Go to page of
Similar user manuals
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of ZyXEL NSA320, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ZyXEL NSA320 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of ZyXEL NSA320. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of ZyXEL NSA320 should contain:
- informations concerning technical data of ZyXEL NSA320
- name of the manufacturer and a year of construction of the ZyXEL NSA320 item
- rules of operation, control and maintenance of the ZyXEL NSA320 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ZyXEL NSA320 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ZyXEL NSA320, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ZyXEL service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ZyXEL NSA320.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the ZyXEL NSA320 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
www .zyxel.com www .zyxel.com NSA320 2-Bay Digit al Media Server Copyright © 2010 ZyXEL Communications Corporation Firmware V ersion 4.01 Edition 1, 06/2010 Default Login Details W eb Address nsa320 User Name admin Pa ss wo rd 1234[...]
-
Page 2
[...]
-
Page 3
About This User's Guide NSA320 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who w ant to configure the NSA using the W eb Configurator . Tip s for Reading User ’ s Guides On-Screen When reading a Zy XEL User’s Guide On -Screen, k eep the following in mind: • If you don’ t alre ady h[...]
-
Page 4
About This User's Guide NSA320 User’s Guide 4 Documentation Feedback Send your comments, questions or su ggestions to: techwriters@zyxel.com.tw Thank you! The T echnical W riting T eam, Z yXEL Communications Corp . , 6 Innovat ion Road II, Science-Based In dustrial P ark, Hsinchu, 30099, T aiwan. Need More Help? More help is av ailable at ww[...]
-
Page 5
About This User's Guide NSA320 User’s Guide 5 Customer Support Should problems arise that cannot be solved by the methods listed above, you shou ld con tact yo ur ven dor . If you ca nnot cont act you r vend or , then co ntac t a Z yXEL office fo r the region in wh ich you bought the de vice. See http://www .zyxel.com/web/contact_us.php for [...]
-
Page 6
Document Conventions NSA320 User’s Guide 6 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User’ s Guide. W arnings tell you about things that could harm you or your device. Note: Notes tell you other import ant informat ion (for e xample, other things you may need to configure or help ful tips) or re[...]
-
Page 7
Document Conventions NSA320 User’s Guide 7 Icons Used in Figures Figures in this User’s Guide ma y use the following generic icons. The NSA icon is not an exact representation of y our device. Graphics in this book may differ slight ly from the product due to differences in operating systems, operati ng system versions , or if you installed upd[...]
-
Page 8
Safety Warnings NSA320 User’s Guide 8 Safety Warnings • Do NO T use this product near water , for exam ple, in a wet basement or near a swimming pool. • Do NO T expose your device to dampness, dust or corrosive liquids. • Do NO T store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a re[...]
-
Page 9
Contents Overview NSA320 User’s Guide 9 Contents Overview User ’ s Guide ................................................................................... ............................... ......... 21 Getting to Know Y our NSA .................... ................ ............. ................ ................ ............. ........ .. 23 NAS[...]
-
Page 10
Contents Overview NSA320 User’s Guide 10[...]
-
Page 11
Table of Contents NSA320 User’s Guide 11 Table of Contents About This User's Guide ........................................... ..................................................... .......... 3 Document Conventions.................................................................. ......................................... .6 Safety Warnings .[...]
-
Page 12
Table of Contents NSA320 User’s Guide 12 3.2 Accessing the NSA Web Configurator ... ................. ................ ................ ................ ............. 49 3.2.1 Access the NSA Via NAS S t arter Utility .............. ................ ................ ................ ....... 49 3.2.2 Web Browser Access .......... ................ .[...]
-
Page 13
Table of Contents NSA320 User’s Guide 13 4.9 Download Service T utorial .. ............. ................ ................ ................ ............. ................ ..... .. 94 4.9.1 Copying/Pasting a Download Link ......... ............. ............. ................ ............. ............. 94 4.9.2 Installing the Link Capture Browser[...]
-
Page 14
Table of Contents NSA320 User’s Guide 14 7.2.1 Disk Replacement Restrictions ........... ... .......... ............. ................ ............. .............. 160 7.2.2 S torage Screen ................... ................ ............. ................ ................ ............. ........... 16 1 7.3 Creating an Internal V olume .. ......[...]
-
Page 15
Table of Contents NSA320 User’s Guide 15 9.9.1 Print S erver Rename ................ ............. ................ ................ ............. ................ ..... 215 9.10 The Copy/Sync Butt on Screen ...... ............. ................ ............. ................ ............. ........... 2 16 9.1 1 T echnic al Reference ............[...]
-
Page 16
Table of Contents NSA320 User’s Guide 16 10.10.1 Backup: S tep 1 ..... ................ ................ ................. ................ ................ ............. . 263 10.10.2 Backup: S tep 2 ..... ................ ................ ................. ................ ................ ............. . 265 10.10.3 Backup: S tep 3 ..... .....[...]
-
Page 17
Table of Contents NSA320 User’s Guide 17 13.1 Overview ........... ................ ............. ................ ................ ............. ................ ............ ......... 307 13.2 What Y ou Can Do ....... ................ ............. ................ ............. ................ ............. ............ .. 307 13.3 The Groups[...]
-
Page 18
Table of Contents NSA320 User’s Guide 18 Chapter 16 Protecting Y our Dat a....................................... ................................................................ .... .. 347 16.1 Overview ........... ................ ............. ................ ................ ............. ................ ............ ......... 347 16.2 Pro[...]
-
Page 19
Table of Contents NSA320 User’s Guide 19 Appendix D Importing Certificates .................................................................................. ...... 41 1 Appendix E Open Source Licences ................................................ ...................................... 443 Appendix F Legal Information .............. ..........[...]
-
Page 20
Table of Contents NSA320 User’s Guide 20[...]
-
Page 21
21 P ART I User ’ s Guide[...]
-
Page 22
22[...]
-
Page 23
NSA320 User’s Guide 23 C HAPTER 1 Getting to Know Your NSA 1.1 Overview This chapter covers the main features and applications of the NSA. Use the NSA to do the following. • Share files between compute rs on your network. • Back up fi les from your computers to the NSA. •U s e t h e COPY/SYNC button to copy or synchronize files between the [...]
-
Page 24
Chapter 1 Getting to Know Your NSA NSA320 User’s Guide 24 Figure 1 Example of the NSA in a Home Network Above is the NS A in a home network. Users back up and share data on the NSA. The DMA- 2500 plays the NSA’ s media files on the TV . A USB hard drive provides extra stor age space and files are copied di rectly from the USB mass storag e devi[...]
-
Page 25
Chapter 1 Gettin g to Know Your NSA NSA320 User’s Guide 25 1.3 LEDs The NSA LEDs (lights) tell you important information. Figure 2 NSA Front Panel This table describes the NS A’ s LEDs. T able 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned on and receiving power . Off The NSA is turned off . SYSTEM Green On The NSA has full[...]
-
Page 26
Chapter 1 Getting to Know Your NSA NSA320 User’s Guide 26 1.3.1 COPY/SYNC Button Use the COPY/SYNC button on the front panel to copy or synchronize files between a connected USB de vice and the NS A. See Section 9.10 on page 216 for more details on how to configure the c opy/sync settings. HDD1/ HDD2 Green On The hard disk drive is connected prop[...]
-
Page 27
Chapter 1 Gettin g to Know Your NSA NSA320 User’s Guide 27 1.3.2 RESET Button Use the RESET button on the rear panel to re store the NS A’ s default settin gs. Figure 3 The RESET Button •P r e s s t h e RESET button until you hear one beep (after about two seconds), then release it. Y ou will hear one more beep after you release the button. T[...]
-
Page 28
Chapter 1 Getting to Know Your NSA NSA320 User’s Guide 28[...]
-
Page 29
NSA320 User’s Guide 29 C HAPTER 2 NAS Starter Utility 2.1 Overview This chapter describes the NAS Start er Utility . Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it. Make sure you have a backup of any existing data in the hard disk before inst alling it in the NSA. Using the i[...]
-
Page 30
Chapter 2 NAS St arter Utility NSA320 User’s Guide 30 Start the NAS Starter Ut ility (click the ic on in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility ). The first time you open the NAS Starter Utility the di scovery screen appears as foll ows. Figure 4 NAS Discovery The following table describes t he labels in this s[...]
-
Page 31
Chapter 2 NAS Starter Utility NSA320 User’s Guide 31 2.4 Main NAS S t arter Utility Screen The main NAS Starter Utility screen disp lays after you select a NS A in the NSA Discovery screen. Figure 5 NAS Starter Utility Mai n Screen The following table describes t he labels in this screen. T able 3 NAS Starter Utilit y Main Screen LABEL DESCRIPTIO[...]
-
Page 32
Chapter 2 NAS St arter Utility NSA320 User’s Guide 32 2.5 Initialization Wizard Use these screens to set up the NSA for the first time Click Run the Initialization Wizard in the main utility screen to display the following screen. Y ou must log in using an admin account. The default administr ator username is ‘admin’ and the default password [...]
-
Page 33
Chapter 2 NAS Starter Utility NSA320 User’s Guide 33 Choose Default Configuration (recommended) or manual configuration. Use the manual option if you need to name the NS A to configure specific network settings. Click Next . Figure 7 Initialization Wizard: Wizard T ype 2.5.1 Default Configuration 1 The NAS Starter Utility checks the Internet conn[...]
-
Page 34
Chapter 2 NAS St arter Utility NSA320 User’s Guide 34 2 T ype a new administrator password (and retype it to confir m). If you do not want to change the administr ator password, you can leave the f ields blank and just click Next . Figure 9 Change Admin Password 3 Specify usernames and passwords for the individuals you w ant to be able to access [...]
-
Page 35
Chapter 2 NAS Starter Utility NSA320 User’s Guide 35 4 Check your settings. If they are OK, cli ck Next . Otherwise click Back . If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual. Figure 1 1 Confirm Settings 5 W ait while the NAS Starter Uti lity configures the NS A. Fig[...]
-
Page 36
Chapter 2 NAS St arter Utility NSA320 User’s Guide 36 click Finish to return to the main NAS Starter Utility screen (see S ection 2.4 on page 31 ). Figure 13 Setting th e NAS 2.5.2 Manual Configuration 1 Set up the NSA’ s basic network configur ation first. Figure 14 Setup Network[...]
-
Page 37
Chapter 2 NAS Starter Utility NSA320 User’s Guide 37 The following table descri bes the labels in this screen. 2 If your Internet connecti on requires yo u to enter a user name and password to connect to the Internet, en ter them here and click Next . If you do not need to enter a user name and password to connect to the Internet, click Skip . Fi[...]
-
Page 38
Chapter 2 NAS St arter Utility NSA320 User’s Guide 38 3 The NAS Starter Utility checks the Internet connection. Figure 16 Check Network Conne ction 4 T ype a new administr ator password (and retype it to confirm) and click Next . If you do not w ant to change the administr ator password, y ou can leave the fields blank and just click Next . Figur[...]
-
Page 39
Chapter 2 NAS Starter Utility NSA320 User’s Guide 39 5 Specify a name to uniq uely identify th e NS A on your network. Choose the time zone of your loca tion. This se ts the ti me difference between your time z one and Greenwich Mean Time (GMT). Figure 18 Create User Account s 6 Select how to configure the hard disks. Figure 19 Create User Accoun[...]
-
Page 40
Chapter 2 NAS St arter Utility NSA320 User’s Guide 40 • RA ID 0 : Us e th is if you want max imu m s peed fo r you r dis ks, and /or you h ave other means of protecting y our data. RAID 0 has the fastest read and write performance but i f one disk fails y ou lose all your data from both disks. 7 This screen lists the shares the NAS Starter Util[...]
-
Page 41
Chapter 2 NAS Starter Utility NSA320 User’s Guide 41 9 If the settings are OK, click Next . Otherwise click Back . If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual. Figure 22 Confirm Se ttings 10 W ait while the NAS Starter Uti lity configures the NS A. Figure 23 Settin[...]
-
Page 42
Chapter 2 NAS St arter Utility NSA320 User’s Guide 42 click Finish to return to the main NAS Starter Utility screen (see S ection 2.4 on page 31 ). Figure 24 Setting th e NAS 2.5.3 Directory of the NAS Enter the ad ministrator user name and password and click Login . Figure 25 Login The utility opens the NSA’ s dire ctory in Wind ows Explorer .[...]
-
Page 43
Chapter 2 NAS Starter Utility NSA320 User’s Guide 43 2.6 Import Files or Folders with zPilot In the main NAS Starter Utilit y screen click Import files or folders with zPilot to be able to drag and drop files from your computer to the NSA. Enter the ad ministrator user name and password and click Login . Figure 27 Login The zPilot icon displays. [...]
-
Page 44
Chapter 2 NAS St arter Utility NSA320 User’s Guide 44 Double-click the zPil ot icon to displa y the NAS Starter Utility sc reen with status details about the file tr ansfers. Click the “x” butt on next to a file entry to stop transferring the file. Click Clean Up to clear completed tr ansfers from the list. Figure 30 zPilot Showing T ransfer [...]
-
Page 45
Chapter 2 NAS Starter Utility NSA320 User’s Guide 45 Windows Explorer (M y Computer) where y ou can access and us e it like y our computer’s other drives. Figure 32 Network Drive Mapping 2.8 Manage the Device In the main NAS Starter Utilit y screen click Manage the Device to log into t he NSA’ s administr ation screens where y ou can manage t[...]
-
Page 46
Chapter 2 NAS St arter Utility NSA320 User’s Guide 46 Click Configure network setting in the main utility screen to d isplay the following screen. Figure 34 NAS S tarter Utility > Configu re network setting The following table descri bes the labels in this screen. T able 5 NAS Starter Utility > Config LABEL DESCRIPTION NAS Name Specify a na[...]
-
Page 47
Chapter 2 NAS Starter Utility NSA320 User’s Guide 47 If your Internet connecti on requires yo u to enter a user name and password to connect to the Internet, select Enable PPPoE Connection and enter your user name and password. Figure 35 PPPoE[...]
-
Page 48
Chapter 2 NAS St arter Utility NSA320 User’s Guide 48[...]
-
Page 49
NSA320 User’s Guide 49 C HAPTER 3 Web Configurator Basics 3.1 Overview This chapter describes how to ac cess the NSA web configur ator and provides an overview of its screens. The web configurator is an HTML -based management interface that allows easy NSA setup and management using an Internet brows er . Use Internet Explorer 6.0 or Mozilla Fi r[...]
-
Page 50
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 50 Guide for how to install and run the NAS Starter Utility . See Chapter 2 on page 29 for more information on the NAS Start er Utility . Figure 36 NAS S tarter Utility Main Screen 3.2.2 W eb Browser Access Configure the serv er name of your NSA us ing the Network Configuration screen ( Sect[...]
-
Page 51
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 51 Then click Login . See Chapter 12 on page 301 for how to create other user accounts. Figure 38 NSA Login Screen If you have not done so yet, you sh oul d see a scre en as kin g you to chan ge you r password (highly recommended) as sh own next. T ype a new password (and retype it to confirm[...]
-
Page 52
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 52 3.4 Home Screens All users (including the ad ministr ator) first see t he Home screen af ter loggi ng in. Figure 40 Home Note: If you did not select the option to st ay logged in for two weeks when you logged in, the web configurator management se ssion automatically times out if i t is l[...]
-
Page 53
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 53 Note: Y our browser may need Windows Media Player and VLC p lugins installed to play music and video files. T o get th e VLC plugins, you have to download and install VL C (use the .exe file). T o install a VLC plugin for FireFox, whe n you install VLC, you have to select the Mozilla plugi[...]
-
Page 54
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 54 Here are some Home screen descriptions. A music screen is s hown here as an example. Other screens work in a similar way . Figure 41 Musi c Screen This table describes common labels in the Home media screens. Not every item displays in ev ery screen. A B D C T able 8 Home Media Screens LA[...]
-
Page 55
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 55 3.4.1 Now Playing (Music) A Now P laying link displays when a song is pla ying. Click it to displa y a panel like the following. This screen displa ys the name of the current song and it’ s play progress and lets you control the playback. Figure 42 Now Playing D Select the sorting criter[...]
-
Page 56
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 56 3.4.2 Exif and Google Map s (Photos) Click a photo’ s EXIF button to displa y or hide the photo’ s Exchangeable image file format (Exif ) d ata. Figure 43 Exif Informat ion If a photo’ s Exif data includes GPS location data, clic k the latitude or longitude link to display the locat[...]
-
Page 57
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 57 3.4.3 Slideshow and CoolIris (Photos) In a Photo menu click the SlideShow but ton to display the menu’ s files as a slideshow . Mov e your cursor over the slideshow’ s screen to displa y full screen, previous, pause, and next buttons fo r controlling the slideshow . Figure 45 Slideshow[...]
-
Page 58
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 58 3.4.4.2 My Favorite Use Fa vorite > My Favorite to create, edit, and pla y playlists. These pl aylists are specific to the NSA and cannot be used in external music play ers. Figure 46 Favorite > My Favorit e This tabl e describ es lab els in th is menu. 3.4.5 File Browser Click File[...]
-
Page 59
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 59 can map a share to a network drive for easy and familiar file transfer for Windows users. • A folder icon wi th a hand indicates a share. • The adminis trator owns and manages the public sh ares. • Double-cli ck a media file to open it. Doub le-click other types of files to be able t[...]
-
Page 60
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 60 Last Modified This column displays the la st time the file or folder was changed (in year-month-da y hour:minute:second format). Create New Folder Click this to open the following screen where you can create a new folder within the share. Specify a name to identify the folder . See Sectio[...]
-
Page 61
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 61 3.4.5.1 Configure Share Screen In the File Browser screen, select a share and click Configure Sh are to open the following screen where you can see and configure share management de tails. Figure 48 File Browser > Configure Sh are The following table describes t h e labels in the this s[...]
-
Page 62
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 62 3.4.6 Share and Folder Names The name can only contain the following characters: • Alphanumeric (A - z, 0-9) and Unicode. The NSA allows FTP access to shares, fold ers or files with na mes encoded in the UTF-8 (8-bit UCS/Unicode T ransformation F ormat) format. So your FTP client must s[...]
-
Page 63
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 63 • Unicode is support ed for share names, although your FTP client must support UTF-8. Full support should be available in all Windows versions after Windows 2000. 3.4.7 Application Zone Administr ators can click Application Zone to go to a screen where you can enable or disable v arious [...]
-
Page 64
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 64 3.4.8 System Settings Click System > Settings to open the following screen. Use this screen to change general settings and an account password. Figure 50 System > Settings P ause Select the Flickr or Y outube Uploadr entry and click this to pause current uploading. Resume will resum[...]
-
Page 65
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 65 The following table describes t he labels in this screen. T able 13 System > Settings LABEL DESCRIPTION Double Click Behavior Setting Select Replace current playlist and start to play to have double clicking a song cause the NSA to immediately stop an y currently playing song and start [...]
-
Page 66
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 66 3.5 Administration Screens The System > Administration link displays when you log in as the administr ator . Click System > Administration in the Home screen to open the advanced administration scre ens. The Status screen is the first adv anced administr ation screen that dis plays.[...]
-
Page 67
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 67 3.5.2 Navigation Panel The navigation panel on the le ft of the W eb Configurator screen ( ) contains screen links. Click a link to displa y su b-links. There are no sub-l inks for the Sta tus screen. Certain s creens also contain hyper l inks that allow you to jump to anot her screen. The[...]
-
Page 68
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 68 Applications FTP Ser ver Enable FTP file transfer to/from the NSA, set the number of FTP conne ctions allowed, an F TP idle timeout, and the character set. Media Server Enable or disable the sharing of media files and se lect which shares to share. Download Service Have the NSA handle lar[...]
-
Page 69
Chapter 3 Web Configur ator Basics NSA320 User’s Guide 69 3.5.3 Main Window The main window () shows the screen you select in the navigation panel. It is discussed in the rest of this document. The Status screen is the first administr ation screen to displa y . See Chapter 5 on page 149 for more information about the Status screen. 3.5.4 S t atus[...]
-
Page 70
Chapter 3 W eb Configur ator Basics NSA320 User’s Guide 70 3.5.6 Session Example (Windows) Open Windows Explorer and type two back slashes followed by the NSA name or IP address. Initiall y you can only read and wri te to the Public , Video , Music , and Photo folders until you create other shares on the NSA. This session is then display ed as sh[...]
-
Page 71
NSA320 User’s Guide 71 C HAPTER 4 Tutorials 4.1 Overview This chapter provides tutorials that show how to use the NSA. • Windows 7 Network , see page 71 • Windows 7 N etwork Map , see page 75 • Playing Media Fi les in Windows 7 , see page 78 • Windows 7 Devices and Printers , see page 78 • Creating a V olume , see page 81 • Deleting a[...]
-
Page 72
Chapter 4 Tutorials NSA320 User’s Guide 72 1 Click Start > Control Panel. Set View by to Category and click Network and Internet . 2 Click View network computers and devices .[...]
-
Page 73
Chapter 4 Tutorials NSA320 User’s Guide 73 3 The NSA icon displa ys twice because the NSA is both a media serv er and a storage device. Double-click either NSA icon to open the W eb Co nfigurat or login screen. 4.2.1 If the NSA Icon Does Not Display The network containing the NSA mu st be set as a home or work network in order for the NSA icons t[...]
-
Page 74
Chapter 4 Tutorials NSA320 User’s Guide 74 2 Use the Set Network Location screen to set the network’ s location to home or work. 4.2.2 NSA Icon Right-click Options Right- click the NSA’ s icon to see these options: • Install/Uninstall : Click Install to add the NSA as a devi ce in your computer . After you ins tall the NSA you can see it i [...]
-
Page 75
Chapter 4 Tutorials NSA320 User’s Guide 75 • Properties opens a window of NS A details and troubleshooting information. • Manufacturer identifi es the company that produced the NSA. • Model identifies the NS A model. • Model number identifies the NS A model number . • Device webpage shows the IP address for accessing the W eb Config ura[...]
-
Page 76
Chapter 4 Tutorials NSA320 User’s Guide 76 1 Click Start > Control Panel > View network status an d tasks (or Network and Sharing Center if you view the Control Panel by icons). 2 Click See full map (1 in the figure). The network containing the NSA mu st be set as a home or work network in order to use the full map feature. If the networ k [...]
-
Page 77
Chapter 4 Tutorials NSA320 User’s Guide 77 3 Double-click the NSA’ s icon to open the W eb Configurator login screen. See Section 4.2.2 on page 74 for the NSA icon’ s right-click options.[...]
-
Page 78
Chapter 4 Tutorials NSA320 User’s Guide 78 4.4 Playing Media Files in Windows 7 In Windows 7, th e NSA automatica lly di splays as a libr ary in Windows Media Player . Figure 52 NSA in Windo ws Media Player 4.5 Windows 7 Devices and Printers After you use the NS A’s network icon’ s install option you can manage the NSA from the Windows 7 Devi[...]
-
Page 79
Chapter 4 Tutorials NSA320 User’s Guide 79 icon to open a properties window (see page 75 ). Rig ht-click the ic on to display these options: • Download NAS Starter Utility downloads the NS A’ s Starter Utility . It lets you find, set up, and manage the NS A as well as copy files to it and access the files on it. See Chapter 2 on page 29 for d[...]
-
Page 80
Chapter 4 Tutorials NSA320 User’s Guide 80 4.5.1 Windows 7 Desktop Shortcut This is the NSA’ s desktop shortcut. Double-click it to open a properties window (see page 75 ). 1 Right- click the NSA’ s desktop shortc ut icon to see these opti ons: • Open file location takes yo u to the Windows 7 Devices and Printers folder . • Download NAS S[...]
