Go to page of
Similar user manuals
-
Computer Drive
ZyXEL Communications AG-200
60 pages 0.87 mb -
Computer Drive
ZyXEL Communications IDP 10
42 pages 2.08 mb -
Computer Drive
ZyXEL Communications N220
187 pages 4.74 mb -
Computer Drive
ZyXEL Communications NWD2705
68 pages 1.05 mb -
Computer Drive
ZyXEL Communications NSA-220
234 pages 5.07 mb -
Computer Drive
ZyXEL Communications NSA220
2 pages 0.1 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of ZyXEL Communications NSA-220, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ZyXEL Communications NSA-220 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of ZyXEL Communications NSA-220. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of ZyXEL Communications NSA-220 should contain:
- informations concerning technical data of ZyXEL Communications NSA-220
- name of the manufacturer and a year of construction of the ZyXEL Communications NSA-220 item
- rules of operation, control and maintenance of the ZyXEL Communications NSA-220 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ZyXEL Communications NSA-220 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ZyXEL Communications NSA-220, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ZyXEL Communications service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ZyXEL Communications NSA-220.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the ZyXEL Communications NSA-220 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
www .zyxel.com NSA-220 Network S torage Appliance User ’ s Guide V ersion 2.10 11 / 2 0 0 7 Edition 1 DEFAULT LOGIN Web Ad dress nsa220 Password 1234[...]
-
Page 2
[...]
-
Page 3
About This User's Guide NSA-220 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the web configurator . A basic knowledge of TCP/IP netw orking concepts and topology will be helpful. Related Document ation • Quick Start Guide The Quick S tart Guide is desig[...]
-
Page 4
Document Conventions NSA-220 User’s Guide 4 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User ’ s Guide. 1 W arnings tell you about things that could harm you or your device. " Notes tell you other important informati on (for example, other things you may need to configure or helpful tip s) or[...]
-
Page 5
Document Conventions NSA-220 User’s Guide 5 Icons Used in Figures Figures in this User ’ s Guide may use the follo wing generic icons. The NSA icon is not an exact representation of your device. NSA Computer Notebook computer Server Te l e v i s i o n Firewall Router Switch Internet[...]
-
Page 6
Safety Warnings NSA-220 User’s Guide 6 Safety Warnings 1 For your safety , be sure to read and follow all warni ng notices and instructions. • Do NOT use this product near water , for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store thin gs on the device. [...]
-
Page 7
Safety Warnings NSA-220 User’s Guide 7[...]
-
Page 8
Safety Warnings NSA-220 User’s Guide 8[...]
-
Page 9
Contents Overview NSA-220 User’s Guide 9 Contents Overview Introduction .......................................... ........................................................................ .......... 23 Getting to Know Y our NS A .............. ................ ................ ................ ................ ................ ........ .. 25 Web [...]
-
Page 10
Contents Overview NSA-220 User’s Guide 10[...]
-
Page 11
Table of Contents NSA-220 User’s Guide 11 Table of Contents About This User's Guide ........................................... ............................................................. .. 3 Document Conventions.................................................................. ......................................... .4 Safety Warnings [...]
-
Page 12
Table of Contents NSA-220 User’s Guide 12 2.6.1 Global Administration Ic ons ............. ................ ................ ................ ................ .......... 41 2.6.2 Navigation Panel ................. ... ... ... .... ... ............. ................ ................ ............. ............. 42 2.6.3 Main Window ... .... ... ...[...]
-
Page 13
Table of Contents NSA-220 User’s Guide 13 6.5.1 Choosing A S torage Met hod For a V olume ......... ... ............. ... .... ... ... ... .... ... ... ... ... ....... 77 6.5.2 V olume S tatus . .... ... ... ............. ... ... .... ... ... ... ............. .... ... ... ... ... .... ............. ... ... ... ... .... .. .7 7 6.6 Disk Replaceme[...]
-
Page 14
Table of Contents NSA-220 User’s Guide 14 8.14 Adding or Editing a Broadcatching Channel ......... ................ ................ ................... ........ 108 8.15 Printer Sharing .. ................ ................ ............. ................ ................ ................. .......... ....... 109 8.16 Print Server Screen .... .....[...]
-
Page 15
Table of Contents NSA-220 User’s Guide 15 12.1 Protection Method s . ....................... ....................... ...................... ....................... ........... ... 135 12.1.1 Configuration F ile Backup and Restoration .......... ............. ................ ................ ..... 135 12.1.2 Memeo Autobackup .......... ..........[...]
-
Page 16
Table of Contents NSA-220 User’s Guide 16 Part VI: Appendices and Inde x ........................................................... 163 Appendix A Setting up Y our Computer ’s IP Address ........................................... ................. 165 Appendix B Pop-up Windows, JavaScripts and Java Permissions ................................[...]
-
Page 17
List of Figures NSA-220 User’s Guide 17 List of Figures Figure 1 Example of the NSA in a Home Network ... ................. ................ ............. ................ ................ 25 Figure 2 NSA Front Panel . ................ ................ ................ ................ ................ ................. ... ................ 26 Fi[...]
-
Page 18
List of Figure s NSA-220 User’s Guide 18 Figure 39 Download Service Tutorial: Paste Link .............. ................ ................ ............. ................ ... .... 55 Figure 40 Download Service T utori al: Apply Pasted Link .. ................ ................ ................. ................ ... 5 5 Figure 41 Download Service T u[...]
-
Page 19
List of Figures NSA-220 User’s Guide 19 Figure 82 Applications > Print Server ................ ................ ................ ................ ................. ....... ......... ..1 10 Figure 83 Applications > Print Se rver > Rename .............. ................ ................ ................. ................ .. 1 10 Figure 84 [...]
-
Page 20
List of Figure s NSA-220 User’s Guide 20 Figure 125 Internet Options: Security ........... ...... ............. ................ ................ ............. .............. ......... . 182 Figure 126 Security Settings - Java S cripting .. ... ................ ................ ............. ................ ............... ...... 183 Figure 127 [...]
-
Page 21
List of Tables NSA-220 User’s Guide 21 List of Tables T able 1 LEDs . ................ ............. ................. ................ ................ ................ ................ .. ..................... ... 27 T able 2 Us er-level Global Labels and Icons ...... ................ ................ ................ ................. ........[...]
-
Page 22
List of Tables NSA-220 User’s Guide 22 T able 39 Shares ....... ................ ................ ................ ............. ................. ................ ......... ................ ..... 120 T able 40 Shares > Add Share (or Ch ange Share Properties) ............... ................ ................ .............. 1 21 T able 41 Share[...]
-
Page 23
23 P ART I Introduction Getting to Know Y our NSA (25) W eb Configurator Basics (29) T utorials (45) St atus Screen (63)[...]
-
Page 24
24[...]
-
Page 25
NSA-220 User’s Guide 25 C HAPTER 1 Getting to Know Your NSA This chapter covers the main featur es and applications of the NSA. 1.1 NSA Overview Use the NSA (Network Storage A ppliance) to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA. • Use the COPY button to copy files di[...]
-
Page 26
Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 26 Place the NSA behind a firewall and/or IDP (Intrusion Detection and Prevention) device to protect it from attacks from the Internet. " See Chapter 16 on page 155 for a more detailed list of NSA features and list s of compatible hard drives and USB devices. Refer to the Quick S tart G[...]
-
Page 27
Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 27 Figure 3 NSA Rear Panel This table describes the NSA’ s LEDs. T able 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned o n and receiving power. Off The NSA is turned off. HDD1/ HDD2 Green On The hard disk drive is connected properly to the NSA. Blinking The NSA is savi[...]
-
Page 28
Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 28 1.1.2 COPY Button Use the COPY button on the front panel to copy f iles from a connected USB device to the NSA. The files are stored in a folder created w ithin the public share. The name of the folder created for the copied files consists of the date and time of the copy in year_month_da[...]
-
Page 29
NSA-220 User’s Guide 29 C HAPTER 2 Web Configurator Basics This chapter describes how to access the NSA web configurator and provides an overview of its screens. 2.1 W eb Configurator Overview The web configur ator is an HTML-based manage ment interface that allows easy NSA setup and management usin g an Internet browser . Use Internet Explore r [...]
