ZyXEL Communications NSA-220 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung ZyXEL Communications NSA-220 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von ZyXEL Communications NSA-220, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung ZyXEL Communications NSA-220 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung ZyXEL Communications NSA-220. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung ZyXEL Communications NSA-220 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts ZyXEL Communications NSA-220
- Den Namen des Produzenten und das Produktionsjahr des Geräts ZyXEL Communications NSA-220
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts ZyXEL Communications NSA-220
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von ZyXEL Communications NSA-220 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von ZyXEL Communications NSA-220 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service ZyXEL Communications finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von ZyXEL Communications NSA-220 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts ZyXEL Communications NSA-220, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von ZyXEL Communications NSA-220 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    www .zyxel.com NSA-220 Network S torage Appliance User ’ s Guide V ersion 2.10 11 / 2 0 0 7 Edition 1 DEFAULT LOGIN Web Ad dress nsa220 Password 1234[...]

  • Seite 2

    [...]

  • Seite 3

    About This User's Guide NSA-220 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the web configurator . A basic knowledge of TCP/IP netw orking concepts and topology will be helpful. Related Document ation • Quick Start Guide The Quick S tart Guide is desig[...]

  • Seite 4

    Document Conventions NSA-220 User’s Guide 4 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User ’ s Guide. 1 W arnings tell you about things that could harm you or your device. " Notes tell you other important informati on (for example, other things you may need to configure or helpful tip s) or[...]

  • Seite 5

    Document Conventions NSA-220 User’s Guide 5 Icons Used in Figures Figures in this User ’ s Guide may use the follo wing generic icons. The NSA icon is not an exact representation of your device. NSA Computer Notebook computer Server Te l e v i s i o n Firewall Router Switch Internet[...]

  • Seite 6

    Safety Warnings NSA-220 User’s Guide 6 Safety Warnings 1 For your safety , be sure to read and follow all warni ng notices and instructions. • Do NOT use this product near water , for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store thin gs on the device. [...]

  • Seite 7

    Safety Warnings NSA-220 User’s Guide 7[...]

  • Seite 8

    Safety Warnings NSA-220 User’s Guide 8[...]

  • Seite 9

    Contents Overview NSA-220 User’s Guide 9 Contents Overview Introduction .......................................... ........................................................................ .......... 23 Getting to Know Y our NS A .............. ................ ................ ................ ................ ................ ........ .. 25 Web [...]

  • Seite 10

    Contents Overview NSA-220 User’s Guide 10[...]

  • Seite 11

    Table of Contents NSA-220 User’s Guide 11 Table of Contents About This User's Guide ........................................... ............................................................. .. 3 Document Conventions.................................................................. ......................................... .4 Safety Warnings [...]

  • Seite 12

    Table of Contents NSA-220 User’s Guide 12 2.6.1 Global Administration Ic ons ............. ................ ................ ................ ................ .......... 41 2.6.2 Navigation Panel ................. ... ... ... .... ... ............. ................ ................ ............. ............. 42 2.6.3 Main Window ... .... ... ...[...]

  • Seite 13

    Table of Contents NSA-220 User’s Guide 13 6.5.1 Choosing A S torage Met hod For a V olume ......... ... ............. ... .... ... ... ... .... ... ... ... ... ....... 77 6.5.2 V olume S tatus . .... ... ... ............. ... ... .... ... ... ... ............. .... ... ... ... ... .... ............. ... ... ... ... .... .. .7 7 6.6 Disk Replaceme[...]

  • Seite 14

    Table of Contents NSA-220 User’s Guide 14 8.14 Adding or Editing a Broadcatching Channel ......... ................ ................ ................... ........ 108 8.15 Printer Sharing .. ................ ................ ............. ................ ................ ................. .......... ....... 109 8.16 Print Server Screen .... .....[...]

  • Seite 15

    Table of Contents NSA-220 User’s Guide 15 12.1 Protection Method s . ....................... ....................... ...................... ....................... ........... ... 135 12.1.1 Configuration F ile Backup and Restoration .......... ............. ................ ................ ..... 135 12.1.2 Memeo Autobackup .......... ..........[...]

  • Seite 16

    Table of Contents NSA-220 User’s Guide 16 Part VI: Appendices and Inde x ........................................................... 163 Appendix A Setting up Y our Computer ’s IP Address ........................................... ................. 165 Appendix B Pop-up Windows, JavaScripts and Java Permissions ................................[...]

  • Seite 17

    List of Figures NSA-220 User’s Guide 17 List of Figures Figure 1 Example of the NSA in a Home Network ... ................. ................ ............. ................ ................ 25 Figure 2 NSA Front Panel . ................ ................ ................ ................ ................ ................. ... ................ 26 Fi[...]

  • Seite 18

    List of Figure s NSA-220 User’s Guide 18 Figure 39 Download Service Tutorial: Paste Link .............. ................ ................ ............. ................ ... .... 55 Figure 40 Download Service T utori al: Apply Pasted Link .. ................ ................ ................. ................ ... 5 5 Figure 41 Download Service T u[...]

  • Seite 19

    List of Figures NSA-220 User’s Guide 19 Figure 82 Applications > Print Server ................ ................ ................ ................ ................. ....... ......... ..1 10 Figure 83 Applications > Print Se rver > Rename .............. ................ ................ ................. ................ .. 1 10 Figure 84 [...]

  • Seite 20

    List of Figure s NSA-220 User’s Guide 20 Figure 125 Internet Options: Security ........... ...... ............. ................ ................ ............. .............. ......... . 182 Figure 126 Security Settings - Java S cripting .. ... ................ ................ ............. ................ ............... ...... 183 Figure 127 [...]

  • Seite 21

    List of Tables NSA-220 User’s Guide 21 List of Tables T able 1 LEDs . ................ ............. ................. ................ ................ ................ ................ .. ..................... ... 27 T able 2 Us er-level Global Labels and Icons ...... ................ ................ ................ ................. ........[...]

  • Seite 22

    List of Tables NSA-220 User’s Guide 22 T able 39 Shares ....... ................ ................ ................ ............. ................. ................ ......... ................ ..... 120 T able 40 Shares > Add Share (or Ch ange Share Properties) ............... ................ ................ .............. 1 21 T able 41 Share[...]

  • Seite 23

    23 P ART I Introduction Getting to Know Y our NSA (25) W eb Configurator Basics (29) T utorials (45) St atus Screen (63)[...]

  • Seite 24

    24[...]

  • Seite 25

    NSA-220 User’s Guide 25 C HAPTER 1 Getting to Know Your NSA This chapter covers the main featur es and applications of the NSA. 1.1 NSA Overview Use the NSA (Network Storage A ppliance) to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA. • Use the COPY button to copy files di[...]

  • Seite 26

    Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 26 Place the NSA behind a firewall and/or IDP (Intrusion Detection and Prevention) device to protect it from attacks from the Internet. " See Chapter 16 on page 155 for a more detailed list of NSA features and list s of compatible hard drives and USB devices. Refer to the Quick S tart G[...]

  • Seite 27

    Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 27 Figure 3 NSA Rear Panel This table describes the NSA’ s LEDs. T able 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned o n and receiving power. Off The NSA is turned off. HDD1/ HDD2 Green On The hard disk drive is connected properly to the NSA. Blinking The NSA is savi[...]

  • Seite 28

    Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 28 1.1.2 COPY Button Use the COPY button on the front panel to copy f iles from a connected USB device to the NSA. The files are stored in a folder created w ithin the public share. The name of the folder created for the copied files consists of the date and time of the copy in year_month_da[...]

  • Seite 29

    NSA-220 User’s Guide 29 C HAPTER 2 Web Configurator Basics This chapter describes how to access the NSA web configurator and provides an overview of its screens. 2.1 W eb Configurator Overview The web configur ator is an HTML-based manage ment interface that allows easy NSA setup and management usin g an Internet browser . Use Internet Explore r [...]

  • Seite 30

    Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 30 Figure 4 NDU Main Screen From the NDU main page click an icon under Admin to see the web configurator screen login screen. 2.2.2 Web Browser Access Open your browser and type in the server name of the NSA (“nsa220” is the default). Figure 5 NSA URL 2.3 Login The default username and p[...]