-
Page 81
Chapter 4 Tutorials NSA320 User’s Guide 81 • Cut removes this shortcut so you can paste it somewhere else. • Copy copies the shortcut so y ou can paste it somewhere el se. • Create shortcut has Windows make a desktop shortcut to this i con. • Delete sends t he shor tcut to t he recycle bin. • Rename lets you change the name of the short[...]
-
Page 82
Chapter 4 Tutorials NSA320 User’s Guide 82 4.6.1 Creating a RAID 1 V olume This stor age method allows recov ery of data if y our hard disk fails. T o create a RAID 1 volume, you must install two SA T A hard disks in your NSA. There are two ways to create a RAID 1 volume: •C l i c k t h e Migrate button - If you already have a SA T A har d disk[...]
-
Page 83
Chapter 4 Tutorials NSA320 User’s Guide 83 1 In the Storage > Volume screen, click Create an Internal Volume . 2 In the Disk Configuration screen, y ou can select the stor age method. • T ype in the Volume Name f or your RAI D 1 volu me . Th e vo lum e na me ca n be 1 to 31 characters (a- z, 0-9, " " [spaces], "_", and &q[...]
-
Page 84
Chapter 4 Tutorials NSA320 User’s Guide 84 3 The Storage > Volume screen displays with yo ur RAID 1 volume. 4.7 Deleting a V olume Delete an existing v olume in your NSA b y doing the following steps. 1 In the Storage > Volume screen, select the vol ume you want t o delete and click the delete icon. 2 A confirmation window appears as follow[...]
-
Page 85
Chapter 4 Tutorials NSA320 User’s Guide 85 This deletes all existing dat a in the volume. Make sure you have a backup of any existing dat a in the hard disk. 4.8 File Sharing T utorials The following sections cover using t he NSA for file shari ng. This chapter assumes you ha ve already followed the Quick Start Guide ins tructions to perform init[...]
-
Page 86
Chapter 4 Tutorials NSA320 User’s Guide 86 2 Click Sharing > Users to open the Users screen. Then click Add User. 3 Configure the screen as follows and writ e down the username and password to give to Jimm y . If the username and pa ssword are the same as Jimmy’ s Wind ows login, Jimmy will not need to enter a username and password when he l[...]
-
Page 87
Chapter 4 Tutorials NSA320 User’s Guide 87 Now that Bob has created Jimm y’ s account, he can go through the steps ag ain to create another account for K evin. Aft er both accounts are created, he can go to Section 4.8.2 on page 87 to create shares for Jimm y and K evin. 4.8.2 Creating a Share Suppose Bob has already created separat e accounts [...]
-
Page 88
Chapter 4 Tutorials NSA320 User’s Guide 88 3 Configure the screen as foll ows to give Ji mmy full access right to the share. Then click Apply to create the share. Now that Bob has created Jimm y’ s share, he can go through the steps again to create another share for K evin. 4.8.3 Creating a Group After creating user accounts for Jimmy and K evi[...]
-
Page 89
Chapter 4 Tutorials NSA320 User’s Guide 89 2 Specify a name for the group. Select th e user(s) y ou want to add to the group from the Available U ser(s) list and click Add Selected User(s) . Configure the screen as follows. Then click Apply to create the group. Now that Bob has created a group for J immy and K evin, he can go through the steps ag[...]
-
Page 90
Chapter 4 Tutorials NSA320 User’s Guide 90 3 Select the network drive that you want to map the NSA to from the Drive list bo x. This example uses I . Then browse to and select the share on the NSA. Click Finish . 4 Enter the username and password f or Jimmy’ s account and click OK . Y ou do not need to do this if the username and password are t[...]
-
Page 91
Chapter 4 Tutorials NSA320 User’s Guide 91 5 After the mapping is done, y ou can then si mply copy and paste or dr ag and drop files from/to your local computer ’ s drives to or from this network folder . Just like the NSA’ s share w as another folder on your computer . Now that Bob has mapped Jimmy’ s share to Jimm y’ s computer , he can[...]
-
Page 92
Chapter 4 Tutorials NSA320 User’s Guide 92 2 Enter your pa ssword and c lick Login . 3 Now you can access fi les and copy files from/to your local computer’s driv es to or from this network folder .[...]
-
Page 93
Chapter 4 Tutorials NSA320 User’s Guide 93 4.8.6 Accessing a Share Through the W eb Configurator Y ou can browse and access files through the web configurator . 1 Log into the NSA web config urator (see Section 3.3 on page 50 ) using the appropriate user name and password (t his example uses Jimmy’ s) and click File Browser . Clic k a sha re (t[...]
-
Page 94
Chapter 4 Tutorials NSA320 User’s Guide 94 4.9 Download Service T utorial This tutorial cov ers using the NSA t o down load a file from the Inter net. Use this same procedure for BitT orrent downloads as well as regular HT TP (web) and FT P downloads. See Section 9.11.2 on p age 219 for more on the download service. 4.9.1 Copying/Pasting a Downlo[...]
-
Page 95
Chapter 4 Tutorials NSA320 User’s Guide 95 3 Right- click the download link and select Copy Shortcut i n Internet E xplorer (o r Copy Link Location in Firefox) . 4 Log into the NSA web config urator (see Section 3.3 on page 50 ) using the administrator account and click Application Zone and the Application Zone > Download Service link. 5 Click[...]
-
Page 96
Chapter 4 Tutorials NSA320 User’s Guide 96 6 Right- click the URL field and select Paste . 7 The URL displays in the URL field. Click Apply . 8 After a few moments, the down load task appears in the Download Service screen’ s Active tab. The download appears in the Comp leted tab when it is done. By de fault the NSA stores all downloads in the [...]
-
Page 97
Chapter 4 Tutorials NSA320 User’s Guide 97 4.9.2 Inst alling the Link Capture Browser Plugin In addition to copying and pa s ting a download link to the Download Service screen, you can also i nstall a link capture browser plugin in your web browser . Use the plugin to easily add a download lin k to the NSA’ s download service. See Section 9.11[...]
-
Page 98
Chapter 4 Tutorials NSA320 User’s Guide 98 3 Select a location to sa ve the plugin and click Install . Close the screen once the installation is complete. 4 Open Internet Explorer and locate a download link. In this example, www .zyxel.com has a Download Now link for downloading a user’ s guide for Z yXEL ’ s NBG410W3G (a 3G wireless router).[...]
-
Page 99
Chapter 4 Tutorials NSA320 User’s Guide 99 5 Enter the NS A’ s web address (n sa320 by default) and click Apply . A warning message displays ask ing for co nfirmation. Click OK to apply the setting. Firefox 1 Open Firefox. 2 Open the folder containing th e link capture browser plugi n. 3 T o install the plugin, drag and drop t he plugin to Fire[...]
-
Page 100
Chapter 4 Tutorials NSA320 User’s Guide 100 4 The following screen displays. Click Install Now . 5 Y ou need to restart Firefox after the inst allation.[...]
-
Page 101
Chapter 4 Tutorials NSA320 User’s Guide 101 6 When Firefox restarts, a mess age displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’ s web address. 7 Enter the NS A’ s web address (n sa320 by default) and click OK .[...]
-
Page 102
Chapter 4 Tutorials NSA320 User’s Guide 102 4.9.3 Using the Link Capture Browser Plugin Once you in stall the plugin, y ou may be gin sending download links to the NSA from your web browser . This example show s how to send a downl oad link to the NSA’ s download servic e using the link capture browser plugi n. 1 Open your Internet browser (thi[...]
-
Page 103
Chapter 4 Tutorials NSA320 User’s Guide 103 4 The login screen shows up. Enter your NSA’ s login information and click Login to send the lin k to the downlo ad servic e. A confirmation message displays . 5 Log into the NSA web config urator (see Section 3.3 on page 50 ) using the administrator account and click Application Zone and the Applicat[...]
-
Page 104
Chapter 4 Tutorials NSA320 User’s Guide 104 6 The download task appears in the Download Service screen’ s Active or Queue tab. It may appear i n the Completed tab if the NSA already finished downloading the file or it may appear in the Error tab if t he NSA failed to download the file. By default the NSA st ores all downloads in the admin share[...]
-
Page 105
Chapter 4 Tutorials NSA320 User’s Guide 105 Note: If power failure occurs during the a ctive download period, the NSA will verify whether the downloaded files were damage d. If a file is corrupted, the NSA will download the file again. If the file is int act but not completely downloade d, the NSA will resume the download t ask af ter it restart [...]
-
Page 106
Chapter 4 Tutorials NSA320 User’s Guide 106 •C l i c k Edit IP Filter . Use an online IP fi lter table from http:// www .bluetack.co.uk/config/lev el1.gz for example to protect BitT orrent downloads. Enter the URL in the Update IP Filter from the Internet E very Week field. 4.9.5 Using Download Service Notification Use an RSS feed reader on you[...]
-
Page 107
Chapter 4 Tutorials NSA320 User’s Guide 107 Internet Explorer 7 Example 1 After you ac tivate download service notification, click the RSS feed icon. 2 The following screen displays. Select Subscribe to this feed . 3 The following screen displays. Click Subscribe .[...]
-
Page 108
Chapter 4 Tutorials NSA320 User’s Guide 108 4 Click the Favorite icon on your browser and select the Feeds tab t o check the updates of your NS A’ s download list. Firefox Example 1 After you ac tivate download service notification, click the RSS feed icon. 2 The following screen displays. Select Live Boo kmarks from the drop-down list and clic[...]
-
Page 109
Chapter 4 Tutorials NSA320 User’s Guide 109 3 The following screen displays. Select Bookmarks Menu and click Ad d . 4 From the Firefox’ s Book marks Menu , select Download Notify to check the updates of your NS A’ s download list.[...]
-
Page 110
Chapter 4 Tutorials NSA320 User’s Guide 11 0 4.10 Broadcatching T utorial Use broadcatching to have the NS A downlo ad frequently updated digital content like TV progr ams, rad io talk shows, Podcasts (audio files), and blogs. This example shows how to sub scribe the NSA to th e CNET TV Interne t televisio n channel. Se e Section 9.8 on page 206 [...]
-
Page 111
Chapter 4 Tutorials NSA320 User’s Guide 111 3 Right- click the download link and select Copy Link Location in Firefox (or Co py Shortcut in Internet Explorer). 4 Log into the NSA web config urator (see Section 3.3 on page 50 ) using the administrator account and click Administration > Applications > Broadcatching . 5 Click Add Cha nnel .[...]
-
Page 112
Chapter 4 Tutorials NSA320 User’s Guide 11 2 6 Right- click the URL field and select Paste . 7 The URL displays in the URL field. 8 Select a policy for what items to downl oad. This example uses Manually Choose Items for Download so you will be ab le to select individual items to download later . 9 Select a policy for what items to delete . This [...]
-
Page 113
Chapter 4 Tutorials NSA320 User’s Guide 11 3 11 After a few moments, the channel appears in the Broadcatching screen where you can select items you w ant to download. The NS A save s the items you download in a folder named after the chan nel. By default , the channel folder s are created in the admin share’ s download folder . The NSA’ s med[...]
-
Page 114
Chapter 4 Tutorials NSA320 User’s Guide 11 4 5 On your comput er , open your CI FS file sharing progr am (Windows Explorer for example) and browse to the NS A. Double-click the printer’ s icon. 6 If you get a warning screen, click the option that lets y ou continue ( Yes in this example). 7 If your computer does not already have the printer’s[...]
-
Page 115
Chapter 4 Tutorials NSA320 User’s Guide 11 5 After the driver installat ion finishes, th e compu ter is ready to use the printer . Select the printer in an application to us e i t to print. Browse to the NSA us ing a CIFS program (like Windows Explorer) and double-click t he printer’s icon to open the printer’s queue of print jobs. Note: Repe[...]
-
Page 116
Chapter 4 Tutorials NSA320 User’s Guide 11 6 3 Press and release the COPY/SYNC button on the NSA’ s front panel to start copyin g file s. 4 The copied files can be found in a new fold er in the photo share. The name of this folder is the date (yyyy -mm-dd) and time (hh-mm-ss) when the folder is created. 5 The NSA also automatically uploads the [...]
-
Page 117
Chapter 4 Tutorials NSA320 User’s Guide 11 7 at home, so Susan has to set her NSA as an FTP server for Am y to automatically send files using FTP Uploadr . l T o set the NSA as an FTP server , click Applications > FTP to open the FTP screen. Select Enable FTP and click Ap ply . Susan also has to create a user account and share on her NSA for A[...]
-
Page 118
Chapter 4 Tutorials NSA320 User’s Guide 11 8 This is how Amy would set up the NS A’ s FTP Uploadr . 1 Click Applications > Auto Upload > FTP Uploadr to open the FTP Uploadr screen. Select Enable FTP Uploadr and click Apply to turn on FTP Uploadr . 2 Click Add Se rver . 3 Enter the information as describe in T able 17 on page 117 . Click A[...]
-
Page 119
Chapter 4 Tutorials NSA320 User’s Guide 11 9 4 In the FTP Uploadr screen, click Preferences to configure the auto upload settings. 5 Amy w ants to share video files with Susan. In the Preferen ces screen, click the Add button and select vid eo from the Shares drop-down li st box, enter a forw ard slash in the Path field and click Apply to add the[...]
-
Page 120
Chapter 4 Tutorials NSA320 User’s Guide 120 6 Amy also set the Bandwidth Limit to 20KB/s so that the upload doesn’ t slow down her Internet connection. Now Amy has set up FTP Uploadr to send files to Susan’ s NSA. Every time Amy adds new files or renames files in the video share, these new or mod ified files will be uploade d automatic ally t[...]
-
Page 121
Chapter 4 Tutorials NSA320 User’s Guide 121 4.14 W eb Configurator ’ s Security Sessions These tutorials show you how to conf igure security for the NSA’ s W eb Configurator sessions. Y ou will customize the NS A’ s self -signed SSL certific ate and distribute it to your us ers. 4.14.1 Customizing the NSA’ s Certificate 1 Click M aintenan[...]
-
Page 122
Chapter 4 Tutorials NSA320 User’s Guide 122 2 Next, let’s modif y the cert ifica te by chang ing the Common Name to this NSA’ s host name of “nsa” , the Organization to “ZyXEL ” and the Key Length to 2048 . 3 The NSA rest arts its n etwork serv ices and returns you to the login screen.[...]
-
Page 123
Chapter 4 Tutorials NSA320 User’s Guide 123 4.14.2 Downloading and Inst a lling Customized Certificate 1 Log in and return to Mainte nance > SSL . Under Modify the Existing Certificate , click Download . 2 Save th e fil e to yo ur co mput er .[...]
-
Page 124
Chapter 4 Tutorials NSA320 User’s Guide 124 3 Find the certificate file on your computer and double-click it. 4 Install the certificate. The rest of the steps in this section are an example of installing a certi ficate in Windows. See Appendix D on page 411 for other examples. In the Certificate dialog box, click Install Certificate .[...]
-
Page 125
Chapter 4 Tutorials NSA320 User’s Guide 125 5 In the Certificate Import Wizard , click Next . 6 Leave Automatically select certificat e store based on the type of certificate selected and click Next .[...]
-
Page 126
Chapter 4 Tutorials NSA320 User’s Guide 126 7 In the Completing the Certificate Import Wizard screen, click Finish . 8 If you are presented with another Security Warning , c lick Yes . 9 Finally , click OK when presented with the successful certificate installation message.[...]
-
Page 127
Chapter 4 Tutorials NSA320 User’s Guide 127 4.14.3 T urn on the NSA’ s Web Security Now that you have cust omized the NSA’ s certificate and installed it in yo ur computer , you can turn on security f or your W eb Configurator sessions. This example uses Firefox 3.0. See Appendix D on page 411 for more information on browsers and certificates[...]
-
Page 128
Chapter 4 Tutorials NSA320 User’s Guide 128 2 A warning screen p ops up if applying y our change may disconnect some users. Click Apply to continue. 3 The NSA logs you out and automatically redi rects your formerly non-secure (HT TP) connection to a secure (HT TPS) connection. Y our browser may give you a warning about the device’ s public key [...]
-
Page 129
Chapter 4 Tutorials NSA320 User’s Guide 129 4 Click Add Exception . 5 Click Get Certificate .[...]
-
Page 130
Chapter 4 Tutorials NSA320 User’s Guide 130 6 Before you add an ex ception, verif y that the device to which you are trying to connect is providing the correct certificate. Cli ck View .[...]
-
Page 131
Chapter 4 Tutorials NSA320 User’s Guide 131 7 The SHA1 fingerprint must match the NSA’ s certificate you downloaded from the NSA to your computer . (Double-click the NSA’ s cert ificate file and then click Details and look at the Thumbprint ). Click Close .[...]
-
Page 132
Chapter 4 Tutorials NSA320 User’s Guide 132 8 If the certificate fingerprints match, click Confirm Security Exception , otherwise click Cancel . 9 The login screen displays. Now , any one who connects to the NSA’ s W eb Configurator screens will automatically do so by HT TPs. Use a secu re method t o let your users know the correct fingerprint [...]
-
Page 133
Chapter 4 Tutorials NSA320 User’s Guide 133 security exception ( as in steps 6 to 7 on pages 130 to 131 ). See the next section for how to use F TPES with the NSA for sec ure F TP transfers. 4.15 Using FTPES to Connect to the NSA This section cov ers how to use FTP over Explici t TLS/SSL with the NSA for secure FTP transfers. Before you go throug[...]
-
Page 134
Chapter 4 Tutorials NSA320 User’s Guide 134 2 A security w arning screen displays. The SHA1 fingerprint must match the NSA’ s certificate you downloaded from the NS A to your computer . (Double-click the NSA’ s certificate file and then click Details and look at the Thumbprint ). If they match, click OK . The shares and folders to which Gonzo[...]
-
Page 135
Chapter 4 Tutorials NSA320 User’s Guide 135 4.16.1 Creating an Archive Backup T o backup the NSA every week to a remote NSA: 1 Click Prote ct > Backup > A dd Job . Figure 53 Protect > Ba ckup 2 Identify the backup job and select Archive . New files are often added to the shares that you need to back up and existing files are not frequent[...]
-
Page 136
Chapter 4 Tutorials NSA320 User’s Guide 136 3 Select the volume1 check bo x to select all the folders and files. Select Remote and enter the other NSA’ s addr ess, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection . Figure 55 Protect > Ba ckup > Add Job: S tep 2[...]
-
Page 137
Chapter 4 Tutorials NSA320 User’s Guide 137 4 In this example, the target NSA is on the LAN so leave the compression off . Security is already configured on the ta rget NSA so you can leave the encryption off , too. Have the NSA kee p 3 ba ckups . Figure 56 Protect > Ba ckup > Add Job: S tep 3 5 Set the frequency to Weekly . Schedule the ba[...]
-
Page 138
Chapter 4 Tutorials NSA320 User’s Guide 138 4.16.2 Creating a Synchronization Backup T o create a synchronization backup: 1 Click Prote ct > Backup > A dd Job . Figure 57 Protect > Ba ckup Name the backup job and select Synchronization . Y ou want only your current set of files in the remote NSA’ s folder , so you select Mirror to make[...]
-
Page 139
Chapter 4 Tutorials NSA320 User’s Guide 139 2 Select the folder that ne eds to be mirrored (your Private folder in t his example) and Remote . • Enter the other NSA’ s address and administr ator password. •C l i c k Show target content to di splay the remote NSA’ s cont ents. • Select the destination on the remote NSA ( Backups in this [...]
-
Page 140
Chapter 4 Tutorials NSA320 User’s Guide 140 • T urn on the encryption to protect these sensitiv e files during the transfer . The final files stored on the remote NSA will be unencrypted ( usable). • Rest rict the bandwidth usage t o 256 KB/s to stop the archives from usi ng all of your network connection’ s av ailable bandwidth. • Y ou d[...]
-
Page 141
Chapter 4 Tutorials NSA320 User’s Guide 141 4.16.3 Restoring Archived Files by Backup Job If you hav e backup jobs for which the NSA has already performed backups, y ou can restore the files based on th e backup job. Do the following: 1 Click Prote ct > Backup screen, select a back up job and clic k Restore Archiv e . Figure 63 Protect > Ba[...]
-
Page 142
Chapter 4 Tutorials NSA320 User’s Guide 142 3 Select the files and folders you w ant to restore and click Next . Figure 65 Protect > Ba ckup > Restore Archive: S tep 2 4 Select the original location and click Done . Figure 66 Protect > Ba ckup > Restore Archive: S tep 3[...]
-
Page 143
Chapter 4 Tutorials NSA320 User’s Guide 143 5 The NSA restores the files into the share. When it finishes you can access the files. Figure 67 Protect > Ba ckup > Restore Archive: Progress 4.16.4 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore arc[...]
-
Page 144
Chapter 4 Tutorials NSA320 User’s Guide 144 2 Select the backup job an d backup time and click Next . Figure 69 Protect > Re store: S tep 2 3 Select everythi ng in the share except the recycle folder . Click Next . Figure 70 Protect > Re store: S tep 3[...]
-
Page 145
Chapter 4 Tutorials NSA320 User’s Guide 145 4 Browse to the folder where you want to put the files. Click Done . Figure 71 Protect > Re store: S tep 4 5 The NSA restores the files and you can use them again.[...]
-
Page 146
Chapter 4 Tutorials NSA320 User’s Guide 146[...]
-
Page 147
147 P ART II T echnical Reference[...]
-
Page 148
148[...]
-
Page 149
NSA320 User’s Guide 149 C HAPTER 5 Status Screen 5.1 Overview This chapter describes the Status screen, which is the first advanced administration scre en that display s. 5.2 The S t atus Screen Click Administr ation in the Home screens ( Section 3.5 on page 66 ) to open the W eb Configur ator . Y ou can also view the status screen, by clicking S[...]
-
Page 150
Chapter 5 Status Screen NSA320 User’s Guide 150 Figure 72 S tatus The following table describes t he labels in this screen. T able 18 Status LABEL DESCRIPTION Status Click this to refresh the status screen statistics. System Information Server Name This displays the name which helps y ou find the NSA on the network. Click the Edit icon to go to t[...]
-
Page 151
Chapter 5 Status Screen NSA320 User’s Guide 151 Media Server Status This shows whether the media server function is enabled or disabled. It must be enabled for media clients to play content files stored on the NSA. Click the Edit icon to go to the screen where you can configure this. FTP Server Status This shows whethe r the FTP server function i[...]
-
Page 152
Chapter 5 Status Screen NSA320 User’s Guide 152 External V olume This displays the volumes created on USB hard drives connected to the NSA. USB disks are numbered in th e order that you insert USB devices. Click the Edit icon to open the Storage screen. Y ou can create and edit the external volume. See Chapter 7 on page 159 for more details. Stat[...]
-
Page 153
NSA320 User’s Guide 153 C HAPTER 6 System Setting 6.1 Overview This chapter gives an overview of the v arious features includ ed in the system setting screens. Y ou can identify your NS A on the network and set the time that the NSA follows for its scheduled tasks/logs. 6.2 What Y ou Can Do •U s e t h e Server Name screen ( Section 6.4 on page [...]
-
Page 154
Chapter 6 System Setting NSA320 User’s Guide 154 • power surges occur . The NSA gives no w arning if time lag o ccurs. Y ou should resynchronize the time after a power surge or after you have shut down the NSA sever al times. 6.4 The Server Name Screen Click System Setting > Server Name to open the following screen. Use this screen to config[...]
-
Page 155
Chapter 6 System Setting NSA320 User’s Guide 155 6.5 The Date/T ime Screen Use this screen to select a time zone an d a time server from which y our NSA can get the time and date. This time is then used in NS A logs and alerts. Click the System Setting link in the navigation panel and t hen click the Date/ Time link to access the Date/ Time scree[...]
-
Page 156
Chapter 6 System Setting NSA320 User’s Guide 156 Manual Select this radio button to enter the time and date manually . When you enter the time settings manually , the NSA uses the new setting once you click Apply . Note: If you enter time settings manua lly , they revert to their defaults whe n power is lost. New Date (yyyy - mm-dd) This field di[...]