-
Page 30
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 30 Figure 4 NDU Main Screen From the NDU main page click an icon under Admin to see the web configurator screen login screen. 2.2.2 Web Browser Access Open your browser and type in the server name of the NSA (“nsa220” is the default). Figure 5 NSA URL 2.3 Login The default username and p[...]
-
Page 31
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 31 Figure 6 NSA Login Screen Y ou should see a screen asking you to change your pas sword (highly recommended) as shown next. T ype a new password (and retype it to confirm) and click Apply or click Ignor e . Figure 7 Change Password Screen 2.4 User-level Screens Overview All users (including[...]
-
Page 32
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 32 Figure 8 My NSA " The web configurator managem ent session automatically ti mes out if it is left idle for 15 minutes. Simp ly log back into the NSA if this happens to you. The icons and language label at th e top-right of the screen ( ) are visible from most screens. Use the tabs at[...]
-
Page 33
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 33 2.5 My NSA Screen Use the My NSA screens to mana ge your shares and access the files in folders to which you have acce ss. A share is a set of user access permissions for a specific folder on a volume (gives someone access to a folder). It is equivalent to the W indows concept of a shared [...]
-
Page 34
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 34 The following table describes the labels in this screen. 2.5.1 My NSA Share Browsing Screen Click My NSA and then click a share to open the followi ng screen. Use the My NSA share browsing screens to see and access share contents. • Click a folder ’ s name to go into the folder . • [...]
-
Page 35
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 35 The following table describes the labels in this screen. 2.5.2 My NSA Share Browsing Move to or Copy to Screen Select a folder or file in the My NS A sh are browsing screens and click the Move to button or the Copy to button to display a screen like the following . Use this screen to selec[...]
-
Page 36
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 36 2.5.3 My NSA Management Overview Screen Use the My NSA management overvie w screens to see and configure share management details. Click My NSA and then the Manage It button of one of your shares to open the following screen. This screen displays a share’ s management details. Figure 12[...]
-
Page 37
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 37 Figure 13 My NSA Change Share Properties The following table describes the labels in the this screen. T able 7 My NSA Change Share Properties LABEL DESCRIPTION Share Name Configure a name to identify this sh are. Type a share name from 1 to 25 5 single- byte (no Chinese characters allowed [...]
-
Page 38
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 38 2.5.5 Share and Folder Names The name ca n only contain the followi ng characters: • Alphanumeric (A-z 0-9) and Unicode. The NSA allows FTP access to shares, folders or files with names en coded in the UTF-8 (8-bit UCS/Unicode T ransformation Format) format. So your FTP c lient must sup[...]
-
Page 39
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 39 2.5.6 Share Paths A share path is the full path to a folder on a volume that will be shared, for example, /mynsa/ topsecret/ugs/. This is indepe ndent from a “share name” which is the name shown for this share when accessing the share via CIFS or FTP . The path should start with a &apo[...]
-
Page 40
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 40 Figure 14 Password The following table describes the labels in this screen. 2.6 Administration Screens The A dministration tab displays when you log i n as the administrator . Click Administration in the My NSA screens to open the advanc ed administration screens. The St a t u s screen is[...]
-
Page 41
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 41 Figure 15 S tatus 2.6.1 Global Administration Icons The icons and language label at the top-right of the screen ( ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels. 1 2 3 4 T able 9 Global Labels and Icons LABEL/ICON DESC[...]
-
Page 42
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 42 2.6.2 Navigation Panel The navigation panel on t he left of the scr een ( ) contains screen links. Click a link to display sub-links. There are no sub-links for the St a t u s screen. Certain screens also contain hyper links that allow you to jump to another screen. Click the St a t u s i[...]
-
Page 43
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 43 2.6.3 Main Window The main window () shows the screen you select in the na viga tion panel. It is disc ussed in the rest of this document. The St a t u s screen is the first administration screen to display . See Chapter 4 on page 63 for more informat ion about the St a t u s screen. 2.6.4[...]
-
Page 44
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 44 Click the Edit icon to jump to related item ’s configuration screen. This is a user icon. See the chapter on u ser accounts for detailed info rmation on variants of this icon. This is a share i con. See the chapter on shares for d etailed information on variants of this icon. This icon [...]
-
Page 45
NSA-220 User’s Guide 45 C HAPTER 3 Tutorials This chapter provides tutorials that show how to use the NSA. 3.1 File Sharing T utorials The following sections cover using the NSA for file sharing. This chapter assumes you have already followed the Quick Start Guide instructio ns to perform initial setup and configuration (so you have a wo rking vo[...]
-
Page 46
Chapter 3 Tutorials NSA-220 User’s Guide 46 Figure 18 Users 3 Configure the screen as follows and write down the username and password to give to Jimmy . If the username and password are th e same as Jimmy’ s W indows login, Jimmy will not need to enter a username and passw ord when he logs int o his share from his computer . Set the Account T [...]
-
Page 47
Chapter 3 Tutorials NSA-220 User’s Guide 47 3.1.2 Creating a Share Suppose Bob has already created separate acc ou nts for his sons Jimm y and Kevin. Now Bob wants to create a share for each son. He als o wants to make sure that each son can only acces s his own share (t o keep them from deleting each other ’ s files). This is how he would do i[...]
-
Page 48
Chapter 3 Tutorials NSA-220 User’s Guide 48 Figure 23 Shares > Create > Browse > Create Folder Example 4 Select the new folder and click Apply . Figure 24 Shares > Create > Browse > New Folder Example 5 Configure the screen as follows and click Apply . (Make sure you also set the anonymous-ftp access to Deny ).[...]
-
Page 49
Chapter 3 Tutorials NSA-220 User’s Guide 49 Figure 25 Shares > Create Example Now that Bob has created Jimmy’ s share, he can go through the steps again to create another share for Kevin. Then he can see the rest of the tutorials for how to us e the shares. 3.1.3 Accessing a Share From Windows Explorer If you map a NSA share (where data is s[...]
-
Page 50
Chapter 3 Tutorials NSA-220 User’s Guide 50 4 Enter the username and password for Jimmy’ s account and click OK . Y ou do not need to do this if the username and passwo rd are the same as Jimmy’ s W indows login. Figure 28 Enter Network Password 5 After the mapping is done, you ca n then simply copy and paste or dra g and drop files from/to y[...]
-
Page 51
Chapter 3 Tutorials NSA-220 User’s Guide 51 Figure 30 FTP Example: T yping the FTP T a rget 2 Enter your password and c lick Login . Figure 31 FTP Example: Enter the Password 3 Now you can access files and copy files from/to your local computer ’ s drives to or from this network folder . 1 Figure 32 FTP Example: Logged In 3.1.5 Accessing a Shar[...]
-
Page 52
Chapter 3 Tutorials NSA-220 User’s Guide 52 Figure 33 My NSA User Login 2 Click a share to see the top level of the s hare’ s contents. Here is the Jimmy share. Figure 34 My NSA User Login 3 Click a folder ’ s file name to browse the fold er . Y ou can open files or copy them to your computer . However at the time of writing you cannot use th[...]
-
Page 53
Chapter 3 Tutorials NSA-220 User’s Guide 53 1 Open your Internet browser (thi s example uses Internet Explorer). 2 Find a download link for the file you wa nt. In this example, www .zyxel.com has a Download Now link for downloading a datasheet for ZyXEL ’ s P-2301RL-P1C (a device for making phone calls over the Internet). Figure 35 Download Lin[...]
-
Page 54
Chapter 3 Tutorials NSA-220 User’s Guide 54 Figure 36 Copy Shortcut 4 Log into the NSA web configurator (see Sectio n 2.3 on page 30 ) using the administrator account and cl ic k Download Service . Figure 37 Download Service T utorial: My NSA 5 Click Add . Figure 38 Download Service T utorial: Download Service 6 Right-click the URL field and sele[...]
-
Page 55
Chapter 3 Tutorials NSA-220 User’s Guide 55 Figure 39 Download Service T utorial: Paste Lin k 7 The URL displays in the URL field. Click Apply . Figure 40 Download Service T utorial: Apply Pasted Link 8 After a few moments, the download task appears in the Download Service screen’ s Active tab. Figure 41 Downloa d Service T utori al: Download T[...]
