Home
ZyXEL NSA-220 User's Manual
Contents
1. Chapter 6 Storage Screens Table 19 Create a New Internal Volume continued LABEL DESCRIPTION Apply Click this button to save your changes back to the NSA and create the volume Cancel Click this button to begin configuring this screen afresh 6 7 Editing an Internal Volume Click an internal volume s Edit icon in the Volume screen as shown in Figure 38 on page 61 to change the internal disk drive volume s name Figure 41 Edit an Internal Volume Volume Properties Volume Name volume Type Internal Volume Configuration Data Protected Volume ie TG Bho 32 MB Used 76 GB Total 100 Free Apply Cancel The following table describes the labels in this screen Table 20 Edit an Internal Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters The name cannot be the same as another existing external volume Acceptable characters are all alohanumeric characters and spaces underscores and periods The first character must be alphanumeric A Z 0 9 The last character cannot be a space Type This displays Internal Volume indicating that the volume is on a hard disk installed in the NSA Configuration Capacity This field shows total disk size the percentage of the volume being used and the percentage that is available Apply Click this button to save your changes back to the NSA and create the volume Can
2. n ZyXEL 2 D exe My NSA Password Administration e x Pm public Wi E T oga public dung Ta WASTAN ANP ance gt Share Owner 4 admin gt Location volume1 gt Path public amp Share Browsing B Change Share Properties The following table describes the labels in the this screen Table 5 My NSA Management Overview LABEL DESCRIPTION Share Owner The share belongs to and is managed by this user account The share owner controls access rights to the share Location The share is for a folder on this volume Path This is the share s file path Share Browsing Click this link to see and access the share s contents Change Share Properties Click this link to configure the share s management details 2 5 3 My NSA Change Share Properties Screen Use the My NSA Change Share Properties screen to configure share management details Click My NSA and a share s Manage It button Then click Change Share Properties to open the following screen This screen displays a share s management details NSA 220 User s Guide 35 Chapter 2 Web Configurator Basics Figure 12 My NSA Change Share Properties ZyXEL er m SA My NSA Password Administration HUA Aura Tape Kapton ato AMANTE Change Share Properties Share Name public Volume ime name 110 GB Free F Path ubie Share Access C Keep it private
3. NSA 220 User s Guide Chapter 11 Maintenance Screens 11 5 Log Messages Here are some example log messages Table 38 Log Messages CLASS SEVERITY MESSAGE Network NOTICE s is active because of changing Port Group Enable DHCP client Network NOTICE s is inactive because of changing Port Group Disable DHCP client Network NOTICE s MTU gt 96s MTU 8 s may not work correctly Network NOTICE s MTU 8 s MTU 96s may not work correctly Network NOTICE Add interface s Network NOTICE Because s link down Default route will not apply until s link up Network NOTICE Because base interface s will be disabled Interface s is disabled now base ud iface Network NOTICE Network Config setting is changed Network NOTICE Interface s was disabled Network NOTICE Interface s was enabled Network NOTICE Port Group on s is changed Renew DHCP client Network NOTICE show sdx Services INFO admin has changed the password Services INFO HTTP management port has changed to s Services INFO Clock has disable daylight saving Services INFO MyClock has enable daylight saving Services INFO MyClock has set timezone to s Services INFO MyClock has set timezone to default Services INFO The date and time are updated from NTP server Services INFO The date and time are updated manually Services INFO The
4. Figure 73 Macintosh OS X Network eo Network 4 ww mJ Show All Displays Network Startup Disk Location Automatic m Show Built in Ethernet m PPPoE AppleTalk Proxies Configure Using DHCP 3 Domain Name Servers Optional IP Address 192 168 11 12 168 95 1 1 Provided by DHCP Server Subnet Mask 255 255 254 0 Router 192 168 10 11 Search Domains Optional DHCP Client ID Optional Example apple com earthlink net Ethernet Address 00 05 02 43 93 ff a Click the lock to prevent further changes 4 For statically assigned settings do the following From the Configure box select Manually Type your IP address in the IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your gateway in the Router address box 5 Click Apply Now and close the window 6 Restart your computer if prompted NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Verifying Settings Check your TCP IP properties in the Network window Linux This section shows you how to configure your computer s TCP IP settings in Red Hat Linux 9 0 Procedure screens and file location may vary depending on your Linux distribution and release version BES Make sure you are logged in as the root administrator Using the K Desktop Environment KDE Follow the steps below to configure your computer IP address using the KDE
5. NSA 220 User s Guide Appendix C Pop up Windows Select the check boxes as shown in the following screen Figure 92 Mozilla Firefox Content Security NSA 220 User s Guide Appendix C Pop up Windows NSA 220 User s Guide Open Source Licences Information herein is subject to change without notice Companies names and data used in examples herein are fictitious unless otherwise noted No part may be reproduced or transmitted in any form or by any means electronic or mechanical for any purpose except the express written permission of ZyXEL Communications Corporation This Product includes software developed by the Apache Software Foundation under Apache License Apache License Version 2 0 January 2004 http www apache org licenses TERMS AND CONDITIONS FOR USE REPRODUCTION AND DISTRIBUTION 1 Definitions License shall mean the terms and conditions for use reproduction and distribution as defined by Sections through 9 of this document Licensor shall mean the copyright owner or entity authorized by the copyright owner that is granting the License Legal Entity shall mean the union of the acting entity and all other entities that control are controlled by or are under common control with that entity For the purposes of this definition control means i the power direct or indirect to cause the direction or management of such entity whether by contract
6. 1 Click the Red Hat button located on the bottom left corner select System Setting and click Network Figure 74 Red Hat 9 0 KDE Network Configuration Devices RANetwork Configuration File Profile Help S9 4 B 8 Fe x New Edit Copy Delete Activate Deactivate Devices Hardware DNS Hosts 5E You may configure network devices associated with d oj physical hardware here Multiple logical devices can be T associated with a single piece of hardware Profile Status Device Nickname Type X Inactive eth0 etho Ethernet 2 Double click on the profile of the network card you wish to configure The Ethernet Device General screen displays as shown NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 75 Red Hat 9 0 KDE Ethernet Device General Ethernet Device General Route Hardware Device Nickname etho 4 Activate device when computer starts Allow all users to enable and disable the device Automatically obtain IP address settings with dhcp DHCP Settings Hostname optional 7 Automatically obtain DNS information from provider Statically set IP addresses Manual IP Address Settings Address Subnet Mask Default Gateway Address 3 Cancel f you have a dynamic IP address click Automa
7. 6 2 Storage Overview Screen Click Storage in the Navigation panel to display the following screen Figure 38 Storage Internal Volume Create an Internal Volume amp Edit gi Scan EW Repair f Delete al reas IER TRG ReCO 0 32 Bea e Lu disk2 76 GB Total 100 Free volume2 ABCD Healthy Disk Capacity JBOD External Volume Create an External Volume B Edit B Locate S Eject A Scan a m aaa oes vL e i NA SEE E HOS 2 0 ReadOnlyVolumei ntfs USBi Used Bs Healthy 244 MB Total 100 Free NSA 220 User s Guide Chapter 6 Storage Screens The following table describes the labels in this screen Table 14 Storage gt Overview LABEL DESCRIPTION Internal External Volume These tables display information on all internal volumes created on NSA internal disk drives and external volumes created on external disk drives attached to the NSA USB ports See the volume screen for field details Create an Internal Click this to format internal hard drives and create a new volume All data Volume on the disk s will be lost Create an External Click this to format an external hard drive and create a new volume All Volume data on the disk will be lost Status This field shows whether the volume is Healthy Resynching Degraded or Down Volume The NSA creates the volume name automatically You can edit it Disk Configuration This fie
8. Cancel Click this button to begin configuring this screen afresh NSA 220 User s Guide Network Screen This chapter discusses the network configuration screen 7 1 Network Settings Use the network configuration screen to assign the NSA a dynamic or static IP address and DNS information 7 1 1 IP Address The NSA needs an IP address to communicate with the media servers on your network The NSA can get an IP address automatically if you have a device on your network that gives them out Or you can assign the NSA a static fixed IP address 7 1 2 DNS Server Address A DNS Domain Name System server maps domain names like www zyxel com to their corresponding IP addresses 204 217 0 2 in the case of www zyxel com This lets you use domain names to access web sites without having to know their IP addresses The NSA can receive the IP address of a DNS server automatically along with the NSA s own IP address You can also manually enter a DNS server IP address in the NSA 7 2 Network Config Screen Click Network in the navigation panel to open the following screen Use this screen to have the NSA use a dynamic or static IP address subnet mask default gateway and DNS servers BS If you change the NSA s IP address you need to log in again after you apply changes NSA 220 User s Guide Chapter 7 Network Screen Figure 44 Network gt Network Config Network Config IP Address
9. Figure 10 My NSA Share Browsing Password Administration Share Browsing VA Current location public SUUST Syy AMANTE A Up One Level L3 20071 5 14 47 16 2007 01 05 15 00 22 The following table describes the labels in this screen Table 4 My NSA Share Browsing LABEL DESCRIPTION Current location This is the name of the share and folder path that you are in Type The icon in this column identifies the entry as a folder or a file The folder with an arrow pointing up is for the link that takes you to the next higher layer in the share s folder tree File Name This column identifies the names of folders and files in the share Click Up One Level to go to the next higher layer in the share s folder tree Click a file s file name to open the file Click a folder s name to display the folder s contents Size This column displays a file s size in bytes Modified Date This column displays the last time the file or folder was changed in year month day hour minute second format 2 5 2 My NSA Management Overview Screen Use the My NSA management overview screens to see and configure share management details Click My NSA and then the Manage It button of one of your shares to open the following screen This screen displays a share s management details NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 11 My NSA Management Overview
10. Publish this share to Select this option to make the share s files available to media clients Media Server Apply Click this button to save your changes back to the NSA Cancel Click this button to begin configuring this screen afresh 2 5 4 Share and Folder Names The name can only contain the following characters Alphanumeric A z 0 9 and Unicode The NSA allows FTP access to shares folders or files with names encoded in the UTF 8 8 bit UCS Unicode Transformation Format format So your FTP client must support UTF 8 in order to access shares folders or files on the NSA with Unicode names Spaces e underscores periods dashes Other limitations include All leading and trailing spaces are removed automatically Multiple spaces within names are converted to a single space Share names must be unique they cannot be the same as other share names The NSA creates automatic volume names for external USB disk volumes These are a type of share so the share name you configure cannot conflict with the external USB disk volume names ExtVol1 or ExtVol2 are examples of external USB disk volume names Folder names must be unique they cannot be the same as other folder names The minimum character length of a name is one character that is a name cannot be blank The maximum character length of share name is 255 characters Unicode is supported for share names althou
11. 506 2017878 Fax 506 2015098 Web Site www zyxel co cr FTP Site ftp zyxel co cr Regular Mail ZyXEL Costa Rica Plaza Roble Escaz Etapa El Patio Tercer Piso San Jos Costa Rica Czech Republic E mail info cz zyxel com Telephone 420 241 091 350 Fax 420 241 091 359 Web Site www zyxel cz Regular Mail ZyXEL Communications Czech s r o Modransk 621 143 01 Praha 4 Modrany Cesk Republika NSA 220 User s Guide Appendix F Customer Support Denmark Support E mail support zyxel dk Sales E mail sales zyxel dk Telephone 45 39 55 07 00 Fax 45 39 55 07 07 Web Site www zyxel dk Regular Mail ZyXEL Communications A S Columbusvej 2860 Soeborg Denmark Finland Support E mail support zyxel fi Sales E mail sales zyxel fi Telephone 358 9 4780 8411 Fax 358 9 4780 8448 Web Site www zyxel fi Regular Mail ZyXEL Communications Oy Malminkaari 10 00700 Helsinki Finland France E mail info zyxel fr Telephone 33 4 72 52 97 97 Fax 33 4 72 52 19 20 Web Site www zyxel fr Regular Mail ZyXEL France 1 rue des Vergers Bat 1 C 69760 Limonest France Germany Support E mail support zyxel de Sales E mail sales zyxel de Telephone 49 2405 690969 Fax 49 2405 6909 99 Web Site www zyxel de Regular Mail ZyXEL Deutschland GmbH Adenauerstr 20 A2 D 52146 Wuerselen Germany Hungary Support E mail support zyxel hu Sales E mail inf
12. Manage it Manage it 2 Click Users to open the Users screen Then click Create a New Account NSA 220 User s Guide Chapter 3 Tutorials Figure 17 Users Accounts List Se Create a New Account Nsacezu System Setting Storage Network Config ork Apps gt Account Type Used Space TE MES i Logout 3 Configure the screen as follows and write down the username and password to give to Jimmy If the username and password are the same as Jimmy s Windows login Jimmy will not need to enter a username and password when he logs into his share from his computer Set the Account Type to User so Jimmy doesn t get to configure the whole NSA Click Apply to create the account Figure 18 Users gt Create Example New Account Account Mame immy Password F Password Confirm fr Account Type C Administrator user Qq Note With an administrator account you can Create Change and Delete accounts make system wide changes Apply Cancel 4 The account now displays in the Users screen Figure 19 Users Account Created Users Accounts List Create a New Account amp admin Jimmy E Account Type gt Used Space Now that Bob has created Jimmy s account he can go through the steps again to create another account for Kevin After both accounts are created he can go to Section 3 3 on page 44 to
13. Obtain an IP address automatically Use the following IP address IP Address 72 IP Subnet Mask 2552 Default Gateway 722 4 DNS Server Obtain DNS server address automatically Use the following DNS server addresses Primary DNS Server 1722 2 Secondary DNS mss3 Server Apply Cancel The following table describes the labels in this screen Table 23 Network Config gt Network Config LABEL DESCRIPTION IP Address Obtain an IP Select this option to have the NSA get IP address information automatically address If no IP address information is assigned the NSA uses Auto IP to assign itself an automatically IP address and subnet mask For example you could connect the NSA directly to your computer If the computer is also set to get an IP address automatically the computer and the NSA will choose addresses for themselves and be able to communicate Use Fixed IP Select this option for the NSA to use fixed TCP IP information You must fill in the Address following fields IP Address Type an IP address in this field IP Subnet Type an IP subnet mask in this field Mask Default Type a default gateway address in this field Gateway DNS DNS Domain Name System is for mapping a domain name to its corresponding IP address and vice versa If you have the IP address es of the DNS server s enter them Obtain DNS Select the option to have the NSA get a DNS server address
14. This icon represents a Healthy disk Click the Scan Disk icon to scan a hard disk for file system errors Click the Eject icon before you remove an external hard drive so that you do not lose data that is being transferred to or from that hard drive Click the Locate icon to cause the LED on the external storage device to blink m u ia m Click the Repair icon to resychronize a RAID volume after you replace a faulty hard disk NSA 220 User s Guide Tutorials This chapter provides tutorials that show how to use the NSA 3 1 Tutorials Introduction The following tutorials cover how you use the NSA for file sharing This chapter assumes you have already followed the Quick Start Guide instructions to perform initial setup and configuration so you have a working volume See the Quick Start Guide for how to play media files using the included DLNA compliant media client software See the rest of this User s Guide for details on configuring the NSA s various screens 3 2 Creating a User Account Bob wants to create accounts for his sons Jimmy and Kevin This is how he would do it 1 Log into the NSA web configurator see Section 2 3 on page 30 and click Administration to go to the configuration screens Figure 16 My NSA ZyXEL My NSA Password Administration ATTA Pid My Own Shares Anis Te Stry AMM aNCe g is E Ee public video photo music Manage it Manage it
15. All leading and trailing spaces are removed automatically Multiple spaces within names are converted to a single space Usernames are case insensitive The username cannot be the same no matter the letter case as an existing user For example if a user exists with the name BOB you cannot create a user named bob If you enter a user bob but use BOB when connecting via CIFS or FTP it will use the account settings used for bob The username cannot be the same as a system username such as ANONYMOUS CIES ANONYMOUS FTP EVERYONE nor be the same as an existing user Other reserved usernames that are not allowed are bin daemon ftp anonymous ftp nobody root pc guest admin password 9 4 Change Password Screen Go to the Users screen and select a user account then click Change Password to modify the account s password Figure 49 Users gt Change Password Change Password New Password Password Confirm Caution Please keep a record of your new password whenever you change it The system will lock you out if you have forgotten your password Apply Cancel NSA 220 User s Guide Chapter 9 Users The following table describes the labels in this screen Table 29 Users gt Change Password LABEL DESCRIPTION Create a new password for this user You can type from one to 14 single byte no Chinese characters allowed for example ASCII characters See Section 9 3 2 o
16. EXT2 Older file system EXT3 The same as EXT2 but adds a journaled file system and is more robust ReiserFS Offers better performance for small files Apply Click this button to save your changes back to the NSA and create the volume Cancel Click this button to begin configuring this screen afresh 6 9 Editing an External Volume Click an external USB volume s Edit icon in the Volume screen as shown in Figure 38 on page 61 to change the external disk drive volume s name NSA 220 User s Guide Chapter 6 Storage Screens Figure 43 Edit an External Volume Volume Properties Volume Name Type File System Capacity Extvol External Volume vfat 0 64 KB Used 244 MB Total 10095 Free Apply Cancel The following table describes the labels in this screen Table 22 Edit an External Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 32 single byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing external volume Type This displays External Volume indicating that the volume is on an external device connected to a NSA USB port File System Capacity This field shows total disk size the percentage of the volume being used and the percentage that is available Apply Click this button to save your changes back to the NSA and create the volume
17. Unless You explicitly state otherwise any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License without any additional terms or conditions Notwithstanding the above nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions 6 Trademarks This License does not grant permission to use the trade names trademarks service marks or product names of the Licensor except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file 7 Disclaimer of Warranty Unless required by applicable law or agreed to in writing Licensor provides the Work and each Contributor provides its Contributions on an AS IS BASIS WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND either express or implied including without limitation any warranties or conditions of TITLE NON INFRINGEMENT MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License 8 Limitation of Liability In no event and under no legal theory whether in tort including negligence contract or otherwise unless required by applicable law such as deliberate and grossly negligen
18. and to permit persons to whom the Software is furnished to do so subject to the following conditions NSA 220 User s Guide Appendix D Open Source Licences The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE NOTE Some components of the NSA incorporate source code covered under the Apache License GPL License LGPL License BSD License Open SSL License OpenLDAP License PHP License and MIT License To obtain the source code covered under those Licenses please contact ZyXEL Communications Corporation at ZyXEL Technical Support End User License Agreement for NSA WARNING ZyXEL Communications Corp IS WILLING TO LICENSE THE ENCLOSED SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM IF YOU DO NOT AGREE
19. distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License 7 If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies NSA 220 User s Guide Appendix D Open Source Licences directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of
20. hard disks instead of one This provides 100 data redundancy as if one disk fails the other has the duplicated data Mirroring setups always require an even number of drives Duplexing Like in mirroring all data is duplicated onto two distinct physical hard drives but in addition it also duplicates the hardware that controls the two hard drives one of the drives would be connected to one adapter and the other to a second adapter Striping Striping is the breaking up of data and storing different data pieces on each of the drives in an array This allows faster reading and writing as it can be done simultaneously across disks Striping can be done at the byte level or in blocks Byte level striping means that the first byte of the file is sent to the first drive then the second to the second drive and so on Block level striping means that each file is split into blocks of a certain size and those are distributed to the various drives The size of the blocks used is also called the stripe size or block size Parity In mirroring 5096 of the drives in the array are reserved for duplicate data Parity is another way to allow data recovery in the event of disk failure using calculations rather than duplicating the data If you have n pieces of data parity computes an extra piece of data The n 1 pieces of data are stored on n 1 drives If you lose any one of the n 1 pieces of data you can recreate it from the n that
21. 52 W warranty 182 period 182 web browsers supported 124 web configurator 29 browsers 29 logout 32 40 web help 40 web help icon 32 Z ZyXEL Communications Corporation 181 ZyXEL Limited Warranty Note 182 BSD 168 NSA 220 User s Guide Index NSA 220 User s Guide
22. Apply 4 Select the new folder and click Apply NSA 220 User s Guide Chapter 3 Tutorials Figure 23 Shares gt Create gt Browse gt New Folder Example Share Browser Current location Jimmy admin C music C photo video C public Create Folder Back Apply 5 Configure the screen as follows and click Apply Figure 24 Shares Create Example Share Properties Share Name Volume z ee Path immy Make this share owned by admin x Share Access C Keep it private to owner C Make it public Advanced ce EN C Cc admin OI Jimmy OI e C Kevin C e anonymous ftp Cc e e Publish this share to Media Server Apply Cancel Now that Bob has created Jimmy s share he can go through the steps again to create another share for Kevin Then he can see the rest of the tutorials for how to use the shares 3 4 Accessing a Share From Windows Explorer If you map a NSA share where data is stored to a Windows network drive you can use Windows Explorer to transfer files to and from the NSA as if it was another folder on your computer In this example Bob has already installed the NDU on Jimmy s computer see the Quick Start Guide for details Here he maps Jimmy s share to Jimmy s computer 1 Start Windows Explorer and click Tools Map Network Drive Figure 25 NSA Top Level File Edit View Favorites Tools Help daBack gt Ase M
23. CIFS or FTP to upload files see Section 3 4 on page 46 and Section 3 5 on page 48 4 Click the logout icon when your are done see Table 2 on page 32 NSA 220 User s Guide Status Screen This chapter introduces the NSA Status screen 4 1 Status Screen The Status screen is the first main web configurator screen you see after you log in to the administrator screens To view the status screens click Status on the top left of the navigation panel Figure 34 Status Language English it Status System Information Server Name nsa220 Model Name NSA 220 Firmware Version V1 0 0 AFB 0 a0 8 2n 02 05 07 MAC Address 00 13 49 FB 99 16 Network Media Server Status Enabled Applications FTP Server Status Enabled NSA 220 4 System Setting Storage Users Shares Maintenance Logout 0 1 no volume name Healthy 111 GB Total 100 Free 0 32 MB Used no volume name Healthy 76 GB Total 100 Free External Volume There are no external volumes on the system to display Message NSA 220 User s Guide Chapter 4 Status Screen The following table describes the labels in this screen Table 11 Status LABEL DESCRIPTION Status Click Status to refresh the status screen statistics System Information Server Name This displays the name which helps you find the NSA on the network Click the edit icon to go to the screen where
24. CJ admin File Folder 1 18 2007 6 23 AM Jimmy File Folder 1 22 2007 7 43 AM nsa220 C music File Folder 1 18 2007 6 23 AM I photo File Folder 1 18 2007 6 23 AM Server nsa220 CI public File Folder 1 18 2007 6 23 AM User Name Jimmy video File Folder 1 18 2007 6 27 AM Click here to learn about browsing FTP sites 3 6 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator 1 Log into the NSA web configurator see Section 2 3 on page 30 using your username and password Figure 32 My NSA User Login ZyXEL Wwe i e My NSA Password Administration Il My NSA x X d EC S n N an My Own Shares Mua LW OT tryg There are no my own shares on the system Amante Other Shares public video photo music Jimmy 2 Click a share to see the top level of the share s contents Here is the Jimmy share NSA 220 User s Guide Chapter 3 Tutorials Figure 33 My NSA User Login ZyXEL Es ee My NSA Password Administration e Ba Share Browsing VULT p Current location Jimmy iuda Ta WOT Kast ursa poante Up One Level L3 wMv 20P 2007 01 24 16 39 22 5 The Magic of Flight 1080 wmv 129228341 2007 01 24 16 39 36 3 Click a folder s file name to browse the folder You can open files or copy them to your computer However at the time of writing you cannot use the web configurator to upload files to the NSA use
25. ER AR E Ec FaE CER ER tds DRE pU inate LORD AIME HIN E UG prat bid E DH E GU H d MEAE 11 E fad i fT een Te re 17 IEEE ELSE ET ET OTT S T T UE 21 Part l Introduction MR IT 23 Chapter 1 Getting to Know Your NSA iciscssiccsissentortennssesiantavevievacranreicasentensctenroutesiisontontesontesiatnaxantavententis 25 TINSA CNBIVESWE ca i ct si o ue Pa e o dL abd eed a epe ee rop det tabe ede cas adele ala eod uada 25 SN EIS e 26 ECR a e ON RT TE 28 Chapter 2 Wep Confidgurator Basile iriiria ICE XREEMMQUEOX EE ARE ANNANN 29 coy UR LI E UU T M 29 2 2 Accessing te NSA Web Configurator e 29 2 2 1 PECESS ihe NSA Via NDU sisirin Able Moe Rb b nisl C ka bc Rp Fac ba kau 29 2 2 2 ub Browser CUBES iind In EMI Minen MM PR MEN 30 2 Len sas etr ewes eal bed Du tos cb d Ocio can iP pr vinci i dna 30 24 UserAeovel Screens OvetwibW ecce cie tecti etre nb Lua abi Leid ed a Lupa tan Pa pa a o aid ud 31 2 0 My Ec e 33 2 5 1 My NSA Share Browsing SEPBTI Lusccsstko ppt ta nba IR HEROS ERE RAF ERU Pu 2 1E Y REN A44 SUPR LA 34 2 5 2 My NSA Management Overview Screen ccccsscccceressecrcceeessnesseeeeeteeneceeseneeasanenseee 34 2 5 3 My NSA Change Share Properties Screen eeeeeeseeeesckei sene enhanced 35 2 54 share and Folder NES 1 o ebd eaa ik Lerma edo ac pai ka und a
26. If you link other code with the library you must provide complete object files to the recipients so that they can re link them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder Therefore we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license Most GNU software including some libraries is covered by the ordinary GNU General Public License This license the GNU Lesser General Public License applies to certain designated libraries and is quite different from the ordinary General Public License We use t
27. Licences Original SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free for commercial and non commercial use as long as the following conditions are adhered to The following conditions apply to all code found in this distribution be it the RC4 RSA Ihash DES etc code not just the SSL code The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson tjh cryptsoft com Copyright remains Eric Young s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be given attribution as the author of the parts of the library used This can be in the form of a textual message at program startup or in documentation online or textual provided with the package Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided wi