-
Page 157
Chapter 6 System Setting NSA320 User’s Guide 157 Start Date Con figure the day and time when Da ylight Saving Time starts if you selected Enable Daylight Saving . The hour fiel d uses the 24 hour format. Here are a couple of examples: Daylight Saving Time starts in most parts of the United States on the second Sunday of March. Each time zone in t[...]
-
Page 158
Chapter 6 System Setting NSA320 User’s Guide 158[...]
-
Page 159
NSA320 User’s Guide 159 C HAPTER 7 Storage 7.1 Overview Several NSA featu res requi re a valid internal volume. Th is chap ter covers the management of volumes and disks (both internal and external). Use the Storage screen ( Section 7.2 on pag e 160 ) to display information on all volumes, create internal and external volumes, and configure the v[...]
-
Page 160
Chapter 7 Storage NSA320 User’s Guide 160 7.2 The S torage Screen The Storage screen allows you to create and edit volumes in the NSA. 7.2.1 Disk Replacement Restrictions See the Quick Start Guide for information on replacing di sks in the NSA. When replacing a disk in a degraded or down RAID volume, the new disk must be at least the same size or[...]
-
Page 161
Chapter 7 Storage NSA320 User’s Guide 161 7.2.2 S torage Screen Click Storage > Volume in the na vigation panel to displa y the following screen. Use this screen to disp lay internal and external v olumes on the NSA. Note: It is recommended to scan the vo lume every three months or 32 reboot s. Figure 75 S torage > V olume The following tab[...]
-
Page 162
Chapter 7 Storage NSA320 User’s Guide 162 Y ou see a warning screen before you delete a v olume. Figure 76 Delete a V olume W arning Screen Capacity This field shows total disk size, the percentage of the volume being used and the percentage that is available. Actions This field displays icons allowing you to edit, scan, repair , expand, migrate,[...]
-
Page 163
Chapter 7 Storage NSA320 User’s Guide 163 7.3 Creating an Internal V olume Click the Create an Internal Volume button in the Storage screen as shown in Figure 75 on page 161 to open the following screen. Use this screen to create a new NSA internal di sk drive volume. Note: Creating a volume format s the hard drive . All data on the disk will be [...]
-
Page 164
Chapter 7 Storage NSA320 User’s Guide 164 The following table describes t he labels in this screen. Note: Once you create the first volume on th e NSA, it is recommended to restart the NSA for better performance. 7.3.1 V olume S t atus Y ou (the administrator) can see the status of a volume i n the Statu s or Storage screens. The NSA has the foll[...]
-
Page 165
Chapter 7 Storage NSA320 User’s Guide 165 • Recovering appears when repairing a RAID 1 volume. (A RAID1 volume was once degraded, but you hav e installed a new disk and t he NSA is restoring the RAID1 volume to a healthy state.) • Degraded when a volume is currently down, but can be fixed. Data access may be slower from a degr aded volume, so[...]
-
Page 166
Chapter 7 Storage NSA320 User’s Guide 166 The following table describes t he labels in this screen. 7.5 Creating an External V olume Click the Create a New External Volume button in the Storage screen as shown in Figure 75 on pa ge 161 to open the following screen. Use this screen to create a new NSA external disk dri ve volume. Note: Creating a [...]
-
Page 167
Chapter 7 Storage NSA320 User’s Guide 167 The following table describes t he labels in this screen. 7.5.1 External Disks Y ou may connect USB storage d evices that support the following fi le systems to the NSA. • Windows File Systems: F A T32 and F A T16. • Linux File Systems: ReiserFS, EXT2, EXT3, and XFS. T able 24 S torage > Create an [...]
-
Page 168
Chapter 7 Storage NSA320 User’s Guide 168 7.6 S torage T echnical Reference This section provi des some background information about the topics co vered in this chapter . 7.6.1 V olumes and RAID A volume is a stor age area on a disk or disks. Y ou can create volumes on the internal disks and external disks attached to the USB port(s) . Y ou can s[...]
-
Page 169
Chapter 7 Storage NSA320 User’s Guide 169 7.6.2 Choosing a S torage Method for a V olume The followi ng is a guid e to help you choose a storage method for the various number of disks suppor ted on the NSA. See Section 7.6.3 on page 169 for theoretical background on JBOD and the RAID leve ls used on the NSA. T ypical applications for each meth od[...]
-
Page 170
Chapter 7 Storage NSA320 User’s Guide 170 • Mirroring In a RAID system using mirroring, all d ata in the system is written simultaneously to two hard disks instead of one. This provides 100% data redundancy as if one disk fails the ot her has the duplicated data. Mirroring setups always require an ev en number of drives. •D u p l e x i n g Li[...]
-
Page 171
Chapter 7 Storage NSA320 User’s Guide 171 shows disks in a single JBOD v olume. Data is not written across disks but written sequentially to each disk until it’s full. RAID 0 RAID 0 spreads data evenly across two or more disks (data striping) with no mirroring nor parity for data r edundancy , so if one disk fails the entire volume will be lost[...]
-
Page 172
Chapter 7 Storage NSA320 User’s Guide 172 figure shows two disks in a single RAID 1 vol ume with mirrored data. Data is duplicated across two disks, so if one disk fails, there is sti ll a copy of the data. As RAID 1 uses mirroring and duplexing, a RAID 1 volume needs an even number of disks (two or four for the N SA). RAID 1 capacity is limited [...]
-
Page 173
NSA320 User’s Guide 173 C HAPTER 8 Network 8.1 Overview This chapter discusses the network configur ation screens. The Network screens allow y ou to configure T CP/IP an d PPPo E settings for the NSA. 8.2 What Y ou Can Do •U s e t h e TCP/IP screen ( Section 8.4 on page 175 ) to assign the NSA a dynamic or static IP address and DNS information.[...]
-
Page 174
Chapter 8 Netwo rk NSA320 User’s Guide 174 PPPoE P oint-to-P oint Protocol over Ethernet (PPP oE) allows the NS A to establish a direct Internet connection if you do not hav e a router . PPPoE is a dial-up connection. Y ou need a username an d password from your Internet Service Provider (ISP) to set up the connection. Jumbo Frames Jumbo frames a[...]
-
Page 175
Chapter 8 Ne twork NSA320 User’s Guide 175 In the following example, the NSA has jumbo fr ames enabled and set to 8KB frames. This means the computer , notebook computer , and switch must also hav e jumbo fr ames enabled and be capable of supporting 8KB frames. Figure 80 Jumbo Frames 8.4 The TCP/IP Screen Use the TCP/IP screen to have the NSA use[...]
-
Page 176
Chapter 8 Netwo rk NSA320 User’s Guide 176 Note: If you change the NSA’ s IP address, you need to log in again after you apply changes. Figure 81 Network > TCP/IP The following table describes t he labels in this screen. T able 29 Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NS A get IP address info[...]
-
Page 177
Chapter 8 Ne twork NSA320 User’s Guide 177 Default Gateway T ype a de fault gateway address in this field. DNS DNS (Domain Name S ystem) is for mapping a domain name to its corresponding IP address and vice versa. If you ha ve the IP address(es) of the DNS server(s), enter them. Dynamic Select the option to have the NS A get a DNS server address [...]
-
Page 178
Chapter 8 Netwo rk NSA320 User’s Guide 178 8.5 UPnP Port Mapping Screen Use UPnP (Universal Plug and Play) port mapping to allow access from the W AN to services you select on the NSA. It is rec ommended that you place the NSA behind an Internet ga teway firewall device to protect the NSA from attacks from th e Internet (see RAID and Data Protect[...]
-
Page 179
Chapter 8 Ne twork NSA320 User’s Guide 179 8.5.1 UPnP and the NSA’ s IP Address It is recommended that the NSA use a st atic IP address (or a static DHCP IP address) if you will allow access to the NSA from the Internet. The UPnP-created NA T mappings keep the IP address the NSA had when you applied yo ur settings in the UPnP Port Mapping scree[...]
-
Page 180
Chapter 8 Netwo rk NSA320 User’s Guide 180 CIFS (Windows File Sharing) Common Internet File S ystem (CIFS) is a standard protocol supported by most operating systems in order to share file s across the network. Using UPnP p ort mapping for CIFS allows users to connect f rom the Internet and use pr ograms li ke Windows Explorer to access th e NS A[...]
-
Page 181
Chapter 8 Ne twork NSA320 User’s Guide 181 access services on the NSA. Y ou can set wh ich port Internet users ne ed to use to access a specific servi ce on the NSA. Note: Some Internet gateways will de lete all UPnP mappings after reboo t. So if the Internet gateway reboot s, you may need to use this scre en again to re-apply the UPnP port mappi[...]
-
Page 182
Chapter 8 Netwo rk NSA320 User’s Guide 182 8.6 The PPPoE Screen Use this screen to configure PPPoE sett ings for a direct Internet connection. Enable WAN Access Select this check box to ha ve UPnP configure your Internet gateway to allow access from the Internet to the NSA’ s service. If you clear this check box, people will not be able to acce[...]
-
Page 183
Chapter 8 Ne twork NSA320 User’s Guide 183 Click Network > PPPoE in the na vigation panel to open the following screen. Figure 86 Network > PPPoE The following table describes t he labels in this screen. T able 31 Network > PPPoE LABEL DESCRIP TION Status Status This field displays the status of PPP oE connection. IP Address This field d[...]
-
Page 184
Chapter 8 Netwo rk NSA320 User’s Guide 184[...]
-
Page 185
NSA320 User’s Guide 185 C HAPTER 9 Applications 9.1 Overview This chapter discuss es the features in the Application screens. The NSA contains various applications for file sharing and downloading. 9.2 What Y ou Can Do •U s e t h e FTP Server screen ( Section 9.4 on page 188 ) to configure settings for FTP file transfers to/from the NS A. •U [...]
-
Page 186
Chapter 9 Applications NSA320 User’s Guide 186 9.3 What Y ou Need to Know FTP File T ransfer Protocol (FTP) is a file tran sfer service that oper ates on the Internet. A system running the FTP server accept s commands from a system running an FTP client. FTP is not a secure prot ocol. Y our file trans fers could be subject to snooping. FTPES (Fil[...]
-
Page 187
Chapter 9 Applica tions NSA320 User’s Guide 187 iT unes Server The NSA iT unes server feature lets you us e Apple’ s iT unes software on a computer to play music and video files stored on the NSA. Y ou can download iT unes from www .apple.com. Download Service The NSA’ s download service downloads fil es from the Internet directly to the NS A[...]
-
Page 188
Chapter 9 Applications NSA320 User’s Guide 188 RSS RSS (R eally Simple S yndication) is a format for deliv ering frequently updated digital content. A channel uses a feed to deliv er its contents (items ). Subscribe the NSA to a feed to be able to download the contents. 9.4 FTP Server Us e FT P or FTP E S ( FTP o ve r Ex pl i ci t T T L/S SL) to [...]
-
Page 189
Chapter 9 Applica tions NSA320 User’s Guide 189 Connection Limit Enter the m aximum nu mber of co ncurre nt FTP c onnecti ons allowed on the NSA in this field. The connection limit is 20. Idle Timeout E nter the length of time that an FTP connection can be idle before timing out. The timeout limit is 300 minutes. P ort Number This is the port num[...]
-
Page 190
Chapter 9 Applications NSA320 User’s Guide 190 9.5 The Media Server Screen The Media Server screen allows you to share f iles with media clients. Click Applications > Media Server to open the following screen. Use this screen to select shares to publish (share wi th media clients like the DMA-2500 and iT unes) and turn the iT un es server on o[...]
-
Page 191
Chapter 9 Applica tions NSA320 User’s Guide 191 9.6 The Download Service Screen The Download Service screen allows you to download files from the Int ernet. Click Applications > Download Service to open the follow ing screen. Use this screen to manage the NSA’ s file downloads. Note: By default, the NSA saves downloa ds in the admin share’[...]
-
Page 192
Chapter 9 Applications NSA320 User’s Guide 192 The following table describes t he labels in this screen. T able 34 Applications > Download Service LABEL DESCRIPTION Enable Download Service Use this option (and click the Apply button) to turn the down load service off or on. If you tur n off the service, all downloads are paused. Files currentl[...]
-
Page 193
Chapter 9 Applica tions NSA320 User’s Guide 193 Active Click this to see the list of files the NSA is currently downloading or sharing with other BitT orrent users. The NS A handles a maximum of 10 active tasks at a time (or fewer depen ding on how much of the NSA’ s system memory is av ailable). If you add more, they appear in the Inactive tab[...]
-
Page 194
Chapter 9 Applications NSA320 User’s Guide 194 Seeds Seeds apply to BitT orrent downloads. This is the number of computers that are sharing the complete file that y ou are downloading. This value is in the format “Leeches(Seeds)” where Leeches refer to peers that do not have a complete copy of the file y et and are still downloading; Seeds re[...]
-
Page 195
Chapter 9 Applica tions NSA320 User’s Guide 195 9.6.1 Adding a Download T ask Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 4.9 on page 94 provides a tutorial on adding a download task. Figure 91 Applications > Download Service > Add The fol[...]
-
Page 196
Chapter 9 Applications NSA320 User’s Guide 196 Location of Downloaded Files This shows where the NSA stores new downloads ( Put incomplete downloads in ) and where the NSA mo ves complete d downloads ( Move completed downloads to ). The Share column shows the name of the share where the file is downloaded. The Path column points to the location i[...]
-
Page 197
Chapter 9 Applica tions NSA320 User’s Guide 197 9.6.2 Configuring General Settings Click Applications > Download Service > Preference s to open the followi ng screen. Use this s creen to set the default location for savi ng downloads and configure the download period. Figure 92 Applications > Download Service > Preferences > Genera[...]
-
Page 198
Chapter 9 Applications NSA320 User’s Guide 198 The following table describes t he labels in this screen. T able 36 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads ( Put incomplete downloads in ) and where the NSA moves completed [...]
-
Page 199
Chapter 9 Applica tions NSA320 User’s Guide 199 • Cu rrent Locati on - This is the location of the selected folder . • Folder Name - Enter a new folder name and click to create it. • Type - This identifies the item as a file or folder . • Name - This is the name of the folder/file. Select a folder . If y ou don’t sele ct a folder , a fo[...]
-
Page 200
Chapter 9 Applications NSA320 User’s Guide 200 9.6.3 Configuring the BitT orrent Settings Click Applications > Download Service > Preferences > BitTorr ent to open the following screen. Use this screen to configure BitT orrent settings. Figure 93 Applications > Download Service > Prefe rences > BitT orrent The following table de[...]
-
Page 201
Chapter 9 Applica tions NSA320 User’s Guide 201 9.6.4 Edit IP Filter Use this screen to enable or disable IP filtering for BitT orrent downloa ds. IP filtering blocks IP addresses known t o share fake files. Y o u can either get an IP filter table from a website or use your own table. Maximum Number of Active Connections Specify how many activ e [...]
-
Page 202
Chapter 9 Applications NSA320 User’s Guide 202 Click Edit IP Filter in the Applications > D ownload Service > Preferences > BitTorrent screen. Figure 94 Applicatio ns > Download Service > Preferences > BitT orrent > Edit IP Filter The following table describes t he labels in this screen. T able 38 Applications > Download S[...]
-
Page 203
Chapter 9 Applica tions NSA320 User’s Guide 203 9.6.5 Displaying the T ask Information Select an item on the list and click Task Inf o . Use this screen to check det ailed information about the task. Figure 95 Applications > Download Service > T ask Info The following table describes t he labels in this screen. T able 39 Applications > D[...]
-
Page 204
Chapter 9 Applications NSA320 User’s Guide 204 9.7 The W eb Publishing Screen Use this screen to turn web pu blishing on or off and select shares t o publish. Click Applications > Web Publishing to open the following screen. Figure 96 Applicatio ns > Web Publishing Time Left This is the time remaining to complete the task. Priority Use this[...]
-
Page 205
Chapter 9 Applica tions NSA320 User’s Guide 205 The following table describes t he labels in this screen. Note: If you installed php-MySQL-phpMyAdmin through the Package Mana gement screen ( Section 10.4 on page 232 ) and enable it, you can use PHP and MySQL in your published web page. T able 40 Applications > W eb Publishing LABEL DESCRIPTION[...]
-
Page 206
Chapter 9 Applications NSA320 User’s Guide 206 9.8 The Broadcatching Screen This screen displays t he NSA’ s subscribed channels and t he associated contents. • The NSA sa ves a channel’ s downl oaded items in a folder named after t he channel. • The NSA creates the channel folders in the same destinati on as the download service. See Sec[...]
-
Page 207
Chapter 9 Applica tions NSA320 User’s Guide 207 The following table describes t he labels in this screen. T able 41 Applications > Broadcatchin g LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’ s feed and click this button. A screen opens for you to subscribe to the feed. W hen you are done[...]
-
Page 208
Chapter 9 Applications NSA320 User’s Guide 208 9.8.1 Adding a Broadcatching Channel At the time of writing, the NSA supports RSS 2.0 feeds. W ebsites with a feed usually displa y a feed icon (shown next ). Copy and past e the feed’ s URL into t he Applications > Broadc atching > Add Channel screen and you can download new files as they ar[...]
-
Page 209
Chapter 9 Applica tions NSA320 User’s Guide 209 Click Applications > Broadcatching > Add Channel to open the following screen. Use the Add Chann el screen to subscribe the NSA to a channel’ s feed so you can view the channel. Y ou also sel e ct policies f or downloading and deleting the channel’ s items. Section 4. 10 on page 110 provid[...]
-
Page 210
Chapter 9 Applications NSA320 User’s Guide 210 Delete Policy Set how the NSA handles de leting the items downloaded from the channel. Manual : Only delete individual files you select later in the Broadcatching screen. Keep last N of items : Select this to set the NSA to only keep a number of the channel’ s most recent files. When this number ha[...]
-
Page 211
Chapter 9 Applica tions NSA320 User’s Guide 21 1 Edit Click this to open the following screen where y ou can set the default folder location where you “ Put incomplete downloads in ” and “ Move complete downloads to ”:. • Sh are - Select the share from the list. • Path - T ype the folder location in the share directly or click Browse [...]
-
Page 212
Chapter 9 Applications NSA320 User’s Guide 212 9.8.2 Editing a Broadcatching Channel Click Applications > Broadcatching , then select a channel and click Edit Channel to open a si milar Edit screen. Use th e Edit Channel screen to change the download or de lete polici es. Figure 100 Applications > Broadcatching > Edit Channel The followi[...]
-
Page 213
Chapter 9 Applica tions NSA320 User’s Guide 213 Location of Downloaded Files This shows where the NSA stores new downloads ( Put incomplete downloads in ) and where the NSA moves completed downloads ( Move completed downloads to ). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in[...]
-
Page 214
Chapter 9 Applications NSA320 User’s Guide 214 9.9 The Print Server Screen Use the Print S erver screen to view and manage th e NSA’ s list of p rinters and print jobs. Click Applications > Print Server to open the following screen. Figure 101 Applications > Print Server The following table describes t he labels in this screen. Apply Clic[...]
-
Page 215
Chapter 9 Applica tions NSA320 User’s Guide 215 9.9.1 Print Server Rename Click Applications > Print Server and a printer’ s Rename icon to open the following screen. Use this screen to change the name the NS A uses for the printer . Figure 102 Applications > Print Server > Rename The following table describes t he labels in this scree[...]
-
Page 216
Chapter 9 Applications NSA320 User’s Guide 216 9.10 The Copy/Sync Button Screen The Copy/S ync button on the front panel allows you to copy or synchronize files between a connected US B device and the NS A. Click Applications > Copy/Sync Button to open the following screen. Figure 103 Applications > Copy/Sync Button The following table desc[...]
-
Page 217
Chapter 9 Applica tions NSA320 User’s Guide 217 9.1 1 T echnical Reference This section provi des technical background information on the topics discussed in this chapter . 9.1 1.1 Sharing Media Files on Y our Network The media server feature lets anyone on y our network play video , music, and photos from the NSA (without ha ving to copy them to[...]
-
Page 218
Chapter 9 Applications NSA320 User’s Guide 218 electronics companies that works to mak e products compatible in a home network. • Publish shares to let others play the contained media files. • The media server i s a convenient w ay to share fi les you download using t he broadcatching service (see Section 9.8 on page 206 ). • Hardware-based[...]
-
Page 219
Chapter 9 Applica tions NSA320 User’s Guide 219 9.1 1.2 Download Service The NSA’ s download service downloads fil es from the Internet directly to the NS A. Y ou do not have to download to your comp u t e r a n d t h e n c o p y t o t h e N S A . T h i s c a n free up your computer’s system resources. The download service also handles your b[...]
-
Page 220
Chapter 9 Applications NSA320 User’s Guide 220 The following screen displays how the pl ugin works. Figure 105 Link Capture Bro wser Plugin Instead of copying and pasting a file’ s UR L to the NS A’ s download service, you can right-cl ick on the URL in the web browser and select Send to NSA . The URL is then added to the NS A’ s download s[...]
-
Page 221
Chapter 9 Applica tions NSA320 User’s Guide 221 Note: The download service notification only keep s track of files downloaded via BitT orrent. Figure 106 Download Service Notification 9.1 1.5 BitT orrent Security When you download using BitT orrent, you re veal your IP address. This increases the risk of hacking attacks, which c an be protected a[...]
-
Page 222
Chapter 9 Applications NSA320 User’s Guide 222 Ideally your firew all should hav e the following: • Stateful p acket insp ection to cont ro l access between the Internet and your network and protect y our NSA (and comput ers) from hacking attacks. • IDP (Intrusion Detectio n and Prevention ) to detect malicious pack ets within normal network [...]
-
Page 223
Chapter 9 Applica tions NSA320 User’s Guide 223 set this up (see the firewall’ s m anual for details). Y ou may also have to configure a corresponding firewall rule. Figure 109 Firewall Configured to Allo w Incoming BitT orrent Request s 9.1 1.6 Web Publishing Example This example covers how to configure the We b Publishing screen to let peopl [...]
-
Page 224
Chapter 9 Applications NSA320 User’s Guide 224 1 Click Applications > Web Publishing and configure the screen as shown (enable the web publishing and mov e FamilyPhotos over to Published Shares ) and click Apply. Figure 1 10 Applications > Web Pu blishing (Example) 2 Now open your we b browser and type in the address of the NSA’s F amilyP[...]
-
Page 225
Chapter 9 Applica tions NSA320 User’s Guide 225 • Click a fi le’s link to open the file. • Right -click a file’ s link and select Save Target As.. (in Internet Explorer) to save a copy of the file. • Click a label in the heading row to sort the files by that criteria. • T o customize how the page looks and work s, cre ate an in dex .h[...]
-
Page 226
Chapter 9 Applications NSA320 User’s Guide 226 your Internet gatew ay specifically for al lowing access to the web -published shares and another sepa rate set of rules fo r accessing th e NSA’s web configurator . 9.1 1.8 Channel Guides for Broadcatching Here are some popular broadcat ching channel guide web sites. Note: ZyXEL does not endorse t[...]
-
Page 227
Chapter 9 Applica tions NSA320 User’s Guide 227 9.1 1.9 Printer Sharing The NSA can act as a print server . A print server lets multiple computers share a printer . Connect a printer to the NSA’ s USB port to let mult iple computers on your network use it. See www .zyxel .com for a list of compatible printers. Figure 1 13 Printer Sharing[...]
-
Page 228
Chapter 9 Applications NSA320 User’s Guide 228 9.1 1.10 Copying Files Y ou can copy files from a USB device to the NS A or from the NS A to a USB device. Simply press and release the COPY/SYNC button to start cop ying files. See Section 9.10 on page 216 for details about configuring the copy settings. The following figure illustr ates how copying[...]
