ZyXEL Communications NSA310S User Manual

ZyXEL Communications NSA310S User Manual

Nsa series
Hide thumbs Also See for NSA310S:
Table of Contents

Advertisement

Media Server

NSA Series
Version 4.60
Edition 1
Quick Start Guide
User's Guide
Default Login Details
Web Address
www.zyxel.com
User Name
Password
nas310
nsa310s
nas320
nsa325
nsa325-v2
admin
1234
Copyright © 2013 ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NSA310S

  • Page 1: Media Server

    Media Server NSA Series Version 4.60 Edition 1 Quick Start Guide User’s Guide Default Login Details Web Address nas310 nsa310s nas320 www.zyxel.com nsa325 nsa325-v2 User Name admin Password 1234 Copyright © 2013 ZyXEL Communications Corporation...
  • Page 2 IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system. Every effort has been made to ensure that the information in this manual is accurate.
  • Page 3: Table Of Contents

    Contents Overview Contents Overview User’s Guide ........................... 15 Getting to Know Your NSA ......................17 NAS Starter Utility ........................21 Web Configurator Basics ......................29 Tutorials .............................51 Technical Reference ......................135 Status Screen ...........................137 System Setting .........................141 Storage .............................151 Network ...........................165 Applications ..........................175 Packages ..........................215 Auto Upload ..........................265 Dropbox ............................279...
  • Page 4 Contents Overview Media Server User’s Guide...
  • Page 5: Table Of Contents

    Table of Contents Table of Contents Contents Overview ..........................3 Table of Contents ..........................5 Part I: User’s Guide ..................15 Chapter 1 Getting to Know Your NSA.........................17 1.1 Overview ............................17 1.1.1 Hard Disks for 2-Bay Models ....................18 1.1.2 Hard Disks for 1-Bay Models ....................18 1.1.3 COPY/SYNC Button ........................19 1.1.4 RESET Button .........................19 Chapter 2...
  • Page 6 Table of Contents 3.4.5 File Browser ..........................37 3.4.6 Share and Folder Names ......................41 3.4.7 Application Zone ........................42 3.4.8 System Settings ........................43 3.5 Administration Screens ........................44 3.5.1 Global Administration Icons ....................45 3.5.2 Navigation Panel ........................46 3.5.3 Main Window ..........................48 3.5.4 Status Messages ........................48 3.5.5 Common Screen Icons ......................48 3.5.6 Session Example (Windows) ....................49 Chapter 4...
  • Page 7 Table of Contents 4.10.4 Configuring the Download Service Preferences ..............90 4.10.5 Using Download Service Notification ..................92 4.11 Broadcatching Tutorial ........................95 4.12 Printer Server Tutorial ........................99 4.13 Copy and Flickr Auto Upload Tutorial ...................101 4.14 FTP Uploadr Tutorial ........................102 4.15 Web Configurator’s Security Sessions ..................105 4.15.1 Customizing the NSA’s Certificate ..................106 4.15.2 Downloading and Installing Customized Certificate .............107 4.15.3 Turn on the NSA’s Web Security ..................
  • Page 8 Table of Contents 7.1.1 What You Need to Know About Storage ................151 7.2 The Storage Screen ........................152 7.2.1 Disk Replacement Restrictions ....................152 7.2.2 Storage Screen ........................153 7.2.3 Volume Status ........................154 7.3 Creating an Internal (SATA) Volume ....................155 7.4 Editing a Volume ..........................157 7.4.1 Scanning a Volume ........................158 7.5 Creating an External (USB) Volume ....................158 7.5.1 External Disks ........................159...
  • Page 9 Table of Contents 9.7.4 Edit IP Filter ..........................190 9.7.5 Selecting Files to Download ....................191 9.7.6 Displaying the Task Information ....................192 9.8 The Web Publishing Screen ......................193 9.9 The Broadcatching Screen ......................194 9.9.1 Adding a Broadcatching Channel ..................196 9.9.2 Editing a Broadcatching Channel ..................199 9.10 The Print Server Screen .......................200 9.10.1 Print Server Rename ......................201 9.11 The Copy/Sync Button Screen ......................202...
  • Page 10 Table of Contents 10.8.7 Preferences ........................233 10.8.8 Edit IP Filter ........................236 10.8.9 Share Browsing ........................236 10.8.10 Task Info ...........................238 10.8.11 eMule Search Screen ......................239 10.9 pyLoad Screen ..........................240 10.10 Polkast Setup ..........................241 10.11 Protect Screens .........................245 10.12 Backup Screens .........................246 10.12.1 Backup: Step 1 .........................247 10.12.2 Backup: Step 2 .........................248 10.12.3 Backup: Step 3 .........................250...
  • Page 11 Table of Contents 12.2 Dropbox Screen ..........................279 12.3 How to Use Dropbox with the NSA ....................281 Chapter 13 Using Time Machine with the NSA ....................283 13.1 Overview ............................283 13.2 Time Machine Screen ........................283 13.3 Using Time Machine ........................283 Chapter 14 Users..............................287 14.1 Overview ............................287 14.2 What You Can Do .........................287...
  • Page 12 Table of Contents 17.1 Overview ............................305 17.2 What You Can Do .........................305 17.3 The Power Screen ........................305 17.3.1 Notes on NSA-310 .......................305 17.3.2 Editing the Power Control Schedule Screen ..............308 17.4 The Log Screen ..........................309 17.4.1 Report Config Screen ......................310 17.4.2 Email Setting ........................
  • Page 13 Table of Contents 19.16 Package Management ........................342 19.17 Backups ............................343 Chapter 20 Product Specifications ........................345 20.1 LEDs .............................345 20.2 Supported Media Server Content Formats ...................346 20.3 Supported iTunes Server Content Formats ...................346 Appendix A Legal Information......................347 Index ..............................351 Media Server User’s Guide...
  • Page 14 Table of Contents Media Server User’s Guide...
  • Page 15: User's Guide