28. License In other cases permission to use a particular library in non free programs enables a greater number of people to use a large body of free software For example permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library The precise terms and conditions for copying distribution and modification follow Pay close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License also called this License Each licensee is addressed as you A library means a collection of software functions and or data prepared so as to be conveniently linked with application programs which
29. Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other authors who decide to use it You can use it too but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case based on the explanations below When we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service 1f you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it For example if you distribute copies of the library whether gratis or for a fee you must give the recipients all the rights that we gave you You must make sure that they too receive or can get the source code
30. T TI m UL 51 Status System Storage and Network esee 55 austem sad TONS a tempia tbe ke aa MER PON Mele ERU E a nor d b t Hac Fa 57 Sore Aee E 61 Network SORER a ics ENA d mes 73 ZION Serce NS uraania aa aaa aa aAa lon a a a ia 77 User Accounts and Shares iuscosisutikitie este ea a a o aia 81 USEE S ana a a ea tU Dr E Da EAE AEA A AEA Ei 83 S A E A E A ET 89 Protection Media Client Maintenance amp Troubleshooting 95 Maintenance DOCENS sorrienni Ri er be R a AR HM Ea RET A UN EEUU 97 uror ia 105 Media Client SIWA iatesix deir Ut nie ana rE EEE 107 Memeo Autobackup SOFBWEE 2a isssic ieenevicivese aqu ienn aeania E EUER El a A tas QU ENR 109 TN cate id aa tie Va nde tanec tapa cepe d elu a NEM aa Uri uf Sahin 111 Appendices and IWelegx 2 cc iai pha en kuono Khan Kna no Khu RO Ln RRRKRERO EXERRUKRS AULAE i era aaa Naoha dihina 119 NSA 220 User s Guide 9 Contents Overview NSA 220 User s Guide Table of Contents Table of Contents About This Usb s CUIUS uico scan csc MEER EE ERE nasa DE Fe RE OR CERE RH X ROV RE EE SRM SINUM RO Gr M AL RGME 3 Document Convo nioi e cud kTaXEEGe ket HORE QUK ON XR GR E CTRUA ras OR FA RRR RE FUXR S EAXR GRO RGA NER IS Ru UV TER VETE 4 Safety rl ce E S 6 Contents QUBIVIBU uos Ie Pa RYE Kou TE Tu ED RAPRKTUEFGA ME OR UM GUXM EIE CIR A GER CEVe UC M D S TRIN GER O LM UO VM EDU KM 9 Table pF CONO cacao fepe ni coU
31. The Initial Developer Grant NSA 220 User s Guide Appendix D Open Source Licences The Initial Developer hereby grants You a world wide royalty free non exclusive license subject to third party intellectual property claims under intellectual property rights other than patent or trademark Licensable by Initial Developer to use reproduce modify display perform sublicense and distribute the Original Code or portions thereof with or without Modifications and or as part of a Larger Work and under Patents Claims infringed by the making using or selling of Original Code to make have made use practice sell and offer for sale and or otherwise dispose of the Original Code or portions thereof the licenses granted in this Section 2 1 a and b are effective on the date Initial Developer first distributes Original Code under the terms of this License Notwithstanding Section 2 1 b above no patent license is granted 1 for code that You delete from the Original Code 2 separate from the Original Code or 3 for infringements caused by i the modification of the Original Code or ii the combination of the Original Code with other software or devices 2 2 Contributor Grant Subject to third party intellectual property claims each Contributor hereby grants You a world wide royalty free non exclusive license under intellectual property rights other than patent or trademark Licensable by Contributor to use reproduce m
32. You alone not by the Initial Developer or any Contributor You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer 3 7 Larger Works You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product In such a case You must make sure the requirements of this License are fulfilled for the Covered Code 4 Inability to Comply Due to Statute or Regulation If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute judicial order or regulation then You must a comply with the terms of this License to the maximum extent possible and b describe the limitations and the code they affect Such description must be included in the legal file described in Section 3 4 and must be included with all distributions of the Source Code Except to the extent prohibited by statute or regulation such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it 5 Application of this License This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code 6 Versions of the License 6 1 New Versions Netscape Communications Corporation Nets
33. advisable to create a configuration backup file If things go wrong after you make the configuration changes you can always go back to the previous configuration by restoring an earlier configuration file If you forgot the NSA password then reset the device to go back to the factory default configuration NSA 220 User s Guide Chapter 12 Protecting Your Data BS Configuration File Backup and Restoration does not affect data your files and folders volumes on the NSA 12 1 2 Memeo Autobackup Use the Memeo Autobackup software included on the CD on your computer to schedule and manage backups You can backup from your computer to the NSA You can also backup from one NSA on your network to another You can set the Memeo Autobackup software to automatically back up files from your computer to the NSA whenever you modify the files The Memeo Autobackup program uses the same network port as the NDU to discover the NSA To avoid a port conflict do not run the Memeo Autobackup program at the same time as the NDU NSA 220 User s Guide Media Client Software This chapter introduces the media client software included on the CD 13 1 Media Client Introduction The NSA can function as a server to allow DLNA Digital Living Network Alliance compliant media clients to play files The DLNA is a group of leading personal computer and electronics companies that works to make products compatible and able to work i
34. and trade secret law and by international treaty provisions All rights not granted to you herein are expressly reserved by ZyXEL You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation NSA 220 User s Guide Appendix D Open Source Licences 4 Restrictions You may not publish display disclose sell rent lease modify store loan distribute or create derivative works of the Software or any part thereof You may not assign sublicense convey or otherwise transfer pledge as security or otherwise encumber the rights and licenses granted hereunder with respect to the Software You may not copy reverse engineer decompile reverse compile translate adapt or disassemble the Software or any part thereof nor shall you attempt to create the source code from the object code for the Software You may not market co brand private label or otherwise permit third parties to link to the Software or any part thereof You may not use the Software or any part thereof in the operation of a service bureau or for the benefit of any other person or entity You may not cause assist or permit any third party to do any of the foregoing 5 Confidentiality You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentia
35. believed to be a consequence of the rest of this License 12 If the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the Free Software Foundation 14 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write
36. can see the status of a volume in the Status Storage gt Overview or Storage gt Volume screens The NSA has the following classifications for the status of a volume Healthy if all disks in the volume are OK and the file system is functioning properly OK means your USB disk was formatted as NTFS It is read only for the NSA Resyne when you create or repair a RAID volume Degraded when a volume is currently down but can be fixed Data access may be slower from a degraded volume so it s recommended that you replace the faulty disk and repair the volume as soon as you can Inactive when a disk is missing from a RAID 0 volume or a two disk JBOD volume The volume is unusable If you removed one of the disks you should be able to re install it and use the volume again as long as you did not change anything on the disk If a disk has failed you need to replace it and re create the whole volume All data will be lost See page 112 for how to install or replace a hard drive Down when a volume is down and can not be fixed A down RAID volume cannot be used until you repair or replace the faulty disk s in the volume Degraded means one of the disks in the RAID volume is not available but the volume can still be used For a degraded volume you should replace the faulty disk as soon as possible to obtain previous performance See your Quick Start Guide for more information on replacing a disk If it s down then the only indica
37. device NSA Computer Notebook computer EH C R E m Ez N Server Television Firewall 27222 E E Switch lt NSA 220 User s Guide Safety Warnings Safety Warnings gt For your safety be sure to read and follow all warning notices and instructions Do NOT use this product near water for example in a wet basement or near a swimming pool Do NOT expose your device to dampness dust or corrosive liquids Do NOT store things on the device Do NOT install use or service this device during a thunderstorm There is a remote risk of electric shock from lightning Connect ONLY suitable accessories to the device Do NOT open the device or unit Opening or removing covers can expose you to dangerous high voltage points or other risks ONLY qualified service personnel should service or disassemble this device Please contact your vendor for further information e ONLY qualified service personnel should service or disassemble this device e Make sure to connect the cables to the correct ports Place connecting cables carefully so that no one will step on them or stumble over them e Always disconnect all cables from this device before servicing or disassembling e Use ONLY an appropriate power adaptor or cord for your device e Connect the power adaptor or cord to the right supply voltage for example 110V AC in North America or 230V AC in Europe
38. eta 145 Figure ao Pop Up Blocker DENIS e cau iba em iet ee Epp ar bbetetesbulat eee tial etu alat ke up oe e RPRIEI MERE 145 Figure 87 Internet Options GOCGHFIDV 1aaseeeeeeaas ses etthaseicctpbe se a FERES ERE EE APER S2 EVE ER OUAA 146 Figure 88 Securty Settings Java Scripting sueuasoccnesrat etse bd ik RR bk RR Da REA Id PR E bane 147 isi BS Security SANGS daya nnana S A 147 Fous oda U eoa G Udo M nen dou ad me UM 148 Figure 91 Mozilla Firefox Tools gt ODIOS iiie seien rei FR tnn kid ttn Ra Eh d gau ERR a aa d 148 Figure 92 Mozilla Firefox Content SOGUT iios eoa erasa rait rpt eara epp nerna Er EE EE 149 NSA 220 User s Guide List of Figures NSA 220 User s Guide List of Tables List of Tables TOOT LED mec D Ct ER ES 27 Table 2 User level Global Labels and ICONS ssssssssssssssssesseeeee nennen nnne 32 E RINGA e 33 I A didi M 34 Table 5 My NSA Management Cera LocssactcpssissxtrbeE RR eurreN QUA FEAR EE KE PUR OEHR EA 35 Table 6 My NSA Change Share Properties uisssensseuiixri kenne diria asta divr sensiacuessvaxtqoudssrncondsincneonundecate 36 Aie FIFE cuscusopxcsdviiiepa t odabun a bsp tema nda anata be OMA Ta Rudd 39 Table 6 Global Labels and leone Rete me 40 TOO Soroa QUITE uursLrcsusutp rcr idt Hadas u pet sasmennusrsdtelannsasauannntrsaeanbogssesnnnonastaaniunesianaunesseannnnnssds 41 Table 10 Common Configuration Screen IO
39. i n 45 Figure 21 Shares Create Ean dT 45 Figure 22 Shares Create gt Browse gt Create Folder Example 2 eiae bacis ceteri eddie toit 45 Figure 23 Shares gt Create gt Browse gt New Folder Example cc ccccssssecceceeeeeeeceeeeseeecaeenenseeaes 46 go c lrnuccppe iqe cg Serm 46 Figure 25 NSA TOD LVS drisean Ds PArUASSRSEP LASS RM A GR RA ISAA NER AS oman RUOARS 46 Figure 26 Map Network EEG iusso ecciesie re Elea e ER ERE na EXE HR RRRA TERI RR DA QUALEM UC DAE DRRU APUL ERE 47 Figure 27 Enter Network Password M G X X 47 Figure 28 Example Share Mapped Folders View ccccsecccccesssecaccesesseeseceneseceeedenseeseeseneseseseeennseaes 47 Figure 29 FTF Example Typing the FIP largat i ucsscerniettete viet obo Etat etate ducet eb RE Hb PP EXER br buA 48 Figure 30 F TP Example Enter the Password scssccnsqicssasc esetee etes teteee bct iaire pL Libre aea IE IERI sap pC coamreneens 48 Figure 31 FIF Esample Logged IM oT TT T 49 Figure 32 My NSA User LOJI serisinin niet eas haat nda 49 Figure a My NSA Le LOS 2 5 ipe ar ER a ad pel x o Ert ona er bis P rrr tre Pentre pete ere ate rye TTT re 50 FIOUr OO OMNE anco incall retur ans teta oe ca Tihs aati ese o as td il AE Ore ond gta taeda Ea 51 Figure 35 Session Example VWWINGOWS m 53 Figure 26 System Setting gt Server NANG L iiusassseceei sepeee ets ertet Rep
40. its release under this License is not already Covered Code governed by this License 1 10 1 Patent Claims means any patent claim s now owned or hereafter acquired including without limitation method process and apparatus claims in any patent Licensable by grantor 1 11 Source Code means the preferred form of the Covered Code for making modifications to it including all modules it contains plus any associated interface definition files scripts used to control compilation and installation of an Executable or source code differential comparisons against either the Original Code or another well known available Covered Code of the Contributor s choice The Source Code can be in a compressed or archival form provided the appropriate decompression or de archiving software is widely available for no charge 1 12 You or Your means an individual or a legal entity exercising rights under and complying with all of the terms of this License or a future version of this License issued under Section 6 1 For legal entities You includes any entity which controls is controlled by or is under common control with You For purposes of this definition control means a the power direct or indirect to cause the direction or management of such entity whether by contract or otherwise or b ownership of more than fifty percent 5096 of the outstanding shares or beneficial ownership of such entity 2 Source Code License 2 1
41. itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License NSA 220 User s Guide Appendix D Open Source Licences 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you
42. may distribute the object code for the work under the terms of Section 6 Any executables containing that work also fall under Section 6 whether or not they are linked directly with the Library itself 6 As an exception to the Sections above you may also combine or link a work that uses the Library with the Library to produce a work containing portions of the Library and distribute that work under terms of your choice provided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License You must supply a copy of this License If the work during execution displays copyright notices you must include the copyright notice for the Library among them as well as a reference directing the user to the copy of this License Also you must do one of these things a Accompany the work with the complete corresponding machine readable source code for the Library including whatever changes were used in the work which must be distributed under Sections 1 and 2 above and if the work 1s an executable linked with the Library with the complete machine readable work that uses the Library as object code and or source code so that the user can modify the Library and then relent to produce a modified executable containing the modified Li
43. or otherwise or ii ownership of fifty percent 50 or more of the outstanding shares or iii beneficial ownership of such entity You or Your shall mean an individual or Legal Entity exercising permissions granted by this License Source form shall mean the preferred form for making modifications including but not limited to software source code documentation source and configuration files Object form shall mean any form resulting from mechanical transformation or translation of a Source form including but not limited to compiled object code generated documentation and conversions to other media types Work shall mean the work of authorship whether in Source or Object form made available under the License as indicated by a copyright notice that is included in or attached to the work NSA 220 User s Guide an example is provided in the Appendix below Appendix D Open Source Licences Derivative Works shall mean any work whether in Source or Object form that 1s based on or derived from the Work and for which the editorial revisions annotations elaborations or other modifications represent as a whole an original work of authorship For the purposes of this License Derivative Works shall not include works that remain separable from or merely link or bind by name to the interfaces of the Work and Derivative Works thereof Contribution shall mean any work of authorship including the or
44. policy Blocks third party cookies that use personally identifiable CJ information without your implicit consent Restricts first party cookies that use personally identifiable information without implicit consent Pop up Blocker Prevent most pop up windows from appearing Block pop ups 3 Click Apply to save this setting Enable pop up Blockers with Exceptions Alternatively if you only want to allow pop up windows from your device see the following steps 1 In Internet Explorer select Tools Internet Options and then the Privacy tab 2 Select Settings to open the Pop up Blocker Settings screen NSA 220 User s Guide Appendix C Pop up Windows Figure 85 Internet Options Privacy Internet Options 3 A General Security Privacy Content Connections Programs Advanced Settings Move the slider to select a privacy setting for the Internet MER zone Medium privacy policy Blocks third party cookies that use personally identifiable Cc information without your implicit consent Restricts first party cookies that use personally identifiable information without implicit consent Blocks third party cookies that do not have a compact Pop up Blocker Prevent most pop up windows from appearing 3 Type the IP address of your device the web page that you do not want to have blocked with the prefix http For example http 192 168 167 1 4
45. provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Library or any portion of it thus forming a work based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a software library b You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change c You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License d If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility other than as an argument passed when the facility is invoked then you must make a good faith effort to ensure that in the event an application does not supply such function or table the facility still operates and performs whatever part of its purpose remains meaningful For example a function in a library to compute square roots has a pu
46. pud i e pA NM Lid idu 71 Chapter 7 Network SOFBO ase vein isi tosta duct es er a love ota dated S QE a ad eed 73 T1 Nelwork SOMOS Me 73 T2123 IP AER 21 920 a Eo reseed ad esa a aaa La pb edd 73 Ihe DNS Saar AUdOSS crnka ER oe Gee 73 Fe DEE Cong cr M 73 Chapter 8 POPC ARON SCPE GINS aiaiai ai naaa ekan dare AAAA E iah REANA NENTEN 77 S TAPPI CA OTOES E EN om 77 OP TP e aaa n T7 a aa E E E E NT ETE AO VENE E ATEA E OOA AT EE T E A EN 77 Ga Medo SEIVIE aa a N MR EM 78 S S Medi ener oCo Osaa A A 79 Part Ill User Accounts and Shares esses eere 81 Chapter 9 TEENS TOU BEER 83 91 User Accounts pies 1157 METRE TETUR 83 uu Users DUorsiou SOIN ussiaicndin ene iri EE M M REN NM PME RME 83 OR ARE Iq rl mE 84 9 3 Adding or Editing a User ACCOUNT cios eded en dad cce eph qadua i knaar eio a dade Pra adi Eaa Gap 85 9 3 1 Add or Edita User ACCOUNT Sore eisisesresesiaicc uta ae eee Eie ap EE AEEVLPS E EE LEY TVSUP AP GEM EEUU LADE 85 CEOMAMNUCIQLIQ I AM M 85 24 Change Password SOO Me CT 86 9 5 Delete ere Eri RP s 87 Chapter 10 el Ii EIL UI EI IIT 89 NSA 220 User s Guide 13 Table of Contents 101 Shares Ip BHOe RO iecore HO RA EU ARR EXE HERE ERR a E A E Ya e o tax pid 89 TU T 1 29D S e cents cp uci ENEE eo bib ul ca pA A UR PRTAL Extat n Ere Ou T E eU E sU M d Otra ERG AT aU
47. remain regardless of which piece is NSA 220 User s Guide Chapter 6 Storage Screens BS lost Parity protection is used with striping and the n pieces of data are typically the blocks or bytes distributed across the drives in the array The parity information can either be stored on a separate dedicated drive or be mixed with the data across all the drives in the array In the following figures A1 A2 A3 and so on are blocks of data from the A file Similarly B1 B2 B3 and C1 C2 C3 ar blocks of data from the B and C files 6 4 1 JBOD JBOD allows you to combine multiple physical disk drives into a single virtual one so they appear as a single large disk JBOD can be used to turn multiple different sized drives into one big drive For example JBOD could convert 80 GB and 100 GB drives into one large logical drive of 180 GB If you have two JBOD volumes with one disk in each a failure of one disk volume should not affect the other volume disk JBOD read performance is not as good as RAID as only one disk can be read at a time and they must be read sequentially The following figure shows disks in a single JBOD volume Data is not written across disks but written sequentially to each disk until it s full Table 16 JBOD 6 4 2 RAID 0 RAID 0 spreads data evenly across two or more disks data striping with no mirroring nor parity for data redundancy so if one disk fails the entire volu
48. returned Postage Prepaid It is recommended that the unit be insured when shipped Any returned products without proof of purchase or those with an out dated warranty will be repaired or replaced at the discretion of ZyXEL and the customer will be billed for parts and labor All repaired or replaced products will be shipped by ZyXEL to the corresponding return address Postage Paid This warranty gives you specific legal rights and you may also have other rights that vary from country to country Registration Register your product online to receive e mail notices of firmware upgrades and information at www zyxel com for global products or at www us zyxel com for North American products NSA 220 User s Guide Customer Support Please have the following information ready when you contact customer support Required Information Product model and serial number Warranty Information Date that you received your device Brief description of the problem and the steps you took to solve it Corporate Headquarters Worldwide Support E mail support zyxel com tw Sales E mail sales zyxel com tw Telephone 886 3 578 3942 Fax 886 3 578 2439 Web Site www zyxel com www europe zyxel com FTP Site ftp zyxel com ftp europe zyxel com Regular Mail ZyXEL Communications Corp 6 Innovation Road II Science Park Hsinchu 300 Taiwan Costa Rica Support E mail soporte zyxel co cr Sales E mail sales zyxel co cr Telephone
49. the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that re distributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must b
50. the volumes and the users who are currently using the NSA System Setting Server Name Use this screen to specify the NSA s server name and workgroup name Date Time Date amp Time Use this screen to chose a time zone and or allow the NSA to synchronize with a time server Storage Storage Use this screen to view volume and disk information You can also create and edit volumes A volume is a storage area that can span one or more internal disks or a single external USB disk Network Network Use this screen to assign the NSA a dynamic or static IP address Config and DNS information Applications FTP Use this screen to enable FTP file transfer to from the NSA set the number of FTP connections allowed and an FTP idle timeout Media Server Use this screen to enable or disable the media server and select which shares to publish share with medial clients Users Users Use this screen to view create and edit administrator and user accounts to let people use the NSA Shares Shares Use this screen to view create and edit shares Shares are shared folders to which you can allow specific users read write access rights Maintenance Log Use this screen to view the NSA s logs Configuration Use this screen to back up and or restore the NSA configuration file FW Upgrade Use this screen to upload new firmware to your NSA Shutdown Use this screen to restart the NSA or shut it down Logout Click Logout to exit the web configurator Thi
51. to owner C Make it public Advanced m f_i admin Lol C Cc anonymous ftp e C M Publish this share to Media Server Apply Cancel The following table describes the labels in the this screen Table 6 My NSA Change Share Properties LABEL DESCRIPTION Share Name Configure a name to identify this share Type a share name from 1 to 255 single byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing local share See Section 2 5 4 on page 37 for more information on share names Volume You should have already created volumes a single accessible storage area with a single file system on the NSA Select the volume that you want to use with this share Path This is the share s file path Share Access Select who can access the files in the share and how much access they are to be given Select Keep it private to owner to allow only the share owner to read files in the share delete files in the share and save files to the share Select Make it public to allow anyone with or without a user account on the NSA to read files in the share delete files in the share and save files to the share Select Advanced to select which individual users can read the share s files which users can delete the share s files and which users are blocked from doing either Username This appears when you set the Share Access to Advanced This col
52. to recover a bad sector but the LED stays orange until the NSA restarts Even if the hard drive still functions it is recommended that you replace it since errors are a sign that the hard drive may fail soon See Installing or replacing a hard drive e An HDD LED is red Red means the hard drive has failed and the NSA can no longer detect it Replace the hard drive See Installing or replacing a hard drive If you are using a RAID I volume you may still be able to use the volume but you should replace the faulty drive as soon as possible e Installing or replacing a hard drive gt Do not remove or install hard drives while the NSA is turned on The NSA must be turned off before you remove or install hard drive s 1 Turn the NSA off remove the rear panel and the drive tray and make sure there is a SATA I or SATA 3 0 Gbit s compatible hard drive installed the hard drive is installed correctly in the drive tray Push the tray back into NSA drive bay until the screw hole at the top of the drive tray is flush with the drive bay see the NSA Quick Start Guide and Section 6 5 2 on page 68 the hard drive could be faulty Try a different hard drive or test the original hard drive in a different NSA or computer 2 Ifyou had to replace the drive turn on the NSA and go to the Storage Setting screen f you have a RAID I volume click the Repair icon next to the new drive f you are using RAID 0 you will need to re
53. use some of those functions and data to form executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it For a library complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running a program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that 1s true depends on what the Library does and what the program that uses the Library does NSA 220 User s Guide Appendix D Open Source Licences 1 You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium
54. you can configure this Model Name This displays which model this NSA device is Firmware Version This is the NSA firmware version Click the update link to go to the Maintenance Firmware Upgrade screen from which you can upload new firmware Click the edit icon to go to the screen where you can upload new firmware MAC Address This displays the NSA s unique physical hardware address MAC You need the MAC address to register the product at myZyXEL com Customer support may also request it for troubleshooting purposes Media Server Status This shows whether the media server function is enabled or disabled It must be enabled for media clients to play content files stored on the NSA Click the edit icon to go to the screen where you can configure this FTP Server Status This shows whether the FTP server function is enabled or disabled It must be enabled to use FTP file transfer to from the NSA Click the edit icon to go to the screen where you can configure this Volume Status A volume is a storage area on a single disk or spread across a number of disks within a single file system Internal Volume This displays the volumes created on the hard drives installed in the NSA Create an Internal Volume This displays if there are no volumes created on the hard drive s installed in the NSA Click this button to create a volume See Section 6 6 on page 69 External Volume This displays
55. you want to add Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways In TCP IP Gateway Address type the IP address of the default gateway in Gateway To manually configure a default metric the number of transmission hops clear the Automatic metric check box and type a metric in Metric Click Add Repeat the previous three steps for each default gateway you want to add Click OK when finished NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 70 Windows XP Advanced TCP IP Properties Advanced TCP IP Settings IP Settings DNS WINS Options IP addresses IP address Subnet mask DHCP Enabled Default gateways Gateway Metric Automatic metric 7 Inthe Internet Protocol TCP IP Properties window the General tab in Windows XP Click Obtain DNS server address automatically if you do not know your DNS server IP address es f you know your DNS server IP address es click Use the following DNS server addresses and type them in the Preferred DNS server and Alternate DNS server fields If you have previously configured DNS servers click Advanced and then the DNS tab to order them NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 71 Windows XP Internet Protocol TCP IP Properties Internet Protocol TCP IP Properties General Alternate Configuration You can get IP settings assigned autom