-
Page 229
Chapter 9 Applica tions NSA320 User’s Guide 229 9.1 1.1 1 Synchronizing Files Synchronization makes th e contents on th e target device i dentical to the on es on the source device. Y ou can synchronize files from a USB device to the NSA or from the NSA to a USB devic e. In addition, you may also synchronize files in both directions simultaneousl[...]
-
Page 230
Chapter 9 Applications NSA320 User’s Guide 230 USB <-> NSA When you synchronize files in both direct ions simultaneously , both stor age devices transfer unique files to one another . Files with the same file name are synchronized ac cording to their modifi cation date/time. The difference in modification time between the t wo files has to [...]
-
Page 231
NSA320 User’s Guide 231 C HAPTER 10 Package Management 10.1 Overview P ackage Management can be used to set up mor e useful applications in your NSA. The NSA can download multiple packages /files at once and automatical ly goes through all the installa tion steps. 10.2 What Y ou Can Do •U s e t h e Package Manage ment screen ( Secti on 10.4 on [...]
-
Page 232
Chapter 10 Packa ge Management NSA320 User’s Guide 232 • Gallery - This web-based application allows your NSA to host pictures. Y ou can upload images in your local computer or shares to this application. Use the administr ator account of your NSA to log in to the Gallery console. The administr ator can then create accounts for other users. •[...]
-
Page 233
Chapter 10 Packa ge Management NSA320 User’s Guide 233 Click Applications > Package Management to open the following screen. Figure 1 17 Applications > Package Managemen t The following table describes t he labels in this screen. T able 47 Applications > Package Ma nagement LABEL DESCRIPTION Pa c k a ge M a na g em en t Ret r i e v e L i[...]
-
Page 234
Chapter 10 Packa ge Management NSA320 User’s Guide 234 Note: Once you inst all an application and enable it, additiona l links show up in the navigation pan el. This applies to eMule , DyDNS , NF S , SMART and BackupPlanner . For Gallery , PHP-MySQL-phpMyAdmin , SqueezeCenter and WordPress , you can acce ss the applications’ web configu rators [...]
-
Page 235
Chapter 10 Packa ge Management NSA320 User’s Guide 235 10.4.1 Displaying the Package Information Select an item on the list and click Pac kage Info . Use this screen to check detailed information about the task. Figure 1 18 Applications > Package Managemen t > Package Info The following table describes t he labels in this screen. T able 48 [...]
-
Page 236
Chapter 10 Packa ge Management NSA320 User’s Guide 236 10.5 eMule Screens Use these screens to manage the eMule appl ication in your NSA . eMule is a pee r- to-peer (P2P) file-sharing console that lets you download files from the Internet. It works with eDonkey and K ad networks. 10.5.1 eMule Server Screen Use this screen to configure the eMule s[...]
-
Page 237
Chapter 10 Packa ge Management NSA320 User’s Guide 237 Y ou see a warning screen before you delete a serv er . Figure 120 Delete a Server 10.5.2 Add Server Use this screen to add a server for the eMule application. My Info Select a server from the list and click this to view the details and connection status of the server . Ref e r t o Section 10[...]
-
Page 238
Chapter 10 Packa ge Management NSA320 User’s Guide 238 Click Add in the Applications > eMule > Server screen to add a server . Figure 121 Applications > eMule > Server: Add The following table describes t he labels in this screen. 10.5.3 Edit Server Use this screen to edit a server for the eMule application. Click Edit in the Applicat[...]
-
Page 239
Chapter 10 Packa ge Management NSA320 User’s Guide 239 The following table describes t he labels in this screen. 10.5.4 My Info Use this screen to view the server deta ils, including the status, IP address and download/upload speeds. Click MyInfo in the Applications > eMule > Server screen to view the server details. Figure 123 Applications[...]
-
Page 240
Chapter 10 Packa ge Management NSA320 User’s Guide 240 10.5.5 eMule T ask Screen Use this screen to view tasks, includin g completed, downloading, uploading and shared tasks, that are be ing handled by the NS A. Click Applications > eMule > Task screen to view the task details. Figure 124 Applications > eMule > T ask The following tab[...]
-
Page 241
Chapter 10 Packa ge Management NSA320 User’s Guide 241 Add Click this to add a download task (ED2K link) to the list. Ref e r t o Section 10 .5.6 on page 242 for the Add Task screen. Preferences Click this to open a screen where you can set the default location for saving downloaded files. Y ou can al so configure your eMule download settings. Re[...]
-
Page 242
Chapter 10 Packa ge Management NSA320 User’s Guide 242 Note: Download t asks initially appear in the Downloading t ab of the eMule T ask screen. Depending on it s status, it ca n eventually show up in the other t abs ( Newly Completed , Uploading or Shared Files t abs). Y ou see a warning screen before you delete a task. Figure 125 Delete a T ask[...]
-
Page 243
Chapter 10 Packa ge Management NSA320 User’s Guide 243 Click Add in the Applications > eMule > Task screen to add a task. Figure 126 Applications > eMule > T ask: Add The following table describes t he labels in this screen. T able 54 Applications > eMule > T ask: Add LABEL DESCRIPTION Source ED2K Link Paste the ED2K link of the[...]
-
Page 244
Chapter 10 Packa ge Management NSA320 User’s Guide 244 10.5.7 Preferences Use this screen to configure your eMule sett ings, such as port numbers to use, its download/upload r ates and the maximum num ber of peers allowed t o connect to the NSA. Edit Click this to open the following screen where y ou can set the default folder location where you [...]
-
Page 245
Chapter 10 Packa ge Management NSA320 User’s Guide 245 Click Applications > eMule > Task > Preferences to open the following screen. Figure 127 Applications > eMule > T ask > Preferences The following table describes t he labels in this screen. T able 55 Applications > eMule > T ask > Preferences LABEL DESCRIPTION Usern[...]
-
Page 246
Chapter 10 Packa ge Management NSA320 User’s Guide 246 Edit Click this to open the following screen where y ou can set the default folder location where you “ Put incomplete downloads in ” and “ Move complete downloads to ”:. • Sh are - Select the destination share from the drop-down list. • Path - This field displays the share folder[...]
-
Page 247
Chapter 10 Packa ge Management NSA320 User’s Guide 247 10.5.8 Edit IP Filter Use this screen to enable IP f iltering which prevents yo ur NSA from accessing certain networks and IP addr esses that may be hosting malicious programs. Figure 128 Applications > eMule > T ask > Preferences: Edit IP Filter The following table describes t he la[...]
-
Page 248
Chapter 10 Packa ge Management NSA320 User’s Guide 248 10.5.9 Share Browsing Use this scre en to view a lis t of files tha t are still be ing downloa ded by th e NSA. The files are located i n the eMuleT emp folder in the Admin share by default. Click Applications > eMule > Task > Browse Incomplete Downloads to open the following screen[...]
-
Page 249
Chapter 10 Packa ge Management NSA320 User’s Guide 249 10.5.10 T ask Info Use this screen to view eMule task details, such as stat us, file name, file size and its downloa d progress. R ename Select a folder or file and click th is to open a screen. Enter the name you want and click OK to make the changes. Note: When you change a f ile name, make[...]
-
Page 250
Chapter 10 Packa ge Management NSA320 User’s Guide 250 Click Task Info in Applications > eMule > Task screen to open the following. Figure 130 Applications > eMule > T ask: T ask Info The following table describes t he labels in this screen. T able 58 Applications > eMule > T ask: T ask Info LABEL DESCRIPTION Status This shows t[...]
-
Page 251
Chapter 10 Packa ge Management NSA320 User’s Guide 251 10.5.1 1 eMule Search Screen Use this screen to search for files av ailabl e in an eMule server using keywords and other paramet ers, such as file type, fi le size and extension names. Click Applications > eMule > Search to open the following screen. Figure 131 Applications > eMule &[...]
-
Page 252
Chapter 10 Packa ge Management NSA320 User’s Guide 252 10.6 DyDNS Screen Use this to enable and configure D yDNS. Dynamic DNS allows you to update your current dynami c IP address with a dynamic DNS service so that anyone can contact you (such as through NetMee ting or CUSeeMe). Y ou can also access y our FTP server or W eb site on y our own comp[...]
-
Page 253
Chapter 10 Packa ge Management NSA320 User’s Guide 253 The following table describes t he labels in this screen. 10.7 NFS Screen Use this screen to enable and c onfigure Network File S ystem (NFS) setti ngs on your NSA . NFS is a client/serv er distributed file serv ice that provides transparent file sharing for network environments. This allows [...]
-
Page 254
Chapter 10 Packa ge Management NSA320 User’s Guide 254 Click Networ k > NFS to open the following screen. Figure 133 Netwo rk > NFS The following table describes t he labels in this screen. T able 61 Network > NFS LABEL DESCRIPTION NFS Service Enable NFS Server Click this to employ NFS in your NSA. Disable NFS Server Click this to stop u[...]
-
Page 255
Chapter 10 Packa ge Management NSA320 User’s Guide 255 Y ou see a warning screen before you delete a v olume. Figure 134 Delete an NFS Share 10.7.1 Add/Edit NFS Share Use this screen to add or edit an NFS share. Note: Some attributes o f the NFS share cannot be edited. Click Add or Edit in the Network > NFS screen to open the following: Figure[...]
-
Page 256
Chapter 10 Packa ge Management NSA320 User’s Guide 256 10.7.2 NFS Session Use this screen to view a list of active NFS sessions. Y ou can see which us ers are connected the NFS shares. Click NFS Session in the Network > NFS screen to open the following. Figure 136 Network > NFS: NFS Session The following table describes t he labels in this [...]
-
Page 257
Chapter 10 Packa ge Management NSA320 User’s Guide 257 10.8 SMART Screen Use this screen to view i ndicators of your NS A’ s hard disk(s) health. Self Monitoring, Analys is, and Reporting T echno logy (S.M.A.R.T ) detects and reports the reliability of hard disks using standard indicators (called “attributes”), to help you anticipate possib[...]
-
Page 258
Chapter 10 Packa ge Management NSA320 User’s Guide 258 10.8.1 SMART Brief Summary Use this screen to display information about the volume, such as the hard disk vendor , specific model, hard disk capacity and so on. Click Brief Summary in the Storage > S.M. A.R.T screen to d isplay the following. Figure 138 S torage > S.M.A.R.T : Brief Summ[...]
-
Page 259
Chapter 10 Packa ge Management NSA320 User’s Guide 259 10.8.2 SMART Full Summary Use this screen to display more details information about the volume. Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 139 S torage > S.M.A.R.T : Full Summary Health This describes the overall health of the volume based on S[...]
-
Page 260
Chapter 10 Packa ge Management NSA320 User’s Guide 260 The following table describes t he labels in this screen. T able 66 S torage > S.M.A.R.T : Full Summary LABEL DESCRIPTION ID This is the identification num ber used to tag a hard disk attribute. This is standard across all S.M.A.R.T -enabled storage devices. However it depends on the stor [...]
-
Page 261
Chapter 10 Packa ge Management NSA320 User’s Guide 261 10.9 Protect Screens The Protect screens include: • Backup screens - These include steps to create and customize backup jobs. • Restore screens - These include steps to re st ore previous backups made with the NSA. 10.10 Backup Screens Use this screen to create and customiz e scheduled ba[...]
-
Page 262
Chapter 10 Packa ge Management NSA320 User’s Guide 262 Click Prote ct > Backup to open the following screen. Figure 140 Protect > Backup The following table describes t he labels in this screen. T able 67 Protect > Backup LABEL DESCRIPTION Backup Add Job Click this to create and customize a backup job. Edit Job Select a backup job in the[...]
-
Page 263
Chapter 10 Packa ge Management NSA320 User’s Guide 263 10.10.1 Backup: S tep 1 Use this screen to specif y the job information and back up type. Click Add Jo b in the Protect > Backup screen to open the following: Figure 141 Protect > Backup: S tep 1 The following table describes t he labels in this screen. T able 68 Protect > Backup: S [...]
-
Page 264
Chapter 10 Packa ge Management NSA320 User’s Guide 264 Backup T ype Choose the backup type that you want the NS A to implement for the backup job. Archive - This is a backup of the source folder in an archive format. Once you backup your files in the target folder , you cannot access the files individually unless you have the extracting tool used[...]
-
Page 265
Chapter 10 Packa ge Management NSA320 User’s Guide 265 10.10.2 Backup: S tep 2 Use this screen to specify where the file s you want to backup are located and set where you want the backup to be stored. Figure 142 Protect > Backup: S tep 2[...]
-
Page 266
Chapter 10 Packa ge Management NSA320 User’s Guide 266 The following table describes t he labels in this screen. T able 69 Protect > Backup: S tep 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files. Click to close a[...]
-
Page 267
Chapter 10 Packa ge Management NSA320 User’s Guide 267 R emote Select this to back up to another device. For A r c h i v e s : The remote device can be another NSA in the network. Fill in the following fields in order to be able to access it. • R emote NSA Address •U s e r n a m e • P assword •S h a r e N a m e Click Test Connection to se[...]
-
Page 268
Chapter 10 Packa ge Management NSA320 User’s Guide 268 10.10.3 Backup: S tep 3 Use this screen to specify compression, encryption and purge policies f or the backup job. T his step is only a vailable if you are doing an archive backup or a synchronization backup to a remote target. Figure 143 Protect > Backup: S tep 3 The following table descr[...]
-
Page 269
Chapter 10 Packa ge Management NSA320 User’s Guide 269 10.10.4 Backup: S tep 4 Click this to specify the schedule for the backup job. The backup job automatically runs according to the schedule that you set in this screen. Figure 144 Protect > Backup: S tep 4 The following table describes t he labels in this screen. Purge Policy The NSA mainta[...]
-
Page 270
Chapter 10 Packa ge Management NSA320 User’s Guide 270 10.10.5 Edit Job Screen Use this screen to ed it an existing backup job. Some attributes of the backup job cannot be changed, such as the name, backup t ype, source folder and so on. Every how many hours? This is only available if you selected Hourly as your backup frequency . Select every ho[...]
-
Page 271
Chapter 10 Packa ge Management NSA320 User’s Guide 271 10.10.6 Edit Job: St ep 1 Click Prote ct > Backup . Select a backup job from the list and click Edit Job to open the following. Figure 145 Protect > Backup > Edit: S tep 1 The following table describes t he labels in this screen. T able 72 Protect > Backup > Edit: S tep 1 LABEL[...]
-
Page 272
Chapter 10 Packa ge Management NSA320 User’s Guide 272 10.10.7 Edit Job: St ep 2 Use this screen to edit th e sched ule for the backup job. Figure 146 Protect > Backup > Edit: S tep 2 Compression This field is read-only and shows whether the backup employs compression. Compression reduces the size of the file that y ou want to back up. Back[...]
-
Page 273
Chapter 10 Packa ge Management NSA320 User’s Guide 273 The following table describes t he labels in this screen. 10.10.8 Restore Archive Screen Use this screen to restore prev ious backup s made with the NSA. T able 73 Protect > Backup > Edit: S tep 2 LABEL DESCRIPTION Scheduler Settings Backup Frequency Edit this by selecting from Hourly ,[...]
-
Page 274
Chapter 10 Packa ge Management NSA320 User’s Guide 274 10.10.9 Restore Archive: S tep 1 Click Prote ct > Backup screen ( Section 10.10 on page 26 1 ). Y ou can restore a previous backup job by selecting a ba ckup job from the lis t and clicking Restore Archive. Figure 147 Protect > Backup > Restore Archive: S tep 1 The following table de[...]
-
Page 275
Chapter 10 Packa ge Management NSA320 User’s Guide 275 10.10.10 Restore Archive: S tep 2 Use this screen to select the folder wh e re the archive you w ant to restore is located. Figure 148 Protect > Backup > Restore Archive: S tep 2 The following table describes t he labels in this screen. T able 75 Protect > Backup > Resto re Archiv[...]
-
Page 276
Chapter 10 Packa ge Management NSA320 User’s Guide 276 10.10.1 1 Restore Archive: Step 3 Use this screen to select the location in the NS A where y ou wan t to restore y our backup. Figure 149 Protect > Backup > Restore Archive: S tep 3 The following table describes t he labels in this screen. T able 76 Protect > Backup > Resto re Arc[...]
-
Page 277
Chapter 10 Packa ge Management NSA320 User’s Guide 277 10.1 1 Restore Screen Use this screen to restore previous backup s made with the NSA, including arc hives and folders from internal, external or remote NSAs to the NSA. 10.1 1.1 Restore: S tep 1 Y ou can access this screen by clicking Prote ct > Restore . Figure 150 Protect > Restore: S[...]
-
Page 278
Chapter 10 Packa ge Management NSA320 User’s Guide 278 10.1 1.2 Restore: S tep 2 Select a previous archive backup that you want to restore to the NSA. Figure 151 Protect > Restore: S tep 2 Browse Click this to select where the previous backup that you want to restore is located. • Volume - Select a volume from the list. • Current Location [...]
-
Page 279
Chapter 10 Packa ge Management NSA320 User’s Guide 279 The following table describes t he labels in this screen. 10.1 1.3 Restore: S tep 3 Use this screen to select the folder wh e re the archive you w ant to restore is located. Figure 152 Protect > Restore: S tep 3 T able 78 Protect > Restore: S tep 2 LABEL DESCRIPTION Step 2. Select Res t[...]
-
Page 280
Chapter 10 Packa ge Management NSA320 User’s Guide 280 The following table describes t he labels in this screen. 10.1 1.4 Restore: S tep 4 Use this screen to select the location in the NS A where y ou wan t to restore y our backup. Figure 153 Protect > Restore: S tep 4 T able 79 Protect > Restore: S tep 3 LABEL DESCRIPTION Step 3. Please se[...]
-
Page 281
Chapter 10 Packa ge Management NSA320 User’s Guide 281 The following table describes t he labels in this screen. 10.12 T echnical Reference This section provi des technical background information on the topics discussed in this chapter . 10.12.1 S.M.A.R.T Attributes The following table describes some c ommon S.M.A.R.T . attributes. If a higher or[...]
-
Page 282
Chapter 10 Packa ge Management NSA320 User’s Guide 282 S.M.A.R.T . attributes and their definiti ons v ary by manufactur er , refer to the hard drive manufacturer for details about the attributes your hard drive supports. T able 81 S.M.A.R.T . Attributes ID ATTRIBUTE NAME BETTE R DESCRIPTION 01 Read Error Rat e Low Shows the r ate of hardware rea[...]
-
Page 283
Chapter 10 Packa ge Management NSA320 User’s Guide 283 19 0 Airflow Te m p e r a t u r e Low This indicates the temper ature of the airflow measured by a W estern Digital hard drive. 19 0 Te m p e r a t u r e Difference from 100 High This indicates the v alue of 100 - the temperature in degrees Celsius. Manufacturers can set a minimum threshold t[...]
-
Page 284
Chapter 10 Packa ge Management NSA320 User’s Guide 284 20 5 Thermal Asperity R ate (T AR) Low This is the number of thermal asperity errors. Thermal asperity is a read signal spik e caused by sensor temperature rise due to touching the disk surface or contaminant particles. 20 6 Flying Height This is the height of the hard drive’ s read/write h[...]
-
Page 285
NSA320 User’s Guide 285 C HAPTER 11 Auto Upload 1 1.1 Overview This chapter discusses the feat ures in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or Y ouT ube sharing websites. Besides web publishing and media server , auto upload is another con venient w ay to share med ia files with [...]
-
Page 286
Chapter 11 Au to Upload NSA320 User’s Guide 286 FTPES (File T ransfer Protoc ol over Expl icit TLS/SSL) File T ransfer Protocol over Explici t TLS/SSL (FTPES) is a file transfer service that uses TLS (T ransport Lay er Security) or Secure S ocket Layer ( SSL) for secure transfers across the Internet. 1 1.4 The Flickr/Y ouT ube Screen Use this scr[...]
-
Page 287
Chapter 11 Auto Upload NSA320 User’s Guide 287 1 1.4.1 Configuring the Flickr Settings In the Applications > Auto Upl oad > Flickr/Y ouT ube screen, select Flickr from the list and then clic k the Config button. The following screen displays if you have not authorized the NSA to use a Flickr account. Click OK to continue the authorization p[...]
-
Page 288
Chapter 11 Au to Upload NSA320 User’s Guide 288 The following page displays asking f or your authorization. Click OK, I’LL ALLOW IT to establish a link between the NSA and y our Flickr account. Figure 157 Flickr Authorization A confirmation page displays indicating suc cessful authorization. R eturn to the NSA web configurator . Click Get Ready[...]
-
Page 289
Chapter 11 Auto Upload NSA320 User’s Guide 289 Once the NSA i s associated with y our Flickr accoun t, you can c onfigure auto upload settings in the following screen. Figure 159 Applications > Auto Upload > Fl ickr/Y ouT ube > Config (Flickr)[...]
-
Page 290
Chapter 11 Au to Upload NSA320 User’s Guide 290 The following table describes t he labels in this screen. T able 83 Applications > Auto Up load > Flickr/YouTube > Config (Flickr) LABEL DESCRIPTION Flickr Account Configuration Username This field displays the Flickr account authorized for the auto upload feature. Photo Space Usage This sh[...]
-
Page 291
Chapter 11 Auto Upload NSA320 User’s Guide 291 Add Click this to open the following screen where you can set a folder that contains files you w ant the NSA to automatically upload. • Share - Select the share from the list. • Path - T ype the folder location in the share di rectly or click Browse to open the following screen and navigate to th[...]
-
Page 292
Chapter 11 Au to Upload NSA320 User’s Guide 292 1 1.4.2 Configuring the Y ouT ube Settings In the Applications > Auto Upload > Flickr/YouTube screen, se lect Y ouT ube from the list and then click the Config button. Note: Y our Y ouT ube account must be associated with a Goo gle account. Get a Google account and use it to log into Y ouT ube[...]
-
Page 293
Chapter 11 Auto Upload NSA320 User’s Guide 293 Once the NSA i s associated with y our Y ouT ube account, you can configure aut o upload settings in the following screen. Figure 161 Applications > Auto Upload > Flickr/Y ouT ube > Config (Y ouT ube)[...]
-
Page 294
Chapter 11 Au to Upload NSA320 User’s Guide 294 The following table describes t he labels in this screen. T able 84 Applications > Auto Up load > Config (YouTube) LABEL DESCRIPTION Y outube Account Configuration Username This field displays the Y outube account authorized for the auto upload feature. Switch User Click this to use a differen[...]
-
Page 295
Chapter 11 Auto Upload NSA320 User’s Guide 295 Add Click this to open the following screen where you can set a folder that contains files you w ant the NSA to automatically upload. • Share - Select the share from the list. • Path - T ype the folder location in the share directly or click Browse to open the following screen and navigate to the[...]
-
Page 296
Chapter 11 Au to Upload NSA320 User’s Guide 296 1 1.5 The FTP Uploadr Screen The FTP Uploadr feature uploads files stored in the NSA to FTP servers. Besides web publishing and media server , auto uplo ad is another con venient way to share media files with your friends and family . Y ou can l ink the NSA to the FTP server or the FTP server on ano[...]
-
Page 297
Chapter 11 Auto Upload NSA320 User’s Guide 297 The following table describes t he labels in this screen. T able 85 Applications > Auto Up load > FTP Uploadr LABEL DESCRIPTION Enable F TP Uploadr Use the check box to enable or disable the FTP Up loadr . Click Apply to save y our changes. When you disable the FTP Uploadr , a screen opens requ[...]
-
Page 298
Chapter 11 Au to Upload NSA320 User’s Guide 298 1 1.5.1 Adding or Editing an FTP Server Entry Use this screen to add or edi t an FTP server entry for auto upload. In the FTP Uploadr screen, click the Add Serv er or Edit Server button to open the following screen. Figure 163 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server [...]
