECTED OR THAT THE SO
43. music shares published 8 3 1 iTunes Server The NSA iTunes server feature lets you use Apple s iTunes software on a computer to play music and video files stored on the NSA You can download iTunes from www apple com The iTunes server feature lets computers on your network use iTunes to play media files in the NSA s published shares See Section 16 4 on page 160 for the multimedia file formats iTunes supports Alink for the NSA in iTunes under SHARED Click it to display the NSA s published media files as shown next Figure 66 NSA link in iTunes File Edit Controls View Store Advanced Help LIBRARY SDR2007 08 22 SlashdotReview 13 53 Andrew McCaskey Slashdot Rev 2 get SDR2007 08 23 SlashdotReview 14 52 Andrew McCaskey Slashdot Rev SDR2007 08 26 SlashdotReview 14 31 Andrew McCaskey Slashdot Rev E TV Shows SDR2007 08 27 SlashdotReview 13 19 Andrew McCaskey Slashdot Rev Podcasts S SDR2007 08 28 SlashdotReview 15 04 Andrew McCaskey Slashdot Rev l Radio SDR2007 08 29 SlashdotReview 13 04 Andrew McCaskey Slashdot Rev SDR2007 08 30 SlashdotReview 14 06 Andrew McCaskey Slashdot Rev STORE R2007 09 03 SlashdotReview 14 21 Andrew McCaskey Slashdot Rev 3 iTunes Store SDR2007 09 04 SlashdotReview 13 16 Andrew McCaskey Slashdot Rev Tfttf 153 John Arnold Braving t 11 23 Christoph Marquardt http www t tfttF170 Photocas
44. of common services and their associated protocols and port numbers f Firefox access to the share does not work check that you did not set the Web publishing feature to use one of the following ports Firefox blocks these ports by default Table 50 Ports Blocked By Default in Firefox PORT SERVICE PORT SERVICE PORT SERVICE 1 tcpmux 95 supdup 513 login 7 echo 101 hostriame 514 shell 9 discard 102 iso tsap 515 printer 11 systat 103 gppitnp 526 tempo 13 daytime 104 acr nema 530 courier 15 netstat 109 POP2 531 chat 17 qotd 110 POP3 532 netnews 19 chargen 111 sunrpc 540 uucp 20 ftp data 113 auth 556 remotefs 21 ftp control 115 sftp 563 NNTP SSL 22 ssh 117 uucp path 587 submission 23 telnet 119 NNTP 601 syslog 25 smtp 123 NTP 636 LDAP SSL 37 time 135 loc srv epmap 993 IMAP SSL 42 name 139 netbios 995 POP3 SSL 43 nicname 143 IMAP2 2049 nfs 53 domain 179 BGP 4045 lockd 77 priv rjs 389 LDAP 6000 X11 79 finger 465 SMTP SSL 87 ttylink 512 print exec Make sure your ISP allows you to run a server and is not blocking the port number of the NSA s web publishing feature NSA 220 User s Guide 153 Chapter 15 Troubleshooting NSA 220 User s Guide Product Specifications See also Chapter
45. or a table of data to be supplied by an application program that uses the facility other than as an argument passed when the facility is invoked then you must make a good faith effort to ensure that in the event an application does not supply such function or table the facility still operates and performs whatever part of its purpose remains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied function or table used by this function must be optional if the application does not supply it the square root function must still compute square roots These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Library and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Library the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise th
46. rights granted to You by such Participant under Sections 2 1 b and 2 2 b are revoked effective as of the date You first made used sold distributed or had made Modifications made by that Participant 8 3 If You assert a patent infringement claim against Participant alleging that such Participant s Contributor Version directly or indirectly infringes any patent where such claim is resolved such as by license or settlement prior to the initiation of patent infringement litigation then the reasonable value of the licenses granted by such Participant under Sections 2 1 or 2 2 shall be taken into account in determining the amount or value of any payment or license 8 4 In the event of termination under Sections 8 1 or 8 2 above all end user license agreements excluding distributors and resellers which have been validly granted by You or any distributor hereunder prior to termination shall survive termination 9 Limitation of liability Under no circumstances and under no legal theory whether tort including negligence contract or otherwise shall you the initial developer any other contributor or any distributor of covered code or any supplier of any of such parties be liable to any person for any indirect special incidental or consequential damages of any character including without limitation damages for loss of goodwill work stoppage computer failure or malfunction or any and all other commercial damages or losses even
47. site to the list below Address of W eb site to allow http 4 192 168 1 1 Add Allowed sites Notifications and Filter Level Play a sound when a pop up is blocked Show Information Bar when a pop up is blocked Filter Level Medium Block most automatic pop ups Pop up Blocker FAQ Close NSA 220 User s Guide Appendix B Pop up Windows JavaScripts and Java Permissions 5 Click Close to return to the Privacy screen 6 Click Apply to save this setting JavaScripts If pages of the web configurator do not display properly in Internet Explorer check that JavaScripts are allowed 1 In Internet Explorer click Tools Internet Options and then the Security tab Figure 125 Internet Options Security General Security Privacy Content Connections Programs Advanced Select a Web content zone to specify its security settings e Z o e Internet Local intranet Trusted sites Restricted sites Internet A This zone contains all Web sites you Sites haven t placed in other zones m Security level for this zone Move the slider to set the security level for this zone E Medium Safe browsing and still functional a Prompts before downloading potentially unsafe content Unsigned Activex controls will not be downloaded Appropriate for most Internet sites C Custom Level D Default Level OK Cancel Apply Click the Custom Level button Scroll do
48. some cases you may need to reconfigure this device after upgrading You are currently using firmware version V2 10 AFB 0 Firmware File Browse The following table describes the labels in this screen Table 47 Maintenance FW Upgrade LABEL DESCRIPTION Firmware Upgrade unusable Firmware File Type the location of the firmware file you want to upload Browse Click Browse to find the file on your computer Upload Click Upload to upload the new firmware The NSA automatically restarts after you upgrade Wait until the restart completes before accessing the NSA again If you interrupt the upgrade then the NSA may become Reset Click Reset to begin configuring this screen afresh 11 8 Shutdown Click the Maintenance link in the Navigation panel and then click the Shutdown link or the Shutdown tab to access the Maintenance Shutdown screen Use this screen to turn off the NSA or perform a software restart A software restart is faster than turning the NSA off and then turning it on again Before shutting down or restarting check the System Status gt Active Sessions screen to make sure that no one is logged into the NSA or transferring files to or from the NSA Figure 93 Maintenance Shutdown 88 Maintenance Shutdown System Shutdown Click Restart to have the device perform a software restart The SYS LED blinks as the device restarts and then stays steady o
49. the downloadable files The icon shows the file s status in the NSA A indicates an abbreviated name Hold your cursor over the name to display the full name Completed The NSA has downloaded the whole file Double click the item to go to the Download Service screen where you can see the file s name and location Seeding The NSA downloaded the complete file and NSA is sharing it with other BitTorrent users Double click the item to go to the Download Service screen Downloading The NSA is downloading the file Double click the item to go to the Download Service screen Queued The file is waiting in line for the NSA to download it Double click the item to go to the Download Service screen Pause The download has been manually stopped Double click the item to go to the Download Service screen Missing File The NSA could not find the file Error The NSA automatically retries unsuccessful download attempts The status displays as error when the re attempts are also unsuccessful and the NSA stops trying to download the file To try the download again use the Add button to create a new download task Published Date This is when the file was made available for download Description This is the publishers introduction for the file Actions Start Downloading Click this icon to add the file to the NSA s download queue or check the file s status in the NSA s download service Click the Delete icon to remove the file from the cha
50. then Command Prompt In the Command Prompt window type ping followed by the NSA s IP address use the NDU to find the NSA s IP address if you don t know it and then press ENTER Make sure you are using Internet Explorer 6 0 and later or Firefox 1 07 and later Make sure your Internet browser does not block pop up windows and has JavaScripts and Java enabled See Appendix B on page 179 With Internet Explorer 6 you may also have to enable scripting of safe ActiveX controls See Section 15 3 2 on page 147 15 3 1 Reset the NSA If you forget your password or cannot access the web configurator use the RESET button at the rear of the NSA When you use the following reset procedure the system name and admin password are returned to the factory defaults You may need to close and re open the NDU to discover the NSA This is because the NSA automatically re acquires IP address information so its IP address may change since If no IP address information is assigned the NSA uses Auto IP to assign itself an IP address and subnet mask For example you could connect the NSA directly to your computer If the computer is also set to get an IP address automatically the computer and the NSA will choose addresses for themselves and be able to communicate 1 Press and hold the RESET button for about two seconds until you hear a beep and then release it 2 The NSA automatically restarts to complete the reset forgot the p
51. then you lose all the data on that volume disk You can add another disk to your one disk JBOD volume later without having to re create shares access rights and so on Alternatively you could create a different JBOD volume if you install a second disk and create new shares access rights and so on 6 5 1 2 Two Disks You may choose JBOD RAID 0 or RAID 1 With two disks you could create up to two JBOD volumes one RAID 0 or RAID 1 volume Choose JBOD for flexibility and maximum usage of disk space for data Choose RAID 0 if performance matters more than data security RAID 0 has the fastest read and write performance but if one disk fails you lose all your data on the volume It has fast performance as it can read and write to two disks simultaneously Performance may matter more than data security to gamers for example This method may also be acceptable for data that is already backed up somewhere else Choose RAID 1 if data security is more important than performance Since RAID 1 mirrors data onto a second disk you can recover all data even if one disk fails but the performance is slower than RAID 0 6 5 2 Volume Status You the administrator can see the status of a volume in the Status or System gt Storage screens The NSA has the following classifications for the status of a volume Healthy if all disks in the volume are OK and the file system is functioning properly NSA 220 User s Guide Chapter 6
52. to login directly by typing the server name into your web browser s address field make sure you are using the correct server name as the web site address The default server name is nsa220 if you have changed the server name use the new one If the server name has been changed and you do not know the new server name see the troubleshooting suggestions for I forgot the server name of the NSA If it still doesn t work try using the NDU Check the hardware connections and make sure the LEDs are behaving as expected See the Quick Start Guide and Section 1 1 1 on page 26 NSA 220 User s Guide Chapter 15 Troubleshooting By default the NSA gets an IP address automatically The NSA assigns itself an IP address if no device assigns one If your computer is also set to get an IP address automatically the computer and the NSA can both assign themselves IP addresses and communicate See Chapter 7 on page 85 if you need to configure the NSA with a static IP address Make sure your computer s IP address is in the same subnet as the NSA s IP address You can use the NDU to find the NSA s IP address See Appendix A on page 165 for how to change your computer s IP address Skip this if you know that there are routers between your computer and the NSA Ping the NSA from your computer Make sure your computer s Ethernet adapter is installed and functioning properly In a Windows computer click Start All Programs Accessories and
53. to the Applications Download Server screen and click the Add button A screen opens where you create a new download task You can paste the file s URL or use a BitTorrent file Delete To delete download tasks or manually clear out completed download tasks select a download task and click Delete to remove it from the list A pop up screen asks you to confirm Click Apply to delete or Cancel to quit When you delete a download task you are given the option to delete the associated files Selecting this option deletes a downloaded file and in the case of a BitTorrent download task also deletes the related torrent file Use your keyboard s SHIFT key to select a range of download tasks Use the CTRL key and click individual download tasks to select multiple individual download tasks Pause Select a downloading item and click Pause to temporarily stop the download Paused downloads appear in the Download Service screen s Inactive tab Use your keyboard s SHIFT key to select a range of download tasks Use the CTRL key and click individual download tasks to select multiple individual download tasks Resume Select a paused item and click Resume to continue the download NSA 220 User s Guide Chapter 8 Application Screens Table 26 Applications Download Service LABEL DESCRIPTION Refresh Click this button to update the information displayed on the screen Preferences Click
54. to this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California with venue lying in Santa Clara County California with the losing party responsible for costs including without limitation court costs and reasonable attorneys fees and expenses The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License 12 Responsibility for claims NSA 220 User s Guide 215 Appendix D Open Source Licences As between Initial Developer and the Contributors each party is responsible for claims and damages arising directly or indirectly out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis Nothing herein is intended or shall be deemed to constitute any admission of liability 13 Multiple licensed code Initial Developer may designate portions of the Covered Code as Multiple Licensed Multiple Licensed means that the Initial Developer permits you to utilize portions of the Covered Code under Your choice of the MPL or the alternative licenses if any specified by the Initial Developer in the file described in Exhibit A Exhibit A Mozilla Public License The contents of
55. to which this share belongs Share Type This field displays built in for system shares You cannot delete these shares these are the public and admin shares This field displays pre defined for default shares You can delete these shares these are the video music and photo shares This field displays user created for shares that an administrator has created You can delete these shares Change Share Properties Click this to edit the selected share Delete Share Click this to remove the selected share 10 2 Adding or Editing Share Click the Add Share or Change Share Properties in the Shares screen to open the following screen Use this screen to create a new shared folder NSA 220 User s Guide Chapter 10 Shares Figure 88 Shares gt Add Share Share Name Volume Path Server Share Access Bob admin aAnanwmoatic ftn Create a New Share Make this share owned by Publish this share to Media Publish this share to Web EA 1DiskJBODvolume 1110 p m admin x Advanced w C c C C n Ps Because you have chosen to Publish this share all users will have read only access to this share from the web or media client despite any other security settings The following table describes the labels in this screen Table 40 Shares gt Add Share or Change Share Properties LABEL DESCRIPTION Share Name Type a share na
56. variance power surges occur The NSA gives no warning if time lag occurs You should resynchronize the time after a power surge or after you have shut down the NSA several times 5 3 2 Date Time Screen Click the System Setting link in the navigation panel and then click the Date Time link to access the System Setting gt Date Time screen NSA 220 User s Guide Chapter 5 System Setting Screens Figure 57 System Setting Date Time System Setting Date Time Current System Date Time Setting Current Time 17 23 37 0800 Current Date 2007 9 19 Date Time Setup C Manual New Date yyyy mm dd 2007 9 19 New Time hh mm ss i i 23 ci E E Get from Time Server Time Server Address __ time stdtime gov tw Ix Time Zone Time Zone GMT 08 00 Beijing Hong Kong Perth Singapore Taipei Enable Daylight Saving Start Date January m First X Monday mat 12 g E End Date January E First X Monday Eat 12 g 0 Offset l Whours ADDI The following table describes the labels in this screen Table 14 System Setting gt Date Time LABEL DESCRIPTION Current System Date Time Setting Current Time This field displays the time of your NSA Current Date This field displays the date of your NSA Current Time Zone This field displays the time zone of your location This will set the time difference between your time zone and Greenwich Mean Time
57. web configurator screens click Shares gt Add Share Figure 21 Shares LIC f Shares Shares NSA 220 System Setting l Server Name Internal Shares Date Time Storage gt Share Owner Network L TCP IP Applications I FTP j Media Server Download Service r Web Publishing I Broadcatching Print Server CL shes gt i Maifitenance gt Share Type public video photo music admin I Log 2 Specify a name for the share and select which volume it should be on Then click Browse Figure 22 Shares gt Create Example Create a New Share Share Name immy Volume 1DiskJBOD volume 111 Path Te esi Make this share owned by admin Publish this share to Media Oo Server Publish this share to Web Share Access Keep it private to owner ixi 3 Type a name for a new folder and click Create Folder NSA 220 User s Guide Chapter 3 Tutorials F igure 23 Shares Create Browse Create Folder Example Browse 4 Select the new folder and click Apply Figure 24 Shares gt Create gt Browse gt New Folder Example Browse sU 85 Current location 5 Configure the screen as follows and click Apply Make sure you also set the anonymous ftp access to Deny NSA 220 User s Guide Chapter 3 Tutorials Figure 25 S
58. you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it 6 Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License 7 If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies NSA 220 User s Guide 203 Appendix D Open Source Licences directly or indirectly through you then the only way you could s
59. zyxel co th Regular Mail ZyXEL Thailand Co Ltd 1 1 Moo 2 Ratchaphruk Road Bangrak Noi Muang Nonthaburi 11000 Thailand Ukraine e Support E mail support ua zyxel com Sales E mail sales ua zyxel com Telephone 380 44 247 69 78 Fax 380 44 494 49 32 Web www ua zyxel com Regular Mail ZyXEL Ukraine 13 Pimonenko Str Kiev 04050 Ukraine United Kingdom e Support E mail support zyxel co uk e Sales E mail sales zyxel co uk Telephone 44 1344 303044 08707 555779 UK only Fax 44 1344 303034 Web www zyxel co uk FTP ftp zyxel co uk Regular Mail ZyXEL Communications UK Ltd 11 The Courtyard Eastern Road Bracknell Berkshire RG12 2XB United Kingdom UK NSA 220 User s Guide 227 Appendix F Customer Support NSA 220 User s Guide Index A about icon 41 accessing share contents 34 accessing the web configurator 29 administration screens 32 40 anonymous access rights 122 ANONYMOUS FTP 122 anonymous FTP access 90 anti virus 95 apache license 191 BitTorrent 94 blogs 105 broadcatching 105 C certifications 157 221 notices 222 viewing 222 change password 31 changing configuration settings 43 channel 106 channel guides 106 character set 90 checking disks 44 common screen icons 43 compatible hard disks 157 computer virus 95 computer s IP Address 165 configuration file backup 131 restore 131 configuring entries 43 connection limit 90 c
60. 0 60 Hz Current 3 42 A Storage Temperature 30 C 60 C Operating Humidity 20 90 RH non condensing Storage Humidity 20 95 RH non condensing Certifications EMC FCC Part15B CE EMC VCCI BSMI Safety CSA International EN60950 1 A Hard drives may not be included with your NSA B Use an 8 wire Ethernet cable for Gigabit connections The NSA firmware specifications are shown in the following table Table 54 NSA Firmware Specifications File Storage System JBOD RAID 0 1 Network Protocols TCP IP UDP IP DHCP Client FTP HTTP File Management Create Delete System Volume Network File Sharing Protocol CIFS SMB for Windows and Mac OSX HTTP for web browser FTP Network Security Authentication Share level NSA 220 User s Guide Chapter 16 Product Specifications Table 54 NSA Firmware Specifications continued Supported Clients Windows 2000 Professional Server Windows XP Home Professional Concurrent CIFS Sessions Windows 2003 Windows Vista Linux Maximum Number of Users 100 Allowed Maximum Number of 20 Concurrent FTP Sessions Maximum Number of 20 System Management Remote Management via Web Configurator HTTP NSA Discovery Utility NDU Logging Monitoring Centralized Logs Firmware Upgrade Web Configurator Web Browsers Supported Internet Explorer 6 0 and later versions
61. 0 61 81 Web www zyxel no Regular Mail ZyXEL Communications A S Nils Hansens vei 13 0667 Oslo Norway Poland E mail info pl zyxel com Telephone 48 22 333 8250 Fax 48 22 333 8251 Web www pl zyxel com Regular Mail ZyXEL Communications ul Okrzei 1A 03 715 Warszawa Poland Russia Support http zyxel ru support Sales E mail sales zyxel ru Telephone 7 095 542 89 29 Fax 7 095 542 89 25 Web www zyxel ru Regular Mail ZyXEL Russia Ostrovityanova 37a Str Moscow 117279 Russia Singapore Support E mail support zyxel com sg Sales E mail sales 9 zyxel com sg Telephone 65 6899 6678 Fax 65 6899 8887 Web http www zyxel com sg Regular Mail ZyXEL Singapore Pte Ltd No 2 International Business Park The Strategy 03 28 Singapore 609930 Support E mail support zyxel es Sales E mail sales 9 zyxel es Telephone 4 34 902 195 420 Fax 34 913 005 345 Web www zyxel es Regular Mail ZyXEL Communications Arte 21 5 planta 28033 Madrid Spain NSA 220 User s Guide Appendix F Customer Support Sweden e Support E mail support 2 zyxel se e Sales E mail sales zyxel se Telephone 46 31 744 7700 Fax 46 31 744 7701 Web www zyxel se Regular Mail ZyXEL Communications A S Sj porten 4 41764 G teborg Sweden Thailand Support E mail support zyxel co th Sales E mail sales zyxel co th e Telephone 4 662 831 5315 Fax 4 662 831 5395 Web http www
62. 1 on page 25 for a general overview of the key features 16 1 Physical Features These are the main external physical features Table 51 Physical Features USB Ports 2 USB version 2 ports Copy files directly to the NSA from compatible USB devices like card readers MP3 players memory sticks and digital cameras without using a computer Expand the NSA s storage capacity with compatible USB devices like hard drives Gigabit Ethernet Port The 10 100 1000 Mbps auto negotiating Ethernet port allows the NSA to detect the speed of incoming transmissions and adjust appropriately without manual intervention It allows data transfer of either 100 Mbps or 1000 Mbps in either half duplex or full duplex mode depending on your Ethernet network Use an 8 wire Ethernet cable for Gigabit connections The port is also auto crossover MDI MDI X meaning it automatically adjusts to either a crossover or straight through Ethernet cable SATA Interface Serial ATA is a low cost interface technology that allows high speed data transfer Serial ATA also allows more efficient internal airflow and also smaller chassis design RESET Button If you forget your admin password then use the RESET button to restore the factory default password to 1234 with username admin and auto IP address DHCP client 16 2 Firmware Features These are some of the main firmware features of the NSA Table 52 Firmware Features
63. 14 19 51 172 23 37 113 public pc quest 2007 11 21 14 20 22 172 23 37 113 Message 2 6 1 Global Administration Icons The icons and language label at the top right of the screen 1 are visible from most of the administration screens The following table describes the global icons and labels Table 9 Global Labels and Icons LABEL ICON DESCRIPTION Language Select the web configurator language from the drop down list box Click this Help icon to open a web help page specific to the screen you are currently configuring Click this About icon to view the model name firmware version and copyright Click this Home icon to return to the user level screens ggg Click this Logout icon at any time to exit the web configurator This is the same as M clicking the Logout link at the bottom of the Navigation panel NSA 220 User s Guide Chapter 2 Web Configurator Basics 2 6 2 Navigation Panel The navigation panel on the left of the screen 2 contains screen links Click a link to display sub links There are no sub links for the Status screen Certain screens also contain hyper links that allow you to jump to another screen Click the Status icon to open the Status screens Figure 16 Navigation Panel Links Sere FNSA 220 E System Setting Server Name Date Time Storage Network L TCP IP Applications I FTP Media Server Download Ser
64. 143 Product Specifications 155 Troubleshooting 15 1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter The potential problems are divided into the following categories Power Hardware Connections and LEDs NSA Login and Access Reset the NSA I Cannot Access The NSA External USB Drives Media Server Functions Download Service and Broadcatching Functions Web Publishing 15 2 Power Hardware Connections and LEDs e The NSA PWR LED does not turn on no LEDs are on Make sure the NSA is turned on Make sure you are using the power adaptor or cord included with the NSA Make sure the power adaptor or cord is connected to the NSA and plugged in to an appropriate power source Make sure the power source is turned on Turn the NSA off and on If the problem continues contact the vendor An HDD LED is off The HDD LED is off when the NSA cannot detect a hard drive in the drive bay Replace or install a hard drive See Installing or replacing a hard drive NSA 220 User s Guide Chapter 15 Troubleshooting An HDD LED is orange Orange means that the NSA detected an error on the hard drive like a bad sector for example The NSA automatically tries to recover a bad sector but the LED stays orange until the NSA restarts Even if the hard drive still functions it is recommended that you replace it since errors are a sign that
65. 2007 08 29 17 01 49 built in service notice Time Class Severity User admin has logged in from Web User admin has logged in from Web NTP fails to update from time stdtime gov tw The NTP service is enabled Clock timezone is set to GMT 0800 NTP server is set to time stdtime gov tw FTP server starts Network Config setting is changed DNS server address is changed to be given from DHCP server DNS server setting is changed FTP server stops NSA 220 User s Guide Chapter 11 Maintenance Screens The following table describes the labels in this screen Table 42 Maintenance gt Log LABEL DESCRIPTION Display The screen always shows all logs by default Choose a specific log category to view logs for just that category Refresh Click this button to update the log display Purge all Logs Click this button to erase all logs from the NSA This is the log entry s number in the list according to the currently selected sort order Time This shows the date and time the log was created Click the top of the column to sort by oldest or newest Class This displays the log category see Table 43 on page 128 for details Severity This displays how serious the log is rated by the NSA See Table 44 on page 128 for more information Message This displays a description of the log Click the top of the column to sort by alphabetical or reverse alphabetical or
66. 220 User s Guide Chapter 3 Tutorials Figure 33 My NSA User Login D ZyXEL a s5 My NSA Password e p L My NSA E a My Own Shares ug aT up 3turud g There are no my own shares on the system ENCE Other Shares public video photo music 2 Click a share to see the top level of the share s contents Here is the Jimmy share Figure 34 My NSA User Login Share Browsing Current location Jimmy 5 mm un 2007 11 21 14 16 55 0 2007 11 22 13 10 45 BH imapi848 jpg 1020 32 KB 2007 11 22 13 20 45 4 a I 3 Click a folder s file name to browse the folder You can open files or copy them to your computer However at the time of writing you cannot use the web configurator to upload files to the NSA use CIFS or FTP to upload files see Section 3 1 3 on page 49 and Section 3 1 4 on page 50 4 Click the logout icon when your are done see Table 2 on page 32 3 2 Download Service Tutorial This tutorial covers using the NSA to download a file from the Internet Use this same procedure for BitTorrent downloads as well as regular HTTP web and FTP downloads See Section 8 5 on page 93 for more on the download service 52 NSA 220 User s Guide Chapter 3 Tutorials 1 Open your Internet browser this example uses Internet Explorer 2 Find a download link for the file you want In this example www zyxel com has a Download Now link for downloading a datasheet for ZyXE
67. 30888149 91 11 26810715 Web http www zyxel in Regular Mail India ZyXEL Technology India Pvt Ltd II Floor F2 9 Okhla Phase 1 New Delhi 110020 India Support E mail support zyxel co jp Sales E mail zyp zyxel co jp Telephone 81 3 6847 3700 Fax 81 3 6847 3705 Web www zyxel co jp Regular Mail ZyXEL Japan 3F Office T amp U 1 10 10 Higashi Gotanda Shinagawa ku Tokyo 141 0022 Japan Kazakhstan Support http zyxel kz support Sales E mail sales zyxel kz Telephone 7 3272 590 698 Fax 7 3272 590 689 Web www zyxel kz Regular Mail ZyXEL Kazakhstan 43 Dostyk Ave Office 414 Dostyk Business Centre 050010 Almaty Republic of Kazakhstan Malaysia Support E mail support zyxel com my Sales E mail sales zyxel com my Telephone 603 8076 9933 Fax 603 8076 9833 Web http www zyxel com my Regular Mail ZyXEL Malaysia Sdn Bhd 1 02 amp 1 03 Jalan Kenari 17F Bandar Puchong Jaya 47100 Puchong Selangor Darul Ehsan Malaysia North America Support E mail support zyxel com Support Telephone 1 800 978 7222 Sales E mail sales zyxel com Sales Telephone 1 714 632 0882 Fax 1 714 632 0858 Web www zyxel com NSA 220 User s Guide Appendix F Customer Support Regular Mail ZyXEL Communications Inc 1130 N Miller St Anaheim CA 92806 2001 U S A Norway Support E mail support zyxel no Sales E mail sales zyxel no Telephone 47 22 80 61 80 Fax 47 22 8
68. 5 4 My NSA Change Share Properties Screen Use the My NSA Change Share Properties screen to configure share management details Click My NSA and a share s Manage It button Then click Change Share Properties to open the following screen This screen displays a share s management details NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 13 My NSA Change Share Properties Change Share Properties Share Name Volume Path Make this share owned by Publish this share to Media Server Publish this share to Web Share Access public 1DiskJBOD volume 111 b jAdvanced C admin anonymous ftp e C C En ew The following table describes the labels in the this screen Table 7 My NSA Change Share Properties LABEL DESCRIPTION Share Name Configure a name to identify this share Type a share name from 1 to 255 single byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing local share See Section 2 5 5 on page 38 for more information on share names Volume You should have already created volumes a single accessible storage area with a single file system on the NSA Select the volume that you want to use with this share Path This is the share s file path Make this share Select the administrator or user account that is to own manage this share The owned by share owner controls access rights t
69. 56 16 4 Supported Media Server Content Formats esee 160 16 5 Supported ITunes Server Content Formats isse ce cicstser ette red amr ede i 160 TES uec Eesrcihjwi ge ERR 160 16 7 OUTS Hard DBRS D TT 161 NSA 220 User s Guide 15 Table of Contents Part VI Appendix Appendix Appendix Appendix Appendix Appendix Appendices and Index eee 163 A Setting up Your Computer s IP Address esee 165 B Pop up Windows JavaScripts and Java Permissions sususss 179 BE DOO SEVERE coax pk xis ANEOU AH ERER aT EN ELRE TORIA UA REL R AN TER Fi RN UN 187 D Open Source 3ED 0 M cR 191 SAE pe RTT E TII TT TT 221 F EUIS SUD O o savon beige AS 223 ede 229 NSA 220 User s Guide List of Figures List of Figures Figure 1 Example of the NSA in a Home Network 1e serie extre tnt cd RR ERE er Ma ERR XR is 25 Page 2 NSA Pee eh ner IT TUTTI TN EN 26 Figure 3 NSS Rear Panel ssscdessicaancedaiccobencpias caainens Miaddsneetadanetewiatednsventscreddare saicdeesdcceiandeiaiccoantteactuetediades 27 Foure 4 NDU MAN SCTE dansii etbcan Las doen ARE aaa S eimai nan 30 BER NSA UR aain eS 30 Figure NSA Login GOSE UE 31 Figure 7 Change Paseuword OIGBEE iuueusciendiupage nuuc iaoa aa aiia 31 Pius S TUB BIS aucisscidteaas piden tur Io Suidae seu UR O T 32 Pa OEY c