  • Seite 31

    Chapter 2 Web Configurator Basics NSA-220 User’s Guide 31 Figure 6 NSA Login Screen Y ou should see a screen asking you to change your pas sword (highly recommended) as shown next. T ype a new password (and retype it to confirm) and click Apply or click Ignor e . Figure 7 Change Password Screen 2.4 User-level Screens Overview All users (including[...]

  • Seite 32

    Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 32 Figure 8 My NSA " The web configurator managem ent session automatically ti mes out if it is left idle for 15 minutes. Simp ly log back into the NSA if this happens to you. The icons and language label at th e top-right of the screen ( ) are visible from most screens. Use the tabs at[...]

  • Seite 33

    Chapter 2 Web Configurator Basics NSA-220 User’s Guide 33 2.5 My NSA Screen Use the My NSA screens to mana ge your shares and access the files in folders to which you have acce ss. A share is a set of user access permissions for a specific folder on a volume (gives someone access to a folder). It is equivalent to the W indows concept of a shared [...]

  • Seite 34

    Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 34 The following table describes the labels in this screen. 2.5.1 My NSA Share Browsing Screen Click My NSA and then click a share to open the followi ng screen. Use the My NSA share browsing screens to see and access share contents. • Click a folder ’ s name to go into the folder . • [...]

  • Seite 35

    Chapter 2 Web Configurator Basics NSA-220 User’s Guide 35 The following table describes the labels in this screen. 2.5.2 My NSA Share Browsing Move to or Copy to Screen Select a folder or file in the My NS A sh are browsing screens and click the Move to button or the Copy to button to display a screen like the following . Use this screen to selec[...]

  • Seite 36

    Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 36 2.5.3 My NSA Management Overview Screen Use the My NSA management overvie w screens to see and configure share management details. Click My NSA and then the Manage It button of one of your shares to open the following screen. This screen displays a share’ s management details. Figure 12[...]

  • Seite 37

    Chapter 2 Web Configurator Basics NSA-220 User’s Guide 37 Figure 13 My NSA Change Share Properties The following table describes the labels in the this screen. T able 7 My NSA Change Share Properties LABEL DESCRIPTION Share Name Configure a name to identify this sh are. Type a share name from 1 to 25 5 single- byte (no Chinese characters allowed [...]

  • Seite 38

    Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 38 2.5.5 Share and Folder Names The name ca n only contain the followi ng characters: • Alphanumeric (A-z 0-9) and Unicode. The NSA allows FTP access to shares, folders or files with names en coded in the UTF-8 (8-bit UCS/Unicode T ransformation Format) format. So your FTP c lient must sup[...]

  • Seite 39

    Chapter 2 Web Configurator Basics NSA-220 User’s Guide 39 2.5.6 Share Paths A share path is the full path to a folder on a volume that will be shared, for example, /mynsa/ topsecret/ugs/. This is indepe ndent from a “share name” which is the name shown for this share when accessing the share via CIFS or FTP . The path should start with a &apo[...]

  • Seite 40

    Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 40 Figure 14 Password The following table describes the labels in this screen. 2.6 Administration Screens The A dministration tab displays when you log i n as the administrator . Click Administration in the My NSA screens to open the advanc ed administration screens. The St a t u s screen is[...]

  • Seite 41

    Chapter 2 Web Configurator Basics NSA-220 User’s Guide 41 Figure 15 S tatus 2.6.1 Global Administration Icons The icons and language label at the top-right of the screen ( ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels. 1 2 3 4 T able 9 Global Labels and Icons LABEL/ICON DESC[...]

  • Seite 42

    Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 42 2.6.2 Navigation Panel The navigation panel on t he left of the scr een ( ) contains screen links. Click a link to display sub-links. There are no sub-links for the St a t u s screen. Certain screens also contain hyper links that allow you to jump to another screen. Click the St a t u s i[...]

  • Seite 43

    Chapter 2 Web Configurator Basics NSA-220 User’s Guide 43 2.6.3 Main Window The main window () shows the screen you select in the na viga tion panel. It is disc ussed in the rest of this document. The St a t u s screen is the first administration screen to display . See Chapter 4 on page 63 for more informat ion about the St a t u s screen. 2.6.4[...]

  • Seite 44

    Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 44 Click the Edit icon to jump to related item ’s configuration screen. This is a user icon. See the chapter on u ser accounts for detailed info rmation on variants of this icon. This is a share i con. See the chapter on shares for d etailed information on variants of this icon. This icon [...]

  • Seite 45

    NSA-220 User’s Guide 45 C HAPTER 3 Tutorials This chapter provides tutorials that show how to use the NSA. 3.1 File Sharing T utorials The following sections cover using the NSA for file sharing. This chapter assumes you have already followed the Quick Start Guide instructio ns to perform initial setup and configuration (so you have a wo rking vo[...]

  • Seite 46

    Chapter 3 Tutorials NSA-220 User’s Guide 46 Figure 18 Users 3 Configure the screen as follows and write down the username and password to give to Jimmy . If the username and password are th e same as Jimmy’ s W indows login, Jimmy will not need to enter a username and passw ord when he logs int o his share from his computer . Set the Account T [...]

  • Seite 47

    Chapter 3 Tutorials NSA-220 User’s Guide 47 3.1.2 Creating a Share Suppose Bob has already created separate acc ou nts for his sons Jimm y and Kevin. Now Bob wants to create a share for each son. He als o wants to make sure that each son can only acces s his own share (t o keep them from deleting each other ’ s files). This is how he would do i[...]

  • Seite 48

    Chapter 3 Tutorials NSA-220 User’s Guide 48 Figure 23 Shares > Create > Browse > Create Folder Example 4 Select the new folder and click Apply . Figure 24 Shares > Create > Browse > New Folder Example 5 Configure the screen as follows and click Apply . (Make sure you also set the anonymous-ftp access to Deny ).[...]

  • Seite 49

    Chapter 3 Tutorials NSA-220 User’s Guide 49 Figure 25 Shares > Create Example Now that Bob has created Jimmy’ s share, he can go through the steps again to create another share for Kevin. Then he can see the rest of the tutorials for how to us e the shares. 3.1.3 Accessing a Share From Windows Explorer If you map a NSA share (where data is s[...]

  • Seite 50

    Chapter 3 Tutorials NSA-220 User’s Guide 50 4 Enter the username and password for Jimmy’ s account and click OK . Y ou do not need to do this if the username and passwo rd are the same as Jimmy’ s W indows login. Figure 28 Enter Network Password 5 After the mapping is done, you ca n then simply copy and paste or dra g and drop files from/to y[...]

  • Seite 51

    Chapter 3 Tutorials NSA-220 User’s Guide 51 Figure 30 FTP Example: T yping the FTP T a rget 2 Enter your password and c lick Login . Figure 31 FTP Example: Enter the Password 3 Now you can access files and copy files from/to your local computer ’ s drives to or from this network folder . 1 Figure 32 FTP Example: Logged In 3.1.5 Accessing a Shar[...]

  • Seite 52

    Chapter 3 Tutorials NSA-220 User’s Guide 52 Figure 33 My NSA User Login 2 Click a share to see the top level of the s hare’ s contents. Here is the Jimmy share. Figure 34 My NSA User Login 3 Click a folder ’ s file name to browse the fold er . Y ou can open files or copy them to your computer . However at the time of writing you cannot use th[...]

  • Seite 53

    Chapter 3 Tutorials NSA-220 User’s Guide 53 1 Open your Internet browser (thi s example uses Internet Explorer). 2 Find a download link for the file you wa nt. In this example, www .zyxel.com has a Download Now link for downloading a datasheet for ZyXEL ’ s P-2301RL-P1C (a device for making phone calls over the Internet). Figure 35 Download Lin[...]

  • Seite 54

    Chapter 3 Tutorials NSA-220 User’s Guide 54 Figure 36 Copy Shortcut 4 Log into the NSA web configurator (see Sectio n 2.3 on page 30 ) using the administrator account and cl ic k Download Service . Figure 37 Download Service T utorial: My NSA 5 Click Add . Figure 38 Download Service T utorial: Download Service 6 Right-click the URL field and sele[...]

  • Seite 55

    Chapter 3 Tutorials NSA-220 User’s Guide 55 Figure 39 Download Service T utorial: Paste Lin k 7 The URL displays in the URL field. Click Apply . Figure 40 Download Service T utorial: Apply Pasted Link 8 After a few moments, the download task appears in the Download Service screen’ s Active tab. Figure 41 Downloa d Service T utori al: Download T[...]