-
Page 299
Chapter 11 Auto Upload NSA320 User’s Guide 299 1 1.5.2 The FTP Uploadr Preferences Screen Use this screen to conf igure the gener al settings for the FTP Uploadr . In the FTP Uploadr screen, click the Preferences icon to open the following screen. Figure 164 Applications > Auto Upload > FTP Uploadr > Preferences The following table descr[...]
-
Page 300
Chapter 11 Au to Upload NSA320 User’s Guide 300 Add Click this to open the following screen where you can set a folder that contains files you w ant the NSA to automatically upload. • Share - Select the sh are from the list. • Path - T ype the folder location in the share directly or click Browse to open the following screen and navigate to t[...]
-
Page 301
NSA320 User’s Guide 301 C HAPTER 12 Users 12.1 Overview This chapter introduces the User s screens of the NSA. Use the Users screens to create and manage administr ator and user accounts. Administr ators can: • Configure and manage the NSA. • Create vo lumes, shares, and user accounts. • Assign individual users specific access rights f or s[...]
-
Page 302
Chapter 12 User s NSA320 User’s Guide 302 12.3 The Users Screen Click Sharing > Users to display the screen shown next. Use this screen to create and manage ac counts for users who can store files on the NSA. Figure 165 Sharing > Users The following table describes t he labels in this screen. T able 88 Sharing > Users LABEL DESCRIPTION A[...]
-
Page 303
Chapter 12 Users NSA320 User’s Guide 303 12.3.1 User Icons The following table describes t he user icons. Delete Selected Users Select an account and click this to open a screen where you can delete the user account. User Info Select an account and click this to open a screen displaying the amount of storage space u sed by the account. Y ou can a[...]
-
Page 304
Chapter 12 User s NSA320 User’s Guide 304 12.3.2 Adding or Editing an Account Use this screen to creat e or edit a NSA user account wi th NSA access password. Click the Add User button in the Users screen to op en the followin g screen. Click the Edit User button in the screen shown previous ly to edit an existing account. Figure 166 Sharing >[...]
-
Page 305
Chapter 12 Users NSA320 User’s Guide 305 12.3.3 Usernames Enter a username from one to 32 char acters. The first char acter must be alphabetical (case insensitive, [A -Z a- z]); numeric characters are not allowed as the first char acter . The username can only contain the followi ng characters : • Alphanumeric A- z 0-9. Unicode username s are s[...]
-
Page 306
Chapter 12 User s NSA320 User’s Guide 306 •a n o n y m o u s • nobody • root •p c - g u e s t •a d m i n •p a s s w o r d 12.4 Displaying User Info Use this screen to disp lay a user’s info rmation. In the Users screen, select an account and click Us er Info to open the following screen. Figure 167 Sharing > Users > User I nfo[...]
-
Page 307
NSA320 User’s Guide 307 C HAPTER 13 Groups 13.1 Overview This chapter introduces the Gr oups screens. Use the Groups screens to create and manage groups. Y ou can assign users to groups and grant individual groups access rights to specific shares. 13.2 What Y ou Can Do •U s e t h e m a i n Groups screen ( Section 13.3 on page 307 ) to display a[...]
-
Page 308
Chapter 13 Gro ups NSA320 User’s Guide 308 Click Sharing > Groups to display the screen shown next. Figure 168 Sharing > Groups The following table describes t he labels in this screen. T able 92 Sharing > Group s LABEL DESCRIPTION Add Group Click this to open a screen where you can con figure a new group. Search Click this to display a [...]
-
Page 309
Chapter 13 Grou ps NSA320 User’s Guide 309 13.3.1 Adding or Editing a Group Use this screen to create or edit a NSA group. Click the Add Group button in the Groups screen to open the following screen. Click the Edit Group button in the screen shown prev iously to edi t an existing group. Figure 169 Sharing > Groups > Add or Edit a Group The[...]
-
Page 310
Chapter 13 Gro ups NSA320 User’s Guide 310 13.3.2 Group Names Enter a group name from 1 to 32 char acters. The first char acter must be alphabetical (case insensitive, [A -Z a- z]); numeric characters are not allowed as the first char acter . The group name can only contain the following characters: • Alphanumeric A- z 0-9. Unicode username s a[...]
-
Page 311
NSA320 User’s Guide 31 1 C HAPTER 14 Shares 14.1 Overview A share is a set of access pe rmissions mapped to a specific fol der on a volume. It is equivalent to the Windows concept of a shared folder . Y ou can map a share to a network drive for easy and familiar file transfer for Windows users. 14.2 What Y ou Can Do •U s e t h e Shares screen ([...]
-
Page 312
Chapter 14 Shares NSA320 User’s Guide 312 14.3 The Shares Screen Click Sharing > Shares in the navigation panel to open the following screen. This screen lists all shares created on the NS A. Figure 170 Sharing > Shares The following table describes t he labels in this screen. T able 94 Sharing > Shares LABEL DESCRIPTION Add Share Click [...]
-
Page 313
Chapter 14 Shares NSA320 User’s Guide 313 Status This field displays the share icons. represents a Built-in share on a volume on the internal hard drives. represents a Predefined or User-Created share on a volume on the internal hard drives. represents an Auto or User-Created share on a v olume on the external (USB) devices. represents a disabled[...]
-
Page 314
Chapter 14 Shares NSA320 User’s Guide 314 14.3.1 Adding or Editing Share Click Add Share to create a new share. In the Shares screen, select a share and click Edit Share to open the following screen. Use this screen to creat e or edit a share. Figure 171 Shares > Add Share (or Edit Share) The following table describes t he labels in this scree[...]
-
Page 315
Chapter 14 Shares NSA320 User’s Guide 315 14.3.2 Configuring Advanced Share Access In the Sharing > Shares > Add S hare or Edit Share screen, select Advanced from the Share Access drop-down list. Click Edit to open the following screen. Use this screen to configure share access rights for individual users and groups. Figure 172 Sharing >[...]
-
Page 316
Chapter 14 Shares NSA320 User’s Guide 316 The following table describes t he labels in this screen. 14.3.3 Public and ANONYMOUS Share Access Right s If you mak e a share public, users do not need to log in. With ANONYMOUS FTP , you must enter either 'a non ymous' or 'ftp' as the username. Any other name is cons idered a userna[...]
-
Page 317
Chapter 14 Shares NSA320 User’s Guide 317 This feature may be useful i f you connect to the NSA occasi onally from a remote location. Note: Disable oplocks to improve the NSA’ s performance unless you need to use the Windows of fline file feature. If you do use the Windo ws offline file featu re with the NSA, use it with a share cont aining onl[...]
-
Page 318
Chapter 14 Shares NSA320 User’s Guide 318 14.5 The Recycle Bin Configuration Screen Use this screen to peri odically clean up items in all recycle bins. 14.5.1 Recycle Bins Re cycle bins in the NSA help users recov er accidentally deleted files or folders in the shares. When you delete an item, a recy cle folder is created within the share to hol[...]
-
Page 319
Chapter 14 Shares NSA320 User’s Guide 319 14.6 The Share Browser Screen Use this screen to create folders, upload files, and edi t files within the share. Figure 175 Sharing > Shares > Share Bro wser The following table describes t he labels in this screen. T able 99 Sharing > Shares > Sh are Browser LABEL DESCRIPTION Create Folder T [...]
-
Page 320
Chapter 14 Shares NSA320 User’s Guide 320 R ename Select a folder or file and click th is to open a screen. Enter the name you want and click OK to make the changes. Note: When you change a f ile name, make sure you keep the file extention. Delete Select a file/folder from the list and click this to open a w arning screen. Click Yes to delete the[...]
-
Page 321
Chapter 14 Shares NSA320 User’s Guide 321 14.6.1 Moving or Copying Files Use this screen to move or copy files to another share. In the Share Browser screen, select a file or folder and clic k Move or Copy to open the following screen. Figure 176 Sharing > Shares > Share Bro wser > Move (or Copy) The following table describes t he labels[...]
-
Page 322
Chapter 14 Shares NSA320 User’s Guide 322[...]
-
Page 323
NSA320 User’s Guide 323 C HAPTER 15 Maintenance Screens 15.1 Overview This chapter discusses the Maintenance screens. The Maintena nce screens allow you to manage system conf igurations. 15.2 What Y ou Can Do •U s e t h e Power screen ( Section 15.3 on page 324 ) to configure power set tings for the NSA, including power saving, UPS , power on/o[...]
-
Page 324
Chapter 15 Maintena nce Screens NSA320 User’s Guide 324 15.3 The Power Screen Use this screen to manage power settings for the NS A. Click Maintenance > Power to display the following screen. Figure 177 Maintenance > Po wer The following table describes t he labels in this screen. T able 101 Maintenance > Power LABEL DESCRIPTION P ower M[...]
-
Page 325
Chapter 15 Maintena nce Screens NSA320 User’s Guide 325 Minimum UPS Capacity When you use an APC Uninterruptible Power Supply (UPS) with a USB connection to the NSA, the NSA shuts itself down if the APC UPS’s battery charge gets down to the percen tage you specify in this field. This allows the NSA to shut down properly and avoid data loss caus[...]
-
Page 326
Chapter 15 Maintena nce Screens NSA320 User’s Guide 326 15.3.1 Editing the Power Control Schedule Screen Click Maintenance > Power Management > Edit to open this screen. Use this screen to configure power control schedules to have the NSA turn on, turn off , or reboot at specified times. Figure 178 Maintenance > Power Management > Edi[...]
-
Page 327
Chapter 15 Maintena nce Screens NSA320 User’s Guide 327 T ype Select whether this power contro l schedule has the NSA turn on, turn off , or reboot. Frequency Select whether the NSA is to apply this power control schedule entry on a monthly , weekly , or daily basis. Execute Time (hh:mm) Enter the time, day , and/or day of the month as appropriat[...]
-
Page 328
Chapter 15 Maintena nce Screens NSA320 User’s Guide 328 15.4 The Log Screen Click Maintenance > Log to open the following screen. Use this screen to disp lay all NSA logs. There are at most 512 entries in the log. Older logs are removed by the sys tem. Y ou cannot download the log file via FTP or CIFS. Figure 179 Maintenance > L og The foll[...]
-
Page 329
Chapter 15 Maintena nce Screens NSA320 User’s Guide 329 15.4.1 Report Config Screen In the Log screen, click Report Config to do the following: •U s e t h e Email Setting screen ( Section 15.4.2 on page 329 ) to enable and configure e-mail alerts from the NSA. •U s e t h e Report Setting screen ( Section 15.4.3 on page 330 ) to select the typ[...]
-
Page 330
Chapter 15 Maintena nce Screens NSA320 User’s Guide 330 15.4.3 Report Setting Y ou can select the type of alerts you want to receive through e- mail and schedule when the NSA e-mails the alerts. In the Report Config sc reen, click the Report Setting tab to open the following screen. Figure 181 Maintenance > Log > Repo rt Config: Report Sett[...]
-
Page 331
Chapter 15 Maintena nce Screens NSA320 User’s Guide 331 15.4.4 Syslog Server Setting Y ou can enable the syslog server and sele ct the categories to include in the log report. In the Report Config screen, click the Syslog Server Setting tab to open the following screen. Figure 182 Maintenance > Log > Repo rt Config: Syslog Server Setting Th[...]
-
Page 332
Chapter 15 Maintena nce Screens NSA320 User’s Guide 332 15.5 The Configuration Screen Click Maintenance > Configuration to open the following screen. Use this screen to backup or restore t he NSA configurati on settings. Figure 183 Maintenance > Con figuration The following table describes t he labels in this screen. T able 107 Maintenance [...]
-
Page 333
Chapter 15 Maintena nce Screens NSA320 User’s Guide 333 15.6 SSL Certification Click Maintenance > SSL to open this screen, where you can turn on HT TPS, create a public key certificate, or upload a public key certi ficate that was issued by a known certificate authority . Figure 184 Maintenance > SSL[...]
-
Page 334
Chapter 15 Maintena nce Screens NSA320 User’s Guide 334 The following table describes t he labels in this screen. T able 108 Maintenance > SSL LABEL DESCRIPTION Force HT TPs Select the Force HTTPs option to turn on the NSA’ s web browser security . Anyone who connects via HT TPS to the NSA must install the public key certificate a ssociated [...]
-
Page 335
Chapter 15 Maintena nce Screens NSA320 User’s Guide 335 15.6.1 Modifying or Creating a Certificate When you select the Edit a self-signed CA certificate option, then click the Edit button, a screen opens to allow you to mak e adjustments to the NS A’ s public k ey certificate. The screen is also the same for the Create a certificate authorized [...]
-
Page 336
Chapter 15 Maintena nce Screens NSA320 User’s Guide 336 15.7 The Firmware Upgrade Screen Use this screen to upg rade the NSA firmw are. Y ou should first have downloaded the latest firmware files from the Z yXEL websit e. Do not turn off the NSA while it is upgrading the firmware or you may render it unusable. Click Maintenance > FW U pgrade t[...]
-
Page 337
Chapter 15 Maintena nce Screens NSA320 User’s Guide 337 15.8 The Shut down Screen Use this screen to turn of f the NSA or perform a softw are restart. A softw are restart is faster than turning the NSA o ff and then turning it on again. Before shutting down or restarting, check the System Status > Active Sessions screen t o m a k e s u r e t h[...]
-
Page 338
Chapter 15 Maintena nce Screens NSA320 User’s Guide 338 When you click the Shutdown button a pop-up screen will appear as king you to confirm. Click OK to continue or Cancel to quit the shutdown. Figure 189 Maintenance > Shut down > Confirm Shut down 15.9 T echnical Reference This section provi des technical background information on the to[...]
-
Page 339
Chapter 15 Maintena nce Screens NSA320 User’s Guide 339 15.9.3 Log Messages Here are some example log messages. 2C r i t i c a l 3 Error 4W a r n i n g 5N o t i c e 6I n f o T able 1 13 Log Severity Levels (continued) LEVEL DESCRIPTION T able 1 14 Log Messages CLASS SEVERITY MESSAGE Auto upload INFO %s is queued. Auto upload INFO %s uploaded (Fli[...]
-
Page 340
Chapter 15 Maintena nce Screens NSA320 User’s Guide 340 Copy/Sync Button INFO [USB Sync] Deleting %s from Internal V olume. Copy/Sync Button INFO [USB Sync] Deleting %s from USB. Copy/Sync Button INFO [USB Sync] Deleting %s from USB Recursively . Copy/Sync Button INFO [USB Sync] Finished. Elapsed Time %s Seconds. Copy/Sync Button INFO [USB Sync] [...]
-
Page 341
Chapter 15 Maintena nce Screens NSA320 User’s Guide 341 Download Service INFO Download service set max BT upload r ate to %d KB/s by user Download Service INFO Download service set max download slot to %d Download Service INFO Download service set seeding time to %d minutues Download Service INFO Download service set TC P port to %d and UDP port [...]
-
Page 342
Chapter 15 Maintena nce Screens NSA320 User’s Guide 342 Download Service WARNING Download service default torrent location does not exist. Load default Groups NO TICE Add new group %s. Groups NOTICE Delete group %s. Network NOTICE %s is active because of changing P ort Group. Enable DHCP client. Network N OT ICE % s is inactive because of changin[...]
-
Page 343
Chapter 15 Maintena nce Screens NSA320 User’s Guide 343 Services NOTICE FTP server stops Services NOTICE FTP server starts Services NOTICE MyClock has chan ged daylight saving interv al Services NOTICE MyClock has disabled daylight sa ving interval Services NOTICE NTP server has set to '%s' Services NOTICE NTP server has set to null Ser[...]
-
Page 344
Chapter 15 Maintena nce Screens NSA320 User’s Guide 344 Storage I NFO Create External Normal V olume [%s] (%s): SUCCESS Storage I NFO Create Internal V olume [%s] (%s): SUCCESS Storage INFO Rename External V olume to [%s]: SUCCESS Storage INFO Scan External V olume: SUCCESS Storage I NFO Scan Internal V olume (%s operation): SUCCESS System INFO N[...]
-
Page 345
Chapter 15 Maintena nce Screens NSA320 User’s Guide 345 Backup/ Res t o r e ERROR When query remote target [%s]: %s Backup/ Res t o r e INFO Backup job [%s] successfully Backup/ Res t o r e ERROR When backup [%s]: %s Backup/ Res t o r e ERROR When backup [%s], error happens: %s Backup/ Res t o r e INFO Start to restore backup job [%s]. Backup/ Re[...]
-
Page 346
Chapter 15 Maintena nce Screens NSA320 User’s Guide 346[...]
-
Page 347
NSA320 User’s Guide 347 C HAPTER 16 Protecting Your Data 16.1 Overview This chapter compares the different w ays of protecting data on the NSA and explains how to use backup management software included on the CD . 16.2 Protection Methods There are a variety of wa ys to protect yo ur data on the NSA. Below is a summary table of what can be done i[...]
-
Page 348
Chapter 16 Protec ting Your Data NSA320 User’s Guide 348 16.3 Configuration File Backup and Restoration Use the Maintena nce > Configuration menus to create a file of your NSA configur ations such as passwords, shar es and vo lumes created, network settings and so on. If you’re going t o do some major confi guration changes, then it is advis[...]
-
Page 349
Chapter 16 Protecting Your Data NSA320 User’s Guide 349 1 Since a computer restart is required, clos e your other files and programs before installing the Memeo Autobackup softw are. 2 Insert the included CD in to your CD-ROM drive. Click the Tools icon in the screen that displays. Then click Memeo Instant Backup Software . Note: If this screen d[...]
-
Page 350
Chapter 16 Protec ting Your Data NSA320 User’s Guide 350 6 In this screen, select the item s that you want to back up. Figure 192 Backu p Items 7 This screen lists the items you selected for backup . Confirm your selections and click Next . Figure 193 Confirm Backup Items[...]
-
Page 351
Chapter 16 Protecting Your Data NSA320 User’s Guide 351 8 Specify a name f or your backup plan ( or just use the defaul t). Click Next and then Done . Figure 194 Backu p Plan Name 16.4.2 Using Memeo Autobackup Af ter the Initial Setup After you hav e installed and configured Memeo Autobackup, double-click the icon in the system tr ay to open the [...]
-
Page 352
Chapter 16 Protec ting Your Data NSA320 User’s Guide 352[...]
-
Page 353
NSA320 User’s Guide 353 C HAPTER 17 Troubleshooting 17.1 T roubleshooting Overview This chapter offers some suggesti ons to solve problems you mi ght encounter . The potential problems are divided into the following categories. • P ower , Hardware, Connections, and LE Ds • NAS Starter Utility • NSA Login and Access • I Cannot Access The N[...]
-
Page 354
Chapter 17 Trou bleshooting NSA320 User’s Guide 354 • Make sure y ou are using the power adap tor or cord included with the NSA. • Make sure the power adaptor or cord is connected to the NSA and plugged in t o an appropriate power source. Make su re the power source is turned on. • T urn the NSA off and on. • If the problem co ntinue s, c[...]
-
Page 355
Chapter 17 Trou bleshooting NSA320 User’s Guide 355 • If you are using a single-disk JBOD volume, y ou need to create a new volume on the new drive. • If you are using a two-disk JBOD volu me, you need to create a whole new volume on both drives. The LAN LED (by the LAN port) is of f. • Make sure the Eth ernet cabl e is conne cted properly [...]
-
Page 356
Chapter 17 Trou bleshooting NSA320 User’s Guide 356 17.3 NAS S t arter Utility The NAS S tarter Utility cannot discover my NSA. • Close the NAS Starter Utilit y and reopen it. • Check y our hardware connec tions and make sure they are set up correctly . • Only one instance of the NAS Starter Utility can run on your computer . Make sure you [...]
-
Page 357
Chapter 17 Trou bleshooting NSA320 User’s Guide 357 I have at least two NSAs in my network, how do I i dentify which one I want to configure in the NAS S t arter Utility screens. If you have s everal NS As co nne cte d to yo ur co mpu ter /ne two rk, g ive ea ch a unique name. Y ou may hav e to disconnect all but one and use the NAS Starter Utili[...]
-
Page 358
Chapter 17 Trou bleshooting NSA320 User’s Guide 358 • The default server name is nsa320 , if you have c han ged the serve r nam e, use the new one. • If the server name has been changed and you do not know the new server name, see the troubleshooting suggestions for I forgot the server name of the NSA. • If it still doesn’t work, try usin[...]
-
Page 359
Chapter 17 Trou bleshooting NSA320 User’s Guide 359 17.4.1 Enabling Scripting of Safe ActiveX Controls If pages of the web configur ator do not display properl y in Internet Explorer , check that scripting of safe Acti veX controls is enabl ed. 1 In Internet Explorer , click Tools , Internet Options and then the Security tab. Figure 196 Internet [...]
-
Page 360
Chapter 17 Trou bleshooting NSA320 User’s Guide 360 4 Click OK to close the window . Figure 197 Security Settings - Script Safe ActiveX Controls I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly . The default username is admin , and the default password is 1234 . These f[...]
-
Page 361
Chapter 17 Trou bleshooting NSA320 User’s Guide 361 17.5 I Cannot Access The NSA I cannot access a share. • Check that the NS A is turn ed on and connected to the network. T ry to ping the NSA or use the NAS Starter Utilit y to discover it . • Make sure you hav e used the NAS Starte r Utility to initialize y our NSA. See Chapter 2 on page 29 [...]
-
Page 362
Chapter 17 Trou bleshooting NSA320 User’s Guide 362 • Check the Acce ss Control Lis t (ACL) of read/write permissions associated with specific files and/or fold ers. Account na mes added to the li st are linked to the files and folders that they are allowed to access, al ong with what kinds of actions they are allowed to perform with those file[...]
-
Page 363
Chapter 17 Trou bleshooting NSA320 User’s Guide 363 In addition to the checks list ed previous ly f or local users, check that the domain controller is turned on and connected to the network. A user can access a share but cannot access individual fo lders or files within the share. • Check the Access Control List (ACL) of read/write permissions[...]
-
Page 364
Chapter 17 Trou bleshooting NSA320 User’s Guide 364 17.9 File T ransfer I want to transfer my file(s ) from my local computer or storage device to the NSA. • After you initialize y our hard disk, yo u can directly access the fo lders in your NSA and transfer f iles in the same way y ou transfer f iles in your local computer: 1 On your Windows c[...]
-
Page 365
Chapter 17 Trou bleshooting NSA320 User’s Guide 365 17.10 Networking I want to control who can ac cess my folder(s)/file(s). • If you are an administr ator , you can configure a user’s access rights. Use the Shares screen ( Section 14.3 on page 312 ) to do this. •I f y o u e n a b l e d Web Publishing for a fol der , anyone on your network [...]
-
Page 366
Chapter 17 Trou bleshooting NSA320 User’s Guide 366 • The firmware installed in y our NSA inc ludes the features mentioned in Section 3.5.2 on page 67 . This does not include the applications you can install using the Package Management screen. • Y ou can use the Packa ge Manageme nt screen ( Chapter 10 on page 231 ) to install more applicati[...]
-
Page 367
Chapter 17 Trou bleshooting NSA320 User’s Guide 367 2 Go to Applications > Media Server . Make sure the share containing the music files is published and the iT unes server option is enabled. 3 If an iT unes client is connected, the NSA’ s iT unes server function scans the published media server folders for files every three minutes. Leave i[...]
-
Page 368
Chapter 17 Trou bleshooting NSA320 User’s Guide 368 I cannot use iT unes to play files located on my NSA. 1 Make sure the files are a format supported by iT unes. See Section 18.5 on page 381 . 2 If you hav e files from the iT unes Store th at use DRM, you need to use your Apple account ID and password to authori ze other computers to play the fi[...]