    User’s Guide...
  • Page 17: Getting To Know Your Nsa

    H A PT ER Getting to Know Your NSA 1.1 Overview This chapter covers the main features and applications of the NSA. Use the NSA to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA. •...
  • Page 18: Hard Disks For 2-Bay Models

    NSA320, NSA325, NSA325 v2 1 hard disk bay NSA310, NSA310S Telnet NSA310S, NSA325, NSA325 v2 Power Control NSA310S, NSA320, NSA325, NSA325 v2 Schedule Power On After Power NSA310S, NSA320, NSA325, NSA325 v2 Failure 1.1.1 Hard Disks for 2-Bay Models The 2-bay NSA models have two internal hard disk bays. Install one or two SATA (Serial Advanced Technology Attachment) hard disks.
  • Page 19: Copy/Sync Button

    Chapter 1 Getting to Know Your NSA Note that both SATA and eSATA hard disks are treated as internal or SATA volumes in the Storage screen (Section 7.3 on page 155). Any hard disk connected to the USB port(s) is considered an external or USB volume.
  • Page 20 Chapter 1 Getting to Know Your NSA Media Server User’s Guide...
  • Page 21: Nas Starter Utility

    H A PT ER NAS Starter Utility Note: Installing this version of the NAS Starter Utility will uninstall previous versions. 2.1 Overview Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it.
  • Page 22 Chapter 2 NAS Starter Utility Start the NAS Starter Utility (click the icon in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility). The first time you open the NAS Starter Utility the discovery screen appears as follows.
  • Page 23: Main Nas Starter Utility Screen

    Chapter 2 NAS Starter Utility 2.4 Main NAS Starter Utility Screen The main NAS Starter Utility screen displays after you select an NSA in the NSA Seeker screen. Figure 4 NAS Starter Utility Main Screen The following table describes the labels in this screen. Table 3 NAS Starter Utility Main Screen LABEL DESCRIPTION...
  • Page 24: Directory Of The Nas

    Chapter 2 NAS Starter Utility Table 3 NAS Starter Utility Main Screen LABEL DESCRIPTION Capacity This shows the NSA’s total, in-use, and remaining storage capacity. Media Player Click this to go to the Home screens where you can play media files. See Section 3.4 on page 32 for details on the Home screen.
  • Page 25: Import Files Or Folders With Zpilot

    Chapter 2 NAS Starter Utility The utility opens the NSA’s directory in Windows Explorer. Figure 6 Directory 2.5 Import Files or Folders with zPilot In the main NAS Starter Utility screen click zPilot to be able to drag and drop files from your computer to the NSA.
  • Page 26: Network Drive

    Chapter 2 NAS Starter Utility Public folder. For folders of files you are prompted to choose the target destination. The zPilot icon shows the transfer rate. Figure 9 zPilot Showing Transfer Rate Double-click the zPilot icon to display status details about the file transfers. Select an entry and click Pause, Resume, or Remove to control the transfer.
  • Page 27: Manage The Device

