ZyXEL Communications NSA-220 User Manual

ZyXEL Communications NSA-220 User Manual

Network storage appliance
Hide thumbs Also See for NSA-220:
Table of Contents

Advertisement

NSA-220
Network Storage Appliance
User's Guide
Version 1.00
3/2007
Edition 1
www.zyxel.com

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NSA-220

  • Page 1 NSA-220 Network Storage Appliance User’s Guide Version 1.00 3/2007 Edition 1 www.zyxel.com...
  • Page 3: About This User's Guide

    • Supporting Disk Refer to the included CD for support documents. • ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product certifications. User Guide Feedback Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead.
  • Page 4: Document Conventions

    “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on. • “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”. NSA-220 User’s Guide...
  • Page 5 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device. Computer Notebook computer Server Television Firewall Router Switch NSA-220 User’s Guide...
  • Page 6: Safety Warnings

    • Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. This product is recyclable. Dispose of it properly. NSA-220 User’s Guide...
  • Page 7 Safety Warnings NSA-220 User’s Guide...
  • Page 8 Safety Warnings NSA-220 User’s Guide...
  • Page 9: Table Of Contents

    Shares ............................89 Protection, Media Client, Maintenance, & Troubleshooting ..........95 Maintenance Screens ....................... 97 Protecting Your Data ........................ 105 Media Client Software ......................107 Memeo Autobackup Software ....................109 Troubleshooting ........................111 Appendices and Index ......................119 NSA-220 User’s Guide...
  • Page 10 Contents Overview NSA-220 User’s Guide...
  • Page 11: Table Of Contents

    2.5.3 My NSA Change Share Properties Screen ............... 35 2.5.4 Share and Folder Names ................... 37 2.5.5 Share Paths ....................... 38 2.5.6 Password Screen ...................... 38 2.6 Administration Screens ....................... 39 2.6.1 Global Administration Icons ..................40 NSA-220 User’s Guide...
  • Page 12 6.3 Volumes and RAID ......................62 6.3.1 Choosing A Storage Method For a Volume ..............63 6.3.2 Volume Status ......................64 6.3.3 Resynchronizing a RAID 1 Volume ................64 6.4 RAID ............................ 65 6.4.1 JBOD .......................... 66 6.4.2 RAID 0 ........................66 NSA-220 User’s Guide...
  • Page 13 9.3 Adding or Editing a User Account ..................85 9.3.1 Add or Edit a User Account Screen ................85 9.3.2 Usernames ......................... 85 9.4 Change Password Screen ....................86 9.5 Delete Account Screen ......................87 Chapter 10 Shares ............................89 NSA-220 User’s Guide...
  • Page 14 Memeo Autobackup Software....................109 14.1 Memeo Autobackup Introduction ..................109 14.2 Using the Memeo Autobackup Software ................. 109 Chapter 15 Troubleshooting........................111 15.1 Troubleshooting Overview ....................111 15.2 Power, Hardware, Connections, and LEDs ..............111 15.3 NSA Login and Access .....................113 NSA-220 User’s Guide...
  • Page 15 Appendix A Product Specifications..................121 Appendix B Setting up Your Computer’s IP Address............129 Appendix C Pop-up Windows....................143 Appendix D Open Source Licences ..................151 Appendix E Legal Information ....................181 Appendix F Customer Support ..................... 183 Index............................187 NSA-220 User’s Guide...
  • Page 16 Table of Contents NSA-220 User’s Guide...
  • Page 17: List Of Figures

    Figure 33 My NSA User Login ....................... 50 Figure 34 Status ............................. 51 Figure 35 Session Example (Windows) ....................53 Figure 36 System Setting > Server Name ....................58 Figure 37 System Setting > Date/Time ....................59 Figure 38 Storage ..........................61 NSA-220 User’s Guide...
  • Page 18 Figure 78 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 ..........141 Figure 79 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 ............. 141 Figure 80 Red Hat 9.0: DNS Settings in resolv.conf ................142 Figure 81 Red Hat 9.0: Restart Ethernet Card ..................142 NSA-220 User’s Guide...
  • Page 19 Figure 88 Security Settings - Java Scripting ..................147 Figure 89 Security Settings - Java ......................147 Figure 90 Java (Sun) ..........................148 Figure 91 Mozilla Firefox: Tools > Options ................... 148 Figure 92 Mozilla Firefox Content Security ................... 149 NSA-220 User’s Guide...
  • Page 20 List of Figures NSA-220 User’s Guide...
  • Page 21: List Of Tables

    Table 33 Shares > Add Share ....................... 91 Table 34 Share Path Browse ......................... 93 Table 35 Maintenance > Log ......................... 97 Table 36 Log Classes ..........................98 Table 37 Log Severity Levels ......................... 98 Table 38 Log Messages ......................... 99 NSA-220 User’s Guide...
  • Page 22 Table 46 NSA Firmware Specifications ....................123 Table 47 Supported Standards and Recommendations ..............124 Table 48 Supported Media Server Content Formats ................126 Table 49 Power Consumption in Watts (W) ..................127 Table 50 .............................. 127 NSA-220 User’s Guide...
  • Page 23: Introduction