70. A 220 User s Guide Chapter 8 Application Screens Figure 70 Firewall Configured to Allow Incoming BitTorrent Requests Incoming BitTorrent Requests Allowed x Internet D Other Incoming Traffic Blocked 8 6 Download Service Screen Click Applications Download Service to open the following screen Use this screen to manage the NSA s file downloads BS By default the NSA saves downloads in the admin share s download folder NSA 220 User s Guide Chapter 8 Application Screens Figure 71 Applications Download Service 8 Applications Download Service Download Service Z Enable Download Service ED Add Delete Pause Resume Refresh B Queued D Pause WinSplit_revolution_ Winsplit revolution v1 70 exe The following table describes the labels in this screen Table 26 Applications Download Service LABEL DESCRIPTION Enable Download Service Use this option and the Apply button to turn the download service off or on If you turn off the service all downloads are paused The files that were downloading are treated as queued Turning the download service back on resumes your downloads or restarts them if they are not able to be resumed Add After you find a file to download copy the file s URL Then log into the NSA web configurator and go
71. A 220 User s Guide Chapter 3 Tutorials Figure 43 Copy Link Location File Edit View History Bookmarks Tools Help i ip e e fi a http feeds feedburner com cnet cnetlive DB Wi wikipedia Engish W Wikipedia Pi Tw ZyWALL 1050 Altavista Babel Fish C Google CNET Podcast Central CNET com amp CNET Live from CNET powered b E3 CNET Live from CNET A podcast powered by FeedBurner D Subscribe Now t F ner B nt updates in popular with web based podcatchers Click your choice below Ill My vanoor Ell GS newsootor O netvibes 3 aci to Google 3 Podnova Learn more about syndication and FeedBurner with iTunes Addto iTunes with something else copy this address http cnetlivepodcast cnettv com Get more info on other podcatchers BIG ISTE e o00 Embed t Open Linkin New Tab site Gl Embed w Bookmark This Link SavweLinkAs Current Feed Content P Build Gallery CNET Live September 27 2007 Z FlashGot Options Posted Fri 28 Sep 2007 17 43 14 GMT ERES Lonne 3 Log into the NSA web configurator see Section 2 3 on page 30 using the administrator account and click Administration gt Applications gt Broadcatching Figure 44 Broadcatching Tutorial My NSA Administration Fs
72. A screens Broadcatching Subscribe the NSA to feeds to download frequently updated digital content like TV programs radio talk shows Podcasts audio files YouTube videos or even BitTorrents Print Server View and manage the NSA s list of printers and print jobs Users View create and edit administrator and user accounts to let people use the NSA Shares View create and edit shares Shares are shared folders to which you can allow specific users read write access rights Maintenance Log View the NSA s logs Configuration Back up and or restore the NSA configuration file FW Upgrade Upload new firmware to your NSA Shutdown Restart the NSA or shut it down Logout Click Logout to exit the web configurator This is recommended to prevent unauthorized administrator access to the NSA 2 6 3 Main Window The main window 8 shows the screen you select in the navigation panel It is discussed in the rest of this document The Status screen is the first administration screen to display See Chapter 4 on page 63 for more information about the Status screen 2 6 4 Status Messages The message text box at the bottom of the screen displays status messages as you configure the NSA 2 6 5 Common Screen Icons The following table explains some icons that appear in several configuration screens Table 11 Common Configuration Screen Icons ICON DESCRIPTION g Click the Edit icon to go to a screen where you can chang
73. Chapter 7 Network Screen Figure 64 System Setting gt Network gt TCP IP ss Network TCP IP IP Address e Dynamic C static IP Address IP Subnet Mask Default Gateway DNS c Dynamic C static Primary DNS Server J Secondary DNS Server Jumbo Frames Disabled Enabled C akB C gkB okB Caution hub and router support Jumbo Frames Network Diagnostic Tool Host 192 168 1 1 ix nem Successfully pinged host Jumbo Frame is supported in 1 Gbps and higher mode only Please make sure your host switch isa ies The following table describes the labels in this screen Table 23 System Setting Network TCP IP communicate LABEL DESCRIPTION IP Address Dynamic Select this option to have the NSA get IP address information automatically If no IP address information is assigned the NSA uses Auto IP to assign itself an IP address and subnet mask For example you could connect the NSA directly to your computer If the computer is also set to get an IP address automatically the computer and the NSA will choose addresses for themselves and be able to following fields Static Select this option for the NSA to use fixed TCP IP information You must fill in the IP Address Type an IP address in this field address es into the fields below IP Subnet Type an IP subnet mask in this field Mask Default Type a default gateway address in this field Gatewa
74. Click this to format internal hard drives and create a new volume All data on the disk s will be lost Create an External Click this to format an external hard drive and create a new volume All Volume data on the disk will be lost Status This field shows whether the volume is Healthy Resync Recovering Degraded or Down Volume The NSA creates the volume name automatically You can edit it Disk Configuration This field shows which disks and data storage system the volume is using File System This field displays the file system that an external USB volume is using Disk s Click or roll your mouse over a link in this column to display the following details about the hard drive located in the corresponding hard drive bay Type Whether it is an internal or external USB hard drive Model Name This is the hard disk number that identifies the disk File System The file system that an external volume is using Capacity The total storage space on the disk Capacity This field shows total disk size the percentage of the volume being used and the percentage that is available Actions This field displays icons allowing you to edit scan repair or delete a volume You can also locate or eject an external volume Note If you delete a volume all data in the volume disk s is erased You see a warning screen before you delete a volume Figure 59 Delete a Volume Warning Screen ge Volume 1Di
75. Contributor obtains such knowledge after the Modification is made available as described in Section 3 2 Contributor shall promptly modify the LEGAL file in all copies Contributor makes available thereafter and shall take other steps such as notifying appropriate mailing lists or unscrupulous reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained b Contributor Apes If Contributor s Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API Contributor must also include this information in the legal file c Representations Contributor represents that except as disclosed pursuant to Section 3 4 a above Contributor believes that Contributor s Modifications are Contributor s original creation s and or Contributor has sufficient rights to grant the rights conveyed by this License 3 5 Required Notices You must duplicate the notice in Exhibit A in each file of the Source Code If it is not possible to put such notice in a particular Source Code file due to its structure then You must include such notice in a location such as a relevant directory where a user would be likely to look for such a notice If You created one or more Modification s You may add your name as a Contributor to the notice described in Exhibit A You must also duplicate this License in any documentation for the
76. D ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com NSA 220 User s Guide Appendix D Open Source Licences Original SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free for commercial and non commercial use as long as the following conditions are adhered to The following conditions apply to all code found in this distribution be it the RC4 RSA Ihash DES etc code not just the SSL code The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson tjh cryptsoft com Copyright remains Eric Young s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be given attribution as the author of the parts of the library used This can be in the form of a textual message at program startup or in documentation online or textual provided with the package Redistributi
77. ESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This Product includes php software under the PHP License The PHP License version 3 0 Copyright c 1999 2006 The PHP Group All rights reserved Redistribution and use in source and binary forms with or without modification is permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 The name PHP must not be used to endorse or promote products derived from this software without prior written permission For written permission please contact group ph
78. FTWARE IS COMPATIBLE WITH ANY PARTICULAR PLATFORM SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO YOU IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION THEN ALL EXPRESS AND IMPLIED WARRANTIES SHALL BE LIMITED IN DURATION TO A PERIOD OF THIRTY 30 DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD 7 Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES INCLUDING WITHOUT LIMITATION INDIRECT SPECIAL PUNITIVE OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS LOSS OF PROFITS BUSINESS INTERRUPTION OR LOSS OF BUSINESS INFORMATION ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM OR FOR ANY CLAIM BY ANY OTHER PARTY EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ZyXEL S AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS AGREEMENT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND NSA 220 User s Guide Appendix D Open Source Licences DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE BUT SHALL IN NO EVENT EXCEED 1 000 BECAUSE SOME STATES COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES THE ABOVE LIMITATION MAY NOT APPLY TO YOU 8 Export Restrictions THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS REG
79. ITY or FITNESS FOR A PARTICULAR PURPOSE You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License 8 Limitation of Liability In no event and under no legal theory whether in tort including negligence contract or otherwise unless required by applicable law such as deliberate and grossly negligent acts or agreed to in writing shall any Contributor be liable to You for damages including any direct indirect special incidental or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work including but not limited to damages for loss of goodwill work stoppage computer failure or malfunction or any and all other commercial damages or losses even if such Contributor has been advised of the possibility of such damages 9 Accepting Warranty or Additional Liability While redistributing the Work or Derivative Works thereof You may choose to offer and charge a fee for acceptance of support warranty indemnity or other liability obligations and or rights consistent with this License However in accepting such obligations You may act only on Your own behalf and on Your sole responsibility not on behalf of any other Contributor and only if You agree to indemnify defend and hold each Contributor harmless for any liability incurred by or claims assert
80. If you enter a user bob but use BOB when connecting via CIFS or FTP it will use the account settings used for bob The username cannot be the same as a system username such as ANONYMOUS CIFS ANONYMOUS FTP EVERYONE nor be the same as an existing user Other reserved usernames that are not allowed are bin daemon ftp anonymous ftp nobody root NSA 220 User s Guide Chapter 9 Users pc guest admin password 9 4 Delete Account Screen In the Users screen select an account and click Delete Account to open the following screen Use this screen to remove a user account Figure 86 Users Delete Account Delete AccountDelete Account bob Do you wish to proceed m Y The following table describes the labels in this screen Table 37 Users gt Delete Account LABEL DESCRIPTION Yes Click Yes to remove the user account Management of any shares that belonged to the account passes to the default administrator account No Click No to keep the user account NSA 220 User s Guide Shares This chapter introduces the Shares screens of the NSA 10 1 Shares Introduction Use the Shares screens to create and manage shares A share is a set of user access permissions mapped to a specific folder on a volume It is equivalent to the Windows concept of a shared folder but is independent of the folder You can map a share to a network drive for easy and fa
81. L s P 2301RL PIC a device for making phone calls over the Internet Figure 35 Download Link Example File Edit View Favorites Tools Help Back gt A search Gyravorites meda lt 4 D 5 Kp 5 Address fa http www zyxel com web support_download_detail php sqno 49 OM MA Mi R 0 BUY Horth Europe x J West Europe x East Europe Down Uu ads G America Your Locations GLOBAL Al J r cw Te Dine LL pranucaasoumons_ surrona DONIS Home Support amp Downloads Download Library Support amp Downloads Download Library Download Library Knowledge Base EB DATASHEET Glossary Model P 2301RL P1C Support amp Feedback Version 2 Warranty Information Language English ZyXEL Windows Vista OS NA Support Release Date 08 28 2007 Size 194 KB Description Download Now LEGAL NOTICE PRI STATEMENT BES Make sure the link opens either the file you want or a pop up window about how to handle the file It is also OK for the link to open a torrent file If you are redirected to a screen that says the download should start in a few seconds there may be a link to click if the download does not start automatically See if that link opens the file or the pop up window 3 Right click the download link and select Copy Shortcut in Internet Explorer or Copy Link Location in Firefox NSA 220 User s Guide 53 Chapter 3 Tutorials Figure 36 Copy Shortcut Download
82. MAC address 64 Manage It 34 management session timeout 32 managing shares 36 MDI MDI X 155 media clients 90 media server 90 137 158 configuration 137 software 137 158 status 64 Memeo AutoBackup 156 messages 43 MIT License 216 model name 41 64 moving share contents 35 Mozilla Public License 209 My NSA 32 Change Share Properties screen 36 management overview screens 36 My NSA screens 33 My Own Shares 34 N navigation panel screen summary 42 NDU NSA Discovery Utility 29 network protection 94 network protocols 157 network security 157 NSA Discovery Utility NDU 156 NTFS 80 O OK 78 open source licences 191 Open SSL License 205 206 OpenLDAP 205 OpenLDAP Public License 205 operating humidity 157 operating temperature 157 P packet inspection 95 password 30 32 changing 39 Patent 221 path 36 37 PHP License 208 podcasts 105 NSA 220 User s Guide Index pop ups 29 power consumption 160 161 POWER LED 27 print server 109 private shares 37 proof of purchase 222 public shares 37 publish shares 90 publishing shares to the web 101 R radio shows 105 RAID type 64 RAID file storage 156 RAID volume repair 44 recovering 78 related documentation 3 remove hard drives 26 removing entries 43 removing external hard drives 44 repair icon 44 replacing faulty hard disks 44 reset button 155 restart 132 restrictions on folder names 38 on share names 38 on vol
83. MAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This software consists of voluntary contributions made by many individuals on behalf of the PHP Group The PHP Group can be contacted via E mail at group 9 php net For more information on the PHP Group and the PHP project please see lt http www php net gt This product includes the Zend Engine freely available at lt http www zend com gt The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE This Product includes Sablotron software under MPL License Mozilla Public License Version 1 1 1 Definitions 1 0 1 Commercial Use means distri
84. N VCO INTE TER 4 c lik i1 ass each cee ade aa a S EEOAE Eaa edd E iaia 6 GContenis gD eee SE eee ee ree eer er 9 Aes ey C re fp Se llli e EL et Ae Be er ae yk ODT D eee tee D ER 11 4 M 17 EUER Eel TTE accra cuceaevaedaueeareevasca lsat evscdediacas attercarraseatens 21 Part I Introduction cccceseeceeseneseneecneecueeeaneeenseeeeeeeeneseueseneuseeesenenenes 23 Chapter 1 Gelting TO Know jid 25 DE Te ics eke es pata DET ENT 25 eI T 26 Iie COPY BEO MN 28 Chapter 2 Web Conhgurator Basis 29 2 Weboonllgraler OVEN oenina E A AREN 29 2 2 Abosssing The NSA Web COMMU iuuicuce cae eecen utere ea pne pecca pesa c e RE Ea aE 29 2 2 1 Access the NSA Via NDU sssssseseeneenenenenenenenennnnnen enn nntn resins ne ases sss nnn n nas 29 2 2 2 Web Browser JNGOBSS oda sei tei ro URDU Me du acte Tid ra iM Mdterbi ds Eod Ded ENA 30 o Eu a m 30 2 4 User level Screens Overview sesssssssssessssssseeeenenetene nene eness nh nnnsies sss nanninannan an s nans s sla 31 CR MY NSA GOES erion rea a EEEE EE 33 2 5 1 My NSA Share Browsing SOFBS Lies rr tri rond a RR R Ra DD ANAN 34 2 5 2 My NSA Share Browsing Move to or Copy to Screen sss 35 2 5 3 My NSA Management Overview Screen iuuecccaceeseeekestekkanek xke neu eb ERE Ya a tRE Dru aga 36 2 5 4 My
85. NSA 220 Network Storage Appliance User s Guide Version 2 10 11 2007 Edition 1 DEFAULT LOGIN Web Address nsa220 Password 1234 ZyXEL WWW zyxel com About This User s Guide About This User s Guide Intended Audience This manual is intended for people who want to configure the NSA using the web configurator A basic knowledge of TCP IP networking concepts and topology will be helpful Related Documentation Quick Start Guide The Quick Start Guide is designed to help you get up and running right away It contains information on setting up your network and configuring for Internet access Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary information Supporting Disk Refer to the included CD for support documents ZyXEL Web Site Please refer to www zyxel com for additional support documentation and product certifications User Guide Feedback Help us help you Send all User Guide related comments questions or suggestions for improvement to the following address or use e mail instead Thank you The Technical Writing Team ZyXEL Communications Corp 6 Innovation Road II Science Based Industrial Park Hsinchu 300 Taiwan E mail techwriters 9 zyxel com tw NSA 220 User s Guide 3 Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User s Guide gt Warni
86. NSA Change Share Properties Screen sse 36 c5 STS and Folder Nanos icol ten ietete duro pedet eo ien ted done Coe aieo niu 38 PTT A ANNI US parce gerd ct acerca RR RR 39 2 5 7 Password Screen oiiecececceececccccceeeecececeeceeeeceseeseauessceseeuuaueeseeeseaueuseeeeeueauaueeseeuseneeeeenead 39 e Admins raon OCENE c esce eoc te p vasco ns oc ooo ite paseo pedet rs eco R DE Ee a irasduUd 40 NSA 220 User s Guide Table of Contents 261 Globa AgISEESHEFI DEM 222512 xtd KR pot cun N 41 EOM M pr 42 263 Main WINGOW 43 de Ra Ws DAS iiA R N S epi 43 vas sepes dira et T 43 Chapter 3 E 9 2I 7C7o o Tw04 45 zT PI SU THURIS quse e repr HO acuti aio cp ac Re o dta Pot a Ae errr tt RN 45 2 1 1 DISAIS a DS ESSO ciuiscesoccsstixiiuut Gti dit am uai OD DUK bar Rad xa GIU Fat a artes 45 UA We TONS lc EIE S TS 47 3 1 3 Accessing a Share From Windows Explorer essssseeseseeneneenes 49 d 14 Accessing a Share Using PUP 32 tiiedbectr Quante cxtat en ui din Pate s dedi ARE TAAA 50 3 1 5 Accessing a Share Through the Web Configurator csscceceeeeeseeeeeeeeeeeeesaeeeeaes 51 3 A Downoad Senice TUONA EE m m TT 52 pElzgercrgegi Mtrur Me UT UM RET 56 GA Panter Serer TUONA nirin cg bak Latet aee PO AG EROR abd cpi apn qa op 59 Chapter 4 aor icc iua epit en
87. Network Configuration DNS ssesssseneeeenenn 176 Figure 115 Red Hat 9 0 KDE Network Configuration Activate ssssssseeeee 177 Figure 116 Red Hat 9 0 Dynamic IP Address Setting in ifconfig ethO sseesssssssssss 177 Figure 117 Red Hat 9 0 Static IP Address Setting in ifconfig ethO sessssessssss 177 Figure 118 Red Hat 9 0 ONS Settings In resolv Conf ussueseexdasr tepes itae terna Pee na pae erii 178 Figure 119 Red Hat 9 0 Restart Ethemet Caid 1uccueseccccoseser tas pube cenas eee x pns puce qmi E Pob cua RE ace LR DERE 178 Figure 120 Red Hat 9 0 Checking TCP IP Properties esses crnex dnd nonis ue radica eur aaa 178 PUS RIFO P EO d E D 0 EU 179 Mgurea 122 terre PIONS PIYAY Liesxsdenessaxixedetpazdamia ebd in e p uat pbi p DLP A E EN 180 Foure 123 INCRE plebe PIYAY 2siscpodunsd esencial Dani une uRu LER Ra deceat RUE Coa aa Taia 181 ide 124 Pop up Blocker SEMIS e iet e Ete ce e inerat aaar ccn RR ELE n Un e pra A EEI RE 181 NSA 220 User s Guide List of Figures Figure 125 Intemet Options DEED cousin bou aatia ankri ia bb EO antenna Hau AAA 182 Figure 126 Securty Settings Java SORIN asirni anaana aab dara cus bd 183 Figure 127 Sepurity Selings JAVA m 183 Powe Tedna a a TR 184 Figure 129 Mozilla Frew Toole eo IE isque cawk ee to a a N Hort ibo be ide eee 185 Figure 130 Mozilla Firefox Content SBOLHEIDY sicsicscciencsmincencmasninercanioiescnehiwiecniean
88. Network kil LPR for TCP IP Printing 3Com EtherLink 10 100 PCI Tx NIC 3C905B TX Dial Up Adapter USB Fast Ethernet Adapter Y TCP P gt 3Com EtherLink 10 100 PCI TX NIC 3l Client for Microsoft Networks Installing Components The Network window Configuration tab displays a list of installed components You need a network adapter the TCP IP protocol and Client for Microsoft Networks If you need the adapter 1 Inthe Network window click Add 2 Select Adapter and then click Add 3 Select the manufacturer and model of your network adapter and then click OK If you need TCP IP 1 Inthe Network window click Add 2 Select Protocol and then click Add 3 Select Microsoft from the list of manufacturers 4 Select TCP IP from the list of network protocols and then click OK If you need Client for Microsoft Networks 1 Click Add 2 Select Client and then click Add 3 Select Microsoft from the list of manufacturers 4 Select Client for Microsoft Networks from the list of network clients and then click OK 5 Restart your computer so the changes you made take effect NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Configuring 1 Inthe Network window Configuration tab select your network adapter s TCP IP entry and click Properties 2 Click the IP Address tab f your IP address is dynamic select Obtain an IP address automatically f you have a static IP address select Specify an IP add
89. On Copying files from the USB device failed Off No USB device is connected A The HDD1 and HDD2 LEDs are dual color green and red The green LED is normally on when you have a hard disk installed If the NSA detects an error on the disk the disk s connection comes loose or the disk fails the red LED also comes on Since the green LED still stays on the color appears to be orange If the NSA is no longer able to detect a hard disk in the disk bay the green LED turns off and the LED appears as red 1 1 2 COPY Button Use the COPY button on the front panel to copy files from a connected USB device to the NSA The files are stored in a folder created within the public share The name of the folder created for the copied files consists of the date and time of the copy in year month day hour minute second format Up to a total of 10 GB for files can be copied If the USB device has more than 10 GB of files the NSA emits a long beep and does not copy any of the files NSA 220 User s Guide Web Configurator Basics This chapter describes how to access the NSA web configurator and provides an overview of its screens 2 1 Web Configurator Overview The web configurator is an HTML based management interface that allows easy NSA setup and management using an Internet browser Use Internet Explorer 6 0 Mozilla Firefox 1 07 Netscape Navigator 7 0 or later versions of these browsers The recommended screen resolution is 1024 by 768
90. P port number Ifthe Protocol is USER this is the IP protocol number Description This is a brief explanation of the applications that use this service or the situations in which this service is used Table 59 Commonly Used Services NAME PROTOCOL PORT S DESCRIPTION AH User Defined 51 The IPSEC AH Authentication Header IPSEC TUNNEL tunneling protocol uses this service AIM New ICQ TCP 5190 AOL s Internet Messenger service It is also used as a listening port by ICQ AUTH TCP 113 Authentication protocol used by some servers BGP TCP 179 Border Gateway Protocol BOOTP CLIENT UDP 68 DHCP Client BOOTP SERVER UDP 67 DHCP Server CU SEEME TCP 7648 A popular videoconferencing solution from UDP 24032 White Pines Software DNS TCP UDP 53 Domain Name Server a service that matches web names for example www zyxel com to IP numbers ESP User Defined 50 The IPSEC ESP Encapsulation Security IPSEC TUNNEL Protocol tunneling protocol uses this service FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on NSA 220 User s Guide Appendix C Common Services Table 59 Commonly Used Services continued NAME PROTOCOL PORT S DESCRIPTION FTP TCP 20 File Transfer Program a program to enable TCP 21 fast transfer of files including large files
91. Paste LINK quissesesuaescse Quite Qaid toes na Der Q EUd bep eee pregbne Uds 58 Figure 47 Brosdcstching Tutorials Apply Pasted Link 1 erc ri bre R PR PDLEI REP LER reds 58 mop fepe e EDD ET 59 Figure 49 Printer Connected to NSA Windows Explorer essent 59 Figure 50 Printer Connected to NSA Windows Explorer Warning sse 59 Poue ST Pruner Divar Noodod eT REP 60 Figure SZ Applications s Prin SEET sirridir n ia ai add DEE ta catade 60 Figure 53 Printer Screen in Windows Explorer iius deed er peu niaaa iaia 60 Foure ORANG Mer T Lu ET 63 Moure 55 Session Example 1 VINGOWE ssec prcitip o aod aao dan D netae o AE NN c dudbdatun ka phon nt 65 Figure 56 System Setting Server ETE assurons aaa lrdai nd ask xad Reda Rd 70 Figure oF System Setting Date TIME ue eee ci entrain itis eit ta PL cetus tue lae sou brane tee aaas 33 Moue S9 System S SOE ossis Dar d a ep Gad n etel o Aa eer a cv iL orca Terre 73 Figure 59 Delete a Vel me Warning Sole uececciesto Seri dett kou e do b spex e Ene rep vaa aniani Fees ERES Peldda 74 Figure 60 System gt Storage gt Create an Internal Volume sseessssssssseeeeeeeeenn 75 UGE aT SEO ee EB auzssxsesobduideanssdnnnskd E E E A E nadie T d aS 76 Figure 62 System gt Storage gt Create an External Volume ssessssssseeeeeee enne 80 PRN njesddsp met E 86 Figure 64 System Setting gt Networks TCP IP 1s ccue eerte ens r aate tk ut Eno canas Eme rn
92. S server addresses 8 Click OK to close the Internet Protocol TCP IP Properties window 9 Click Close OK in Windows 2000 NT to close the Local Area Connection Properties window 10 Close the Network Connections window Network and Dial up Connections in Windows 2000 NT 11 Restart your computer if prompted Verifying Settings 1 Click Start All Programs Accessories and then Command Prompt 2 Inthe Command Prompt window type ipconfig and then press ENTER You can also open Network Connections right click a network connection click Status and then click the Support tab Macintosh OS X 1 Click the Apple menu and click System Preferences to open the System Preferences window NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 110 Macintosh OS X Apple Menu Grab File Edit Capt About This Mac Get Mac OS X Software a System Preferences Dock Location 2 Click Network in the icon bar Select Automatic from the Location list Select Built in Ethernet from the Show list Click the TCP IP tab 3 For dynamically assigned settings select Using DHCP from the Configure list Figure 111 Macintosh OS X Network eo Network 4 ww J Show All Displays Network Startup Disk Location Automatic m Show Built in Ethernet m PPPoE AppleTalk Proxies Configure Using DHCP 3 Domain Name Servers Optional IP Address
93. SA 220 User s Guide List of Figures Figure 82 Applications gt Prini Server sssrpesxabakedriaapn po anoo eoo adoptar adn bag d GU edat d 110 Figure 93 Applications gt Print Server s POTITI asus ases ciae cater tinmaniere aana b ated 110 Foure o UOS 115 Pigure 85 Users Ade pr Bona ACCOUNT 22d aridi beborpica Eb hia ADLER AERe NIRE dian MM a 116 Figure 86 Users Delete ACCORD ies etica a dics boss ceto ec e EE EE Y eR d UR P REUUdS 118 gtfggcirg e 120 Foure o8 GAS A0 USER aieiaa pania eadera ddnde dat a paca nbl dap bU b td t bua edd 121 Figure 89 Shares PAN BIDUES axaitiusssceivbtddca redeas tiuduk te didi hen ia dae se QUOD Me seda Lau ii degit ae deu pe DEN 122 melio gc e EO a a 127 Figure 81 Maintenance DODTIQUESHOI aiios ces du op e ec a aai aeaa 131 Figure 92 Maintenances au UPON e 132 Figure 85 Maintenance s SUA uiuos erra cid adc E Perte oer ate Kane b eerie ana t ER ERR ru 132 Figure 94 Maintenance gt Shutdown gt Confirm Restart eee 133 Figure 95 Maintenance gt Shutdown gt Confirm Shutdown esee 133 Figure 96 Internet Options GODIMIBI ossiani aan o BR Fou ARR Fa Rad 147 Figure 97 Security Settings Script Safe ActiveX Controls sse 148 Moure BETTHOSS Eject BUON Lao neigen ANAN atc oO dad iari a Ida ob d io 151 Figur SS 1T e INR E aperiri Da Ka
94. Source Code where You describe recipients rights or ownership rights relating to Covered Code You may choose to offer and to charge a fee for warranty support indemnity or liability obligations to one or more recipients of Covered Code However You may do so only on Your own behalf and not on behalf of the Initial Developer or any 212 NSA 220 User s Guide Appendix D Open Source Licences Contributor You must make it absolutely clear than any such warranty support indemnity or liability obligation is offered by You alone and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty support indemnity or liability terms You offer 3 6 Distribution of Executable Versions You may distribute Covered Code in Executable form only if the requirements of Sections 3 1 3 2 3 3 3 4 and 3 5 have been met for that Covered Code and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License including a description of how and where You have fulfilled the obligations of Section 3 2 The notice must be conspicuously included in any notice in an Executable version related documentation or collateral in which You describe recipients rights relating to the Covered Code You may distribute the Executable version of Covered Code or ownership rights under a license of
95. Storage Screens BS OK means the USB connected device is functioning properly Resync when you create a RAID volume Recovering appears when repairing a RAID 1 volume A RAIDI volume was once degraded but you have installed a new disk and the NSA is restoring the RAID1 volume to a healthy state Degraded when a volume is currently down but can be fixed Data access may be slower from a degraded volume so it s recommended that you replace the faulty disk and repair the volume as soon as you can Inactive when a disk is missing from a RAID 0 volume or a two disk JBOD volume The volume is unusable If you removed one of the disks you should be able to re install it and use the volume again as long as you did not change anything on the disk If a disk has failed you need to replace it and re create the whole volume AII data will be lost See page 144 for how to install or replace a hard drive Down when a volume is down and can not be fixed A down RAID volume cannot be used until you repair or replace the faulty disk s in the volume Degraded means one of the disks in the RAID volume is not available but the volume can still be used For a degraded volume you should replace the faulty disk as soon as possible to obtain previous performance See your Quick Start Guide for more information on replacing a disk If it s down then the only indication is that you can no longer transfer files to from the shares in the down v
96. TS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The licence and distribution terms for any publicly available version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution licence including the GNU Public Licence NSA 220 User s Guide 207 Appendix D Open Source Licences BSD This Product include mod ssl software under BSD license Copyright c dates as appropriate to package The Regents of the University of California All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS AND ANY EXPR
97. TTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES NSA 220 User s Guide Appendix D Open Source Licences END OF TERMS AND CONDITIONS This Product includes apcid apcupsd autofs device mapper evms exim Lm sensors mdadm pam mount raidtools samba sg utils smartmontools vsftpd xfsprogs and Linux kernel software under GPL license GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1989 1991 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Softwa
98. This chapter introduces the NSA Status screen 4 1 Status Screen The Status screen is the first main web configurator screen you see after you enter the administrator screens To view the status screens click Status on the top left of the navigation panel Figure 54 Status NSA 220 Server Name nsa220 Model Name NSA 220 Firmware Version V2 10 AFB 0 b2 MAC Address 00 13 49 FB 99 16 Media Server Status Enabled Sloane FTP Server Status Enabled Network Web Publishing Status Disabled L TCP IP Applications FTP j Media Server I Download Service System Setting Server Name Date Time Internal Volume I Web Publishing E Bioadosiching ee NNNNNNCTTTTUNN L Print Server 0 66 09 MB Use Bean z T B8 1DiskJBODvolume e diski Used Shears Healthy meri 111 66 GB Total 100 Free Maintenance JBOD Log Configuration External Volume FW Upgrade status Name Filesystem pisk iDisk Usage L Shutdown oan m ii Scc mfi Qu Logout EE 2ELTS 266 E MB Used EUSB FLASH DRIVE 34CB1 fat32 USB1 Healthy 244 01 MB Total 88 Free active Sessions 2007 11 21 14 13 19 172 23 37 113 2007 11 21 14 14 54 172 23 37 113 2007 11 21 14 22 57 172 23 37 113 2007 11 21 14 19 28 172 23 37 113 public pc guest 2007 11 21 14 21 10 172 23 37 113 public pc guest 2007 11 21 14 20 13 172 23 37 113 public pc guest 2007 11 21 14 19 51 172 23 37 113 public pc guest 2007 11 21