  • Seite 56

    Chapter 3 Tutorials NSA-220 User’s Guide 56 3.3 Broadcatching T utorial Use broadcatching to ha ve the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV In ternet television channel. See Sectio n 8.12 on page 105 for mor[...]

  • Seite 57

    Chapter 3 Tutorials NSA-220 User’s Guide 57 Figure 43 Copy Link Location 3 Log into the NSA web configurator (see Sectio n 2.3 on page 30 ) using the administrator account and cl ic k Administration > Applications > Br oad catch ing . Figure 44 Broadcatching T utorial: My NSA 4 Click Add Channel .[...]

  • Seite 58

    Chapter 3 Tutorials NSA-220 User’s Guide 58 Figure 45 Broadcatching T utorial: Broadcatching 5 Right-click the URL field and select Paste . Figure 46 Broadcatching T utorial: Paste Link 6 The URL displays in the URL fi e ld. 7 Select a policy for what items to download. This example uses Manual so you will be able to select individual items to do[...]

  • Seite 59

    Chapter 3 Tutorials NSA-220 User’s Guide 59 3.4 Printer Server T utorial Do the following to have th e NSA let computers on your network share a printer . See www .zyxel.com for a list of compatible printers. 1 Make sure the NSA is on and the SYS ligh t is on steady (not blinking). 2 Use a US B cable to connec t the printer ’ s USB port to one [...]

  • Seite 60

    Chapter 3 Tutorials NSA-220 User’s Guide 60 Figure 51 Printer Driver Needed 8 Use the wizard screens to install the printer driver on the computer . Y ou may need to get the file from the printer ’ s CD or the printer manufacturer ’ s website (the driver is not installed on the NSA). " Y ou must install the printer driver on eac h comput[...]

  • Seite 61

    Chapter 3 Tutorials NSA-220 User’s Guide 61 " Repeat steps 5 to 8 on your other comput ers so they can also use the printer .[...]

  • Seite 62

    Chapter 3 Tutorials NSA-220 User’s Guide 62[...]

  • Seite 63

    NSA-220 User’s Guide 63 C HAPTER 4 Status Screen This chapter introduces the NSA St a t u s screen. 4.1 St atus Screen The St a t u s screen is the first main web configurator screen you see after you enter the administrator screens. T o view the status screens, click St a t u s on the top-left of the navigation panel. Figure 54 S tatus[...]

  • Seite 64

    Chapter 4 Status Screen NSA-220 User’s Guide 64 The following table describes the labels in this screen. T able 12 Status LABEL DESCRIPTION S tatus Click Status to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the edit icon to go to the screen where y[...]

  • Seite 65

    Chapter 4 Status Screen NSA-220 User’s Guide 65 4.1.1 Session Example (Windows) Open windows explorer and type two back sl ashes followed by the NSA name or IP address. Initially you can only read and write to the Public , Vi d e o , Musi c , and Photo folders until you create other shares on the NSA. This session is then displayed as shown in Fi[...]

  • Seite 66

    Chapter 4 Status Screen NSA-220 User’s Guide 66[...]

  • Seite 67

    67 P ART II System Setting and Applications System Setting Screens (69) Storage Screens (73) Network Screen (85) Application Screens (89)[...]

  • Seite 68

    68[...]

  • Seite 69

    NSA-220 User’s Guide 69 C HAPTER 5 System Setting Screens This chapter discusses the system setting screens. 5.1 System Setting Screens This section gives an overview of the various features included in th e system setting screens. Use the system setting screens to: • Specify the NSA’ s W indows/CIFS server name and workgroup name. • Chose [...]

  • Seite 70

    Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 70 Figure 56 System Setting > Server Name The following table describes the labels in these screens. 5.3 Date/T ime Use this screen to select a time zone and a time server from which your NSA can get the time and date. This time is then used in NSA logs and alerts. 5.3.1 T i m e Lag T ime [...]

  • Seite 71

    Chapter 5 Syst em Setting Scre en s NSA-220 User’s Guide 71 Figure 57 System Setting > Date/T ime The following table describes the labels in this screen. T able 14 System Setting > Date/Time LABEL DESCRIPTION Current System Date T ime Sett ing Current T ime This field displays th e ti me of your NSA. Current Date This field di sp lays the [...]

  • Seite 72

    Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 72 T ime Server Address Select a time se rver from the drop-down list box or select Spec if y my own time server and enter th e ti me server you wish to use in the field below . Check with your ISP/network admi nistrator if you ar e unsure of this information. Synchronize Now Click this butto[...]

  • Seite 73

    NSA-220 User’s Guide 73 C HAPTER 6 Storage Screens This chapter covers storage system s, volumes and disks on the NSA. 6.1 St orage Introduction Use the System > S torage screens to manage volumes and disk s (both internal and external). " Several NSA features require a valid internal volume. • V olumes are storage areas on disks. See S[...]

  • Seite 74

    Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 74 The following table describes the labels in this screen. Y ou see a warning sc reen before you dele te a volume. Figure 59 Delete a V olume W arning Screen 6.3 Creating an Internal V olume Click the Create an Internal V olume button in the S tor age screen as shown in Figure 58 on page 73 to o[...]

  • Seite 75

    Chapter 6 Storage Screens NSA-220 User’s Guide 75 " Creating a volume formats the hard driv e. All data on t he disk will be lost. Figure 60 System > S torage > Create an Internal V olume The following table describes the labels in this screen. T able 16 System > S torage > Create an Internal V olume LABEL DESCRIPTION V olume Nam[...]

  • Seite 76

    Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 76 6.4 Editing a V olume Click an internal volume’ s Edit icon in the System > S torage screen as shown in Figure 58 on page 73 to open the following screen. Use this screen to chan ge the volume’ s name. Figure 61 System > S torage > Edit The following table describes the labels in [...]

  • Seite 77

    Chapter 6 Storage Screens NSA-220 User’s Guide 77 Storage ef ficiency assumes all drives are of identical size. Performance rankings are approximations. 6.5.1 Choosing A S torage Method For a V olume The following is a guide to help you choose a storage method for the various number of disks supported on the NSA. See Section 6.9 on page 81 for th[...]

  • Seite 78

    Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 78 • OK means the USB connected device is functioning properly . • Resync when you create a RAID volume. • Recovering appears when repairing a RAID 1 volume. (A RAID1 volume was once degraded, but yo u have installed a new disk and the NSA is restoring the RAID1 volume to a healthy state.) [...]

  • Seite 79

    Chapter 6 Storage Screens NSA-220 User’s Guide 79 6.6.1 Resychr onizing or Re covering a RAID 1 V olume Resychronizing or recovering a RAID 1 volume that was down is done block-by-b lock, so the time it takes depends more on the size of your ha rd drive(s) than the amount of data y ou have on them. " Do not restart the NSA while the NSA is r[...]

  • Seite 80

    Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 80 " Creating a volume formats the drive. All data on the di sk will be lost. Figure 62 System > S torage > Create an External V olume The following table describes the labels in this screen. 6.8 External Disks Y ou may connect USB storage devices that supp ort the following file syste[...]

  • Seite 81

    Chapter 6 Storage Screens NSA-220 User’s Guide 81 6.9 RAID This section contains theoretical background on JBOD and the RAID levels used on the NSA. Skip to the next section if you already unde rstand RAID and know what stor age system you want to use on the NSA. Redundant Array of Independent Disks (RAID) is a method of storing data on multiple [...]

  • Seite 82

    Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 82 6.9.1 JBOD JBOD allows you to combine multip le physical disk drives into a single virtual one, so they appear as a single large disk. JBOD can be used to turn multiple differen t-sized drives into one big drive. For example, JBOD could convert 80 GB and 100 GB drives into one large logical dr[...]

  • Seite 83

    Chapter 6 Storage Screens NSA-220 User’s Guide 83 6.9.3 RAID 1 RAID 1 creates a n exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity . The followi ng figure shows two disks in a single RAID 1 volume with mirrore d data. Data is duplicated acro ss two disks , so if one disk[...]

  • Seite 84

    Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 84[...]

  • Seite 85

    NSA-220 User’s Guide 85 C HAPTER 7 Network Screen This chapter discusses the network configuration screen. 7.1 Network Settings Use the network configuration screen to assign the NSA a dynamic or static IP address and DNS information. 7.1.1 IP Address The NSA needs an IP address to communicate with the media servers on your network. The NSA can g[...]