-
Page 56
Chapter 3 Tutorials NSA-220 User’s Guide 56 3.3 Broadcatching T utorial Use broadcatching to ha ve the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV In ternet television channel. See Sectio n 8.12 on page 105 for mor[...]
-
Page 57
Chapter 3 Tutorials NSA-220 User’s Guide 57 Figure 43 Copy Link Location 3 Log into the NSA web configurator (see Sectio n 2.3 on page 30 ) using the administrator account and cl ic k Administration > Applications > Br oad catch ing . Figure 44 Broadcatching T utorial: My NSA 4 Click Add Channel .[...]
-
Page 58
Chapter 3 Tutorials NSA-220 User’s Guide 58 Figure 45 Broadcatching T utorial: Broadcatching 5 Right-click the URL field and select Paste . Figure 46 Broadcatching T utorial: Paste Link 6 The URL displays in the URL fi e ld. 7 Select a policy for what items to download. This example uses Manual so you will be able to select individual items to do[...]
-
Page 59
Chapter 3 Tutorials NSA-220 User’s Guide 59 3.4 Printer Server T utorial Do the following to have th e NSA let computers on your network share a printer . See www .zyxel.com for a list of compatible printers. 1 Make sure the NSA is on and the SYS ligh t is on steady (not blinking). 2 Use a US B cable to connec t the printer ’ s USB port to one [...]
-
Page 60
Chapter 3 Tutorials NSA-220 User’s Guide 60 Figure 51 Printer Driver Needed 8 Use the wizard screens to install the printer driver on the computer . Y ou may need to get the file from the printer ’ s CD or the printer manufacturer ’ s website (the driver is not installed on the NSA). " Y ou must install the printer driver on eac h comput[...]
-
Page 61
Chapter 3 Tutorials NSA-220 User’s Guide 61 " Repeat steps 5 to 8 on your other comput ers so they can also use the printer .[...]
-
Page 62
Chapter 3 Tutorials NSA-220 User’s Guide 62[...]
-
Page 63
NSA-220 User’s Guide 63 C HAPTER 4 Status Screen This chapter introduces the NSA St a t u s screen. 4.1 St atus Screen The St a t u s screen is the first main web configurator screen you see after you enter the administrator screens. T o view the status screens, click St a t u s on the top-left of the navigation panel. Figure 54 S tatus[...]
-
Page 64
Chapter 4 Status Screen NSA-220 User’s Guide 64 The following table describes the labels in this screen. T able 12 Status LABEL DESCRIPTION S tatus Click Status to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the edit icon to go to the screen where y[...]
-
Page 65
Chapter 4 Status Screen NSA-220 User’s Guide 65 4.1.1 Session Example (Windows) Open windows explorer and type two back sl ashes followed by the NSA name or IP address. Initially you can only read and write to the Public , Vi d e o , Musi c , and Photo folders until you create other shares on the NSA. This session is then displayed as shown in Fi[...]
-
Page 66
Chapter 4 Status Screen NSA-220 User’s Guide 66[...]
-
Page 67
67 P ART II System Setting and Applications System Setting Screens (69) Storage Screens (73) Network Screen (85) Application Screens (89)[...]
-
Page 68
68[...]
-
Page 69
NSA-220 User’s Guide 69 C HAPTER 5 System Setting Screens This chapter discusses the system setting screens. 5.1 System Setting Screens This section gives an overview of the various features included in th e system setting screens. Use the system setting screens to: • Specify the NSA’ s W indows/CIFS server name and workgroup name. • Chose [...]
-
Page 70
Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 70 Figure 56 System Setting > Server Name The following table describes the labels in these screens. 5.3 Date/T ime Use this screen to select a time zone and a time server from which your NSA can get the time and date. This time is then used in NSA logs and alerts. 5.3.1 T i m e Lag T ime [...]
-
Page 71
Chapter 5 Syst em Setting Scre en s NSA-220 User’s Guide 71 Figure 57 System Setting > Date/T ime The following table describes the labels in this screen. T able 14 System Setting > Date/Time LABEL DESCRIPTION Current System Date T ime Sett ing Current T ime This field displays th e ti me of your NSA. Current Date This field di sp lays the [...]
-
Page 72
Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 72 T ime Server Address Select a time se rver from the drop-down list box or select Spec if y my own time server and enter th e ti me server you wish to use in the field below . Check with your ISP/network admi nistrator if you ar e unsure of this information. Synchronize Now Click this butto[...]
-
Page 73
NSA-220 User’s Guide 73 C HAPTER 6 Storage Screens This chapter covers storage system s, volumes and disks on the NSA. 6.1 St orage Introduction Use the System > S torage screens to manage volumes and disk s (both internal and external). " Several NSA features require a valid internal volume. • V olumes are storage areas on disks. See S[...]
-
Page 74
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 74 The following table describes the labels in this screen. Y ou see a warning sc reen before you dele te a volume. Figure 59 Delete a V olume W arning Screen 6.3 Creating an Internal V olume Click the Create an Internal V olume button in the S tor age screen as shown in Figure 58 on page 73 to o[...]
-
Page 75
Chapter 6 Storage Screens NSA-220 User’s Guide 75 " Creating a volume formats the hard driv e. All data on t he disk will be lost. Figure 60 System > S torage > Create an Internal V olume The following table describes the labels in this screen. T able 16 System > S torage > Create an Internal V olume LABEL DESCRIPTION V olume Nam[...]
-
Page 76
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 76 6.4 Editing a V olume Click an internal volume’ s Edit icon in the System > S torage screen as shown in Figure 58 on page 73 to open the following screen. Use this screen to chan ge the volume’ s name. Figure 61 System > S torage > Edit The following table describes the labels in [...]
-
Page 77
Chapter 6 Storage Screens NSA-220 User’s Guide 77 Storage ef ficiency assumes all drives are of identical size. Performance rankings are approximations. 6.5.1 Choosing A S torage Method For a V olume The following is a guide to help you choose a storage method for the various number of disks supported on the NSA. See Section 6.9 on page 81 for th[...]
-
Page 78
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 78 • OK means the USB connected device is functioning properly . • Resync when you create a RAID volume. • Recovering appears when repairing a RAID 1 volume. (A RAID1 volume was once degraded, but yo u have installed a new disk and the NSA is restoring the RAID1 volume to a healthy state.) [...]
-
Page 79
Chapter 6 Storage Screens NSA-220 User’s Guide 79 6.6.1 Resychr onizing or Re covering a RAID 1 V olume Resychronizing or recovering a RAID 1 volume that was down is done block-by-b lock, so the time it takes depends more on the size of your ha rd drive(s) than the amount of data y ou have on them. " Do not restart the NSA while the NSA is r[...]
-
Page 80
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 80 " Creating a volume formats the drive. All data on the di sk will be lost. Figure 62 System > S torage > Create an External V olume The following table describes the labels in this screen. 6.8 External Disks Y ou may connect USB storage devices that supp ort the following file syste[...]
-
Page 81
Chapter 6 Storage Screens NSA-220 User’s Guide 81 6.9 RAID This section contains theoretical background on JBOD and the RAID levels used on the NSA. Skip to the next section if you already unde rstand RAID and know what stor age system you want to use on the NSA. Redundant Array of Independent Disks (RAID) is a method of storing data on multiple [...]
-
Page 82
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 82 6.9.1 JBOD JBOD allows you to combine multip le physical disk drives into a single virtual one, so they appear as a single large disk. JBOD can be used to turn multiple differen t-sized drives into one big drive. For example, JBOD could convert 80 GB and 100 GB drives into one large logical dr[...]
-
Page 83
Chapter 6 Storage Screens NSA-220 User’s Guide 83 6.9.3 RAID 1 RAID 1 creates a n exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity . The followi ng figure shows two disks in a single RAID 1 volume with mirrore d data. Data is duplicated acro ss two disks , so if one disk[...]
-
Page 84
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 84[...]
-
Page 85
NSA-220 User’s Guide 85 C HAPTER 7 Network Screen This chapter discusses the network configuration screen. 7.1 Network Settings Use the network configuration screen to assign the NSA a dynamic or static IP address and DNS information. 7.1.1 IP Address The NSA needs an IP address to communicate with the media servers on your network. The NSA can g[...]