-
Page 369
Chapter 17 Trou bleshooting NSA320 User’s Guide 369 I cannot find the download files. By default, the Download Service and Broadcatching features store downloaded files as follows: • BitT orrent jobs are stored in /*/incoming (whe re ‘*’ is a folder that you have set.) • HT TP/FTP jobs are stored in /* (where ‘*’ i s a folder that you[...]
-
Page 370
Chapter 17 Trou bleshooting NSA320 User’s Guide 370 • If Firefo x access to the share does not work, check that you did not set the W eb publishing feature to use one of the foll owing ports. (Firefox blocks these ports by default .) • Make sure your ISP allows you to run a server and is not blocking the port number of the NSA’ s web publis[...]
-
Page 371
Chapter 17 Trou bleshooting NSA320 User’s Guide 371 2a If the log message displays “no such file or directory” , the file may hav e been removed from the NSA. Make sure the fi l e still exists in the watch folder . 2b If the log message displays “filename is queued” , the file ma y still be waiting for auto upload. Check the gr ace period[...]
-
Page 372
Chapter 17 Trou bleshooting NSA320 User’s Guide 372 Y ou need to be connected to an eMule serv er before you can use t he Search screen. W ait for the NSA to connect to a server before configuring the Search screen. I want to know how my hard disk is performing. Use S.M.A.R.T . (Self Monitoring, Analysi s, and Reporting T echnology) to monitor ha[...]
-
Page 373
NSA320 User’s Guide 373 C HAPTER 18 Product Specifications See also Chapter 1 on page 23 for a general ov erview of the key features. 18.1 Physical Features These are the main external physical features. T able 1 17 Physical Features USB Ports 3 USB (version 2) ports. Copy or sync files directly from the NS A to compatible USB devices like card r[...]
-
Page 374
Chapter 18 Product Specifications NSA320 User’s Guide 374 P ower Button Press the Power button for one second to turn it on. T urn off the NSA before unplugging it. Press the Power button for 3 seconds until you hear one beep, then release it. The NSA goes starts to shutdown its softw are and turns off . Press the Power button for 5 seconds until[...]
-
Page 375
Chapter 18 Product Specifications NSA320 User’s Guide 375 18.2 Firmware Features These are some of the main firmware features of the NSA. T able 1 18 Firmware Features DLNA Server The NSA is a DLNA-complia n t media server that lets DLNA - compliant media clients play video, audio, and photo content files stored on the NSA. RAID File Storage Use [...]
-
Page 376
Chapter 18 Product Specifications NSA320 User’s Guide 376 18.3 S pecification T ables The NSA hardware s pecifications are shown in the following table. Auto Upload The auto upload feature uploads media files stored in the NSA to the Flickr and/or Y ouT ube sharing websites. It is a convenient w ay to share media files with you r friends and fami[...]
-
Page 377
Chapter 18 Product Specifications NSA320 User’s Guide 377 The NSA firmware specifications are shown in the following table Default P assword 1234 Dimensions 108 (W) x 205 (D) x147 (H) mm (4.3 (W) x 5.8 (D) x 8.1 (H) inch) We i g h t 1.02 kg (2.25 lb.) without hard drives Drive Bays Tw o Compatible Hard Disks SA T A I and SA T A II 3.0 Gbit/s (Ser[...]
-
Page 378
Chapter 18 Product Specifications NSA320 User’s Guide 378 The following list, which is not exha ustive, ill ustrat es the standards and recommendations supported in the NSA. Network File Sharing Protocol CIFS/SMB for Windows HT TP for web browser FTP , FTPES (TLS explicit mode) Network Security Authentication Share level Supported Operating Syst [...]
-
Page 379
Chapter 18 Product Specifications NSA320 User’s Guide 379 ECMA-262 Edition 2 The ECMAScript standard’ s second revision; also ISO standard 16262. ECMA-262 Edition 3 The ECMAScript standard’ s third revision; corresponds to JavaScript 1.5. ECMA -357 ECMAScript for XML (E4X ). See also the E4X errata. HTML 3.2 Reference Specification The HyperT[...]
-
Page 380
Chapter 18 Product Specifications NSA320 User’s Guide 380 18.4 Supported Media Server Content Format s The following describes the d etails about the files that the NS A media server can publish. RFC 4248 The telnet URI Scheme RFC 793 (STD-7) - T ransmission Control Protocol RFC 959 (STD-9) - File T ransfer Protocol SA T A SA T A I and SA T A II [...]
-
Page 381
Chapter 18 Product Specifications NSA320 User’s Guide 381 Note: Not all published file types can be viewed b y all client applications. 18.5 Supported iT unes Server Content Format s At the time of writing, the NSA supports iT unes publishing audio files of the following formats: mp3, m4a, m4p , wa v , and mp4. 18.6 Power Consumption The NSA’ s[...]
-
Page 382
Chapter 18 Product Specifications NSA320 User’s Guide 382 Note: These are results from a lab oratory test and are for your reference only . T able 123 Power Consumption in Watts (W) POWER MODE POWER CONSUMPTION Access Mode 32.2 W atts Hard Disk Hibernation Mode 10 Watts[...]
-
Page 383
NSA320 User’s Guide 383 A PPENDIX A Setting Up Y our Computer ’ s IP Address Note: Y our specific NSA may not support all of the operating systems described in this appendix. See the product specifications for mor e information about which operating systems are supported. This appendix shows you how to conf igure the IP setti ngs on your c ompu[...]
-
Page 384
Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 384 Windows XP/NT/2000 The following example us es the default Windows XP displa y theme but can al so apply to Wind ows 2000 and Windows NT . 1 Click Start > Control Panel . 2 In the Control Panel , click the Network Connections icon.[...]
-
Page 385
Appendix A Setting Up Your Compu ter’s IP Address NSA320 User’s Guide 385 3 Right- click Local Area Connection and then select Properties . 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties .[...]
-
Page 386
Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 386 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network admi nistrator or ISP assigns your IP addres s dynamically . Select Use the following IP Address and fill in the IP address , Subnet mask , and Default gat[...]
-
Page 387
Appendix A Setting Up Your Compu ter’s IP Address NSA320 User’s Guide 387 Windows V ist a This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel . 2 In the Control Panel , click the Network and Internet icon. 3 Click the Network and Sharing Center icon.[...]
-
Page 388
Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 388 4 Click Manage network conne ctions . 5 Right- click Local Area Connection and then select Properties . Note: During this procedure, click Continue whenever Windo ws displays a screen saying that it needs your pe rmission to continue.[...]
-
Page 389
Appendix A Setting Up Your Compu ter’s IP Address NSA320 User’s Guide 389 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties .[...]
-
Page 390
Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 390 7 The Internet Protocol Versio n 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network admi nistrator or ISP assigns your IP addres s dynamically . Select Use the following IP Address and fill in the IP address , Subnet mask , [...]
-
Page 391
Appendix A Setting Up Your Compu ter’s IP Address NSA320 User’s Guide 391 V erifying Settings 1 Click Start > Al l Programs > Accessories > Command Prompt . 2 In the Command Prompt window , type "ipconfi g" and then press [ENTER]. Y ou can also go to Start > Control Pa nel > Network Connections , right-click a network c[...]
-
Page 392
Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 392 3 Click Change adapter settings . 4 Double c lick Local Area Connection and then select Properties . Note: During this procedure, click Continue whenever Windo ws displays a screen saying that it needs your pe rmission to continue.[...]
-
Page 393
Appendix A Setting Up Your Compu ter’s IP Address NSA320 User’s Guide 393 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties .[...]
-
Page 394
Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 394 6 The Internet Protocol Versio n 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network admi nistrator or ISP assigns your IP addres s dynamically . Select Use the following IP Address and fill in the IP address , Subnet mask , [...]
-
Page 395
Appendix A Setting Up Your Compu ter’s IP Address NSA320 User’s Guide 395 V erifying Settings 1 Click Start > Al l Programs > Accessories > Command Prompt . 2 In the Command Prompt window , type "ipconfi g" and then press [ENTER]. 3 The IP settings are display ed as follows.[...]
-
Page 396
Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 396[...]
-
Page 397
NSA320 User’s Guide 397 A PPENDIX B Pop-up Windows, JavaScript s and Java Permissions In order to use the web configurator you need to allow: • W eb browser pop-up wind ows from your device. • Jav aScripts (enabled by defa ult). • Jav a permissions (enabled by default). Note: Internet Explorer 6 screens are used here . Screens for other Int[...]
-
Page 398
Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 398 1 In Internet Explorer , select Tools , Internet Options , Privacy . 2 Clear the Block pop-ups check box in the Pop-up Blocker sect ion of the screen. This disables an y web pop-up block ers you may have enabled. Figure 201 Internet Options: Privacy 3 Click App[...]
-
Page 399
Appendix B Pop-u p Windows, JavaScripts and Java Permissions NSA320 User’s Guide 399 2 Select Settings… to open the Pop-up Blocker Settings screen. Figure 202 Internet Options: Privacy 3 T ype the IP address of y our device (the web page that you do not want to have blocked) wi th the prefix “http://” . F or example, http://192.168. 167.1.[...]
-
Page 400
Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 400 4 Click Add to mo ve the IP address to the list of Allowed sites . Figure 203 Pop-up Blo cker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript s If pages of the web configur ator do not display properl y in [...]
-
Page 401
Appendix B Pop-u p Windows, JavaScripts and Java Permissions NSA320 User’s Guide 401 1 In Internet Explorer , click Tools , Internet Options and then the Security tab. Figure 204 Internet Options: Secu rity 2 Click the Custom Level... button . 3 Scroll down to Scriptin g . 4 Under Active scripting make sure that Enable is selected (the default). [...]
-
Page 402
Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 402 6 Click OK to close the window . Figure 205 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer , click Tools , Internet Options and then the Security tab. 2 Click the Custom Level... button . 3 Scroll down to Microsoft VM . 4 Under Jav[...]
-
Page 403
Appendix B Pop-u p Windows, JavaScripts and Java Permissions NSA320 User’s Guide 403 5 Click OK to close the window . Figure 206 Security Settings - Java JA V A (Sun) 1 From Internet Explorer , click Tools , Internet Options and then the Advanc ed tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is selected.[...]
-
Page 404
Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 404 3 Click OK to close the window . Figure 207 Java (Sun) Mozilla Firefox Mozilla Firefo x 2.0 screens are used here . Screens for other versions ma y vary . Y ou can enable Java, Javascript s and pop-ups in one screen. Click Tools, then click Options in the scree[...]
-
Page 405
Appendix B Pop-u p Windows, JavaScripts and Java Permissions NSA320 User’s Guide 405 Click Content .to show the screen below. Select the chec k boxes as shown in the following screen. Figure 209 Mozilla Firefox Content Security[...]
-
Page 406
Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 406[...]
-
Page 407
NSA320 User’s Guide 407 A PPENDIX C Common Services The following table lists some commonl y-used services and their associated protocols and port numbers. F or a comprehe ns ive list of port numbers, ICMP type/ code numbers and services , visit the IANA (Internet Assigned Number Authority) web site. • Name : This is a short, descriptive name f[...]
-
Page 408
Appendix C Common Services NSA320 User’s Guide 408 ESP (IPSEC_TUNNEL) User -Defined 50 The IPS EC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP TCP 20 21 File T ransfer Program, a progr am to enable[...]
-
Page 409
Appendix C Common Services NSA320 User’s Guide 409 PPTP TCP 1723 Point -to-Point T unneling Protocol enables secure transfer of data ov er public networks. This is the control channel. PPTP_TUNNEL (GRE) User -Defined 47 PPT P (Point -to-P oint T unneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCM[...]
-
Page 410
Appendix C Common Services NSA320 User’s Guide 410 TFTP UDP 69 T rivial File T ransfer Protocol is an Internet file transfer protocol similar to FTP , but uses th e UDP (User Datagram Protocol) r ather than TCP (T ransmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution. T able 124 Commonly Used Services (continued) NAME[...]
-
Page 411
NSA320 User’s Guide 41 1 A PPENDIX D Importing Certificates This appendix shows you how to import public key certificates into your web browser . Public key certificates are used by web br owsers to ensure that a secure web site is legitimate. When a certificate authorit y such as V eriSign, Comodo , or Network Solutions, to name a few , receives[...]
-
Page 412
Appendix D Importing Certificates NSA320 User’s Guide 412 Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however , they can also appl y to Internet Explorer on Wi ndows Vista. 1 If your device’ s W eb Conf igurator is set to use S SL certification, then the first time you browse to i t you[...]
-
Page 413
Appendix D Importi ng Certificates NSA320 User’s Guide 413 3 In the Address Bar , click Certificate Error > View certificates . Figure 212 Internet Explorer 7: Cert ificate Error 4 In the Certificate dialog bo x, click Install Certificate . Figure 213 Internet Explorer 7: Cert ificate[...]
-
Page 414
Appendix D Importing Certificates NSA320 User’s Guide 414 5 In the Certificate Import Wizard , click Next . Figure 214 Internet Explorer 7: Cert ificate Import Wizard 6 If you w ant Internet E xplorer to Automatically select certificate store based on the type of certificate , click Next again and then go to step 9. Figure 215 Internet Explorer 7[...]
-
Page 415
Appendix D Importi ng Certificates NSA320 User’s Guide 415 7 Otherwise, select Place all certifica tes in the following store and then click Browse . Figure 216 Internet Explorer 7: Cert ificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to sa ve the certificate and then clic k OK . Figure 217 Internet [...]
-
Page 416
Appendix D Importing Certificates NSA320 User’s Guide 416 9 In the Completing the Certificate Import Wizard screen, click Finish . Figure 218 Internet Explorer 7: Cert ificate Import Wizard 10 If you are presented with another Security Warning , c lick Yes . Figure 219 Internet Explorer 7: Security W arning[...]
-
Page 417
Appendix D Importi ng Certificates NSA320 User’s Guide 417 11 Finally , click OK when presented with the successful certificate installation message. Figure 220 Internet Explorer 7: Cert ificate Import Wizard 12 The next time you start Internet Explor er and go to a Z yXEL W eb Configurator page, a sealed padlock icon appears in the address bar .[...]
-
Page 418
Appendix D Importing Certificates NSA320 User’s Guide 418 Inst alling a St and-Alone Certific ate File in Internet Explorer Rather t han browsing to a Z yXEL W eb Co nfigurator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you. 1 Double-click the public key cert [...]
-
Page 419
Appendix D Importi ng Certificates NSA320 User’s Guide 419 Removing a Certificate in Internet Explorer This section shows you how to remove a publi c key certificate in Internet Explorer 7. 1 Open Internet Explorer and click Tools > Internet Options . Figure 224 Internet Explorer 7: T ools Menu 2 In the Internet Options dialog box, cl ick Cont[...]
-
Page 420
Appendix D Importing Certificates NSA320 User’s Guide 420 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificat e that yo u w ant to delete, and then click Remove . Figure 226 Internet Explorer 7: Cert ificates 4 In the Certificates confirmation, click Yes . Figure 227 Internet Explorer 7: Ce[...]
-
Page 421
Appendix D Importi ng Certificates NSA320 User’s Guide 421 6 The next time you go to the web site that issued the public k ey certificate you just removed, a certification error appears.[...]
-
Page 422
Appendix D Importing Certificates NSA320 User’s Guide 422 Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however , the screens can also apply to Firefox 2 on all platforms. 1 If your device’ s W eb Conf igurator is set to use S SL certification, then the first time you browse to i t you are presented with a cer[...]
-
Page 423
Appendix D Importi ng Certificates NSA320 User’s Guide 423 3 The certificate is stored and you ca n now connect securely to the W eb Configurator . A sealed padlock appears in the address bar , which y ou can click to open the Page Info > Security windo w to view the web page’ s security informat ion. Figure 230 Firefox 2: Page Info[...]
-
Page 424
Appendix D Importing Certificates NSA320 User’s Guide 424 Inst alling a St and-Alone Ce rtificate File in Firefox Rather t han browsing to a Z yXEL W eb Co nfigurator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you. 1 Open Firefox and click Tools > Options .[...]
-
Page 425
Appendix D Importi ng Certificates NSA320 User’s Guide 425 3 In the Certificate Manager dialog box, cl ick Web S ites > Import . Figure 233 Firefox 2: Cert ificate Manager 4 Use the Select File dialog bo x to locate the certificate and then click Op en . Figure 234 Firefox 2: Select File 5 The next time you visit the web site, click the padloc[...]
-
Page 426
Appendix D Importing Certificates NSA320 User’s Guide 426 Removing a Certificate in Firefox This section shows y ou how to remove a public key certificate in Fi refox 2. 1 Open Firefox and click Tools > Options . Figure 235 Firefox 2: T ools Menu 2 In the Options dialog bo x, click Advanced > Encryption > View Certificat es . Figure 236 [...]
-
Page 427
Appendix D Importi ng Certificates NSA320 User’s Guide 427 3 In the Certificate Manager dialog box, select the Web Sites tab , select the certificate that you w ant to remove, and then click Delete . Figure 237 Firefox 2: Cert ificate Manager 4 In the Delete Web Site Certificates dialog bo x, click OK . Figure 238 Firefox 2: Delete W eb Site Cert[...]
-
Page 428
Appendix D Importing Certificates NSA320 User’s Guide 428 Opera The following example uses Opera 9 on Wi ndows XP Professional; however , the screens can apply to Opera 9 on all pl atforms. 1 If your device’ s W eb Conf igurator is set to use S SL certification, then the first time you browse to i t you are presented with a certificati on error[...]
-
Page 429
Appendix D Importi ng Certificates NSA320 User’s Guide 429 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’ s securit y details. Figure 240 Opera 9: Security information[...]
-
Page 430
Appendix D Importing Certificates NSA320 User’s Guide 430 Inst alling a St and-Alone Ce rtificate File in Opera Rather t han browsing to a Z yXEL W eb Co nfigurator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you. 1 Open Opera and click Tools > Preferences .[...]
-
Page 431
Appendix D Importi ng Certificates NSA320 User’s Guide 431 2 In Preferences , click Advanced > Security > Manage certificates . Figure 242 Opera 9: Prefer ences[...]
-
Page 432
Appendix D Importing Certificates NSA320 User’s Guide 432 3 In the Certificates Manager , click Authorities > Import . Figure 243 Opera 9: Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open. Figure 244 Opera 9: Import certif icate[...]
-
Page 433
Appendix D Importi ng Certificates NSA320 User’s Guide 433 5 In the Install authority certificate dialog box, c lick Ins tall . Figure 245 Opera 9: Inst all authority certificate 6 Next, click OK . Figure 246 Opera 9: Inst all authority certificate 7 The next time you visit the web site, click the padlock in the address bar to open the Security i[...]
-
Page 434
Appendix D Importing Certificates NSA320 User’s Guide 434 Removing a Certificate in Opera This section shows y ou how to remove a public k ey certificate in Oper a 9. 1 Open Opera and click Tools > Preferences . Figure 247 Opera 9: T ools Menu 2 In Preferences , Advanced > Security > Manage certificates . Figure 248 Opera 9: Prefer ences[...]
-
Page 435
Appendix D Importi ng Certificates NSA320 User’s Guide 435 3 In the Certificates manager , sele ct the Authorities tab, sele ct the cert ificate that you wan t to rem ove, a nd th en cl ick Delete . Figure 249 Opera 9: Certificate manager 4 The next time you go to the web site that issued the public k ey certificate you just removed, a certificat[...]
-
Page 436
Appendix D Importing Certificates NSA320 User’s Guide 436 Konqueror The following example uses K onqueror 3.5 on openSUSE 10.3, however the screens apply to K onqueror 3.5 on all Linux KDE distributions. 1 If your device’ s W eb Conf igurator is set to use S SL certification, then the first time you browse to i t you are presented with a certif[...]
-
Page 437
Appendix D Importi ng Certificates NSA320 User’s Guide 437 4 Click the padlock in the addr ess bar to open the KDE SSL Information window and view the web page’ s security details. Figure 252 Konqueror 3.5: KDE SSL Information[...]
-
Page 438
Appendix D Importing Certificates NSA320 User’s Guide 438 Inst alling a St and-Alone Ce rtificate File in Konqueror Rather t han browsing to a Z yXEL W eb Co nfigurator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you. 1 Double-click the public key cert ificate [...]
-
Page 439
Appendix D Importi ng Certificates NSA320 User’s Guide 439 3 The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Inf ormation window to view the web page’ s security details.[...]
-
Page 440
Appendix D Importing Certificates NSA320 User’s Guide 440 Removing a Certificate in Konqueror This section shows y ou how to remove a public k ey certificate in K onqueror 3.5. 1 Open Konqueror and click Settings > Configure Konque ror . Figure 256 Konquero r 3.5: Settings Menu 2 In the Configure dial og box, select Crypto . 3 On the Peer SSL [...]
-
Page 441
Appendix D Importi ng Certificates NSA320 User’s Guide 441 Note: There is no confirmation wh en you remove a certificate authority , so be absolutely certain you want to go through with it before clicking the button.[...]
-
Page 442
Appendix D Importing Certificates NSA320 User’s Guide 442[...]
-
Page 443
NSA320 User’s Guide 443 A PPENDIX E Open Source Licences End-User License Agreement for “NSA320” W ARNING: ZyXEL Communicatio ns Corp. IS WILLING TO LICENSE THE SOFTW ARE TO YOU ONL Y UPON THE CONDITION THA T YOU ACCEPT ALL OF TH E T ERMS CONT AINE D IN THIS LICENSE AGREEMENT . PLEASE READ THE TERMS CAREFULL Y BEFORE COMPLETING THE IN ST ALLA[...]
-
Page 444
Appendix E Open So urce Licences NSA320 User’s Guide 444 Y ou have no owne rship rights in the Software. Rather , you have a license to use the Software as long as this License Agreement remai ns in full force and effect. Ownership of the Software, Documentatio n and all intellect ual property rights therein shall remain at all t imes with Z yXEL[...]
-
Page 445
Appendix E Open So urce Licences NSA320 User’s Guide 445 5.Confidentiality Y ou acknowledge that the Software contai ns propriet ary trade secr ets of Z yXEL and you hereby agree to maintain the confidenti ality of the Software using at l east as great a degree of care as you use to maintai n the confidentiality of your own most confidential info[...]
-
Page 446
Appendix E Open So urce Licences NSA320 User’s Guide 446 THIS LICENSE AGRE EMENT IS EXPRES SL Y MADE SUBJECT TO ANY APPLICABLE LAWS, REGULA TIONS, ORDERS, OR O THE R RESTRICTIONS ON THE EXPOR T OF THE SOFTWARE OR INFORMA TION ABOU T SUCH SOF TWARE WHICH MA Y BE IMPOSED FROM TIME T O TIME. YO U SHALL NOT EXPOR T THE SOFTWARE, DOCUMENT A TION OR IN[...]
-
Page 447
Appendix E Open So urce Licences NSA320 User’s Guide 447 NOTE: Some components of this product incorpor ate source code cov ered under the open source code licenses. Further , fo r at least three (3) y ears from the date of distribution of the appl icable product or softw are, we will give to an yone who contacts us at the Zy XEL T echnical Su pp[...]
-
Page 448
Appendix E Open So urce Licences NSA320 User’s Guide 448 Public License is the better strategy to use in any particular case, based on the explanations below . When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure tha t you have t he f ree dom to distribute copies of f[...]
-
Page 449
Appendix E Open So urce Licences NSA320 User’s Guide 449 derivati ve of the original li brary . The ordinary Gener al Public License therefore permits such linking only if the entire co mbination fits its criteria of freedom. The Lesser Gener al Public License permits more lax cri teria for linking other code with the library . W e call this lice[...]
-
Page 450
Appendix E Open So urce Licences NSA320 User’s Guide 450 software library or work which has been distri buted under these terms. A "work based on the Library" means either the Libr ary or any deriv ative work under copyright law: that is to say , a work containing the Libr ary or a portion of it, either verbatim or with modi fications a[...]