  • Seite 86

    Chapter 7 Net wo rk Scree n NSA-220 User’s Guide 86 In the following example, the NSA has jumbo frames enabled and set to 8KB frames. This means the computer , notebook computer , and sw itch must also have jumbo frames enabled and be capable of supporting 8KB frames. Figure 63 Jumbo Fram es 7.2 Network Config Screen Click System Setting > Net[...]

  • Seite 87

    Chapter 7 Network Screen NSA-220 User’s Guide 87 Figure 64 System Setting > Network > TCP/IP The following table describes the labels in this screen. T able 23 System Setting > Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NSA get IP address information automatically . If no IP address informatio[...]

  • Seite 88

    Chapter 7 Net wo rk Scree n NSA-220 User’s Guide 88 Secondary DNS Server T ype a secondary DNS server IP address. Jumbo Frames Jumbo frames impr ove network pe rforman ce. Y ou must have a 1 Gbps (Gigabit Ethernet) network that suppor ts jumbo frames. Select the largest size of frame that all of your netw ork devices (includi ng computer Ethernet[...]

  • Seite 89

    NSA-220 User’s Guide 89 C HAPTER 8 Application Screens This chapter discusses the application screens. 8.1 Application Screens Use the application screens to: • Configure settings for FTP file transfers to/from the NSA. See Section 8.2 on page 89 . • Share files with me dia clients. See Section 8.3 on page 90 . • Download files from the Int[...]

  • Seite 90

    Chapter 8 Application Screens NSA-220 User’s Guide 90 Figure 65 Applications > FTP The following table describes the labels in this screen. 8.3 Sharing Media Files on Y our Network The media server feature lets anyone on your netw ork play video, mus ic, and photo s from the NSA (without having to copy them to another computer). The NSA can fu[...]

  • Seite 91

    Chapter 8 Application Screens NSA-220 User’s Guide 91 • The media server is a convenient way to share files you download using the broadcatching service (see Chapter 8 on page 10 5 ). • Media client software is included on the CD. • Hardware-based media clients like the DM A-1000 can also pl ay the files. See Appendix on page 160 for the su[...]

  • Seite 92

    Chapter 8 Application Screens NSA-220 User’s Guide 92 8.3.2 Songs and Videos from the iT unes S tore After using iT unes on your computer to download songs and videos from Apple’ s iT unes Store, you can copy them to the NSA. Many of these songs and videos have DRM (Digital Rights Management). At the time of writing, you can use your Apple a cc[...]

  • Seite 93

    Chapter 8 Application Screens NSA-220 User’s Guide 93 8.5 Download Service The NSA’ s download service downloads files from the Internet directly to the NSA. Y ou do not have to download to your co mp uter and then copy to the NSA. This can free up your computer ’ s system resources. The download service also handles your broadcatching downlo[...]

  • Seite 94

    Chapter 8 Application Screens NSA-220 User’s Guide 94 8.5.1 BitT o rrent The NSA includes a BitT orrent c lient for fast downloading and sharing of large files (such as educational public domain vide os ). With BitT orrent, you share while you ’re do wnloading the file. BitT orrent breaks up the file and distribute s it in hundreds of chunk s. [...]

  • Seite 95

    Chapter 8 Application Screens NSA-220 User’s Guide 95 Figure 68 Firewall • Stateful packet inspection to control access between the Internet and your network and protect your NSA (and comp uters) from hacking attacks. • IDP (Intrusion Detection an d Prevention) to detect malicious pa ckets within normal network traffic and take immediate acti[...]

  • Seite 96

    Chapter 8 Application Screens NSA-220 User’s Guide 96 Figure 70 Firewall Configured to Allow Incoming BitT orrent Requ ests 8.6 Download Service Screen Click Applications > Download Service to open the following sc reen. Use this screen to manage the NSA’ s file downloads. " By default, the NSA sa ves downloads in the admin share’ s d[...]

  • Seite 97

    Chapter 8 Application Screens NSA-220 User’s Guide 97 Figure 71 Applications > Download Service The following table describes the labels in this screen. T able 26 Applications > Download Service LABEL DESCRIPTION Enable Download Servi ce Use this option (and the Apply button) to turn the download service o ff or on. If you turn off the serv[...]

  • Seite 98

    Chapter 8 Application Screens NSA-220 User’s Guide 98 Refresh Click this button to update the information displ ayed on the screen. Preferences Click this butto n to open a screen whe re you can set the default locati on for saving downloads and configure your BitT orrent settings. The table lists your downloads. Click a column’s heading to sor[...]

  • Seite 99

    Chapter 8 Application Screens NSA-220 User’s Guide 99 8.7 Adding a Download T ask Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 3.2 on page 52 provides a tutorial on adding a download task. Figure 72 Applications > Download Service > Add The[...]

  • Seite 100

    Chapter 8 Application Screens NSA-220 User’s Guide 100 8.8 Configuring Y our General Download Preferences Click Applications > Download Service > Prefer ences to open the following screen. Use this screen to set the default location for saving down loads and configure your BitT orrent settings. Figure 73 Applications > Download Service &[...]

  • Seite 101

    Chapter 8 Application Screens NSA-220 User’s Guide 101 8.9 W eb Publishing W eb publishing lets y ou “publish” shares (containing folders and files) on the NSA so people can access the files using a web brows er without having to log into th e My NSA screens. This way you can share files w ith oth ers without them having to kn ow and enter a [...]

  • Seite 102

    Chapter 8 Application Screens NSA-220 User’s Guide 102 8.9.2 Web Publishing Port Number If the web-published shares use a port number ot her than 80 (the normal port for web traffic), users must include it after the NSA’ s IP address in order to access the NSA’ s web-published shares. For example, say you specified port 80 80, the NSA’ s IP[...]

  • Seite 103

    Chapter 8 Application Screens NSA-220 User’s Guide 103 Figure 75 Applications > Web Publishing The following table describes the labels in this screen. T able 29 Applications > Web Pub lishing LABEL DESCRIPTION Disable / Enable Web Publishing Turn on web publishing to let people access files in the publi shed shares using a web browser , wi[...]

  • Seite 104

    Chapter 8 Application Screens NSA-220 User’s Guide 104 8.1 1 W eb Publishing Example This example covers ho w to configure the W eb Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into th e My NSA screens and shows how to access the share through the Internet. 1 Click Applications > W eb P[...]

  • Seite 105

    Chapter 8 Application Screens NSA-220 User’s Guide 105 Figure 77 Browsing to an NSA Share Example • Click a file’ s link to open the file. • Right-click a file’ s link and select Save T arget As.. (in Internet Explorer) to save a copy of the file. • Click a label in the heading row to sort the files by that criteria. • T o customize h[...]

  • Seite 106

    Chapter 8 Application Screens NSA-220 User’s Guide 106 RSS (Really Simple Syndication) is a format for delivering frequent ly updated digital cont ent. At the time of writing, the NSA supports RSS 2.0 feeds. W ebsites with a feed usually display a feed icon (shown next). Copy a nd paste the feed’ s URL into the Applications > Broadcatching &[...]

  • Seite 107

    Chapter 8 Application Screens NSA-220 User’s Guide 107 Figure 79 Applications > Broadcatching The following table describes the labels in this screen. T able 30 Application s > Broadcat ching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button. A screen opens for [...]

  • Seite 108

    Chapter 8 Application Screens NSA-220 User’s Guide 108 8.14 Adding or Editing a Broadcatching Channel Click Applications > Broadcatching > Add Channel to open the followi ng screen. Use the Add screen to s ubscribe the NSA to a channel’ s feed so you can view the channel. Y ou also select policies for downloading and deleting the channel?[...]

  • Seite 109

    Chapter 8 Application Screens NSA-220 User’s Guide 109 The following table describes the labels in this screen. 8.15 Printer Sharing The NSA can act as a print server . A print serv er lets multiple computers share a printer . Connect a printer to the NSA’ s USB port to let multiple computers on your network use it. See www .zyxel.com for a lis[...]

  • Seite 110

    Chapter 8 Application Screens NSA-220 User’s Guide 11 0 8.16 Print Server Screen Click Applications > Pri nt Server to open the following screen. Use this screen to v iew and manage the NSA’ s list of printers and print jobs. Figure 82 Applications > Print Server The following table describes the labels in this screen. 8.17 Print Server R[...]