    Chapter 2 NAS Starter Utility new drive in Windows Explorer (My Computer) where you can access and use it like your computer’s other drives. Figure 12 Network Drive 2.7 Manage the Device In the main NAS Starter Utility screen click Configuration > Administration to log into the NSA’s administration screens where you can manage the NSA.
  • Page 28 Chapter 2 NAS Starter Utility Click Configuration > System Setting in the main utility screen to display the following screen. Figure 14 NAS Starter Utility > Configuration > System Setting The following table describes the labels in this screen. Table 4 NAS Starter Utility > Configuration > System Setting LABEL DESCRIPTION Server Name...
  • Page 29: Web Configurator Basics

    H A PT ER Web Configurator Basics 3.1 Overview This chapter describes how to access the NSA web configurator and provides an overview of its screens. The web configurator is an HTML-based management interface that allows easy NSA setup and management using an Internet browser.
  • Page 30: Access The Nsa Via Nas Starter Utility

    Chapter 3 Web Configurator Basics 3.2.1 Access the NSA Via NAS Starter Utility If you don’t know the IP address of the NSA, then use the NAS Starter Utility to find it. Refer to the Quick Start Guide for how to install and run the NAS Starter Utility. See Chapter 2 on page 21 more information on the NAS Starter Utility.
  • Page 31: Login

    Chapter 3 Web Configurator Basics 3.3 Login The default username and password are ‘admin’ and ‘1234’ respectively. Enter your username and password. See Chapter 14 on page 287 for how to create other user accounts. If you use the option to stay logged in for two weeks (assuming you do not log out), make sure you keep your computer secure from unauthorized access.
  • Page 32: Home Screens

    Chapter 3 Web Configurator Basics If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore.
  • Page 33 Chapter 3 Web Configurator Basics Note: If you did not select the option to stay logged in for two weeks when you logged in, the web configurator management session automatically times out if it is left idle for 15 minutes. Simply log back into the NSA if this happens to you. The main Home screen displays icons for the various features you can access.
  • Page 34 Chapter 3 Web Configurator Basics Here are some Home screen descriptions. A music screen is shown here as an example. Other screens work in a similar way. Figure 20 Music Screen This table describes common labels in the Home media screens. Not every item displays in every screen.
  • Page 35: Now Playing (Music)

    Chapter 3 Web Configurator Basics Table 7 Home Media Screens LABEL DESCRIPTION Refresh Click this to update the display in the screen. Now Playing This link is available when a song is playing. Click it to see details about the song that is currently playing.
  • Page 36: Slideshow (Photos)

    Chapter 3 Web Configurator Basics If a photo’s Exif data includes GPS location data, click the latitude or longitude link to display the location in Google Maps. Click Clear to delete the markers of other photos and only display the current photo’s marker.
  • Page 37: Favorite

    Chapter 3 Web Configurator Basics 3.4.4 Favorite Use the Favorite menu to view lists of commonly played, recently played, and recently added music files. Figure 25 Favorite 3.4.5 File Browser Click File Browser to open the following screen. Use the file browsing screens to play, open, upload, and download files.
  • Page 38 Chapter 3 Web Configurator Basics • You can download individual files of up to 4 GB in size with Mozilla Firefox and Internet Explorer 7 and later or up to 2 GB in size with Internet Explorer 6. Figure 26 File Browser The following table describes the labels in this screen.
  • Page 39 Chapter 3 Web Configurator Basics Table 8 File Browser (continued) LABEL DESCRIPTION Upload Click this to open the following screen where you can add files to the share. Use the Browse button to locate your file/s and click Apply to upload the file. Click Cancel to close this screen.
  • Page 40 Chapter 3 Web Configurator Basics 3.4.5.1 Configure Share Screen In the File Browser screen, select a share and click Configure Share to open the following screen where you can see and configure share management details. Figure 27 File Browser > Configure Share The following table describes the labels in the this screen.
  • Page 41: Share And Folder Names

    Chapter 3 Web Configurator Basics Table 9 File Browser > Configure Share (continued) LABEL DESCRIPTION Share Access Select who can access the files in the share and how much access they are to be given. If you publish the share to the media server or the web, all users will have at least read- only access to the share, regardless of what you configure here.
  • Page 42: Application Zone

    Chapter 3 Web Configurator Basics 3.4.7 Application Zone Administrators can click Application Zone to go to a screen where you can enable or disable various applications for file sharing and downloading. Figure 28 Application Zone The following table describes the labels in the this screen. Table 10 Application Zone LABEL DESCRIPTION...
  • Page 43: System Settings