56. your changes back to the NSA Cancel Click this button to begin configuring this screen afresh 2 6 Administration Screens Click Administration in the user level screens to open the advanced administration screens If you are not logged in using an administrator account you will need to log in again The Status screen is the first advanced administration screen that displays NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 14 Status ZyXEL nsa220 NSA 220 V1 0 0 AFB 0 a0 8 2n 02 05 07 00 13 49 FB 99 16 Enabled Enabled Server Name Model Name Firmware Version MAC Address Media Server Status FTP Server Status NSA 220 System Setting Storage Network Applications Users i Status 3 Sidu Gsystem Information ee EE Shares 9 volume Status d M Logout Internal Volume no volume name jbod Healthy no volume name jbod Healthy External Volume There are no external volumes on the system to display 9 Active Sessions CUSTOM ae c diski 0 5 1 GB Used 111 GB Total 100 Free Lo RU 0 disk2 0 32 MB Used 76 GB Total 100 Free admin aa Ina Web 2007 02 05 13 02 20 172 23 37 22 EUM noo 2 6 1 Global Administration Icons The icons and language label at the top right of the screen 1 are visible from most of the administratio
57. 20 User s Guide PART III User Accounts and Shares Users This chapter introduces the Users screens of the NSA 9 1 User Accounts Introduction Use the Users screens to create and manage administrator and user accounts Administrators can Configure and manage the NSA Create volumes shares and user accounts Assign individual users specific access rights for specific shares Users are people who have access rights to the NSA and can store files there for later retrieval A user can Manage shares that he owns Change his own password Access the contents of other shares to which he is given access rights 9 2 Users Overview Screen Click Users to display the screen shown next Use this screen to create and manage accounts for users who can store files on the NSA NSA 220 User s Guide Chapter 9 Users Figure 47 Users Accounts List amp admin Create a New Account A i 4 Steve St eve Account Type User Used Space 0 KB Ef Change Account Properties Bj Change Password lil Delete Account The following table describes the labels in this screen Table 26 Users LABEL DESCRIPTION Accounts List Create a New Account Click this button to open a screen where you can configure a new user account This screen lists the users configured on the NSA Click a user icon to see details about the user Accou
58. 32 managing shares 35 MDI MDI X 121 media server 107 124 configuration 107 software 107 124 status 52 Memeo AutoBackup 122 messages 42 MIT License 176 model name 40 52 Mozilla Public License 169 My NSA 32 Change Share Properties screen 35 management overview screens 34 My NSA screens 33 N navigation panel screen summary 40 NDU NSA Discovery Utility 29 network protocols 123 network security 123 NSA Discovery Utility NDU 122 NTFS 68 O OK 64 open source licences 151 Open SSL License 165 166 OpenLDAP 165 OpenLDAP Public License 165 operating humidity 123 operating temperature 123 P password 30 32 changing 38 Patent 181 path 35 36 PHP License 168 pop ups 29 power consumption 126 127 POWER LED 27 private shares 36 proof of purchase 182 public shares 36 R RAID 25 type 52 RAID file storage 122 RAID volume repair 42 Redundant Array of Independent Disks see also RAID 25 related documentation 3 remove hard drives 26 removing entries 42 removing external hard drives 42 repair icon 42 68 replacing faulty hard disks 42 reset button 121 restart 102 restrictions on folder names 37 on share names 37 on volume names 37 resychronize 42 resynch 64 NSA 220 User s Guide Index return material authorization RMA 182 rights 181 RMA 182 S safety warnings 6 SATA 25 SATA 3 0 Gbit s 25 SATA 25 scan disk icon 42 screen hyperlinks 40 screen links 40 s
59. 32 and FAT16 If your USB storage device uses a NTFS file system then the NSA can read files from it but cannot write files to it If you want to be able to write files to that storage device you need to reformat it You should back up any data on the device that you want to keep to an internal drive for example and click the Storage screen s Create an External Volume button to reformat the external hard drive You can then both read and write to that hard drive and restore your data to it Linux File Systems ReiserFS EXT2 and EXT3 6 5 2 Disk Replacement Restrictions BS See the Quick Start Guide for information on replacing disks in the NSA When replacing a disk in a degraded or down RAID volume the new disk must be at least the same size or bigger than the other disks that are already in the RAID volume so as all data in the volume can be restored For example if you have RAID with 250 GB disks you must put in a 250 GB or bigger disk as a replacement in order to restore all original data in that volume If you put a bigger disk the extra space on the disk will not be used After replacing the disk go to the Storage gt Disk page and click the Repair icon next to the new disk The NSA does not repair a disk automatically when you replace it you must click Repair 6 5 3 Disk Replacement and Volume Labels BS When you create a volume the NSA writes the volume label to the disk Deleting a volume remove
60. 4 Maintenance gt Log Log Display view All Logs 7 Refresh Purge All Logs MM sumo EP ee ee es eres erent 1 2007 01 24 09 01 55 System Info NTP update failed 2 2007 01 24 09 01 39 Users Info User admin has logged in from Web 3 2007 01 24 09 00 59 Network Notice Network Config setting is changed 4 2007 01 24 09 01 35 Services Info Clock timezone is set to GMT 0800 5 2007 01 24 09 01 35 Services Notice NTP server is set to time stdtime gov tw 6 2007 01 24 09 01 35 Services Notice The NTP service is enabled 7 2007 01 24 09 01 35 Services Notice FTP server starts 8 2007 01 24 09 01 29 System Notice DNS server address is changed to be given from DHCP server 9 2007 01 24 09 01 29 System Notice DNS server setting is changed 10 2007 01 24 09 01 18 Services Notice FTP server stops The following table describes the labels in this screen Table 35 Maintenance gt Log LABEL DESCRIPTION Refresh Click this button to update the log display Purge all Logs Click this button to erase all logs from the NSA NSA 220 User s Guide 97 Chapter 11 Maintenance Screens Table 35 Maintenance gt Log continued LABEL DESCRIPTION This is the log entry s number in the list according to the currently selected sort order Time This shows the date and time the log was created Click the top of the column to sort by oldest or newest Class This displays the log cat
61. 48 Supported Media Server Content Formats ccccccccscssessssesesecececceeecceeeeeeseeesaeaeaeaesaeasaessess 126 Table 49 Power Consumption in Watts W 4s esie teebr torrente ta saei n 127 gc 127 22 NSA 220 User s Guide PART I Introduction Getting to Know Your NSA 25 Web Configurator Basics 29 Tutorials 43 Status Screen 45 Getting to Know Your NSA This chapter covers the main features and applications of the NSA 1 1 NSA Overview The NSA Network Storage Appliance provides file sharing and data backup for your home network Use SATA Serial Advanced Technology Attachment I or 3 0 Gbit s hard disks RAID Redundant Array of Independent Disks protects your data even if a hard disk fails You can expand the NSA s storage capacity with USB devices like hard drives Use the COPY button to copy files directly to the NSA from USB devices like card readers MP3 players memory sticks and digital cameras without using a computer The NSA is a media server Media clients can play the NSA s video music and photo files Use the included media client software to make your computers into media clients You can also use hardware based media clients like the DMA 1000 The NSA has a 10 100 1000 Mbps Ethernet port for connecting to your network Figure 1 Example of the NSA in a Home Network Internet Above is the NSA in a h
62. 7a Str Moscow 117279 Russia Support E mail support zyxel es Sales E mail sales zyxel es Telephone 34 902 195 420 Fax 34 913 005 345 NSA 220 User s Guide Appendix F Customer Support Web Site www zyxel es Regular Mail ZyXEL Communications Arte 21 5 planta 28033 Madrid Spain Sweden Support E mail support zyxel se Sales E mail sales zyxel se Telephone 46 31 744 7700 Fax 46 31 744 7701 Web Site www zyxel se e Regular Mail ZyXEL Communications A S Sj porten 4 41764 G teborg Sweden Ukraine Support E mail support ua zyxel com Sales E mail sales ua zyxel com Telephone 380 44 247 69 78 Fax 380 44 494 49 32 Web Site www ua zyxel com Regular Mail ZyXEL Ukraine 13 Pimonenko Str Kiev 04050 Ukraine United Kingdom Support E mail support zyxel co uk Sales E mail sales zyxel co uk Telephone 444 1344 303044 08707 555779 UK only Fax 44 1344 303034 Web Site www zyxel co uk FTP Site ftp zyxel co uk Regular Mail ZyXEL Communications UK Ltd 11 The Courtyard Eastern Road Bracknell Berkshire RG12 2XB United Kingdom UK is the prefix number you dial to make an international telephone call NSA 220 User s Guide Index A about icon 40 accessing share contents 34 accessing the web configurator 29 administration screens 32 39 anonymous access rights 92 ANONYMOUS FTP 92 apache license 151 C cer
63. A program that contains no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a derivative work of the Library and therefore falls outside the scope of this License However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whether this is true 1s especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessories and small macros and small inline functions ten lines or less in length then the use of the object file is unrestricted regardless of whether it is legally a derivative work Executables containing this object code plus portions of the Library will still fall under Section 6 Otherwise 1f the work is a derivative of the Library you
64. AKI IS ERE EH ERR C KISS iA RH ERE VRRE KS 58 Figure 37 System celina Date TIME eer 59 Fouro SO SURGE dM a a a Aided aii duattiacendeewnady 61 NSA 220 User s Guide List of Figures Figure 39 Delete a Volume Warning SETBBIT 1usececciesesee sti saepe d pe YpPyA IS Nan PRA AXEXR M PyL AX S 62 Figure 40 Create a New Internal Volume 1 erac rrk Ctt kt tk ded kk ctn ER enu ERR Ik Eck 69 Figure 41 Edit an internal VOlUITKE iiis sanie race eda reb rre a epe DL aec Mr bd vd ger Oeo ped 70 Figure 42 Create a New External Volume 1uussdsexed dere tasa eia ere nn EEEE aes 71 Figur 43 Editan Exteel VOUE ccccssidvccnioicaiincansen ainda ines T2 Figure 44 Network gt uy dio 74 sm se ADICTS 20 eue TN 78 Figure 45 Applications Medis Seen 1 oH EPI Prati r pe epa UER aaa aun meats 79 xr rra a aaa 84 Figure 48 Users gt Add or Edit an Account ues rera ska ead d n ES PRA RR E NR RERA ERR XA M RR EA RR 85 Figure 49 Users gt Change PassWord 86 Figure 50 Users Delete Account ainiccibae ptit OR OO EM a FESTE ARE REL S YR LR RUE AR RH ES DE dg 87 BLOIS e eem 90 Figure 52 Shares gt Add GNON iuusssinseekeset cesesiddetkesbbd cinta bre debe Na iE o acid Vinci ub d pud Vd 91 Foure 0o chare Path 0 em PES 92 Foue od Mantenne LO eT 97 Figure 55 Maintonance Configuration T M 101 Figure 56 Maintenance gt FW Upgrade uuseexessiasetonitias stent capa tt
65. Active Sessions screen to make sure that no one is logged into the NSA or transferring files to or from the NSA Figure 57 Maintenance Shutdown System Shutdown Click Restart to have the device perform a software restart The SYS LED blinks as the device restarts and then stays steady on if the restart is successful Wait a minute before logging into the device again Restart Shutdown The following table describes the labels in this screen Table 41 Maintenance Shutdown LABEL DESCRIPTION System Shutdown Restart Click Restart to have the device perform a software restart Shutdown Click Shutdown to shut down the system and restart it again later When you click the Restart button a pop up screen will appear asking you to confirm Click OK to continue or Cancel to quit the restart Figure 58 Maintenance gt Shutdown gt Confirm Restart SUI xj 2 Restart system now j Cancel NSA 220 User s Guide Chapter 11 Maintenance Screens When you click the Shutdown button a pop up screen will appear asking you to confirm Click OK to continue or Cancel to quit the shutdown Figure 59 Maintenance gt Shutdown gt Confirm Shutdown Microsoft Internet Exp xj 2 Shutdown system now j Cancel NSA 220 User s Guide Chapter 11 Maintenance Screens NSA 220 User s Guide Protecting Your Data This chapter compares the different ways of prot
66. August 1998 See http www w3 org TR 1998 NOTE datetime 19980827 DLNA v1 Server The DLNA Digital Living Network Alliance group of companies works to make products compatible and able to work in a home network in order to make digital living easy and seamless DLNA clients play files stored on DLNA servers ECMA 262 The original ECMAScript standard also known as JavaScript ECMA 262 Edition 2 The ECMAScript standard s second revision also ISO standard 16262 ECMA 262 Edition 3 The ECMAScript standard s third revision corresponds to JavaScript 1 5 ECMA 357 ECMAScript for XML E4X See also the E4X errata HTML 3 2 Reference The HyperText Markup Language HTML Specification HTML 4 01 Specification Defines the HyperText Markup Language HTML the publishing language of the World Wide Web ISO 3166 1 Country names official short names in English in alphabetical order as given in ISO 3166 1 and the corresponding ISO 3166 1 alpha 2 code elements ISO 639 2 Two letter and three letter language code sets MIMETYPES IANA registered content types MIME types See the IANA web site ftp ftp isi edu in notes iana assignments media types NSA 220 User s Guide Appendix A Product Specifications Table 47 Supported Standards and Recommendations RFC 1001 STD 19 Protocol standard for NetBIOS service on a TCP UDP tran
67. Click Add to move the IP address to the list of Allowed sites Figure 86 Pop up Blocker Settings Pop up Blocker Settings Exceptions Pop ups are currently blocked You can allow pop ups from specific Web sites by adding the site to the list below Address of Web site to allow http 192 168 1 1 Add Allowed sites Notifications and Filter Level Play a sound when a pop up is blocked Show Information Bar when a pop up is blocked Filter Level Medium Block most automatic pop ups Pop up Blocker FAQ NSA 220 User s Guide Appendix C Pop up Windows 5 Click Close to return to the Privacy screen 6 Click Apply to save this setting JavaScripts If pages of the web configurator do not display properly in Internet Explorer check that JavaScripts are allowed 1 In Internet Explorer click Tools Internet Options and then the Security tab Figure 87 Internet Options Security General Security Privacy Content Connections Programs Advanced Select a Web content zone to specify its security settings e Z o e Internet Local intranet Trusted sites Restricted sites Internet A This zone contains all Web sites you Gites haven t placed in other zones m Security level for this zone Move the slider to set the security level for this zone E Medium Safe browsing and still functional a Prompts before downloading potentially unsafe content Unsigned Activex
68. Description of Modifications You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change You must include a prominent statement that the Modification is derived directly or indirectly from Original Code provided by the Initial Developer and including the name of the Initial Developer in a the Source Code and b in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code 3 4 Intellectual Property Matters a Third Party Claims If Contributor has knowledge that a license under a third party s intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2 1 or 2 2 Contributor must include a text file with the Source Code distribution titled LEGAL which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact If Contributor obtains such knowledge after the Modification is made available as described in Section 3 2 Contributor shall promptly modify the LEGAL file in all copies Contributor makes available thereafter and shall take other steps such as notifying appropriate mailing lists or unscrupulous reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained b Contributor Apes If Contributor s Modifications inclu
69. Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution e If the power adaptor or cord is damaged remove it from the power outlet Do NOT attempt to repair the power adaptor or cord Contact your local vendor to order a new one e Do not use the device outside and make sure all the connections are indoors There is a remote risk of electric shock from lightning CAUTION RISK OF EXPLOSION IF BATTERY on the motherboard IS REPLACED BY AN INCORRECT TYPE DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS Dispose them at the applicable collection point for the recycling of electrical and electronic equipment For detailed information about recycling of this product please contact your local city office your household waste disposal service or the store where you purchased the product e e Do NOT obstruct the device ventilation slots as insufficient airflow may harm your device This product is recyclable Dispose of it properly 6 NSA 220 User s Guide Safety Warnings NSA 220 User s Guide Safety Warnings NSA 220 User s Guide Contents Overview Contents Overview Introduction eet 23 Coe UNG O dc YoUr NGA c 25 RCE SCUMBAG TT TUN 29 Elit eee ETT 43 MEINEN i i D RR
70. Ds are dual color green and red The green LED is normally on when you have a hard disk installed If the NSA detects an error on the disk the disk s connection comes loose or the disk fails the red LED also comes on Since the green LED still stays on the color appears to be orange If the NSA is no longer able to detect a hard disk in the disk bay the green LED turns off and the LED appears as red 1 1 2 COPY Button Use the COPY button on the front panel to copy files from a connected USB device to the NSA The files are stored in a folder created within the public share The name of the folder created for the copied files consists of the date and time of the copy in year month day hour minute second format Up to a total of 10 GB for files can be copied If the USB device has more than 10 GB of files the NSA emits a long beep and does not copy any of the files NSA 220 User s Guide Web Configurator Basics This chapter describes how to access the NSA web configurator and provides an overview of its screens 2 1 Web Configurator Overview The web configurator is an HTML based management interface that allows easy NSA setup and management via Internet browser Use Internet Explorer 6 0 Mozilla Firefox 1 07 Netscape Navigator 7 0 or later versions of these browsers The recommended screen resolution is 1024 by 768 pixels or higher In order to use the web configurator you need to allow Web browser pop up windows f
71. ES NSA 220 User s Guide Appendix D Open Source Licences END OF TERMS AND CONDITIONS This Product includes apcid apcupsd autofs device mapper evms exim Lm sensors mdadm pam mount raidtools samba sg utils smartmontools vsftpd xfsprogs and Linux kernel software under GPL license GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1989 1991 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change
72. Figure 71 Windows XP Internet Protocol TCP IP Properties cccccsccccccssseccceesseeccceeetesecceeennenses 137 Figure 72 Macintosh OS XA Apple OBI scccececei cko rta eI XE rd ex ERN En ObuMESR FREE PER A SUR EAR E CENE VEA PILLE HRS AM od 138 Figure 73 Macintosh OS Xi NODNWOPM 12 iccciiecsitbecetik esed icti ead dua itti de bci d iik ov HMM A 138 Figure 74 Red Hat 9 0 KDE Network Configuration Devices ssssesse me 139 Figure 75 Red Hat 9 0 KDE Ethernet Device General rennen neenon tan nn kun na 140 Figure 76 Red Hat 9 0 KDE Network Configuration DNS cccccssececssessssscseesseesceeeesnesconeeeneesaoertneeee 140 Figure 77 Red Hat 9 0 KDE Network Configuration Activate sssssse 141 Figure 78 Red Hat 9 0 Dynamic IP Address Setting in ifconfig ethO eeeeeeseeseeeeesss 141 Figure 79 Red Hat 9 0 Static IP Address Setting in ifconfig ethO eeseeeeeeeeses 141 Figure 80 Red Hat 9 0 DNS Settings in resolv conf ieeeesessses esee nennen rnnt nna 142 Figure 81 Red Hat 8 0 Restart Ethernet Caldas ciceectnnnis teret torre d Iu nn 142 NSA 220 User s Guide List of Figures Figure 82 Red Hat 9 0 Checking TCP IP Properties i e nen natn i enata ra enatis 142 Foure eo ei IRD C E TOO EDT 143 Figure 84 Internet Options Privacy M 144 Figure 25 Inarmt Options PPO auisecansiaxpec qas Hx gu ex tr aln ts o0 T Ext ers banda da d a
73. File Storage System JBOD RAID 0 1 Network Protocols TCP IP UDP IP DHCP Client FTP HTTP File Management Create Delete System Volume Network File Sharing Protocol CIFS SMB for Windows and Mac OSX HTTP for web browser FTP Network Security Authentication Share level NSA 220 User s Guide Appendix A Product Specifications Table 46 NSA Firmware Specifications continued Supported Clients Windows 2000 Professional Server Windows XP Home Professional Concurrent CIFS Sessions Windows 2003 Windows Vista Linux Maximum Number of Users 100 Allowed Maximum Number of 20 Concurrent FTP Sessions Maximum Number of 20 System Management Remote Management via Web Configurator HTTP NSA Discovery Utility NDU Logging Monitoring Centralized Logs Firmware Upgrade Web Configurator Web Browsers Supported Internet Explorer 6 0 and later versions Firefox 1 07 and later versions A Limits may vary depending on user share resource usage The following list which is not exhaustive illustrates the standards and recommendations supported in the NSA Table 47 Supported Standards and Recommendations CSS level 1 Cascading Style Sheets CSS level 2 revision 1 Cascading Style Sheets CSS 2 1 DATETIME Date and Time Formats W3C World Wide Web Consortium Note M Wolf and C Wicksteed 15 September 1997 Revised 27
74. IB uiuis seeker dennin Fra e ERXP einiaid aaa iaaiiai Ka 42 WADE GT GAS an a Ei a E a 52 Table 12 System Selling gt Server Name 1st aoreet RE RD A 58 Table RES CIE ucro TIME ec 59 Tade 14 Siorage OVErViEIE 62 E AREE DTE T ITE mr 63 Table TE JB CD irinin DERE RFRINSRREPEPOR RHENO REN IIO eee 66 TOET RADI 3oetootimdmod ti obexten ges bti ri i CR OE EORR HU E ERR GR na D AS 66 TEE TO ESTER ruentes vraies suh e oe lor cutem caer ere Loc Labo Fonsdabiun ccn a acer tee reer re tert Tamer 67 Table 19 Create a Mew Internal Volle isuasceeeeevsaseeisenere os vr i bvr ee e9E EUH e pEPE eiis aaar Ee AUNA EEO 69 Tabe 20 Editan ntemal Voli 1355 irpo tI SEHE OE Ee PPLE EFFI EHE RES ER RE Ewa AFER vH ERE Ee PEDE a E D RR 70 Table 21 Create a New External Volle 1c pe Eno EEpE Pro ER HR PHRASE E Pc ERE MEER R 71 i Sgz enEma nr amp ue n Zt 72 Table 23 Network Config gt Network Config 1 isle dass redes sk cutn ka sou tak aaa tha ad mda n rA aao dE uta aea A ad 74 Table 24 Applications FTF Sussex tet ed eia ean tidem ona tu quA PM de aues 78 Table 25 Applications Media Server ain oec SERIE LER LUI DRE Fa LE RI TG Lo AREE LIE e dA 33S a rk d ARCH ERAN 79 yis 505 7 7 URP 84 Tabe 27 User leons c 84 Tabie 20 Users c Add or Editan AGCOBUBL Lodo o a OD Ee RR lta eas 85 Table 29 Users Change Password 31r nt E EPet bar PII P SE pR IP Cep E PEN PR pa SEN ERE EE DM RRRA 87 Table 30 Use
75. ND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This Product includes php software under the PHP License The PHP License version 3 0 Copyright c 1999 2006 The PHP Group All rights reserved Redistribution and use in source and binary forms with or without modification is permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 The name PHP must not be used to endorse or promote products derived from this software without prior written permission For written permission please contact group php net 4 Products derived from this software may not be called PHP nor may PHP appear in their name without prior written permission from group php net You may indicate that your software works in conjunction with PHP by saying Foo for PHP instead of calling it PHP Foo or phpfoo NSA 220 User s Guide Appendix D Open Source Licences 5 The PHP Group may publish revised and or new versions of the lice
76. NSA 220 Network Storage Appliance User s Guide Version 1 00 3 2007 Edition 1 ZyXEL www zyxel com About This User s Guide About This User s Guide Intended Audience This manual is intended for people who want to configure the NSA using the web configurator A basic knowledge of TCP IP networking concepts and topology will be helpful Related Documentation Quick Start Guide The Quick Start Guide is designed to help you get up and running right away It contains information on setting up your network and configuring for Internet access Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary information e Supporting Disk Refer to the included CD for support documents ZyXEL Web Site Please refer to www zyxel com for additional support documentation and product certifications User Guide Feedback Help us help you Send all User Guide related comments questions or suggestions for improvement to the following address or use e mail instead Thank you The Technical Writing Team ZyXEL Communications Corp 6 Innovation Road II Science Based Industrial Park Hsinchu 300 Taiwan E mail techwriters zyxel com tw NSA 220 User s Guide 3 Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User s Guide lt gt Warnings tell you about things that could harm you or your d
77. O THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8 9 Audit Rights ZyXEL SHALL HAVE THE RIGHT AT ITS OWN EXPENSE UPON REASONABLE PRIOR NOTICE TO PERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT 10 Termination This License Agreement is effective until it is terminated You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control ZyXEL may terminate this License Agreement for any reason including but not limited to if ZyXEL finds that you have violated any of the terms of this License Agreement Upon notification of termination you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies including backup copies have been destroyed All provisions relating to confidentiality proprietary rights and non disclosure shall survive the termination of this Software License Agreement 12 General This License Agreement shall be construed interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC Taiwan This License Agreement shall consti
78. ON Deny Select this check box next to a user to deny him or her any access they cannot read modify nor execute to all files contained within this share Select the check box in the heading row to select all users Note No one can use the share if you deny access to all users Thus denying all users access is not recommended Publish this share to Select this option to have the NSA share files in this folder with media Media Server clients The media clients do not have to use a password to play the shares you publish Apply Click this button to save your changes back to the NSA Cancel Click this button to begin configuring this screen afresh 10 2 1 Public and ANONYMOUS Share Access Rights If you make a share public users do not need to log in With ANONYMOUS FTP you must enter either anonymous or ftp as the username Any other name is considered a username so must be valid and have a corresponding correct password 10 3 Share Path Browse Screen Use this screen to navigate and or create folders within a share Figure 53 Share Path Browse Share Browser Current location Folder Name lli i i jj1 1 1 C test C admin C photo C video C test int C public Create Folder Back Apply NSA 220 User s Guide Chapter 10 Shares The following table describes the labels in this screen Table 34 Share Path Browse LABEL DESCRIPTION Folder Name Th
79. OPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR NSA 220 User s Guide Appendix D Open Source Licences INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein if any are the property of their respective owners This Product includes OpenLDAP software under the OpenLDAP Public License The OpenLDAP Public License Version 2 8 17 August 2003 Redistribution and use of this software and associated documentation Software with or without modification are permitted provided that the following conditions are met 1 Redistributions in source form must retain copyright statements and notices 2 Redistributions in binary form must reproduce applicable copyright statements and notices this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution and 3 Redistributions must contain a verbatim copy of this document The OpenLDAP Foundation may revise this licen
80. PPOR eesosas Oo Rn rra E a EVEN QrEM ELE ILU S IM 183 lj e E 187 NSA 220 User s Guide Table of Contents NSA 220 User s Guide List of Figures List of Figures Figure 1 Example of the NSA ina Home Network Lise en passe tenses tia are Lx Er Rp X HR ERE ERR aa pd da 25 Foure I qc Mn n 26 Figure 3 NSA NEN 27 zc EA NDU Man SSON e ien 30 22 20 57 25 8 p T 30 Figure WE nEDI D Gn nB w nGB g 31 Figure 7 Change Password SOlGQllu toss cates sess tits opta buslesa pe taU PANE E E MSIE U MR DI pU nU Rip Ub d 31 Figure S NC PES daa 32 zd foa c 33 Figure T0 My NSA Share Browsing iue cesce dct tu th kb Eti teh rinin RERO CUIR REX CUI da EASAN E REC CUR ERR Era 34 Figure 11 My NSA Management OVODVIBW isses reete nic id cire intricate Eu ud Ea pide Ead 35 Figure TZ My NSA Change Share PFODOFUGBS 12 asiseece iss rrtibo a aereis osi CX SH sass US RR Hx RE FERA KA 36 Zo o Po 5 rc a iueens intends ata tonic nian cee 39 Figure T4 GOUS M 40 Figure 19 Navigation Panel DIPIES uas idu eerte ph aa kao inna E pK INR EREA ENEE PEASAAR SENEESE EERS REEN 41 Figure TORN NS cc mr 43 FWS 17 UE quem EET 44 Figure 18 Users gt Create Example uiis remi obti tunun eie REN RU Ee ER ada a NAAN NNA REM E da ene Kid aid 44 Figure 19 Users Account Crealed e 44 SOLPOR e
81. T NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Foundation For more information on the Apache Software Foundation please see lt http www apache org gt Portions of this software are based upon public domain software originally written at the National Center for Supercomputing Applications University of Illinois Urbana Champaign This Product includes phpmve software under LGPL license GNU LESSER GENERAL PUBLIC LICENSE Version 2 1 February 1999 Copyright C 1991 1999 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed This is the first released version of the Lesser GPL It also counts as the successor of the GNU Library Public License version 2 hence the version number 2 1 Preamble NSA 220 User s Guide Appendix D Open Source Licences The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General
82. TION Server Name Enter a name to identify your NSA on the network in this field You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character The name must begin with an alphabetic character a z and is NOT case sensitive Description Add text here to describe the NSA if the Server Name field was not enough Use up to 61 characters You can use the following a zA Z0 9 e 2 8 96 Workgroup Name A workgroup is a group of computers on a network that can share files These user accounts are maintained on the NSA Type your workgroup name in this field You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character The name must begin with an alphabetic character a z and is NOT case sensitive Apply Click here to save your changes back to the NSA 5 3 Date Time Use this screen to select a time zone and a time server from which your NSA can get the time and date This time is then used in NSA logs and alerts 5 3 1 Time Lag Time lag occurs when the time on the NSA falls behind the time on the time server This may happen if the time server is no longer reachable ifthe NSA is shut down often the NSA internal battery keeps time when the NSA is shut down and this may cause possible variance power surges occur The NSA gives no warning if time lag occurs You should resynchronize the time after a power sur