  • Seite 111

    Chapter 8 Application Screens NSA-220 User’s Guide 111 Apply Click Apply to save your cha nge s back to the NSA. Cancel Click Cancel to clo se this screen w ithout saving your change s. T able 33 Applications > Prin t Server > Rename LABEL DESCRIPTION[...]

  • Seite 112

    Chapter 8 Application Screens NSA-220 User’s Guide 11 2[...]

  • Seite 113

    11 3 P ART III User Account s and Shares Users (1 15) Shares (1 19)[...]

  • Seite 114

    11 4[...]

  • Seite 115

    NSA-220 User’s Guide 11 5 C HAPTER 9 Users This chapter introduces the Users screens of the NSA. 9.1 User Account s Introduction Use the Users screens to crea te and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. • Assign individual users specific acce[...]

  • Seite 116

    Chapter 9 Use rs NSA-220 User’s Guide 11 6 The following table describes the labels in this screen. 9.2.1 User Icons The following table describes the user icons. 9.3 Adding or Editing an Account Click the Add Account button in the Users screen to open the following screen. Use this screen to create or edit a NSA user ac count with NSA access pas[...]

  • Seite 117

    Chapter 9 Users NSA-220 User’s Guide 11 7 The following table describes the labels in this screen. 9.3.1 Usernames Enter a username from one to 32 characters. Th e first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characte rs are not allow ed as the first character . The username can only contain the following characters[...]

  • Seite 118

    Chapter 9 Use rs NSA-220 User’s Guide 11 8 • pc-guest •a d m i n • password 9.4 Delete Account Screen In the Users screen, select an acc ount and click Delete Account to open the fo llowing screen. Use this screen to remov e a us er account. Figure 86 Users > Delete Account The following table describes the labels in this screen. T able [...]

  • Seite 119

    NSA-220 User’s Guide 11 9 C HAPTER 10 Shares This chapter introduces the Shares screens of the NSA. 10.1 Shares Introduction Use the Shares screens to create and manage shares. A share is a set of user access permissions mapped to a spec ific folder on a vo lume. It is equivalent to the W indows concept of a shared folder , but is inde pendent of[...]

  • Seite 120

    Chapter 10 Shares NSA-220 User’s Guide 120 Figure 87 Shares The following table describes the labels in this screen. See T able 38 on page 1 19 for icon details. 10.2 Adding or Editing Share Click the Add Shar e or Change Share Pr operties in the Shar es screen to open the following screen. Use this screen to create a new shar ed folder . T able [...]

  • Seite 121

    Chapter 10 Shares NSA-220 User’s Guide 121 Figure 88 Shares > Add Share The following table describes the labels in this screen. T able 40 Shares > Add Share (or Change Share Properties) LABEL DESCRIPTION Share Name T ype a share name from 1 to 255 si ngle-byte (n o Chin ese characters allowed for example) ASCII characters. The name cannot [...]

  • Seite 122

    Chapter 10 Shares NSA-220 User’s Guide 122 10.2.1 Public and ANON YMOUS Share Access Right s If you make a share public, u sers do not need to log in. W ith ANONYMOUS FTP , you must enter either 'anonymo us' or 'ftp' as the username. Any other name is considered a username, so must be valid and have a corresp onding correct pa[...]

  • Seite 123

    Chapter 10 Shares NSA-220 User’s Guide 123 The following table describes the labels in this screen. T able 41 Shares > Share Path Browse LABEL DESCRIPTION Create Folder T ype a folder name and click Create Folder to make a new folder . The name can be 1 to 255 single -byte (no Chinese characters allowed for example) ASCII characters. The name [...]

  • Seite 124

    Chapter 10 Shares NSA-220 User’s Guide 124[...]

  • Seite 125

    125 P ART IV Maintenance, Protecting Dat a, and Media Client Maintenance Screens (127) Protecting Y our Data (135) Media Client Software (137)[...]

  • Seite 126

    126[...]

  • Seite 127

    NSA-220 User’s Guide 127 C HAPTER 11 Maintenance Screens This chapter discusses the Maintenance screens. 1 1.1 Maintenance Overview Use the maintenance screens to: • V iew logs • Manage the NSA configuration file • Upload new firmware • Restart or shut down yo ur NSA 1 1.2 Log Click Maintenance > Log to display the following screen. Th[...]

  • Seite 128

    Chapter 11 Maintenance Screens NSA-220 User’s Guide 128 The following table describes the labels in this screen. 1 1.3 Log Classes The following table shows information on log classes. 1 1.4 Log Severity Levels The following table shows informa tion on log severity levels. Levels range from 0 to 6 with 0 being the most severe level log and 6 bein[...]

  • Seite 129

    Chapter 11 Maintenance Screens NSA-220 User’s Guide 129 1 1.5 Log Messages Here are some example log messages. 4 W arning 5N o t i c e 6I n f o T able 44 Log Severity Levels (continue d) LEVEL DESCRIPTION T able 45 Log Messages CLASS SEVERITY MESSAGE Network NOTICE %s is active beca use of changing Port Group. Enable DHCP clien t. Network NOTICE [...]

  • Seite 130

    Chapter 11 Maintenance Screens NSA-220 User’s Guide 130 Services W ARNING Reaching Maximum Allowed Rules Services W ARNING Rule is empty Services W ARNING The Rule Does Not Exist Services NOTICE FTP server stops Services NOTICE FTP server st arts Services INFO Clock timezone is set to GMT%s Services INFO Clock timezone is set to default Services [...]

  • Seite 131

    Chapter 11 Maintenance Screens NSA-220 User’s Guide 131 1 1.6 Configuration Click Maintenance > Configuration to open the following screen. Use the Configuration screen to back up or restore the NSA configuratio n settings and enable or disable the hardw are reset button. Figure 91 Maintenance > Config ur ation The following table describes[...]

  • Seite 132

    Chapter 11 Maintenance Screens NSA-220 User’s Guide 132 Figure 92 Maintenance > FW Up gr ade The following table describes the labels in this screen. 1 1.8 Shut down Click the Maintenance link in the Navigation pa nel and t hen click the Shutdown link or the Shutdown tab to access the Maintenance > Shutdown screen. Use this screen to turn o[...]

  • Seite 133

    Chapter 11 Maintenance Screens NSA-220 User’s Guide 133 When you cli ck the Restart button a pop-up screen will appear asking yo u to confirm. Click OK to continue or Cancel to quit the restart. Figure 94 Maintenance > Shut down > Confirm Restart When you cli ck the Shutdown button a pop-up screen will ap pear asking you to confirm. Click O[...]

  • Seite 134

    Chapter 11 Maintenance Screens NSA-220 User’s Guide 134[...]

  • Seite 135

    NSA-220 User’s Guide 135 C HAPTER 12 Protecting Your Data This chapter compares the different ways of pr otecting data on the NSA and explains how to use backup man age ment software inc l uded on the CD. 12.1 Protection Methods There are a variety of wa ys to protect your data on the NSA. Below is a su mmary table of what can be done in each sit[...]

  • Seite 136

    Chapter 12 Prot ecting Your Data NSA-220 User’s Guide 136 " Configuration File Backup and Restorati on does not affect da t a (your files and folders), volumes on the NSA. 12.1.2 Memeo Autobackup Use the Memeo Au tobackup software (included on the C D) on your com puter to sche dule and manage backups. Y ou can backup from yo ur co mp uter t[...]

  • Seite 137

    NSA-220 User’s Guide 137 C HAPTER 13 Media Client Software This chapter introduces the media cl ient software incl uded on the CD. 13.1 Media Client Introduction The NSA can function as a server to allo w DLNA (Digital Living Network Alliance) compliant media clients to play files. The DLNA is a group of leading pers onal computer and electronics[...]

  • Seite 138

    Chapter 13 Media Client Software NSA-220 User’s Guide 138[...]

  • Seite 139

    NSA-220 User’s Guide 139 C HAPTER 14 Memeo Autobackup Software This chapter introduces the Memeo Autobackup software included on the CD. 14.1 Memeo Autobackup Introduction Use the Memeo Autobackup softwa re included on the CD to au tomatically back up selected files from your computer to the NSA whenever you modify the files. Y ou can have Meme o[...]

  • Seite 140

    Chapter 14 Memeo Autobackup So ftware NSA-220 User’s Guide 140[...]

  • Seite 141

    141 P ART V T roubleshooting and S pecifications T roubleshooting (143) Product Specification s (155)[...]

  • Seite 142

    142[...]