    Chapter 3 Web Configurator Basics 3.4.8 System Settings Click System > Settings to open the following screen. Use this screen to change general settings and an account password. Figure 29 System > Settings The following table describes the labels in this screen. Table 11 System >...
  • Page 44: Administration Screens

    Chapter 3 Web Configurator Basics Table 11 System > Settings (continued) LABEL DESCRIPTION Video Playback Select Play Next to play the rest of the video files in a folder. So for example, a folder has video files 1~10 and you play video 3. When video 3 finishes the device continues playing the rest of the videos in the folder (4~10).
  • Page 45: Global Administration Icons

    Chapter 3 Web Configurator Basics The Status screen is the first advanced administration screen that displays. Figure 30 Status 3.5.1 Global Administration Icons The icons and language label at the top-right of the screen ( ) are visible from most of the administration screens.
  • Page 46: Navigation Panel

    NSA. PPPoE Configure PPPoE settings for a direct Internet connection. Telnet Service Enable or disable Telnet access. This applies to the NSA310S, NSA325, and NSA325 v2. DyDNS Install the DyDNS package to use Dynamic DNS (DDNS) services to use a domain name with a dynamic IP address.
  • Page 47 Chapter 3 Web Configurator Basics Table 13 Screens Summary (continued) LINK SCREEN FUNCTION Applications FTP Server Enable FTP file transfer to/from the NSA, set the number of FTP connections allowed, an FTP idle timeout, and the character set. Media Server Enable or disable the sharing of media files and select which shares to share.
  • Page 48: Main Window

    Chapter 3 Web Configurator Basics 3.5.3 Main Window The main window shows the screen you select in the navigation panel. It is discussed in the rest of this document. The Status screen is the first administration screen to display. See Chapter 5 on page 137 for more information about the Status screen.
  • Page 49: Session Example (Windows)

    Chapter 3 Web Configurator Basics Table 14 Common Configuration Screen Icons (continued) ICON DESCRIPTION Locate Click this to cause the LED on the external storage device to blink. Repair If you replace a faulty disk with a disk that contains a volume, you need to delete the volume and then click this to fix the degraded RAID volume.
  • Page 50 Chapter 3 Web Configurator Basics Media Server User’s Guide...
  • Page 51: Tutorials

    H A PT ER Tutorials 4.1 Overview This chapter provides tutorials that show how to use the NSA. • Windows 7 Network, see page 51 • Windows 7 Network Map, see page 55 • Playing Media Files in Windows 7, see page 58 •...
  • Page 52 Chapter 4 Tutorials Click Start > Control Panel. Set View by to Category and click Network and Internet. Click View network computers and devices. Media Server User’s Guide...
  • Page 53: If The Nsa Icon Does Not Display

    Chapter 4 Tutorials The NSA icon displays twice because the NSA is both a media server and a storage device. Double- click either NSA icon to open the Web Configurator login screen. 4.2.1 If the NSA Icon Does Not Display The network containing the NSA must be set as a home or work network in order for the NSA icons to display.
  • Page 54: Nsa Icon Right-Click Options

    Chapter 4 Tutorials Use the Set Network Location screen to set the network’s location to home or work. 4.2.2 NSA Icon Right-click Options Right-click the NSA’s icon to see these options: • Install/Uninstall: Click Install to add the NSA as a device in your computer. After you install the NSA you can see it in the computer’s list of devices (see Section 4.5 on page 58.
  • Page 55: Windows 7 Network Map

    Chapter 4 Tutorials • Properties opens a window of NSA details and troubleshooting information. • Manufacturer identifies the company that produced the NSA. • Model identifies the NSA model. • identifies the NSA model number. Model number • Device webpage shows the IP address for accessing the Web Configurator. •...
  • Page 56 Chapter 4 Tutorials Click Start > Control Panel > View network status and tasks (or Network and Sharing Center if you view the Control Panel by icons). Click See full map (1 in the figure). The network containing the NSA must be set as a home or work network in order to use the full map feature.
  • Page 57 Chapter 4 Tutorials Double-click the NSA’s icon to open the Web Configurator login screen. See Section 4.2.2 on page for the NSA icon’s right-click options. Media Server User’s Guide...
  • Page 58: Playing Media Files In Windows 7