    Introduction Getting to Know Your NSA (25) Web Configurator Basics (29) Tutorials (43) Status Screen (45)
  • Page 25: Getting To Know Your Nsa

    1000 plays the NSA’s media files on the TV. A USB hard drive provides extra storage space and files are copied directly from the USB memory stick to the NSA. Place the NSA behind a firewall and/or IDP (Intrusion Detection and Prevention) device to protect it from attacks from the Internet. NSA-220 User’s Guide...
  • Page 26: Leds

    Refer to the Quick Start Guide for hardware connections and how to install and remove hard drives from the disk trays. Turn off and disconnect the NSA before you install or remove internal hard drives. 1.1.1 LEDs The NSA LEDs (lights) tell you important information. Figure 2 NSA Front Panel NSA-220 User’s Guide...
  • Page 27: Figure 3 Nsa Rear Panel

    The hard disk drive has failed and the NSA can no longer detect The NSA cannot detect a hard disk in the disk bay. Green The NSA has fully started and is operating normally. Blinking The NSA is starting up. The NSA has failed. NSA-220 User’s Guide...
  • Page 28: Copy Button

    Up to a total of 10 GB for files can be copied. If the USB device has more than 10 GB of files, the NSA emits a long beep and does not copy any of the files. NSA-220 User’s Guide...
  • Page 29: Web Configurator Basics

    2.2.1 Access the NSA Via NDU If you don’t know the IP address of the NSA, then use the NDU to find it. Refer to the Quick Start Guide to see how to install and run the NDU. NSA-220 User’s Guide...
  • Page 30: Web Browser Access

    Figure 5 NSA URL 2.3 Login The default username and password are ‘admin’ and ‘1234’ respectively. Enter your username and password, then click Login. See Chapter 9 on page 85 for how to create other user accounts. NSA-220 User’s Guide...
  • Page 31: User-Level Screens Overview

    Type a new password (and retype it to confirm) and click Apply or click Ignore. Figure 7 Change Password Screen 2.4 User-level Screens Overview All users (including the administrator) first see the user-level access My NSA screen after login. NSA-220 User’s Guide...
  • Page 32: Figure 8 My Nsa

    Click this tab to go to a screen where you can change your password. Administration Click this tab to go to screens where you can manage advanced configurations. You will have to log in as the administrator if you are not already logged in as the administrator. NSA-220 User’s Guide...
  • Page 33: My Nsa Screen

    Click this icon to access the share’s contents. The folder appears as gray if the share is not currently available (because the USB drive was removed for example). Manage It Click this button to see and configure the management details for a share. NSA-220 User’s Guide...
  • Page 34: My Nsa Share Browsing Screen

    Use the My NSA management overview screens to see and configure share management details. Click My NSA and then the Manage It button of one of your shares to open the following screen. This screen displays a share’s management details. NSA-220 User’s Guide...
  • Page 35: My Nsa Change Share Properties Screen

    Use the My NSA Change Share Properties screen to configure share management details. Click My NSA and a share’s Manage It button. Then click Change Share Properties to open the following screen. This screen displays a share’s management details. NSA-220 User’s Guide...
  • Page 36: Figure 12 My Nsa Change Share Properties

    This allows the user to read files in the share, delete files in the share and save files to the share. Select the check box at the top of the column to give all of the users full access to the share. NSA-220 User’s Guide...
  • Page 37: Share And Folder Names

    • The maximum character length of share name is 255 characters. • Unicode is supported for share names, although your FTP client must support UTF-8. Full support should be available in all Windows versions after Windows 2000. NSA-220 User’s Guide...
  • Page 38: Share Paths

    • Each individual folder in the path (that is, the content between the slashes) cannot exceed 255 characters 2.5.6 Password Screen Click Password to open the following screen. Use this screen to change your password. Enter a new password and confirm it by re-entering NSA-220 User’s Guide...
  • Page 39: Administration Screens

    Click Administration in the user-level screens to open the advanced administration screens. If you are not logged in using an administrator account, you will need to log in again. The Status screen is the first advanced administration screen that displays. NSA-220 User’s Guide...
  • Page 40: Global Administration Icons

    The navigation panel on the left of the screen ( ) contains screen links. Click a link to display sub-links. There are no sub-links for the Status screen. Certain screens also contain hyper links that allow you to jump to another screen. NSA-220 User’s Guide...
  • Page 41: Figure 15 Navigation Panel Links

    Use this screen to upload new firmware to your NSA. Shutdown Use this screen to restart the NSA or shut it down. Logout Click Logout to exit the web configurator. This is recommended to prevent unauthorized administrator access to the NSA. NSA-220 User’s Guide...
  • Page 42: Main Window

    Click the Locate icon to cause the LED on the external storage device to blink. Click the Repair icon to resychronize a RAID volume after you replace a faulty hard disk. NSA-220 User’s Guide...
  • Page 43: Tutorials