83. TO THESE TERMS THEN ZyXEL INC IS UNWILLING TO LICENSE THE SOFTWARE TO YOU IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED AND YOUR MONEY WILL BE REFUNDED 1 Grant of License for Personal Use ZyXEL Communications Corp ZyXEL grants you a non exclusive non sublicense non transferable license to use the program with which this license is distributed the Software including any documentation files accompanying the Software Documentation for internal business use only for up to the number of users specified in sales order and invoice You have the right to make one backup copy of the Software and Documentation solely for archival back up or disaster recovery purposes You shall not exceed the scope of the license granted hereunder Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL and all implied licenses are disclaimed 2 Ownership You have no ownership rights in the Software Rather you have a license to use the Software as long as this License Agreement remains in full force and effect Ownership of the Software Documentation and all intellectual property rights therein shall remain at all times with ZyXEL Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement 3 Copyright The Software and Documentation contain material that is protected by United States Copyright Law
84. The storage method you use depends on how many disks you have and how many volumes you want to create It s important that you consider this carefully as all data is deleted when you re create a volume NSA 220 User s Guide Chapter 6 Storage Screens BES Back up your data before deleting or re creating a volume For example if you originally have one disk configured at JBOD and you then install another disk and want to configure the two disks to use RAID 1 you should first back up all your data on the two disks see the Memeo Autobackup utility on the included CD and then restore your data later after you create the new volume type Below is a table that summarizes some attributes of the various RAID levels as supported on the NSA For capacity and storage efficiency S is the size of the smallest drive in the array and N is the number of drives in the array Storage efficiency assumes all drives are of identical size Performance rankings are approximations Table 15 RAID Quick Comparison RAID Level 0 1 Number of Disks 2 2 Capacity S N S N 2 Storage Efficiency 100 50 Fault Tolerance None YYYY Availability Y YYYY Read Performance YYYY YYY Write Performance YYYY YYY 6 3 1 Choosing A Storage Method For a Volume The following is a guide to help you choose a storage method for the various number of disks supported on the NSA See Section 6 4 on page 65 for theoret
85. W 29 3W 25 1W 100V 60Hz 58 14W 30 0W 25 1W The following hard disks have been tested and are known to be compatible with the NSA Compatible Hard Disks Table 50 BRAND MODEL CAPACITY INTERFACE Western Digital WD1600JS 160 GB SATA 3 0 Gbit s Seagate ST3200827AS 200 GB SATA 3 0 Gbit s Seagate ST3320820AS 320 GB SATA 3 0 Gbit s Seagate ST3500830AS 500 GB SATA 3 0 Gbit s Western Digital WD800 80 GB SATA I Seagate ST3160023AS 160 GB SATA I Hitachi HDS722516VLSA80 160 GB SATA Maxtor 6L120MO 120 GB SATA I Hitachi HCS725032VLA380 320GB SATA 3 0 Gbit s Hitachi HCS725025VLA380 250GB SATA 3 0 Gbit s Seagate ST3160815AS 160GB SATA 3 0 Gbit s Seagate ST3750840AS 750GB SATA 3 0 Gbit s Seagate ST3160215SCE 160GB SATA 3 0 Gbit s NSA 220 User s Guide Appendix A Product Specifications NSA 220 User s Guide Setting up Your Computer s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP IP installed Windows 95 98 Me NT 2000 XP Macintosh OS 7 and later operating systems and all versions of UNIX LINUX include the software components you need to install and use TCP IP on your computer Windows 3 1 requires the purchase of a third party TCP IP application package TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems After the appropriate TCP IP compon
86. a share to a network drive for easy and familiar file transfer for Windows users The main MyNSA screen displays the shares to which you have access Figure 9 My NSA Password Administration p My NSA AHHH Pia My Own Shares HDB ING LW OT Xa P ANP ANCE g ge E eg public video photo music Manage it Manage it Manage it Manage it admin ext olume1 Manage it Manage it Other Shares There are no other accessible shares on the system The following table describes the labels in this screen Table 3 My NSA LABEL DESCRIPTION This share icon represents a share on a volume on the internal hard drives to A which you have access Click this icon to access the share s contents The folder appears as gray if the share is not currently available because the hard drive was removed for example This share icon represents a share on a volume on an external USB device E Click this icon to access the share s contents The folder appears as gray if the share is not currently available because the USB drive was removed for example Manage It Click this button to see and configure the management details for a share NSA 220 User s Guide 33 Chapter 2 Web Configurator Basics 2 5 1 My NSA Share Browsing Screen Click My NSA and then click a share to open the following screen Use the My NSA share browsing screens to see and access share contents
87. a work Drive Disconnect Network Drive Address i 172 23 37 39 SECOS Folder Options NSA 220 User s Guide Chapter 3 Tutorials 2 Select the network drive that you want to map NSA to from the Drive list box This example uses I Then browse to and select the share on the NSA Click Finish Figure 26 Map Network Drive Map Network Drive x windows can help you connect to a shared network Folder Select a shared network folder and assign a drive letter to the connection so that you can access the folder using My Computer using My Comp a Specify the drive letter For the connection and the folder that you want to connect to Microsoft Windows Network E ha Nsa200 Drive x nsaz20 B amp admin WNsa220 Jimmy v rowse Pader pean OE Example server share amp music IV Reconnect at logon photo Connect using a different user name 3 jns RE 3 Create a shortcut to a Web folder or FTP site i R A Cs Printers zi SRL VERIS Cancel OK Cancel New Folder li 3 Enter the username and password for Jimmy s account and click OK You do not need to do this if the username and password are the same as Jimmy s Windows login Figure 27 Enter Network Password Incorrect password or unknown username for Nsa220 Jimmy Cancel Connect As l Password 4 After the mapping is done you can then simply copy and paste o
88. adjust appropriately without manual intervention It allows data transfer of either 100 Mbps or 1000 Mbps in either half duplex or full duplex mode depending on your Ethernet network Use an 8 wire Ethernet cable for Gigabit connections The port is also auto crossover MDI MDI X meaning it automatically adjusts to either a crossover or straight through Ethernet cable SATA Interface Serial ATA is a low cost interface technology that allows high speed data transfer Serial ATA also allows more efficient internal airflow and also smaller chassis design Reset Button If you forget your admin password then use the reset button to restore the factory default password to 1234 with username admin and auto IP address DHCP client Firmware Features These are some of the main firmware features of the NSA Table 44 Firmware Features DLNA Server The NSA is a DLNA certified media server that lets DLNA compliant media clients play video audio and photo content files stored on the NSA DLNA Client Software The DLNA certified media client software included on the CD lest your Windows XP computers browser and play media files stored on the NSA NSA 220 User s Guide MO Appendix A Product Specifications Table 44 Firmware Features RAID File Storage Use RAID 0 if you want pure write speed and or maximum capacity for your drives and or you have other means of p
89. al item as that term is defined in 48 C F R 2 101 Oct 1995 consisting of commercial computer software and commercial computer software documentation as such terms are used in 48 C F R 12 212 Sept 1995 Consistent with 48 C F R 12 212 and 48 C F R 227 7202 1 through 227 7202 4 June 1995 all U S Government End Users acquire Covered Code with only those rights set forth herein 11 Miscellaneous This License represents the complete agreement concerning subject matter hereof If any provision of this License is held to be unenforceable such provision shall be reformed only to the extent necessary to make it enforceable This License shall be governed by California law provisions except to the extent applicable law if any provides otherwise excluding its conflict of law provisions With respect to disputes in which at least one party is a citizen of or an entity chartered or registered to do business in the United States of America any litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California with venue lying in Santa Clara County California with the losing party responsible for costs including without limitation court costs and reasonable attorneys fees and expenses The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded Any law or regulation which provides that the language of a
90. also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative 1s allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable ru
91. any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which 1s implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version yo
92. atically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address Obtain DNS server address automatically C Use the following DNS server addresses 8 Click OK to close the Internet Protocol TCP IP Properties window 9 Click Close OK in Windows 2000 NT to close the Local Area Connection Properties window 10 Close the Network Connections window Network and Dial up Connections in Windows 2000 NT 11 Restart your computer if prompted Verifying Settings 1 Click Start All Programs Accessories and then Command Prompt 2 Inthe Command Prompt window type ipconfig and then press ENTER You can also open Network Connections right click a network connection click Status and then click the Support tab Macintosh OS X 1 Click the Apple menu and click System Preferences to open the System Preferences window NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 72 Macintosh OS X Apple Menu 4 Grab File Edit Capt About This Mac Get Mac OS X Software a System Preferences Dock Location 2 Click Network in the icon bar Select Automatic from the Location list Select Built in Ethernet from the Show list Click the TCP IP tab 3 For dynamically assigned settings select Using DHCP from the Configure list
93. ault password is 1234 These fields are case sensitive so make sure Caps Lock is not on Turn the NSA off and on Ifthis does not work see Section 15 3 1 on page 114 to reset the device cannot see the multi language web configurator screens while using Internet Explorer Use Section 15 3 2 on page 115 to enable the scripting of safe ActiveX controls 15 4 Cannot Access The NSA cannot access a share NSA 220 User s Guide Chapter 15 Troubleshooting Check that the NSA is turned on and connected to the network Try to ping the NSA or use the NDU to discover it Check that you entered your login name and password correctly Check that the share exists and check its access settings Check if the shared folder 1s a subfolder of another parent share Check that the parent share s access rights do not conflict with the subfolder share It is recommended that you do not create subfolder shares e Check if there are any existing mapped network drives to the NSA You may need to disconnect existing mapped network drives as a new mapped network drive connection may use different previously saved login information To do this open Windows Explorer and click Tools gt Disconnect Mapped Network Drives Check that the volume in which the share resides exists and is not down or degraded If it is down or degraded see Section 15 2 on page 111 Make sure you have the client for Microsoft networks
94. automatically server address automatically Use the Select this option to choose a static DNS server address Type the DNS server IP following DNS address es into the fields below server addresses Primary DNS Type a primary DNS server IP address Server Secondary Type a secondary DNS server IP address DNS Server NSA 220 User s Guide Chapter 7 Network Screen Table 23 Network Config Network Config LABEL DESCRIPTION Apply Click Apply to save your TCP IP configurations After you click Apply the NSA restarts Wait until you see the Login screen or until the NSA fully boots and then use the NDU to rediscover it Cancel Click Cancel to begin configuring this screen afresh NSA 220 User s Guide Chapter 7 Network Screen NSA 220 User s Guide Application Screens This chapter discusses the application screens 8 1 Application Screens Use the application screens to Enable FTP file transfer to from the NSA set the number of FTP connections allowed and an FTP idle timeout Enable or disable the media server and select which shares to publish share with media clients 8 2 FTP File Transfer Protocol FTP is an Internet file transfer service that operates on the Internet and over TCP IP networks A system running the FTP server accepts commands from a system running an FTP client The service allows users to send commands to the server for up
95. brary It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions b Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compatible with the version that the work was made with c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above for a charge no more than the cost of performing this distribution d If distribution of the work is made by offering access to copy from a designated place offer equivalent access to copy the above specified materials from the same place e Verify that the user has already received a copy of these materials or that you have already sent this user a copy For an executable the NSA 220 User s Guide Appendix D Open Source Licences required form of the work that uses the Library must include any data and utility programs needed for reproducing the executable from it However as a special exception the materials to be distributed need not include anything that i
96. cape may publish revised and or new versions of the License from time to time Each version will be given a distinguishing version number 6 2 Effect of New Versions NSA 220 User s Guide Appendix D Open Source Licences Once Covered Code has been published under a particular version of the License You may always continue to use it under the terms of that version You may also choose to use such Covered Code under the terms of any subsequent version of the License published by Netscape No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License 6 3 Derivative Works If You create or use a modified version of this License which you may only do in order to apply it to code which is not already Covered Code governed by this License You must a rename Your license so that the phrases Mozilla MOZILLAPL MOZPL Netscape MPL NPL or any confusingly similar phrase do not appear in your license except to note that your license differs from this License and b otherwise make it clear that Your version of the license contains terms which differ from the Mozilla Public License and Netscape Public License Filling in the name of the Initial Developer Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License 7 Disclaimer of warranty Covered code is provided und
97. cel Click this button to begin configuring this screen afresh 6 8 Creating a New External Volume Click the Create a New External Volume button in the Volume screen as shown in Figure 38 on page 61 to create a new NSA internal disk drive volume NSA 220 User s Guide Chapter 6 Storage Screens LES Creating a volume formats the drive All data on the disk will be lost Figure 42 Create a New External Volume Initialize an External Volume Volume Name Extvol Available Disk s USB2 File System FAT32 Apply Cancel The following table describes the labels in this screen Table 21 Create a New External Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters The name cannot be the same as another existing external volume Acceptable characters are all alphanumeric characters and spaces underscores and periods The first character must be alphanumeric A Z 0 9 The last character cannot be a space Available Disk s Select the external USB device upon which you want to create the volume File System Select the file system you want the new volume to use Windows file systems FAT32 Newer and more efficient than FAT16 Supports a volume size of up to 2 TB Tera Bytes and individual file sizes of up to 4 GB FAT16 Compatible with old Windows operating systems Supports volume and file sizes of up to 2 GB Linux file systems
98. contract shall be construed against the drafter shall not apply to this License 12 Responsibility for claims NSA 220 User s Guide Appendix D Open Source Licences As between Initial Developer and the Contributors each party is responsible for claims and damages arising directly or indirectly out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis Nothing herein is intended or shall be deemed to constitute any admission of liability 13 Multiple licensed code Initial Developer may designate portions of the Covered Code as Multiple Licensed Multiple Licensed means that the Initial Developer permits you to utilize portions of the Covered Code under Your choice of the MPL or the alternative licenses if any specified by the Initial Developer in the file described in Exhibit A Exhibit A Mozilla Public License The contents of this file are subject to the Mozilla Public License Version 1 1 the License you may not use this file except in compliance with the License You may obtain a copy of the License at http www mozilla org MPL Software distributed under the License is distributed on an AS IS basis WITHOUT WARRANTY OF ANY KIND either express or implied See the License for the specific language governing rights and limitations under the License The Original Code is The Initial Deve
99. controls will not be downloaded Appropriate for most Internet sites C Custom Level D Default Level OK Cancel Apply Click the Custom Level button Scroll down to Scripting oar WO ND Click OK to close the window Under Active scripting make sure that Enable is selected the default Under Scripting of Java applets make sure that Enable is selected the default NSA 220 User s Guide Appendix C Pop up Windows Figure 88 Security Settings Java Scripting Security Settings Settings Scripting amp Active scripting Disan 9 Enable 3 Allow paste operations via script Q Disable 9 Enable Q Prompt amp Scripting of Java applets Q Disable OQ Prompt Lienas AukhSenkie Sion E b custom settings Reset to Medium Reset cma Java Permissions Click the Custom Level button Scroll down to Microsoft VM cO WN Click OK to close the window Figure 89 Security Settings Java Security Settings Settings Q Disable 9 Enable es Font download Q Disable 9 Enable a Prompt 3 Microsoft VM Java permissions Q Custom J Disable Jav 9 High safety Q Low safety Reset custom settings Reset to Medium z Reset cma From Internet Explorer click Tools Internet Options and then the Security tab Under Java permissions make sure that a safety level is selected NSA 220 Use
100. create shares for Jimmy and Kevin 3 3 Creating a Share Suppose Bob has already created separate accounts for his sons Jimmy and Kevin Now Bob wants to create a share for each son He also wants to make sure that each son can only access his own share to keep them from deleting each other s files This is how he would do it NSA 220 User s Guide Chapter 3 Tutorials 1 Inthe NSA s administration web configurator screens click Shares gt Create a New Share Figure 20 Shares Shares List Create a New Share Naa ann pue System Setting Internal Shares l e Storage Network Config E E Ee e is Share Owner Network Apps public video photo music Share Type Users Logout admin External Shares There are no external shares on the system 2 Specify a name for the share and select which volume it should be on Then click Browse Figure 21 Shares gt Create Example New Share Share Name immy volume volumet76 GB Free 7 Path Browse Make this share owned by aamin gt Share Access Keep it private to owner C Make it public C Advanced IV Publish this share to Media Server Amy coneai 3 Typea name for a new folder and click Create Folder Figure 22 Shares gt Create gt Browse gt Create Folder Example Share Browser Current location admin music photo C video C public mmy Create Folder Beck
101. create the whole volume All of your data is lost f you are using a single disk JBOD volume you need to create a new volume on the new drive Ifyou are using a two disk JBOD volume you need to create a whole new volume on both drives e The LAN LED by the LAN port is off 112 NSA 220 User s Guide Chapter 15 Troubleshooting Make sure the Ethernet cable is connected properly to the NSA and connected to another Ethernet device Make sure the other device is turned on If it S connected directly to a computer make sure that the computer network card is working ping 127 0 0 1 on the computer Use another Ethernet cable If you re connecting to a Gigabit Ethernet make sure you re using an 8 wire Ethernet cable Ifthe problem continues contact the vendor See Section 1 1 1 on page 26 for a description of NSA LEDs 15 3 NSA Login and Access e forgot the server name of the NSA The default server name is nsa220 Use the NDU NSA Discovery Utility to discover your NSA If you have admin privileges you can directly change the IP address of the NSA using the NDU Ifthe server name has changed and you don t have the NDU see Section 15 3 1 on page 114 to use the RESET button to return the default setting e cannot get to the NSA login screen Use the NDU NSA Discovery Utility to discover your NSA If you have admin privileges you can directly change the IP a
102. creen summary 40 screens summary 41 Serial Advanced Technology Attachment see also SATA 25 serial ATA SATA 121 serial links 25 settings changing 42 share 33 access 36 access rights 92 anonymous access 92 browsing 34 changing properties 35 deny access 37 everyone 92 file path 35 36 full access 36 icon 33 management details 33 name restrictions 37 paths 38 private 36 public 36 read only access 37 USB 33 share icon 42 share paths 38 shared folder 33 shutdown 102 status 51 status messages 42 storage capacity 25 storage humidity 123 storage temperature 123 sub links 40 supported formats 126 supported clients 124 syntax conventions 4 SYS LED 27 system management 124 system name 52 I time 58 Daylight Saving Time 60 zone 60 time out 32 time server 59 time server address 60 time zone 59 troubleshooting external disks 117 forgot password 113 LED indicators 111 LAN 113 login 116 media files 118 NDU discovery 114 overview 111 user share access 117 web configurator access 113 type 52 U USB version 2 25 USB hard drives 52 USB share 33 user access permissions 33 user icon 42 user name restrictions 85 user password management 38 user passwords 122 user level screens 40 V volume 62 degraded 42 64 NSA 220 User s Guide Index down 42 64 healthy 42 64 inactive 64 name restrictions 37 OK 64 resync 64 status 64 volume icon 42 volume name 52 volume status
103. d ad di up d ee of FA E Sciacca Sate E NT T 38 2 95 0 Password GO BB sirain aa eiiis be xat eda Leer beide ro bea ddec Le pe bd iva ped d dolut edd dde te bed edet addu 38 PAN Te ED c EE TT 39 25 1 Global Admipisirauon ICONS ssrin onni ebd bdo c be cid Pb Lcx Rb Reb Ihr Inde 40 NSA 220 User s Guide LE Table of Contents 20 2 ASA FAIRY aucsesiapeccioa us pt sesiinsnc c ene yF EE AR EESESURUMAK EESVEURDO EAR LRERVRUN OE ASUOUAAN 40 APEA eri ole ERE o QOL TEE 42 26 4 Status Messages Re 42 Pac Common Screen OOD eer 42 Chapter 3 pir E 43 tc eal ee Ly 6 ETE m MN 43 oa Croalng a Usor AEGON a 43 ore ec eer E T E E MTree EE E E E E E 44 3 4 Accessing a Share From Windows Explorer 4 eonuc cisterna rite tette turre eerte 46 5 Accossimy a olere Usna F TES ooussicereci eicere cud rhet PRE HA E Rd IR Pr t daa i EU S rH HAOR 48 3 6 Accessing a Share Through the Web Configurator eese enenatis 49 Chapter 4 SNS SOUS CIN E e PR 51 BE VAS OHO Ac 51 4 1 1 Session Example PS Pc 53 Part Il Status System Storage and Network 55 Chapter 5 System Setting BOFBBI RS ie S CRIRITRR IRE ANERIRNIRISRNPEERMARIQRUAT A UN a ANNI SR A DOR EuiUA 57 MERI ue SNJ OOE dee e 57 ow Ir IW M 57 De EON PINES cuter A A an
104. ddress of the NSA using the NDU e f you used the RESET button the NSA may have a new IP address Close and reopen the NDU to discover the NSA Make sure the NSA is turned on If you are trying to login directly by typing the server name into your web browser s address field make sure you are using the correct server name as the web site address The default server name 1s nsa220 if you have changed the server name use the new one Ifthe server name has been changed and you do not know the new server name see the troubleshooting suggestions for I forgot the server name of the NSA fit still doesn t work try using the NDU Check the hardware connections and make sure the LEDs are behaving as expected See the Quick Start Guide and Section 1 1 1 on page 26 By default the NSA gets an IP address automatically The NSA assigns itself an IP address 1f no device assigns one If your computer is also set to get an IP address automatically the computer and the NSA can both assign themselves IP addresses and communicate See Chapter 7 on page 73 1f you need to configure the NSA with a static IP address NSA 220 User s Guide 113 Chapter 15 Troubleshooting Make sure your computer s IP address is in the same subnet as the NSA s IP address You can use the NDU to find the NSA s IP address See Appendix B on page 129 for how to change your computer s IP address Skip this if you know that there are routers between your comput
105. de an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API Contributor must also include this information in the legal file c Representations Contributor represents that except as disclosed pursuant to Section 3 4 a above Contributor believes that Contributor s Modifications are Contributor s original creation s and or Contributor has sufficient rights to grant the rights conveyed by this License 3 5 Required Notices You must duplicate the notice in Exhibit A in each file of the Source Code If it is not possible to put such notice in a particular Source Code file due to its structure then You must include such notice in a location such as a relevant directory where a user would be likely to look for such a notice If You created one or more Modification s You may add your name as a Contributor to the notice described in Exhibit A You must also duplicate this License in any documentation for the Source Code where You describe recipients rights or ownership rights relating to Covered Code You may choose to offer and to charge a fee for warranty support indemnity or liability obligations to one or more recipients of Covered Code However You may do so only on Your own behalf and not on behalf of the Initial Developer or any NSA 220 User s Guide Appendix D Open Source Licences Contributor You must make it absolutely clear than any s
106. der 33 name restrictions 37 folder format of copied files 28 format of copied files folder 28 formats supported 126 FTP server status 52 G Gigabit Ethernet 25 121 global icons 32 40 global labels 32 global NSA icons 40 GMT 60 GNU GENERAL PUBLIC LICENSE 161 GNU LESSER GENERAL PUBLIC LICENSE 154 Greenwich Mean Time See GMT H hard disk 25 compatibility 25 external 25 faulty 42 internal 25 SATA 25 serial links 25 hard drives bays 52 external 52 internal 52 USB 52 hardware connections 26 hardware specifications 122 HDD1 LED 27 HDD2 LED 27 healthy 64 healthy disk 42 healthy volume 42 help icon 40 home icon 40 home networks 107 124 Home screen 31 hyperlinks 40 icons 32 about 40 administration 40 common 42 delete 42 disk 42 edit 42 eject 42 global 32 40 help 40 home 40 logout 32 40 repair 42 68 scan disk 42 share 33 42 USB share 33 user 42 volume 42 web help 32 identifying external storage devices 42 inactive 64 install drives 26 internal hard drives 52 J JavaScript 29 L LAN LEDs 28 language 40 LEDs 26 liability 181 license 181 license Agreement for NSA 177 lights 26 links sub links 40 NSA 220 User s Guide Index to screens 40 locate icon icons locate 42 log 97 classes 98 screen 97 severity 98 logging monitoring 124 login username 30 logout icon 32 40 MAC address 52 Manage It 33 management session timeout
107. der that you want to share out Path Browse to find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators Each folder can only belong to a single share See Section 2 5 5 on page 38 for more information on share paths Make this share owned by Select the administrator or user account that is to own manage this share The share owner controls access rights to the share Share Access Use this part of the screen to assign access rights full read only or deny to users Keep it private to owner means only the share owner selected above can access the share Public means every user including people who do not have accounts on the NSA can access the share Advanced allows you to assign specific access rights full read only or deny to individual users Username This column lists all of the accounts configured on the NSA Full Select this check box next to a user to give him or her full access read write and execute to all files contained within this share Select the check box in the heading row to select all users Read Only Select this check box next to a user to give him or her read only access they cannot modify nor execute to all files contained within this share Select the check box in the heading row to select all users NSA 220 User s Guide 9 Chapter 10 Shares Table 33 Shares Add Share continued LABEL DESCRIPTI
108. described herein without notice This publication is subject to change without notice Certifications Federal Communications Commission FCC Interference Statement The device complies with Part 15 of FCC rules Operation is subject to the following two conditions This device may not cause harmful interference This device must accept any interference received including interference that may cause undesired operations This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This device generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment This Class B digital apparatus complies with Canadian ICES 003 NSA 220 User s Guide Appendix E Legal Information Cet appareil num rique de la classe B est conforme la norme NMB 003 du Canada Viewing Certifications 1 Go to http www zyxel com 2 Select your product on the ZyXEL home page to go to that product s