    Chapter 4 Tutorials 4.4 Playing Media Files in Windows 7 In Windows 7, the NSA automatically displays as a library in Windows Media Player. Figure 31 NSA in Windows Media Player 4.5 Windows 7 Devices and Printers After you use the NSA’s network icon’s install option you can manage the NSA from the Windows 7 Devices and Printers folder.
  • Page 59 Chapter 4 Tutorials Click Start > Control Panel > Hardware and Sound > Devices and Printers. Select the NSA icon to display information about the NSA. Double-click the NSA icon to open a properties window (see page 55). Right-click the icon to display these options: •...
  • Page 60: Windows 7 Desktop Shortcut

    Chapter 4 Tutorials 4.5.1 Windows 7 Desktop Shortcut This is the NSA’s desktop shortcut. Double-click it to open a properties window (see page 55). Right-click the NSA’s desktop shortcut icon to see these options: • Open file location takes you to the Windows 7 Devices and Printers folder. •...
  • Page 61: Creating A Volume In A 2-Bay Nsa

    Chapter 4 Tutorials • Delete sends the shortcut to the recycle bin. • Rename lets you change the name of the shortcut. • Troubleshoot opens Windows’ device troubleshooting wizard. • Remove device removes the NSA from the Windows 7 Devices and Printers folder. •...
  • Page 62: Migrate Button

    Chapter 4 Tutorials 4.6.2 Migrate Button Do the following steps to create a RAID 1 volume. Once you install a second SATA hard disk in the NSA, the Storage > Volume screen shows the Migrate button. Click the button and you can see the following progress bar. Wait for the RAID 1 volume to Migrate be created.
  • Page 63: Creating A Volume In A 1-Bay Nsa

    Chapter 4 Tutorials This deletes all existing data in the SATA hard disk. Make sure you have a backup of any existing data in the hard disk. The NSA starts creating the volume and you can see the following progress bar. Wait for the RAID 1 volume to be created.
  • Page 64: Creating A Raid 1 Volume

    Your NSA has a single bay for a SATA (Serial Advanced Technology Attachment) hard disk. JBOD is the only storage method for the NSA310S and the default storage method if you are using a single hard disk in the NSA310.
  • Page 65: Create A Sata Volume Button

    Chapter 4 Tutorials Click the button and you can see the following progress bar. Wait for up to 10 minutes for Migrate the RAID 1 volume to be created. 4.7.3 Create a SATA Volume Button If you do not have an existing volume in the Storage > Volume screen, do the following steps to create a RAID 1 volume.
  • Page 66 Chapter 4 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the RAID 1 volume to be created. The Storage > Volume screen displays with your RAID 1 volume. Media Server User’s Guide...
  • Page 67: Creating A Pc Compatible Volume

    Chapter 4 Tutorials 4.7.4 Creating a PC Compatible Volume You can use your eSATA hard disk as a separate storage volume. The following section shows you how to create a PC Compatible Volume. Use this storage method if you have an eSATA hard disk that will be connected to a Windows computer when it is not connected to the NSA.
  • Page 68 Chapter 4 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the volume to be created. The Storage > Volume screen displays with your PC Compatible Volume. Media Server User’s Guide...
  • Page 69 Chapter 4 Tutorials 4.7.4.1 Checking Your PC Compatible Volume The files in the eSATA hard disk that you configured as a PC Compatible Volume should be accessible when you connect the eSATA hard disk to your computer. You can configure the features of your NSA to save files to your eSATA hard disk. For example, you can refer to Section 4.11 on page 95 to use the Broadcatching feature of your NSA to download...
  • Page 70: Deleting A Volume

    Chapter 4 Tutorials Disconnect the eSATA hard disk from the NSA. Connect the eSATA hard disk to your computer. On some systems, you can see the following notification. The computer assigns a letter to the eSATA hard disk (drive F in this example) that is accessible from the My Computer screen.
  • Page 71: File Sharing Tutorials

    Chapter 4 Tutorials In the Storage > Volume screen, select the volume you want to delete and click the delete icon. A confirmation window appears as follows. Click Yes. This deletes all existing data in the volume. Make sure you have a backup of any existing data in the hard disk.
  • Page 72 Chapter 4 Tutorials At the NSA web configurator login screen enter the administrator account and password and click Administrator Login to go to the advanced administration screens. Click Sharing > Users to open the Users screen. Then click Add User. Media Server User’s Guide...
  • Page 73: Creating A Share