99. This is the volume where the NSA saves downloaded files Path This is the location of the share where the NSA will save the downloaded files Click Edit to go to a screen where you can set the default location for saving downloads and configure your BitTorrent settings Apply Click Apply to save your changes back to the NSA Cancel Click Cancel to close this screen without saving your changes 8 8 Configuring Your General Download Preferences Click Applications gt Download Service gt Preferences to open the following screen Use this screen to set the default location for saving downloads and configure your BitTorrent settings Figure 73 Applications Download Service Preferences Settings 9 Default Destination Volume volumet x Path admin download BitTorrent Max download rate 0 KB s 0 No Limit Max upload rate 0 KB s 0 No Limit Keep sharing files for 0 minutes after the download is completed The following table describes the labels in this screen Table 28 Applications Download Service Preferences LABEL DESCRIPTION Default Destination Use these fields to select where on the NSA to store the files the NSA downloads Volume If you have more than one volume select the one that contains the share where you want to save downloaded files Path Type the location of the share to save downloaded files in or click Browse and navigate to the file s lo
100. ULATIONS ORDERS OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME YOU SHALL NOT EXPORT THE SOFTWARE DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS REGULATIONS ORDERS OR OTHER RESTRICTIONS YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS LOSSES DAMAGES LIABILITIES COSTS AND EXPENSES INCLUDING REASONABLE ATTORNEYS FEES TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8 9 Audit Rights ZyXEL SHALL HAVE THE RIGHT AT ITS OWN EXPENSE UPON REASONABLE PRIOR NOTICE TO PERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT 10 Termination This License Agreement is effective until it is terminated You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control ZyXEL may terminate this License Agreement for any reason including but not limited to if ZyXEL finds that you have violated any of the terms of this License Agreement Upon notification of termination you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies including backup copies have been destroyed All provisions relating to confidentiality proprietary rights and non dis
101. VLSA80 160 GB SATA Maxtor 6L120MO 120 GB SATA I Hitachi HCS725032VLA380 320GB SATA 3 0 Gbit s Hitachi HCS725025VLA380 250GB SATA 3 0 Gbit s Seagate ST3160815AS 160GB SATA 3 0 Gbit s Seagate ST3750840AS 750GB SATA 3 0 Gbit s Seagate ST3160215SCE 160GB SATA 3 0 Gbit s NSA 220 User s Guide Chapter 16 Product Specifications NSA 220 User s Guide PART VI Appendices and Index Setting up Your Computer s IP Address 165 Open Source Licences 191 Legal Information 221 Customer Support 223 Index 229 Setting up Your Computer s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP IP installed Windows 95 98 Me NT 2000 XP Macintosh OS 7 and later operating systems and all versions of UNIX LINUX include the software components you need to install and use TCP IP on your computer Windows 3 1 requires the purchase of a third party TCP IP application package TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems After the appropriate TCP IP components are installed configure the TCP IP settings in order to communicate with your network Windows 95 98 Me Click Start Settings Control Panel and double click the Network icon to open the Network window NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 100 Windows 95 98 Me Network Configuration
102. Version 3 for infringements caused by i third party modifications of Contributor Version or ii the combination of Modifications made by that Contributor with other software except as part of the Contributor Version or other devices or 4 under Patent Claims infringed by Covered Code in the absence of Modifications made by that Contributor 3 Distribution Obligations 3 1 Application of License The Modifications which You create or to which You contribute are governed by the terms of this License including without limitation Section 2 2 The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6 1 and You must include a copy of this License with every copy of the Source Code You distribute You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients rights hereunder However You may include an additional document offering the additional rights described in Section 3 5 3 2 Availability of Source Code NSA 220 User s Guide 211 Appendix D Open Source Licences Any Modification which You create or to which You contribute must be made available in Source Code form under the terms of this License either on the same media as an Executable version or via an accepted Electronic Distribution Mechanism to anyone to whom you made an Executable version
103. Welcome to NS4 220 Enter Username password and click to login Username L 1 GPassword t CS a maximum of 14 alphanumeric printable characters no single and double quotes Note Please turn on the Javascript and ActiveX control setting on Internet Explorer _togin Reset Copyright 2007 by ZyXEL Communications Corp You should see a screen asking you to change your password highly recommended as shown next Type a new password and retype it to confirm and click Apply or click Ignore Figure 7 Change Password Screen R Update Admin Info s a security precaution it is highly recommended that you change the admin password New Password Password Confirm a maximum of 14 alphanumeric printable characters no single and double quotes App igno 2 4 User level Screens Overview All users including the administrator first see the user level access My NSA screen after login NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure8 My NSA Language 2 a q5 Es w e My NSA Password Administration Download Service Ba My NSA My Own Shares admin USB Card IntelligentStick 1 001 var ef f manade Other Shares BS The web configurator management session automatically times out if it is left idle for 15 minutes Simply log back into the NSA if this happens to you The icons and language label at the top right of
104. Your choice which may contain terms different from this License provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient s rights in the Source Code version from the rights set forth in this License If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone not by the Initial Developer or any Contributor You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer 3 7 Larger Works You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product In such a case You must make sure the requirements of this License are fulfilled for the Covered Code 4 nability to Comply Due to Statute or Regulation If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute judicial order or regulation then You must a comply with the terms of this License to the maximum extent possible and b describe the limitations and the code they affect Such description must be included in the legal file described in Section 3 4 and must be included
105. a 137 13 2 Using the Media Client Sant ane sroncsirninsninotcrnenia pet EUH aE Ra 137 Chapter 14 Memeo Aulobackup Sonare cs aaa ceed aa aaia aai 139 MET Memeo Autobackup IntFoOI EIE usas ke oma ntc p a oc o Pcia ta a pc eas 139 14 2 Using the Memeo Autobackup Software sssssssssseseeeeennenen nnns 139 Part V Troubleshooting and Specifications 141 Chapter 15 Troubleshooting 143 UN Tobleshootni CV NIG e sated aaeddakaaaneede Svanaueeiaatteneneais 143 15 2 Power Hardware Connections and LEDS i oom nora reir nr emer ions 143 15 9 MSS Login and ACCESS narri a bod dar eR ddbbbreiiideb e ddd cepe neces 145 ae FSU ive or ee ER 146 15 3 2 Enabling Scripting of Safe ActiveX Controls sssssssssseeeene 147 1521 C smor Access The NSA uoc ciseipEn tab ae ctt REPE Pete cu o bre Utan Doct o iuuto Pneu ledub rhet aae ord depiu ptu 148 TaS Boca VSB DIVES girio prhbdss agat D Pep duae doch due d ER pef ax 149 15 6 Some Features Screens Do Not Display sssssssssssssssesseeeeeneee nennen 150 17 Meita eris id e aae aa 150 15 8 Download Service and Broadcatching Functions sssssessseeeee 152 Qtxv odun coute Tm Ete 152 Chapter 16 Lii E E 155 101 PRN Fe 0o EAA 155 yj vag iig o Mete LP 155 16 3 Specilication Ta DIES C 1
106. ability for your use of the download service feature The following table describes the labels in this screen Table 27 Applications gt Download Service gt Add LABEL DESCRIPTION URL Paste the URL of the file you want to download into this field The URL can be for an HTTP FTP or BitTorrent download For a BitTorrent download you can copy and paste the URL of the torrent file The NSA will automatically download the torrent file and use it You do not have to manually download the torrent file or save it to your computer Note Make sure the link opens either the file you want or a pop up window about how to handle the file It is also OK for the link to open a torrent file If you are redirected to a screen that says the download should start in a few seconds there may be a link to click if the download does not start automatically See if that link opens the file or the pop up window Torrent File A torrent file has information the NSA uses to do a BitTorrent download A torrent file uses a torrent extension If you already have a torrent file saved on your computer select the Torrent File option and specify its path or click Browse and look for its location NSA 220 User s Guide 99 Chapter 8 Application Screens Table 27 Applications Download Service Add LABEL DESCRIPTION Default This shows where the NSA stores files after downloading them Destination Volume
107. an also manually enter a DNS server IP address in the NSA 7 1 3 Jumbo Frames Jumbo frames are Ethernet frames larger than 1500 bytes They enable data transfer with less overhead The bigger the frame the better the network performance To use jumbo frames your LAN must support 1 Gbps transmissions Gigabit Ethernet All of your network devices computer Ethernet cards and switches hubs or routers must also support the same size of jumbo frames that you specify in the NSA BS If you enable jumbo frames on the NSA in a network that does not support them you will lose access to the NSA If this occurs you will have to restore the factory default configuration Push the RESET button on the NSA s rear panel and release it after you hear a beep NSA 220 User s Guide Chapter 7 Network Screen In the following example the NSA has jumbo frames enabled and set to 8KB frames This means the computer notebook computer and switch must also have jumbo frames enabled and be capable of supporting 8KB frames Figure 63 Jumbo Frames ie 1 Gbps Ethernet e 7 2 Network Config Screen Click System Setting Network TCP IP in the navigation panel to open the following screen Use this screen to have the NSA use a dynamic or static IP address subnet mask default gateway and DNS servers If you change the NSA s IP address you need to log in again after you apply changes NSA 220 User s Guide
108. and your network and protect your NSA and computers from hacking attacks DP Intrusion Detection and Prevention to detect malicious packets within normal network traffic and take immediate action against them Anti virus to check files you download for computer viruses 8 5 2 2 BitTorrent and Your Firewall The anti virus feature on a firewall probably cannot check BitTorrent downloads for viruses so use anti virus software on your computer to scan the NSA for viruses When you download using BitTorrent many other BitTorrent users are also trying to download the file from you The firewall slows this down because by default it only allows traffic from the Internet in response to a request that originated on the LAN it lets you get files from the Internet and blocks those on the Internet from getting files from you Figure 69 Firewall Blocking Incoming BitTorrent Requests 8 amp Incoming BitTorrent Requests Blocked Y i Internet gt LI j Outgoing BitTorrent Request Allowed 48 Corresponding BitTorrent Reply Allowed To speed up BitTorrent file transfers configure your firewall s port forwarding to send incoming TCP port 6881 and UDP port 6880 connections to the NSA You probably need to use your firewall s HTML web based configuration interface to set this up see the firewall s manual for details You may also have to configure a corresponding firewall rule NS
109. applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License also called this License Each licensee is addressed as you A library means a collection of software functions and or data prepared so as to be conveniently linked with application programs which use some of those functions and data to form executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it For a library complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running a program using the Library is not restricted and output from such a p
110. assword The default password is 1234 f you have changed the password and forgotten it you will have to reset the NSA see Section 15 3 1 on page 146 The NDU cannot discover my NSA NSA 220 User s Guide Chapter 15 Troubleshooting Confirm that the computer running the NDU has a network connection See the section on the NSA s LAN connection for related information The computer running the NDU can only discover NSAs in the same subnet NSAs connected to the same switch or router as your NDU computer are usually in the same subnet unless the router is doing subnetting or the switch is implementing VLAN The Memeo Autobackup program uses the same network port as the NDU to discover the NSA To avoid a port conflict do not run the Memeo Autobackup program at the same time as the NDU Close the NDU and reopen it 15 3 2 Enabling Scripting of Safe ActiveX Controls If pages of the web configurator do not display properly in Internet Explorer check that scripting of safe ActiveX controls is enabled 1 In Internet Explorer click Tools Internet Options and then the Security tab Figure 96 Internet Options Security General Security Privacy Content Connections Programs Advanced Select a Web content zone to specify its security settings amp o oe Internet Local intranet Trusted sites Restricted sites A This zone contains all Web sites you Gites haven t placed in other
111. at of copied files 28 format of copied files folder 28 formats supported 160 FTP 89 connection limit 90 idle timeout 90 language encoding 90 FTP downloads 93 FTP server status 64 G Gigabit Ethernet 155 global icons 32 41 global labels 32 global NSA icons 41 GMT 72 GNU GENERAL PUBLIC LICENSE 201 GNU LESSER GENERAL PUBLIC LICENSE 194 Greenwich Mean Time See GMT H hard disk faulty 44 hard drives bays 64 external 34 64 internal 34 64 USB 64 hardware connections 26 hardware specifications 156 HDD1 LED 27 HDD2 LED 27 healthy 77 healthy volume 44 help icon 41 home icon 41 home networks 137 158 Home screen 31 HTTP downloads 93 hyperlinks 42 icons 32 about 41 administration 41 common 43 delete 43 edit 43 44 eject 44 global 32 41 help 41 home 41 logout 32 41 repair 44 scan disk 44 share 44 user 44 volume 44 web help 32 identifying external storage devices 44 idle timeout 90 NSA 220 User s Guide Index IDP Intrusion Detection and Prevention 95 inactive 78 install drives 26 internal hard drives 34 64 iTunes 90 J JavaScript 29 jumbo frames 85 L LAN LEDs 28 language 41 language encoding 90 LEDs 26 liability 221 license 221 license Agreement for NSA 217 lights 26 links sub links 42 to screens 42 locate icon icons locate 44 log 127 classes 128 screen 127 severity 128 logging monitoring 158 login username 30 logout icon 32 41
112. ate from the Original Code or 3 for infringements caused by i the modification of the Original Code or ii the combination of the Original Code with other software or devices 2 2 Contributor Grant Subject to third party intellectual property claims each Contributor hereby grants You a world wide royalty free non exclusive license under intellectual property rights other than patent or trademark Licensable by Contributor to use reproduce modify display perform sublicense and distribute the Modifications created by such Contributor or portions thereof either on an unmodified basis with other Modifications as Covered Code and or as part of a Larger Work and under Patent Claims infringed by the making using or selling of Modifications made by that Contributor either alone and or in combination with its Contributor Version or portions of such combination to make use sell offer for sale have made and or otherwise dispose of 1 Modifications made by that Contributor or portions thereof and 2 the combination of Modifications made by that Contributor with its Contributor Version or portions of such combination the licenses granted in Sections 2 2 a and 2 2 b are effective on the date Contributor first makes Commercial Use of the Covered Code Notwithstanding Section 2 2 b above no patent license is granted 1 for any code that Contributor has deleted from the Contributor Version 2 separate from the Contributor
113. ations Download Service LABEL DESCRIPTION Time Left This is how much longer in hours minutes and seconds it should take to finish the download at the current download speed Priority This is the download s priority on the NSA You can set a currently downloading or queued download to high or automatic priority You can set a download to high priority to have the NSA try to download it before the other files However the actual download speed depends more on factors like the speed of you Internet connection the speed of the download source s Internet connection how many others are trying to download at the same time the peers and seeds available and general network conditions 8 7 Adding a Download Task Click Applications gt Download Service gt Add to open the following screen Use this screen to specify a file for the NSA to download Section 3 2 on page 52 provides a tutorial on adding a download task Figure 72 Applications Download Service Add Add Download Task From URL e Source URL C Torrent File Browse 9 Default Destination Volume v Path admin download EB Caution Do not use the NSA for illegal downloads Illegal downloading or sharing of files can result in severe civil and criminal penalties You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof ZyXEL takes NO responsibility or li
114. ations for RAID 0 are non critical data or data that changes infrequently and is backed up regularly requiring high write speed such as audio video graphics games and so on NSA 220 User s Guide Chapter 6 Storage Screens 6 9 3 RAID 1 RAID 1 creates an exact copy or mirror of a set of data on another disk This is useful when data backup is more important than data capacity The following figure shows two disks in a single RAID 1 volume with mirrored data Data is duplicated across two disks so if one disk fails there is still a copy of the data Table 22 RAID 1 As RAID 1 uses mirroring and duplexing a RAID 1 volume needs an even number of disks two or four for the NSA RAID 1 capacity is limited to the size of the smallest disk in the RAID array For example if you have two disks of sizes 150 GB and 200 GB respectively in one RAID 1 volume then the maximum capacity is 150 GB and the remaining space 50 GB is unused Typical applications for RAID 1 are those requiring high fault tolerance without need of large amounts of storage capacity or top performance for example accounting and financial data small database systems and enterprise servers 6 9 4 RAID and Data Protection If a hard disk fails and you re using a RAID 1 volume then your data will still be available but at degraded speeds until you replace the hard disk that failed and resynchronize the volume However RAID cannot protect against file cor
115. atisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if writt
116. atively you can give the NSA a static IP address and subnet mask Full Network Management The embedded web configurator is an platform independent web based utility that allows you to easily access the NSA s management settings Hard Disk Drive Power Saving If a hard disk inside the NSA is idle for six minutes the NSA puts it to sleep until you use it again Firmware Upload and Configuration File Management Upload new firmware to the NSA using the web configurator You can also back up and restore the NSA configuration file containing all its settings to from your computer NSA Discovery Utility NDU Use the NDU from a Windows computer to find NSA s in your network access the NSA login page change its IP address configuration or map to a Windows network drive Memeo Autobackup Memeo Autobackup is a tool for Windows users to create backups of data stored on their Windows computers to an NSA This software is included on the CD Time and Date Configure a time server and set a time zone for your NSA to show the correct times in logs 16 3 Specification Tables The NSA hardware specifications are shown in the following table Table 53 NSA Hardware Specifications Default IP Address DHCP client If no DHCP server is found the NSA uses Auto IP to choose an IP address in the 169 254 X X subnet where X is a number from 1 to 254 Default Subnet Mask DHCP client by defau
117. available and if made available via Electronic Distribution Mechanism must remain available for at least twelve 12 months after the date it initially became available or at least six 6 months after a subsequent version of that particular Modification has been made available to such recipients You are responsible for ensuring that the Source Code version remains available even if the Electronic Distribution Mechanism is maintained by a third party 3 3 Description of Modifications You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change You must include a prominent statement that the Modification is derived directly or indirectly from Original Code provided by the Initial Developer and including the name of the Initial Developer in a the Source Code and b in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code 3 4 Intellectual Property Matters a Third Party Claims If Contributor has knowledge that a license under a third party s intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2 1 or 2 2 Contributor must include a text file with the Source Code distribution titled LEGAL which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact If
118. browsers without an RSS feed aggregator or a window where you can add the RSS feed in browsers with an RSS feed aggregator Download Set which of the channel s items the NSA downloads Policy Download All Items Download every file in the feed Download Only New Items Download new files from today on Manually Choose Items for Download Only download individual files you select later in the Applications Broadcatching screen Delete Policy Set how the NSA handles deleting the items downloaded from the channel Manual Only delete individual files you select later in the Applications gt Broadcatching screen Keep last N of items Select this to set the NSA to only keep a number of the channel s most recent files When this number has been reached if the NSA downloads another file from the channel it deletes the oldest file from the NSA Apply Click Apply to save your changes back to the NSA Reset This button appears in the Preferences screen Click Reset to begin configuring this screen afresh Cancel Click Cancel to close this screen without saving your changes 8 15 Printer Sharing The NSA can act as a print server A print server lets multiple computers share a printer Connect a printer to the NSA s USB port to let multiple computers on your network use it See www zyxel com for a list of compatible printers Figure 81 Printer Sharing USB 9 NSA 220 User s Guide Chapter 8 Ap
119. bution or otherwise making the Covered Code available to a third party 1 1 Contributor means each entity that creates or contributes to the creation of Modifications NSA 220 User s Guide Appendix D Open Source Licences 1 2 Contributor Version means the combination of the Original Code prior Modifications used by a Contributor and the Modifications made by that particular Contributor 1 3 Covered Code means the Original Code or Modifications or the combination of the Original Code and Modifications in each case including portions thereof 1 4 Electronic Distribution Mechanism means a mechanism generally accepted in the software development community for the electronic transfer of data 1 5 Executable means Covered Code in any form other than Source Code 1 6 Initial Developer means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A 1 7 Larger Work means a work which combines Covered Code or portions thereof with code not governed by the terms of this License 1 8 License means this document 1 8 1 Licensable means having the right to grant to the maximum extent possible whether at the time of the initial grant or subsequently acquired any and all of the rights conveyed herein 1 9 Modifications means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifica
120. bution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 12 If the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later ve
121. cation BitTorrent These settings control the NSA s BitTorrent downloads Max download rate You may need to limit the bandwidth the NSA uses for BitTorrent downloads if your network s other Internet applications are not getting enough downstream bandwidth 0 has the NSA impose no restriction Max upload rate You may need to limit the bandwidth the NSA uses to share files through BitTorrent if your network s other Internet applications are not getting enough upstream bandwidth 0 has the NSA impose no restriction If you do not allow any uploads for example you set a limit of 1 KB s you will not have a good standing in the BitTorrent community NSA 220 User s Guide Chapter 8 Application Screens Table 28 Applications Download Service Preferences LABEL DESCRIPTION Keep sharing files for x With BitTorrent the NSA starts sharing a file while you are downloading it minutes after the Set how long to continue sharing a file after the NSA finishes the download download is completed Continuing to share a file helps other BitTorrent users finish downloading it Sharing out at least as much as you download helps keep you in good standing in the BitTorrent community 0 has the NSA stop sharing the file as soon as the download finishes Set this to 1 to keep sharing files forever Apply Click Apply to save your changes back to the NSA Reset Click Reset to begin configuring this screen afresh
122. ccess to shares folders or files with names encoded in the UTF 8 8 bit UCS Unicode Transformation Format format So your FTP client must support UTF 8 in order to access shares folders or files on the NSA with Unicode names Spaces underscores periods dashes Other limitations include All leading and trailing spaces are removed automatically Multiple spaces within names are converted to a single space Share names must be unique they cannot be the same as other share names The NSA creates automatic volume names for external USB disk volumes These are a type of share so the share name you configure cannot conflict with the external USB disk volume names ExtVol1 or ExtVol2 are examples of external USB disk volume names Folder names must be unique they cannot be the same as other folder names The minimum character length of a name is one character that is a name cannot be blank The maximum character length of share name is 255 characters Unicode is supported for share names although your FTP client must support UTF 8 Full support should be available in all Windows versions after Windows 2000 NSA 220 User s Guide Chapter 2 Web Configurator Basics 2 5 6 Share Paths A share path is the full path to a folder on a volume that will be shared for example mynsa topsecret ugs This is independent from a share name which is the name shown for this share when accessing the share v
123. ced tab 2 Make sure that Use Java 2 for applet under Java Sun is selected 3 Click OK to close the window Figure 128 Java Sun General Security Privacy Content Connections Programs Advanced Settings O Use inline AutoComplete O Use Passive FTP for firewall and DSL modem compatibility Use smooth scrolling E HTTP 1 1 settings Use HTTP 1 1 O Use HTTP 1 1 through proxy connections amp Java Sun C v Use Java 2 v1 4 1 07 for applet requires restart 3 Microsoft v O Java console enabled requires restart O Java logging enabled JIT compiler for virtual machine enabled requires restart Multimedia O Always show Internet Explorer 5 0 or later Radio toolbar O Don t display online media content in the media bar Enable Automatic Image Resizing xf gt Restore Defaults Mozilla Firefox Mozilla Firefox 2 0 screens are used here Screens for other versions may vary You can enable Java Javascripts and pop ups in one screen Click Tools then click Options in the screen that appears NSA 220 User s Guide Appendix B Pop up Windows JavaScripts and Java Permissions Figure 129 Mozilla Firefox Tools gt Options IEEE Help Web Search Ctrl K Downloads Ctrl J Add ons Web Developer Error Console Adblock Plus Ctri Shift A Page Info FireFTP Clear Private Data Ctrl Shift Del Tab Mix Plus Options 3 Session Manager J options x Click Cont
124. ch an object file uses only numerical parameters data structure layouts and accessories and small macros and small inline functions ten lines or less in length then the use of the object file is unrestricted regardless of whether it is legally a derivative work Executables containing this object code plus portions of the Library will still fall under Section 6 Otherwise if the work is a derivative of the Library you may distribute the object code for the work under the terms of Section 6 Any executables containing that work also fall under Section 6 whether or not they are linked directly with the Library itself 6 As an exception to the Sections above you may also combine or link a work that uses the Library with the Library to produce a work containing portions of the Library and distribute that work under terms of your choice provided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License You must supply a copy of this License If the work during execution displays copyright notices you must include the copyright notice for the Library among them as well as a reference directing the user to the copy of this License Also you must do one of these things a Accompany the work with the complete corresponding
125. changed System NOTICE DNS server address is changed to be assigned by user System NOTICE Name server is changed Users ALERT Failed s login attempt incorrect password or inexistent username Users ALERT Failed 96s login attempt incorrect password or inexistent username Users NOTICE Add new user s Users NOTICE Change user s s password Users NOTICE Delete user 96s Users NOTICE User s on u u u u has been denied access from s Users INFO User s has logged in from 96s Users INFO User 96s has logged out from 96s Users INFO User 96s from 96s has been logged out re auth timeout Users INFO User 96s from 96s has been logged out lease timeout NSA 220 User s Guide Chapter 11 Maintenance Screens 11 6 Configuration Click Maintenance Configuration to open the following screen Use the Configuration screen to back up or restore the NSA configuration settings and enable or disable the hardware reset button Figure 91 Maintenance Configuration ss Maintenance Configuration Backup Restore Configuration Restore Backup Current Configuration Settings Click the Backup button to save the current configuration of our system to your local computer To restore a previously saved configuration file to your system browse to the location of the configuration file and click Restore File Browse The following table describes the labels in this screen Table 46 Maintenance gt Conf
126. closure shall survive the termination of this Software License Agreement 12 General This License Agreement shall be construed interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC Taiwan This License Agreement shall constitute the entire Agreement between the parties hereto This License Agreement the rights granted hereunder the Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties NSA 220 User s Guide Appendix D Open Source Licences NSA 220 User s Guide Legal Information Copyright Copyright 2007 by ZyXEL Communications Corporation The contents of this publication may not be reproduced in any part or as a whole transcribed stored in a retrieval system translated into any language or transmitted in any form or by any means electronic mechanical magnetic optical chemical photoc
127. commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another wo
128. configuration file before you make changes major configuration changes Need to transfer data from your computer to the Use the Memeo Autobackup program NSA after volume s have been created Data infected by virus Use anti virus software on your computer to scan files before saving them onto the NSA Although this may be slow so you may want to schedule it to occur while no one is using the NSA Use a firewall with anti virus capability on your network Hard drive malfunction Use RAID NSA malfunction Back up data to another NSA or external USB hard Network down drive Natural disaster such as a fire or earthquake occurs where your NSA is located The following sections describe these methods in more detail See Section 6 9 on page 81 for more information on RAID 12 1 1 Configuration File Backup and Restoration Use the Maintenance gt Configuration menus to create a file of your NSA configurations such as passwords shares and volumes created network settings and so on If you re going to do some major configuration changes then it is advisable to create a configuration backup file If things go wrong after you make the configuration changes you can always go back to the previous configuration by restoring an earlier configuration file If you forgot the NSA password then use the RESET button see Section 15 3 1 on page 146 to return the NSA to the factory default configuration NSA 220 User s Guid