-
Page 86
Chapter 7 Net wo rk Scree n NSA-220 User’s Guide 86 In the following example, the NSA has jumbo frames enabled and set to 8KB frames. This means the computer , notebook computer , and sw itch must also have jumbo frames enabled and be capable of supporting 8KB frames. Figure 63 Jumbo Fram es 7.2 Network Config Screen Click System Setting > Net[...]
-
Page 87
Chapter 7 Network Screen NSA-220 User’s Guide 87 Figure 64 System Setting > Network > TCP/IP The following table describes the labels in this screen. T able 23 System Setting > Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NSA get IP address information automatically . If no IP address informatio[...]
-
Page 88
Chapter 7 Net wo rk Scree n NSA-220 User’s Guide 88 Secondary DNS Server T ype a secondary DNS server IP address. Jumbo Frames Jumbo frames impr ove network pe rforman ce. Y ou must have a 1 Gbps (Gigabit Ethernet) network that suppor ts jumbo frames. Select the largest size of frame that all of your netw ork devices (includi ng computer Ethernet[...]
-
Page 89
NSA-220 User’s Guide 89 C HAPTER 8 Application Screens This chapter discusses the application screens. 8.1 Application Screens Use the application screens to: • Configure settings for FTP file transfers to/from the NSA. See Section 8.2 on page 89 . • Share files with me dia clients. See Section 8.3 on page 90 . • Download files from the Int[...]
-
Page 90
Chapter 8 Application Screens NSA-220 User’s Guide 90 Figure 65 Applications > FTP The following table describes the labels in this screen. 8.3 Sharing Media Files on Y our Network The media server feature lets anyone on your netw ork play video, mus ic, and photo s from the NSA (without having to copy them to another computer). The NSA can fu[...]
-
Page 91
Chapter 8 Application Screens NSA-220 User’s Guide 91 • The media server is a convenient way to share files you download using the broadcatching service (see Chapter 8 on page 10 5 ). • Media client software is included on the CD. • Hardware-based media clients like the DM A-1000 can also pl ay the files. See Appendix on page 160 for the su[...]
-
Page 92
Chapter 8 Application Screens NSA-220 User’s Guide 92 8.3.2 Songs and Videos from the iT unes S tore After using iT unes on your computer to download songs and videos from Apple’ s iT unes Store, you can copy them to the NSA. Many of these songs and videos have DRM (Digital Rights Management). At the time of writing, you can use your Apple a cc[...]
-
Page 93
Chapter 8 Application Screens NSA-220 User’s Guide 93 8.5 Download Service The NSA’ s download service downloads files from the Internet directly to the NSA. Y ou do not have to download to your co mp uter and then copy to the NSA. This can free up your computer ’ s system resources. The download service also handles your broadcatching downlo[...]
-
Page 94
Chapter 8 Application Screens NSA-220 User’s Guide 94 8.5.1 BitT o rrent The NSA includes a BitT orrent c lient for fast downloading and sharing of large files (such as educational public domain vide os ). With BitT orrent, you share while you ’re do wnloading the file. BitT orrent breaks up the file and distribute s it in hundreds of chunk s. [...]
-
Page 95
Chapter 8 Application Screens NSA-220 User’s Guide 95 Figure 68 Firewall • Stateful packet inspection to control access between the Internet and your network and protect your NSA (and comp uters) from hacking attacks. • IDP (Intrusion Detection an d Prevention) to detect malicious pa ckets within normal network traffic and take immediate acti[...]
-
Page 96
Chapter 8 Application Screens NSA-220 User’s Guide 96 Figure 70 Firewall Configured to Allow Incoming BitT orrent Requ ests 8.6 Download Service Screen Click Applications > Download Service to open the following sc reen. Use this screen to manage the NSA’ s file downloads. " By default, the NSA sa ves downloads in the admin share’ s d[...]
-
Page 97
Chapter 8 Application Screens NSA-220 User’s Guide 97 Figure 71 Applications > Download Service The following table describes the labels in this screen. T able 26 Applications > Download Service LABEL DESCRIPTION Enable Download Servi ce Use this option (and the Apply button) to turn the download service o ff or on. If you turn off the serv[...]
-
Page 98
Chapter 8 Application Screens NSA-220 User’s Guide 98 Refresh Click this button to update the information displ ayed on the screen. Preferences Click this butto n to open a screen whe re you can set the default locati on for saving downloads and configure your BitT orrent settings. The table lists your downloads. Click a column’s heading to sor[...]
-
Page 99
Chapter 8 Application Screens NSA-220 User’s Guide 99 8.7 Adding a Download T ask Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 3.2 on page 52 provides a tutorial on adding a download task. Figure 72 Applications > Download Service > Add The[...]
-
Page 100
Chapter 8 Application Screens NSA-220 User’s Guide 100 8.8 Configuring Y our General Download Preferences Click Applications > Download Service > Prefer ences to open the following screen. Use this screen to set the default location for saving down loads and configure your BitT orrent settings. Figure 73 Applications > Download Service &[...]
-
Page 101
Chapter 8 Application Screens NSA-220 User’s Guide 101 8.9 W eb Publishing W eb publishing lets y ou “publish” shares (containing folders and files) on the NSA so people can access the files using a web brows er without having to log into th e My NSA screens. This way you can share files w ith oth ers without them having to kn ow and enter a [...]
-
Page 102
Chapter 8 Application Screens NSA-220 User’s Guide 102 8.9.2 Web Publishing Port Number If the web-published shares use a port number ot her than 80 (the normal port for web traffic), users must include it after the NSA’ s IP address in order to access the NSA’ s web-published shares. For example, say you specified port 80 80, the NSA’ s IP[...]
-
Page 103
Chapter 8 Application Screens NSA-220 User’s Guide 103 Figure 75 Applications > Web Publishing The following table describes the labels in this screen. T able 29 Applications > Web Pub lishing LABEL DESCRIPTION Disable / Enable Web Publishing Turn on web publishing to let people access files in the publi shed shares using a web browser , wi[...]
-
Page 104
Chapter 8 Application Screens NSA-220 User’s Guide 104 8.1 1 W eb Publishing Example This example covers ho w to configure the W eb Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into th e My NSA screens and shows how to access the share through the Internet. 1 Click Applications > W eb P[...]
-
Page 105
Chapter 8 Application Screens NSA-220 User’s Guide 105 Figure 77 Browsing to an NSA Share Example • Click a file’ s link to open the file. • Right-click a file’ s link and select Save T arget As.. (in Internet Explorer) to save a copy of the file. • Click a label in the heading row to sort the files by that criteria. • T o customize h[...]
-
Page 106
Chapter 8 Application Screens NSA-220 User’s Guide 106 RSS (Really Simple Syndication) is a format for delivering frequent ly updated digital cont ent. At the time of writing, the NSA supports RSS 2.0 feeds. W ebsites with a feed usually display a feed icon (shown next). Copy a nd paste the feed’ s URL into the Applications > Broadcatching &[...]
-
Page 107
Chapter 8 Application Screens NSA-220 User’s Guide 107 Figure 79 Applications > Broadcatching The following table describes the labels in this screen. T able 30 Application s > Broadcat ching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button. A screen opens for [...]
-
Page 108
Chapter 8 Application Screens NSA-220 User’s Guide 108 8.14 Adding or Editing a Broadcatching Channel Click Applications > Broadcatching > Add Channel to open the followi ng screen. Use the Add screen to s ubscribe the NSA to a channel’ s feed so you can view the channel. Y ou also select policies for downloading and deleting the channel?[...]
-
Page 109
Chapter 8 Application Screens NSA-220 User’s Guide 109 The following table describes the labels in this screen. 8.15 Printer Sharing The NSA can act as a print server . A print serv er lets multiple computers share a printer . Connect a printer to the NSA’ s USB port to let multiple computers on your network use it. See www .zyxel.com for a lis[...]
-
Page 110
Chapter 8 Application Screens NSA-220 User’s Guide 11 0 8.16 Print Server Screen Click Applications > Pri nt Server to open the following screen. Use this screen to v iew and manage the NSA’ s list of printers and print jobs. Figure 82 Applications > Print Server The following table describes the labels in this screen. 8.17 Print Server R[...]