    1 Log into the NSA web configurator (see Section 2.3 on page 30) and click Administration to go to the configuration screens. Figure 16 My NSA 2 Click Users to open the Users screen. Then click Create a New Account. NSA-220 User’s Guide...
  • Page 44: Creating A Share

    He also wants to make sure that each son can only access his own share (to keep them from deleting each other’s files). This is how he would do it. NSA-220 User’s Guide...
  • Page 45: Figure 20 Shares

    Figure 21 Shares > Create Example 3 Type a name for a new folder and click Create Folder. Figure 22 Shares > Create > Browse > Create Folder Example 4 Select the new folder and click Apply. NSA-220 User’s Guide...
  • Page 46: Accessing A Share From Windows Explorer

    In this example, Bob has already installed the NDU on Jimmy’s computer (see the Quick Start Guide for details). Here he maps Jimmy’s share to Jimmy’s computer. 1 Start Windows Explorer and click Tools > Map Network Drive. Figure 25 NSA Top Level NSA-220 User’s Guide...
  • Page 47: Figure 26 Map Network Drive

    Figure 28 Example Share Mapped (Folders View) Now that Bob has mapped Jimmy’s share to Jimmy’s computer, he can go through the steps again to map Kevin’s share to Kevin’s computer. NSA-220 User’s Guide...
  • Page 48: Accessing A Share Using Ftp

    3 Now you can access files and copy files from/to your local computer’s drives to or from this network folder. Even though the admin share displays, user accounts cannot access it unless you change it’s share access settings. NSA-220 User’s Guide...
  • Page 49: Accessing A Share Through The Web Configurator

    1 Log into the NSA web configurator (see Section 2.3 on page 30) using your username and password. Figure 32 My NSA User Login 2 Click a share to see the top level of the share’s contents. Here is the Jimmy share. NSA-220 User’s Guide...
  • Page 50: Figure 33 My Nsa User Login

    NSA (use CIFS or FTP to upload files, see Section 3.4 on page 46 Section 3.5 on page 48). 4 Click the logout icon when your are done (see Table 2 on page 32). NSA-220 User’s Guide...
  • Page 51: Status Screen

    The Status screen is the first main web configurator screen you see after you log in to the administrator screens. To view the status screens, click Status on the top-left of the navigation panel. Figure 34 Status NSA-220 User’s Guide...
  • Page 52: Table 11 Status

    CIFS sessions and is blank for FTP sessions. Username This displays the name of the user connected to the NSA if one is defined. ANONYMOUS CIFS or ANONYMOUS FTP display if a username is not defined for the user’s connection. NSA-220 User’s Guide...
  • Page 53: Session Example (Windows)

    Initially you can only read and write to the Public, Video, Music, and Photo folders until you create other shares on the NSA. This session is then displayed as shown in Figure 34 on page Figure 35 Session Example (Windows) NSA-220 User’s Guide...
  • Page 54 Chapter 4 Status Screen NSA-220 User’s Guide...
  • Page 55: Status, System, Storage, And Network

    Status, System, Storage, and Network System Setting Screens (57) Storage Screens (61) Network Screen (73)
  • Page 57: System Setting Screens

    Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup or domain. CIFS cannot be disabled on the NSA. Click to open the following screen. System Setting > Server Name NSA-220 User’s Guide...
  • Page 58: Date/Time

    • power surges occur. The NSA gives no warning if time lag occurs. You should resynchronize the time after a power surge or after you have shut down the NSA several times. NSA-220 User’s Guide...
  • Page 59: Date/Time Screen

    Select this check box to have the NSA get the time and date from the time server you select in the Time Server Address field. Synchronize Now Click this button for the NSA to retrieve the correct time from the configured time server right away. NSA-220 User’s Guide...
  • Page 60 Click Apply to save your changes back to the NSA. If you configured a new time and date, Time Zone and Daylight Saving at the same time, all of the settings take affect. Reset Click Reset to begin configuring this screen afresh. NSA-220 User’s Guide...
  • Page 61: Storage Screens

    Section 6.3 on page 62 for more information on volumes. • See Section 6.5 on page 68 for more information on disks. 6.2 Storage Overview Screen Click Storage in the Navigation panel to display the following screen. Figure 38 Storage NSA-220 User’s Guide...
  • Page 62: Volumes And Raid

    The storage method you use depends on how many disks you have and how many volumes you want to create. It’s important that you consider this carefully as all data is deleted when you re-create a volume. NSA-220 User’s Guide...
  • Page 63: Choosing A Storage Method For A Volume

    • Choose JBOD for flexibility and maximum usage of disk space for data. You can either add an additional disk to your one-disk JBOD volume (and you don’t have to re-create shares, access rights etc.) or create a different JBOD volume (and create new shares, access rights and so on). NSA-220 User’s Guide...
  • Page 64: Volume Status

    6.3.3 Resynchronizing a RAID 1 Volume Resynchronizing a RAID 1 volume is done block-by-block, so the time it takes depends more on the size of your hard drive(s) than the amount of data you have on them. NSA-220 User’s Guide...
  • Page 65: Raid