109. e JavaScripts enabled by default Java permissions enabled by default Internet Explorer Pop ups You may have to disable pop up blocking allow pop ups in order to use your device web configurator Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allow pop up blocking and create an exception for your device s IP address Internet Explorer 6 screens are used here Screens for other Internet Explorer versions may vary Disable pop up Blockers 1 In Internet Explorer select Tools Pop up Blocker and then select Turn Off Pop up Blocker Figure 83 Pop up Blocker Mail and News Pop up Blocker Manage Add ons Pop up Blocker Setting Synchronize E wc i Windows Update Windows Messenger Internet Options You can also check if pop up blocking is disabled in the Pop up Blocker section in the Privacy tab 1 In Internet Explorer select Tools Internet Options Privacy 2 Clear the Block pop ups check box in the Pop up Blocker section of the screen This disables any web pop up blockers you may have enabled NSA 220 User s Guide Appendix C Pop up Windows Figure 84 Internet Options Privacy Internet Options PIR p General Security Privacy Content Connections Programs Advanced Settings e Move the slider to select a privacy setting for the Internet gt zone Medium Blocks third party cookies that do not have a compact privacy
110. e maximum capacity is 150 GB and the remaining space 50 GB is unused Typical applications for RAID 1 are those requiring high fault tolerance without need of large amounts of storage capacity or top performance for example accounting and financial data small database systems and enterprise servers 6 4 4 RAID and Data Protection If a hard disk fails and you re using a RAID 1 volume then your data will still be available but at degraded speeds until you replace the hard disk that failed and resynchronize the volume However RAID cannot protect against file corruption virus attacks files incorrectly deleted or modified or the NSA malfunctioning Here are some suggestions for helping to protect your data Place the NSA behind a firewall and or IDP Intrusion Detection and Prevention device to protect it Preferably it should be a hardware based firewall with stateful packet inspection anti virus and IDP like the ZyWALL UTM products Use anti virus software on your computer to scan files from others before saving the files on the NSA NSA 220 User s Guide Chapter 6 Storage Screens Keep another copy of important files preferably in another location 6 5 Disks Here is information on the NSA internal disks and external disks attached to the USB port s 6 5 1 External Disks You may connect USB storage devices that support the following file systems to the NSA Windows File Systems NTFS read only FAT
111. e Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 9 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Library or works based on it 10 Each time you redistribute the Library or any work based on the Library the recipient automatically receives a license from the original licensor to copy distribute link with or modify the Library subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties with this License 11 If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse
112. e TT 89 101 2 Sal gs COCER accus s Gubcd n incidi or based tus bebo cima n bir bupn Qa Pep asda is MpIaS 89 TZ Pee ines ALL TE A 90 10 2 1 Public and ANONYMOUS Share Access Rights eene nennen nnn 92 10 3 Share Path Browse SOMO iuscxseiccit snared ecumranM e x2 aM Exe AMI B eer M aM Eai nr kie cimi c Edad 92 Part IV Protection Media Client Maintenance amp Troubleshooting 95 Chapter 11 Maintenance SCIOONGS iuis sciopero Rn RES mU RA UE CULA A 97 TT 3 Tobiatitenanbe OVEN sas cce ei Gael abet red b o lude n oe i edd 97 QUEUE me e T er 97 TL3 Log Classes M 98 TA Loa oeny LOVEE D ES EN Scare areca ls eda ENE E 98 TELOGE OI LL 99 TLE CONIO NON a 100 11 7 Frimware Upgrade n 101 uE Re De ronen oie eaa a aea Eai 102 Chapter 12 Protecting YOUN Pr cm 105 t Protection ile tO RET 105 12 1 1 Configuration File Backup and Restoration erri aaEh URP 4REE EHE qa ne EFI RRRER e FFRH AREE ERES 105 T2122 Memeo AOD ACKUY Q 106 Chapter 13 Media Ghent SOT ANG iiciscistaarassiveciiacisiarinincicincielicienuintdiaaiinanenias elev attendee 107 Toc sean 107 13 2 Using the Media Client SOMWaNS scccccaarsesercasevteuse ttti ri c tnu pet reta pe p etum ba taser E 107 Chapter 14 Memeo Autobackup Software eee eee eee ee eeeeueeceeeeeeenee nennen nnn n nnn n nnn nna nnn 109 14 1 Memeo Autobackup Introducti
113. e copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c If the modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program
114. e licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION NSA 220 User s Guide Appendix D Open Source Licences 0 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does 1 You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriat
115. e shows an example where two DNS server IP addresses are specified NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 80 Red Hat 9 0 DNS Settings in resolv conf nameserver 172 23 5 1 nameserver 172 23 5 2 3 After you edit and save the configuration files you must restart the network card Enter network restart inthe etc rc d init d directory The following figure shows an example Figure 81 Red Hat 9 0 Restart Ethernet Card root localhost init d network restart Shutting down interface eth0 OK Shutting down loopback interface OK Setting network parameters OK Bringing up loopback interface OK Bringing up interface eth0 OK Verifying Settings Enter ifconfig in a terminal screen to check your TCP IP properties Figure 82 Red Hat 9 0 Checking TCP IP Properties root localhost ifconfig etho Link encap Ethernet HWaddr 00 50 BA 72 5B 44 inet addr 172 23 19 129 Bcast 172 23 19 255 Mask 255 255 255 0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 717 errors 0 dropped 0 overruns 0 frame 0 TX packets 13 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 100 RX bytes 730412 713 2 Kb TX bytes 1570 1 5 Kb Interrupt 10 Base address 0x1000 root localhost NSA 220 User s Guide Pop up Windows In order to use the web configurator you may need to allow Web browser pop up windows from your devic
116. e top of the screen to navigate between the user level screens and menus The following table describes the global icons and tabs in the user level screens Table 2 User level Global Labels and Icons LABEL ICON DESCRIPTION Language Select the web configurator language from the drop down list box Click the Help icon to open a web help page specific to the screen you are currently configuring a Click the Logout icon at any time to exit the web configurator My NSA Click this tab to go to screens where you can manage your shares and access the files on public shares The administrator must go into the administration screens to manage other user s shares Password Click this tab to go to a screen where you can change your password Administration Click this tab to go to screens where you can manage advanced configurations You will have to log in as the administrator if you are not already logged in as the administrator NSA 220 User s Guide Chapter 2 Web Configurator Basics 2 5 My NSA Screen Use the My NSA screens to manage your shares and access the files in folders to which you have access A share is a set of user access permissions for a specific folder on a volume gives someone access to a folder It is equivalent to the Windows concept of a shared folder but the access rights are independent of the folder you configure the share and the folder separately You can map
117. ecting data on the NSA and explains how to use backup management software included on the CD 12 1 Protection Methods There are a variety of ways to protect your data on the NSA Below is a summary table of what can be done in each situation Table 42 Overview of Protection Methods SITUATION ACTION Unexpected NSA behavior after configuration Back up the NSA configuration file before you make changes major configuration changes Need to transfer data from your computer to the Use the Memeo Autobackup program NSA after volume s have been created Data infected by virus Use anti virus software on your computer to scan files before saving them onto the NSA Although this may be slow so you may want to schedule it to occur while no one is using the NSA Use a firewall with anti virus capability on your network Hard drive malfunction Use RAID NSA malfunction Back up data to another NSA or external USB hard Network down drive Natural disaster such as a fire or earthquake occurs where your NSA is located The following sections describe these methods in more detail See Section 6 4 on page 65 for more information on RAID 12 1 1 Configuration File Backup and Restoration Use the Maintenance gt Configuration menus to create a file of your NSA configurations such as passwords shares and volumes created network settings and so on If you re going to do some major configuration changes then it is
118. een Table 28 Users gt Add or Edit an Account LABEL DESCRIPTION Account Name Type a name from 1 to 32 single byte no Chinese characters allowed for example ASCII characters See Section 9 3 2 on page 85 for more details on usernames Password Create a password associated with this user You can type from one to 14 single byte no Chinese characters allowed for example ASCII characters Password confirm You must type the exact same password that you just typed in the above field Account Type Select Administrator to give full configuration and management access to the NSA Select User to give basic access rights to the NSA and allow the user to manage his own shares change his own password and access the contents of other shares to which he is given access rights Apply Click this button to save your changes back to the NSA Cancel Click this button to begin configuring this screen afresh 9 3 2 Usernames Enter a username from one to 32 characters The first character must be alphabetical case insensitive A Z a z numeric characters are not allowed as the first character The username can only contain the following characters e Alphanumeric A z 0 9 Unicode usernames are supported with CIFS logins but not FTP or web configurator logins NSA 220 User s Guide Chapter 9 Users Spaces _ underscores periods dashes Other limitations on usernames are
119. egory see Table 36 on page 98 for details Severity This displays how serious the log is rated by the NSA See Table 37 on page 98 for more information Message This displays a description of the log Click the top of the column to sort by alphabetical or reverse alphabetical order First Prev Use these hyperlinks to navigate to the first or previous log page Next Last Use these hyperlinks to navigate to the next or final log page 11 3 Log Classes The following table shows information on log classes Table 36 Log Classes CATEGORY DESCRIPTION Network This log class shows information on network configuration setting changes and so on Services This log class shows information on the operation of the NSA s built in services Shares This log class shows information on shares being created or deleted System This log class shows all other system related messages Users This log class shows information on user access to the NSA 11 4 Log Severity Levels The following table shows information on log severity levels Levels range from 0 to 6 with 0 being the most severe level log and 6 being an informational log only Log levels are not displayed in the logs and are for your reference only Table 37 Log Severity Levels LEVEL DESCRIPTION Emergency Alert Critical Error Warning Notice 0 oa A ojl N gt o Info
120. ement litigation then the reasonable value of the licenses granted by such Participant under Sections 2 1 or 2 2 shall be taken into account in determining the amount or value of any payment or license 8 4 In the event of termination under Sections 8 1 or 8 2 above all end user license agreements excluding distributors and resellers which have been validly granted by You or any distributor hereunder prior to termination shall survive termination 9 Limitation of liability Under no circumstances and under no legal theory whether tort including negligence contract or otherwise shall you the initial developer any other contributor or any distributor of covered code or any supplier of any of such parties be liable to any person for any indirect special incidental or consequential damages of any character including without limitation damages for loss of goodwill work stoppage computer failure or malfunction or any and all other commercial damages or losses even if such party shall have been informed of the possibility of such damages This limitation of liability shall not apply to liability for death or personal injury resulting from such party s negligence to the extent applicable law prohibits such limitation Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages so this exclusion and limitation may not apply to you 10 U S government end users The Covered Code is a commerci
121. ents are installed configure the TCP IP settings in order to communicate with your network Windows 95 98 Me Click Start Settings Control Panel and double click the Network icon to open the Network window NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 62 WIndows 95 98 Me Network Configuration Network l LPR for TCP IP Printing 3Com EtherLink 10 100 PCI TX NIC 3C905B TX Dial Up Adapter USB Fast Ethernet Adapter Y TCP P gt 3Com EtherLink 10 100 PCI TX NIC 3l Client for Microsoft Networks Installing Components The Network window Configuration tab displays a list of installed components You need a network adapter the TCP IP protocol and Client for Microsoft Networks If you need the adapter 1 Inthe Network window click Add 2 Select Adapter and then click Add 3 Select the manufacturer and model of your network adapter and then click OK If you need TCP IP 1 Inthe Network window click Add 2 Select Protocol and then click Add 3 Select Microsoft from the list of manufacturers 4 Select TCP IP from the list of network protocols and then click OK If you need Client for Microsoft Networks 1 Click Add 2 Select Client and then click Add 3 Select Microsoft from the list of manufacturers 4 Select Client for Microsoft Networks from the list of network clients and then click OK 5 Restart your computer so the changes you made take ef
122. er and the NSA Ping the NSA from your computer Make sure your computer s Ethernet adapter is installed and functioning properly In a Windows computer click Start All Programs Accessories and then Command Prompt In the Command Prompt window type ping followed by the NSA s IP address use the NDU to find the NSA s IP address if you don t know it and then press ENTER Make sure you are using Internet Explorer 6 0 and later or Firefox 1 07 and later Make sure your Internet browser does not block pop up windows and has JavaScripts and Java enabled See Appendix C on page 143 With Internet Explorer 6 you may also have to enable scripting of safe ActiveX controls See Section 15 3 2 on page 115 15 3 1 Reset the NSA If you forget your password or cannot access the web configurator use the RESET button at the rear of the NSA 15 3 1 1 Using the Reset Button When you use the following reset procedure the system name and admin password are returned to the factory defaults You may need to close and re open the NDU to discover the NSA This is because the NSA automatically re acquires IP address information so its IP address may change since If no IP address information is assigned the NSA uses Auto IP to assign itself an IP address and subnet mask For example you could connect the NSA directly to your computer If the computer is also set to get an IP address automatically the computer and the NSA will cho
123. er this license on an as is basis without warranty of any kind either expressed or implied including without limitation warranties that the covered code is free of defects merchantable fit for a particular purpose or non infringing The entire risk as to the quality and performance of the covered code is with you Should any covered code prove defective in any respect you not the initial developer or any other contributor assume the cost of any necessary servicing repair or correction This disclaimer of warranty constitutes an essential part of this license No use of any covered code is authorized hereunder except under this disclaimer 8 Termination 8 1 This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach All sublicenses to the Covered Code which are properly granted shall survive any termination of this License Provisions which by their nature must remain in effect beyond the termination of this License shall survive 8 2 If You initiate litigation by asserting a patent infringement claim excluding declaratory judgment actions against Initial Developer or a Contributor the Initial Developer or Contributor against whom You file such action is referred to as Participant alleging that such Participant s Contributor Version directly or indirectly infringes any patent then any and all ri
124. er to the Quick Start Guide for how to use the Memeo Autobackup software The software also includes help that you can display by clicking the help link in the screens NSA 220 User s Guide Chapter 14 Memeo Autobackup Software NSA 220 User s Guide Troubleshooting 15 1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter The potential problems are divided into the following categories Power Hardware Connections and LEDs NSA Login and Access Reset the NSA I Cannot Access The NSA External USB drives Media Server Functions 15 2 Power Hardware Connections and LEDs e The NSA PWR LED does not turn on no LEDs are on Make sure the NSA is turned on Make sure you are using the power adaptor or cord included with the NSA Make sure the power adaptor or cord is connected to the NSA and plugged in to an appropriate power source Make sure the power source is turned on Turn the NSA off and on e f the problem continues contact the vendor e An HDD LED is off The HDD LED is off when the NSA cannot detect a hard drive in the drive bay Replace or install a hard drive See Installing or replacing a hard drive e An HDD LED is orange NSA 220 User s Guide t Chapter 15 Troubleshooting Orange means that the NSA detected an error on the hard drive like a bad sector for example The NSA automatically tries
125. er with the media server function but the media client does not play some of the files or does not play them properly 1 Files with formats that are not supported on the media server may not display in the list See Appendix A on page 126 for the file formats that the media server supports 2 Ifyou are using media client software you may need to install codecs on your computer Since the media client software uses your computer s installed codecs files do not play if the required codec is not installed on your computer 3 The media client may not support the file s format NSA 220 User s Guide PART V Appendices and Index Product Specifications 121 Setting up Your Computer s IP Address 129 Open Source Licences 151 Legal Information 181 Customer Support 183 Index 187 Product Specifications See also Chapter 1 on page 25 for a general overview of the key features Feature Tables Physical Features These are the main external physical features Table 43 Physical Features USB Ports 2 USB version 2 ports Copy files directly to the NSA from compatible USB devices like card readers MP3 players memory sticks and digital cameras without using a computer Expand the NSA s storage capacity with compatible USB devices like hard drives Gigabit Ethernet Port The 10 100 1000 Mbps auto negotiating Ethernet port allows the NSA to detect the speed of incoming transmissions and
126. evice BS Notes tell you other important information for example other things you may need to configure or helpful tips or recommendations Syntax Conventions The NSA may be referred to as the NSA the device or the system in this User s Guide Product labels screen names field labels and field choices are all in bold font A key stroke is denoted by square brackets and uppercase text for example ENTER means the enter or return key on your keyboard Enter means for you to type one or more characters and then press the ENTER key Select or choose means for you to use one of the predefined choices A right angle bracket gt within a screen name denotes a mouse click For example Maintenance gt Log gt Log Setting means you first click Maintenance in the navigation panel then the Log sub menu and finally the Log Setting tab to get to that screen Units of measurement may denote the metric value or the scientific value For example k for kilo may denote 1000 or 1024 M for mega may denote 1000000 or 1048576 and so on e g is a Shorthand for for instance and i e means that is or in other words NSA 220 User s Guide Document Conventions Icons Used in Figures Figures in this User s Guide may use the following generic icons The NSA icon is not an exact representation of your
127. features included in the system setting screens Use the system setting screens to Specify the NSA s Windows CIFS server name and workgroup name Chose a time zone and or allow the NSA to synchronize with a time server Create and edit volumes see Chapter 6 on page 61 for details 5 1 1 Windows CIFS Common Internet File System CIFS is a standard protocol supported by most operating systems in order to share files across the network CIFS is included by default in Windows and Mac OSX operating systems Youcan use Samba with Linux to use CIFS CIFS transfers use security 5 2 Server Name Use this screen to configure your CIFS settings In this screen you can set your server name and specify if your NSA is a part of a workgroup or domain CIFS cannot be disabled on the NSA Click System Setting gt Server Name to open the following screen NSA 220 User s Guide Chapter 5 System Setting Screens Figure 36 System Setting gt Server Name System Name Server Identification Please specify the name of the Server Server name may contain only alphanumeric characters and minus signs It must begin with an alphabetic character and ends with an alphanumeric character Server Name nsa220 limit 15 characters Description Workgroup Name nsa200 limit 15 characters Apply Reset The following table describes the labels in these screens Table 12 System Setting gt Server Name LABEL DESCRIP
128. fect NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Configuring 1 Inthe Network window Configuration tab select your network adapter s TCP IP entry and click Properties 2 Click the IP Address tab f your IP address is dynamic select Obtain an IP address automatically Ifyou have a static IP address select Specify an IP address and type your information into the IP Address and Subnet Mask fields Figure 63 Windows 95 98 Me TCP IP Properties IP Address Bindings Advanced NeBios DNS Configuration Gateway WINS Configuration IP Address An IP address can be automatically assigned to this computer If your network does not automatically assign IP addresses ask your network administrator for an address and then type it in the space below C Specify an IP address IV Detect connection to network media 3 Click the DNS Configuration tab Ifyou do not know your DNS information select Disable DNS If you know your DNS information select Enable DNS and type the information in the fields below you may not need to fill them all in NSA 220 User s Guide 131 Appendix B Setting up Your Computer s IP Address Figure 64 Windows 95 98 Me TCP IP Properties DNS Configuration Bindings Advanced Netpios DNS Configuration Gateway WINS Configuration IP Address Cancel 4 Click the Gateway tab Ifyou do not kno
129. field uses the 24 hour format Here are a couple of examples Daylight Saving Time ends in the United States on the last Sunday of October Each time zone in the United States stops using Daylight Saving Time at 2 A M local time So in the United States you would select Last Sunday October and type 2 in the o clock field Daylight Saving Time ends in the European Union on the last Sunday of October All of the time zones in the European Union stop using Daylight Saving Time at the same moment 1 A M GMT or UTC So in the European Union you would select Last Sunday October The time you type in the o clock field depends on your time zone In Germany for instance you would type 2 because Germany s time zone is one hour ahead of GMT or UTC GMT 1 Offset Specify by how many hours to change the time for Daylight Saving Time Apply Click Apply to save your changes back to the NSA If you configured a new time and date Time Zone and Daylight Saving at the same time all of the settings take affect Reset Click Reset to begin configuring this screen afresh NSA 220 User s Guide Storage Screens This chapter covers storage systems volumes and disks on the NSA 6 1 Storage Introduction Use the Storage screens to create and manage NSA volumes internal and external and disks See Section 6 3 on page 62 for more information on volumes See Section 6 5 on page 68 for more information on disks
130. ge or after you have shut down the NSA several times NSA 220 User s Guide Chapter 5 System Setting Screens 5 3 2 Date Time Screen Click the System Setting link in the navigation panel and then click the Date Time link to access the System Setting gt Date Time screen Figure 37 System Setting gt Date Time Date amp Time Current System Date Time Setting Current Time 11 37 53 GMT 08 00 Current Date 2007 01 18 Date Time Setup C Manual New Time hh mm ss n t b t ps New Date yyyy mm dd pow z p s s Getfrom Time Server Time Server Address Specity My Own Timeserver gt Synchronize Now Time Zone Time Zone GMT 08 00 Beijing Hong Kong Perth Singapore Taipei 7 Enable Daylight Saving Start Date First E Monde A of anay E a 2 psv End Date rs E Monay Ej of anay Ej at 2 o Offset B 3 hours Apply Reset The following table describes the labels in this screen Table 13 System Setting gt Date Time LABEL DESCRIPTION Current System Date Time Setting Current Time This field displays the time of your NSA Current Date This field displays the date of your NSA Current Time Zone This field displays the time zone of your location This will set the time difference between your time zone and Greenwich Mean Time GMT Date Time Setup Manual Select this radio button to enter the time and date manually New Time hh mm ss This field displa
131. gh your FTP client must support UTF 8 Full support should be available in all Windows versions after Windows 2000 NSA 220 User s Guide Chapter 2 Web Configurator Basics 2 5 5 Share Paths A share path is the full path to a folder on a volume that will be shared for example mynsa topsecret ugs This is independent from a share name which is the name shown for this share when accessing the share via CIFS or FTP The path should start with a forward slash followed by a parent folder child folders leading to the folder that is to be shared The share path can include all characters including unicode characters that is you can use Chinese folder names for example except for the following characters e backslash this will be converted to forward slash and interpreted as a path delimiter forward slash this is always interpreted as a path delimiter so a folder cannot include it in its folder name colon asterisk question mark Tdouble quote lt less than gt greater than pipe Please also note the following as regards share paths If the share path is missing the root path slash the first forward slash the system will automatically add the initial slash If the share path is missing the end trailing slash the system will automatically add the trailing slash If the share path has V backslashes instead of forward slashes they will all be automatically conve
132. ghts granted by such Participant to You under Sections 2 1 and or 2 2 of this License shall upon 60 days notice from Participant terminate prospectively unless if within 60 days after receipt of notice You either 1 agree in writing to pay Participant a mutually agreeable reasonable royalty for Your past and future use of Modifications made by such Participant or 1 withdraw Your litigation claim with respect to the Contributor Version against such Participant If within 60 days of notice a reasonable royalty and payment arrangement are not mutually agreed upon in writing by the parties or the litigation claim is not withdrawn the rights granted by Participant to You under Sections 2 1 and or 2 2 automatically terminate at the expiration of the 60 day notice period specified above NSA 220 User s Guide Appendix D Open Source Licences any software hardware or device other than such Participant s Contributor Version directly or indirectly infringes any patent then any rights granted to You by such Participant under Sections 2 1 b and 2 2 b are revoked effective as of the date You first made used sold distributed or had made Modifications made by that Participant 8 3 If You assert a patent infringement claim against Participant alleging that such Participant s Contributor Version directly or indirectly infringes any patent where such claim is resolved such as by license or settlement prior to the initiation of patent infring
133. hanged System NOTICE System description is empty now System NOTICE DNS server setting is changed System NOTICE DNS server address is changed to be given from DHCP server System NOTICE DNS server setting is changed System NOTICE DNS server address is changed to be assigned by user System NOTICE Name server is changed Users ALERT Failed s login attempt incorrect password or inexistent username Users ALERT Failed s login attempt incorrect password or inexistent username Users NOTICE Add new user 96s Users NOTICE Change user s s password Users NOTICE Delete user s Users NOTICE User s on u u u u has been denied access from s Users INFO User s has logged in from 95s Users INFO User s has logged out from 96s Users INFO User s from s has been logged out re auth timeout Users INFO User s from s has been logged out lease timeout 11 6 Configuration Click Maintenance gt Configuration to open the following screen Use the Configuration screen to back up or restore the NSA configuration settings and enable or disable the hardware reset button NSA 220 User s Guide Chapter 11 Maintenance Screens Figure 55 Maintenance gt Configuration Configuration Backup Restore Configuration Restore Backup Current Configuration Settings Click the Backup button to save the current configuration of our system to your local computer To restore a previously saved configuration fi