-
Page 111
Chapter 8 Application Screens NSA-220 User’s Guide 111 Apply Click Apply to save your cha nge s back to the NSA. Cancel Click Cancel to clo se this screen w ithout saving your change s. T able 33 Applications > Prin t Server > Rename LABEL DESCRIPTION[...]
-
Page 112
Chapter 8 Application Screens NSA-220 User’s Guide 11 2[...]
-
Page 113
11 3 P ART III User Account s and Shares Users (1 15) Shares (1 19)[...]
-
Page 114
11 4[...]
-
Page 115
NSA-220 User’s Guide 11 5 C HAPTER 9 Users This chapter introduces the Users screens of the NSA. 9.1 User Account s Introduction Use the Users screens to crea te and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. • Assign individual users specific acce[...]
-
Page 116
Chapter 9 Use rs NSA-220 User’s Guide 11 6 The following table describes the labels in this screen. 9.2.1 User Icons The following table describes the user icons. 9.3 Adding or Editing an Account Click the Add Account button in the Users screen to open the following screen. Use this screen to create or edit a NSA user ac count with NSA access pas[...]
-
Page 117
Chapter 9 Users NSA-220 User’s Guide 11 7 The following table describes the labels in this screen. 9.3.1 Usernames Enter a username from one to 32 characters. Th e first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characte rs are not allow ed as the first character . The username can only contain the following characters[...]
-
Page 118
Chapter 9 Use rs NSA-220 User’s Guide 11 8 • pc-guest •a d m i n • password 9.4 Delete Account Screen In the Users screen, select an acc ount and click Delete Account to open the fo llowing screen. Use this screen to remov e a us er account. Figure 86 Users > Delete Account The following table describes the labels in this screen. T able [...]
-
Page 119
NSA-220 User’s Guide 11 9 C HAPTER 10 Shares This chapter introduces the Shares screens of the NSA. 10.1 Shares Introduction Use the Shares screens to create and manage shares. A share is a set of user access permissions mapped to a spec ific folder on a vo lume. It is equivalent to the W indows concept of a shared folder , but is inde pendent of[...]
-
Page 120
Chapter 10 Shares NSA-220 User’s Guide 120 Figure 87 Shares The following table describes the labels in this screen. See T able 38 on page 1 19 for icon details. 10.2 Adding or Editing Share Click the Add Shar e or Change Share Pr operties in the Shar es screen to open the following screen. Use this screen to create a new shar ed folder . T able [...]
-
Page 121
Chapter 10 Shares NSA-220 User’s Guide 121 Figure 88 Shares > Add Share The following table describes the labels in this screen. T able 40 Shares > Add Share (or Change Share Properties) LABEL DESCRIPTION Share Name T ype a share name from 1 to 255 si ngle-byte (n o Chin ese characters allowed for example) ASCII characters. The name cannot [...]
-
Page 122
Chapter 10 Shares NSA-220 User’s Guide 122 10.2.1 Public and ANON YMOUS Share Access Right s If you make a share public, u sers do not need to log in. W ith ANONYMOUS FTP , you must enter either 'anonymo us' or 'ftp' as the username. Any other name is considered a username, so must be valid and have a corresp onding correct pa[...]
-
Page 123
Chapter 10 Shares NSA-220 User’s Guide 123 The following table describes the labels in this screen. T able 41 Shares > Share Path Browse LABEL DESCRIPTION Create Folder T ype a folder name and click Create Folder to make a new folder . The name can be 1 to 255 single -byte (no Chinese characters allowed for example) ASCII characters. The name [...]
-
Page 124
Chapter 10 Shares NSA-220 User’s Guide 124[...]
-
Page 125
125 P ART IV Maintenance, Protecting Dat a, and Media Client Maintenance Screens (127) Protecting Y our Data (135) Media Client Software (137)[...]
-
Page 126
126[...]
-
Page 127
NSA-220 User’s Guide 127 C HAPTER 11 Maintenance Screens This chapter discusses the Maintenance screens. 1 1.1 Maintenance Overview Use the maintenance screens to: • V iew logs • Manage the NSA configuration file • Upload new firmware • Restart or shut down yo ur NSA 1 1.2 Log Click Maintenance > Log to display the following screen. Th[...]
-
Page 128
Chapter 11 Maintenance Screens NSA-220 User’s Guide 128 The following table describes the labels in this screen. 1 1.3 Log Classes The following table shows information on log classes. 1 1.4 Log Severity Levels The following table shows informa tion on log severity levels. Levels range from 0 to 6 with 0 being the most severe level log and 6 bein[...]
-
Page 129
Chapter 11 Maintenance Screens NSA-220 User’s Guide 129 1 1.5 Log Messages Here are some example log messages. 4 W arning 5N o t i c e 6I n f o T able 44 Log Severity Levels (continue d) LEVEL DESCRIPTION T able 45 Log Messages CLASS SEVERITY MESSAGE Network NOTICE %s is active beca use of changing Port Group. Enable DHCP clien t. Network NOTICE [...]
-
Page 130
Chapter 11 Maintenance Screens NSA-220 User’s Guide 130 Services W ARNING Reaching Maximum Allowed Rules Services W ARNING Rule is empty Services W ARNING The Rule Does Not Exist Services NOTICE FTP server stops Services NOTICE FTP server st arts Services INFO Clock timezone is set to GMT%s Services INFO Clock timezone is set to default Services [...]
-
Page 131
Chapter 11 Maintenance Screens NSA-220 User’s Guide 131 1 1.6 Configuration Click Maintenance > Configuration to open the following screen. Use the Configuration screen to back up or restore the NSA configuratio n settings and enable or disable the hardw are reset button. Figure 91 Maintenance > Config ur ation The following table describes[...]
-
Page 132
Chapter 11 Maintenance Screens NSA-220 User’s Guide 132 Figure 92 Maintenance > FW Up gr ade The following table describes the labels in this screen. 1 1.8 Shut down Click the Maintenance link in the Navigation pa nel and t hen click the Shutdown link or the Shutdown tab to access the Maintenance > Shutdown screen. Use this screen to turn o[...]
-
Page 133
Chapter 11 Maintenance Screens NSA-220 User’s Guide 133 When you cli ck the Restart button a pop-up screen will appear asking yo u to confirm. Click OK to continue or Cancel to quit the restart. Figure 94 Maintenance > Shut down > Confirm Restart When you cli ck the Shutdown button a pop-up screen will ap pear asking you to confirm. Click O[...]
-
Page 134
Chapter 11 Maintenance Screens NSA-220 User’s Guide 134[...]
-
Page 135
NSA-220 User’s Guide 135 C HAPTER 12 Protecting Your Data This chapter compares the different ways of pr otecting data on the NSA and explains how to use backup man age ment software inc l uded on the CD. 12.1 Protection Methods There are a variety of wa ys to protect your data on the NSA. Below is a su mmary table of what can be done in each sit[...]
-
Page 136
Chapter 12 Prot ecting Your Data NSA-220 User’s Guide 136 " Configuration File Backup and Restorati on does not affect da t a (your files and folders), volumes on the NSA. 12.1.2 Memeo Autobackup Use the Memeo Au tobackup software (included on the C D) on your com puter to sche dule and manage backups. Y ou can backup from yo ur co mp uter t[...]
-
Page 137
NSA-220 User’s Guide 137 C HAPTER 13 Media Client Software This chapter introduces the media cl ient software incl uded on the CD. 13.1 Media Client Introduction The NSA can function as a server to allo w DLNA (Digital Living Network Alliance) compliant media clients to play files. The DLNA is a group of leading pers onal computer and electronics[...]
-
Page 138
Chapter 13 Media Client Software NSA-220 User’s Guide 138[...]
-
Page 139
NSA-220 User’s Guide 139 C HAPTER 14 Memeo Autobackup Software This chapter introduces the Memeo Autobackup software included on the CD. 14.1 Memeo Autobackup Introduction Use the Memeo Autobackup softwa re included on the CD to au tomatically back up selected files from your computer to the NSA whenever you modify the files. Y ou can have Meme o[...]
-
Page 140
Chapter 14 Memeo Autobackup So ftware NSA-220 User’s Guide 140[...]
-
Page 141
141 P ART V T roubleshooting and S pecifications T roubleshooting (143) Product Specification s (155)[...]
-
Page 142
142[...]