    If you have ‘n’ pieces of data, parity computes an extra piece of data. The’n+1’ pieces of data are stored on ‘n+1’drives. If you lose any one of the ‘n+1’ pieces of data, you can recreate it from the ‘n’ that remain, regardless of which piece is NSA-220 User’s Guide...
  • Page 66: Jbod

    RAID 0 is performance. The following figure shows two disks in a single RAID 0 volume. Data can be written and read across disks simultaneously for faster performance. Table 17 RAID 0 DISK 1 DISK 2 NSA-220 User’s Guide...
  • Page 67: Raid 1

    Preferably it should be a hardware-based firewall with stateful packet inspection, anti-virus, and IDP (like the ZyWALL UTM products). • Use anti-virus software on your computer to scan files from others before saving the files on the NSA. NSA-220 User’s Guide...
  • Page 68: Disks

    When you create a volume, the NSA writes the volume label to the disk. Deleting a volume removes volume label information on its disk(s). It is recommended that you first delete a volume before removing its disk(s). NSA-220 User’s Guide...
  • Page 69: Creating A New Internal Volume

    This field lists all hard disks installed inside the NSA. Select which disks should make up this volume. A disk can only belong to one volume. You do not need to select anything if only one hard disk is installed. NSA-220 User’s Guide...
  • Page 70: Editing An Internal Volume

    Click this button to begin configuring this screen afresh. 6.8 Creating a New External Volume Click the Create a New External Volume button in the Volume screen as shown in Figure 38 on page 61 to create a new NSA internal disk drive volume. NSA-220 User’s Guide...
  • Page 71: Editing An External Volume

    Click this button to begin configuring this screen afresh. 6.9 Editing an External Volume Click an external (USB) volume’s Edit icon in the Volume screen as shown in Figure 38 on page 61 to change the external disk drive volume’s name. NSA-220 User’s Guide...
  • Page 72: Figure 43 Edit An External Volume

    This field shows total disk size, the percentage of the volume being used and the percentage that is available. Apply Click this button to save your changes back to the NSA and create the volume. Cancel Click this button to begin configuring this screen afresh. NSA-220 User’s Guide...
  • Page 73: Network Screen

    Or you can assign the NSA a static (fixed) IP address. 7.1.2 DNS Server Address A DNS (Domain Name System) server maps domain names (like www.zyxel.com) to their corresponding IP addresses (204.217.0.2 in the case of www.zyxel.com). This lets you use domain names to access web sites without having to know their IP addresses.
  • Page 74: Figure 44 Network > Network Config

    Select this option to choose a static DNS server address. Type the DNS server IP following DNS address(es) into the fields below. server addresses Primary DNS Type a primary DNS server IP address. Server Secondary Type a secondary DNS server IP address. DNS Server NSA-220 User’s Guide...
  • Page 75 Click Apply to save your TCP/IP configurations. After you click Apply, the NSA restarts. Wait until you see the Login screen or until the NSA fully boots and then use the NDU to rediscover it. Cancel Click Cancel to begin configuring this screen afresh. NSA-220 User’s Guide...
  • Page 76 Chapter 7 Network Screen NSA-220 User’s Guide...
  • Page 77: Application Screens

    Use the FTP screen to configure your NSA FTP settings. In this screen you can enable or disable FTP, set a connection limit, idle timeout, and enable or disable anonymous FTP access. See Section 8.2 on page 77 for more details on FTP. NSA-220 User’s Guide...
  • Page 78: Media Server

    DMA-1000 can also play the files. See Appendix A on page 126 for the supported multimedia file formats. The NSA provides no security for the multimedia server function. Any DLNA- compliant media client on your network can play the multimedia files. NSA-220 User’s Guide...
  • Page 79: Media Server Screen

    Select one or more shares in the Published Shares box and click this Share(s) button to not share the shares with media clients. Apply Click Apply to save your changes back to the NSA. Reset Click Reset to begin configuring this screen afresh. NSA-220 User’s Guide...
  • Page 80 Chapter 8 Application Screens NSA-220 User’s Guide...
  • Page 81: User Accounts And Shares

    User Accounts and Shares Users (83) Shares (89)
  • Page 83: Users

    • Access the contents of other shares to which he is given access rights. 9.2 Users Overview Screen Click Users to display the screen shown next. Use this screen to create and manage accounts for users who can store files on the NSA. NSA-220 User’s Guide...
  • Page 84: User Icons

    Click this to remove the selected account. 9.2.1 User Icons The following table describes the user icons. Table 27 User Icons ICON DESCRIPTION The green icon is for an administrator account. The blue icon is for a user account. NSA-220 User’s Guide...
  • Page 85: Adding Or Editing A User Account

    [A-Z a-z]); numeric characters are not allowed as the first character. The username can only contain the following characters: • Alphanumeric A-z 0-9. Unicode usernames are supported with CIFS logins, but not FTP or web configurator logins. NSA-220 User’s Guide...
  • Page 86: Change Password Screen

    • root • pc-guest • admin • password 9.4 Change Password Screen Go to the Users screen and select a user account, then click Change Password to modify the account’s password. Figure 49 Users > Change Password NSA-220 User’s Guide...
  • Page 87: Delete Account Screen