129. construed as modifying the License You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use reproduction or distribution of Your modifications or for any such Derivative Works as a whole provided Your use reproduction and distribution of the Work otherwise complies with the conditions stated in this License 5 Submission of Contributions Unless You explicitly state otherwise any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License without any additional terms or conditions Notwithstanding the above nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions 6 Trademarks This License does not grant permission to use the trade names trademarks service marks or product names of the Licensor except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file 7 Disclaimer of Warranty Unless required by applicable law or agreed to in writing Licensor provides the Work and each Contributor provides its Contributions on an AS IS BASIS WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND either express or implied including without limitation any warranties or conditions of TITLE NON INFRINGEMENT MERCHANTABIL
130. copies of this license document but changing it is not allowed This is the first released version of the Lesser GPL It also counts as the successor of the GNU Library Public License version 2 hence the version number 2 1 Preamble NSA 220 User s Guide Appendix D Open Source Licences The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other authors who decide to use it You can use it too but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case based on the explanations below When we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions tha
131. ct shares to publish NSA 220 User s Guide Chapter 8 Application Screens Figure 75 Applications Web Publishing ss Applications Web Publishing Web Publishing C Disable Web Publishing Enable Web Publishing Port Number E Q Note The format of URL http IP Address Port Number MyWeb ShareName Unpublished Shares Published Shares FamilyPhotos The following table describes the labels in this screen Table 29 Applications Web Publishing LABEL DESCRIPTION Disable Enable Web Turn on web publishing to let people access files in the published shares Publishing using a web browser without having to log into the My NSA screens Port Number Specify a port number for accessing the published share websites hosted on the NSA If you enter a number other than 80 make sure you include it when telling others how to access the web published share For example say you specified port 8080 the NSA s IP address is 192 168 1 23 and the name of the web published share is FamilyPhotos You would have to enter http 192 168 1 23 8080 MyWeb FamilyPhotos in your browser s address bar to access the share s web page Unpublished Shares This list box displays the shares that the NSA does not publish for web browser access Publish Selected Share s Select shares in the Unpublished Shares box and click this button to let people access files in the published shares using a web br
132. d network Folder Select a shared network folder and assign a drive letter to the connection so that you can access the Folder using My Computer Specify the drive letter for the connection and the Folder Nsa220 that you want to connect to H B ia Nsa220 Drive s i i amp admin Jimmy Folder Browse 8 mig Example server share amp photo Reconnect at logon SY public ean H E USB Card IntelligentStick 1 00 Connect using a different user name D amp video Create a shortcut to a Web folder or FTP site 3 Printers ET OM xl Finish Cancel OK Cancel New Folder NSA 220 User s Guide Chapter 3 Tutorials 4 Enter the username and password for Jimmy s account and click OK You do not need to do this if the username and password are the same as Jimmy s Windows login Incorrect password or unknown username for WNsa220 Jimmy Connect As Password 5 After the mapping is done you can then simply copy and paste or drag and drop files from to your local computer s drives to or from this network folder Just like the NSA s share was another folder on your computer Figure 29 Example Share Mapped Folders View File Edit View Favorites Tools Help Back search Folders Cd dg Ur X Eee Address Sommyoni72337390 Folders ir Desktop E My Documents Bg ig My Computer Jimmy on Hal 316 Floppy A 172 23 37 39 1 4 Local Dis
133. d to open the following screen Use this screen to change an account s password Enter a new password and confirm it by re entering it NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 14 Password zxEL Ou 9 My NSA Password Administration Modify Password HAT an Account Name is 2na Old Password Password cannot be empty HOME DEt tury New Password Password cannot be empty apante Password Confirm i Caution Please keep a record of your new password whenever you change it The system will lock you out if you have forgotten your password The following table describes the labels in this screen Table 8 Password LABEL DESCRIPTION Account Name Type the user name of the account for which you want to change the password Old Password Type the user s current password New Password Create a new password for the user You can type from one to 14 single byte no Chinese characters allowed for example ASCII characters Retype to confirm You must type the exact same password that you just typed in the above field Apply Cancel Click this button to save your changes back to the NSA Click this button to begin configuring this screen afresh 2 6 Administration Screens The Administration tab displays when you log in as the administrator Click Administration in the My NSA screens to open the advanced administration screens The Status scr
134. de means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 5 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if
135. der First Prev Use these hyperlinks to navigate to the first or previous log page Next Last Use these hyperlinks to navigate to the next or final log page 11 3 Log Classes The following table shows information on log classes Table 43 Log Classes LOG CATEGORY DESCRIPTION Network This log class shows information on network configuration setting changes and so on Services This log class shows information on the operation of the NSA s built in services Shares This log class shows information on shares being created or deleted System This log class shows all other system related messages Users This log class shows information on user access to the NSA 11 4 Log Severity Levels The following table shows information on log severity levels Levels range from 0 to 6 with 0 being the most severe level log and 6 being an informational log only Log levels are not displayed in the logs and are for your reference only Table 44 Log Severity Levels LEVEL DESCRIPTION 0 Emergency 1 Alert 2 Critical 3 Error NSA 220 User s Guide Chapter 11 Maintenance Screens Table 44 Log Severity Levels continued LEVEL DESCRIPTION 4 Warning 5 Notice 6 Info 11 5 Log Messages Here are some example log messages Table 45 Log Messages
136. der Therefore we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license Most GNU software including some libraries is covered by the ordinary GNU General Public License This license the GNU Lesser General Public License applies to certain designated libraries and is quite different from the ordinary General Public License We use this license for certain libraries in order to permit linking those libraries into non free programs When a program is linked with a library whether statically or using a shared library the combination of the two is legally speaking a combined work a derivative of the original library The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom The Lesser General Public License permits more lax criteria for linking other code with the library NSA 220 User s Guide Appendix D Open Source Licences We call this license the Lesser General Public License because it does Less to protect the user s freedom than the ordinary General Public License It also provides other free software developers Less of an advantage over competing non free programs These disadvantages are the reason we use the ordinary General Public License for many libraries However the Lesser license provides advantages in certain special circumstances For example on rare occasio
137. ditions are met 1 Redistributions in source form must retain copyright statements and notices 2 Redistributions in binary form must reproduce applicable copyright statements and notices this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution and 3 Redistributions must contain a verbatim copy of this document The OpenLDAP Foundation may revise this license from time to time Each revision is distinguished by a version number You may use this Software under terms of this license revision or under the terms of any subsequent revision of the license THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE OPENLDAP FOUNDATION ITS CONTRIBUTORS OR THE AUTHOR S OR OWNER S OF THE SOFTWARE BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The names of th
138. e 135 Chapter 12 Protecting Your Data BS Configuration File Backup and Restoration does not affect data your files and folders volumes on the NSA 12 1 2 Memeo Autobackup Use the Memeo Autobackup software included on the CD on your computer to schedule and manage backups You can backup from your computer to the NSA You can also backup from one NSA on your network to another You can set the Memeo Autobackup software to automatically back up files from your computer to the NSA whenever you modify the files The Memeo Autobackup program uses the same network port as the NDU to discover the NSA To avoid a port conflict do not run the Memeo Autobackup program at the same time as the NDU NSA 220 User s Guide Media Client Software This chapter introduces the media client software included on the CD 13 1 Media Client Introduction The NSA can function as a server to allow DLNA Digital Living Network Alliance compliant media clients to play files The DLNA is a group of leading personal computer and electronics companies that works to make products compatible and able to work in a home network in order to make digital living easy and seamless The group s members include Nokia Intel Microsoft Sony Motorola Philips Samsung Matsushita and Hewlett Packard Install the included DLNA compliant media client software on your Windows XP computers to let them browse and play files stored on the NSA
139. e authors and copyright holders must not be used in advertising or otherwise to promote the sale use or other dealing in this Software without specific written prior permission Title to copyright in this Software shall at all times remain with copyright holders OpenLDAP is a registered trademark of the OpenLDAP Foundation Copyright 1999 2003 The OpenLDAP Foundation Redwood City California USA All Rights Reserved Permission to copy and distribute verbatim copies of this document is granted This Product includes open SSL under the Open SSL License NSA 220 User s Guide Appendix D Open Source Licences Open SSL License LICENSE ISSUES The OpenSSL toolkit stays under a dual license i e both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit See below for the actual license texts Actually both licenses are BSD style Open Source licenses In case of any license issues related to OpenSSL please contact openssl core openssl org OpenSSL License Copyright c 1998 2004 The OpenSSL Project All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the fo
140. e right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work based on the Library on a volume of a storage or distribution medium does not bring the other work under the scope of this License 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer version than version 2 of the ordinary GNU General Public License has appeared then you can specify that version instead if you wish Do not make any other change in these notices Once this change is made in a given copy it is irreversible for that copy so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy This option is useful when you wish to copy part of the code of the Library into a program that is not a library 4 You may copy and distribute the Library or a portion or derivative of it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medi
141. e s Select shares in the Unpublished Shares box and click this button to share the shares with media clients Use the SHIFT key to select a range of entries Hold down the CTRL key to select multiple individual entries Published Shares This list box displays the shares that the NSA shares with the media clients Unpublish Selected Select shares in the Published Shares box and click this button to not Share s share the shares with media clients Use the SHIFT key to select a range of entries Hold down the CTRL key to select multiple individual entries Enable iTunes Server Select this option to let anyone on your network use iTunes to play music and video files in the published shares Apply Click Apply to save your changes back to the NSA Reset Click Reset to begin configuring this screen afresh 8 5 Download Service The NSA s download service downloads files from the Internet directly to the NSA You do not have to download to your computer and then copy to the NSA This can free up your computer s system resources The download service also handles your broadcatching downloads See Section 8 12 on page 105 for information on broadcatching The NSA can download using these protocols HTTP The standard protocol for web pages FTP A standard Internet file transfer service BitTorrent A popular distributed peer to peer files sharing protocol BS Do not use the NSA for illegal purposes I
142. e terms and conditions of this License each Contributor hereby grants to You a perpetual worldwide non exclusive no charge royalty free irrevocable copyright license to reproduce prepare Derivative Works of publicly display publicly perform sublicense and distribute the Work and such Derivative Works in Source or Object form 3 Grant of Patent License Subject to the terms and conditions of this License each Contributor hereby grants to You a perpetual worldwide non exclusive no charge royalty free irrevocable except as stated in this section patent license to make have made use offer to sell import and otherwise transfer the Work where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution s alone or by combination of their Contribution s with the Work to which such Contribution s was submitted If You institute patent litigation against any entity including a cross claim or counterclaim in a lawsuit alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed 4 Redistribution You may reproduce and distribute copies of the Work or Derivative Works hereof in any medium with or without modifications and in Source or Object form provided that You meet t
143. e the configuration settings of an entry iit Click the Delete icon to delete an entry from the list NSA 220 User s Guide Chapter 2 Web Configurator Basics Table 11 Common Configuration Screen Icons continued ICON DESCRIPTION Click the Edit icon to jump to related item s configuration screen This is a user icon See the chapter on user accounts for detailed information on variants of this icon This is a share icon See the chapter on shares for detailed information on variants of this icon This icon represents a Healthy volume This icon represents a Degraded RAID 1 volume Replace the faulty disk If the replacement disk does not contain a volume the NSA automatically restores the volume If the replacement disk already contains a volume you need to delete the volume and then click the Repair icon to fix the degraded RAID volume This icon represents a Down volume Click the Initialize icon to create a volume Click the Scan Disk icon to scan a hard disk for file system errors Click the Eject icon before you remove an external hard drive so that you do not lose data that is being transferred to or from that hard drive Click the Locate icon to cause the LED on the external storage device to blink If you replace a faulty disk with a disk that contains a volume you need to delete the volume and then click the Repair icon to fix the degraded RAID volume m
144. e the screen as follows and write down the username and password to give to Jimmy If the username and password are the same as Jimmy s Windows login Jimmy will not need to enter a username and password when he logs into his share from his computer Set the Account Type to User so Jimmy doesn t get to configure the whole NSA Click Apply to create the account Figure 19 Users gt Create Example New User Information Account Name Jimmy Password p Password Confirm p Account Type C Administrator c user Note With an administrator account you can Create Change and Delete accounts make system wide changes 4 The account now displays in the Users screen Figure 20 Users Account Created tr Users Users d ACCOUNT a e a gt Account Type admin bob Jimmy i gt Used Space Now that Bob has created Jimmy s account he can go through the steps again to create another account for Kevin After both accounts are created he can go to Section 3 1 2 on page 47 to create shares for Jimmy and Kevin NSA 220 User s Guide Chapter 3 Tutorials 3 1 2 Creating a Share Suppose Bob has already created separate accounts for his sons Jimmy and Kevin Now Bob wants to create a share for each son He also wants to make sure that each son can only access his own share to keep them from deleting each other s files This is how he would do it 1 In the NSA s administration
145. eck box and type a metric in Metric Click Add Repeat the previous three steps for each default gateway you want to add Click OK when finished NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 108 Windows XP Advanced TCP IP Properties Advanced TCP IP Settings IP Settings DNS WINS Options IP addresses IP address Subnet mask DHCP Enabled Default gateways Gateway Metric Automatic metric 7 Inthe Internet Protocol TCP IP Properties window the General tab in Windows XP Click Obtain DNS server address automatically if you do not know your DNS server IP address es f you know your DNS server IP address es click Use the following DNS server addresses and type them in the Preferred DNS server and Alternate DNS server fields If you have previously configured DNS servers click Advanced and then the DNS tab to order them NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 109 Windows XP Internet Protocol TCP IP Properties Internet Protocol TCP IP Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings btain an IP address automatically Use the following IP address Obtain DNS server address automatically C Use the following DN
146. ection is OK Apply Click Apply to save your TCP IP configurations After you click Apply the NSA restarts Wait until you see the Login screen or until the NSA fully boots and then use the NDU to rediscover it Reset Click Reset to begin configuring this screen afresh NSA 220 User s Guide Application Screens This chapter discusses the application screens 8 1 Application Screens Use the application screens to Configure settings for FTP file transfers to from the NSA See Section 8 2 on page 89 Share files with media clients See Section 8 3 on page 90 Download files from the Internet See Section 8 5 on page 93 Download frequently updated digital content like TV programs radio talk shows Podcasts audio files and blogs See Section 8 12 on page 105 Share a printer See Section 8 15 on page 109 8 2 FTP Access for NSA Files Use FTP to upload files to the NSA and download files from the NSA Click Applications gt FTP to open the following screen Use this screen to Enable or disable FTP Set a connection limit Set an idle timeout Enable or disable anonymous FTP access Specify a character set to use File Transfer Protocol FTP is a file transfer service that operates on the Internet A system running the FTP server accepts commands from a system running an FTP client FTP is not a secure protocol Your file transfers could be subject to snooping NSA 220 User s Guide Chap
147. ed against such Contributor by reason of your accepting any such warranty or additional liability END OF TERMS AND CONDITIONS Version 1 1 Copyright c 1999 2003 The Apache Software Foundation All rights reserved NSA 220 User s Guide Appendix D Open Source Licences Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution The end user documentation included with the redistribution if any must include the following acknowledgment This product includes software developed by the Apache Software Foundation http www apache org Alternately this acknowledgment may appear in the software itself if and wherever such third party acknowledgments normally appear The names Apache and Apache Software Foundation must not be used to endorse or promote products derived from this software without prior written permission For written permission please contact apache apache org Products derived from this software may not be called Apache nor may Apache appear in their name without prior writ
148. een is the first advanced administration screen that displays NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 15 Status Lencuece Se 2 6 6 SP Status 9 System Information Server Name nsa220 2 system Setting Model Name NSA 220 l ge Nane Firmware Version V2 10 AFB 0 b2 F MAC Address 00 13 49 FB 99 16 OBEN Media Server Status Enabled Storage FTP Server Status Enabled Network Web Publishing Status Disabled L TCP IP Applications EIRE 9 volume Status Media Server Download Service Internal Volume I Web Publishing pesto dea status name configuration visk s disk usage Print Server Users 8 Be E reco m 66 09 MB Shares 1DisldBODvolume jag A 111 66 GB Total 100 Free Maintenance JBOD Log Configuration External Volume Rien status Name Filesystem Diskes disk Usage Shutdown Logout 7 li 127 31 66 E MB Used EUSB FLASH DRIVE 34CB1 fat32 usB1 Healthy 244 01 MB Total 88 Free diski Active Sessions WETUUUEINETTTT NETTE RECTO YN Web admin 2007 11 21 14 13 19 272 23 34 113 Web admin 2007 11 21 14 14 54 172 23 37 113 Web admin 2007 11 21 14 22 57 172 23 37 113 Web admin 2007 11 21 14 19 28 172 23 37 113 public pc guest 2007 11 21 14 21 10 172 23 37 113 public pc guest 2007 11 21 14 20 13 172 23 37 113 public pc quest 2007 11 21
149. en in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 11 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS
150. ent to show the screen below Select the check boxes as shown in the following screen Figure 130 Mozilla Firefox Content Security x ld d amp amp Main Tabs Feeds Privacy Security Advanced w Block pop up windows Exceptions IV Load images automatically Exceptions v Enable JavaScript Advanced IV Enable Java r Fonts amp Colors Default Font Times New Roman Size 16 v Advanced Colors r File Types Configure how Firefox handles certain types of Files Manage HT NSA 220 User s Guide Appendix B Pop up Windows JavaScripts and Java Permissions NSA 220 User s Guide Common Services The following table lists some commonly used services and their associated protocols and port numbers For a comprehensive list of port numbers ICMP type code numbers and services visit the IANA Internet Assigned Number Authority web site Name This is a short descriptive name for the service You can use this one or create a different one if you like Protocol This is the type of IP protocol used by the service If this is TCP UDP then the service uses the same port number with TCP and UDP If this is USER DEFINED the Port s is the IP protocol number not the port number Port s This value depends on the Protocol Please refer to RFC 1700 for further information about port numbers f the Protocol is TCP UDP or TCP UDP this is the I
151. er Section 6 1 For legal entities You includes any entity which controls is controlled by or is under common control with You For purposes of this definition control means a the power direct or indirect to cause the direction or management of such entity whether by contract or otherwise or b ownership of more than fifty percent 50 of the outstanding shares or beneficial ownership of such entity 2 Source Code License 2 1 The Initial Developer Grant NSA 220 User s Guide Appendix D Open Source Licences The Initial Developer hereby grants You a world wide royalty free non exclusive license subject to third party intellectual property claims under intellectual property rights other than patent or trademark Licensable by Initial Developer to use reproduce modify display perform sublicense and distribute the Original Code or portions thereof with or without Modifications and or as part of a Larger Work and under Patents Claims infringed by the making using or selling of Original Code to make have made use practice sell and offer for sale and or otherwise dispose of the Original Code or portions thereof the licenses granted in this Section 2 1 a and b are effective on the date Initial Developer first distributes Original Code under the terms of this License Notwithstanding Section 2 1 b above no patent license is granted 1 for code that You delete from the Original Code 2 separ
152. files to the share Select the check box at the top of the column to give all of the users full access to NSA 220 User s Guide the share Chapter 2 Web Configurator Basics Table 7 My NSA Change Share Properties continued LABEL DESCRIPTION Read Only This appears when you set the Share Access to Advanced Select this column s radio button in a user account s row to give the user read only access to the share This allows the user to view or copy files in the share but not delete files in the share or save files to the share Select the check box at the top of the column to give all of the users read only access to the share Deny This appears when you set the Share Access to Advanced Select this column s radio button in a user account s row to stop the user from accessing the share This means the user cannot read files in the share delete files in the share or save files to the share Select the check box at the top of the column to stop all of the users from accessing the share Note Selecting the check box at the top of the column blocks everyone including the administrator from accessing the share Apply Click this button to save your changes back to the NSA Cancel Click this button to leave this screen without saving your changes 2 5 5 Share and Folder Names The name can only contain the following characters Alphanumeric A z 0 9 and Unicode The NSA allows FTP a
153. ge the NSA Create volumes shares and user accounts Assign individual users specific access rights for specific shares Users are people who have access rights to the NSA and can store files there for later retrieval A user can Manage shares that he owns Change his own password Access the contents of other shares to which he is given access rights 9 2 Users Overview Screen Click Users to display the screen shown next Use this screen to create and manage accounts for users who can store files on the NSA Figure 84 Users ss Users Users i 8 5 a gt Account Type User admin bob Jimmy Kevin gt Used Space 0 00 Bytes g Change Account Properties T Delete Account NSA 220 User s Guide 115 Chapter 9 Users The following table describes the labels in this screen Table 34 Users LABEL DESCRIPTION Users Add Account Click this button to open a screen where you can configure a new user account This screen lists the users configured on the NSA Click a user icon to see details about the user Administrator account icons are green User account icons are blue Account Type This field displays whether the selected account is an administrator account or a user account Used Space This field displays how much storage space the selected account is currently using This only applies for files that the user saved onto the NSA while logged in with that userna
154. gh Tutorial 13 C 26 31 John Arnold Photowalkthi 5 Another way to get the NSA s iTunes server function to scan the published media server folders for files is to go to Applications Media Server and disable and re enable the iTunes server option If you uploaded many files it may take awhile for the NSA to find and list all of them Then try reconnecting your iTunes client e cannot use iTunes to play files located on my NSA NSA 220 User s Guide Chapter 15 Troubleshooting 1 Make sure the files are a format supported by iTunes See Section 16 5 on page 160 2 If you have files from the iTunes Store that use DRM you need to use your Apple account ID and password to authorize other computers to play the files Apple permits you to authorize up to five computers at a time To authorize a computer open iTunes and click Store Authorize Computer 3 Ifyou are connecting through a NAT router make sure that TCP port 3689 and UDP port 5353 are open for traffic on both the server and the client and all points in between especially the NAT router If your router includes a firewall make sure it also allows TCP port 3689 and UDP port 5353 traffic 15 8 Download Service and Broadcatching Functions The download list or broadcatching items are missing after removed a hard drive The NSA s download and broadcatching lists are stored on the system volume If you have two JBOD volumes it is possible to
155. hall mean the copyright owner or entity authorized by the copyright owner that is granting the License Legal Entity shall mean the union of the acting entity and all other entities that control are controlled by or are under common control with that entity For the purposes of this definition control means i the power direct or indirect to cause the direction or management of such entity whether by contract or otherwise or ii ownership of fifty percent 50 or more of the outstanding shares or iii beneficial ownership of such entity You or Your shall mean an individual or Legal Entity exercising permissions granted by this License Source form shall mean the preferred form for making modifications including but not limited to software source code documentation source and configuration files Object form shall mean any form resulting from mechanical transformation or translation of a Source form including but not limited to compiled object code generated documentation and conversions to other media types Work shall mean the work of authorship whether in Source or Object form made available under the License as indicated by a copyright notice that is included in or attached to the work NSA 220 User s Guide an example is provided in the Appendix below Appendix D Open Source Licences Derivative Works shall mean any work whether in Source or Object form that is based on
156. hares gt Create Example Create a New Share Share Name Jimmy volume 1DiskJBOD volume 111 Path Jimmy IT Browse Make this share owned by admin ix Publish this share to Media p gt Server Publish this share to Web Share Access Advanced x a Jimmy Lol C e Kevin cC C o Admin e zl Now that Bob has created Jimmy s share he can go through the steps again to create another share for Kevin Then he can see the rest of the tutorials for how to use the shares 3 1 3 Accessing a Share From Windows Explorer If you map a NSA share where data is stored to a Windows network drive you can use Windows Explorer to transfer files to and from the NSA as if it was another folder on your computer Here he maps Jimmy s share to Jimmy s computer 1 Start Windows Explorer and go to the NSA s server name nsa220 is the default or IP address 2 click Tools Map Network Drive Figure 26 NSA Top Level File Edit View Favorites Tools Help se Back gt v t Ase Map Network Drive Address 3n verezm Folders ies Desktop E My Documents 3 Select the network drive that you want to map the NSA to from the Drive list box This example uses I Then browse to and select the share on the NSA Click Finish Figure 27 Map Network Drive Map Network Drive x A1 xi Windows can help you connect to a share
157. he NSA s USB port and reconnect it If that does not work disconnect the USB port and turn off the printer s power Then reconnect the printer and turn it back on 8 17 Print Server Rename Click Applications gt Print Server and a printer s Rename icon to open the following screen Use this screen to change the name the NSA uses for the printer Figure 83 Applications gt Print Server gt Rename Name Note Only alphanumeric characters and underscore _ are acceptable limit 15 characters The following table describes the labels in this screen Table 33 Applications gt Print Server gt Rename LABEL DESCRIPTION Name Type a new name to identify the printer The name must be unique from all the other names of printers connected to the NSA NSA 220 User s Guide Chapter 8 Application Screens Table 33 Applications Print Server Rename LABEL DESCRIPTION Apply Click Apply to save your changes back to the NSA Cancel Click Cancel to close this screen without saving your changes NSA 220 User s Guide ul Chapter 8 Application Screens 112 NSA 220 User s Guide PART III User Accounts and Shares Users This chapter introduces the Users screens of the NSA 9 1 User Accounts Introduction Use the Users screens to create and manage administrator and user accounts Administrators can Configure and mana