-
Page 143
NSA-220 User’s Guide 143 C HAPTER 15 Troubleshooting 15.1 T roubleshooting Overview This chapter offers some sugg estions to solve problems you might encounter . The potential problems are divided into the following categories. • Power , Hardware, Connections, and LEDs • NSA Login and Access • Reset the NSA • I Cannot Access The NSA • E[...]
-
Page 144
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 144 V An HDD LED is orange. Orange means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector , but the LED stays orange until the NSA restarts. Even if the hard drive still functions, it is recommended that you re[...]
-
Page 145
Chapter 15 Troubleshooting NSA-220 User’s Guide 145 V The LAN LED (by the LAN port) is of f. • Make sure the Ethernet cable is connected pr operly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it’ s connected directly to a computer , make sure that the computer network card is working (p in[...]
-
Page 146
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 146 • By default, the NSA gets an IP address au tomatically . The NSA assigns itself an IP address if no device assigns one. If your co mputer is also set to get an IP address automatically , the compute r and the NSA can both assign themselves IP addresses and communicate. See Chapter 7 on p[...]
-
Page 147
Chapter 15 Troubleshooting NSA-220 User’s Guide 147 • Confirm that the computer running the NDU has a network connection. See the section on the NSA’ s LAN connection for related information. • The computer running the NDU can only discover NSAs in the same subnet. NSAs connected to the same switch or router as your NDU computer are usually[...]
-
Page 148
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 148 Figure 97 Security Settings - Script S afe ActiveX Controls V I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the user name and password correctly . The default username is admin , and the default password is 1234 . These fields are case-sensitive,[...]
-
Page 149
Chapter 15 Troubleshooting NSA-220 User’s Guide 149 • Check that the NSA is turned on and connected to the network. T ry to ping th e NSA or use the NDU to discover it. • Check that you entered your login name and password correctly . • Check that the share exists and check its access settings. • Check if the shared folder is a subfolder [...]
-
Page 150
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 150 15.6 Some Features’ Screens Do Not Display V Many NSA features require a valid internal volume. Features like the print server , download se rvice, broadcatching, FTP and W indows/CIFS access will not work without a valid internal vo lume. Make sure you ha ve a volume on an internal disk [...]
-
Page 151
Chapter 15 Troubleshooting NSA-220 User’s Guide 151 2 Go to Applications > Media Server . Make sure the share containing the music and video files is published and the iT unes server option is enabled. 3 If an iT unes client is connected, the NSA’ s iT unes server function scans the published media server folders for files every three mi nut[...]
-
Page 152
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 152 1 Make sure the files are a format s upported by iT unes. See Section 16.5 on page 160 . 2 If you have files from the iTunes S tore tha t use DRM, you need to use your App le account ID and password to authorize other computers to play the files. Apple pe rmits you to authorize up to five c[...]
-
Page 153
Chapter 15 Troubleshooting NSA-220 User’s Guide 153 • W eb publishing uses TCP prot ocol and the port number you specify . Make sure there i s not another service using TCP protocol with the same port number . See Appendix C on page 187 for a list of common services and their associated protocols and port numbers. • If Firefox access to the s[...]
-
Page 154
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 154[...]
-
Page 155
NSA-220 User’s Guide 155 C HAPTER 16 Product Specifications See also Chapter 1 on pa ge 25 for a general overview of the key features. 16.1 Physical Features These are the main external physical features. 16.2 Firmware Features These are some of the main firmware features of the NSA. T able 51 Physical Features USB Ports 2 USB (version 2) ports. [...]
-
Page 156
Chapter 16 Product Specifications NSA-220 User’s Guide 156 16.3 S pecification T ables The NSA hardwa re sp e cif i cations are shown in the following table. RAID File S torage Use RAID 0 if you want pure write speed and /or maximum capacity for your drives, and/or you have ot her means of protecting your data. Use RAID 1 if you have two drives a[...]
-
Page 157
Chapter 16 Product Specifications NSA-220 User’s Guide 157 The NSA firmware specif ications are shown in the following table Compatible Hard Disks A SA T A I an d SA T A 3.0 Gbit/s (Serial Advanced T echnology Attachment) compatible hard drives. Maximum S torage Capacity 1.5 TB (with two 750 GB hard drives installed) is the largest storage capaci[...]
-
Page 158
Chapter 16 Product Specifications NSA-220 User’s Guide 158 The following list, which is not exhaustive, illustrates the standards and recommendations supported in the NSA. Supported Cl ients Windows 2000 Professional/Server Windows XP Home/Professional Windows 2003 Windows Vista Linux Maximum Number of Users Allowed 100 A Maximum Number of Concur[...]
-
Page 159
Chapter 16 Product Specifications NSA-220 User’s Guide 159 ISO 15740 Picture T ransfer Protocol (PTP) from the International imaging Industry Association allows you to transfe r pi cture s from digital cameras or other devices without needing add itional device drivers. RFC 1001 (STD-19) - Protocol standard fo r NetBIOS service on a TCP/UDP trans[...]
-
Page 160
Chapter 16 Product Specifications NSA-220 User’s Guide 160 16.4 Supported Media Server Content Format s The following describes the deta ils about the files that the NSA media server can publish. * Files may be converted to JPEG to allow play b ack on client applicatio ns that do not support the original file formats. " Not all published fil[...]
-
Page 161
Chapter 16 Product Specifications NSA-220 User’s Guide 161 " This table is a laboratory test of NSA power consum ption for your reference only . 16.7 Comp atible Hard Disks The following hard disks have been tested an d are known to be compatible with the NSA. T able 57 Power Consumption in Watts (W) POWER SOURCE SYSTEM BOOT UP SYSTEM READ/W[...]
-
Page 162
Chapter 16 Product Specifications NSA-220 User’s Guide 162[...]
-
Page 163
163 P ART VI Appendices and Index Setting up Y our Computer ’ s IP Address (165) Open Source Licences (191) Legal Information (221) Customer Support (223) Index (229)[...]
-
Page 164
164[...]
-
Page 165
NSA-220 User’s Guide 165 A PPENDIX A Setting up Y our Computer ’ s IP Address All computers must have a 10M or 100M Et hernet adapter card and TCP/IP installed. W indows 95/98/Me/NT/2000/XP , M a cintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your co[...]
-
Page 166
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 166 Figure 100 WIndows 95/98 /Me: Networ k: Configuratio n Inst alling Components The Network window Configuration tab displays a list of installed components. Y ou need a network adapter , the TCP/IP protocol and Client for Microsoft Netwo rks. If you need the adapter: 1 In [...]
-
Page 167
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 167 Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically . • If you have a static IP address, sele[...]
-
Page 168
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 168 Figure 102 Windows 95/98/Me : TCP/IP Pr operties: DNS Configuration 4 Click the Gateway tab. • If you do not know you r ga teway’ s IP addr ess, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add [...]
-
Page 169
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 169 Figure 103 Windows XP: S tart Menu 2 In the Control Panel , double-click Network Connections ( Network and Dial-up Connections in W indow s 20 00/NT). Figure 104 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Pr operties .[...]
-
Page 170
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 170 Figure 105 Windows XP: Control Panel: Network Connections: Pro per ties 4 Select Internet Protocol (TCP/IP) (under the Genera l tab in W in XP) and then click Properties . Figure 106 Windows XP: Local Area Conne ction Properties 5 The Internet Protocol TCP/IP Pr operties [...]
-
Page 171
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 171 Figure 107 Windows XP: Internet Protocol (TCP/IP) Propert ies 6 If you do not know your gateway's IP ad dress, remove any previously installed gateways in the IP Settings tab and click OK . Do one or more of the fo llowing if you want to configure additi onal IP addr[...]
-
Page 172
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 172 Figure 108 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Pr operties window (the General tab in W indow s XP): • Click Obtain DNS server address automatically if yo u d o not know your DNS server IP address(es). • If you know your DNS server[...]
-
Page 173
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 173 Figure 109 Windows XP: Internet Protocol (TCP/IP) Propert ies 8 Click OK to close the Internet Protocol (TCP/IP) Properties window . 9 Click Close ( OK in W i nd ows 2000/NT) to close the Local Area Connection Properties window . 10 Close the Network Connections window ( [...]