  • Seite 143

    NSA-220 User’s Guide 143 C HAPTER 15 Troubleshooting 15.1 T roubleshooting Overview This chapter offers some sugg estions to solve problems you might encounter . The potential problems are divided into the following categories. • Power , Hardware, Connections, and LEDs • NSA Login and Access • Reset the NSA • I Cannot Access The NSA • E[...]

  • Seite 144

    Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 144 V An HDD LED is orange. Orange means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector , but the LED stays orange until the NSA restarts. Even if the hard drive still functions, it is recommended that you re[...]

  • Seite 145

    Chapter 15 Troubleshooting NSA-220 User’s Guide 145 V The LAN LED (by the LAN port) is of f. • Make sure the Ethernet cable is connected pr operly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it’ s connected directly to a computer , make sure that the computer network card is working (p in[...]

  • Seite 146

    Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 146 • By default, the NSA gets an IP address au tomatically . The NSA assigns itself an IP address if no device assigns one. If your co mputer is also set to get an IP address automatically , the compute r and the NSA can both assign themselves IP addresses and communicate. See Chapter 7 on p[...]

  • Seite 147

    Chapter 15 Troubleshooting NSA-220 User’s Guide 147 • Confirm that the computer running the NDU has a network connection. See the section on the NSA’ s LAN connection for related information. • The computer running the NDU can only discover NSAs in the same subnet. NSAs connected to the same switch or router as your NDU computer are usually[...]

  • Seite 148

    Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 148 Figure 97 Security Settings - Script S afe ActiveX Controls V I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the user name and password correctly . The default username is admin , and the default password is 1234 . These fields are case-sensitive,[...]

  • Seite 149

    Chapter 15 Troubleshooting NSA-220 User’s Guide 149 • Check that the NSA is turned on and connected to the network. T ry to ping th e NSA or use the NDU to discover it. • Check that you entered your login name and password correctly . • Check that the share exists and check its access settings. • Check if the shared folder is a subfolder [...]

  • Seite 150

    Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 150 15.6 Some Features’ Screens Do Not Display V Many NSA features require a valid internal volume. Features like the print server , download se rvice, broadcatching, FTP and W indows/CIFS access will not work without a valid internal vo lume. Make sure you ha ve a volume on an internal disk [...]

  • Seite 151

    Chapter 15 Troubleshooting NSA-220 User’s Guide 151 2 Go to Applications > Media Server . Make sure the share containing the music and video files is published and the iT unes server option is enabled. 3 If an iT unes client is connected, the NSA’ s iT unes server function scans the published media server folders for files every three mi nut[...]

  • Seite 152

    Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 152 1 Make sure the files are a format s upported by iT unes. See Section 16.5 on page 160 . 2 If you have files from the iTunes S tore tha t use DRM, you need to use your App le account ID and password to authorize other computers to play the files. Apple pe rmits you to authorize up to five c[...]

  • Seite 153

    Chapter 15 Troubleshooting NSA-220 User’s Guide 153 • W eb publishing uses TCP prot ocol and the port number you specify . Make sure there i s not another service using TCP protocol with the same port number . See Appendix C on page 187 for a list of common services and their associated protocols and port numbers. • If Firefox access to the s[...]

  • Seite 154

    Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 154[...]

  • Seite 155

    NSA-220 User’s Guide 155 C HAPTER 16 Product Specifications See also Chapter 1 on pa ge 25 for a general overview of the key features. 16.1 Physical Features These are the main external physical features. 16.2 Firmware Features These are some of the main firmware features of the NSA. T able 51 Physical Features USB Ports 2 USB (version 2) ports. [...]

  • Seite 156

    Chapter 16 Product Specifications NSA-220 User’s Guide 156 16.3 S pecification T ables The NSA hardwa re sp e cif i cations are shown in the following table. RAID File S torage Use RAID 0 if you want pure write speed and /or maximum capacity for your drives, and/or you have ot her means of protecting your data. Use RAID 1 if you have two drives a[...]

  • Seite 157

    Chapter 16 Product Specifications NSA-220 User’s Guide 157 The NSA firmware specif ications are shown in the following table Compatible Hard Disks A SA T A I an d SA T A 3.0 Gbit/s (Serial Advanced T echnology Attachment) compatible hard drives. Maximum S torage Capacity 1.5 TB (with two 750 GB hard drives installed) is the largest storage capaci[...]

  • Seite 158

    Chapter 16 Product Specifications NSA-220 User’s Guide 158 The following list, which is not exhaustive, illustrates the standards and recommendations supported in the NSA. Supported Cl ients Windows 2000 Professional/Server Windows XP Home/Professional Windows 2003 Windows Vista Linux Maximum Number of Users Allowed 100 A Maximum Number of Concur[...]

  • Seite 159

    Chapter 16 Product Specifications NSA-220 User’s Guide 159 ISO 15740 Picture T ransfer Protocol (PTP) from the International imaging Industry Association allows you to transfe r pi cture s from digital cameras or other devices without needing add itional device drivers. RFC 1001 (STD-19) - Protocol standard fo r NetBIOS service on a TCP/UDP trans[...]

  • Seite 160

    Chapter 16 Product Specifications NSA-220 User’s Guide 160 16.4 Supported Media Server Content Format s The following describes the deta ils about the files that the NSA media server can publish. * Files may be converted to JPEG to allow play b ack on client applicatio ns that do not support the original file formats. " Not all published fil[...]

  • Seite 161

    Chapter 16 Product Specifications NSA-220 User’s Guide 161 " This table is a laboratory test of NSA power consum ption for your reference only . 16.7 Comp atible Hard Disks The following hard disks have been tested an d are known to be compatible with the NSA. T able 57 Power Consumption in Watts (W) POWER SOURCE SYSTEM BOOT UP SYSTEM READ/W[...]

  • Seite 162

    Chapter 16 Product Specifications NSA-220 User’s Guide 162[...]

  • Seite 163

    163 P ART VI Appendices and Index Setting up Y our Computer ’ s IP Address (165) Open Source Licences (191) Legal Information (221) Customer Support (223) Index (229)[...]

  • Seite 164

    164[...]

  • Seite 165

    NSA-220 User’s Guide 165 A PPENDIX A Setting up Y our Computer ’ s IP Address All computers must have a 10M or 100M Et hernet adapter card and TCP/IP installed. W indows 95/98/Me/NT/2000/XP , M a cintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your co[...]

  • Seite 166

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 166 Figure 100 WIndows 95/98 /Me: Networ k: Configuratio n Inst alling Components The Network window Configuration tab displays a list of installed components. Y ou need a network adapter , the TCP/IP protocol and Client for Microsoft Netwo rks. If you need the adapter: 1 In [...]

  • Seite 167

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 167 Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically . • If you have a static IP address, sele[...]

  • Seite 168

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 168 Figure 102 Windows 95/98/Me : TCP/IP Pr operties: DNS Configuration 4 Click the Gateway tab. • If you do not know you r ga teway’ s IP addr ess, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add [...]

  • Seite 169

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 169 Figure 103 Windows XP: S tart Menu 2 In the Control Panel , double-click Network Connections ( Network and Dial-up Connections in W indow s 20 00/NT). Figure 104 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Pr operties .[...]

  • Seite 170

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 170 Figure 105 Windows XP: Control Panel: Network Connections: Pro per ties 4 Select Internet Protocol (TCP/IP) (under the Genera l tab in W in XP) and then click Properties . Figure 106 Windows XP: Local Area Conne ction Properties 5 The Internet Protocol TCP/IP Pr operties [...]

  • Seite 171

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 171 Figure 107 Windows XP: Internet Protocol (TCP/IP) Propert ies 6 If you do not know your gateway's IP ad dress, remove any previously installed gateways in the IP Settings tab and click OK . Do one or more of the fo llowing if you want to configure additi onal IP addr[...]

  • Seite 172

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 172 Figure 108 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Pr operties window (the General tab in W indow s XP): • Click Obtain DNS server address automatically if yo u d o not know your DNS server IP address(es). • If you know your DNS server[...]

  • Seite 173

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 173 Figure 109 Windows XP: Internet Protocol (TCP/IP) Propert ies 8 Click OK to close the Internet Protocol (TCP/IP) Properties window . 9 Click Close ( OK in W i nd ows 2000/NT) to close the Local Area Connection Properties window . 10 Close the Network Connections window ( [...]