158. he following conditions a You must give any other recipients of the Work or Derivative Works a copy of this License and b You must cause any modified files to carry prominent notices stating that You changed the files and c You must retain in the Source form of any Derivative Works that You distribute all copyright patent trademark and attribution notices from the Source form of the Work excluding those notices that do not pertain to any part of the Derivative Works and d If the Work includes a NOTICE text file as part of its distribution then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file excluding those notices that do not pertain to any part of the Derivative Works in at least one of the following places within a NOTICE text file NSA 220 User s Guide Appendix D Open Source Licences distributed as part of the Derivative Works within the Source form or documentation if provided along with the Derivative Works or within a display generated by the Derivative Works if and wherever such third party notices normally appear The contents of the NOTICE file are for informational purposes only and do not modify the License You may add Your own attribution notices within Derivative Works that You distribute alongside or as an addendum to the NOTICE text from the Work provided that such additional attribution notices cannot be
159. he terms of the Sections above b Give prominent notice with the combined library of the fact that part of it is a work based on the Library and explaining where to find the accompanying uncombined form of the same work 8 You may not copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 9 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Library or works based on it 10 Each time you redistribute the Library or any work based on the Library the recipient automatically receives a license from the original licensor to copy distribute link with or modify the Library subject to these terms and conditions You may not impose any further restriction
160. he user has already received a copy of these materials or that you have already sent this user a copy For an executable the NSA 220 User s Guide Appendix D Open Source Licences required form of the work that uses the Library must include any data and utility programs needed for reproducing the executable from it However as a special exception the materials to be distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered by this License and distribute such a combined library provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided that you do these two things a Accompany the combined library with a copy of the same work based on the Library uncombined with any other library facilities This must be distributed under t
161. hile using Internet Explorer Use Section 15 3 2 on page 147 to enable the scripting of safe ActiveX controls 15 4 Cannot Access The NSA 2 cannot access a share NSA 220 User s Guide Chapter 15 Troubleshooting Check that the NSA is turned on and connected to the network Try to ping the NSA or use the NDU to discover it Check that you entered your login name and password correctly Check that the share exists and check its access settings Check if the shared folder is a subfolder of another parent share Check that the parent share s access rights do not conflict with the subfolder share It is recommended that you do not create subfolder shares Check if there are any existing mapped network drives to the NSA You may need to disconnect existing mapped network drives as a new mapped network drive connection may use different previously saved login information To do this open Windows Explorer and click Tools Disconnect Mapped Network Drives Check that the volume in which the share resides exists and is not down or degraded If it is down or degraded see Section 15 2 on page 143 Make sure you have the client for Microsoft networks installed and enabled in your network connection s properties n Windows XP or 2000 click Start Settings Control Panel Network Connections Network and Dial up Connections in Windows 2000 NT Local Area Connection Properties Check that Client fo
162. i A E odd eb Cub UK ERA 151 Figure 100 Windows 95 98 Me Network Configuration cseccssceeceeeeceseeneeeneeeeneeeeeeteeeteeeeeseeteaees 166 Figure 101 Windows 95 98 Me TCP IP Properties IP Address eee 167 Figure 102 Windows 95 98 Me TCP IP Properties DNS Configuration eessesss 168 Figure 103 Windows XP Slant e 169 Figure 104 Windows SP Control PANEL sisinsdiran i EASES 169 Figure 105 Windows XP Control Panel Network Connections Properties ssssssss 170 Figure 106 Windows XP Local Area Connection Properties eese 170 Figure 107 Windows XP Internet Protocol TCP IP Properties ssssseeeeeneen 171 Figure 108 Windows XP Advanced TCP IP Properties ci cssictcscccsescesestonelacedsisereiavasenestoniastecesgnemsedons 172 Figure 109 Windows XP Internet Protocol TCP IP Properties eseeeseeeeeen 173 Figure 110 Macintosh OS x Apple Magma 2dsupecesec uio peces evene bota dob nte ad SE oe eut d Une id dus rT dais on n Ride EY DH 174 Figure 117 Macintosh OS X NeuMQUR uiieicenoeiccc tnt pecu ii etre Rar lec Eee RaR rate tM vb teset ue Pott odori ades eee fuus 174 Figure 112 Red Hat 9 0 KDE Network Configuration Devices eee 175 Figure 113 Red Hat 9 0 KDE Ethernet Device General sseesssssssssseeeeeeennnenn 176 Figure 114 Red Hat 9 0 KDE
163. ia CIFS or FTP The path should start with a forward slash followed by a parent folder child folders leading to the folder that is to be shared The share path can include all characters including unicode characters that is you can use Chinese folder names for example except for the following characters backslash this will be converted to forward slash and interpreted as a path delimiter forward slash this is always interpreted as a path delimiter so a folder cannot include it in its folder name colon asterisk question mark double quote less than gt greater than pipe Please also note the following as regards share paths If the share path is missing the root path slash the first forward slash the system will automatically add the initial slash If the share path is missing the end trailing slash the system will automatically add the trailing slash If the share path has V backslashes instead of forward slashes they will all be automatically converted to forward slashes Share paths are case sensitive The maximum share path length is 600 characters the entire path string including slashes The share path cannot be blank You cannot have an empty folder name that is two consecutive slashes for example My Corner Each individual folder in the path that is the content between the slashes cannot exceed 255 characters 2 5 7 Password Screen Click Passwor
164. ial Use broadcatching to have the NSA download frequently updated digital content like TV programs radio talk shows Podcasts audio files and blogs This example shows how to subscribe the NSA to the CNET TV Internet television channel See Section 8 12 on page 105 for more on the broadcatching service 1 Open your Internet browser this example uses Firefox 1 Find the link for the RSS feed containing the channel you want to add In this example http reviews cnet com 4520 11455_7 6333605 1 html has an RSS link for subscribing to the CNET Live podcast However this is not the link for the actual RSS feed Click the link to go to another screen that has RSS feed links Figure 42 Broadcatching Link Example CNET Podcast Central CNET com Mozilla Firefox File Edit View History Bookmarks Tools Help E ua e fh o http reviews cnet com 4520 11455 7 6333605 1 html x We wiki W wikipedia Xi Tw zywaLL 1050 Altavista Babel Fish G Google gt View profile RSS All Audio Podcasts CNET LIVE RSSI All Video Podcasts SUBSCRIBE NOW subscribe to this podcast using an SS reader other than iTunes CNET live features hosts Brian Cooley and Tom Merritt sharing their expertise and having fun doing it The two tech experts take calls emails and video questions in order to help viewers get the most out of their technology The show also features regular segments like Insider Secrets Free Do
165. if JPEG jpeg jpg PNG png TIFF tiff tif Files may be converted to JPEG to allow play back on client applications that do not support the original file formats BS Not all published file types can be viewed by all client applications 16 5 Supported iTunes Server Content Formats At the time of writing the NSA s iTunes server can publish AAC MPEG 4 MP3 AIFF WAV and Apple Lossless files 16 6 Power Consumption The NSA was tested using the specified power sources with the external power adapter and with two hard drives installed NSA 220 User s Guide Chapter 16 Product Specifications This table is a laboratory test of NSA power consumption for your reference only Table 57 Power Consumption in Watts W POWER SOURCE SYSTEM BOOT UP SYSTEM READ WRITE SYSTEM IDLE 240V 50Hz 58 14W 31 2W 23 9W 120V 60Hz 57 76W 29 3W 25 1W 100V 60Hz 58 14W 30 0W 25 1W 16 7 Compatible Hard Disks The following hard disks have been tested and are known to be compatible with the NSA Table 58 Compatible Hard Disks BRAND MODEL CAPACITY INTERFACE Western Digital WD1600JS 160 GB SATA 3 0 Gbit s Seagate ST3200827AS 200 GB SATA 3 0 Gbit s Seagate ST3320820AS 320 GB SATA 3 0 Gbit s Seagate ST3500830AS 500 GB SATA 3 0 Gbit s Western Digital WD800 80 GB SATA I Seagate ST3160023AS 160 GB SATA I Hitachi HDS722516
166. if such party shall have been informed of the possibility of such damages This limitation of liability shall not apply to liability for death or personal injury resulting from such party s negligence to the extent applicable law prohibits such limitation Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages so this exclusion and limitation may not apply to you 10 U S government end users The Covered Code is a commercial item as that term is defined in 48 C F R 2 101 Oct 1995 consisting of commercial computer software and commercial computer software documentation as such terms are used in 48 C F R 12 212 Sept 1995 Consistent with 48 C ER 12 212 and 48 C F R 227 7202 1 through 227 7202 4 June 1995 all U S Government End Users acquire Covered Code with only those rights set forth herein 11 Miscellaneous This License represents the complete agreement concerning subject matter hereof If any provision of this License is held to be unenforceable such provision shall be reformed only to the extent necessary to make it enforceable This License shall be governed by California law provisions except to the extent applicable law if any provides otherwise excluding its conflict of law provisions With respect to disputes in which at least one party is a citizen of or an entity chartered or registered to do business in the United States of America any litigation relating
167. iguration LABEL DESCRIPTION Backup Current Configuration Settings Backup Click Backup to save the current configuration of the NSA to your computer A pop up screen appears asking you to confirm Click OK to continue or Cancel to quit Restore Configuration After you restore a configuration if a share path does not exist then it appears be in red Browse Click Browse to locate a previously saved configuration file Restore Click Restore to load the previously saved configuration file to the NSA This replaces your current NSA configuration settings with the settings in the previously saved configuration file A pop up screen appears asking you to confirm Click OK to continue or Cancel to quit 11 7 Firmware Upgrade Click the Maintenance link in the Navigation panel and then click the FW Upgrade link or the FW Upgrade tab to access the Maintenance FW Upgrade screen Use this screen to upgrade the NSA firmware You should first have downloaded the latest firmware files from the ZyXEL website NSA 220 User s Guide Chapter 11 Maintenance Screens Figure 92 Maintenance gt FW Upgrade ss Maintenance FW Upgrade Firmware Upgrade To upgrade the firmware browse to the location of the binary BIN upgrade file and click Upload Upgrade files can be downloaded from the website If the upgrade file is compressed ZIP file you must first extract the binary BIN file In
168. igure 62 System gt Storage gt Create an External Volume Disk Configuration Volume Name Available Disk s 7 File System FAT32 z The following table describes the labels in this screen Table 19 System gt Storage gt Create an External Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters The name cannot be the same as another existing external volume Acceptable characters are all alphanumeric characters and spaces underscores and periods The first character must be alphanumeric A Z 0 9 The last character cannot be a space Available Disk s Select the external USB device upon which you want to create the volume File System Select the file system you want the new volume to use Windows file systems FAT32 Newer and more efficient than FAT16 Supports a volume size of up to 2 TB Tera Bytes and individual file sizes of up to 4 GB FAT16 Compatible with older Windows operating systems Supports volume and file sizes of up to 2 GB Linux file systems EXT2 Older file system EXT3 The same as EXT2 but adds a journaled file system and is more robust ReiserFS Offers better performance for small files Apply Click this button to save your changes back to the NSA and create the volume Cancel Click this button to exit this screen without saving changes 6 8 External Disks You may co
169. in your license except to note that your license differs from this License and b otherwise make it clear that Your version of the license contains terms which differ from the Mozilla Public License and Netscape Public License Filling in the name of the Initial Developer Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License 7 Disclaimer of warranty Covered code is provided under this license on an as is basis without warranty of any kind either expressed or implied including without limitation warranties that the covered code is free of defects merchantable fit for a particular purpose or non infringing The entire risk as to the quality and performance of the covered code is with you Should any covered code prove defective in any respect you not the initial developer or any other contributor assume the cost of any necessary servicing repair or correction This disclaimer of warranty constitutes an essential part of this license No use of any covered code is authorized hereunder except under this disclaimer 8 Termination 8 1 This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach All sublicenses to the Covered Code which are properly granted shall survive any termination of this License Provisions which b
170. internal hard drives or external USB devices that you can access but not manage 2 5 1 My NSA Share Browsing Screen Click My NSA and then click a share to open the following screen Use the My NSA share browsing screens to see and access share contents Click a folder s name to go into the folder Click a file s name to be able to save the file to your computer Click the play icon to play the file At the time of writing this is supported for MP3 files Click to the right of a file or folder name to select it Use the SHIFT key to select a range of entries Hold down the CTRL key to select multiple individual entries Figure 10 My NSA Share Browsing Share Browsing Current location public 2 Name Size A 2007 11 21 14 16 55 BP dmap Bjpg 020 52 KB E imgp2005 jpg 0 2007 11 21 14 25 50 1 10 MB 2007 11 21 14 24 43 NSA 220 User s Guide Chapter 2 Web Configurator Basics The following table describes the labels in this screen Table 4 My NSA Share Browsing LABEL DESCRIPTION Current location This is the name of the share and folder path that you are in Move to Select a folder or file and click this button to move it to another location within this share or another share that you can access Copy to Select a folder or file and click this button to move create a copy of it in another location within this share or another share that you can access
171. ipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that re distributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION NSA 220 User s Guide Appendix D Open Source Licences 0 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a Work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the P
172. is button for the NSA to retrieve the correct time from the configured time server right away Time Server Address Select a time server from the drop down list box or select Specify my own time server and enter the time server you wish to use in the field below Check with your ISP network administrator if you are unsure of this information Time Zone Time Zone Choose the time zone of your location This will set the time difference between your time zone and Greenwich Mean Time GMT Enable Daylight Saving Daylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening Select this option if you use Daylight Saving Time Start Date Configure the day and time when Daylight Saving Time starts if you selected Enable Daylight Saving The hour field uses the 24 hour format Here are a couple of examples Daylight Saving Time starts in most parts of the United States on the second Sunday of March Each time zone in the United States starts using Daylight Saving Time at 2 A M local time So in the United States you would use March Second Sunday at 2 00 Daylight Saving Time starts in the European Union on the last Sunday of March All of the time zones in the European Union start using Daylight Saving Time at the same moment 1 A M GMT or UTC So in the European Union you would select March Last S
173. is setting applies to all FTP client connections to the NSA It does not affect your Windows CIFS connections it will not correct the character display in Windows Explorer Apply Click Apply to save your changes back to the NSA Reset Click Reset to begin configuring this screen afresh 8 3 Sharing Media Files on Your Network The media server feature lets anyone on your network play video music and photos from the NSA without having to copy them to another computer The NSA can function as a DLNA compliant media server and or an iTunes server The NSA streams files to DLNA compliant media clients or computers using iTunes The Digital Living Network Alliance DLNA is a group of personal computer and electronics companies that works to make products compatible in a home network Publish shares to let others play the contained media files NSA 220 User s Guide Chapter 8 Application Screens The media server is a convenient way to share files you download using the broadcatching service see Chapter 8 on page 105 Media client software is included on the CD e Hardware based media clients like the DM A 1000 can also play the files See Appendix on page 160 for the supported multimedia file formats BS Anyone on your network can play the media files in the published shares No user name and password or other form of security is used The media server is enabled by default with the video photo and
174. itasioH dep d Teme MUN n Er re Ru ad b n Mte bh terre Terre 82 aie era RAD eR RR NI RI T 82 693 RAD T e 83 0 24 RAID and Data Precio sersa nad a vr poc p a Pon Up X praua e ROGER hd 83 Chapter 7 NETWORK SOGE fe 85 Ld Melo S SIUS ceptus tie PpSphRE Me Dd tp tid ddspubi irem lence bnt E 85 FUEL I o 85 FA ie ici e EE m UU T 85 Ta Jumbo FRAMES At 85 FTN Cano CRIN o aa bb DR Me dg nb a epi eap Ta C pe d Ra taa d aU RR 86 Chapter 8 idi 89 mE se enirgEe mt c TE D m rr error err E GA 89 BSFIPAbDcaSSTUPINS PB suene eee bod dete ganged a ope edi a Ee 89 8 3 Sharing Media Files on Your IMebWOoIK iua speres Lease ters nanus Eo nd dn nad 90 EC ENIM ui e 91 6 5 2 Songs and Videos from the iTunes Store Liuius esiste orn ut p x arta i a dde 92 SA Mada Sare ODORE cimi ideis pbTe E E ea inu Der ddr eniddd 92 ScdR o leac rcm 93 A08 aM O eR TUNER TTE TET 94 8 5 2 Protecting Your Network and NSA When Using BitTorrent ssassn 94 26 Downoad Serice SCE C Meena aes 96 o c PORN TI TRE qiccbnguues coi daccix x secs ud eaae aa aE Eee Dude emenda cauda KG 99 8 8 Configuring Your General Download Preferences sssssssseeeeeene 100 Reg v cemuis cp aura 101 8 9 1 Accessing Web published Shares from the Internet sesssssssss 101
175. k E SC ERR mn 5 ER Internet SEE bu Ws pMA 1000 h wm S Above is the NSA in a home network Users back up and share data on the NSA The DMA 1000 plays the NSA s media files on the TV A USB hard drive provides extra storage space and files are copied directly from the USB memory stick to the NSA NSA 220 User s Guide 25 Chapter 1 Getting to Know Your NSA BS BS Place the NSA behind a firewall and or IDP Intrusion Detection and Prevention device to protect it from attacks from the Internet See Chapter 16 on page 155 for a more detailed list of NSA features and lists of compatible hard drives and USB devices Refer to the Quick Start Guide for hardware connections and how to install and remove hard drives from the disk trays Turn off and disconnect the NSA before you install or remove internal hard drives 1 1 1 LEDs The NSA LEDs lights tell you important information Figure 2 NSA Front Panel ZyXEL Network Attached Storage NSA 220 User s Guide Chapter 1 Getting to Know Your NSA Figure 3 NSA Rear Panel TE 5060248015348 ZyXEL Communications Corporation Model Number NSA 220 aaa I 1 dpi Dems Power Rating 19VOC 342A Power Cons 385 Watt max This table describes the NSA s LEDs Table 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned on and receiving power Off
176. k C Local Disk D gj This Folder is Online 2 Compact Disc E a E There are no items to show in this ce Jimmy on 17 9 I 2 Folder H zytw on zyxel com L H E public on 172 23 37 39 2 Ej m Control Panel eR My Network Places E used 32 0 MB i fa Recycle Bin Microsoft Outlook Capacity 76 2 GB O Free 76 1 GB Now that Bob has mapped Jimmy s share to Jimmy s computer he can go through the steps again to map Kevin s share to Kevin s computer 3 1 4 Accessing a Share Using FTP You can also use FTP to access the NSA Suppose Jimmy is temporarily using a different computer and wants to access his share without mapping it to the computer This is how he would do it 1 Open the FTP client Windows Explorer is used here and type ftp username server where username is the account s username and server is the NSA s IP address or server name 50 NSA 220 User s Guide Chapter 3 Tutorials Figure 30 FTP Example Typing the FTP Target File Edit View Favorites Tools Help Back gt j Qisearch Ayrolders lt 4 ME GE X a Ea Address ftp Jimmy amp nsa220 Folders SY Library ea test C WH Library H O x6004 C3 zw 1050 Select an item to view its description i C Eng Bible Study See also a File_Maintenance Mv Documents a Global_Changes My Network Places a Global_Glossary My Computer
177. ks on the NSA 6 1 Storage Introduction Use the System Storage screens to manage volumes and disks both internal and external BS Several NSA features require a valid internal volume Volumes are storage areas on disks See Section 6 5 on page 76 for details For details on replacing internal disks see Section 6 6 on page 78 For details about external disks see Section 6 8 on page 80 6 2 Storage Overview Screen Click System Storage in the navigation panel to display the following screen Figure 58 System gt Storage Internal Volume amp Edit di Scan Em Repair f Delete Disk pisk s Capacity Actions reco ix Be d E a4 oo volumet RECD Used FA 99 Healthy S disk2 Disk Capacity eru 187 87 GB Total F JBOD T amp Edit Ej Locate Eject di Scan 0 592 00 KB 3 USB Card IntelligentStick 1 001 fati6 USB2 Used gB ES Healthy 126 91 MB Total 10095 NSA 220 User s Guide Chapter 6 Storage Screens The following table describes the labels in this screen Table 15 System gt Storage LABEL DESCRIPTION Internal External Volume These tables display information on all internal volumes created on NSA internal disk drives and external volumes created on external disk drives attached to the NSA USB ports See the volume screen for field details Create an Internal Volume
178. llegal downloading or sharing of files can result in severe civil and criminal penalties You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof ZyXEL bears NO responsibility or liability for your use of the download service feature NSA 220 User s Guide Chapter 8 Application Screens 8 5 1 BitTorrent The NSA includes a BitTorrent client for fast downloading and sharing of large files such as educational public domain videos With BitTorrent you share while you re downloading the file BitTorrent breaks up the file and distributes it in hundreds of chunks You start sharing the file as soon as you have downloaded a single chunk 8 5 1 1 Torrent Files Before using BitTorrent to download a file you must first obtain a torrent file The torrent file uses a torrent extension The torrent file has information about the file to be downloaded and shared and the computer s that coordinates the distribution of the file called the tracker Your BitTorrent client uses the torrent file to connect to the tracker to find out where to get the pieces of the file you want to download When you add a BitTorrent download task in the NSA s web configurator screens you can just copy and paste the URL of the torrent file The NSA automatically downloads the torrent file and saves it in a torrent folder located in the same folder where the NSA stores dow
179. llowing disclaimer in the documentation and or other materials provided with the distribution All advertising materials mentioning features or use of this software must display the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission For written permission please contact openssl core Q openssl org Products derived from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project Redistributions of any form whatsoever must retain the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AN
180. lly f you have a static IP address click Use the following IP Address and fill in the IP address Subnet mask and Default gateway fields Click Advanced 170 NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 107 Windows XP Internet Protocol TCP IP Properties Internet Protocol TCP IP Properties General Altemate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address Obtain DNS server address automatically Use the following DNS server addresses 6 If you do not know your gateway s IP address remove any previously installed gateways in the IP Settings tab and click OK Do one or more of the following if you want to configure additional IP addresses In the IP Settings tab in IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways In TCP IP Gateway Address type the IP address of the default gateway in Gateway To manually configure a default metric the number of transmission hops clear the Automatic metric ch
181. lt If no DHCP server is found the subnet mask defaults to 255 255 255 0 24 bits Default Username admin Default Password 1234 Dimensions 113 W 202 D 142 H mm Weight 1 5 kg without hard drives Drive Trays Two NSA 220 User s Guide Chapter 16 Product Specifications Table 53 NSA Hardware Specifications continued Compatible Hard Disks SATA and SATA 3 0 Gbit s Serial Advanced Technology Attachment compatible hard drives Maximum Storage Capacity 1 5 TB with two 750 GB hard drives installed is the largest storage capacity that has been tested as of this writing The NSA theoretically supports up to 17 6 TB per volume for a maximum possible capacity of 35 2 TB with two 17 6 TB drives configured as JBOD volumes Maximum Number of Folders Per Share The NSA s media server function can detect up to 8 000 folders within a single published share After 8 000 folders have been created new folder contents will not be added to the media server s list However you can still access the folders using Samba Ports Ethernet One auto negotiating auto MDI MDI X 10 100 10008 Mbps RJ 45 Ethernet port 1000BASE T USB v2 0 Storage Two ports on front panel Windows NTFS read only FAT32 and FAT16 Linux ReiserFS EXT2 and EXT3 LEDs PWR SYS HDD1 HDD2 COPY and LAN Operating Temperature 0 C 45 C AC Input Voltage 100 240 V at 5
182. me Change Account Click this to edit the selected account Properties Change Password Click this to edit the selected account s password Delete Account Click this to remove the selected account 9 2 1 User Icons The following table describes the user icons Table 35 User Icons ICON DESCRIPTION P The green icon is for an administrator account The blue icon is for a user account 9 3 Adding or Editing an Account Click the Add Account button in the Users screen to open the following screen Use this screen to create or edit a NSA user account with NSA access password Click the Change Account Properties button in the screen shown previously to edit an existing account Figure 85 Users gt Add or Edit an Account New User Information Account Name Password a Password cannot be empty Password Confirm mS Account Type C 4 Administrator c user q Note With an administrator account you can Create Change and Delete accounts make system wide changes 116 NSA 220 User s Guide Chapter 9 Users The following table describes the labels in this screen Table 36 Users gt Add or Edit an Account LABEL DESCRIPTION Account Name Type a name from 1 to 32 single byte no Chinese characters allowed for example ASCII characters See Section 9 3 1 on page 117 for more details on usernames Password Create a password associated with thi
183. me from 1 to 255 single byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing local share See Section 2 5 5 on page 38 for more information on share names Volume You should have already created volumes a single accessible storage area with a single file system on the NSA Select the one that contains the folder that you want to share out You cannot modify this when editing a share Path Select a folder on the NSA You can also browse see Section 10 3 on page 122 to find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators Each folder can only belong to a single share See Section 2 5 6 on page 39 for more information on share paths You cannot modify this when editing a share Make this share owned by Select the administrator or user account that is to own manage this share The share owner controls access rights to the share Publish this share to Media Server Select this option to have the NSA share files in this folder with media clients The media clients do not have to use a password to play the shares you publish Publish this share to Web Select this option to let people use a web browser to access this share s files without logging into the My NSA screens Share Access Assign access rights full read only or deny to users If you publish the share to the media server o
184. mended 6 6 2 Disk Replacement and Volume Labels BS When you create a volume the NSA writes the volume label to the disk Deleting a volume removes volume label information on its disk s It is recommended that you first delete a volume before removing its disk s If you do not want to keep the data on a disk that you will remove it is recommended that you delete the volume before you remove the disk If you remove a disk s without deleting its volume and you later put the disk s back in a different volume you may have more than one volume with the same name For example suppose you have two disks Disk A and Disk B and you create two JBOD volumes volume with Disk A and volume2 Disk B Later you remove Disk A and replace it with another disk Disk C and you re create volume1 You did not delete volumel when you removed Disk A Later you replace Disk B with Disk A Disk A still retains the volume label so at this point both Disk A and Disk C have the volume label Although you can still use the volumes you may find the naming confusing 6 7 Creating an External Volume Click the Create a New External Volume button in the Volume screen as shown in Figure 58 on page 73 to open the following screen Use this screen to create a new NSA external disk drive volume NSA 220 User s Guide 9 El Chapter 6 Storage Screens LES Creating a volume formats the drive All data on the disk will be lost F
185. mgp0571 jppg 02 Jun 2007 09 43 1 9M D imgp0572 ppg 02 Jun 2007 09 43 2 1M 5 imgp0576 jppg 02 Jun 2007 09 43 2 1M D imgp0768 jpg 08 Jul 2007 04 04 508K _ Copyright 2007 by ZyXEL Communications Corp nu joe O O wma 7 Click a file s link to open the file Right click a file s link and select Save Target As in Internet Explorer to save a copy of the file Click a label in the heading row to sort the files by that criteria To customize how the page looks and works create an index html or index htm file and store it in the share 8 12 Broadcatching Broadcatching is the downloading of digital content from Internet feeds Use broadcatching to have the NSA download frequently updated digital content like TV programs radio shows podcasts audio files and blogs NSA 220 User s Guide Chapter 8 Application Screens RSS Really Simple Syndication is a format for delivering frequently updated digital content Atthe time of writing the NSA supports RSS 2 0 feeds Websites with a feed usually display a feed icon shown next Copy and paste the feed s URL into the Applications gt Broadcatching gt Add screen and you can download new files as they are added Figure 78 Feed Icon N A channel uses a feed to deliver its contents items Subscribe the NSA to a feed to be able to download the contents 8 12 1 Channel Guides Here are some popular broadcatching channel guide web