-
Page 174
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 174 Figure 1 10 Macintosh OS X: App le Menu 2 Click Network i n the icon bar . • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure lis[...]
-
Page 175
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 175 V erifying Settings Check your TCP/IP properties in the Network window . Linux This section shows you how to configure your computer’ s TCP/IP settings in Red Hat Linux 9.0. Procedure, screens an d file loc ation may vary depe nd ing on your Linux distribution and relea[...]
-
Page 176
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 176 Figure 1 13 Red Hat 9.0: KDE: Ethernet Device: Gener al • If you have a dyna mic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address, click S tatically set IP Addresses and fill in [...]
-
Page 177
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 177 Figure 1 15 Red Hat 9.0: KDE: Network Configuration: Activate 7 After the network card restart proc ess is complete, make sure the St a t u s is Ac tive in the Network Configuration screen. Using Configuration Files Follow the steps below to edit the network co nfiguratio[...]
-
Page 178
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 178 Figure 1 18 Red Hat 9.0: DNS Settings in resolv .conf 3 After you edit and save the configuration files, you must restar t the network card. Enter ./network restart in the /etc/rc.d/init.d directory . The following figure shows an example. Figure 1 19 Red Hat 9.0: Rest ar[...]
-
Page 179
NSA-220 User’s Guide 179 A PPENDIX B Pop-up Windows, JavaScript s and Java Permissions In order to use the web configurator yo u need to allow: • W eb browser pop-u p windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). " Internet Explorer 6 screens are used here. Screens for other Inte[...]
-
Page 180
Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 180 2 Clear the Block pop-ups check box in the Pop-up Block e r section of the screen. This disables any web po p-up blockers you ma y have enabled. Figure 122 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Al[...]
-
Page 181
Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 User’s Guide 181 Figure 123 Internet Options: Privacy 3 T ype the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites . Figu[...]
-
Page 182
Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 182 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript s If pages of the web configura tor do not display properly in Inte rnet Explorer , check that JavaScripts are allowed. 1 In Internet Explorer , click T ools , Inter[...]
-
Page 183
Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 User’s Guide 183 Figure 126 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer , click To o l s , Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM . 4 Under Java permissions make sure that a sa[...]
-
Page 184
Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 184 JA V A (Sun) 1 From Internet Explorer , click To o l s , Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is sele cted. 3 Click OK to clos e the wind ow . Figure 128 Java (Sun) Mozilla Firefox Mozilla[...]
-
Page 185
Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 User’s Guide 185 Figure 129 Mozilla Firefox: T ools > Options Click Content .to show the screen below . Select the check boxes as shown in the follo wing screen. Figure 130 Mozilla Firefox Content Security[...]
-
Page 186
Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 186[...]
-
Page 187
NSA-220 User’s Guide 187 A PPENDIX C Common Services The following table l ists some commonly-used se rvices and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name : This is a short, descrip tive name for[...]
-
Page 188
Appendix C Common Services NSA-220 User’s Guide 188 FTP TCP TCP 20 21 File T ransfer Program, a program to enable fast transfe r of files, i ncluding large files that may not be possible by e-mail. H.323 TCP 1720 NetMeeting uses this protoco l. HTTP TCP 80 Hyper T ext T ransfer Protocol - a client/ server protocol for the world wide web. HTTPS TC[...]
-
Page 189
Appendix C Common Services NSA-220 User’s Guide 189 RTS P TCP/UDP 554 The Real Time S tre aming (medi a control) Protocol (R TSP) is a remote control for multimedia on the Internet. SFTP TCP 11 5 Simple File Transfer Protocol. SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to mo ve me[...]
-
Page 190
Appendix C Common Services NSA-220 User’s Guide 190[...]
-
Page 191
NSA-220 User’s Guide 191 A PPENDIX D Open Source Licences Notice Information herein is subject to change withou t notice. Companies, name s, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical , for any purpos e, except the express w[...]
-
Page 192
Appendix D Open Source Licences NSA-220 User’s Guide 192 “Derivative W orks” shall mean any work, whether in Source or Object form, that is based on (or derived from) the W ork and for which the edit orial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship . For the purposes of t[...]
-
Page 193
Appendix D Open Source Licences NSA-220 User’s Guide 193 distributed as part of the Derivative W orks; within the Source form or do cumentation, if provided along with the Derivative W orks; or , within a display genera ted by the Derivative W orks, if and wherever such third-party no tices n ormally appear . The contents of the NOTICE file are f[...]
-
Page 194
Appendix D Open Source Licences NSA-220 User’s Guide 194 Redistribution and use in source and binary fo rms, with or without modification, are permi tted provided that the following conditions are met: Redistributions of source co de must retain the above copyright notice, this li st of conditions and the following disclaimer . Redistributions in[...]
-
Page 195
Appendix D Open Source Licences NSA-220 User’s Guide 195 The licenses for most software ar e de signed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your free dom to share and change free software--to make su re the software is free for all its users. This license, the Les[...]
-
Page 196
Appendix D Open Source Licences NSA-220 User’s Guide 196 W e call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Pu blic License. It also provides other free software developers Less of an advant age over competing non-free programs. Thes e disadvan tages are [...]
-
Page 197
Appendix D Open Source Licences NSA-220 User’s Guide 197 1. Y ou may copy and distribute verbatim copies of the Library's comple te source code as you receive it, in any medium, provided that you conspicuou sly and appro priately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that[...]
-
Page 198
Appendix D Open Source Licences NSA-220 User’s Guide 198 compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library , but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a d[...]
-
Page 199
Appendix D Open Source Licences NSA-220 User’s Guide 199 required form of the “work that uses the Librar y” must include any data and utility programs needed for reproducing the executable from it. Howeve r, as a special exception, the materials to be distributed need not include an ything that is normally distributed (in either source or bin[...]
-
Page 200
Appendix D Open Source Licences NSA-220 User’s Guide 200 contest validity of any such claims; this sec tion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have mad e generous contribution s to the wide range of software distributed through tha[...]
-
Page 201
Appendix D Open Source Licences NSA-220 User’s Guide 201 END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, auto fs, device-mapper , evms, exim. Lm_sensors, mdadm, pam_mount, raid tools, samba, sg_utils, smartmontool s, vsftpd, xfsprogs and Linux kernel software under GPL license. GNU GENERAL PUBLIC LICENSE V ersion 2, June 19 91 [...]
-
Page 202
Appendix D Open Source Licences NSA-220 User’s Guide 202 0. This License ap plies to any program or othe r work which contains a notice pla ced by the copyright holder saying it may be distributed under the terms of this Ge neral Public License. The “Program”, belo w , refers to any such prog ram or work, and a “work based on the Program”[...]
-
Page 203
Appendix D Open Source Licences NSA-220 User’s Guide 203 3. Y ou may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sec tions 1 and 2 above provided that you also do one of the following: a) Accompany it with the comple te corresponding machine-readab le source code, w[...]
-
Page 204
Appendix D Open Source Licences NSA-220 User’s Guide 204 directly or indirectly through you, then the on ly way you could satisfy both it and this License would be to refrain entirely from di stribution of the Program. If any portion of this section is held invalid or unenforce able under any particul ar circ umstance, the balance of the se ction[...]
-
Page 205
Appendix D Open Source Licences NSA-220 User’s Guide 205 INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DA T A OR DA T A BEING RENDERED INACCURA TE OR LOSSES SUST AINED BY YOU OR THIRD P AR TIES OR A F AILURE OF THE PROGRAM TO OPERA TE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER P AR TY HAS BEEN ADVISED OF THE POSSI[...]
-
Page 206
Appendix D Open Source Licences NSA-220 User’s Guide 206 Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays unde r a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-s tyle Open Source li[...]
-
Page 207
Appendix D Open Source Licences NSA-220 User’s Guide 207 Original SSLeay License -------------------------------- Copyright (C) 1995-1998 Eric Y oung (e ay@cryptsoft.com) A ll ri ghts reserved. This package is an SSL implementation written by Eric Y oung (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’ s SSL. [...]
-
Page 208
Appendix D Open Source Licences NSA-220 User’s Guide 208 This Product include mod _ ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights rese rved. Redistribution and us e in source and binary forms, with or without modification, are permitte d provided that the[...]