    Table 30 Users > Delete Account LABEL DESCRIPTION Click Yes to remove the user account. Management of any shares that belonged to the account passes to the default administrator account. Click No to keep the user account. NSA-220 User’s Guide...
  • Page 88 Chapter 9 Users NSA-220 User’s Guide...
  • Page 89: Shares

    The folder appears as gray if the share is not currently available (because the USB drive was removed for example). 10.1.2 Shares Screen Click Shares in the Navigation panel to open the following screen. This screen lists all of the shares. NSA-220 User’s Guide...
  • Page 90: Adding A New Share

    Click this to remove the selected share. 10.2 Adding a New Share Click the Create a New Share button in the Shares screen to open the following screen. Use this screen to create a new shared folder with optional access password. NSA-220 User’s Guide...
  • Page 91: Figure 52 Shares > Add Share

    Select this check box next to a user to give him or her read-only access (they cannot modify nor execute) to all files contained within this share. Select the check box in the heading row to select all users. NSA-220 User’s Guide...
  • Page 92: Public And Anonymous Share Access Rights

    10.3 Share Path Browse Screen Use this screen to navigate and/or create folders within a share. Figure 53 Share Path Browse NSA-220 User’s Guide...
  • Page 93: Table 34 Share Path Browse

    Section 2.5.4 on page 37 for more information on folder names. Back Click this button to return to the previous screen without keeping selecting a folder. Apply Click this button to return to the previous screen with your folder selection. NSA-220 User’s Guide...
  • Page 94 Chapter 10 Shares NSA-220 User’s Guide...
  • Page 95: Protection, Media Client, Maintenance, & Troubleshooting

    Protection, Media Client, Maintenance, & Troubleshooting Maintenance Screens (97) Protecting Your Data (105) Media Client Software (107) Troubleshooting (111)
  • Page 97: Maintenance Screens

    The following table describes the labels in this screen. Table 35 Maintenance > Log LABEL DESCRIPTION Refresh Click this button to update the log display. Purge all Logs Click this button to erase all logs from the NSA. NSA-220 User’s Guide...
  • Page 98: Log Classes

    6 being an informational log only. Log levels are not displayed in the logs and are for your reference only. Table 37 Log Severity Levels LEVEL DESCRIPTION Emergency Alert Critical Error Warning Notice Info NSA-220 User’s Guide...
  • Page 99: Log Messages

    Reaching Maximum Allowed Rules Services WARNING Reaching Maximum Allowed Rules Services WARNING Rule is empty Services WARNING The Rule Does Not Exist Services NOTICE FTP server stops Services NOTICE FTP server starts Services INFO Clock timezone is set to GMT%s NSA-220 User’s Guide...
  • Page 100: Configuration

    User %s from %s has been logged out (lease timeout)! 11.6 Configuration Click Maintenance > Configuration to open the following screen. Use the Configuration screen to back up or restore the NSA configuration settings and enable or disable the hardware reset button. NSA-220 User’s Guide...
  • Page 101: Firmware Upgrade

    FW Upgrade tab to access the Maintenance > FW Upgrade screen. Use this screen to upgrade the NSA firmware. You should first have downloaded the latest firmware files from the ZyXEL website. Figure 56 Maintenance > FW Upgrade NSA-220 User’s Guide...
  • Page 102: Shutdown

    Click Shutdown to shut down the system and restart it again later. When you click the Restart button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the restart. Figure 58 Maintenance > Shutdown > Confirm Restart NSA-220 User’s Guide...
  • Page 103: Figure 59 Maintenance > Shutdown > Confirm Shutdown

    Chapter 11 Maintenance Screens When you click the Shutdown button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the shutdown. Figure 59 Maintenance > Shutdown > Confirm Shutdown NSA-220 User’s Guide...
  • Page 104 Chapter 11 Maintenance Screens NSA-220 User’s Guide...
  • Page 105: Protecting Your Data

    If things go wrong after you make the configuration changes, you can always go back to the previous configuration by restoring an earlier configuration file. If you forgot the NSA password, then reset the device to go back to the factory default configuration. NSA-220 User’s Guide...
  • Page 106: Memeo Autobackup

    NSA whenever you modify the files. The Memeo Autobackup program uses the same network port as the NDU to discover the NSA. To avoid a port conflict, do not run the Memeo Autobackup program at the same time as the NDU. NSA-220 User’s Guide...
  • Page 107: Media Client Software

    • See the Quick Start Guide for how to install the media client software and the requirement details. 13.2 Using the Media Client Software Refer to the Quick Start Guide and the help (Start > All Programs > DigiOn > Help) for details on how to use the media client software. NSA-220 User’s Guide...
  • Page 108 Chapter 13 Media Client Software NSA-220 User’s Guide...
  • Page 109: Memeo Autobackup Software

    14.2 Using the Memeo Autobackup Software Refer to the Quick Start Guide for how to use the Memeo Autobackup software. The software also includes help that you can display by clicking the help link in the screens. NSA-220 User’s Guide...
  • Page 110 Chapter 14 Memeo Autobackup Software NSA-220 User’s Guide...
  • Page 111: Troubleshooting