134. he Original Code or Modifications or the combination of the Original Code and Modifications in each case including portions thereof 1 4 Electronic Distribution Mechanism means a mechanism generally accepted in the software development community for the electronic transfer of data 1 5 Executable means Covered Code in any form other than Source Code 1 6 Initial Developer means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A 1 7 Larger Work means a work which combines Covered Code or portions thereof with code not governed by the terms of this License 1 8 License means this document 1 8 1 Licensable means having the right to grant to the maximum extent possible whether at the time of the initial grant or subsequently acquired any and all of the rights conveyed herein 1 9 Modifications means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications When Covered Code is released as a series of files a Modification is Any addition to or deletion from the contents of a file containing Original Code or previous Modifications Any new file that contains any part of the Original Code or previous Modifications 1 10 Original Code means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code and which at the time of
135. her distribution licence including the GNU Public Licence NSA 220 User s Guide Appendix D Open Source Licences BSD This Product include mod ssl software under BSD license Copyright c dates as appropriate to package The Regents of the University of California All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED A
136. his license for certain libraries in order to permit linking those libraries into non free programs When a program is linked with a library whether statically or using a shared library the combination of the two is legally speaking a combined work a derivative of the original library The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom The Lesser General Public License permits more lax criteria for linking other code with the library NSA 220 User s Guide 155 Appendix D Open Source Licences We call this license the Lesser General Public License because it does Less to protect the user s freedom than the ordinary General Public License It also provides other free software developers Less of an advantage over competing non free programs These disadvantages are the reason we use the ordinary General Public License for many libraries However the Lesser license provides advantages in certain special circumstances For example on rare occasions there may be a special need to encourage the widest possible use of a certain library so that it becomes a de facto standard To achieve this non free programs must be allowed to use the library A more frequent case is that a free library does the same job as widely used non free libraries In this case there is little to gain by limiting the free library to free software only so we use the Lesser General Public
137. ical background on JBOD and the RAID levels used on the NSA Typical applications for each method are also shown there 6 3 1 1 One Disk If you only have one disk you must use JBOD All disk space is used for your data none is used for backup If the disk fails then you lose all the data on that volume disk 6 3 1 2 Two Disks You may choose JBOD RAID 0 or RAID 1 With two disks you could create up to two JBOD volumes one RAID 0 or RAID 1 volume Choose JBOD for flexibility and maximum usage of disk space for data You can either add an additional disk to your one disk JBOD volume and you don t have to re create shares access rights etc or create a different JBOD volume and create new shares access rights and so on NSA 220 User s Guide Chapter 6 Storage Screens Choose RAID 0 if performance matters more than data security RAID 0 has the fastest read and write performance but 1f one disk fails you lose all your data on the volume It has fast performance as it can read and write to two disks simultaneously Performance may matter more than data security to gamers for example This method may also be acceptable for data that is already backed up somewhere else Choose RAID 1 if data security is more important than performance Since RAID 1 mirrors data onto a second disk you can recover all data even if one disk fails but the performance is slower than RAID 0 6 3 2 Volume Status You the administrator
138. iew Favorites Tools Help Q j hg d JI Search e Folders Fas Address Control Panel v3 Control Panel G Switch to Category View See Also A Windows Update Controllers 3 Right click Local Area Connection and then click Properties NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 67 Windows XP Control Panel Network Connections Properties s Network Connections File Edit View Favorites Tools Advanced Help Q sak amp 2 BA Search Folders Ei Address e Network Connections LAN or High Speed Internet Network Tasks ocal Area Connection connection Standard PCI Fast Ethernet Adapte 9 Set up a home or small Disable office network sa atus Disable this network i device Repair PN Repair this connection Bridge Connections mij Rename this connection view status of this connection Change settings of this Rename connection Create Shortcut 4 Select Internet Protocol TCP IP under the General tab in Win XP and then click Properties Figure 68 Windows XP Local Area Connection Properties 4 Local Area Connection Properties General Authentication Advanced Connect using BE Accton EN1207D TX PCI Fast Ethernet Adapter This connection uses the following items fel Client for Microsoft Networks Description Transmission Control Protocol Internet Protocol The default wide area
139. iginal version of the Work and any modifications or additions to that Work or Derivative Works thereof that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner For the purposes of this definition submitted means any form of electronic verbal or written communication sent to the Licensor or its representatives including but not limited to communication on electronic mailing lists source code control systems and issue tracking systems that are managed by or on behalf of the Licensor for the purpose of discussing and improving the Work but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as Not a Contribution Contributor shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work 2 Grant of Copyright License Subject to the terms and conditions of this License each Contributor hereby grants to You a perpetual worldwide non exclusive no charge royalty free irrevocable copyright license to reproduce prepare Derivative Works of publicly display publicly perform sublicense and distribute the Work and such Derivative Works in Source or Object form 3 Grant of Patent License Subject to the terms and conditions of this License each Contribut
140. information Time Zone Time Zone Choose the time zone of your location This will set the time difference between your time zone and Greenwich Mean Time GMT Enable Daylight Saving Daylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening Select this option if you use Daylight Saving Time Start Date Configure the day and time when Daylight Saving Time starts if you selected Enable Daylight Saving The o clock field uses the 24 hour format Here are a couple of examples Daylight Saving Time starts in most parts of the United States on the first Sunday of April Each time zone in the United States starts using Daylight Saving Time at 2 A M local time So in the United States you would select First Sunday April and type 2 in the o clock field Daylight Saving Time starts in the European Union on the last Sunday of March All of the time zones in the European Union start using Daylight Saving Time at the same moment 1 A M GMT or UTC So in the European Union you would select Last Sunday March The time you type in the o clock field depends on your time zone In Germany for instance you would type 2 because Germany s time zone is one hour ahead of GMT or UTC GMT 1 End Date Configure the day and time when Daylight Saving Time ends if you selected Enable Daylight Saving The o clock
141. installed and enabled in your network connection s properties n Windows XP or 2000 click Start gt Settings gt Control Panel gt Network Connections Network and Dial up Connections in Windows 2000 NT gt Local Area Connection gt Properties Check that Client for Microsoft Networks is in the list of components and has its check box selected 15 5 External USB drives 2 e My external USB drive is read only If your USB drive was formatted as NTFS then it is read only on the NSA the volume status displays as OK To solve this problem re format your USB drive using the NSA or FAT or FAT32 using a computer See Chapter 6 on page 61 for information on volume creation using the NSA recommended Back up the files on your computer before you format the USB drive e The COPY LED is red Copying files from a USB device failed The USB device may not be compatible with the NSA Try save the files onto a computer and then from the computer to the NSA through the network connection NSA 220 User s Guide Chapter 15 Troubleshooting 15 6 Media Server Functions e set the media server function to publish a folder but some of the files in the folder do not display in the list on the media client Files with formats that are not supported on the media server may not display in the list See Appendix A on page 126 for the file formats that the media server supports e published a fold
142. is improves performance but does not deliver fault tolerance If one drive fails then all data in the array is lost reco Data Protection RAID1 Provides disk mirroring Level 1 provides twice the read transaction rate of o am z L B single disks and the same write transaction rate as single disks reco Disk Capacity JBOD C dum F Not a typical implementation and rarely used Level 2 stripes data at the bit A level rather than the block level ABCO Volume will be created on ER Apply Cancel The following table describes the labels in this screen Table 19 Create a New Internal Volume LABEL DESCRIPTION System Performance Use RAID 0 if you want maximum speed for your disks and or you have RAID 0 other means of protecting your data This is only available when you have two hard disks installed Data Protection RAID 1 Use RAID 1 if you want to mirror all data on one disk to the other disk This is only available when you have two hard disks installed Disk Capacity JBOD Use JBOD if you want maximum storage capacity and or you have other means of protecting your data JBOD is the only option if you only have one disk installed Volume will be created on This field lists all hard disks installed inside the NSA Select which disks should make up this volume A disk can only belong to one volume You do not need to select anything if only one hard disk is installed NSA 220 User s Guide
143. is section lists the volume s existing folders Select the one for which you want to create a share You can also click the folder s name to navigate to a sub folder within the folder Create Folder Type a folder name and click Create Folder to make a new folder The name can be 1 to 255 single byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing folder in the same path See Section 2 5 4 on page 37 for more information on folder names Back Click this button to return to the previous screen without keeping selecting a folder Apply Click this button to return to the previous screen with your folder selection NSA 220 User s Guide Chapter 10 Shares NSA 220 User s Guide ART IV Protection Media Client Maintenance amp Troubleshooting Maintenance Screens 97 Protecting Your Data 105 Media Client Software 107 Troubleshooting 111 Maintenance Screens This chapter discusses the Maintenance screens 11 1 Maintenance Overview Use the maintenance screens to View logs Manage the NSA configuration file Upload new firmware Restart or shut down your NSA 11 2 Log Click Maintenance gt Log to display the following screen The Log screen displays all NSA logs There are at most 128 entries in the log Older logs are removed by the system You cannot download the log file via FTP or CIFS Figure 5
144. king The NSA is saving data to the hard disk drive Orange On The NSA detected an error on the hard disk drive like a bad sector for example The NSA automatically tries to recover a bad sector but the LED stays orange until the NSA restarts Blinking The hard disk drive connection came loose or the NSA detected an error on the hard disk drive like a bad sector for example and is saving data to the hard disk drive Red On b hard disk drive has failed and the NSA can no longer detect it Off The NSA cannot detect a hard disk in the disk bay SYS Green On The NSA has fully started and is operating normally Blinking The NSA is starting up Red On The NSA has failed NSA 220 User s Guide Chapter 1 Getting to Know Your NSA Table 1 LEDs continued LED COLOR STATUS DESCRIPTION LAN Green On The NSA has a successful 10 100Mbps Ethernet connection Blinking The 100M LAN is sending or receiving packets Off The NSA does not have a 10 100Mbps Ethernet connection Yellow On The NSA has a successful 1000Mbps Ethernet connection Blinking The 1000M LAN is sending or receiving packets Off The NSA does not have a 1000Mbps Ethernet connection COPY Green On A USB device is connected to the NSA Blinking The NSA is copying files from the USB device Red On Copying files from the USB device failed Off No USB device is connected A The HDD1 and HDD2 LE
145. ld shows which disks and data storage system the volume is using File System This field displays the file system that an external USB volume is using Disk s Click or roll your mouse over a link in this column to display the following details about the hard drive located in the corresponding hard drive bay Type Whether it is an internal or external USB hard drive Model Name This is the hard disk number that identifies the disk File System The file system that an external volume is using Capacity The total storage space on the disk Capacity This field shows total disk size the percentage of the volume being used and the percentage that is available Actions This field displays icons allowing you to edit scan repair or delete a volume You can also locate or eject an external volume Note If you delete a volume all data in the volume disk s is erased You see a warning screen before you delete a volume Figure 39 Delete a Volume Warning Screen 2 ALL Data On this Volume will be DELETED Are you sure you want to DELETE this Volume Cancel 6 3 Volumes and RAID A volume is a storage area on a disk or disks You can create volumes on the internal disks and external disks attached to the USB port s You can spread a volume across internal disks but not between internal and external disks RAID Redundant Array of Independent Disks or JBOD is the storage method that the NSA uses
146. le to your system browse to the location of the configuration file and click Restore Restore File Browse The following table describes the labels in this screen Table 39 Maintenance gt Configuration LABEL DESCRIPTION Backup Current Configuration Settings Backup Click Backup to save the current configuration of the NSA to your computer A pop up screen appears asking you to confirm Click OK to continue or Cancel to quit Restore Configuration After you restore a configuration if a share path does not exist then it appears be in red Browse Click Browse to locate a previously saved configuration file Restore Click Restore to load the previously saved configuration file to the NSA This replaces your current NSA configuration settings with the settings in the previously saved configuration file A pop up screen appears asking you to confirm Click OK to continue or Cancel to quit 11 7 Firmware Upgrade Click the Maintenance link in the Navigation panel and then click the FW Upgrade link or the FW Upgrade tab to access the Maintenance gt FW Upgrade screen Use this screen to upgrade the NSA firmware You should first have downloaded the latest firmware files from the ZyXEL website Figure 56 Maintenance gt FW Upgrade FW Upgrade Firmware Upgrade upgrading A Caution To upgrade the internal router firmware browse to the location of the bi
147. length of time that an FTP connection can be idle before timing out Enable Anonymous FTP Select Enable Anonymous FTP Access to allow any user to log into the Access NSA using FTP or anonymous as a username and no password Any other name is considered a username so must be valid and have a corresponding correct password Apply Click Apply to save your changes back to the NSA Reset Click Reset to begin configuring this screen afresh 8 4 Media Server The NSA can function as a media server where you store multimedia files videos music and photos By default computers on your network can use media client software included on the CD to play multimedia files stored in the Public Video Music and Photo shares you can also apply the multimedia server function to other shares Hardware based media clients like the DMA 1000 can also play the files See Appendix A on page 126 for the supported multimedia file formats LES The NSA provides no security for the multimedia server function Any DLNA compliant media client on your network can play the multimedia files NSA 220 User s Guide Chapter 8 Application Screens 8 5 Media Server Screen Click Applications gt Media Server to open the following screen Use this screen to turn the media server off and on and see which shares the NSA will publish share with media clients Figure 46 Applications gt Media Server Media Ser
148. lity of your own most confidential information You agree to reasonably communicate the terms and conditions of this License Agreement to those persons employed by you who come into contact with the Software and to use reasonable best efforts to ensure their compliance with such terms and conditions including without limitation not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software 6 No Warranty THE SOFTWARE IS PROVIDED AS IS TO THE MAXIMUM EXTENT PERMITTED BY LAW ZyXEL DISCLAIMS ALL WARRANTIES OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING WITHOUT LIMITATION IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ZyXEL DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET ANY REQUIREMENTS OR NEEDS YOU MAY HAVE OR THAT THE SOFTWARE WILL OPERATE ERROR FREE OR IN AN UNINTERUPTED FASHION OR THAT ANY DEFECTS OR ERRORS IN THE SOFTWARE WILL BE CORRECTED OR THAT THE SOFTWARE IS COMPATIBLE WITH ANY PARTICULAR PLATFORM SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO YOU IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION THEN ALL EXPRESS AND IMPLIED WARRANTIES SHALL BE LIMITED IN DURATION TO A PERIOD OF THIRTY 30 DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD 7 Limitation of Liabili
149. loading and downloading files The NSA allows FTP access to shares folders or files with names encoded in the UTF 8 8 bit UCS Unicode Transformation Format format So your FTP client must support UTF 8 in order to access shares folders or files on the NSA with Unicode names FTP is not a secure protocol Your file transfers could be subject to snooping 8 3 FTP Screen Click Applications gt FTP to open the following screen Use the FTP screen to configure your NSA FTP settings In this screen you can enable or disable FTP set a connection limit idle timeout and enable or disable anonymous FTP access See Section 8 2 on page 77 for more details on FTP NSA 220 User s Guide Chapter 8 Application Screens Figure 45 Applications FTP FTP FIP IV Enable FTP Q Note Connection Limit 10 Idle Timeout 300 Enable Anonymous FTP Access To configure a share to allow anonymous FTP access go to the configure shares page and modify a share s access rights to allow the user Anonymous FTP Seconds Apply Reset The following table describes the labels in this screen Table 24 Applications FTP LABEL DESCRIPTION FTP Enable FTP Select the Enable FTP check box to allow users to connect to the NSA via FTP otherwise clear the check box Connection Limit Enter the maximum number of concurrent connections allowed on the NSA in this field Idle Timeout Enter the
150. login page change its IP address configuration or map to a Windows network drive Memeo Autobackup Memeo Autobackup is a tool for Windows users to create backups of data stored on their Windows computers to an NSA This software is included on the CD Time and Date Configure a time server and set a time zone for your NSA to show the correct times in logs Specification Tables The NSA hardware specifications are shown in the following table Table 45 NSA Hardware Specifications Default IP Address DHCP client If no DHCP server is found the NSA uses Auto IP to choose an IP address in the 169 254 X X subnet where X is a number from 1 to 254 Default Subnet Mask DHCP client by default If no DHCP server is found the subnet mask defaults to 255 255 255 0 24 bits Default Username admin Default Password 1234 Dimensions 113 W 202 D 142 H mm Weight 1 5 kg without hard drives Drive Trays Two Compatible Hard Disks SATA and SATA 3 0 Gbit s Serial Advanced Technology Attachment compatible hard drives NSA 220 User s Guide Appendix A Product Specifications Table 45 NSA Hardware Specifications continued Maximum Storage Capacity 1 5 TB with two 750 GB hard drives installed is the largest storage capacity that has been tested as of this writing The NSA theoretically supports up to 17 6 TB per volume for a maximum possible ca
151. loper of the Original Code is Portions created by are Copyright C All Rights Reserved Contributor s Alternatively the contents of this file may be used under the terms of the license the License in which case the provisions of License are applicable instead of those above If you wish to allow use of your version of this file only under the terms of the License and not to allow others to use your version of this file under the MPL indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the License If you do not delete the provisions above a recipient may use your version of this file under either the MPL or the __ License NOTE The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications This Product includes expiate and krb5 software under the MIT License The MIT License Copyright c year copyright holders Permission is hereby granted free of charge to any person obtaining a copy of this software and associated documentation files the Software to deal in the Software without restriction including without limitation the rights to use copy modify merge publish distribute sublicense and or sell copies of the Software
152. me will be lost The major benefit of RAID 0 is performance The following figure shows two disks in a single RAID 0 volume Data can be written and read across disks simultaneously for faster performance Table 17 RAID 0 NSA 220 User s Guide Chapter 6 Storage Screens RAID 0 capacity is the size of the smallest disk multiplied by the number of disks you have configured at RAID 0 on the NSA For example if you have two disks of sizes 100 GB and 200 GB respectively in a RAID 0 volume then the maximum capacity is 200 GB 2 100 GB the smallest disk size and the remaining space 100 GB is unused Typical applications for RAID 0 are non critical data or data that changes infrequently and is backed up regularly requiring high write speed such as audio video graphics games and so on 6 4 3 RAID 1 RAID 1 creates an exact copy or mirror of a set of data on another disk This 1s useful when data backup is more important than data capacity The following figure shows two disks in a single RAID 1 volume with mirrored data Data is duplicated across two disks so if one disk fails there is still a copy of the data Table 18 RAID 1 As RAID 1 uses mirroring and duplexing a RAID 1 volume needs an even number of disks two or four for the NSA RAID 1 capacity is limited to the size of the smallest disk in the RAID array For example if you have two disks of sizes 150 GB and 200 GB respectively in one RAID 1 volume then th
153. n a home network in order to make digital living easy and seamless The group s members include Nokia Intel Microsoft Sony Motorola Philips Samsung Matsushita and Hewlett Packard Install the included DLNA compliant media client software on your Windows XP computers to let them browse and play files stored on the NSA The software requires Windows XP See the Quick Start Guide for how to install the media client software and the requirement details 13 2 Using the Media Client Software Refer to the Quick Start Guide and the help Start gt All Programs gt DigiOn gt Help for details on how to use the media client software NSA 220 User s Guide Chapter 13 Media Client Software NSA 220 User s Guide Memeo Autobackup Software This chapter introduces the Memeo Autobackup software included on the CD 14 1 Memeo Autobackup Introduction Use the Memeo Autobackup software included on the CD to automatically back up selected files from your computer to the NSA whenever you modify the files You can have Memeo backup specific files folders of files or types of files Install the included DLNA compliant Memeo Autobackup software on your Windows 2000 or later computers to let them browse and play files stored on the NSA The software requires Windows XP See the Quick Start Guide for how to install the Memeo Autobackup software and the requirement details 14 2 Using the Memeo Autobackup Software Ref
154. n page 85 for more details on usernames New Password Retype to confirm You must type the exact same password that you just typed in the above field Apply Click this button to save your changes back to the NSA Cancel Click this button to begin configuring this screen afresh 9 5 Delete Account Screen In the Users screen select an account and click Delete Account to open this screen Use this screen to remove a user account Figure 50 Users gt Delete Account UR Delete Account steve Do you wish to proceed Yes No The following table describes the labels in this screen Table 30 Users gt Delete Account LABEL DESCRIPTION Click Yes to remove the user account Management of any shares that belonged to the account passes to the default administrator account Yes No Click No to keep the user account NSA 220 User s Guide Chapter 9 Users NSA 220 User s Guide Shares This chapter introduces the Shares screens of the NSA 10 1 Shares Introduction Use the Shares screens to create and manage shares A share is a set of user access permissions mapped to a specific folder on a volume It is equivalent to the Windows concept of a shared folder but is independent of the folder You can map a share to a network drive for easy and familiar file transfer for Windows users 10 1 1 Share Icons These are the share icons Table 31 Share Ic
155. n screens The following table describes the global icons and labels Table 8 Global Labels and Icons LABEL ICON DESCRIPTION Language Select the web configurator language from the drop down list box Click this Help icon to open a web help page specific to the screen you are currently configuring Click this About icon to view the model name firmware version and copyright Click this Home icon to return to the user level screens 4 Click this Logout icon at any time to exit the web configurator This is the same as clicking the Logout link at the bottom of the Navigation panel 2 6 2 Navigation Panel The navigation panel on the left of the screen 2 contains screen links Click a link to display sub links There are no sub links for the Status screen Certain screens also contain hyper links that allow you to jump to another screen NSA 220 User s Guide Chapter 2 Web Configurator Basics Click the Status icon to open the Status screens Figure 15 Navigation Panel Links NSA 220 System Setting see Name Date Time r Storage r Network r Applications r Users r Shares iz Maintenance Log FW Upgrade Shutdown Logout Configuration The following table describes the navigation panel screens Table 9 Screens Summary LINK TAB FUNCTION Status This screen shows system information the status of
156. nary BIN upgrade file and click Upload Upgrade files can be downloaded from website If the upgrade file is compressed ZIP file you must first extract the binary BIN file In some cases you may need to reconfigure the router after You are currently using firmware version V1 0 0 AFB 0 a0 8 2n 12 12 06 Rev 1624 Firmware File Browse Please Do Not Click any link while firmware file uploading Upload Reset NSA 220 User s Guide Chapter 11 Maintenance Screens The following table describes the labels in this screen Table 40 Maintenance FW Upgrade LABEL DESCRIPTION Firmware Upgrade Firmware File Type the location of the firmware file you want to upload Browse Click Browse to find the file on your computer Upgrade Click Upgrade to upload the new firmware The NSA automatically restarts after you upgrade Wait until the restart completes before accessing the NSA again If you interrupt the upgrade then the NSA may become unusable Reset Click Reset to begin configuring this screen afresh 11 8 Shutdown Click the Maintenance link in the Navigation panel and then click the Shutdown link or the Shutdown tab to access the Maintenance gt Shutdown screen Use this screen to turn off the NSA or perform a software restart A software restart is faster than turning the NSA off and then turning it on again Before shutting down or restarting check the System Status gt
157. network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected 5 The Internet Protocol TCP IP Properties window opens the General tab in Windows XP f you have a dynamic IP address click Obtain an IP address automatically f you have a static IP address click Use the following IP Address and fill in the IP address Subnet mask and Default gateway fields Click Advanced NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 69 Windows XP Internet Protocol TCP IP Properties Internet Protocol TCP IP Properties General Altemate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address Obtain DNS server address automatically Use the following DNS server addresses 6 Ifyou do not know your gateway s IP address remove any previously installed gateways in the IP Settings tab and click OK Do one or more of the following if you want to configure additional IP addresses In the IP Settings tab in IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address
158. not defined for the user s connection NSA 220 User s Guide Chapter 4 Status Screen Table 11 Status continued LABEL DESCRIPTION Connected At This displays the date and time the user last connected to the NSA in year month day hour minute second format IP Address This displays the IP address of the computer connected to the NSA 4 1 1 Session Example Windows Open windows explorer and type two back slashes followed by the NSA name or IP address Initially you can only read and write to the Public Video Music and Photo folders until you create other shares on the NSA This session is then displayed as shown in Figure 34 on page Sl Figure 35 Session Example Windows ddr ess 1Y myNsa X Name Comments Y Samba 3 0 11 myNSA us Faxes Shows installed printers and fax a Y Nsa2400 Z public For anonymous CIFS users Y Nsa tina 2 ftp upload for anonymous ftp users to uplo X Pmmii coe 2 Ftp download for anonymous ftp users to dow 4 Skywalker Y Tw1477 testpc M Tw2034 01 NSA 220 User s Guide Chapter 4 Status Screen NSA 220 User s Guide PART Il Status System Storage and Network System Setting Screens 57 e Screens 61 Network Screen 73 System Setting Screens This chapter discusses the system setting screens 5 1 System Setting Screens This section gives an overview of the various