  • Seite 174

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 174 Figure 1 10 Macintosh OS X: App le Menu 2 Click Network i n the icon bar . • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure lis[...]

  • Seite 175

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 175 V erifying Settings Check your TCP/IP properties in the Network window . Linux This section shows you how to configure your computer’ s TCP/IP settings in Red Hat Linux 9.0. Procedure, screens an d file loc ation may vary depe nd ing on your Linux distribution and relea[...]

  • Seite 176

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 176 Figure 1 13 Red Hat 9.0: KDE: Ethernet Device: Gener al • If you have a dyna mic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address, click S tatically set IP Addresses and fill in [...]

  • Seite 177

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 177 Figure 1 15 Red Hat 9.0: KDE: Network Configuration: Activate 7 After the network card restart proc ess is complete, make sure the St a t u s is Ac tive in the Network Configuration screen. Using Configuration Files Follow the steps below to edit the network co nfiguratio[...]

  • Seite 178

    Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 178 Figure 1 18 Red Hat 9.0: DNS Settings in resolv .conf 3 After you edit and save the configuration files, you must restar t the network card. Enter ./network restart in the /etc/rc.d/init.d directory . The following figure shows an example. Figure 1 19 Red Hat 9.0: Rest ar[...]

  • Seite 179

    NSA-220 User’s Guide 179 A PPENDIX B Pop-up Windows, JavaScript s and Java Permissions In order to use the web configurator yo u need to allow: • W eb browser pop-u p windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). " Internet Explorer 6 screens are used here. Screens for other Inte[...]

  • Seite 180

    Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 180 2 Clear the Block pop-ups check box in the Pop-up Block e r section of the screen. This disables any web po p-up blockers you ma y have enabled. Figure 122 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Al[...]

  • Seite 181

    Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 User’s Guide 181 Figure 123 Internet Options: Privacy 3 T ype the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites . Figu[...]

  • Seite 182

    Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 182 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript s If pages of the web configura tor do not display properly in Inte rnet Explorer , check that JavaScripts are allowed. 1 In Internet Explorer , click T ools , Inter[...]

  • Seite 183

    Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 User’s Guide 183 Figure 126 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer , click To o l s , Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM . 4 Under Java permissions make sure that a sa[...]

  • Seite 184

    Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 184 JA V A (Sun) 1 From Internet Explorer , click To o l s , Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is sele cted. 3 Click OK to clos e the wind ow . Figure 128 Java (Sun) Mozilla Firefox Mozilla[...]

  • Seite 185

    Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 User’s Guide 185 Figure 129 Mozilla Firefox: T ools > Options Click Content .to show the screen below . Select the check boxes as shown in the follo wing screen. Figure 130 Mozilla Firefox Content Security[...]

  • Seite 186

    Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 186[...]

  • Seite 187

    NSA-220 User’s Guide 187 A PPENDIX C Common Services The following table l ists some commonly-used se rvices and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name : This is a short, descrip tive name for[...]

  • Seite 188

    Appendix C Common Services NSA-220 User’s Guide 188 FTP TCP TCP 20 21 File T ransfer Program, a program to enable fast transfe r of files, i ncluding large files that may not be possible by e-mail. H.323 TCP 1720 NetMeeting uses this protoco l. HTTP TCP 80 Hyper T ext T ransfer Protocol - a client/ server protocol for the world wide web. HTTPS TC[...]

  • Seite 189

    Appendix C Common Services NSA-220 User’s Guide 189 RTS P TCP/UDP 554 The Real Time S tre aming (medi a control) Protocol (R TSP) is a remote control for multimedia on the Internet. SFTP TCP 11 5 Simple File Transfer Protocol. SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to mo ve me[...]

  • Seite 190

    Appendix C Common Services NSA-220 User’s Guide 190[...]

  • Seite 191

    NSA-220 User’s Guide 191 A PPENDIX D Open Source Licences Notice Information herein is subject to change withou t notice. Companies, name s, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical , for any purpos e, except the express w[...]

  • Seite 192

    Appendix D Open Source Licences NSA-220 User’s Guide 192 “Derivative W orks” shall mean any work, whether in Source or Object form, that is based on (or derived from) the W ork and for which the edit orial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship . For the purposes of t[...]

  • Seite 193

    Appendix D Open Source Licences NSA-220 User’s Guide 193 distributed as part of the Derivative W orks; within the Source form or do cumentation, if provided along with the Derivative W orks; or , within a display genera ted by the Derivative W orks, if and wherever such third-party no tices n ormally appear . The contents of the NOTICE file are f[...]

  • Seite 194

    Appendix D Open Source Licences NSA-220 User’s Guide 194 Redistribution and use in source and binary fo rms, with or without modification, are permi tted provided that the following conditions are met: Redistributions of source co de must retain the above copyright notice, this li st of conditions and the following disclaimer . Redistributions in[...]

  • Seite 195

    Appendix D Open Source Licences NSA-220 User’s Guide 195 The licenses for most software ar e de signed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your free dom to share and change free software--to make su re the software is free for all its users. This license, the Les[...]

  • Seite 196

    Appendix D Open Source Licences NSA-220 User’s Guide 196 W e call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Pu blic License. It also provides other free software developers Less of an advant age over competing non-free programs. Thes e disadvan tages are [...]

  • Seite 197

    Appendix D Open Source Licences NSA-220 User’s Guide 197 1. Y ou may copy and distribute verbatim copies of the Library's comple te source code as you receive it, in any medium, provided that you conspicuou sly and appro priately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that[...]

  • Seite 198

    Appendix D Open Source Licences NSA-220 User’s Guide 198 compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library , but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a d[...]

  • Seite 199

    Appendix D Open Source Licences NSA-220 User’s Guide 199 required form of the “work that uses the Librar y” must include any data and utility programs needed for reproducing the executable from it. Howeve r, as a special exception, the materials to be distributed need not include an ything that is normally distributed (in either source or bin[...]

  • Seite 200

    Appendix D Open Source Licences NSA-220 User’s Guide 200 contest validity of any such claims; this sec tion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have mad e generous contribution s to the wide range of software distributed through tha[...]

  • Seite 201

    Appendix D Open Source Licences NSA-220 User’s Guide 201 END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, auto fs, device-mapper , evms, exim. Lm_sensors, mdadm, pam_mount, raid tools, samba, sg_utils, smartmontool s, vsftpd, xfsprogs and Linux kernel software under GPL license. GNU GENERAL PUBLIC LICENSE V ersion 2, June 19 91 [...]

  • Seite 202

    Appendix D Open Source Licences NSA-220 User’s Guide 202 0. This License ap plies to any program or othe r work which contains a notice pla ced by the copyright holder saying it may be distributed under the terms of this Ge neral Public License. The “Program”, belo w , refers to any such prog ram or work, and a “work based on the Program”[...]

  • Seite 203

    Appendix D Open Source Licences NSA-220 User’s Guide 203 3. Y ou may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sec tions 1 and 2 above provided that you also do one of the following: a) Accompany it with the comple te corresponding machine-readab le source code, w[...]

  • Seite 204

    Appendix D Open Source Licences NSA-220 User’s Guide 204 directly or indirectly through you, then the on ly way you could satisfy both it and this License would be to refrain entirely from di stribution of the Program. If any portion of this section is held invalid or unenforce able under any particul ar circ umstance, the balance of the se ction[...]

  • Seite 205

    Appendix D Open Source Licences NSA-220 User’s Guide 205 INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DA T A OR DA T A BEING RENDERED INACCURA TE OR LOSSES SUST AINED BY YOU OR THIRD P AR TIES OR A F AILURE OF THE PROGRAM TO OPERA TE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER P AR TY HAS BEEN ADVISED OF THE POSSI[...]

  • Seite 206

    Appendix D Open Source Licences NSA-220 User’s Guide 206 Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays unde r a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-s tyle Open Source li[...]

  • Seite 207

    Appendix D Open Source Licences NSA-220 User’s Guide 207 Original SSLeay License -------------------------------- Copyright (C) 1995-1998 Eric Y oung (e ay@cryptsoft.com) A ll ri ghts reserved. This package is an SSL implementation written by Eric Y oung (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’ s SSL. [...]

  • Seite 208

    Appendix D Open Source Licences NSA-220 User’s Guide 208 This Product include mod _ ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights rese rved. Redistribution and us e in source and binary forms, with or without modification, are permitte d provided that the[...]