    An HDD LED is off. The HDD LED is off when the NSA cannot detect a hard drive in the drive bay. Replace or install a hard drive. See Installing or replacing a hard drive An HDD LED is orange. NSA-220 User’s Guide...
  • Page 112 • If you are using a single-disk JBOD volume, you need to create a new volume on the new drive. • If you are using a two-disk JBOD volume, you need to create a whole new volume on both drives. The LAN LED (by the LAN port) is off. NSA-220 User’s Guide...
  • Page 113: Nsa Login And Access

    If your computer is also set to get an IP address automatically, the computer and the NSA can both assign themselves IP addresses and communicate. See Chapter 7 on page 73 if you need to configure the NSA with a static IP address. NSA-220 User’s Guide...
  • Page 114: Reset The Nsa

    • If you have changed the password and forgotten it, you will have to reset the NSA - see Section 15.3.1 on page 114. The NDU cannot discover my NSA. • Confirm that the computer running the NDU has a network connection. See the section on the NSA’s LAN connection for related information. NSA-220 User’s Guide...
  • Page 115: Enabling Scripting Of Safe Activex Controls

    1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 60 Internet Options: Security 2 Click the Custom Level... button. 3 Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default). 4 Click OK to close the window. NSA-220 User’s Guide...
  • Page 116: I Cannot Access The Nsa

    I cannot see the multi-language web configurator screens while using Internet Explorer. Section 15.3.2 on page 115 to enable the scripting of safe ActiveX controls. 15.4 I Cannot Access The NSA I cannot access a share NSA-220 User’s Guide...
  • Page 117: External Usb Drives

    The COPY LED is red. Copying files from a USB device failed. The USB device may not be compatible with the NSA. Try save the files onto a computer and then from the computer to the NSA (through the network connection). NSA-220 User’s Guide...
  • Page 118: Media Server Functions

    2 If you are using media client software, you may need to install codecs on your computer. Since the media client software uses your computer’s installed codecs, files do not play if the required codec is not installed on your computer. 3 The media client may not support the file’s format. NSA-220 User’s Guide...
  • Page 119: Appendices And Index

    Appendices and Index Product Specifications (121) Setting up Your Computer’s IP Address (129) Open Source Licences (151) Legal Information (181) Customer Support (183) Index (187)
  • Page 121: Appendix A Product Specifications

    NSA. DLNA Client Software The DLNA-certified media client software (included on the CD) lest your Windows XP computers browser and play media files stored on the NSA. NSA-220 User’s Guide...
  • Page 122: Table 45 Nsa Hardware Specifications

    255.255.255.0 (24 bits). Default Username admin Default Password 1234 Dimensions 113 (W)*202 (D)*142 (H) mm Weight 1.5 kg (without hard drives) Drive Trays Compatible Hard Disks SATA I and SATA 3.0 Gbit/s (Serial Advanced Technology Attachment) compatible hard drives. NSA-220 User’s Guide...
  • Page 123: Table 46 Nsa Firmware Specifications

    File Storage System JBOD, RAID 0, 1, Network Protocols TCP/IP, UDP/IP DHCP Client HTTP File Management Create/Delete System Volume Network File Sharing Protocol CIFS/SMB for Windows and Mac OSX HTTP for web browser Network Security Authentication Share level NSA-220 User’s Guide...
  • Page 124: Table 47 Supported Standards And Recommendations

    Country names (official short names in English) in alphabetical order as given in ISO 3166-1 and the corresponding ISO 3166-1-alpha-2 code elements. ISO 639-2 Two-letter and three-letter language code sets. MIMETYPES IANA registered content types (MIME types). See the IANA web site (ftp:// ftp.isi.edu/in-notes/iana/assignments/media-types/). NSA-220 User’s Guide...
  • Page 125 SATA 3.0 Gbit/s UPnP USB 2.0 USB (Universal Serial Bus) version 2.0 allows for interfacing devices with data transfers rates of up to 480 Mbps. XHTML 1.0 Extensible HyperText Markup Language (Second Edition) XHTML 1.1 Module-based XHTML NSA-220 User’s Guide...
  • Page 126: Table 48 Supported Media Server Content Formats

    Not all published file types can be viewed by all client applications. Power Consumption The NSA was tested using the specified power sources with the external power adapter and with two hard drives installed. This table is a laboratory test of NSA power consumption for your reference only. NSA-220 User’s Guide...
  • Page 127: Table 49 Power Consumption In Watts (W)

    SATA I Maxtor 6L120M0 120 GB SATA I Hitachi HCS725032VLA380 320GB SATA 3.0 Gbit/s Hitachi HCS725025VLA380 250GB SATA 3.0 Gbit/s Seagate ST3160815AS 160GB SATA 3.0 Gbit/s Seagate ST3750840AS 750GB SATA 3.0 Gbit/s Seagate ST3160215SCE 160GB SATA 3.0 Gbit/s NSA-220 User’s Guide...
  • Page 128 Appendix A Product Specifications NSA-220 User’s Guide...
  • Page 129: Appendix B Setting Up Your Computer's Ip Address