159. ns unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 5 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it 6 Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy
160. nse from time to time Each version will be given a distinguishing version number Once covered code has been published under a particular version of the license you may always continue to use it under the terms of that version You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group No one other than the PHP Group has the right to modify the terms applicable to covered code created under this License 6 Redistributions of any form whatsoever must retain the following acknowledgment This product includes PHP freely available from lt http www php net gt THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This software consists of voluntary contributions made by many individual
161. nt Type This field displays whether the selected account is an administrator account or a user account Used Space This field displays how much storage space the selected account is currently using This only applies for files that the user saved onto the NSA while logged in with that username Change Account Click this to edit the selected account Properties Change Password Click this to edit the selected account s password Delete Account Click this to remove the selected account 9 2 1 User Icons The following table describes the user icons Table 27 User Icons ICON DESCRIPTION amp The green icon is for an administrator account e The blue icon is for a user account NSA 220 User s Guide Chapter 9 Users 9 3 Adding or Editing a User Account Click the Create a New Account button in the Users screen to create a new NSA user account with NSA access password Click the Change Account Properties button in the screen shown previously to edit an existing account 9 3 1 Add or Edit a User Account Screen Use this screen to add a user account Figure 48 Users gt Add or Edit an Account New Account Account Name Password Password Confirm Account Type Administrator C User Q Note With an administrator account you can Create Change and Delete accounts make system wide changes Apply Cancel The following table describes the labels in this scr
162. nterfacing devices with data transfers rates of up to 480 Mbps XHTML 1 0 Extensible HyperText Markup Language Second Edition XHTML 1 1 Module based XHTML NSA 220 User s Guide Appendix A Product Specifications Supported Media Server Content Formats BS The following describes the details about the files that the NSA media server can publish Table 48 Supported Media Server Content Formats CATEGORY FILE TYPE EXTENSION Video MPEG 1 MPEG 2 m2p mpe mpeg mpg vob Windows Media Video asf wmv AVI avi DivX divx avi DVR MS dvr ms Music MP3 mp3 MPEG 4 AAC m4a Ogg Vorbis ogg WAVE wav Windows Media Audio wma M3U Playlist m3u Photo Bitmap bmp GIF gif JPEG jpeg jpg PNG png TIFF tiff tif Files may be converted to JPEG to allow play back on client applications that do not support the original file formats Not all published file types can be viewed by all client applications Power Consumption BS The NSA was tested using the specified power sources with the external power adapter and with two hard drives installed This table is a laboratory test of NSA power consumption for your reference only NSA 220 User s Guide Appendix A Product Specifications Table 49 Power Consumption in Watts W POWER SOURCE SYSTEM BOOT UP SYSTEM READ WRITE SYSTEM IDLE 240V 50Hz 58 14W 31 2W 23 9W 120V 60Hz 57 76
163. o zyxel hu Telephone 36 1 3361649 Fax 36 1 3259100 Web Site www zyxel hu Regular Mail ZyXEL Hungary 48 Zoldlomb Str H 1025 Budapest Hungary Kazakhstan Support http zyxel kz support Sales E mail sales zyxel kz NSA 220 User s Guide Appendix F Customer Support Telephone 7 3272 590 698 Fax 7 3272 590 689 Web Site www zyxel kz Regular Mail ZyXEL Kazakhstan 43 Dostyk ave Office 414 Dostyk Business Centre 050010 Almaty Republic of Kazakhstan North America Support E mail support zyxel com Sales E mail sales zyxel com Telephone 1 800 255 4101 1 714 632 0882 Fax 1 714 632 0858 Web Site www us zyxel com FTP Site ftp us zyxel com Regular Mail ZyXEL Communications Inc 1130 N Miller St Anaheim CA 92806 2001 U S A Norway e e e e Support E mail support zyxel no Sales E mail sales zyxel no Telephone 47 22 80 61 80 Fax 47 22 80 61 81 Web Site www zyxel no Regular Mail ZyXEL Communications A S Nils Hansens vei 13 0667 Oslo Norway Poland e e e E mail info pl zyxel com Telephone 48 22 333 8250 Fax 48 22 333 8251 Web Site www pl zyxel com Regular Mail ZyXEL Communications ul Okrzei 1A 03 715 Warszawa Poland Russia e Support http zyxel ru support Sales E mail sales zyxel ru Telephone 7 095 542 89 29 Fax 7 095 542 89 25 Web Site www zyxel ru Regular Mail ZyXEL Russia Ostrovityanova 3
164. odify display perform sublicense and distribute the Modifications created by such Contributor or portions thereof either on an unmodified basis with other Modifications as Covered Code and or as part of a Larger Work and under Patent Claims infringed by the making using or selling of Modifications made by that Contributor either alone and or in combination with its Contributor Version or portions of such combination to make use sell offer for sale have made and or otherwise dispose of 1 Modifications made by that Contributor or portions thereof and 2 the combination of Modifications made by that Contributor with its Contributor Version or portions of such combination the licenses granted in Sections 2 2 a and 2 2 b are effective on the date Contributor first makes Commercial Use of the Covered Code Notwithstanding Section 2 2 b above no patent license is granted 1 for any code that Contributor has deleted from the Contributor Version 2 separate from the Contributor Version 3 for infringements caused by 1 third party modifications of Contributor Version or ii the combination of Modifications made by that Contributor with other software except as part of the Contributor Version or other devices or 4 under Patent Claims infringed by Covered Code in the absence of Modifications made by that Contributor 3 Distribution Obligations 3 1 Application of License The Modifications which You create or to which Yo
165. oducts derived from this software without prior written permission For written permission please contact openssl core openssl org Products derived from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project Redistributions of any form whatsoever must retain the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com NSA 220 User s Guide Appendix D Open Source
166. ome network Users back up and share data on the NSA The DMA 1000 plays the NSA s media files on the TV A USB hard drive provides extra storage space and files are copied directly from the USB memory stick to the NSA Place the NSA behind a firewall and or IDP Intrusion Detection and Prevention device to protect it from attacks from the Internet NSA 220 User s Guide 25 Chapter 1 Getting to Know Your NSA LES See the product specifications appendix for a more detailed list of NSA features and lists of compatible hard drives and USB devices Refer to the Quick Start Guide for hardware connections and how to install and remove hard drives from the disk trays LES Turn off and disconnect the NSA before you install or remove internal hard drives 1 1 1 LEDs The NSA LEDs lights tell you important information Figure 2 NSA Front Panel o ZyXEL Network Attached Storage NSA 220 User s Guide Chapter 1 Getting to Know Your NSA Figure 3 NSA Rear Panel TE 5060248015348 ZyXEL Communications Corporation Model Number NSA 220 aaa I 1 dpi Dems Power Rating 19VOC 342A Power Cons 385 Watt max This table describes the NSA s LEDs Table 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned on and receiving power Off The NSA is turned off HDD1 Green On The hard disk drive is connected properly to the NSA Reps Blin
167. on sssssssssssssssseenerene nennen 109 14 2 Using the Memeo Autobackup Software cessessesisseeseeiie te esent tesa 109 Chapter 15 lix uupmsinpme 111 15 1 Troubleshooting QVOPISNW isinisi oacccen epar podra ined edad En E ne dae pad 111 15 2 Power Hardware Connections amd LEDs rre ER XX EEEERER IY EREE Dp x CR ER Fx x d d taa 111 VES BE DIOE gu Eee M 113 NSA 220 User s Guide Table of Contents Erw Ic 4 NSA MT 114 15 3 2 Enabling Scripting of Safe ActiveX Controls eee enint 115 15 4 1 Cannot Access The NSA sidus estie ind rev tu dU eo CI AW Eo Ebo a PU Fon ed LE Ee edd vOv Ex pl eO E ov En 116 15 9 External USB OE aod m re Poet Ro eet E EDU RU a c P EE it alpaca 117 15 6 Media Server Functions f Lm 118 Part V Appendices and Index eeeeeeeeeeeeeess 119 Appendix A Product SpeocificatlonS esc et REPERI CRUEL eR EE LOS cU E PEE DMKRD I ATUM ERR E DEO UE 121 Appendix B Setting up Your Computer s IP Adress ccccccccecceccceecceeeeeeeeeeeeeeeeesseneeeess 129 Appendix Popup VEIDOONWe aa bo bite ene RI M RERUMS DERE RM LE M EIU bU FR A RET D RE AR Nd A 143 Appendix D Open Source LIESS usse ciakire eu R CHER RRKRZER ER DU E a 151 Appendix E Legal Informiglipri aieo tenere tarn EX MEE MR R 181 Appendix F Customer SU
168. ons ICON DESCRIPTION This represents a share on a volume on the internal hard drives Click this icon to m access the share s contents The folder appears as gray if the share is not currently available because the hard drive was removed for example access the share s contents The folder appears as gray if the share is not currently This represents a share on a volume on an external USB device Click this icon to available because the USB drive was removed for example 10 1 2 Shares Screen Click Shares in the Navigation panel to open the following screen This screen lists all of the shares NSA 220 User s Guide Chapter 10 Shares Figure 51 Shares Shares List Create a New Share Internal Shares f public video External Shares USB1 s video gt Share Owner admin photo admin Lu Share Type pre defined i E Change Share Properties Bi Delete Share The following table describes the labels in this screen See Table 31 on page 89 for icon details Table 32 Shares LABEL DESCRIPTION Create a New Share Click this button to add a share External Shares These are shares on the external USB devices Share Owner This is the name of the user account to which this share belongs Share Type This field displays built in for system shares You cannot delete these shares these are the public and admin shares Thi
169. opy and distribute verbatim copies of this document is granted This Product includes open SSL under the Open SSL License NSA 220 User s Guide Appendix D Open Source Licences Open SSL License LICENSE ISSUES The OpenSSL toolkit stays under a dual license i e both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit See below for the actual license texts Actually both licenses are BSD style Open Source licenses In case of any license issues related to OpenSSL please contact openssl core g openssl org OpenSSL License Copyright c 1998 2004 The OpenSSL Project All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution All advertising materials mentioning features or use of this software must display the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote pr
170. or hereby grants to You a perpetual worldwide non exclusive no charge royalty free irrevocable except as stated in this section patent license to make have made use offer to sell import and otherwise transfer the Work where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution s alone or by combination of their Contribution s with the Work to which such Contribution s was submitted If You institute patent litigation against any entity including a cross claim or counterclaim in a lawsuit alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed 4 Redistribution You may reproduce and distribute copies of the Work or Derivative Works hereof in any medium with or without modifications and in Source or Object form provided that You meet the following conditions a You must give any other recipients of the Work or Derivative Works a copy of this License and b You must cause any modified files to carry prominent notices stating that You changed the files and c You must retain in the Source form of any Derivative Works that You distribute all copyright patent trademark and attribution notices from the Source form of the Work excluding those notices
171. ose addresses for themselves and be able to communicate 1 Press and hold the RESET button for about two seconds until you hear a beep and then release it 2 The NSA automatically restarts to complete the reset forgot the password The default password is 1234 f you have changed the password and forgotten it you will have to reset the NSA see Section 15 3 1 on page 114 The NDU cannot discover my NSA Confirm that the computer running the NDU has a network connection See the section on the NSA s LAN connection for related information NSA 220 User s Guide Chapter 15 Troubleshooting The computer running the NDU can only discover NSAs in the same subnet NSAs connected to the same switch or router as your NDU computer are usually in the same subnet unless the router is doing subnetting or the switch is implementing VLAN The Memeo Autobackup program uses the same network port as the NDU to discover the NSA To avoid a port conflict do not run the Memeo Autobackup program at the same time as the NDU Close the NDU and reopen it 15 3 2 Enabling Scripting of Safe ActiveX Controls If pages of the web configurator do not display properly in Internet Explorer check that scripting of safe ActiveX controls is enabled 1 In Internet Explorer click Tools Internet Options and then the Security tab Figure 60 Internet Options Security EE General Security Privacy Content Connection
172. pacity of 35 2 TB with two 17 6 TB drives configured as JBOD volumes Maximum Number of Folders Per Share The NSA s media server function can detect up to 8 000 folders within a single published share After 8 000 folders have been created new folder contents will not be added to the media server s list However you can still access the folders using Samba Ports Ethernet One auto negotiating auto MDI MDI X 10 100 10008 Mbps RJ 45 Ethernet port 10 Base T 100 Base TX 1000 Base T USB v2 0 Storage Two ports on front panel Windows NTFS read only FAT32 and FAT16 Linux ReiserFS EXT2 and EXT3 LEDs PWR SYS HDD1 HDD2 COPY and LAN Reset Button Restores factory default username and password It also sets the NSA to DHCP client If no DHCP server is found the subnet mask defaults to 255 255 255 0 24 bits Operating Temperature 0 C 45 C AC Input Voltage 100 240 V at 50 60 Hz Current 3 42 A Storage Temperature 30 C 60 C Operating Humidity 20 90 RH non condensing Storage Humidity 20 95 RH non condensing Certifications EMC FCC Part15B CE EMC VCCI BSMI Safety CSA International EN60950 1 A Hard drives may not be included with your NSA B Use an 8 wire Ethernet cable for Gigabit connections The NSA firmware specifications are shown in the following table Table 46 NSA Firmware Specifications
173. page 3 Select the certification you wish to view from this page ZyXEL warrants to the original end user purchaser that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase During the warranty period and upon proof of purchase should the product have indications of failure due to faulty workmanship and or materials ZyXEL will at its discretion repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to restore the product or components to proper operating condition Any replacement will consist of a new or re manufactured functionally equivalent product of equal or higher value and will be solely at the discretion of ZyXEL This warranty shall not apply if the product has been modified misused tampered with damaged by an act of God or subjected to abnormal working conditions Note Repair or replacement as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitness for a particular use or purpose ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser To obtain the services of this warranty contact ZyXEL s Service Center for your Return Material Authorization number RMA Products must be
174. q Note Please turn on the Javascript and ActiveX control setting on Internet Explorer Login Reset C Copyright 2007 by ZyXEL Communications Corp You should see a screen asking you to change your password highly recommended as shown next Type a new password and retype it to confirm and click Apply or click Ignore Figure 7 Change Password Screen e Update Admin Info 4s a security precaution it is highly recommended that you change the admin password New Password Retype to confirm max 14 alphanumeric printable characters no single and double quotes Ae genere 2 4 User level Screens Overview All users including the administrator first see the user level access My NSA screen after login NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 8 My NSA Enoch A EO t Password Administration My NSA Pm HY NSA VL Pied My Own Shares BOTTES P ii 6 E SB mE public video photo music Manage it Manage it Manage it Manage it admin extVolume1 Manage it Manage it Other Shares There are no other accessible shares on the system BS The web configurator management session automatically times out if it is left idle for 15 minutes Simply log back into the NSA if this happens to you The icons and language label at the top right of the screen 1 are visible from most screens Use the tabs at th
175. r RE BR Cet a i kd t EN sa RA NN RR M Ead 101 n Esrab one time asninn eani ii 102 Figure 58 Maintenance gt Shutdown gt Confirm Restart ccccssscccccesseeccceeessecaeeeesseeeaeeeesseacaeeentsees 102 Figure 59 Maintenance gt Shutdown gt Confirm Shutdown cccccsececccceeseeeccccceteeeccccetteeecacereneeecaeantneees 103 Figure 60 intemmet Optons SO CUNY m 115 Figure 61 Security Settings Script Safe ActiveX Controls cccceeseccceeeeeeeceeseseseeceeeeseeesaeeeeensaes 116 Figure 62 Windows 95 98 Me Network Configuration 2e pier retro printer betty o npe ne ER Mene aERERIA 130 Figure 63 Windows 95 98 Me TCP IP Properties IP Address cccccccccccessecccceeeneeeccceeensecceeeenees 131 Figure 64 Windows 95 98 Me TCP IP Properties DNS Configuration sseeeeeeees 132 Figure 65 Windows XP Start e 133 igure 5b Windows XAP Control Panel 5 sisicecessinnicenasannsamnatennnsausenyxn RAD SERERE FA AULAE IR HK REO EXER LER 133 Figure 67 Windows XP Control Panel Network Connections Properties esssesss 134 Figure 68 Windows XP Local Area Connection Properties eese centem tenian 134 Figure 69 Windows XP Internet Protocol TCP IP Properties sssee 135 Figure 70 Windows XP Advanced TCPAP Properties iudei eibi aa ker ExX dau repe Roe ap PreY Ye rro p APO Ek RUuDEIR 136
176. r drag and drop files from to your local computer s drives to or from this network folder Just like the NSA s share was another folder on your computer Figure 28 Example Share Mapped Folders View File Edit View Favorites Tools Help Back fe A Search Folders lt 4 UE ux A E Address E Jimmy on 172 23 37 391 0 Folders x I 4 Peel z Ju 3 My Documents 5 ig My Computer Jimmy on a 314 Floppy A 172 23 37 39 I 4 Local Disk C H E Local Disk D This Folder is Online El Compact Disc E amp a E There are no items to show in this Folder zytw on zyxel com L public on 172 23 37 39 Z B Control Panel E Ge My Network Places E used 32 0 MB Capacity 76 2 GB ra Recycle Bin a O Free 76 1 GB Microsoft Outlook Now that Bob has mapped Jimmy s share to Jimmy s computer he can go through the steps again to map Kevin s share to Kevin s computer NSA 220 User s Guide 47 Chapter 3 Tutorials 3 5 Accessing a Share Using FTP You can also use FTP to access the NSA Suppose Jimmy is temporarily using a different computer and wants to access his share without mapping it to the computer This is how he would do it 1 Open the FTP client Windows Explorer is used here and type ftp username server where username is the account s username and server i
177. r s Guide Appendix C Pop up Windows JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make sure that Use Java 2 for applet under Java Sun is selected 3 Click OK to close the window Figure 90 Java Sun General Security Privacy Content Connections Programs Advanced Settings O Use inline AutoComplete O Use Passive FTP for firewall and DSL modem compatibility Use smooth scrolling E HTTP 1 1 settings Use HTTP 1 1 O Use HTTP 1 1 through proxy connections SS Java Sun C v Use Java 2 v1 4 1 07 for applet requires restart 3 Microsoft v O Java console enabled requires restart O Java logging enabled JIT compiler for virtual machine enabled requires restart Multimedia O Always show Internet Explorer 5 0 or later Radio toolbar O Don t display online media content in the media bar Enable Automatic Image Resizing Fa L4 Restore Defaults Apply Mozilla Firefox Mozilla Firefox 2 0 screens are used here Screens for other versions may vary You can enable Java Javascripts and pop ups in one screen Click Tools gt Options gt Content Figure 91 Mozilla Firefox Tools gt Options Web Search Ctrl K Downloads Ctrl J Add ons Web Developer Error Console Adblock Plus Ctrl Shift 4 Page Info FireFTP Clear Private Data Ctrl Shift Del Tab Mix Plus Options 5 Session Manager Options
178. rom your device Web pop up blocking is enabled by default in Windows XP SP Service Pack 2 JavaScript enabled by default 2 2 Accessing the NSA Web Configurator Make sure your NSA is properly connected and that your computer is in the same subnet as the NSA refer to the Quick Start Guide or the appendices 2 2 1 Access the NSA Via NDU If you don t know the IP address of the NSA then use the NDU to find it Refer to the Quick Start Guide to see how to install and run the NDU NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 4 NDU Main Screen NSA Comsumer 172 23 37 43 nsa220 172 23 37 39 Up aed Discover From the NDU main page click an icon under Admin to see the web configurator screen login screen 2 2 2 Web Browser Access Open your browser and type in the server name of the NSA nsa220 is the default Figure 5 NSA URL File Edit View Favorites Tools Help 2 3 Login The default username and password are admin and 1234 respectively Enter your username and password then click Login See Chapter 9 on page 85 for how to create other user accounts NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 6 NSA Login Screen NSA 220 Welcome to NSA 220 Enter Username password and click to login e Username a Password a maximum of 14 alphanumeric printable characters no single and double quotes
179. rotecting your data Use RAID 1 if you have two drives and want to mirror primary data to the second drive If one drive fails replace it and then re synchronize to recover all data User Passwords Configure a password for an individual User to restrict access to the NSA Client Support Data can be shared among all Windows Mac Linux and UNIX users that have FTP client software or CIFS file sharing support such as Samba for Linux and UNIX users The NSA is also a DLNA certified media server that lets DLNA compliant media clients play video audio and photo content files stored on the NSA HTTP Access the NSA using a regular web connection HTTP DHCP Dynamic Host Configuration Protocol DHCP Dynamic Host Configuration Protocol allows the NSA to obtain an IP address and subnet mask at start up from a centralized DHCP server Alternatively you can give the NSA a static IP address and subnet mask Full Network Management The embedded web configurator is an platform independent web based utility that allows you to easily access the NSA s management settings Firmware Upload and Configuration File Management Upload new firmware to the NSA using the web configurator You can also back up and restore the NSA configuration file containing all its settings to from your computer NSA Discovery Utility NDU Use the NDU from a Windows computer to find NSA s in your network access the NSA
180. rpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied function or table used by this function must be optional if the application does not supply it the square root function must still compute square roots These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Library and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Library the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work based on the Library on a volume ofa storage or distribution medium does not bring the other work under the scope of this License 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License
181. rs Delete co e 87 The ai Shore MOONS rasaae na Ra oce Ce EDU EU E Fui NES RRER rx LEM RA BE EIN ARD AUREOS RR OR NE A awe EREA 89 Tabio 32 SNSIOE aoc eer er Er Pre ete mer pet qb qiiae tels neues ide iq aM 90 pce tn Paene dee 91 Table 34 Share Path RSS RR ERR RU I T M TN 93 TABIE 2S Maintenant gt LOG e 97 Tabo BE og CSS 98 EG MAE GE upto mec 98 Table 28 LOG Messages e 99 NSA 220 User s Guide 21 List of Tables Table 39 Maintenance gt OP BODIE BOTE 11 delphi nro S ros kd rna Su loda dea rb hat das Ln dard 101 Table 40 Maintenance gt FW Upgrade e 102 Tadedi Maintenance gt eggs D 102 Table 42 Overview ol Protection Methods 5 oneri dero ebore E Et d o Fea ud red A ea rea a baia 105 Table 43 Physical Festuleli Lcuoesxespiesetiuxie tete nie e aer er te oer 121 Table 44 FIRS TOO aussseseceibinseevx Tei secte e seuls epI2 ECT Teri S Iri Ueo I2 SEI E EUH tI MAD Pe eS Uo IPIS ai e idade reei 121 Table d5 NSA Hardware Specifications 1issssessicus perdis EE EEEEDL LEE Fia MEE REI XU ENFA AVR nia edu a rta CM LEER a AR EAR RE 122 Table 46 NSA Firmware Spec al ls 1 e rep IER ERR PERF FRU De RE EFEEF PER EAA 123 Table 47 Supported Standards and Recommendations sss 124 Table
182. rted to forward slashes Share paths are case sensitive The maximum share path length is 600 characters the entire path string including slashes The share path cannot be blank You cannot have an empty folder name that is two consecutive slashes for example My Corner Each individual folder in the path that is the content between the slashes cannot exceed 255 characters 2 5 6 Password Screen Click Password to open the following screen Use this screen to change your password Enter a new password and confirm it by re entering it NSA 220 User s Guide Chapter 2 Web Configurator Basics Figure 13 Password ZyXEL Im EO My NSA Password Administration e VH LLL ML MN as NOME WA LWOT 3 Ora B ANP aNee a Modify Password Account Name i Old Password Se New Password Password Confirm SSE A Caution Please keep a record of your new password whenever you change it The system will lock you out if you have forgotten your password Apply Cancel The following table describes the labels in this screen Table 7 Password LABEL DESCRIPTION Change Password New Password Create a new password for this user You can type from one to 14 single byte no Chinese characters allowed for example ASCII characters Retype to confirm You must type the exact same password that you just typed in the above field Apply Click this button to save
183. s Programs Advanced Select a W eb content zone to specify its security settings Aa 9 o Internet Local intranet Trusted sites Restricted sites Internet A This zone contains all Web sites you Sites haven t placed in other zones m Security level for this zone Move the slider to set the security level for this zone z Medium Safe browsing and still functional Prompts before downloading potentially unsafe content Unsigned Activex controls will not be downloaded Appropriate for most Internet sites OK Cancel Apply 2 Click the Custom Level button 3 Under Script ActiveX controls marked safe for scripting make sure that Enable is selected the default 4 Click OK to close the window NSA 220 User s Guide 115 Chapter 15 Troubleshooting Figure 61 Security Settings Script Safe ActiveX Controls Security Settings 3 xl Settings Run Activex controls and plug ins Q Administrator approved Q Disable 9 Enable in Q Prompt E Script Activex controls marked safe for scripting Disable O Premp A gt Downloads 5 File download Q Disable 9 Enable ai Cant dawnload Reset custom settings ee to Medium Reset ced can see the login screen but cannot log in to the NSA Make sure you have entered the username and password correctly The default username is admin and the def
184. s field displays pre defined for default shares You can delete these shares these are the video music and photo shares This field displays user created for shares that an administrator has created You can delete these shares Change Share Properties Click this to edit the selected share Delete Share Click this to remove the selected share 10 2 Adding a New Share Click the Create a New Share button in the Shares screen to open the following screen Use this screen to create a new shared folder with optional access password NSA 220 User s Guide Chapter 10 Shares Figure 52 Shares gt Add Share New Share Share Name Volume no volume name 110 GB Free Y Path Browse Make this share owned by admin Share Access C Keep it private to owner C Make it public Advanced anonymous ftp c C C admin Lol O O M Publish this share to Media Server Apply Cancel The following table describes the labels in this screen Table 33 Shares Add Share LABEL DESCRIPTION Share Name Type a share name from 1 to 255 single byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing local share See Section 2 5 4 on page 37 for more information on share names Volume You should have already created volumes a single accessible storage area with a single file system on the NSA Select the one that contains the fol
185. s is recommended to prevent unauthorized administrator access to the NSA NSA 220 User s Guide Chapter 2 Web Configurator Basics 2 6 3 Main Window The main window 9 shows the screen you select in the navigation panel It is discussed in the rest of this document Right after you log in the Status screen is displayed See Chapter 4 on page 51 for more information about the Status screen 2 6 4 Status Messages The message text box at the bottom of the screen 1 displays status messages as you configure the NSA 2 6 5 Common Screen Icons The following table explains some icons that appear in several configuration screens Table 10 Common Configuration Screen Icons ICON DESCRIPTION Click the Edit icon to go to a screen where you can change the configuration settings of an entry Click the Delete icon to delete an entry from the list Click the Edit icon to jump to related item s configuration screen This is a user icon See the chapter on user accounts for detailed information on variants of this icon This is a share icon See the chapter on shares for detailed information on variants of this icon This icon represents a Healthy volume n m This icon represents a Degraded volume Click the Repair icon to fix a degraded RAID volume after you have replaced the faulty disk This icon represents a Down volume Click the Initialize icon to create a volume