-
Page 451
Appendix E Open So urce Licences NSA320 User’s Guide 451 part of a whole which is a work based on the Li brary , the distribution of the whol e must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every p art regardless of who wrote it. Thu s, it is not the intent of this se [...]
-
Page 452
Appendix E Open So urce Licences NSA320 User’s Guide 452 significant if the work can be link ed without the Library , or if the work is itself a library . The threshold for this to be true is not preci sely defined by law . If such an object file uses only numerical para meters, data structure lay outs and accessors, and small macros and small in[...]
-
Page 453
Appendix E Open So urce Licences NSA320 User’s Guide 453 include anything that is normally distribute d (in either source or binary form) with the major components (compiler , ke rnel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this re quirement cont[...]
-
Page 454
Appendix E Open So urce Licences NSA320 User’s Guide 454 License. If you cannot distribute so as to satisfy si multaneously yo ur obligations under this License and any other pertinent obligations, then as a consequence y ou may not distribut e the Library at all. F or example, if a patent license would not permit roy alty -free redistribution of[...]
-
Page 455
Appendix E Open So urce Licences NSA320 User’s Guide 455 NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBR ARY , TO THE EXTENT P ERMITTED BY APPLICABLE LAW . EXCEPT WHEN OTHERWISE ST A T ED IN WRITING THE COP YRIGHT HOLDERS AND/ OR O THER PAR TIES PROVIDE THE LIBRAR Y "AS IS" WITHOUT WARRA[...]
-
Page 456
Appendix E Open So urce Licences NSA320 User’s Guide 456 Preamble The licenses for most sof tware are design ed to take away your freedom to share and change it. By contrast, the GNU Ge neral Publi c License is intended to guarantee y our freedom to share and chan ge free software--to mak e sure the software is free for all its users. This Ge ner[...]
-
Page 457
Appendix E Open So urce Licences NSA320 User’s Guide 457 work, and a "work based on the Progr a m" means either the Progr am or any derivati ve work under copyright law: that is to sa y , a work containing the Program or a portion of it, either verbatim or wi th modifications and/or translated into another language. (Hereinafter , trans[...]
-
Page 458
Appendix E Open So urce Licences NSA320 User’s Guide 458 each and eve ry part regard less of who wrote it . Thus, it is not the inte nt of this section to claim rights or contest yo ur ri ghts to work written entirely by you; rather , the intent is to exerci se the right to control the di stribution of deriv ative or collective works based on the[...]
-
Page 459
Appendix E Open So urce Licences NSA320 User’s Guide 459 5. Y ou are not required to accept this License, since you hav e not signed it. However , nothing else gr ants you permission to modify or distri bute the Program or its deriva tive works. These actions are prohibited by law if y ou do not accept this License. Therefore, by modifying or dis[...]
-
Page 460
Appendix E Open So urce Licences NSA320 User’s Guide 460 spirit to the present version, but may diffe r i n detail to address new problems or concerns. Each version is giv en a distin guishing version number . If the Program specifies a v ersion number of this License which appli es to it and "an y later versi on", you have the op tion [...]
-
Page 461
Appendix E Open So urce Licences NSA320 User’s Guide 461 This Product includes mediainf o software under below license MediaInfo(Lib) License V ersion 1.1, 3 January 2010 Copyright 2002-2010 MediaArea.net SARL. All rights reserved. Re distribution and use in source and binary forms, without modification, are permitted provided that the following [...]
-
Page 462
Appendix E Open So urce Licences NSA320 User’s Guide 462 This version of the GNU Lesser General Pu blic License incorpor ates the terms and conditions of version 3 of the GNU Gene r al Public License, supplemented by the additional permi ssions listed below . 0. Additional Defi nitions. As used herein, “this License” refers to version 3 of th[...]
-
Page 463
Appendix E Open So urce Licences NSA320 User’s Guide 463 •b) under the GNU GPL, with none of the additional permissions of this License applicable to that cop y . 3. Object Code Incorpor ating Material from Libr ary Header Files. The object code form of an Ap plication ma y incorpor ate material from a header file that is part of the Libr ary .[...]
-
Page 464
Appendix E Open So urce Licences NSA320 User’s Guide 464 •e) Provide Installati on Information, but only if you would otherwise be required to provide such information under section 6 of the GNU GPL, and only to the extent that such informatio n is necessary to install and execute a modified version of the Combined W ork produced by recombining[...]
-
Page 465
Appendix E Open So urce Licences NSA320 User’s Guide 465 GNU GENERAL PUBLIC LICENSE V ersion 3, 29 June 2007 Copyright (C) 2007 Free Software F o undation, Inc. <http://fsf .org/> Everyone is permi tted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU Genera l Public License i[...]
-
Page 466
Appendix E Open So urce Licences NSA320 User’s Guide 466 Some devices are designed to deny users a ccess to instal l or run modified versions of the software inside them, althoug h the manufacturer can do so. This is fundamentally incompatible with the ai m of protecting users' freedom to change the software. The systematic pattern of such a[...]
-
Page 467
Appendix E Open So urce Licences NSA320 User’s Guide 467 An inter active user interface dis plays “ A ppropriate Legal Noti ces” to the extent that it includes a convenient and prominen tly visible feature that (1) displ ays an appropriate copyright notice, and (2) tells the user that there is no w arranty for the work (except to the extent t[...]
-
Page 468
Appendix E Open So urce Licences NSA320 User’s Guide 468 All rights gr anted under this License are gr anted for the term of cop yright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimit ed permi ssion to run the unmodified Program. The output from running a cov ered work is co[...]
-
Page 469
Appendix E Open So urce Licences NSA320 User’s Guide 469 Y ou may convey a work based on the Progra m, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: •a) The work must carry prominent notices stating that you modified it, and gi v[...]
-
Page 470
Appendix E Open So urce Licences NSA320 User’s Guide 470 software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. •c) Conv ey individual copies of the object code with a copy of t he written offer to p[...]
-
Page 471
Appendix E Open So urce Licences NSA320 User’s Guide 471 If you conv ey an object code work under this section in, or wit h, or specifically for use in, a User Product, and the conv eying occurs as part of a transacti on in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a f ixed term[...]
-
Page 472
Appendix E Open So urce Licences NSA320 User’s Guide 472 •b) R equiring preserv ation of specifi e d reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices display ed by works containing it; or •c) Prohibit ing misrepres entat ion of the origin of that material, or requiring that m o d i f i e d v[...]
-
Page 473
Appendix E Open So urce Licences NSA320 User’s Guide 473 Moreover , your license from a particul ar copyright holder is reinstat ed permanently i f the copyrigh t holder noti fies you of the viol ation by some reasonable means, this is the first time you have receiv ed notice of violat ion of this License (for an y work) from that copyright holde[...]
-
Page 474
Appendix E Open So urce Licences NSA320 User’s Guide 474 A “contributor” is a copyrigh t holder who authoriz es use under th is License of th e P r o g r a m o r a w o r k o n w h i c h t h e P r o g r a m i s b a s e d . T h e w o r k t h u s l i c e n s e d i s c a l l e d the contribu tor's “contr ibutor version” . A contributor&a[...]
-
Page 475
Appendix E Open So urce Licences NSA320 User’s Guide 475 third party based on the extent of y our activit y of conveyi ng the work, and under which the third party gr ants, to an y of the parties who would receive the co vered work from you, a discriminatory patent l icense (a) in connection with copi es of the covered work c onveyed by you (or c[...]
-
Page 476
Appendix E Open So urce Licences NSA320 User’s Guide 476 If the Program specif ies that a proxy can decide which future versions of the GNU General P ublic License can be used, that proxy's public statement of acceptance of a version permanently authorizes y ou to choose that version for t he Program. Later license versions may give you addi[...]
-
Page 477
Appendix E Open So urce Licences NSA320 User’s Guide 477 Copyright © 2007 Free Software Fo un dation, Inc. <http://fsf .org/> Everyone is permi tted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU Genera l Public License is a free, copyleft license for soft ware and other ki[...]
-
Page 478
Appendix E Open So urce Licences NSA320 User’s Guide 478 for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this v ersion of the GPL to prohibit the pr actice for those products. If such problems arise substanti ally in other domains, we stand ready to extend this provision to those domains in fu[...]
-
Page 479
Appendix E Open So urce Licences NSA320 User’s Guide 479 the work (except to the extent that warr anties are provided), that licensees may convey the work under this License, and how to view a copy of this Li cense. If the interface presents a list of user co mmands or options, such as a menu, a prominent item in the list meets this criterion. 1.[...]
-
Page 480
Appendix E Open So urce Licences NSA320 User’s Guide 480 given its cont ent, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent , as provided by copyright l aw . Y ou may make, run and propagate cov ered works that you do not convey , without conditions so long as y our license othe rwise remains in [...]
-
Page 481
Appendix E Open So urce Licences NSA320 User’s Guide 481 •a) The work must carry prominent notices stating that you modified it, and gi ving a relevant date. •b) The work must carry prominent noti ces stating that it is releas ed under this License and any conditions added under se ction 7. This requirement modifies the requirement in section[...]
-
Page 482
Appendix E Open So urce Licences NSA320 User’s Guide 482 •c) Conv ey individual copies of the object code with a copy of t he written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially , and only if you received the object code with such an offer , in accord with s ubsection 6b. •d) Co[...]
-
Page 483
Appendix E Open So urce Licences NSA320 User’s Guide 483 characteriz ed), the Corresponding Source convey ed under this section mus t be accompanied by the Installation Informatio n. But this requirement does not apply if neither you nor an y third party retains th e ability to install modifi ed object code on the User Product (for example, th e [...]
-
Page 484
Appendix E Open So urce Licences NSA320 User’s Guide 484 •c) Prohibit ing misrepres entat ion of the origin of that material, or requiring that m o d i f i e d v e r s i o n s o f s u c h m a t e r i a l b e m a r k e d i n r e a s o n a b l e w a y s a s d i f f e r e n t f r o m the original vers ion; or •d) Limiting the use for publicity p[...]
-
Page 485
Appendix E Open So urce Licences NSA320 User’s Guide 485 this License (for an y work) from that copyright holder , and you cure the violation prior to 30 days after your receipt of the notice. T ermination of your right s under this section does not terminate the licenses of parties who hav e received copies or ri ghts from yo u under this Licens[...]
-
Page 486
Appendix E Open So urce Licences NSA320 User’s Guide 486 A contributor's “essential patent claims” ar e all patent c laims owned or controlled by the contributor , whether already acquir ed or hereafter acqu ired, t hat would be infringed by some manner , permitted by this License, of mak ing, using, or sel ling its contributor version, [...]
-
Page 487
Appendix E Open So urce Licences NSA320 User’s Guide 487 primarily for and in connection with specif ic products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was gr anted, prior to 28 March 2007. Nothing in this License s hall be construed as excluding or limit ing any implied lic[...]
-
Page 488
Appendix E Open So urce Licences NSA320 User’s Guide 488 Later license versions may give you additional or different permissi ons. However , no additional obligations are i mposed on an y aut hor or copyright holder as a result of your choosing to follow a later v ersion. 15. Disclaimer of W arranty . THERE IS NO W ARRANTY FOR THE PROGRAM, TO THE[...]
-
Page 489
Appendix E Open So urce Licences NSA320 User’s Guide 489 and each file should hav e at least the “copyright” line and a pointer to where the full notice is found. <one line to giv e the progr am's name and a brief idea of what it does.> Copyright (C) <year> <name of author> This program is free softw are: you can redist[...]
-
Page 490
Appendix E Open So urce Licences NSA320 User’s Guide 490 The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, your progr am's commands might be different; for a GUI interface, y ou would use an “about box” . Y ou should also get your employer (if yo u work a[...]
-
Page 491
Appendix E Open So urce Licences NSA320 User’s Guide 491 THEORY OF LIABILITY , WHE THER IN CO NTRACT , STRICT LIABILITY , OR T OR T (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY W A Y OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS SIBILITY OF SUCH DAMAGE. This Product incl udes flac software under FDL license GNU Free Documentat[...]
-
Page 492
Appendix E Open So urce Licences NSA320 User’s Guide 492 below , refers to any such manual or work. Any memb er of the public is a licensee, and is addressed as "you". Y ou accept the license if you copy , modify or distribute the work in a way requiring pe rmission under copyright law . A "Modified V ersion" of the Document m[...]
-
Page 493
Appendix E Open So urce Licences NSA320 User’s Guide 493 and JPG. Opaque formats include proprietar y ormats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/ or processing tools are not gener ally a vailable, and the machi ne-generated HTML, P ostScript or PDF produced by some word processors for[...]
-
Page 494
Appendix E Open So urce Licences NSA320 User’s Guide 494 long as they preserve the title of the Document and satisfy t hese conditions, can be treated as verbatim copyi ng in other respe cts. If the required texts for either cov er are too voluminous to fit l egibly , you should put the first ones li sted (as many as fi t reaso nably) on the actu[...]
-
Page 495
Appendix E Open So urce Licences NSA320 User’s Guide 495 C. State on the Title page the name of the publisher of the Modified V ersion, as the publisher . D. Preserve all the copyrigh t notices of the Document. E. Add an appropriate copyright notice for your modi fications adjacent to the other copyright notices. F . Include, immediately after th[...]
-
Page 496
Appendix E Open So urce Licences NSA320 User’s Guide 496 If the Modified V ersion includes new fron t- matter sections or appendices that qualify as Secondary Sections and contain no material copied from the Document, you may at y our option designate some or all of these sections as in variant. T o do this, add their titles to the list of Inv ar[...]
-
Page 497
Appendix E Open So urce Licences NSA320 User’s Guide 497 6. COLLECTIONS OF DOCUMENTS Y ou may make a collection consisting of the Document and oth er documents released under this License, and replace the individual copies of this License in the various documents with a si ngle copy that is in cluded in the collec tion, prov ided that you follow [...]
-
Page 498
Appendix E Open So urce Licences NSA320 User’s Guide 498 its Title (sec tion 1) will typically req uire changing the actual title. 9. TERMINA TION Y ou may not copy , modify , sublicense, or distribute the Doc ument except as expressly provided for under this License. Any other attempt to copy , modify , sublicense or dis tribute the Document is [...]
-
Page 499
Appendix E Open So urce Licences NSA320 User’s Guide 499 with the Inv ariant Sections being LIST THEIR TITLES, with the Front -Cover T exts being LIST , and with the Back -Cover T exts being LIST . If you have In variant Sectio ns without Cover T exts, or some other combination of the three, merge those two alternativ es to suit the situation. If[...]
-
Page 500
Appendix E Open So urce Licences NSA320 User’s Guide 500 Code. 1.6. "Init ial Developer" means t he individual or entity identified as the Initial Dev eloper in the Source Code noti ce required by Exhibit A. 1.7. "Larger W ork" means a work which combines Covered Code or portions thereof with code not governed by the terms of [...]
-
Page 501
Appendix E Open So urce Licences NSA320 User’s Guide 501 and appar atus claims, in any pat ent Licensable by gr antor . 1.11. "Source Code" means the preferred form of the Cove red Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation a[...]
-
Page 502
Appendix E Open So urce Licences NSA320 User’s Guide 502 (a) under intellectual propert y rights (other than patent or tr ademark) Licensable by Initial Developer to us e, reproduce, modif y , display , perfor m, sublicense and distribute the Original Cod e (or portions thereo f ) with or without Modific ations, and/or as part of a Larger W ork; [...]
-
Page 503
Appendix E Open So urce Licences NSA320 User’s Guide 503 and/ or as part of a Larger W ork; and (b) under Patent Clai ms infringed by the making, using, or selli ng of Modifications made by that Contributor either alone and/ or in combination with its Contributor V ersion (or portions of s uch combination), to mak e, use, sell, offer for sale, ha[...]
-
Page 504
Appendix E Open So urce Licences NSA320 User’s Guide 504 Section 2 .2. The Source Co de v ersion of Covered Code may be distributed only under the terms of this License or a f uture version of this License released under Section 6.1, and Y ou must include a copy of this License with every copy of t he Source Code Y ou distribute. Y ou may not off[...]
-
Page 505
Appendix E Open So urce Licences NSA320 User’s Guide 505 the Modificati on is derived, directly or indirectly , from Original Code provided b y the Initial Developer and including the name of the Initial Develop er in (a) the So urce Code, and (b) in an y notice in an Executable v ersion or related documentation in which Y ou describe the origin [...]
-
Page 506
Appendix E Open So urce Licences NSA320 User’s Guide 506 (c) R epresentations. Contri butor represents that , except as disc losed pursuant to Secti on 3.4(a) above, Contributor bel ieves that Contributor's Modi fications are Contributor's original c reation(s) and/or Contri butor has sufficient rig hts to grant the rights convey ed by [...]
-
Page 507
Appendix E Open So urce Licences NSA320 User’s Guide 507 3.6. Distribution of Executable V ersions. Y ou may dist ribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 hav e been met for that Cov ered Code, and if Y ou include a notice st ating that the Source Code v ersion of the Cov ered Code is av ailable under the[...]
-
Page 508
Appendix E Open So urce Licences NSA320 User’s Guide 508 W ork as a single product. In such a case, Y ou must make sure the requirements of this License are fulfilled for the Covered Code. 4. Inability to Com ply Due to Sta tute or Regulation. If it is impossible for Y ou to comply with any of the terms of this License with respect to some or all[...]
-
Page 509
Appendix E Open So urce Licences NSA320 User’s Guide 509 vers ion. Y ou may also choose to use such Covered Code under the terms of an y subsequent version of th e License published by Netscape. No one other than Netscape has the ri ght to modify the terms appli cable to Cov ered Code created under this License. 6.3. Deriv ative W orks. If Y ou c[...]
-
Page 510
Appendix E Open So urce Licences NSA320 User’s Guide 510 LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 8. TERMINA TION. 8.1. This License and the ri ghts gr anted hereunder will terminate automatically if Y ou fail to co mply with terms herein and fai l to cure such breach within 30 d ays of becoming aw[...]
-
Page 511
Appendix E Open So urce Licences NSA320 User’s Guide 51 1 Sections 2.1 and/or 2.2 automaticall y terminate at the expir ation of the 60 day notice period specified abo ve. (b) an y software, hardware, or device, ot her than such Particip ant's Contributor V ersion, direc tly or indirec tly infr inges any pate nt, then any rights granted to Y[...]
-
Page 512
Appendix E Open So urce Licences NSA320 User’s Guide 512 ANY PERSON FOR ANY IN DIRECT , SPECIAL, INCIDENT AL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUD ING, WITHOUT LIMIT A TION, DAMAGES FOR LOSS OF GOOD WILL, WORK ST OPP AGE, COMPUTER F AILURE OR MALFUNCTION, OR ANY AND ALL O THER COMMERCIAL DAMAGES OR LOSSES , EVEN IF SUCH P ARTY SHALL H[...]
-
Page 513
Appendix E Open So urce Licences NSA320 User’s Guide 513 District of Cali fornia, with venue lying in Santa Clar a County , California, with t he losing party responsible for costs, including without limitati on, court cost s and reasonable at torneys' fees and expenses. The applic ation of the United Nations Convention on Contr acts for the[...]
-
Page 514
Appendix E Open So urce Licences NSA320 User’s Guide 514 compliance with the License. Y ou may obtain a cop y of the License at http://www .mozilla.org/MPL/ Softw are distributed under the License is distri buted on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, eit her express or implied. See the License for the specific language go v[...]
-
Page 515
Appendix E Open So urce Licences NSA320 User’s Guide 515 This Product includes DBD-mysql softw are under below license Copyright (c) 2003 R udolf Lippan Copyright (c) 1997-2003 Jochen Wiedmann Y ou may distribute under the te rms of either the GNU General Public License or the Artis tic License, as speci fied in the P erl README file. This Produc[...]
-
Page 516
Appendix E Open So urce Licences NSA320 User’s Guide 516 common command code (sg_cmds_basic.[hc] and sg_cmds_extr a.[hc]) and later utili ties. They are Copyright: Douglas Gil bert. The author's intention is that th e BSD licensed code can be used freely by others. On Debian syst ems, the complete text of the BSD License can be found in `/us[...]
-
Page 517
Appendix E Open So urce Licences NSA320 User’s Guide 517 o T ransition o Acknowledgements INTRODUCTION The Boost Software License specifies the terms and conditions of use for those Boost librari es that it covers. Currently , some Boost libraries have their own licenses. The hope is that ev e nt u a l ly a l l B o o s t l i b ra r ie s w il l b [...]
-
Page 518
Appendix E Open So urce Licences NSA320 User’s Guide 518 obtaining a c opy of the software and accompanying documentation covered by this license (the "Sof tware") to use, reproduce, display , distribut e, execute, and tr ansmit the Software, and to prepare derivativ e works of the Software, and to permit third- parties to whom the Soft[...]
-
Page 519
Appendix E Open So urce Licences NSA320 User’s Guide 519 will w ant to carefu lly review each license, e ven if t hey've been told that they 're all standard. I would expect that, unl ess we'r e remarkably brilliant (or lucky) in drafting the standa rd Boost license , the standard license won't sa tisfy the legal departments o[...]
-
Page 520
Appendix E Open So urce Licences NSA320 User’s Guide 520 How should Boost programmers apply the license to source and header files? Add a comment based on the foll owing template , substituting appropriat e text for the italicized portion: // Copyright Joe Coder 2004 - 2006. // Distributed under the Boost Software License, V ersion 1.0. // (See a[...]
-
Page 521
Appendix E Open So urce Licences NSA320 User’s Guide 521 detailed wording was rejected as not being legally necessary , and reduc ing readability . Why is t he "disclaimer" paragr aph of the license entirely in uppercase? Capitalization of these particul ar provisio ns is a US legal mandate for consumer protection. (Diane Cabell) Does t[...]
-
Page 522
Appendix E Open So urce Licences NSA320 User’s Guide 522 TRANSITION T o ease the tr ansition of the code base towards the new common license, sev eral people decided to give a blanket permi ssi on for all their contributions to use the new license. This hopefully he lps maintainers to swi tch to the new license once the list contains enough names[...]
-
Page 523
Appendix E Open So urce Licences NSA320 User’s Guide 523 with or without fee is hereby grante d, provided that the abov e copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS ", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED , INCLUDING BUT NOT LIMITED TO THE W ARRANTIES OF MERCHANT ABILITY[...]
-
Page 524
Appendix E Open So urce Licences NSA320 User’s Guide 524 Ye s ! libcurl does not put any restri ctions on the progr am that uses the library . 6.4 I have a progr am that uses L G PL libr aries, can I us e libcurl? Ye s ! The LGPL li cense doesn't clash with other licen ses. 6.5 Can I modify curl/libcurl for my progr am and keep the changes s[...]
-
Page 525
Appendix E Open So urce Licences NSA320 User’s Guide 525 code. Y ou do not have to reveal or mak e pu blic that you are using libcurl within your ap p. As can be seen here: http://curl.haxx.se/docs/companies.html and elsewhere, more and more companies are discovering the power of libcurl and take adv antage of it even in commercial environments. [...]
-
Page 526
Appendix E Open So urce Licences NSA320 User’s Guide 526 V ersion 2.0, January 2004 ht tp://www .apache.org/licenses/ TERMS AND CONDITIONS FOR US E, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the term s and conditions f or use, reproduction, and distri bution as defined by Sections 1 through 9 of this document. [...]
-
Page 527
Appendix E Open So urce Licences NSA320 User’s Guide 527 and con versions to other media types. "W ork" shall mean the work of authorship, whether in Source or Object form, made avai lable under the License, as i ndicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). &q[...]
-
Page 528
Appendix E Open So urce Licences NSA320 User’s Guide 528 "Contri butor" shall mean Lice nsor and any individual or Legal Entit y on behalf of whom a Contribu tion has been received by Licensor and subsequent ly incorporated withi n the W ork. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Co ntr[...]