    7 and later operating systems. After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to “communicate” with your network. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window. NSA-220 User’s Guide...
  • Page 130: Figure 62 Windows 95/98/Me: Network: Configuration

    2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. NSA-220 User’s Guide...
  • Page 131: Figure 63 Windows 95/98/Me: Tcp/Ip Properties: Ip Address

    • If you do not know your DNS information, select Disable DNS. • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). NSA-220 User’s Guide...
  • Page 132: Figure 64 Windows 95/98/Me: Tcp/Ip Properties: Dns Configuration

    3 Select your network adapter. You should see your computer's IP address, subnet mask and default gateway. Windows 2000/NT/XP The following example figures use the default Windows XP GUI theme. 1 Click start (Start in Windows 2000/NT), Settings, Control Panel. NSA-220 User’s Guide...
  • Page 133: Figure 65 Windows Xp: Start Menu

    Appendix B Setting up Your Computer’s IP Address Figure 65 Windows XP: Start Menu 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 66 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. NSA-220 User’s Guide...
  • Page 134: Figure 67 Windows Xp: Control Panel: Network Connections: Properties

    • If you have a dynamic IP address click Obtain an IP address automatically. • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Click Advanced. NSA-220 User’s Guide...
  • Page 135: Figure 69 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric. • Click Add. • Repeat the previous three steps for each default gateway you want to add. • Click OK when finished. NSA-220 User’s Guide...
  • Page 136: Figure 70 Windows Xp: Advanced Tcp/Ip Properties

    • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. NSA-220 User’s Guide...
  • Page 137: Figure 71 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab. Macintosh OS X 1 Click the Apple menu, and click System Preferences to open the System Preferences window. NSA-220 User’s Guide...
  • Page 138: Figure 72 Macintosh Os X: Apple Menu

    • Type your subnet mask in the Subnet mask box. • Type the IP address of your gateway in the Router address box. 5 Click Apply Now and close the window. 6 Restart your computer (if prompted). NSA-220 User’s Guide...
  • Page 139: Figure 74 Red Hat 9.0: Kde: Network Configuration: Devices

    1 Click the Red Hat button (located on the bottom left corner), select System Setting and click Network. Figure 74 Red Hat 9.0: KDE: Network Configuration: Devices 2 Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown. NSA-220 User’s Guide...
  • Page 140: Figure 75 Red Hat 9.0: Kde: Ethernet Device: General

    Configuration screen. Enter the DNS server information in the fields provided. Figure 76 Red Hat 9.0: KDE: Network Configuration: DNS 5 Click the Devices tab. 6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. NSA-220 User’s Guide...
  • Page 141: Figure 77 Red Hat 9.0: Kde: Network Configuration: Activate

    TYPE=Ethernet 2 If you know your DNS server IP address(es), enter the DNS server information in the file in the directory. The following figure shows an example where resolv.conf /etc two DNS server IP addresses are specified. NSA-220 User’s Guide...
  • Page 142: Figure 80 Red Hat 9.0: Dns Settings In Resolv.conf

    Link encap:Ethernet HWaddr 00:50:BA:72:5B:44 inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:717 errors:0 dropped:0 overruns:0 frame:0 TX packets:13 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:730412 (713.2 Kb) TX bytes:1570 (1.5 Kb) Interrupt:10 Base address:0x1000 [root@localhost]# NSA-220 User’s Guide...
  • Page 143: Appendix C Pop-Up Windows

    You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. NSA-220 User’s Guide...
  • Page 144: Figure 84 Internet Options: Privacy

    Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen. NSA-220 User’s Guide...
  • Page 145: Figure 85 Internet Options: Privacy

    3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 86 Pop-up Blocker Settings NSA-220 User’s Guide...
  • Page 146: Figure 87 Internet Options: Security

    3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window. NSA-220 User’s Guide...
  • Page 147: Figure 88 Security Settings - Java Scripting

    2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window. Figure 89 Security Settings - Java NSA-220 User’s Guide...
  • Page 148: Figure 90 Java (Sun)

    Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools > Options > Content. Figure 91 Mozilla Firefox: Tools > Options NSA-220 User’s Guide...
  • Page 149: Figure 92 Mozilla Firefox Content Security

    Appendix C Pop-up Windows Select the check boxes as shown in the following screen. Figure 92 Mozilla Firefox Content Security NSA-220 User’s Guide...
  • Page 150 Appendix C Pop-up Windows NSA-220 User’s Guide...
  • Page 151: Appendix D Open Source Licences

    No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes software developed by the Apache Software Foundation under Apache License.
  • Page 152 Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file NSA-220 User’s Guide...
  • Page 153 Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS Version 1.1 Copyright (c) 1999-2003 The Apache Software Foundation. All rights reserved. NSA-220 User’s Guide...
  • Page 154 Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1. Preamble NSA-220 User’s Guide...
  • Page 155 The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. NSA-220 User’s Guide...
  • Page 156 Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. NSA-220 User’s Guide...
  • Page 157 If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not NSA-220 User’s Guide...
  • Page 158 Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the NSA-220 User’s Guide...
  • Page 159 It is not the purpose of this section to induce you to infringe any patents or other property right claims or to NSA-220 User’s Guide...
  • Page 160 DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES. NSA-220 User’s Guide...
  • Page 161: Gnu General Public License