186. s normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered by this License and distribute such a combined library provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided that you do these two things a Accompany the combined library with a copy of the same work based on the Library uncombined with any other library facilities This must be distributed under the terms of the Sections above b Give prominent notice with the combined library of the fact that part of it is a work based on the Library and explaining where to find the accompanying uncombined form of the same work 8 You may not copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute th
187. s on behalf of the PHP Group The PHP Group can be contacted via E mail at group php net For more information on the PHP Group and the PHP project please see lt http www php net gt This product includes the Zend Engine freely available at http www zend com The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE This Product includes Sablotron software under MPL License Mozilla Public License Version 1 1 1 Definitions 1 0 1 Commercial Use means distribution or otherwise making the Covered Code available to a third party 1 1 Contributor means each entity that creates or contributes to the creation of Modifications NSA 220 User s Guide Appendix D Open Source Licences 1 2 Contributor Version means the combination of the Original Code prior Modifications used by a Contributor and the Modifications made by that particular Contributor 1 3 Covered Code means t
188. s the NSA s IP address or server name Figure 29 FTP Example Typing the FTP Target File Edit View Favorites Tools Help Back gt GQsearch Pyrolders UE GE X A Ea Address ftp Jimmy nsa220 Folders be SY Library C test HC wH Library H O x6004 H E zw 1050 C Eng Bible Study e File Maintenance e Global Changes ea Global Glossary DI Bauta A A E Select an item to view its description See also My Documents My Network Places My Computer 2 Enter your password and click Login Figure 30 FTP Example Enter the Password q Could not login to the FTP server with the user name and password specified FTP Server nsa220 User Name Password After you login you can return to this FTP server easily by adding it to your Favorites List Login Anonymously Save Password x ma 3 Now you can access files and copy files from to your local computer s drives to or from this network folder T Even though the admin share displays user accounts cannot access it unless you change it s share access settings NSA 220 User s Guide Chapter 3 Tutorials Figure 31 FTP Example Logged In File Edit View Favorites Tools Help Back gt Qisearch Gyrolders c4 Um GE X A Eee Address e ftp nsa220 a at T Name se tpe Modified Hey
189. s volume label information on its disk s It is recommended that you first delete a volume before removing its disk s NSA 220 User s Guide Chapter 6 Storage Screens If you do not want to keep the data on a disk that you will remove it is recommended that you delete the volume before you remove the disk If you remove a disk s without deleting its volume and you later put the disk s back in a different volume you may have more than one volume with the same name For example suppose you have two disks Disk A and Disk B and you create two JBOD volumes volumel with Disk A and volume2 Disk B Later you remove Disk A and replace it with another disk Disk C and you re create volumel You did not delete volumel when you removed Disk A Later you replace Disk B with Disk A Disk A still retains the volume label so at this point both Disk A and Disk C have the volume label Although you can still use the volumes you may find the naming confusing 6 6 Creating a New Internal Volume Click the Create a New Internal Volume button in the Volume screen as shown in Figure 38 on page 61 to create a new NSA internal disk drive volume LES Creating a volume formats the hard drive All data on the disk will be lost Figure 40 Create a New Internal Volume Disk Configuration Or System Performance RAIDO c a ed T Provides data striping spreading out blocks of each file across multiple disk T drives but no redundancy Th
190. se from time to time Each revision is distinguished by a version number You may use this Software under terms of this license revision or under the terms of any subsequent revision of the license THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE OPENLDAP FOUNDATION ITS CONTRIBUTORS OR THE AUTHOR S OR OWNER S OF THE SOFTWARE BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale use or other dealing in this Software without specific written prior permission Title to copyright in this Software shall at all times remain with copyright holders OpenLDAP is a registered trademark of the OpenLDAP Foundation Copyright 1999 2003 The OpenLDAP Foundation Redwood City California USA AII Rights Reserved Permission to c
191. sport Concepts and methods RFC 1002 STD 19 Protocol standard for NetBIOS service on a TCP UDP transport Detailed specifications RFC 1034 STD 13 Domain names concepts and facilities RFC 1035 STD 13 Domain names implementation and specification RFC 1305 Network Time Protocol NTP version 3 RFC 1415 FTP FTAM Gateway Specification RFC 1510 The Kerberos Network Authentication Service V5 RFC 1738 Uniform Resource Locators URL RFC 1808 Relative Uniform Resource Locators RFC 1945 The Hypertext Transfer Protocol HTTP 1 0 RFC 2131 Dynamic Host Configuration Protocol RFC 2396 Uniform Resource Identifier URI RFC 2396 Uniform Resource Identifiers URI Generic Syntax RFC 2616 Hypertext Transfer Protocol HTTP 1 1 RFC 2854 History of HTML development and lists the relevant W3C World Wide Web Consortium recommendations for the text html MIME type RFC 3066 BCP 47 Best Current Practice Language tags RFC 3282 Content language headers RFC 3986 STD 66 Uniform Resource Identifier URI Generic Syntax RFC 4120 The Kerberos Network Authentication Service V5 RFC 4248 The telnet URI Scheme RFC 793 STD 7 Transmission Control Protocol RFC 959 STD 9 File Transfer Protocol SATA SATA I and SATA 3 0 Gbit s Serial Advanced Technology Attachment compatible hard drives SATA 3 0 Gbit s UPnP USB 2 0 USB Universal Serial Bus version 2 0 allows for i
192. t Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution The end user documentation included with the redistribution if any must include the following acknowledgment This product includes software developed by the Apache Software Foundation http www apache org Alternately this acknowledgment may appear in the software itself if and wherever such third party acknowledgments normally appear The names Apache and Apache Software Foundation must not be used to endorse or promote products derived from this software without prior written permission For written permission please contact apache apache org Products derived from this software may not be called Apache nor may Apache appear in their name without prior written permission of the Apache Software Foundation THIS SOFTWARE IS PROVIDED AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BU
193. t acts or agreed to in writing shall any Contributor be liable to You for damages including any direct indirect special incidental or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work including but not limited to damages for loss of goodwill work stoppage computer failure or malfunction or any and all other commercial damages or losses even if such Contributor has been advised of the possibility of such damages 9 Accepting Warranty or Additional Liability While redistributing the Work or Derivative Works thereof You may choose to offer and charge a fee for acceptance of support warranty indemnity or other liability obligations and or rights consistent with this License However in accepting such obligations You may act only on Your own behalf and on Your sole responsibility not on behalf of any other Contributor and only if You agree to indemnify defend and hold each Contributor harmless for any liability incurred by or claims asserted against such Contributor by reason of your accepting any such warranty or additional liability END OF TERMS AND CONDITIONS Version 1 1 Copyright c 1999 2003 The Apache Software Foundation All rights reserved NSA 220 User s Guide 153 Appendix D Open Source Licences Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are me
194. ter the network card restart process is complete make sure the Status is Active in the Network Configuration screen Using Configuration Files Follow the steps below to edit the network configuration files and set your computer IP address 1 Assuming that you have only one network card on the computer locate the ifconfig eth0 configuration file where eth0 is the name of the Ethernet card Open the configuration file with any plain text editor f you have a dynamic IP address enter dhcp in the BOOTPROTO field The following figure shows an example Figure 78 Red Hat 9 0 Dynamic IP Address Setting in ifconfig ethO EVICE eth0 NBOOT yes OOT PROTO dhcp SERCTL no EERDNS yes TYPE Ethernet vGWOU Ifyou have a static IP address enter static in the BOOTPROTO field Type IPADDR followed by the IP address in dotted decimal notation and type NETMASK followed by the subnet mask The following example shows an example where the static IP address is 192 168 1 10 and the subnet mask is 255 255 255 0 Figure 79 Red Hat 9 0 Static IP Address Setting in ifconfig ethO DEVICE ethO0 ONBOOT yes BOOTPROTO static IPADDR 192 168 1 10 NETMASK 255 255 255 0 USERCTL no PEERDNS yes TYPE Ethernet 2 Ifyou know your DNS server IP address es enter the DNS server information in the resolv conf file in the etc directory The following figur
195. th the distribution All advertising materials mentioning features or use of this software must display the following acknowledgement This product includes cryptographic software written by Eric Young eay cryptsoft com The word cryptographic can be left out if the routines from the library being used are not cryptographic related If you include any Windows specific code or a derivative thereof from the apps directory application code you must include an acknowledgement This product includes software written by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The licence and distribution terms for any publicly available version or derivative of this code cannot be changed 1 e this code cannot simply be copied and put under anot
196. that do not pertain to any part of the Derivative Works and d If the Work includes a NOTICE text file as part of its distribution then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file excluding those notices that do not pertain to any part of the Derivative Works in at least one of the following places within a NOTICE text file 152 NSA 220 User s Guide Appendix D Open Source Licences distributed as part of the Derivative Works within the Source form or documentation if provided along with the Derivative Works or within a display generated by the Derivative Works if and wherever such third party notices normally appear The contents of the NOTICE file are for informational purposes only and do not modify the License You may add Your own attribution notices within Derivative Works that You distribute alongside or as an addendum to the NOTICE text from the Work provided that such additional attribution notices cannot be construed as modifying the License You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use reproduction or distribution of Your modifications or for any such Derivative Works as a whole provided Your use reproduction and distribution of the Work otherwise complies with the conditions stated in this License 5 Submission of Contributions
197. the volumes created on USB hard drives connected to the NSA USB disks are numbered in the order that you insert USB devices Status This icon indicates whether the volume is healthy degraded or down Name This field shows the name for the volume Read only displays for an external volume that uses Windows NTFS This means the NSA can read the volume but can t save files on it Configuration This field also known as Type shows what type of data storage system a RAID type or JBOD an internal volume is using File System This field shows what file system an external USB volume is using Disk s For internal drives this shows which hard drive bays are included in the volume For external drives this field shows USB1 for the first external hard drive you connect to the NSA regardless of which USB port and USB2 for the second Disk Usage This field shows total disk size the percentage of the disk being used and the percentage that is available Active Sessions This shows how many users are currently connected to the NSA Type This shows whether it s a Windows CIFS web web configurator or FTP connection to the NSA Share Name This displays the shared folder name on the NSA that the user is connected to for CIFS sessions and is blank for FTP sessions Username This displays the name of the user connected to the NSA if one is defined ANONYMOUS CIFS or ANONYMOUS FTP display if a username is
198. tically obtain IP address settings with and select dhep from the drop down list Ifyou have a static IP address click Statically set IP Addresses and fill in the Address Subnet mask and Default Gateway Address fields Click OK to save the changes and close the Ethernet Device General screen 4 If you know your DNS server IP address es click the DNS tab in the Network Configuration screen Enter the DNS server information in the fields provided Co Figure 76 Red Hat 9 0 KDE Network Configuration DNS v Network Configuration PPR Eile Profile Help B 56 9 New Edit Copy Delete Devices Hardware DNS Hosts H You may configure the system s hostname domain name servers and search domain Name servers are used to look up other hosts on the network Hostname Primary DNS Secondary DNS Tertiary DNS DNS Search Path Active Profile Common modified 5 Click the Devices tab 6 Click the Activate button to apply the changes The following screen displays Click Yes to save the changes in all screens NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 77 Red Hat 9 0 KDE Network Configuration Activate redhat config network 277 You have made some changes in your configuration To activate the network device ethO the changes have to be saved Do you want to continue 7 Af
199. tifications 123 181 notices 181 viewing 182 change password 31 changing configuration settings 42 checking disks 42 common screen icons 42 compatibility 25 compatible hard disks 122 computer s IP Address 129 configuration file backup 101 restore 101 configuring entries 42 contact information 183 copied files folder format 28 COPY button 28 folder format 28 LED 28 copying files 28 copyright 40 181 customer support 183 D data storage system 52 date 58 daylight saving 60 Index degraded 64 degraded volume 42 delete icon 42 DHCP Dynamic Host Configuration Protocol 122 Digital Living Network Alliance See DLNA 107 124 disclaimer 181 disk healthy 42 replacement restrictions 68 disk configuration 52 disk icon 42 disk trays 26 disk usage 52 DLNA 107 124 DNS server address assignment 73 Domain Name System See DNS down 64 down volume 42 E edit icon 42 eject icon 42 EMC 123 entry removal 42 everyone access rights 92 exiting the web configurator 32 40 external disks 68 external hard drive removal hard drives external 42 external hard drives 52 F FAT16 68 FAT32 68 faulty hard disk 42 replacement 42 NSA 220 User s Guide Index FCC interference statement 181 file path 35 36 file storage system 123 file system errors 42 finding external storage devices 42 finding the NSA 52 firmware specifications 123 firmware upgrade 101 firmware version 52 fol
200. time is updated manually Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to s Services NOTICE NTP server has set to null Services NOTICE The NTP service is disabled Services NOTICE The NTP service is enabled Services WARNING Reaching Maximum Allowed Rules Services WARNING Reaching Maximum Allowed Rules Services WARNING Rule is empty Services WARNING The Rule Does Not Exist Services NOTICE FTP server stops Services NOTICE FTP server starts Services INFO Clock timezone is set to GMT s NSA 220 User s Guide Chapter 11 Maintenance Screens Table 38 Log Messages continued CLASS SEVERITY MESSAGE Services INFO Clock timezone is set to default Services INFO Clock daylight saving is enabled Services INFO Clock daylight saving is disabled Shares NOTICE Add new share s Shares NOTICE Delete share 95s Shares NOTICE Delete share 95s System INFO NTP update failed System INFO NTP updates successfully from 96s System INFO NTP fails to update from s System INFO Device is rebooted by administrator System INFO Device is shutdown by administrator System NOTICE DNS server is changed System NOTICE Hostname is cleared System NOTICE Hostname is set to s System NOTICE System description is c
201. tion is that you can no longer transfer files to from the shares in the down volume If it s degraded then file transfer to from the shares in the degraded volume will be slower BS There is no explicit message from CIFS that tells users their volume is degraded or down 6 3 3 Resynchronizing a RAID 1 Volume Resynchronizing a RAID 1 volume is done block by block so the time it takes depends more on the size of your hard drive s than the amount of data you have on them NSA 220 User s Guide Chapter 6 Storage Screens BS You should not restart the NSA while the NSA is resychronizing a volume as this will cause the synchronization to begin again after the NSA fully reboots BS You can access data on a RAID volume while it is resychronizing but it is not recommended 6 4 RAID This section contains theoretical background on JBOD and the RAID levels used on the NSA Skip to the next section if you already understand RAID and know what storage system you want to use on the NSA Redundant Array of Independent Disks RAID is a method of storing data on multiple disks to provide a combination of greater capacity reliability and or speed JBOD Just a Bunch Of Disks is not a RAID storage method but it is included in this discussion These are some terms that you need to know in order to understand storage systems Mirroring In a RAID system using mirroring all data in the system is written simultaneously to two
202. to a given copy of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer version than version 2 of the ordinary GNU General Public License has appeared then you can specify that version instead if you wish Do not make any other change in these notices Once this change is made in a given copy it is irreversible for that copy so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy This option is useful when you wish to copy part of the code of the Library into a program that is not a library 4 You may copy and distribute the Library or a portion or derivative of it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not NSA 220 User s Guide Appendix D Open Source Licences compelled to copy the source along with the object code 5
203. to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAG
204. tute the entire Agreement between the parties hereto This License Agreement the rights granted hereunder the Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties NSA 220 User s Guide Appendix D Open Source Licences NSA 220 User s Guide Legal Information Copyright Copyright O 2007 by ZyXEL Communications Corporation The contents of this publication may not be reproduced in any part or as a whole transcribed stored in a retrieval system translated into any language or transmitted in any form or by any means electronic mechanical magnetic optical chemical photocopying manual or otherwise without the prior written permission of ZyXEL Communications Corporation Published by ZyXEL Communications Corporation All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patent rights of others ZyXEL further reserves the right to make changes in any products
205. ty IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES INCLUDING WITHOUT LIMITATION INDIRECT SPECIAL PUNITIVE OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS LOSS OF PROFITS BUSINESS INTERRUPTION OR LOSS OF BUSINESS INFORMATION ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM OR FOR ANY CLAIM BY ANY OTHER PARTY EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ZyXEL S AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS AGREEMENT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND NSA 220 User s Guide Appendix D Open Source Licences DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE BUT SHALL IN NO EVENT EXCEED 1 000 BECAUSE SOME STATES COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES THE ABOVE LIMITATION MAY NOT APPLY TO YOU 8 Export Restrictions THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS REGULATIONS ORDERS OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME YOU SHALL NOT EXPORT THE SOFTWARE DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS REGULATIONS ORDERS OR OTHER RESTRICTIONS YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS LOSSES DAMAGES LIABILITIES COSTS AND EXPENSES INCLUDING REASONABLE ATTORNEYS FEES T
206. u contribute are governed by the terms of this License including without limitation Section 2 2 The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6 1 and You must include a copy of this License with every copy of the Source Code You distribute You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients rights hereunder However You may include an additional document offering the additional rights described in Section 3 5 3 2 Availability of Source Code NSA 220 User s Guide Appendix D Open Source Licences Any Modification which You create or to which You contribute must be made available in Source Code form under the terms of this License either on the same media as an Executable version or via an accepted Electronic Distribution Mechanism to anyone to whom you made an Executable version available and 1f made available via Electronic Distribution Mechanism must remain available for at least twelve 12 months after the date it initially became available or at least six 6 months after a subsequent version of that particular Modification has been made available to such recipients You are responsible for ensuring that the Source Code version remains available even if the Electronic Distribution Mechanism is maintained by a third party 3 3
207. u have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 11 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY C
208. u m UTE 57 59 Date IME e m 58 MB E N E E E E PE EA E E N EN E errr re tt tree 58 SREE E EAE E E E E E a ee 59 Chapter 6 Storage BCFOBIS cuins GE a a e PURSF PPM FIEL GN IR E aS 61 ee tee WAAC ct cute artis phi ave teenth ds eee ae Aad eka at ae ates 61 6 2 Storage Overview SGreen ii ia ae sts np ape nd a peal Rub hada apd aa DURER a xal ta Ada 61 6 3 Yolumes and RAID e 62 6 3 1 Choosing A Storage Method For a Volume ccccccesscccccesseeccceeeessececensssscceeeneeseaces 63 oR Eu ODD EC Heec c E 64 6 3 3 Resynchronizing a RAID 1 VOlUIYIg sissies orit tetti cta de rte aniisi 64 Pd rr p fee END HK mo TT 65 CRIMEN Wl T 66 Mea rng T 66 12 NSA 220 User s Guide Table of Contents EGAL ipa ETNIES 67 6 44 RAID and Data PP sarei Up EERFERA SQL CE PI EUR ERRF CU pUEREPMGU QU danai tin iniaa 67 FOSS E 68 65 T EPIS DISK aio na o rot itai a p Ev n c t p p det b a n ER bea aa 68 6 5 2 Disk Replacement RESWICHONS ioco erp prater rob xe MEA SI IR RRE ERI NE TERRI x SERE UE RAEE 68 6 5 3 Disk Replacement and Volume Labels 1 niis mre eeio tno eori sia er bu Reed ded 68 6 6 Creating a New intemal VOlUTIGE usus bob ua eds ob aka tira RUE aa bend ebd qu nta ria niaan p Ub b Aa bun EENAA aaRS 69 C7 Eding an menal Voe eee EE 70 68 Creating a New Eom Volume 5e DR rd RM SCR HG RU og RR E 70 pa Editing Sn Extemnal Volume Lpssstenuadentidefiti edad EE eH p FOL ep
209. uch warranty support indemnity or liability obligation is offered by You alone and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty support indemnity or liability terms You offer 3 6 Distribution of Executable Versions You may distribute Covered Code in Executable form only if the requirements of Sections 3 1 3 2 3 3 3 4 and 3 5 have been met for that Covered Code and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License including a description of how and where You have fulfilled the obligations of Section 3 2 The notice must be conspicuously included in any notice in an Executable version related documentation or collateral in which You describe recipients rights relating to the Covered Code You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice which may contain terms different from this License provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient s rights in the Source Code version from the rights set forth in this License If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by
210. umn lists the names of the NSA s user accounts Full This appears when you set the Share Access to Advanced Select this column s radio button in a user account s row to give the user full access to the share This allows the user to read files in the share delete files in the share and save files to the share Select the check box at the top of the column to give all of the users full access to the share NSA 220 User s Guide Chapter 2 Web Configurator Basics Table 6 My NSA Change Share Properties continued LABEL DESCRIPTION Read Only This appears when you set the Share Access to Advanced Select this column s radio button in a user account s row to give the user read only access to the share This allows the user to view or copy files in the share but not delete files in the share or save files to the share Select the check box at the top of the column to give all of the users read only access to the share Deny This appears when you set the Share Access to Advanced Select this column s radio button in a user account s row to stop the user from accessing the share This means the user cannot read files in the share delete files in the share or save files to the share Select the check box at the top of the column to stop all of the users from accessing the share Note Selecting the check box at the top of the column blocks everyone including the administrator from accessing the share
211. ver Media Server Name nsa220 Enable Media Server q Note If there are no volumes in the system media server can not be enabled when system starts Unpublished Shares admin Published Shares Publish Selected Share s gt Unpublish Selected Share s Apply Reset The following table describes the labels in this screen Table 25 Applications Media Server LABEL DESCRIPTION Media Server Name This is the name of the NSA media server on the network It is the same as the NSA s server name This name can allow media clients to distinguish between multiple media servers on your network Enable Media Server Select this option to turn on the media server function Unpublished Shares This list box displays the shares that the NSA does not share with the media clients Publish Selected Share s Select one or more shares in the Unpublished Shares box and click this button to share the shares with media clients Published Shares This list box displays the shares that the NSA shares with the media clients Unpublish Selected Select one or more shares in the Published Shares box and click this Share s button to not share the shares with media clients Apply Click Apply to save your changes back to the NSA Reset Click Reset to begin configuring this screen afresh NSA 220 User s Guide Chapter 8 Application Screens NSA 2
212. w your gateway s IP address remove previously installed gateways f you have a gateway IP address type it in the New gateway field and click Add 5 Click OK to save and close the TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Restart your computer when prompted Verifying Settings 1 Click Start and then Run 2 Inthe Run window type winipcfg and then click OK to open the IP Configuration window 3 Select your network adapter You should see your computer s IP address subnet mask and default gateway Windows 2000 NT XP The following example figures use the default Windows XP GUI theme 1 Click start Start in Windows 2000 NT Settings Control Panel 132 NSA 220 User s Guide Appendix B Setting up Your Computer s IP Address Figure 65 Windows XP Start Menu Internet Explorer e My Documents fe Outlook Express y Paint Files and Settings Transfer W GRY Command Prompt e My Music Acrobat Reader 4 0 Ws My Eon Tour Windows xP Wh Windows Movie Maker E Control Panel 2 My Recent Documents e My Pictures ce Printers and Faxes Q9 Help and Support Search All Programs gt 17 Run P Log Off o Turn Off Computer 5 untitled Paint 2 Inthe Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 66 Windows XP Control Panel amp Control Panel File Edit v
213. you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Library at all For example if a patent license would not permit royalty free redistribution ofthe Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to NSA 220 User s Guide Appendix D Open Source Licences contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is
214. ys the last updated time from the time server or the last time configured manually When you set Time and Date Setup to Manual enter the new time in this field and then click Apply New Date yyyy mm This field displays the last updated date from the time server or the last dd date configured manually When you set Time and Date Setup to Manual enter the new date in this field and then click Apply Get from Time Server Select this check box to have the NSA get the time and date from the time server you select in the Time Server Address field Synchronize Now Click this button for the NSA to retrieve the correct time from the configured time server right away NSA 220 User s Guide Chapter 5 System Setting Screens Table 13 System Setting gt Date Time continued LABEL DESCRIPTION Time Server Address Select a time server from the drop down list box or select Specify my own time server and enter the time server you wish to use in the field below Check with your ISP network administrator if you are unsure of this information Synchronize Now Click this button for the NSA to retrieve the correct time from the configured time server right away Time Server Address Select a time server from the drop down list box or select Specify my own time server and enter the time server you wish to use in the field below Check with your ISP network administrator if you are unsure of this
Download Pdf Manuals
Related Search
Related Contents
System User Guide for Hospital Authority Medical Record Officers DA-685 Series Linux User`s Manual Instruction Manual - Stanley Engineered Fastening USER MANUAL FL – 185 E3 : ÉCONOMIE Weider WEEVBE7033 User's Manual OM, K650 AII, K700AII, K850 II, K1200 II, 1999-02, EN Télécharger le journal CUTANIA® Chews CUTANIA® MINI Chews MODE D`EMPLOI - JR International Copyright © All rights reserved.
Failed to retrieve file