186. miliar file transfer for Windows users 10 1 1 Share Icons These are the share icons Table 38 Share Icons ICON DESCRIPTION This represents a share on a volume on the internal hard drives Click this icon to access the share s contents The folder appears as gray if the share is not currently available because the hard drive was removed for example access the share s contents The folder appears as gray if the share is not currently available because the USB drive was removed for example E This represents a share on a volume on an external USB device Click this icon to 10 1 2 Shares Screen Click Shares in the Navigation panel to open the following screen This screen lists all of the shares NSA 220 User s Guide Chapter 10 Shares Figure 87 Shares i Shares Shares Internal Shares a video gt Share Owner admin e e ie Ee gt Share Type pre defined public video photo music admin External Shares amp change Share Properties fil Delete Share USB Card IntelligentStick 1 001 The following table describes the labels in this screen See Table 38 on page 119 for icon details Table 39 Shares LABEL DESCRIPTION Add Share Click this button to create a new share Internal Shares These are shares on the internal hard drives External Shares These are shares on the external USB devices Share Owner This is the name of the user account
187. n if the restart is successful Wait a minute before logging into the device again The following table describes the labels in this screen Table 48 Maintenance Shutdown LABEL DESCRIPTION System Shutdown Restart Click Restart to have the device perform a software restart Shutdown Click Shutdown to shut down the system and restart it again later NSA 220 User s Guide Chapter 11 Maintenance Screens When you click the Restart button a pop up screen will appear asking you to confirm Click OK to continue or Cancel to quit the restart Figure 94 Maintenance Shutdown Confirm Restart Restart system now When you click the Shutdown button a pop up screen will appear asking you to confirm Click OK to continue or Cancel to quit the shutdown Figure 95 Maintenance gt Shutdown gt Confirm Shutdown Shutdown system now NSA 220 User s Guide 133 Chapter 11 Maintenance Screens NSA 220 User s Guide Protecting Your Data This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD 12 1 Protection Methods There are a variety of ways to protect your data on the NSA Below is a summary table of what can be done in each situation Table 49 Overview of Protection Methods SITUATION ACTION Unexpected NSA behavior after configuration Back up the NSA
188. nables secure transfer of data over public networks This is the control channel PPTP TUNNEL User Defined 47 PPTP Point to Point Tunneling Protocol GRE enables secure transfer of data over public networks This is the data channel RCMD TCP 512 Remote Command Service REAL AUDIO TCP 7070 A streaming audio service that enables real time sound over the web REXEC TCP 514 Remote Execution Daemon RLOGIN TCP 513 Remote Login RTELNET TCP 107 Remote Telnet NSA 220 User s Guide Appendix C Common Services Table 59 Commonly Used Services continued NAME PROTOCOL PORT S DESCRIPTION RTSP TCP UDP 554 The Real Time Streaming media control Protocol RTSP is a remote control for multimedia on the Internet SFTP TCP 115 Simple File Transfer Protocol SMTP TCP 25 Simple Mail Transfer Protocol is the message exchange standard for the Internet SMTP enables you to move messages from one e mail server to another SNMP TCP UDP 161 Simple Network Management Program SNMP TRAPS TCP UDP 162 Traps for use with the SNMP RFC 1215 SQL NET TCP 1521 Structured Query Language is an interface to access data on many different types of database systems including mainframes midrange systems UNIX systems and network servers SSH TCP UDP 22 Secure Shell Remote Login Program STRM WORKS UDP 1558 Stream Works Protocol SYSLOG UDP 514 Syslog allows you to send system logs to a
189. net Device General screen 4 If you know your DNS server IP address es click the DNS tab in the Network Configuration screen Enter the DNS server information in the fields provided Figure 114 Red Hat 9 0 KDE Network Configuration DNS vv ERIS Configuration ie File Profile Help S amp S 5 9 New Edit Copy Delete Devices Hardware DNS Hosts y You may configure the system s hostname domain HH name servers and search domain Name servers are used to look up other hosts on the network Hostname Primary DNS Secondary DNS Tertiary DNS DNS Search Path Active Profile Common modified 5 Click the Devices tab 6 Click the Activate button to apply the changes The following screen displays Click Yes to save the changes in all screens NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 115 Red Hat 9 0 KDE Network Configuration Activate redhat config network You have made some changes in your configuration To activate the network device ethO the changes have to be saved Do you want to continue 7 After the network card restart process is complete make sure the Status is Active in the Network Configuration screen Using Configuration Files Follow the steps below to edit the network configuration files and set your computer IP address 1 Assuming that you ha
190. ngs tell you about things that could harm you or your device BS Notes tell you other important information for example other things you may need to configure or helpful tips or recommendations Syntax Conventions The NSA may be referred to as the NSA the device or the system in this User s Guide Product labels screen names field labels and field choices are all in bold font A key stroke is denoted by square brackets and uppercase text for example ENTER means the enter or return key on your keyboard Enter means for you to type one or more characters and then press the ENTER key Select or choose means for you to use one of the predefined choices A right angle bracket gt within a screen name denotes a mouse click For example Maintenance gt Log gt Log Setting means you first click Maintenance in the navigation panel then the Log sub menu and finally the Log Setting tab to get to that screen Units of measurement may denote the metric value or the scientific value For example k for kilo may denote 1000 or 1024 M for mega may denote 1000000 or 1048576 and so on e g is a shorthand for for instance and i e means that is or in other words NSA 220 User s Guide Document Conventions Icons Used in Figures Figures in this User s Guide may use the following generic icons The NSA icon is not an
191. nloaded files the admin share s download folder by default If you already have the torrent file saved on your computer you can just specify its location when adding a download task through the web configurator Another method is to use FTP or a CIFS program Windows Explorer for example to copy the torrent file into the torrent folder The torrent folder is located in the same folder where the NSA stores downloaded files the admin share s download folder by default The NSA automatically downloads and uses the torrent file After your BitTorrent download and sharing are finished you can go to the torrent folder and delete the torrent file if you need to free up hard disk space 8 5 2 Protecting Your Network and NSA When Using BitTorrent When you download using BitTorrent you reveal your IP address This increases the risk of hacking attacks which can be protected against by a good firewall 8 5 2 1 Use a Hardware based Firewall Place a hardware based firewall between your network and the Internet a software based firewall on your computer would just protect the computer itself not the NSA since your computer is not between your NSA and the Internet Ideally your firewall should have all of the following NSA 220 User s Guide Chapter 8 Application Screens Figure 68 Firewall Hacking CY Internet Malicious J Packets Viruses Stateful packet inspection to control access between the Internet
192. nnect USB storage devices that support the following file systems to the NSA e Windows File Systems NTFS FAT32 and FAT106 Linux File Systems ReiserFS EXT2 and EXT3 NSA 220 User s Guide Chapter 6 Storage Screens 6 9 RAID This section contains theoretical background on JBOD and the RAID levels used on the NSA Skip to the next section if you already understand RAID and know what storage system you want to use on the NSA Redundant Array of Independent Disks RAID is a method of storing data on multiple disks to provide a combination of greater capacity reliability and or speed JBOD Just a Bunch Of Disks is not a RAID storage method but it is included in this discussion These are some terms that you need to know in order to understand storage systems Mirroring In a RAID system using mirroring all data in the system is written simultaneously to two hard disks instead of one This provides 100 data redundancy as if one disk fails the other has the duplicated data Mirroring setups always require an even number of drives Duplexing Like in mirroring all data is duplicated onto two distinct physical hard drives but in addition it also duplicates the hardware that controls the two hard drives one of the drives would be connected to one adapter and the other to a second adapter Striping Striping is the breaking up of data and storing different data pieces on each of the drives in an array This allows faster
193. nnel s list 8 14 Adding or Editing a Broadcatching Channel Click Applications Broadcatching Add Channel to open the following screen Use the Add screen to subscribe the NSA to a channel s feed so you can view the channel You also select policies for downloading and deleting the channel s items Section 3 3 on page 56 provides a tutorial on adding a broadcatching channel Click Applications Broadcatching then select a channel and click Edit Channel to open a similar Edit screen Use the Edit screen to change the download or delete policies Figure 80 Applications Broadcatching Add Subscribe to Channel Feed Please enter the url address of the feed you want to subscribe to Download Policy Download All Items EAJ Delete Policy Manual C Keep last of items NSA 220 User s Guide Chapter 8 Application Screens The following table describes the labels in this screen Table 31 Applications gt Broadcatching gt Add LABEL DESCRIPTION Subscribe to Paste or type the URL of the feed for the channel to which you want to subscribe Channel Feed into this field This is read only in the Preferences screen Note Make sure the link goes to the actual RSS feed instead of to another list of links or information about the channel One way to test this is by clicking the link Clicking an actual RSS feed link opens a screen of XML code in
194. npublished Shares Published Shares FamilyPhotos 2 Now open your web browser and type in the address of the NSA s FamilyPhotos web page In this example the NSA s IP address is 192 168 1 33 and the name of the web published share is FamilyPhotos So you would enter http 192 168 1 33 MyWeb FamilyPhotos in your browser s address bar Then press ENTER or click Go A screen displays listing the share s files NSA 220 User s Guide Chapter 8 Application Screens Figure 77 Browsing to an NSA Share Example Z HTTP 404 Not Found Microsoft Internet Explorer 1ni xl File Edit View Favorites Tools Help e 8k Q A search Favorites QjMeda lt 4 D 2 K3 S Address hetp 192 168 1 33 MyWebjFamiyPhotas SY e Name Last modified Size LD Parent Directory 5 cimg4696 pg 17 Mar 2007 05 03 1 7M DB imgp0005 jpg 02 May 2007 04 59 383K DB imgpO0007 jpg 02 May 2007 04 59 1 0M imgpOO0ll pg 02 May 2007 04 59 1 0M imgp0060 jpg 02 May 2007 05 00 1 3M imgp0143 jpg 06 May 2007 22 15 665K D imgp147 jipg 06 May 2007 22 16 570K B imgp0226 jpg 06 May 2007 07 41 2 0M D imgp0335 jpg 13 May 2007 14 28 1 6M D imgp0348 jpg 13 May 2007 14 32 1 5M D imgp0354 jpg 13 May 2007 14 37 1 6M D imgp0365 jpg 19 May 2007 07 06 2 4M D imgp0547 jpg 02 Jun 2007 09 34 2 7M D imgp0558 jpg 08 Jul 2007 03 37 1 4M 5 imgp0566 jpg 02 Jun 2007 09 40 2 4M 5 i
195. ns there may be a special need to encourage the widest possible use of a certain library so that it becomes a de facto standard To achieve this non free programs must be allowed to use the library A more frequent case is that a free library does the same job as widely used non free libraries In this case there is little to gain by limiting the free library to free software only so we use the Lesser General Public License In other cases permission to use a particular library in non free programs enables a greater number of people to use a large body of free software For example permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library The precise terms and conditions for copying distribution and modification follow Pay close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License Agreement
196. nses please contact ZyXEL Communications Corporation at ZyXEL Technical Support End User License Agreement for NSA WARNING ZyXEL Communications Corp IS WILLING TO LICENSE THE ENCLOSED SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM IF YOU DO NOT AGREE TO THESE TERMS THEN ZyXEL INC IS UNWILLING TO LICENSE THE SOFTWARE TO YOU IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED AND YOUR MONEY WILL BE REFUNDED 1 Grant of License for Personal Use ZyXEL Communications Corp ZyXEL grants you a non exclusive non sublicense non transferable license to use the program with which this license is distributed the Software including any documentation files accompanying the Software Documentation for internal business use only for up to the number of users specified in sales order and invoice You have the right to make one backup copy of the Software and Documentation solely for archival back up or disaster recovery purposes You shall not exceed the scope of the license granted hereunder Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL and all implied licenses are disclaimed 2 Ownership You have no ownership rights in the Software Rather yo
197. nt 10 items 9 Click Apply Figure 47 Broadcatching Tutorial Apply Pasted Link lios ShareDaint and Rui fio Subscribe to Channel Feed Itc f i Please enter the url address of the feed you want to subscribe to E http feeds feedbumer com cnet cnetlive formatzxml n e s Download Policy p i c Delete Policy t C Manual el Keep last 10 of items pp n Cancel z D rie we row eo mins gua qve oem E Bm E 10 After a few moments the channel appears in the Broadcatching screen where you can select items you want to download The NSA saves the items you download in a folder named after the channel By default the channel folders are created in the admin share s download folder The NSA s media server feature makes it easy for users on your network to play the broadcatching files you download See Section 8 3 on page 90 for more on the media server NSA 220 User s Guide Chapter 3 Tutorials 3 4 Printer Server Tutorial Do the following to have the NSA let computers on your network share a printer See www zyxel com for a list of compatible printers 1 Make sure the NSA is on and the SYS light is on steady not blinking 2 Use a USB cable to connect the printer s USB port to one of the NSA s USB ports Make sure the printer is also connected to an appropriate power source Figure 48 Printer Sharing 3 Turn on the printer 4 The NSA detects the printer after a few momen
198. o the share Publish this share to Media Server Select this option to make the share s files available to media clients Publish this share to Web Select this option to let people use a web browser to access this share s files without logging into the My NSA screens Share Access Select who can access the files in the share and how much access they are to be given If you publish the share to the media server or the web all users will have at least read only access to the share regardless of what you configure here Select Keep it private to owner to allow only the share owner to read files in the share delete files in the share and save files to the share Select Make it public to allow anyone with or without a user account on the NSA to read files in the share delete files in the share and save files to the share Select Advanced to select which individual users can read the share s files which users can delete the share s files and which users are blocked from doing either Username This appears when you set the Share Access to Advanced This column lists the names of the NSA s user accounts Click Username in the heading column to reverse the sort order Full This appears when you set the Share Access to Advanced Select this column s radio button in a user account s row to give the user full access to the share This allows the user to read files in the share delete files in the share and save
199. ol HTTP 1 1 RFC 2854 History of HTML development and lists the relevant W3C World Wide Web Consortium recommendations for the text html MIME type RFC 3066 BCP 47 Best Current Practice Language tags RFC 3282 Content language headers RFC 3986 STD 66 Uniform Resource Identifier URI Generic Syntax RFC 4120 The Kerberos Network Authentication Service V5 RFC 4248 The telnet URI Scheme RFC 793 STD 7 Transmission Control Protocol RFC 959 STD 9 File Transfer Protocol SATA SATA and SATA 3 0 Gbit s Serial Advanced Technology Attachment compatible hard drives SATA 3 0 Gbit s UPnP USB 2 0 USB Universal Serial Bus version 2 0 allows for interfacing devices with data transfers rates of up to 480 Mbps XHTML 1 0 Extensible HyperText Markup Language Second Edition XHTML 1 1 Module based XHTML NSA 220 User s Guide Chapter 16 Product Specifications 16 4 Supported Media Server Content Formats The following describes the details about the files that the NSA media server can publish Table 56 Supported Media Server Content Formats CATEGORY FILE TYPE EXTENSION Video MPEG 1 MPEG 2 m2p mpe mpeg mpg vob Windows Media Video asf wmv AVI avi DivX divx avi DVR MS dvr ms Music MP3 mp3 MPEG 4 AAC m4a Ogg Vorbis ogg WAVE wav Windows Media Audio wma M3U Playlist m3u Photo Bitmap bmp GIF g
200. olume For example if you originally have one disk configured at JBOD and you then install another disk and want to configure the two disks to use RAID 1 you should first back up all your data on the two disks see the Memeo Autobackup utility on the included CD and then restore your data later after you create the new volume type Below is a table that summarizes some attributes of the various RAID levels as supported on the NSA For capacity and storage efficiency S is the size of the smallest drive in the array and N is the number of drives in the array NSA 220 User s Guide Chapter 6 Storage Screens Storage efficiency assumes all drives are of identical size Performance rankings are approximations Table 18 RAID Quick Comparison RAID Level 0 1 Number of Disks 2 2 Capacity S N S N 2 Storage Efficiency 100 50 Fault Tolerance None YYYY Availability Y YYYY Read Performance YYYY YYY Write Performance YYYY YYY 6 5 1 Choosing A Storage Method For a Volume The following is a guide to help you choose a storage method for the various number of disks supported on the NSA See Section 6 9 on page 81 for theoretical background on JBOD and the RAID levels used on the NSA Typical applications for each method are also shown there 6 5 1 1 One Disk If you only have one disk you must use JBOD All disk space is used for your data none is used for backup If the disk fails
201. olume If it s degraded then file transfer to from the shares in the degraded volume will be slower There is no explicit message from CIFS that tells users their volume is degraded or down 6 6 Disk Replacement Restrictions See the Quick Start Guide for information on replacing disks in the NSA When replacing a disk in a degraded or down RAID volume the new disk must be at least the same size or bigger than the other disks that are already in the RAID volume so as all data in the volume can be restored For example if you have RAID with 250 GB disks you must put in a 250 GB or bigger disk as a replacement in order to restore all original data in that volume If you put a bigger disk the extra space on the disk will not be used The NSA repairs a RAID volume automatically when you replace a faulty disk with a disk that does not contain a volume NSA 220 User s Guide Chapter 6 Storage Screens 6 6 1 Resychronizing or Recovering a RAID 1 Volume BS BS Resychronizing or recovering a RAID 1 volume that was down is done block by block so the time it takes depends more on the size of your hard drive s than the amount of data you have on them Do not restart the NSA while the NSA is resychronizing or recovering a volume as this will cause the synchronization to begin again after the NSA fully reboots You can access data on a RAID volume while it is resychronizing or recovering but it is not recom
202. omputer You may need to get the file from the printer s CD or the printer manufacturer s website the driver is not installed on the NSA BES You must install the printer driver on each computer that will use the printer Figure 52 Applications gt Print Server x uz Select the manufacturer and model of your printer If your printer came with y an installation disk click Have Disk If your printer is not listed consult your printer documentation for a compatible printer Manufacturers Printers AGFA AccuSet v52 3 AGFA AccuSetSF v52 3 AGFA AccuSet 800 AGFA AccuSet 8005F v52 3 AGFA AccuSet 8005F v2013 108 AGFA AccuSet 1000 AT amp T AGFA AccuSet 1000SF v52 3 xl Have Disk Cancel After the driver installation finishes the computer is ready to use the printer Select the printer in an application to use it to print Browse to the NSA using a CIFS program like Windows Explorer and double click the printer s icon to open the printer s queue of print jobs Figure 53 Printer Screen in Windows Explorer f Conon PRT Lon 192 168 12 o Printer Document View Help Document Name Status Owner Pages size Subrr NG bal NSA 220 User s Guide Chapter 3 Tutorials LES Repeat steps 5 to 8 on your other computers so they can also use the printer NSA 220 User s Guide Chapter 3 Tutorials NSA 220 User s Guide Status Screen
203. on 10 3 on page 122 to find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators Yes Click this button to move or copy the file Close Click this button to return to the My NSA share browsing screen NSA 220 User s Guide 35 Chapter 2 Web Configurator Basics 2 5 3 My NSA Management Overview Screen Use the My NSA management overview screens to see and configure share management details Click My NSA and then the Manage It button of one of your shares to open the following screen This screen displays a share s management details Figure 12 My NSA Management Overview ZyXEL 55 EH My NSA Password Administration e WAHL M M M as tenza public MOMEN w ASTOA AYME gt Share Owner gy admin gt Location no volume name gt Path i data md public E share Browsing x Change Share Properties The following table describes the labels in the this screen Table 6 My NSA Management Overview LABEL DESCRIPTION Share Owner The share belongs to and is managed by this user account The share owner controls access rights to the share Location Path The share is for a folder on this volume This is the share s file path Share Browsing Click this link to see and access the share s contents Change Share Properties Click this link to configure the share s management details 2
204. on and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution All advertising materials mentioning features or use of this software must display the following acknowledgement This product includes cryptographic software written by Eric Young eay cryptsoft com The word cryptographic can be left out if the routines from the library being used are not cryptographic related If you include any Windows specific code or a derivative thereof from the apps directory application code you must include an acknowledgement This product includes software written by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFI
205. ons 117 user password management 39 user passwords 156 user level screens 41 V volume 76 degraded 44 78 down 44 78 healthy 44 77 inactive 78 name restrictions 38 OK 78 recovering 78 resync 78 status 77 volume icon 44 volume name 64 volume status 64 W warranty 222 period 222 web browsers supported 158 web configurator 29 browsers 29 logout 32 41 web help 41 web help icon 32 web publishing 101 troubleshooting 152 Web publishing status 64 Z ZyXEL Communications Corporation 221 ZyXEL Limited Warranty Note 222 BSD 208 NSA 220 User s Guide Index NSA 220 User s Guide
206. ontact information 223 copied files folder format 28 COPY Index button 28 folder format 28 LED 28 copying files 28 copying share contents 35 copyright 41 221 customer support 223 D data storage system 64 date 70 daylight saving 72 degraded 78 degraded volume 44 delete icon 43 DHCP Dynamic Host Configuration Protocol 156 Digital Living Network Alliance DLNA 90 Digital Living Network Alliance See DLNA 137 158 disclaimer 221 disk replacement restrictions 78 disk configuration 64 disk trays 26 disk usage 64 DLNA 90 137 158 DNS server address assignment 85 Domain Name System See DNS down 78 down volume 44 download preferences 100 download service 93 download task 99 DRM Digital Rights Management 92 E edit icon 43 44 eject icon 44 EMC 157 NSA 220 User s Guide Index entry removal 43 everyone access rights 122 exiting the web configurator 32 41 external devices 34 external disks 80 external hard drive removal hard drives external 44 external hard drives 64 external shares 34 F FAT16 80 FAT32 80 faulty hard disk 44 replacement 44 FCC interference statement 221 feeds 106 file path 36 37 file storage system 157 file system errors 44 File Transfer Protocol FTP 89 finding external storage devices 44 finding the NSA 64 firewall 94 firmware specifications 157 firmware upgrade 131 firmware version 64 folder 33 name restrictions 38 folder form
207. opying manual or otherwise without the prior written permission of ZyXEL Communications Corporation Published by ZyXEL Communications Corporation All rights reserved Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patent rights of others ZyXEL further reserves the right to make changes in any products described herein without notice This publication is subject to change without notice Do not use the NSA for illegal purposes Illegal downloading or sharing of files can result in severe civil and criminal penalties You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof ZyXEL bears NO responsibility or liability for your use of the download service feature Make sure all data and programs on the NSA are also stored elsewhere ZyXEL is not responsible for any loss of or damage to any data programs or storage media resulting from the use misuse or disuse of this or any other ZyXEL product Certifications Federal Communications Commission FCC Interference Statement The device complies with Part 15 of FCC rules Operation is subject to the following two conditions This device may not cause harmful interference This device must accept any interference received including interference tha
208. ou may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allow pop up blocking and create an exception for your device s IP address Disable Pop up Blockers 1 In Internet Explorer select Tools Pop up Blocker and then select Turn Off Pop up Blocker Figure 121 Pop up Blocker Mail and News Pop up Blocker urn Off Pop up Blocker Manage Add ons Pop up Blocker Setting Synchronize f windows Update Windows Messenger Internet Options You can also check if pop up blocking is disabled in the Pop up Blocker section in the Privacy tab 1 In Internet Explorer select Tools Internet Options Privacy NSA 220 User s Guide Appendix B Pop up Windows JavaScripts and Java Permissions 2 Clear the Block pop ups check box in the Pop up Blocker section of the screen This disables any web pop up blockers you may have enabled Figure 122 Internet Options Privacy Internet Options General Security Privacy Content Connections Programs Advanced Settings Move the slider to select a privacy setting for the Internet gt zone Medium Blocks third party cookies that do not have a compact privacy policy Blocks third party cookies that use personally identifiable LC information without your implicit consent Restricts first party cookies that use personally identifiable information witho
209. owser without logging into the My NSA screens Use the SHIFT key to select a range of entries Hold down the CTRL key to select multiple individual entries Published Shares This list box displays the shares people can access using a web browser without logging into the My NSA screens Unpublish Selected Select shares in the Published Shares box and click this button to not let Share s people access using a web browser without logging into the My NSA screens Use the SHIFT key to select a range of entries Hold down the CTRL key to select multiple individual entries Apply Click Apply to save your changes back to the NSA Reset Click Reset to begin configuring this screen afresh NSA 220 User s Guide Chapter 8 Application Screens 8 11 Web Publishing Example This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the My NSA screens and shows how to access the share through the Internet 1 Click Applications Web Publishing and configure the screen as shown enable the web publishing and move FamilyPhotos over to Published Shares and click Apply Figure 76 Applications Web Publishing Example ss Applications Web Publishing Web Publishing C Disable Web Publishing Enable Web Publishing Port Number E Note The format of URL http IP Address Port Number MyWeb ShareName U
210. p net 4 Products derived from this software may not be called PHP nor may PHP appear in their name without prior written permission from group Q php net You may indicate that your software works in conjunction with PHP by saying Foo for PHP instead of calling it PHP Foo or phpfoo NSA 220 User s Guide Appendix D Open Source Licences 5 The PHP Group may publish revised and or new versions of the license from time to time Each version will be given a distinguishing version number Once covered code has been published under a particular version of the license you may always continue to use it under the terms of that version You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group No one other than the PHP Group has the right to modify the terms applicable to covered code created under this License 6 Redistributions of any form whatsoever must retain the following acknowledgment This product includes PHP freely available from lt http www php net gt THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DA
211. pixels or higher In order to use the web configurator you need to allow Web browser pop up windows from your device Web pop up blocking is enabled by default in Windows XP SP Service Pack 2 JavaScript enabled by default 2 2 Accessing the NSA Web Configurator Make sure your NSA is properly connected and that your computer is in the same subnet as the NSA refer to the Quick Start Guide or the appendices 2 2 1 Access the NSA Via NDU If you don t know the IP address of the NSA then use the NDU to find it Refer to the Quick Start Guide for how to install and run the NDU NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 4 NDU Main Screen Device List nsa220 182 168 1 34 Network Dior Aye Ajimance Local IP 192 168 1 33 C Copyright 2007 by ZyXEL Communications Corp From the NDU main page click an icon under Admin to see the web configurator screen login screen 2 2 2 Web Browser Access Open your browser and type in the server name of the NSA nsa220 is the default Figure 5 NSA URL File Edit view History Bookmarks Tools Help 2 3 Login The default username and password are admin and 1234 respectively Enter your username and password then click Login See Chapter 9 on page 115 for how to create other user accounts NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 6 NSA Login Screen ZyXEL NSA 220
212. plication Screens 8 16 Print Server Screen Click Applications gt Print Server to open the following screen Use this screen to view and manage the NSA s list of printers and print jobs Figure 82 Applications Print Server ti Applications Print Server Print Server on line Canon PRT 1 g amp ii Bf Rename Ek Cancel Job f Delete The following table describes the labels in this screen Table 32 Applications gt Print Server LABEL DESCRIPTION Refresh Click Refresh to update the list of printers and print jobs The table lists printers and their queued print jobs Click a column s heading to sort the entries by that criteria Status This fields shows whether the printer is connected and turned on on line or not off line Name This identifies the printer Each printer connected to the NSA must use a unique name Actions Rename Click this to change the name the NSA uses for the printer Cancel Job Click this to remove all print jobs from the NSA queue for a particular printer However since the NSA sends print jobs to the printer as soon as it can this button may only have an effect if there are very large or many print jobs in the queue To stop a print job that has already started you may have to turn off the printer Delete Click this to remove a printer from the NSA s printer list To add the printer back into the list disconnect the printer from t
213. pter 8 Application Screens 8 9 2 Web Publishing Port Number If the web published shares use a port number other than 80 the normal port for web traffic users must include it after the NSA s IP address in order to access the NSA s web published shares For example say you specified port 8080 the NSA s IP address is 192 168 1 23 and the name of the web published share is FamilyPhotos You would have to enter http 192 168 1 23 8080 My Web FamilyPhotos in your browser s address bar to access the share s web page The NSA s web configurator uses port 80 To make the web configurator more secure you can have the web published shares use another port number Then you can configure one set of firewall rules and NAT or port forwarding settings on your Internet gateway specifically for allowing access to the web published shares and another separate set of rules for accessing the NSA s web configurator In the following example the Internet gateway s firewall is configured to allow anyone to access the NSA s web published screens using port 8080 Web configurator access port 80 however is only allowed from IP address a b c d Figure 74 Web Publishing Port Number Example Saumas de 8080 zu Das p o X e 8080 elie mum uum m TE 80 8 10 Web Publishing Screen Click Applications Web Publishing to open the following screen Use this screen to turn web publishing on or off and sele