-
Page 529
Appendix E Open So urce Licences NSA320 User’s Guide 529 W ork or Derivative W orks thereof in any medium, wi th or without modifica tions, and in Source or Object f orm, provided that Y ou meet the following co nditions: (a) Y ou must give an y other recipients of t he W ork or Deriv ativ e W orks a copy of this License; and (b) Y ou must cause [...]
-
Page 530
Appendix E Open So urce Licences NSA320 User’s Guide 530 or as an addendum to t he NOTICE text from the W ork, pro vided th at such additional attri bution notices cannot b e construed as modi fying the License. Y ou may add Y our own copyright statement to Y our modifications and may pro vide additional or different license terms and conditio ns[...]
-
Page 531
Appendix E Open So urce Licences NSA320 User’s Guide 531 of TITLE, NON- INFRINGEMENT , MERCHANT ABILITY , or FITNESS FOR A P AR TICULAR PURPOSE. Y ou are solely responsible for determining the approp riateness of using or redistributing the W ork and assume any risks associat ed with Y our exercise of permissions under this L icense. 8. Limitatio[...]
-
Page 532
Appendix E Open So urce Licences NSA320 User’s Guide 532 END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. T o apply t he Apache Licens e to your work, attach the following boilerplat e notice, with the fi elds enclosed by br ackets "[]" replaced with your own ident ifying information. (Don't incl [...]
-
Page 533
Appendix E Open So urce Licences NSA320 User’s Guide 533 For t he mod_mime_magic component: /* * mod_mime_magic: MIME type lookup via fi le magic numbers * Copyright (c) 1996-1997 Cisco Sys tems, Inc. * * This softwa re was submitted by Cisco S ystems to the Apache Group i n July * 1997. Future revisions and deri va tives of this source code must[...]
-
Page 534
Appendix E Open So urce Licences NSA320 User’s Guide 534 * * 2. The origin of this software must not be misrep resented, either by * explicit claim or b y omission. Since few users ever read sources, cred its * must appear in the documentation. * * 3. Altered versions must be plai nly mark ed as such, and must not be * misrepresent ed as being th[...]
-
Page 535
Appendix E Open So urce Licences NSA320 User’s Guide 535 * httpd@ncsa.uiuc.edu * * Copyright (C) 1995, Board of T rustees of the University of Illinois * ***************************************************************** ******* * * md5.c: NCSA HT TPd code which uses the md5c.c RSA Code * * Original Code Copyright ( C) 1994, Jeff Hostetler , Spygl[...]
-
Page 536
Appendix E Open So urce Licences NSA320 User’s Guide 536 * and that both that copyri ght notice and this permi ssion notice * appear in supporting doc umentat ion, and that the name of Carnegie * Mellon Univer sity not be used in advertis ing or p ublicity * pertaining to distri bution of the so ftware without specifi c, * written prior permissi [...]
-
Page 537
Appendix E Open So urce Licences NSA320 User’s Guide 537 * P ermission to use, copy , modify , and distribute this mat erial * for any purpose and wit hout fee is hereby gr anted, provided * that the abov e copyright noti ce and this permission notice * appear in all copies, and that the name of Bellcore not be * used in adv ertising or publicit [...]
-
Page 538
Appendix E Open So urce Licences NSA320 User’s Guide 538 Algorithm" in all material mentioning or referencing this soft ware or this function. License is also granted t o make and use deriv ative works provided that such work s are identified as "deri ved from the RS A Data Security , Inc. MD5 Message-D igest Algorithm" in all mate[...]
-
Page 539
Appendix E Open So urce Licences NSA320 User’s Guide 539 */ /* Copyright (C) 1991- 2, RSA Data Securit y , Inc. Created 1991. All rights reserved. License to copy and use this s o ftware is gr anted provided that it is identified as the "RSA Data Security , Inc. MD5 Messag e-Digest Algorithm" in all material mentioning or referencing th[...]
-
Page 540
Appendix E Open So urce Licences NSA320 User’s Guide 540 * can do whatever y ou want with this stuff . If we meet some da y , and you think * this stuff is worth it, you can buy me a beer in return. Poul-Henning K amp * --------------- -------------- ---------------- ------------- ----------------- - */ For t he srclibapr-utilcryptoap r_md4.c [...]
-
Page 541
Appendix E Open So urce Licences NSA320 User’s Guide 541 * software for an y particular purpose. It is provided "as is" * without express or implied w arranty of any kind. * * These notices must be retained in any copies of an y part of this * documentation and/or software. */ For t he srclibapr-utilincl udeapr_md4.h component: * * T[...]
-
Page 542
Appendix E Open So urce Licences NSA320 User’s Guide 542 * * RSA Data Security , Inc. make s no representations concerning either * the merchantability of this so ftware or the suitabilit y of this * software for an y particular purpose. It is provided "as is" * without express or implied w arranty of any kind. * * These notices must be[...]
-
Page 543
Appendix E Open So urce Licences NSA320 User’s Guide 543 * These notices must be retained in any copies of an y part of this * documentation and/or software. */ For t he srclibapr-utilxml expatconftoolsinstall-sh component: # # install - install a program, scrip t, or datafile # This comes from X11R5 (mit/util/ scripts/install.sh). # # Copyr[...]
-
Page 544
Appendix E Open So urce Licences NSA320 User’s Guide 544 # # Copyright 1991 by the Massachusetts Institute of T echnology # # P ermission to use, cop y , modify , dist ribute, and sell this softw are and its # documentation for an y purpose is hereby gr anted without fee, pro vided that # the above c opyright notice appear in all copies and that [...]
-
Page 545
Appendix E Open So urce Licences NSA320 User’s Guide 545 W ritten by: Philip Hazel <ph10@cam.ac.uk> University of Cambri dge Computing Service, Cambridge, England. Phone: +44 1 223 334714. Copyright (c) 1997-2004 Univ ersity of Cambridge All rights reserved. Re distribution and use in source an d binary forms, with or without modification, [...]
-
Page 546
Appendix E Open So urce Licences NSA320 User’s Guide 546 IMPLIED WARR ANTIES OF MERCHANT ABILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED . IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUT ORS BE LIABLE FOR ANY DIRECT , IND IRECT , IN CIDENT AL, SPECIAL, EXEMPLAR Y , OR CONSEQUENTIAL DAMAGES (INCLUDIN G, BUT NO T LIMITED T O, PROCU[...]
-
Page 547
Appendix E Open So urce Licences NSA320 User’s Guide 547 is not removed. This software is pro vided "as is" and any express or implied war anties, including but not limi ted to, the implied warr anties of merchantabilit y and fitness for a particul ar purpose ar e disclaimed. In no ev ent shall Z eus T echnology Ltd. be liab le for an y[...]
-
Page 548
Appendix E Open So urce Licences NSA320 User’s Guide 548 P ermission is hereby granted, free of charge, to any person obtai ning a copy of this software and associated documentation fil es (the "Software"), to deal in the Softwa re wit hout restriction, including without limitation the rights to use, copy , modify , merge, publish, dist[...]
-
Page 549
Appendix E Open So urce Licences NSA320 User’s Guide 549 Copyright (c) 2000, 2001, 2002, 2003, 2004 by Martin C. Shepherd. All rights reserved. P ermission is hereby granted, free of charge, to any person obtai ning a copy of this soft ware and associated documentation files (the "Software"), to deal in the Softwa re wit hout restrictio[...]
-
Page 550
Appendix E Open So urce Licences NSA320 User’s Guide 550 WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Except as contained i n this notice, the name of a copyright holder shall not be used in adv ertising or otherwise to promote t he sale, use or other dealings in this Softw are without prior wri tten authorization of the copyright holder . This [...]
-
Page 551
Appendix E Open So urce Licences NSA320 User’s Guide 551 THIS SOF TWARE IS PROVIDED BY THE COPYRIGH T HOLDERS AND CONTRIBUT ORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIE S, INCLUDING, BUT NO T LIMITED TO , THE IMPLIED WARR ANTIES OF MERCHANT ABILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED . IN NO EVENT SHALL THE COPYRIG[...]
-
Page 552
Appendix E Open So urce Licences NSA320 User’s Guide 552 * Re distributions in binary form must reproduce the above copyright noti ce, this list of conditions and the fo llowing disclaimer in the documentati on and/or other materials pro vided with the distribution. * Neither name of Intel Corporation nor the names of its contributors may be used[...]
-
Page 553
Appendix E Open So urce Licences NSA320 User’s Guide 553 with different Copyright notices) all the files are: Copyright (C) 1998-2003 Daniel V eill ard. All Rights Reserv ed. P ermission is hereby granted, free of charge, to any person obtai ning a copy of this software and associated docume ntation files (the "Software"), to deal in th[...]
-
Page 554
Appendix E Open So urce Licences NSA320 User’s Guide 554 The following individuals contrib uted in part to the Network Time Protoc ol Distribution V ersion 4 and are acknow ledged as authors of this work. 1.Mark Andrews <mark_andrews@isc.org> Leitch atomic clock controller 2.Bernd Altm eier <altm eier@atlsoft. de> hopf Elek tronik ser[...]
-
Page 555
Appendix E Open So urce Licences NSA320 User’s Guide 555 20.Glenn Holl inger <glenn @heral d.usask.ca> GOES cloc k driver 21.Mike Iglesias <iglesias@uci.edu> DEC Alpha port 22.Jim Jagielski <jim@jagubox.gsfc.nas a.gov> A/UX port 23.Jeff Johnson <jb j@chatham.usdesign.com> massiv e prototyping overhaul 24.Hans Lambermont &l[...]
-
Page 556
Appendix E Open So urce Licences NSA320 User’s Guide 556 40.R ob Neal <neal@ntp.org> Bancomm refclock and config/parse code maintenance 41.Rainer Pruy <Rainer .Pruy@informatik.uni-erlangen.de> m onitoring/trap scripts, s tatistics file handling 42.Dirce Ric hards <dirce@zk3.dec .com> Digital UNIX V4.0 port 43.Wilfredo Sánchez &[...]
-
Page 557
Appendix E Open So urce Licences NSA320 User’s Guide 557 2. R edistributions in binary form must reproduce all prior and current copyright notices, this list of c onditions, and the following dis claimer in the documentation and/or other materials provided wit h the distribution. 3. The name of any author may not be used to endorse or promote pro[...]
-
Page 558
Appendix E Open So urce Licences NSA320 User’s Guide 558 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WAR R A N TI E S * WITH REGARD T O THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANT ABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL , DIRECT , INDIRECT , OR CONSEQU ENTIAL DAM[...]
-
Page 559
Appendix E Open So urce Licences NSA320 User’s Guide 559 might fa ll under oth er license s. The deta ils here are unclear . W e do not worry about the licensing of the documentation an d build code so much because none of these things are part of the core deliver able SQLite libr ary . All of the deliver able code in SQLite ha s been written fro[...]
-
Page 560
Appendix E Open So urce Licences NSA320 User’s Guide 560 insufficient. Y ou must also send by surf ace mail a copyright release si gned by a company officer . A signed original of the copyright release should be mailed to: Hwaci 6200 Maple Cov e Lane Charlotte, NC 28269 USA A template copyright release is a vailable in PDF or HTML. Y ou can use t[...]
-
Page 561
Appendix E Open So urce Licences NSA320 User’s Guide 561 1.I dedicate to t he public domain any an d all copyright interest in the SQLite software that was publicly a vailable on the SQLite website (http ://www .sqlite.org/ ) prior to the date of the si gnature belo w and any changes or enhancements to the SQLite software t hat I may cause to b e[...]
-
Page 562
Appendix E Open So urce Licences NSA320 User’s Guide 562 === asctime.c========== === date.c ========== /* * Copyright (c) 1985, 1987, 1988 The R ege nts of the Universit y of California. * All rights reserved. * * Redis tribution and use in sour ce and binary forms are permitted * provided that the abo ve copyright notice and this par agr aph are[...]
-
Page 563
Appendix E Open So urce Licences NSA320 User’s Guide 563 /* ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur Da vid Olson. */ ================== ====== logwtmp.c ===== /* * Copyright (c) 1988 The Regents of the Univ ersity of California. * All rights reserved. * * Redis tribution and use in sour ce and binary forms[...]
-
Page 564
Appendix E Open So urce Licences NSA320 User’s Guide 564 ** 1996-06-05 by Arthur Da vid Olson. ====== private.h ===== ======tzfile.h ===== ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur Da vid Olson. ====== tzfile.h ===== This Product includes crypto++ software under below license License The License of Crypto++ [...]
-
Page 565
Appendix E Open So urce Licences NSA320 User’s Guide 565 and their use is subject to addition al licenses incl uded in these files. mars.cpp - Copyright 1998 Brian Gladman. All other files in this compilation are placed in the public domain b y W ei Dai and other contributors. I would like to thank the following authors for placing their works in[...]
-
Page 566
Appendix E Open So urce Licences NSA320 User’s Guide 566 they provide to W ei Dai will be considered public domain and not copyrighted unless it includes an explicit copyri ght notice. 3. W ei Dai makes no warr anty or representation that the operat ion of the software in this compilation will be error-free, and W ei Dai is under no obligation to[...]
-
Page 567
Appendix E Open So urce Licences NSA320 User’s Guide 567 This Product includes wxWidgets softwa re under below license Licence Background wxWidgets is currently licensed under the "wxWindows Licence" pending approv al of the "wxWidgets Licenc e" which will be identical apart from the name. The wxWindows Licence is essentially [...]
-
Page 568
Appendix E Open So urce Licences NSA320 User’s Guide 568 your option) an y later version. This libr ary is distribute d in the hope that it will be useful, but WITHOUT ANY W ARRANTY ; without even the implied warr anty of MERCHANT ABILITY or FITNESS FOR A P ARTICULAR PURPOSE. See the GNU Libr ary General Public Licence for more details. Y ou shou[...]
-
Page 569
Appendix E Open So urce Licences NSA320 User’s Guide 569 accordingly . 4. If you write modifications of your own for this libr ary , it is your choice whether to permit this ex cept ion to apply to your modifications. If you do not wish that, you must d elete the excep tion notice from such code and/or adjust the licensin g conditi ons notice acc[...]
-
Page 570
Appendix E Open So urce Licences NSA320 User’s Guide 570 are (c) of their respective authors, and are included in Squeezebox Server per their respective licenses. - Certain ancillary progr ams included in the Squeezebox Serv er distribution on our web site are licensed to us only for direct distribution to end-users. These include the Wi ndows in[...]
-
Page 571
Appendix E Open So urce Licences NSA320 User’s Guide 571 modified source files can be found at http://www .slimdevices.co m/opensource/fixed_ math.tar .gz. - The following applies t o Squeezebox2 di stribution: This product is protected by certain i ntellectual property rights of Microsoft Corporation. Use or distri bution of such te chnology out[...]
-
Page 572
Appendix E Open So urce Licences NSA320 User’s Guide 572 When we speak of f ree software, we are refe rring to freedom , not price. Our Gener al Public Licenses are designed to make sure that you have the freedom to dist ribute copies of free softw are (and charge for this service if you wi sh), that you recei ve source code or can get it if you [...]
-
Page 573
Appendix E Open So urce Licences NSA320 User’s Guide 573 patents. W e wish to avoid the da nger that redis tributors of a free program wil l individually obtai n pate nt licenses, in effect making the program propri etary . T o prevent this, we have made it clear that any patent must be licensed for everyon e's free use or not licensed at al[...]
-
Page 574
Appendix E Open So urce Licences NSA320 User’s Guide 574 source code as you receiv e it, in any medium, pro vided that you conspicuously and appropriately pub lish on each copy an appropriate copyright n otice and di sclaimer of warranty; keep inta ct all the notices that refer to this License and to the absence of any warranty; and give an y oth[...]
-
Page 575
Appendix E Open So urce Licences NSA320 User’s Guide 575 License. (Ex ception: if the Progr am itself is inter active but does not normal ly print such an announcement, y our work based on the Progr am is not requir ed to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are no[...]
-
Page 576
Appendix E Open So urce Licences NSA320 User’s Guide 576 source code, whi ch must be distributed under the terms of Sections 1 and 2 abo ve on a medi um customarily used for softw are interchange; or , b) Accompan y it with a written offer , vali d for at least three years, to giv e any third party , for a charge no more than y our cost of ph ysi[...]
-
Page 577
Appendix E Open So urce Licences NSA320 User’s Guide 577 If distribution of executable or object code is made by offering access to copy from a designated place, then offering equiv alent access to copy the source code from the same place counts as distribution of t he source code, even though third p arties are not compelled to copy the source a[...]
-
Page 578
Appendix E Open So urce Licences NSA320 User’s Guide 578 original licensor to cop y , distribu te or modify the Progr am subject to these terms and conditions. Y ou may not impose any further restrictions on the recipients' exer cise of the rights gr anted herein. Y ou are not responsible for enforcin g compliance by third parties to this Li[...]
-
Page 579
Appendix E Open So urce Licences NSA320 User’s Guide 579 patents or other property ri ght claims or to contest v alidity of an y such claims; this section has the sol e purpose of protecting the integrity of t he free software distribution system, which is implemented by public l icense prac tices. Man y people hav e made generous contributions t[...]
-
Page 580
Appendix E Open So urce Licences NSA320 User’s Guide 580 Each version is giv en a distinguishing v ersion number . If the Program specifies a v ersion number of this License which appli es to it and "any later version", y ou have the option of following the terms and conditi ons either of that version or of an y later version published [...]
-
Page 581
Appendix E Open So urce Licences NSA320 User’s Guide 581 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR AN Y OT HER P ARTY WHO MA Y MODIFY AND/ OR REDISTRIB UTE THE PROGRAM AS PERMIT TED ABOVE, BE LIABLE TO Y OU FOR DAMAGES, INCLUDIN G ANY GENERAL, SPECIAL, INCIDENT AL OR CONSEQUENTIAL DAMA[...]
-
Page 582
Appendix E Open So urce Licences NSA320 User’s Guide 582 #------------- ------------- ---------------- -------------- ---------- The Code2000 font is copyright James K ass, di stributed by permission of the author . Details about Code2000 may be found in Gr aphics/CODE2000.HTM This Product includes php software under below license • PHP 4 and P[...]
-
Page 583
Appendix E Open So urce Licences NSA320 User’s Guide 583 the documentation and/ or other materials provi ded with the distributi on. 3. The name "PHP" mus t not be used to endorse or promote products derived from this software without prior written permission. F or written permission, p lease contact group@php.net. 4. Products deri ved [...]
-
Page 584
Appendix E Open So urce Licences NSA320 User’s Guide 584 ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NO T LIMITED T O, THE IMPLIED W ARRANTIES OF MERCHANT ABILITY AND FITNESS FOR A P ARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR IT S CONTRIBU T ORS BE LIABLE FOR ANY DIRECT , INDIRECT , INCIDENT AL, SPECIA[...]
-
Page 585
Appendix E Open So urce Licences NSA320 User’s Guide 585 a) the GNU General Public License as pub lished by the Free Software Foundation; either version 1, or (at y our option) any later version, or b) the "Artistic License". Fo r those of you that c hoose to use the GNU Gener al Public L icense, m y interpretation of t he GNU General P[...]
-
Page 586
Appendix E Open So urce Licences NSA320 User’s Guide 586 R oelofs. P ortions relating to gdttf .c copyright 1999, 2000, 2001, 2002 John Ellson (ellson@lucent.c om). P ortions relating to g dft.c copyright 2001, 2002 John Ellson (ellson@lucent.com). Portions copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Pierre-Alain Jo ye (pierre@libgd.[...]
-
Page 587
Appendix E Open So urce Licences NSA320 User’s Guide 587 limited to i mplied warr anties of merchantabilit y and fitness for a particular purpose, wit h respect to this code and accompanying documentation. Although their code does not a ppear in gd, the authors wish to thank David K oblas, David R owley , and Hutchison A venue Software Corp orati[...]
-
Page 588
Appendix E Open So urce Licences NSA320 User’s Guide 588[...]
-
Page 589
NSA320 User’s Guide 589 A PPENDIX F Legal Information Copyright Copyright © 2010 by Z yXEL Communications Corpor ation. The contents of this publication ma y not be reproduced in any p art or as a whole, transcrib ed, stored in a retriev al syst em, tr anslated into an y language , or transmitted in an y form or by any me ans, electronic, mechan[...]
-
Page 590
Appendix F L egal Informati on NSA320 User’s Guide 590 • This device ma y not cause harmful interference. • This device must acce pt any interf erence received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Clas s B digital device pursuant to P art 15 of th e [...]
-
Page 591
Appendix F Legal Information NSA320 User’s Guide 591 including any implied w arranty of merchantabilit y or fitness for a particular use or purpose. Z yXEL shall in no event be hel d liable for indirect or consequential damages of any ki nd to the purchaser . T o obtain the services of this w arranty , contac t you r ven dor . Y o u may also refe[...]
-
Page 592
Appendix F L egal Informati on NSA320 User’s Guide 592[...]
-
Page 593
Index NSA320 User’s Guide 593 Index Numerics 3-D photo wall 57 A access rights 62 Flickr 291 shares 315 , 316 Y ouT ube 295 activation download service 192 Flickr/Y ouT ube 286 FTP 188 FTP U plo adr 297 recycle bins 61 , 31 4 web publishing 205 ANONYMOUS FTP 362 anonymous FTP access 189 application zone 63 applications 185 , 285 auto upload Flick[...]
-
Page 594
Index NSA320 User’s Guide 594 backup settings 332 bandwidth limit 300 BitT orrent 187 IP filtering 201 , 202 protection 221 , 222 re-seeding 192 settings 200 torrent files 195 , 21 9 health 203 info-hash 204 track ers 204 broadcatching 187 , 206 adding channels 19 2 , 207 , 208 channel guides 226 RSS 188 browser plugin, capturing link 219 browsin[...]
-
Page 595
Index NSA320 User’s Guide 595 E Exchangeable image file format, see Exif Exif 56 explicit TLS/SSL 133 external volumes 166 F fan speed 151 file troubleshooting access 363 file browser configure share 61 share browser 58 File T ransfer Protocol over Explicit TLS, see FTPE S File T ransfer Protocol over TLS, see FTPS files downloading 60 uploading [...]
-
Page 596
Index NSA320 User’s Guide 596 K Ke n B u r n s 65 L lag, time 153 language 65 latitude 56 LEDs 25 link capture browser plugin 219 login 50 logs 328 longitude 56 M maintenance 323 backup settings 332 logs 328 power management 324 , 376 failure 325 resume 325 schedule 326 UPS 325 reset 332 restoring settings 332 shutdown 337 upgrading firmware 336 [...]
-
Page 597
Index NSA320 User’s Guide 597 public key certificate 334 editing 335 R RAID 164 , 168 degraded 165 RAID 0 169 , 171 RAID 1 169 , 171 , 172 recovering 160 replacing disks 160 resynchronization 160 recycle bins 318 activation 61 , 314 configuration 312 , 318 related documentation 3 replacing disks 160 reset 27 , 332 restoring by backup files tutori[...]
-
Page 598
Index NSA320 User’s Guide 598 striping 170 synchronization 216 , 229 configuration 216 directions 217 single direction 229 tutorial 138 two directions 230 system date/time 155 login 50 master browser 154 password 51 reset 27 server name 154 settings 153 status 150 time lag 153 workgroup name 154 system settings 64 T TCP / I P 17 5 temperature CPU[...]
-
Page 599
Index NSA320 User’s Guide 599 duplexing 170 mirroring 170 parity 170 striping 170 W web config urator 49 icons 53 login 50 navigation panel 67 password 51 , 64 status 66 web publishing 187 , 20 4 , 225 activation 205 example 223 port number 225 troubleshooting 369 web security 127 wizard 32 workgroup name 154 Y Y ouT ube 285 access rights 295 act[...]