    To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION NSA-220 User’s Guide...
  • Page 162 Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. NSA-220 User’s Guide...
  • Page 163 License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies NSA-220 User’s Guide...
  • Page 164 WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR NSA-220 User’s Guide...
  • Page 165 OpenLDAP is a registered trademark of the OpenLDAP Foundation. Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to copy and distribute verbatim copies of this document is granted This Product includes open SSL under the Open SSL License NSA-220 User’s Guide...
  • Page 166 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ================== This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). NSA-220 User’s Guide...
  • Page 167 POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] NSA-220 User’s Guide...
  • Page 168 4. Products derived from this software may not be called “PHP”, nor may “PHP” appear in their name, without prior written permission from group@php.net. You may indicate that your software works in conjunction with PHP by saying “Foo for PHP” instead of calling it “PHP Foo” or “phpfoo” NSA-220 User’s Guide...
  • Page 169 Mozilla Public License Version 1.1 1. Definitions. 1.0.1. “Commercial Use” means distribution or otherwise making the Covered Code available to a third party. 1.1. “Contributor” means each entity that creates or contributes to the creation of Modifications. NSA-220 User’s Guide...
  • Page 170 (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. 2. Source Code License. 2.1. The Initial Developer Grant. NSA-220 User’s Guide...
  • Page 171 Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5. 3.2. Availability of Source Code. NSA-220 User’s Guide...
  • Page 172 Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any NSA-220 User’s Guide...
  • Page 173 6. Versions of the License. 6.1. New Versions Netscape Communications Corporation (“Netscape”) may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions NSA-220 User’s Guide...
  • Page 174 Participant to You under Sections 2.1 and/or 2.2 automatically terminate at the expiration of the 60 day notice period specified above. NSA-220 User’s Guide...
  • Page 175 International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. 12. Responsibility for claims NSA-220 User’s Guide...
  • Page 176 Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: NSA-220 User’s Guide...
  • Page 177 License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
  • Page 178 DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR...
  • Page 179 This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement.
  • Page 180 Appendix D Open Source Licences NSA-220 User’s Guide...
  • Page 181: Appendix E Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
  • Page 182 Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
  • Page 183: Appendix F Customer Support

    • Telephone: +506-2017878 • Fax: +506-2015098 • Web Site: www.zyxel.co.cr • FTP Site: ftp.zyxel.co.cr • Regular Mail: ZyXEL Costa Rica, Plaza Roble Escazú, Etapa El Patio, Tercer Piso, San José, Costa Rica Czech Republic • E-mail: info@cz.zyxel.com • Telephone: +420-241-091-350 •...
  • Page 184 • E-mail: info@zyxel.fr • Telephone: +33-4-72-52-97-97 • Fax: +33-4-72-52-19-20 • Web Site: www.zyxel.fr • Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest, France Germany • Support E-mail: support@zyxel.de • Sales E-mail: sales@zyxel.de • Telephone: +49-2405-690969 •...
  • Page 185 • Sales E-mail: sales@zyxel.com • Telephone: +1-800-255-4101, +1-714-632-0882 • Fax: +1-714-632-0858 • Web Site: www.us.zyxel.com • FTP Site: ftp.us.zyxel.com • Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 92806- 2001, U.S.A. Norway • Support E-mail: support@zyxel.no • Sales E-mail: sales@zyxel.no •...
  • Page 186 Appendix F Customer Support • Web Site: www.zyxel.es • Regular Mail: ZyXEL Communications, Arte, 21 5ª planta, 28033 Madrid, Spain Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • Telephone: +46-31-744-7700 • Fax: +46-31-744-7701 • Web Site: www.zyxel.se • Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden Ukraine •...
  • Page 187: Index

    COPY external hard drive button removal folder format hard drives external copying files copyright 40, 181 external hard drives customer support FAT16 data storage system FAT32 date faulty hard disk replacement daylight saving NSA-220 User’s Guide...
  • Page 188 SATA I serial links hard drives bays external LAN LEDs internal language LEDs hardware connections liability hardware specifications license HDD1 LED license Agreement for “NSA” HDD2 LED lights healthy links healthy disk sub-links healthy volume NSA-220 User’s Guide...
  • Page 189 42, 68 NDU (NSA Discovery Utility) replacing faulty hard disks network protocols reset button network security restart NSA Discovery Utility (NDU) restrictions NTFS on folder names on share names on volume names resychronize resynch NSA-220 User’s Guide...
  • Page 190 42, 64 supported NSA-220 User’s Guide...
  • Page 191 42, 64 inactive name restrictions resync status volume icon volume name volume status warranty period web browsers supported web configurator browsers logout 32, 40 web help web help icon ZyXEL Communications Corporation ZyXEL Limited Warranty Note NSA-220 User’s Guide...
  • Page 192 Index NSA-220 User’s Guide...

Table of Contents