214. r Microsoft Networks is in the list of components and has its check box selected 15 5 External USB Drives e My external USB drive is read only If your USB drive was formatted as NTFS then it is read only on the NSA the volume status displays as OK To solve this problem re format your USB drive using the NSA or FAT or FAT32 using a computer See Chapter 6 on page 73 for information on volume creation using the NSA recommended Back up the files on your computer before you format the USB drive e The COPY LED is red Copying files from a USB device failed The USB device may not be compatible with the NSA Try save the files onto a computer and then from the computer to the NSA through the network connection NSA 220 User s Guide Chapter 15 Troubleshooting 15 6 Some Features Screens Do Not Display e Many NSA features require a valid internal volume Features like the print server download service broadcatching FTP and Windows CIFS access will not work without a valid internal volume Make sure you have a volume on an internal disk and that the volume is in the healthy state Install an internal disk if one is not installed yet or has failed See the Quick Start Guide for how to install an internal disk Create a new volume if you do not have one on the internal disk yet Make sure the volume on the installed internal disk is in the healthy state 15 7 Media Server Function
215. r the Password auusussusee Lodi se eDxodcs Gan ub oceans Aasai ananena NS 51 Foue s2 FIr Exampe Loggad I peer cT 51 Fire 25 My NSA Usar LOOT uadasensnt pe a add Pr rp ER tu en Rao on e bbb E up ob a opc CHRON 52 Figure 24 My NSA SPL auustexeccao ducebat aec da ki dac to dl eaa ERR DA dens ud saan Ld 52 Figure 35 Download Link Example 12 uescescc cce tasse ce aneppe ie cene co OERE LERue PC E RM e ELE U Mane PEL pan U DER in 53 Foue 2S Op SHONCUL anoir ed TREO d POP EYEE EE LER REED Pr bb Etc RE 54 Figure 37 Download Service Tutorial My NSA ciscccssssacsezaicceas stesgsecataicccdneseialegetdoansassetanevaceseeseeelaainensies 54 Figure 38 Download Service Tutorial Download Service sssssseseeeeeenes 54 NSA 220 User s Guide List of Figures Figure 39 Download Service Tutorial Paste Link essent 55 Figure 40 Download Service Tutorial Apply Pasted Link sssssssssseseseeneen nennt 55 Figure 41 Download Service Tutorial Download Task Added sse 55 Pagina 42 Broaccatehmng Onk BUI PSN E 56 Foue 45 Dopy Link LOCATON coostsuu teh snes REND PE Sot be tuam Erbe d dede ted vote te o LONE Pee vento MeV Ld ei ede tn beiden 57 Figure 44 Brosdostehing Tutorial My NGA uccccccesiecce nei retta adeb ra E tmn a a aa a E S 57 Figure 45 Broadcatching Tutorial Broadcatehing s issrssnsuerissiusicinsnnnssun insannin ki nacura lax aa E 58 Figure 46 Broadcatehing Tutorial
216. r the web all users will have at least read only access to the share regardless of what you configure here Keep it private to owner means only the share owner selected above can access the share Public means every user including people who do not have accounts on the NSA can access the share Advanced allows you to assign specific access rights full read only or deny to individual users Username This column lists all of the accounts configured on the NSA NSA 220 User s Guide Chapter 10 Shares Table 40 Shares Add Share or Change Share Properties continued LABEL DESCRIPTION Full Select this check box next to a user to give him or her full access read write and execute to all files contained within this share Select the check box in the heading row to select all users Read Only Select this check box next to a user to give him or her read only access they cannot modify nor execute to all files contained within this share Select the check box in the heading row to select all users Deny Select this check box next to a user to deny him or her any access they cannot read modify nor execute to all files contained within this share Select the check box in the heading row to select all users Note If you deny access to all users no one can use the share not even the administrator Apply Click this button to save your changes back to the NSA Cancel Click this bu
217. re Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its rec
218. reading and writing as it can be done simultaneously across disks Striping can be done at the byte level or in blocks Byte level striping means that the first byte of the file is sent to the first drive then the second to the second drive and so on Block level striping means that each file is split into blocks of a certain size and those are distributed to the various drives The size of the blocks used is also called the stripe size or block size Parity In mirroring 5046 of the drives in the array are reserved for duplicate data Parity is another way to allow data recovery in the event of disk failure using calculations rather than duplicating the data If you have n pieces of data parity computes an extra piece of data The n 1 pieces of data are stored on n 1 drives If you lose any one of the n 1 pieces of data you can recreate it from the n that remain regardless of which piece is lost Parity protection is used with striping and the n pieces of data are typically the blocks or bytes distributed across the drives in the array The parity information can either be stored on a separate dedicated drive or be mixed with the data across all the drives in the array BES In the following figures A1 A2 A3 and so on are blocks of data from the A file Similarly B1 B2 B3 and C1 C2 C3 ar blocks of data from the B and C files NSA 220 User s Guide Chapter 6 Storage Screens 6 9 1 JBOD
219. remove one and still use the other However if you remove the system volume you may lose the download and broadcasting lists With two JBOD volumes the hard disk that was installed first is usually the system volume 15 9 Web Publishing A web published share cannot be accessed by web browser from the Internet Make sure the person trying to access the share is using the correct web address and port number if the NSA s web publishing feature is not using port 80 See Section 8 9 2 on page 102 for details Make sure the publishing feature is turned on and the share is in the list of published shares Make sure the person trying to access the share is using Internet Explorer 6 0 and later or Firefox 1 07 and later You need to use a public address to access the NSA s web published shares from the Internet If your NSA uses a private IP address use the public IP address of your Internet gateway firewall and configure NAT or port forwarding on your Internet gateway and possibly firewall rules in order to let people access the NSA s web published shares from the Internet Make sure the firewall s public IP address is static or that the firewall uses a Dynamic Domain Name DDNS NSA 220 User s Guide Chapter 15 Troubleshooting Web publishing uses TCP protocol and the port number you specify Make sure there is not another service using TCP protocol with the same port number See Appendix C on page 187 for a list
220. ress and type your information into the IP Address and Subnet Mask fields Figure 101 Windows 95 98 Me TCP IP Properties IP Address Bindings Advanced Netpios DNS Configuration Gateway WINS Configuration IP Address An IP address can be automatically assigned to this computer If your network does not automatically assign IP addresses ask your network administrator for an address and then type it in the space below C Specify an IP address IV Detect connection to network media 3 Click the DNS Configuration tab If you do not know your DNS information select Disable DNS If you know your DNS information select Enable DNS and type the information in the fields below you may not need to fill them all in NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 102 Windows 95 98 Me TCP IP Properties DNS Configuration Bindings Advanced Netpios DNS Configuration Gateway WINS Configuration IP Address DNS Server Search Order Domain Suffix Search Order P Cancel 4 Click the Gateway tab f you do not know your gateway s IP address remove previously installed gateways If you have a gateway IP address type it in the New gateway field and click Add 5 Click OK to save and close the TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Restart your comp
221. rk not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License 202 NSA 220 User s Guide Appendix D Open Source Licences 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source co
222. rogram is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does NSA 220 User s Guide Appendix D Open Source Licences 1 You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Library or any portion of it thus forming a work based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a software library b You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change c You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License d If a facility in the modified Library refers to a function
223. rogram is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does 1 You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c If the modified program normally reads
224. rs Select the one for which you want to create a share click to the right of the folder name to select You can also click the folder s name to navigate to a sub folder within the folder Apply Click this button to return to the previous screen with your folder selection Cancel Click this button to return to the previous screen without selecting a folder NSA 220 User s Guide Chapter 10 Shares NSA 220 User s Guide PART IV Maintenance ene Date and Maintenance Screens This chapter discusses the Maintenance screens 11 1 Maintenance Overview Use the maintenance screens to View logs Manage the NSA configuration file Upload new firmware Restart or shut down your NSA 11 2 Log Click Maintenance Log to display the following screen The Log screen displays all NSA logs There are at most 128 entries in the log Older logs are removed by the system You cannot download the log file via FTP or CIFS Figure 90 Maintenance Log NH Maintenance Log Log Display View All Logs 1 2007 08 29 17 08 18 user info 2 2007 08 29 17 06 51 user info 3 2007 08 29 17 02 09 system info 4 2007 08 29 17 02 09 built in service notice 5 2007 08 29 17 02 09 built in service info 6 2007 08 29 17 02 09 built in service notice 7 2007 08 29 17 02 09 built in service notice 8 2007 08 29 17 02 04 interface notice 9 2007 08 29 17 02 03 system notice 10 2007 08 29 17 02 03 system notice 11
225. rsion published by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the Free Software Foundation 14 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMI
226. ruption virus attacks files incorrectly deleted or modified or the NSA malfunctioning Here are some suggestions for helping to protect your data Place the NSA behind a hardware based firewall It should have stateful packet inspection IDP Intrusion Detection and Prevention and anti virus like ZyXEL s ZyWALL UTM products for example Use anti virus software on your computer to scan files from others before saving the files on the NSA Keep another copy of important files preferably in another location NSA 220 User s Guide Chapter 6 Storage Screens NSA 220 User s Guide Network Screen This chapter discusses the network configuration screen 7 1 Network Settings Use the network configuration screen to assign the NSA a dynamic or static IP address and DNS information 7 1 1 IP Address The NSA needs an IP address to communicate with the media servers on your network The NSA can get an IP address automatically if you have a device on your network that gives them out Or you can assign the NSA a static fixed IP address 7 1 2 DNS Server Address A DNS Domain Name System server maps domain names like www zyxel com to their corresponding IP addresses 204 217 0 2 in the case of www zyxel com This lets you use domain names to access web sites without having to know their IP addresses The NSA can receive the IP address of a DNS server automatically along with the NSA s own IP address You c
227. s e set the media server function to publish a folder but some of the files in the folder do not display in the list on the media client Files with formats that are not supported on the media server may not display in the list See Appendix on page 160 for the file formats that the media server supports e published a folder with the media server function but the media client does not play some of the files or does not play them properly 1 Files with formats that are not supported on the media server may not display in the list See Appendix on page 160 for the file formats that the media server supports 2 If you are using media client software you may need to install codecs on your computer Since the media client software uses your computer s installed codecs files do not play if the required codec is not installed on your computer 3 The media client may not support the file s format iTunes does not display the names of all the music or video files just put on the NSA 1 Make sure the files are a format supported by iTunes See Section 16 5 on page 160 NSA 220 User s Guide Chapter 15 Troubleshooting 2 Goto Applications Media Server Make sure the share containing the music and video files is published and the iTunes server option is enabled 3 IfaniTunes client is connected the NSA s iTunes server function scans the published media server folders for files every three minutes Leave
228. s allowed for example ASCII characters The name cannot be the same as another existing external volume JBOD Use JBOD if you want maximum storage capacity and or you have other means of protecting your data JBOD is the only option if you only have one disk installed With two disks you can choose to create a JBOD volume on one of the disks or both RAID 0 Use RAID 0 if you want maximum speed for your disks and or you have other means of protecting your data This is only available when you have two hard disks installed RAID 1 Use RAID 1 if you want to mirror all data on one disk to the other disk This is only available when you have two hard disks installed Volume will be This field lists all hard disks installed inside the NSA Select which disks should created on make up this volume A disk can only belong to one volume You do not need to select anything if only one hard disk is installed Apply Click this button to save your changes back to the NSA and create the volume Cancel Click this button to exit this screen without saving your changes or creating a volume NSA 220 User s Guide Chapter 6 Storage Screens 6 4 Editing a Volume Click an internal volume s Edit icon in the System Storage screen as shown in Figure 58 on page 73 to open the following screen Use this screen to change the volume s name Figure 61 System gt Storage gt Edit Volume Name volumet
229. s of which USB port and USB2 for the second Disk Usage This field shows total disk size the percentage of the disk being used and the percentage that is available Active Sessions This shows how many users are currently connected to the NSA Type This shows whether it s a Windows CIFS web web configurator or FTP connection to the NSA Share Name This displays the shared folder name on the NSA that the user is connected to for CIFS sessions and is blank for FTP sessions NSA 220 User s Guide Chapter 4 Status Screen Table 12 Status continued LABEL DESCRIPTION Username This displays the name of the user connected to the NSA if one is defined ANONYMOUS CIFS or ANONYMOUS FTP display if a username is not defined for the user s connection Connected At This displays the date and time the user last connected to the NSA in year month day hour minute second format IP Address This displays the IP address of the computer connected to the NSA 4 1 1 Session Example Windows Open windows explorer and type two back slashes followed by the NSA name or IP address Initially you can only read and write to the Public Video Music and Photo folders until you create other shares on the NSA This session is then displayed as shown in Figure 54 on page 63 Figure 55 Session Example Windows Nsa220 music Select an item to view its description public Quse card
230. s on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties with this License 11 If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Library at all For example if a patent license would not permit royalty free redistribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to NSA 220 User s Guide 199 Appendix D Open Source Licences contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distri
231. s user You can type from one to 14 single byte no Chinese characters allowed for example ASCII characters Password confirm You must type the exact same password that you just typed in the above field Account Type Select Administrator to give full the account configuration and management access to the NSA Select User to give the account basic access rights to the NSA and allow the user to manage his own shares change his own password and access the contents of other shares to which he is given access rights Apply Click this button to save your changes back to the NSA Cancel Click this button to leave this screen without saving changes 9 3 4 Usernames Enter a username from one to 32 characters The first character must be alphabetical case insensitive A Z a z numeric characters are not allowed as the first character The username can only contain the following characters Alphanumeric A z 0 9 Unicode usernames are supported with CIFS logins but not FTP or web configurator logins Spaces e _ underscores e periods dashes Other limitations on usernames are Allleading and trailing spaces are removed automatically Multiple spaces within names are converted to a single space Usernames are case insensitive The username cannot be the same no matter the letter case as an existing user For example if a user exists with the name BOB you cannot create a user named bob
232. s whether the Web server function is enabled or disabled It must be enabled to use HTTP to access shares on the NSA Click the edit icon to go to the screen where you can configure this Volume Status A volume is a storage area on a single disk or spread across a number of disks within a single file system Internal Volume This displays the volumes created on the hard drives installed in the NSA Create an Internal Volume This displays if there are no volumes created on the hard drive s installed in the NSA Click this button to create a volume See Section 6 4 on page 76 External Volume This displays the volumes created on USB hard drives connected to the NSA USB disks are numbered in the order that you insert USB devices Status This icon indicates whether the volume is healthy degraded or down Name This field shows the name for the volume Read only displays for an external volume that uses Windows NTFS This means the NSA can read the volume but can t save files on it Configuration This field also known as Type shows what type of data storage system a RAID type or JBOD an internal volume is using File System This field shows what file system an external USB volume is using Disk s For internal drives this shows which hard drive bays are included in the volume For external drives this field shows USB1 for the first external hard drive you connect to the NSA regardles
233. sers Add or Editan ACCOUNT nissan ernie adie 117 Table a7 D Deles ACCOUN germ EET 118 EIS EAS a OS E 119 NSA 220 User s Guide 21 List of Tables J8bdo 29 SOIRS sisters e Plaga dont AE eaten po opta EG rbd dunes Onda aaa ra 120 Table 40 Shares gt Add Share or Change Share Properties ssssssssssseee 121 Table 41 Shares Share Path BROWSE auuiieiedieeisiee enc en Er sestoueFeeeip pe tract don Pedes M RM D CCP SUB ER abd ERE naive 123 Table 42 Malbec s LO usseeot ia tas pet te crt bet erre aac a va eei bv ae ev pu deed er ed Rm eR o kd Mi 128 Theas o Lon GESS erm E 128 E LOMESES 1 15 erm 128 TOOS LG PN ect rr 129 Table 46 Maintenance gt Contiguration 2 sccidsedesacorssenicesvagsedvansnlscneiaaetiestd Ae aN Eaa 131 Table 47 Mainrenancs gt PAN LIBUFBOG 51 nriiexiss rives pasci peii aaves Un Ma dre porq ea Regi Dus remi urges da 132 Tabie 38 Maintenance gt STAIN ironis i ioada rag tei a a E GU Cote a dundee E a EH 132 Table 49 Overview of Protection Methods issiima aaa 135 Table 50 Ports Blocked By Delauli in PIBIQX cccisisssssssrissncsevins ms sur enda Pb en jare a bua atr ipaa uet 183 Jae OP PhysicHl Pres Saedveidbsetipes bleues t a 155 Table D2 Fitri FOGG te 155 Table 53 NSA Hardware Specifications 2e sues nde sasnkes ee a eem ied Enna aaa aA aai Hee 156 Table 54 NSA Erie Mem 157 Table 55 Supported Standards and Recommendations sss 158 Table 56 Supported Media Server Con
234. sites BES ZyXEL does not endorse these web sites and is not responsible for any of their contents Use these or any other web sites at your own risk and discretion http www zencast com http www miroguide com http www vuze com http www mefeedia com http www vodstock com 8 13 Broadcatching Screen Click Applications gt Broadcatching to open the following screen This screen displays the NSA s subscribed channels and the associated contents The NSA saves a channel s downloaded items in a folder named after the channel The NSA creates the channel folders in the same destination as the download service See Section 8 8 on page 100 to change the destination for saving downloads The NSA s media server feature makes it easy for users on your network to play the broadcatching files you download See Section 8 3 on page 90 for more on the media server NSA 220 User s Guide Chapter 8 Application Screens Figure 79 Applications gt Broadcatching a3 Applications Broadcatching Add Delete Channel Channel Broadcatching e 8 O06 Z Completed GJ Seeding E3 Downloading G Queued G Pause EJ Error G Missing File CNET TV New on CNET TV Outlook Productivity Tips a vi PhotoWalkthrough com Searching the Internet Slashdot Review SDR News http eclectic libsyn com rs Refresh Edit Channel Channel Start downloading fij Delete Item a Outlook SharePoint
235. skJBODvolurne SS ALL Data On this Volume will be DELETED Are you sure you want to DELETE this Volume 6 3 Creating an Internal Volume Click the Create an Internal Volume button in the Storage screen as shown in Figure 58 on page 73 to open the following screen Use this screen to create a new NSA internal disk drive volume NSA 220 User s Guide Chapter 6 Storage Screens BES Creating a volume formats the hard drive All data on the disk will be lost Figure 60 System gt Storage gt Create an Internal Volume Disk Configuration Volume Name y JBOD Feco B fem eco JBOD volume can be a single disk volume or can be made to span across several disks into a single larger volume It does not provide any fault tolerance or performance benefits Volume will be created on a t 5 AAR eo C RAIDO Feco B disk1 The following table describes the labels in this screen Table 16 System gt Storage gt Create an Internal Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters The name cannot be the same as another existing external volume Acceptable characters are all alphanumeric characters and spaces underscores and periods The first character must be alphanumeric A Z 0 9 The last character cannot be a space For an external volume type a volume name from 1 to 32 single byte no Chinese character
236. specific folder on a volume gives someone access to a folder It is equivalent to the Windows concept of a shared folder but the access rights are independent of the folder you configure the share and the folder separately You can map a share to a network drive for easy and familiar file transfer for Windows users The main My NSA screen displays the shares to which you have access Figure9 My NSA Language 7a zyxEL bcm E amp S My NSA Password Administration Download Service fm My NSA HHO x y My Own Shares AUMENTE USB Card IntelligentStick 1 001 Vial Other Shares NSA 220 User s Guide 33 Chapter 2 Web Configurator Basics The following table describes the labels in this screen Table 3 My NSA LABEL DESCRIPTION My Own Shares These are the shares that you own and manage The share icons are folder shaped Click a share icon to access the share s contents A plain share icon displays for a share on a volume on the internal hard E drives device An external share s icon turns gray if the share is not currently A USB symbol displays on the icon for a share on an external USB E available because the USB device was removed for example The administrator owns and manages the public shares Manage It Click this button to see and configure the management details for a share Other Shares These are other shares on the
237. ss cada n SS Panda dta cr ND ida 29 Hier qe M 45 KITE C ETT 63 System Settling and ApplicatlOhs sessirnir niin nu taut a Run aHa raa a nsina 67 SUSY Sane EENE aaar a sissies hc a bond doni aua a pc ant d 69 exer hi err p 1 D MER II DO cc wine casted bled o 2D 0 PUE 73 sry SERT eane ia pibe Ru b Rr d HR NE UB ad Rd a o o rg o d 85 Application SONS ME S once Dose cupa tuba Fesat bum ep tnus Eos do RDUM a ai aE E Kop Seu Kx EE Una Rd 89 dr ilc 0 1 113 l1 e mx Tere en 115 PUT Hee t E 119 Maintenance Protecting Data and Media Client eeeeessseessses 125 POTN SCPE RIN coaecaist donec Cose b n IDE a AREE panes ABRRI PERI RR EU OL ER QETEE acacannegec 127 PROBS FOU bi e anes 135 Medis list SOWAS nts ccincidaiantnioradedsrnecsdaladnabsenidaaviepsdeddaiatedeladanssnedadanvesdeiddiniereladadioeadcaaucels 137 ocn emoivleris P ager Re 139 Troubleshooting and Specifications eeeeeeeeeeeeeeeeeeeeeeeeene enne nnn 141 Troubleshooting e 143 Miss P Aere ei INNS MEN T PEU E 155 Appendices and IMONX inssasssensasutxki dana kk A2 9R RR ARENA EERR S XMER MER RR MR AER RRAR MUNERE EAE RAM iandae 163 NSA 220 User s Guide 9 Contents Overview NSA 220 User s Guide Table of Contents Table of Contents Fe M25 estia I S 3 Document GO
238. t Network Rou 05 44 Christoph Marquardt tipsFromthetd SHARED nsa220 STIQTOO Yahoo Audio Search 6 24 Ed Vawter 4 YPLAYLISTS PhotoWalkthrough Tutorial 13 C 26 31 John Arnold PhotoWwalkthi te Party Shuffle PhotoWalkthrough Tutorial 13 Ch 37 31 John Arnold PhotoWalkthr 90 s Music Photowalkthrough Tutorial 13 Ch 33 31 John Arnold PhotoWalkthr NSA 220 User s Guide Ea Chapter 8 Application Screens 8 3 2 Songs and Videos from the iTunes Store After using iTunes on your computer to download songs and videos from Apple s iTunes Store you can copy them to the NSA Many of these songs and videos have DRM Digital Rights Management At the time of writing you can use your Apple account ID and password to authorize up to a total of five computers to play the files To authorize a computer open iTunes and click Store Authorize Computer 8 4 Media Server Screen Click Applications Media Server to open the following screen Use this screen to turn the media server and or iTunes server on or off and select shares to publish share with media clients like iTunes or the DLNA compliant media client included on the NSA CD Figure 67 Applications Media Server tt Applications Media Server Media Server C Disable Media Server Enable Media Server C Enable transcoding Ni Note public admin USB Card IntelligentStick 1 001 Media Server Name nsa220
239. t cien 87 Figure GO seriis gt api dle 90 Fours 66 INS A UT ANS euis arcc coda Sa Pod o aaa boe poa E ua a ul an 91 Figure 67 Applications Media Server sernai a tete E DEM beu du PD rae add Doe Vida 92 aufer emm 95 Figure 69 Firewall Blocking Incoming BitTorrent Requests cccceeseccceeeeeseecceeeeeeeeceeeeeseeeeeeeeesenees 95 Figure 70 Firewall Configured to Allow Incoming BitTorrent Requests sssee 96 Figure 71 Applications gt Download Bernice isse tbaecide op EO POUR E AERE OR AO NH POL S T prada 97 Figure 72 Applications gt Download Service gt Add uui sace tta ecards 99 Figure 73 Applications gt Download Service gt Preferences sss 100 Figure 74 Web Publishing Port Number Example esce idee e iere i da Rr re ade ea S Roda gh go 102 Figure 5 Applications Web PH MUM sccasiaciss si cecsannwees esta sut beta daa used daa ot hon tapiaa uuu Ra busta adatta aa cos 103 Figure 76 Applications gt Web Publishing Example 15e eterne tte nt rtu onera enr R ttn anER ree 104 Figure 77 Browsing to an NSA Share Example aues nisasie vada ae dE ccu banda cca dl 105 acu Tel WAIN ceases sed UO ULLUS EUEm 106 Foue 79 Applieetions BIOBICSIEPBIDG iuiseivxpn sioe qan RA RO RUE FIM DOES RA NA RD E MuR RI da S MS 107 Figure SO Applications gt Brosdealching gt Add aussen da ene susbi Eon a sunu EY eeu bani innesa aane aia 108 i a PRIMER eil Oo E LU 109 N
240. t forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it For example if you distribute copies of the library whether gratis or for a fee you must give the recipients all the rights that we gave you You must make sure that they too receive or can get the source code If you link other code with the library you must provide complete object files to the recipients so that they can re link them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent hol
241. t may cause undesired operations NSA 220 User s Guide 221 Appendix E Legal Information This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This device generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment This Class B digital apparatus complies with Canadian ICES 003 Cet appareil num rique de la classe B est conforme la norme NMB 003 du Canada Viewing Certifications 1 Goto http www zyxel com 2 Select your product on the ZyXEL home page to go to that product s page 3 Select the certification you wish to view from this page ZyXEL warrants to the original end user purchaser that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase During the warranty period and upon proof of purchase should the product have indications of failure due to faulty workmanship and or materials ZyXEL
242. teaiaiednnencddnmsamediurennscas 185 NSA 220 User s Guide List of Tables List of Tables Toe LEDS qewecm E 27 Table 2 User level Global Labels and Icons sssssssssssssseseseseeenee nennen nnne nter nennen 32 jl 045i cn M 34 Table 4 Ni NSA Share DEOWBIRQ actis Paepocig Epp ra aec Casa a pedi bn eta Faccia opc da d d 35 Table 5 My NSA Share Browsing gt Move to or Copy to nennen 35 Table My NSA Management OVEIVIEW uieccus dee retis ERU doce bue eidem on rc e ees 36 Table 7 My NSA Change Share Properties iue nsu ttitk rne sities tetas asia teeth aq a ii 37 THCS PSW anaona TEE 40 Table 9 Global Labels and cone aussen viiecvdiv epo aoreet un o POR EORR p RP RO EE Ri GA n AEE 41 TROIS VU SCRE SUITS E A dub abb aed n nece dich ber dta ada Pati Danica Nadie at 42 Table 11 Common Configuration Sereen ICONS usse endete d epsak cedioRE ket diated end dare EEEE 43 Bs ACE IP mE ET 64 Table 15 System Setting gt Server Name iani rrrd done kk Fo LER ERR Fe ER Ek ninani EFE RE R FEL EE EE R PPP RSEN EQ ER 70 Tabie t4 System Setting gt Dae TINE m 71 Tape 15 Srem s aE aii S ekaa sits Rd oma aud aS AENEON 74 Table 16 System gt Storage gt Create an Internal Volume sssssssssseeeeeneren nnne 75 Tabe 17 System DIS BU aee ine i e b aa da ERN xci OR Reb deed race ka EY 76 Table T9 PAID CONSEC SIN ANSON unascusutkncostaxoq arena andi GRE aeaa oda aX dada Zr Table 19 S
243. ten permission of the Apache Software Foundation THIS SOFTWARE IS PROVIDED AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Foundation For more information on the Apache Software Foundation please see lt http www apache org gt Portions of this software are based upon public domain software originally written at the National Center for Supercomputing Applications University of Illinois Urbana Champaign This Product includes phpmvc software under LGPL license GNU LESSER GENERAL PUBLIC LICENSE Version 2 1 February 1999 Copyright C 1991 1999 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim
244. tent Formats eseesessssssssisssseseene eee tnnnnnn 160 Table 57 Power Consumption in Watte CIN austacseiceseseqe bacca pe scarred renege reto E Deco ese ree ERR LL cSE 161 UL cc eT uU I 161 Table 58 Commonly Used Servicos 1c koi d t eBER Ero ERE EE AREE REAL don Ee rE RE KK EY ax n RR EAT SR RKE HA AERE RR HON 187 22 NSA 220 User s Guide PART I Introduction Getting to Know Your NSA 25 Web Configurator Basics 29 Tutorials 45 Status Screen 63 Getting to Know Your NSA This chapter covers the main features and applications of the NSA 1 1 NSA Overview Use the NSA Network Storage Appliance to do the following Share files between computers on your network Back up files from your computers to the NSA Use the COPY button to copy files directly to the NSA from USB devices like card readers MP3 players memory sticks and digital cameras without using a computer Have the NSA handle large file downloads Automatically download files from website feeds for convenient viewing Play the NSA s video music and photo files on your computers using the included media client software Play the NSA s video music and photo files on hardware based media clients like the DMA 1000 Use the NSA s web site to share files with remote users Use iTunes on your computer to play video and music files stored on the NSA Share printers Figure 1 Example of the NSA in a Home Networ