  • Seite 209

    Appendix D Open Source Licences NSA-220 User’s Guide 209 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number . Once covered code has been published unde r a particular version of th e license, you may alwa ys continue to use it unde r the terms of th[...]

  • Seite 210

    Appendix D Open Source Licences NSA-220 User’s Guide 210 1.2. “Contributor V ersion” means the combina tion of the Original Code, prior Modifications used by a Contributor , and th e Modifications made by that pa rticular Contributor . 1.3. “Covered Code” means the Original Code or Modifications or th e combination of the Original Code an[...]

  • Seite 211

    Appendix D Open Source Licences NSA-220 User’s Guide 21 1 The Initial Developer hereby grants Y ou a wo rld-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify , display , perform[...]

  • Seite 212

    Appendix D Open Source Licences NSA-220 User’s Guide 212 Any Modification which Y ou create or to which Y ou contribute must be made available in Source Code form under the terms of this Licen se either on the same media as an Executable version or via an accepted Electronic Distribu tion Mechanism to anyone to whom you made an Executable version[...]

  • Seite 213

    Appendix D Open Source Licences NSA-220 User’s Guide 213 Contributor . Y ou must make it absolutely clear than any such warranty , support, indemnity or liability obligation is of fered by Y ou alone, and Y ou hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contribu[...]

  • Seite 214

    Appendix D Open Source Licences NSA-220 User’s Guide 214 Once Covered Code has bee n published under a particul ar version of the License, Y ou may always continue to use it under the terms of that version. Y ou may also choose to use su ch Covered Code under the terms of any sub sequent version of the License published by Netscape. No one other [...]

  • Seite 215

    Appendix D Open Source Licences NSA-220 User’s Guide 215 any software, hardware, or device , other than such Participant's Contributor V ersion, directly or indirectly infringes any patent, then any ri ghts granted to Y ou by such Participant under Sections 2.1(b) and 2.2 (b) are revoked effective as of the date Y ou first made, used, sold, [...]

  • Seite 216

    Appendix D Open Source Licences NSA-220 User’s Guide 216 As between Initial Developer and the Contri butors, each party is responsible for claims and damages arising, directly or indirectly , out of its utilization of rights under this License and Y ou agree to work with Initial De veloper and Contributors to dist ribute such responsibility on an[...]

  • Seite 217

    Appendix D Open Source Licences NSA-220 User’s Guide 217 The above copy righ t notic e an d t his permis sio n notice shall be included in all copies or substantial portions of the Software. THE SOFTW ARE IS PROVIDED “AS IS”, WITHOUT W ARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED T O THE W ARRANTIES OF MERCHANT ABILITY ,[...]

  • Seite 218

    Appendix D Open Source Licences NSA-220 User’s Guide 218 4.Restrictions Y ou may not publish, display , disclose, sell, re nt, lease, modify , store, loan, distribute, or create derivative works of the Software, or any part thereof. Y ou may not a ssign, sublicense, convey or otherwise transfer , pledge as secur ity or otherwise encumber the righ[...]

  • Seite 219

    Appendix D Open Source Licences NSA-220 User’s Guide 219 DOCUMENT A TION OR OTHER WISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME ST A TES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMIT A TION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENT AL DAMAGES, THE ABOVE LIMIT A TION MA Y NOT APPL Y TO YOU. 8.Export [...]

  • Seite 220

    Appendix D Open Source Licences NSA-220 User’s Guide 220[...]

  • Seite 221

    NSA-220 User’s Guide 221 A PPENDIX E Legal Information Copyright Copyright © 2007 by ZyXEL Communications Corporation. The contents of this publication may not be reprod uced in any part or as a whole, transcribed, stored in a retrieval system, tran slated into any language, or transmitted in any form or by any means, el ectronic, mechanical , m[...]

  • Seite 222

    Appendix E Leg al In fo rm at ion NSA-220 User’s Guide 222 This device has been tested and foun d to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. Thes e limits are designed to provide reasonable protection against harmful interference in a resi dential installation. This device generates, uses, and can[...]

  • Seite 223

    NSA-220 User’s Guide 223 A PPENDIX F Customer Support Please have the following information r eady when you contact customer support. Required Information • Product model and serial number . • W arranty Information. • Date that you received your de vice. • Brief description of the problem and the steps you took to solv e it. “+” is th[...]

  • Seite 224

    Appendix F Custo m er Supp o rt NSA-220 User’s Guide 224 • Re g u l ar M a il : ZyXEL Communications, Czech s.r .o., Modranská 621, 143 01 Praha 4 - Modrany , Ceská Republika Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk • T elephone: +45-39-55-07-00 • Fax: +45-39-55-07-07 • W eb: www .zyxel.dk • Re g u[...]

  • Seite 225

    Appendix F Customer Support NSA-220 User’s Guide 225 India • Support E-mail: support@zyxel.in • Sales E-mail: sales@zyxel.in • T elephone: +91-1 1-30888144 to +91 -11-308 88153 • Fax: +91-1 1-30888149, +91 -11-2 6810715 • W eb: http://www .zyxel.in • Re g u l ar M a i l : India - ZyXEL T echnology Indi a Pvt Ltd. , I I - F l o o r, F2[...]

  • Seite 226

    Appendix F Custo m er Supp o rt NSA-220 User’s Guide 226 • Regular Mail: ZyXEL Communications Inc., 1 130 N. Miller St., Anaheim, CA 92806- 2001, U.S.A. Norway • Support E-mail: support@zyxel.no • Sales E-mail: sales@zyxel.no • T elephone: +47-22-80-61-80 • Fax: +47-22-80-61-81 • W eb: www .zyxel.no • Re g u l a r M a i l: ZyXEL Com[...]

  • Seite 227

    Appendix F Customer Support NSA-220 User’s Guide 227 Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • T elephone: +46-31-744-7700 • Fax: +46-31-744-7701 • W eb: www .zyxel.se • Re g ul a r M a i l: ZyXEL Communications A/S, Sjöporten 4, 41764 Götebor g, Sweden Thailand • Support E-mail: support@zyxel.co.t[...]

  • Seite 228

    Appendix F Custo m er Supp o rt NSA-220 User’s Guide 228[...]

  • Seite 229

    Index NSA-220 User’s Guide 229 Index A about icon 41 accessing share contents 34 accessing the web configu rator 29 administration screens 32 , 40 anonymous access rights 122 ANONYMOUS FTP 122 anonymous FTP access 90 anti-virus 95 apac he license 191 B BitT orrent 94 blogs 105 broadcatching 105 C certifications 157 , 22 1 notices 222 viewing 222 [...]

  • Seite 230

    Index NSA-220 User’s Guide 230 entry removal 43 everyone access rights 122 exitin g th e w eb config ur ator 32 , 41 external devices 34 external disks 80 external hard drive removal hard drives external 44 external hard drives 64 external shares 34 F FAT 1 6 80 FAT 3 2 80 faulty hard disk 44 replacement 44 FCC interf er ence statement 22 1 feeds[...]

  • Seite 231

    Index NSA-220 User’s Guide 231 IDP (Intrusion Detectio n and Prevention) 95 inactive 78 insta l l dr ives 26 internal hard drives 34 , 64 iT unes 90 J JavaScript 29 jumbo frames 85 L LAN LEDs 28 language 41 language encoding 90 LEDs 26 liability 221 license 221 license Agreement for “NSA” 217 lights 26 links sub-links 42 to screens 42 locate [...]

  • Seite 232

    Index NSA-220 User’s Guide 232 pop-ups 29 power consumption 160 , 161 POWER LED 27 print server 109 private shares 37 proof of purchase 222 public shares 37 publish shares 90 publishing shares to the web 101 R radio shows 105 RAID type 64 RAID file storage 156 RAID volume repair 44 recovering 78 related documentation 3 remove hard drives 26 remov[...]

  • Seite 233

    Index NSA-220 User’s Guide 233 torrent file 94 troubleshooting external disks 149 forgot password 145 LED indicators 143 LAN 145 login 148 media files 150 NDU discovery 147 overview 143 user share access 149 web configurator access 145 TV programs 105 type 64 U USB devices 34 USB hard drives 64 user access permissions 33 user icon 44 user name re[...]

  • Seite 234

    Index NSA-220 User’s Guide 234[...]