-
Page 209
Appendix D Open Source Licences NSA-220 User’s Guide 209 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number . Once covered code has been published unde r a particular version of th e license, you may alwa ys continue to use it unde r the terms of th[...]
-
Page 210
Appendix D Open Source Licences NSA-220 User’s Guide 210 1.2. “Contributor V ersion” means the combina tion of the Original Code, prior Modifications used by a Contributor , and th e Modifications made by that pa rticular Contributor . 1.3. “Covered Code” means the Original Code or Modifications or th e combination of the Original Code an[...]
-
Page 211
Appendix D Open Source Licences NSA-220 User’s Guide 21 1 The Initial Developer hereby grants Y ou a wo rld-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify , display , perform[...]
-
Page 212
Appendix D Open Source Licences NSA-220 User’s Guide 212 Any Modification which Y ou create or to which Y ou contribute must be made available in Source Code form under the terms of this Licen se either on the same media as an Executable version or via an accepted Electronic Distribu tion Mechanism to anyone to whom you made an Executable version[...]
-
Page 213
Appendix D Open Source Licences NSA-220 User’s Guide 213 Contributor . Y ou must make it absolutely clear than any such warranty , support, indemnity or liability obligation is of fered by Y ou alone, and Y ou hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contribu[...]
-
Page 214
Appendix D Open Source Licences NSA-220 User’s Guide 214 Once Covered Code has bee n published under a particul ar version of the License, Y ou may always continue to use it under the terms of that version. Y ou may also choose to use su ch Covered Code under the terms of any sub sequent version of the License published by Netscape. No one other [...]
-
Page 215
Appendix D Open Source Licences NSA-220 User’s Guide 215 any software, hardware, or device , other than such Participant's Contributor V ersion, directly or indirectly infringes any patent, then any ri ghts granted to Y ou by such Participant under Sections 2.1(b) and 2.2 (b) are revoked effective as of the date Y ou first made, used, sold, [...]
-
Page 216
Appendix D Open Source Licences NSA-220 User’s Guide 216 As between Initial Developer and the Contri butors, each party is responsible for claims and damages arising, directly or indirectly , out of its utilization of rights under this License and Y ou agree to work with Initial De veloper and Contributors to dist ribute such responsibility on an[...]
-
Page 217
Appendix D Open Source Licences NSA-220 User’s Guide 217 The above copy righ t notic e an d t his permis sio n notice shall be included in all copies or substantial portions of the Software. THE SOFTW ARE IS PROVIDED “AS IS”, WITHOUT W ARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED T O THE W ARRANTIES OF MERCHANT ABILITY ,[...]
-
Page 218
Appendix D Open Source Licences NSA-220 User’s Guide 218 4.Restrictions Y ou may not publish, display , disclose, sell, re nt, lease, modify , store, loan, distribute, or create derivative works of the Software, or any part thereof. Y ou may not a ssign, sublicense, convey or otherwise transfer , pledge as secur ity or otherwise encumber the righ[...]
-
Page 219
Appendix D Open Source Licences NSA-220 User’s Guide 219 DOCUMENT A TION OR OTHER WISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME ST A TES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMIT A TION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENT AL DAMAGES, THE ABOVE LIMIT A TION MA Y NOT APPL Y TO YOU. 8.Export [...]
-
Page 220
Appendix D Open Source Licences NSA-220 User’s Guide 220[...]
-
Page 221
NSA-220 User’s Guide 221 A PPENDIX E Legal Information Copyright Copyright © 2007 by ZyXEL Communications Corporation. The contents of this publication may not be reprod uced in any part or as a whole, transcribed, stored in a retrieval system, tran slated into any language, or transmitted in any form or by any means, el ectronic, mechanical , m[...]
-
Page 222
Appendix E Leg al In fo rm at ion NSA-220 User’s Guide 222 This device has been tested and foun d to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. Thes e limits are designed to provide reasonable protection against harmful interference in a resi dential installation. This device generates, uses, and can[...]
-
Page 223
NSA-220 User’s Guide 223 A PPENDIX F Customer Support Please have the following information r eady when you contact customer support. Required Information • Product model and serial number . • W arranty Information. • Date that you received your de vice. • Brief description of the problem and the steps you took to solv e it. “+” is th[...]
-
Page 224
Appendix F Custo m er Supp o rt NSA-220 User’s Guide 224 • Re g u l ar M a il : ZyXEL Communications, Czech s.r .o., Modranská 621, 143 01 Praha 4 - Modrany , Ceská Republika Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk • T elephone: +45-39-55-07-00 • Fax: +45-39-55-07-07 • W eb: www .zyxel.dk • Re g u[...]
-
Page 225
Appendix F Customer Support NSA-220 User’s Guide 225 India • Support E-mail: support@zyxel.in • Sales E-mail: sales@zyxel.in • T elephone: +91-1 1-30888144 to +91 -11-308 88153 • Fax: +91-1 1-30888149, +91 -11-2 6810715 • W eb: http://www .zyxel.in • Re g u l ar M a i l : India - ZyXEL T echnology Indi a Pvt Ltd. , I I - F l o o r, F2[...]
-
Page 226
Appendix F Custo m er Supp o rt NSA-220 User’s Guide 226 • Regular Mail: ZyXEL Communications Inc., 1 130 N. Miller St., Anaheim, CA 92806- 2001, U.S.A. Norway • Support E-mail: support@zyxel.no • Sales E-mail: sales@zyxel.no • T elephone: +47-22-80-61-80 • Fax: +47-22-80-61-81 • W eb: www .zyxel.no • Re g u l a r M a i l: ZyXEL Com[...]
-
Page 227
Appendix F Customer Support NSA-220 User’s Guide 227 Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • T elephone: +46-31-744-7700 • Fax: +46-31-744-7701 • W eb: www .zyxel.se • Re g ul a r M a i l: ZyXEL Communications A/S, Sjöporten 4, 41764 Götebor g, Sweden Thailand • Support E-mail: support@zyxel.co.t[...]
-
Page 228
Appendix F Custo m er Supp o rt NSA-220 User’s Guide 228[...]
-
Page 229
Index NSA-220 User’s Guide 229 Index A about icon 41 accessing share contents 34 accessing the web configu rator 29 administration screens 32 , 40 anonymous access rights 122 ANONYMOUS FTP 122 anonymous FTP access 90 anti-virus 95 apac he license 191 B BitT orrent 94 blogs 105 broadcatching 105 C certifications 157 , 22 1 notices 222 viewing 222 [...]
-
Page 230
Index NSA-220 User’s Guide 230 entry removal 43 everyone access rights 122 exitin g th e w eb config ur ator 32 , 41 external devices 34 external disks 80 external hard drive removal hard drives external 44 external hard drives 64 external shares 34 F FAT 1 6 80 FAT 3 2 80 faulty hard disk 44 replacement 44 FCC interf er ence statement 22 1 feeds[...]
-
Page 231
Index NSA-220 User’s Guide 231 IDP (Intrusion Detectio n and Prevention) 95 inactive 78 insta l l dr ives 26 internal hard drives 34 , 64 iT unes 90 J JavaScript 29 jumbo frames 85 L LAN LEDs 28 language 41 language encoding 90 LEDs 26 liability 221 license 221 license Agreement for “NSA” 217 lights 26 links sub-links 42 to screens 42 locate [...]
-
Page 232
Index NSA-220 User’s Guide 232 pop-ups 29 power consumption 160 , 161 POWER LED 27 print server 109 private shares 37 proof of purchase 222 public shares 37 publish shares 90 publishing shares to the web 101 R radio shows 105 RAID type 64 RAID file storage 156 RAID volume repair 44 recovering 78 related documentation 3 remove hard drives 26 remov[...]
-
Page 233
Index NSA-220 User’s Guide 233 torrent file 94 troubleshooting external disks 149 forgot password 145 LED indicators 143 LAN 145 login 148 media files 150 NDU discovery 147 overview 143 user share access 149 web configurator access 145 TV programs 105 type 64 U USB devices 34 USB hard drives 64 user access permissions 33 user icon 44 user name re[...]
-
Page 234
Index NSA-220 User’s Guide 234[...]