245. ter 8 Application Screens Figure 65 Applications gt FTP s Applications FTP FTP E Enable FTP Connection Limit 10 Connection Limit 20 Idle Timeout 15 minutes Max timeout 300 minutes C Enable Anonymous FTP Access Note To configure a share to allow anonymous FTP access go to the configure shares page and modify a share s access rights to allow the user Anonymous FTP Character Set UTF 8 x The following table describes the labels in this screen Table 24 Applications FTP LABEL DESCRIPTION FTP Enable FTP You can use FTP to send files to the NSA or get files from the NSA Select the Enable FTP check box to allow users to connect to the NSA via FTP otherwise clear the check box Connection Limit Enter the maximum number of concurrent FTP connections allowed on the NSA in this field Idle Timeout Enter the length of time that an FTP connection can be idle before timing out Enable Anonymous FTP Select Enable Anonymous FTP Access to allow any user to log into the Access NSA using FTP or anonymous as a username and no password Any other name is considered a username so must be valid and have a corresponding correct password Character Set The NSA uses UTF 8 8 bit UCS Unicode Transformation Format format for FTP by default If the NSA s folders or file names do not display correctly in your FTP client select the appropriate language encoding here Th
246. the hard drive may fail soon See Installing or replacing a hard drive An HDD LED is red Red means the hard drive has failed and the NSA can no longer detect it Replace the hard drive See Installing or replacing a hard drive If you are using a RAID I volume you may still be able to use the volume but you should replace the faulty drive as soon as possible Installing or replacing a hard drive Do not remove or install hard drives while the NSA is turned on The NSA must be turned off before you remove or install hard drive s 1 Turn the NSA off remove the rear panel and the drive tray and make sure there isa SATA Lor SATA 3 0 Gbit s compatible hard drive installed the hard drive is installed correctly in the drive tray Push the tray back into NSA drive bay until the screw hole at the top of the drive tray is flush with the drive bay see the NSA Quick Start Guide and Section 6 6 on page 78 the hard drive could be faulty Try a different hard drive or test the original hard drive in a different NSA or computer 2 If you had to replace the drive turn on the NSA and go to the Storage Setting screen f you have a RAID I volume click the Repair icon next to the new drive If you are using RAID 0 you will need to recreate the whole volume All of your data is lost f you are using a single disk JBOD volume you need to create a new volume on the new drive f you are using a two disk JBOD volume
247. the screen I are visible from most screens Use the tabs at the top of the screen to navigate between the user level screens and menus The following table describes the global icons and tabs in the user level screens Table 2 User level Global Labels and Icons LABEL ICON DESCRIPTION Language Select the web configurator language from the drop down list box Help Click the Help icon to open a web help page specific to the screen you are currently configuring Logout Click the Logout icon at any time to exit the web configurator My NSA Click this tab to go to screens where you can manage your shares and access the files on public shares The administrator must go into the administration screens to manage other user s shares Password Click this tab to go to a screen where you can change your password Administration This tab displays when you log in as the administrator Click the tab to go to screens where you can manage advanced configurations Download This tab displays when you log in as the administrator Click the tab to go to Service screens where you can have the NSA handle file downloads See Section 8 5 on page 93 for more information 32 NSA 220 User s Guide Chapter 2 Web Configurator Basics 2 5 My NSA Screen Use the My NSA screens to manage your shares and access the files in folders to which you have access A share is a set of user access permissions for a
248. this button to open a screen where you can set the default location for saving downloads and configure your BitTorrent settings The table lists your downloads Click a column s heading to sort the entries by that criteria Active Click this tab to see the list of files the NSA is currently downloading or sharing with other BitTorrent users The NSA handles a maximum of 10 active tasks at a time or fewer depending on how much of the NSA s system memory is available If you add more they appear in the Inactive tab Bit Torrent downloads may appear in the Inactive tab for a while before showing in the Downloading tab The NSA automatically moves completed tasks to the Completed tab Inactive Click this tab to see the list of files that are queued waiting in line for the NSA to download or the downloads that have been manually paused Completed Click this tab to see the list of files that the NSA has finished downloading Error Click this tab to see the list of files that the NSA was not able to download The NSA automatically retries unsuccessful download attempts The download displays in the error tab when the re attempts are also unsuccessful and the NSA stops trying to download the file To try the download again use the Add button to create a new download task Status The icon shows the download s status Completed The NSA has downloaded the whole file Seeding The download is finished and the NSA
249. this file are subject to the Mozilla Public License Version 1 1 the License you may not use this file except in compliance with the License You may obtain a copy of the License at http www mozilla org MPL Software distributed under the License is distributed on an AS IS basis WITHOUT WARRANTY OF ANY KIND either express or implied See the License for the specific language governing rights and limitations under the License The Original Code is The Initial Developer of the Original Code is Portions created by are Copyright C All Rights Reserved Contributor s Alternatively the contents of this file may be used under the terms of the license the License in which case the provisions of License are applicable instead of those above If you wish to allow use of your version of this file only under the terms of the License and not to allow others to use your version of this file under the MPL indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the License If you do not delete the provisions above a recipient may use your version of this file under either the MPL or the ___ License NOTE The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications
250. tions When Covered Code is released as a series of files a Modification is Any addition to or deletion from the contents of a file containing Original Code or previous Modifications Any new file that contains any part of the Original Code or previous Modifications 1 10 Original Code means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code and which at the time of its release under this License is not already Covered Code governed by this License 1 10 1 Patent Claims means any patent claim s now owned or hereafter acquired including without limitation method process and apparatus claims in any patent Licensable by grantor 1 11 Source Code means the preferred form of the Covered Code for making modifications to it including all modules it contains plus any associated interface definition files scripts used to control compilation and installation of an Executable or source code differential comparisons against either the Original Code or another well known available Covered Code of the Contributor s choice The Source Code can be in a compressed or archival form provided the appropriate decompression or de archiving software is widely available for no charge 1 12 You or Your means an individual or a legal entity exercising rights under and complying with all of the terms of this License or a future version of this License issued und
251. to null Services NOTICE The NTP service is disabled Services NOTICE The NTP service is enabled Services WARNING Reaching Maximum Allowed Rules NSA 220 User s Guide Chapter 11 Maintenance Screens Table 45 Log Messages continued CLASS SEVERITY MESSAGE Services WARNING Reaching Maximum Allowed Rules Services WARNING Rule is empty Services WARNING The Rule Does Not Exist Services NOTICE FTP server stops Services NOTICE FTP server starts Services INFO Clock timezone is set to GMT s Services INFO Clock timezone is set to default Services INFO Clock daylight saving is enabled Services INFO Clock daylight saving is disabled Shares NOTICE Add new share 95s Shares NOTICE Delete share 96s Shares NOTICE Delete share 96s System INFO NTP update failed System INFO NTP updates successfully from 96s System INFO NTP fails to update from 96s System INFO Device is rebooted by administrator System INFO Device is shutdown by administrator System NOTICE DNS server is changed System NOTICE Hostname is cleared System NOTICE Hostname is set to s System NOTICE System description is changed System NOTICE System description is empty now System NOTICE DNS server setting is changed System NOTICE DNS server address is changed to be given from DHCP server System NOTICE DNS server setting is
252. ts 5 On your computer open your CIFS file sharing program Windows Explorer for example and browse to the NSA Double click the printer s icon Figure 49 Printer Connected to NSA Windows Explorer 192 168 1 2 File Edit View Favorites Tools Help Back gt al Qsearch Gy Folders S As UI X wz Eg Address 192 168 1 2 L1 192 168 1 2 Mame GS Canon PRT 1 f music photo Select an item to view its description public a USB Card IntelligentStick 1 001 video Printers E Canon PRT 1 Adds removes and configures local and netwa 6 If you get a warning screen click the option that lets you continue Yes in this example Figure 50 Printer Connected to NSA Windows Explorer Warning prs LAS JUD G Before you can use the printer 1192 168 1 21Canon PRT 1 it must be set up on your computer Do you want Windows to set up the printer and continue this operation 7 If your computer does not already have the printer s driver installed you will need to install it In this example click OK NSA 220 User s Guide Chapter 3 Tutorials Figure 51 Printer Driver Needed Connect to Printer A The server on which the printer resides does not have the correct printer driver installed IF you want to install the driver on your local computer click OK 8 Use the wizard screens to install the printer driver on the c
253. tton to close this screen without saving your changes 10 2 1 Public and ANONYMOUS Share Access Rights If you make a share public users do not need to log in With ANONYMOUS FTP you must enter either anonymous or ftp as the username Any other name is considered a username so must be valid and have a corresponding correct password 10 3 Share Path Browse Screen Use this screen to navigate and or create folders within a share Figure 89 Share Path Browse Browse Current location Jimmy admin music photo public EPeeeeepet video d FamilyPhotos NSA 220 User s Guide Chapter 10 Shares The following table describes the labels in this screen Table 41 Shares Share Path Browse LABEL DESCRIPTION Create Folder Type a folder name and click Create Folder to make a new folder The name can be 1 to 255 single byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing folder in the same path See Section 2 5 5 on page 38 for more information on folder names Current location This is the name of the share and folder path that you are in Type The icon in this column identifies the entry as a folder or a file The folder with an arrow pointing up is for the link that takes you to the next higher layer in the share s folder tree Name This section lists the volume s existing folde
254. u have a license to use the Software as long as this License Agreement remains in full force and effect Ownership of the Software Documentation and all intellectual property rights therein shall remain at all times with ZyXEL Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement 3 Copyright The Software and Documentation contain material that is protected by United States Copyright Law and trade secret law and by international treaty provisions All rights not granted to you herein are expressly reserved by ZyXEL You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation NSA 220 User s Guide 21 7 Appendix D Open Source Licences 4 Restrictions You may not publish display disclose sell rent lease modify store loan distribute or create derivative works of the Software or any part thereof You may not assign sublicense convey or otherwise transfer pledge as security or otherwise encumber the rights and licenses granted hereunder with respect to the Software You may not copy reverse engineer decompile reverse compile translate adapt or disassemble the Software or any part thereof nor shall you attempt to create the source code from the object code for the Software You may not market co brand private label or otherwise permit third parties to link to the Software or any part thereof You
255. um customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not NSA 220 User s Guide Appendix D Open Source Licences compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a derivative work of the Library and therefore falls outside the scope of this License However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If su
256. ume names 38 resychronize 44 resynch 78 return material authorization RMA 222 rights 221 RMA 222 RSS Really Simple Syndication 106 S safety warnings 6 scan disk icon 44 screen hyperlinks 42 screen links 42 screen summary 42 screens summary 42 security 101 serial ATA SATA 155 settings changing 43 share 33 access 37 access rights 122 anonymous access 122 browsing 34 changing properties 36 deny access 38 everyone 122 file path 36 37 full access 37 management details 34 name restrictions 38 paths 39 private 37 public 37 read only access 38 share icon 44 share paths 39 shared folder 33 shares other 34 sharing printers 109 shutdown 132 stateful packet inspection 95 status 63 status messages 43 storage humidity 157 storage temperature 157 streaming media files 90 sub links 42 supported formats 160 supported clients 158 syntax conventions 4 SYS LED 27 system management 158 system name 64 T time 70 Daylight Saving Time 72 zone 72 time out 32 time server 71 time server address 72 time zone 71 NSA 220 User s Guide Index torrent file 94 troubleshooting external disks 149 forgot password 145 LED indicators 143 LAN 145 login 148 media files 150 NDU discovery 147 overview 143 user share access 149 web configurator access 145 TV programs 105 type 64 U USB devices 34 USB hard drives 64 user access permissions 33 user icon 44 user name restricti
257. unday The time you specify depends on your time zone In Germany for instance you would type 2 because Germany s time zone is one hour ahead of GMT or UTC GMT 1 End Date Configure the day and time when Daylight Saving Time ends if you selected Enable Daylight Saving The o clock field uses the 24 hour format Here are a couple of examples Daylight Saving Time ends in the United States on the first Sunday of November Each time zone in the United States stops using Daylight Saving Time at 2 A M local time So in the United States you would select November First Sunday at 2 00 Daylight Saving Time ends in the European Union on the last Sunday of October All of the time zones in the European Union stop using Daylight Saving Time at the same moment 1 A M GMT or UTC So in the European Union you would select October Last Sunday The time you specify depends on your time zone In Germany for instance you would type 2 because Germany s time zone is one hour ahead of GMT or UTC GMT 1 Offset Specify by how many hours to change the time for Daylight Saving Time Apply Click Apply to save your changes back to the NSA If you configured a new time and date Time Zone and Daylight Saving at the same time all of the settings take affect Reset Click Reset to begin configuring this screen afresh NSA 220 User s Guide Storage Screens This chapter covers storage systems volumes and dis
258. up Your Computer s IP Address Figure 105 Windows XP Control Panel Network Connections Properties s Network Connections File Edit View Favorites Tools Advanced Help Q sak amp 2 BA Search Folders E Address e Network Connections LAN or High Speed Internet Network Tasks ocal Area Connection connection Standard PCI Fast Ethernet Adapte 9 Set up a home or small Disable office network sa atus Disable this network i device Repair PN Repair this connection Bridge Connections mij Rename this connection view status of this connection Change settings of this Rename connection Create Shortcut 4 Select Internet Protocol TCP IP under the General tab in Win XP and then click Properties Figure 106 Windows XP Local Area Connection Properties 4 Local Area Connection Properties General Authentication Advanced Connect using BE Accton EN1207D TX PCI Fast Ethernet Adapter This connection uses the following items 1 fel Client for Microsoft Networks Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected 5 The Internet Protocol TCP IP Properties window opens the General tab in Windows XP f you have a dynamic IP address click Obtain an IP address automatica
259. urope Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution If the power adaptor or cord is damaged remove it from the power outlet Do NOT attempt to repair the power adaptor or cord Contact your local vendor to order a new one Do not use the device outside and make sure all the connections are indoors There is a remote risk of electric shock from lightning CAUTION RISK OF EXPLOSION IF BATTERY on the motherboard IS REPLACED BY AN INCORRECT TYPE DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS Dispose them at the applicable collection point for the recycling of electrical and electronic equipment For detailed information about recycling of this product please contact your local city office your household waste disposal service or the store where you purchased the product Do NOT obstruct the device ventilation slots as insufficient airflow may harm your device This product is recyclable Dispose of it properly 6 NSA 220 User s Guide Safety Warnings NSA 220 User s Guide Safety Warnings NSA 220 User s Guide Contents Overview Contents Overview no 23 Getma Uae TOU NSA sarua T 25 MOTE eM UO BIO A A A dad anni Gue
260. ut implicit consent Pop up Blocker Prevent most pop up windows from appearing Block pop ups 3 Click Apply to save this setting Enable Pop up Blockers with Exceptions Alternatively if you only want to allow pop up windows from your device see the following steps 1 In Internet Explorer select Tools Internet Options and then the Privacy tab 2 Select Settings to open the Pop up Blocker Settings screen NSA 220 User s Guide Appendix B Pop up Windows JavaScripts and Java Permissions Figure 123 Internet Options Privacy Internet Options PR Settings Move the slider to select a privacy setting for the Internet MER zone Medium privacy policy Blocks third party cookies that use personally identifiable tj information without your implicit consent Restricts first party cookies that use personally identifiable information without implicit consent Blocks third party cookies that do not have a compact Pop up Blocker Prevent most pop up windows from appearing v Black pop ups 3 Type the IP address of your device the web page that you do not want to have blocked with the prefix http For example http 192 168 167 1 4 Click Add to move the IP address to the list of Allowed sites Figure 124 Pop up Blocker Settings Pop up Blocker Settings Exceptions Pop ups are currently blocked You can allow pop ups from specific Web sites by adding the
261. uter when prompted Verifying Settings 1 Click Start and then Run 2 Inthe Run window type winipcfg and then click OK to open the IP Configuration window 3 Select your network adapter You should see your computer s IP address subnet mask and default gateway Windows 2000 NT XP The following example figures use the default Windows XP GUI theme 1 Click start Start in Windows 2000 NT Settings Control Panel NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 103 Windows XP Start Menu Internet Explorer e My Documents fe Outlook Express y Paint Files and Settings Transfer W GRY Command Prompt e My Music Acrobat Reader 4 0 Ws My Eon Tour Windows xP Wh Windows Movie Maker E Control Panel 2 My Recent Documents e My Pictures ce Printers and Faxes Q9 Help and Support Search All Programs gt 17 Run P Log Off o Turn Off Computer 5 untitled Paint 2 Inthe Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 104 Windows XP Control Panel amp Control Panel File Edit view Favorites Tools Help Q j hg d JI Search e Folders Fas Address Control Panel Vig Control Panel G Switch to Category View See Also A Windows Update Controllers 3 Right click Local Area Connection and then click Properties NSA 220 User s Guide Appendix A Setting
262. ve only one network card on the computer locate the ifconfig eth0 configuration file where ethno is the name of the Ethernet card Open the configuration file with any plain text editor f you have a dynamic IP address enter dhcp in the BOOTPROTO field The following figure shows an example Figure 116 Red Hat 9 0 Dynamic IP Address Setting in ifconfig ethO EVICE eth0 BOOT yes OOTPROTO dhcp SERCTL no EERDNS yes YPE Ethernet d udcuou If you have a static IP address enter static in the BOOTPROTO field Type IPADDR followed by the IP address in dotted decimal notation and type NETMASK followed by the subnet mask The following example shows an example where the static IP address is 192 168 1 10 and the subnet mask is 255 255 255 0 Figure 117 Red Hat 9 0 Static IP Address Setting in ifconfig ethO DEVICE eth0 ONBOOT yes BOOTPROTO static IPADDR 192 168 1 10 NETMASK 255 255 255 0 USERCTL no PEERDNS yes TYPE Ethernet 2 If you know your DNS server IP address es enter the DNS server information in the resolv conf file in the etc directory The following figure shows an example where two DNS server IP addresses are specified NSA 220 User s Guide Appendix A Setting up Your Computer s IP Address Figure 118 Red Hat 9 0 DNS Settings in resolv conf nameserver 172 23 5 1 nameserver 172 23 5 2
263. vice I Web Publishing I Broadcatching Print Server I Users Shares Maintenance Log Configuration PW Upgrade Shutdown Logout The following table describes the navigation panel screens Table 10 Screens Summary LINK SCREEN FUNCTION Status This screen shows system information the status of the volumes and the users who are currently using the NSA System Setting Server Name Specify the NSA s server name and workgroup name Date amp Time Chose a time zone and or allow the NSA to synchronize with a time server Storage View volume and disk information and create and edit volumes A volume is a storage area that can span one or more internal disks or a single external USB disk Network TCP IP Assign the NSA a dynamic or static IP address and DNS information NSA 220 User s Guide Chapter 2 Web Configurator Basics Table 10 Screens Summary continued LINK SCREEN FUNCTION Applications FTP Enable FTP file transfer to from the NSA set the number of FTP connections allowed an FTP idle timeout and the character set Media Server Enable or disable the sharing of media files and select which shares to share Download Have the NSA handle large file downloads Service Web Let people use a web browser to access files in shares without Publishing logging into the My NS
264. will at its discretion repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to restore the product or components to proper operating condition Any replacement will consist of a new or re manufactured functionally equivalent product of equal or higher value and will be solely at the discretion of ZyXEL This warranty shall not apply if the product has been modified misused tampered with damaged by an act of God or subjected to abnormal working conditions Note Repair or replacement as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitness for a particular use or purpose ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser To obtain the services of this warranty contact Zy XEL s Service Center for your Return Material Authorization number RMA Products must be returned Postage Prepaid It is recommended that the unit be insured when shipped Any returned products without proof of purchase or those with an out dated warranty will be repaired or replaced at the discretion of ZyXEL and the customer will be billed for parts and labor All repaired or replaced products will be shipped by ZyXEL to the corresponding return address Postage Paid This warranty
265. with all distributions of the Source Code Except to the extent prohibited by statute or regulation such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it 5 Application of this License This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code 6 Versions of the License 6 1 New Versions Netscape Communications Corporation Netscape may publish revised and or new versions of the License from time to time Each version will be given a distinguishing version number 6 2 Effect of New Versions NSA 220 User s Guide 213 Appendix D Open Source Licences Once Covered Code has been published under a particular version of the License You may always continue to use it under the terms of that version You may also choose to use such Covered Code under the terms of any subsequent version of the License published by Netscape No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License 6 3 Derivative Works If You create or use a modified version of this License which you may only do in order to apply it to code which is not already Covered Code governed by this License You must a rename Your license so that the phrases Mozilla MOZILLAPL MOZPL Netscape MPL NPL or any confusingly similar phrase do not appear
266. wn to Scripting Under Active scripting make sure that Enable is selected the default Under Scripting of Java applets make sure that Enable is selected the default Click OK to close the window oa 5 W DN 182 NSA 220 User s Guide Appendix B Pop up Windows JavaScripts and Java Permissions Figure 126 Security Settings Java Scripting Security Settings Settings Scripting amp Active scripting Disan Q Pramp 3 Allow paste operations via script Q Disable 9 Enable Q Prompt amp Scripting of Java applets Q Disable OQ Prompt lleas fuikhanticstian E b custom settings Reset to Medium Reset ced Java Permissions From Internet Explorer click Tools Internet Options and then the Security tab Click the Custom Level button Scroll down to Microsoft VM Under Java permissions make sure that a safety level is selected Click OK to close the window arhondD Figure 127 Security Settings Java Security Settings Settings Q Disable 9 Enable es Font download Q Disable 9 Enable a Prompt 3 Microsoft VM Java permissions Q Custom Q Disable Jav 9 High safety Q Low safety Reset custom settings Reset to Medium Reset ced NSA 220 User s Guide Appendix B Pop up Windows JavaScripts and Java Permissions JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advan
267. wnload of the Week and best of the Web helping viewers keep on top of the latest tech trends Hosted by Brian Cooley T Brian Cooley is CNET s senior pundit seen frequently Q View the latest episode on CNN ABC News CNBC as well on the TV screens in most major tech retailers around the U S He also hosts CNET s Car Tech videos and podcast gt View profile Related links gt CNET Live Show Notes CNET TV Help and How to forums Tom Merritt gt Brian s Car Tech podcast Tom Merritt is also co host of the Buzz out Loud and Moms Buza Out Loud podcast ie Real Deal podcasts He spends the rest of his time P dreaming up Top 5 Lists and Insider Secrets for CNET Iu gt View profile SUBSCRIBE NOW WMC henvihn ta thie nadanct icing an CRAVE You know you like it You know you want it You know you Crave it That s why we re giving you the best of Crave in our Transferring data from js revsci net LES Make sure the link goes to the actual RSS feed instead of to another list of links or information about the channel One way to test this is by clicking the link Clicking an actual RSS feed link opens a screen of XML code in browsers without an RSS feed aggregator or a window where you can add the RSS feed in browsers with an RSS feed aggregator 2 Right click the download link and select Copy Link Location in Internet Explorer or Copy Shortcut in Internet Explorer 56 NS
268. y DNS DNS Domain Name System is for mapping a domain name to its corresponding IP address and vice versa If you have the IP address es of the DNS server s enter them Dynamic Select the option to have the NSA get a DNS server address automatically Static Select this option to choose a static DNS server address Type the DNS server IP Primary DNS Type a primary DNS server IP address Server NSA 220 User s Guide Chapter 7 Network Screen Table 23 System Setting Network TCP IP LABEL DESCRIPTION Secondary Type a secondary DNS server IP address DNS Server Jumbo Frames Jumbo frames improve network performance You must have a 1 Gbps Gigabit Ethernet network that supports jumbo frames Select the largest size of frame that all of your network devices including computer Ethernet cards and switches hubs or routers support Note If you enable jumbo frames on the NSA in a network that does not support them you will lose access to the NSA If this occurs you will have to restore the factory default configuration Push the RESET button on the NSA s rear panel and release it after you hear a beep Network Diagnostic Tool Use this section to test the network connection to a particular IP address or domain name Select an address or type it into the field Then click Ping to have the NSA send a packet to test the network connection If the NSA is able to ping the host the network conn
269. y their nature must remain in effect beyond the termination of this License shall survive 8 2 If You initiate litigation by asserting a patent infringement claim excluding declaratory judgment actions against Initial Developer or a Contributor the Initial Developer or Contributor against whom You file such action is referred to as Participant alleging that such Participant s Contributor Version directly or indirectly infringes any patent then any and all rights granted by such Participant to You under Sections 2 1 and or 2 2 of this License shall upon 60 days notice from Participant terminate prospectively unless if within 60 days after receipt of notice You either 1 agree in writing to pay Participant a mutually agreeable reasonable royalty for Your past and future use of Modifications made by such Participant or ii withdraw Your litigation claim with respect to the Contributor Version against such Participant If within 60 days of notice a reasonable royalty and payment arrangement are not mutually agreed upon in writing by the parties or the litigation claim is not withdrawn the rights granted by Participant to You under Sections 2 1 and or 2 2 automatically terminate at the expiration of the 60 day notice period specified above NSA 220 User s Guide Appendix D Open Source Licences any software hardware or device other than such Participant s Contributor Version directly or indirectly infringes any patent then any
270. ystem gt Storage gt Create an External Volume sse 80 E ool nC P Mme 82 It val iom T 82 MAIS PUR Mr EE 83 Table 23 System Setting gt Network gt TGP IB uiui ee ntutakee etudiant rana tee needie nudi tna redu iaaa 87 Table 255 Naples S PUG a pci Rte eV ORE e OD raat etree ped vuelto OR SU Pad Sa tpa ds 90 Table 25 Applications gt Media Server uaria vk peni ek PCR ERO Fri Pink b e en Enc nu da 92 Table 26 Applications s Download Service 15i isa serais teneur ne Ge bak iik kunani Enina DR ERR KU DUE FERRE UDCN EE ER EKOE 97 Table 27 Applications Download Service gt Add uccisi eei nep HERR dp ete UNE PE CEN a SEE EET URS E ELLAS 99 Table 28 Applications gt Download Service gt Preferences ssssssssssssseeeeeeeeennnene 100 Table 29 Applications gt Web Publ isd cacce nidos ERE FEET ERE Ep Ho Ua EE pel deseen Gru ud RE PAY Gd qa EU t oa etos aad ia 103 Table 30 Anplicatians Brosndoate VEM sicrie aa n aaa E d OmU E aM dE dE DR URI EAE 107 Table 31 Applications gt Broadcatehibig os AO iuis iussu ticdu ssb t iur tamea dau Eus b spa ed edat nd 109 Table 32 AOpen a PHI SSEPVBE sce sacred eaters E iau sr eae tid bns ir peni d go use V legas satt Dir p Gbs 110 Table 33 Applications gt Print Server Rename Lii deter cbr ria Eb tn O8 Dn RI abet ERAN e Rud 110 Ec coc AR ata RUNE M UE tim siadiy 116 Tabe g9 User CONS e 116 Table 36 U
271. zones r Security level for this zone Move the slider to set the security level for this zone Medium Safe browsing and still functional Prompts before downloading potentially unsafe content Unsigned Activex controls will not be downloaded Appropriate for most Internet sites OK Cancel 2 Click the Custom Level button 3 Under Script ActiveX controls marked safe for scripting make sure that Enable is selected the default 4 Click OK to close the window NSA 220 User s Guide Chapter 15 Troubleshooting Figure 97 Security Settings Script Safe ActiveX Controls Security Settings 3 xl Settings Run Activex controls and plug ins Q Administrator approved Q Disable 9 Enable in Q Prompt E Script Activex controls marked safe for scripting Disable O Premp A gt Downloads 5 File download Q Disable 9 Enable ai Cant devunlasd Reset custom settings ee to Medium Reset cmi can see the login screen but cannot log in to the NSA Make sure you have entered the username and password correctly The default username is admin and the default password is 1234 These fields are case sensitive so make sure Caps Lock is not on Turn the NSA off and on e If this does not work see Section 15 3 1 on page 146 to reset the device cannot see the multi language web configurator screens w
Download Pdf Manuals
Related Search
Related Contents
ガスヒートポンプエアコン ビル用マルチG-up 2009/11発行 140p 施工概要 Bulletin d`info AIRDF décembre 2014 Smeg SP861D sink weBoost Home 4G 470101 User Manual portfolio - Jelto von Schuckmann For Parts Call K&T 606-678-9623 or 606-561 組立て部品 寸法図 LT408 Service Manual A CYBEX Pallas 2-fix Copyright © All rights reserved.
Failed to retrieve file