    Chapter 4 Tutorials Configure the screen as follows and write down the username and password to give to Jimmy. If the username and password are the same as Jimmy’s Windows login, Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn’t get to configure the whole NSA.
  • Page 74 Chapter 4 Tutorials In the NSA’s administration web configurator screens, click Shares > Add Share. Click Add Share to create a new share. Specify a name for the share and select which volume it should be on. Configure the screen as follows.
  • Page 75: Creating A Group

    Chapter 4 Tutorials Configure the screen as follows to give Jimmy full access right to the share. Then click Apply to create the share. Now that Bob has created Jimmy’s share, he can go through the steps again to create another share for Kevin.
  • Page 76: Accessing A Share From Windows Explorer

    Chapter 4 Tutorials Specify a name for the group. Select the user(s) you want to add to the group from the Available User(s) list and click Add Selected User(s). Configure the screen as follows. Then click Apply to create the group. Now that Bob has created a group for Jimmy and Kevin, he can go through the steps again to create another group for the parents.
  • Page 77 Chapter 4 Tutorials Select the network drive that you want to map the NSA to from the Drive list box. This example uses I. Then browse to and select the share on the NSA. Click Finish. Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login.
  • Page 78: Accessing A Share Using Ftp

    Chapter 4 Tutorials After the mapping is done, you can then simply copy and paste or drag and drop files from/to your local computer’s drives to or from this network folder. Just like the NSA’s share was another folder on your computer. Now that Bob has mapped Jimmy’s share to Jimmy’s computer, he can go through the steps again to map Kevin’s share to Kevin’s computer.
  • Page 79: Accessing A Share Through The Web Configurator

    Chapter 4 Tutorials Enter your password and click Login. Now you can access files and copy files from/to your local computer’s drives to or from this network folder. 4.9.6 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator. Media Server User’s Guide...
  • Page 80: Download Service Tutorial

    Chapter 4 Tutorials Log into the NSA web configurator (see Section 3.3 on page 31) using the appropriate user name and password (this example uses Jimmy’s) and click File Browser. Click a share (the Jimmy share in this example) to see the top level of the share’s contents. Click a folder’s file name to browse the folder.
  • Page 81 Chapter 4 Tutorials Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a datasheet for ZyXEL’s GS-2024 (a device for making phone calls over the Internet). Note: Make sure the link opens either the file you want or a pop-up window about how to handle the file.
  • Page 82 Chapter 4 Tutorials Log into the NSA web configurator (see Section 3.3 on page 31) using the administrator account and click Application Zone and the Application Zone > Download Service link. Click Add. Media Server User’s Guide...
  • Page 83: Installing The Link Capture Browser Plugin

    Chapter 4 Tutorials Right-click the URL field and select Paste. The URL displays in the URL field. Click Apply. After a few moments, the download task appears in the Download Service screen’s Active tab. The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share’s download folder.
  • Page 84 Chapter 4 Tutorials Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7. Internet Explorer Open the folder containing the link capture browser plugin. Double-click on the plugin to display the following screen. Click I Agree to begin installation. Select a location to save the plugin and click Install.
  • Page 85 Chapter 4 Tutorials Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting. Enter the NSA’s web address.
  • Page 86 Chapter 4 Tutorials To install the plugin, drag and drop the plugin to Firefox. The following screen displays. Click Install Now. Media Server User’s Guide...
  • Page 87 Chapter 4 Tutorials You need to restart Firefox after the installation. When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’s web address. Media Server User’s Guide...
  • Page 88: Using The Link Capture Browser Plugin

    Chapter 4 Tutorials Enter the NSA’s web address. The default is ‘nsa’ followed by the number of your model (‘nsa320’ for example). Then click OK. 4.10.3 Using the Link Capture Browser Plugin Once you install the plugin, you may begin sending download links to the NSA from your web browser.
  • Page 89 Chapter 4 Tutorials The login screen shows up. Enter your NSA’s login information and click Login to send the link to the download service. A confirmation message displays. Log into the NSA web configurator (see Section 3.3 on page 31) using the administrator account and click Application Zone and the Application Zone >...
  • Page 90: Configuring The Download Service Preferences

    Chapter 4 Tutorials By default the NSA stores all downloads in the admin share’s download folder. See Section 4.9.4 on page Section 4.9.5 on page 78, or Section 4.9.6 on page 79 for how to access a share. 4.10.4 Configuring the Download Service Preferences Once you added a list of download tasks to the NSA (see Section 4.10.1 on page 80 Section...
  • Page 91 Chapter 4 Tutorials When it is not the download time, you see a message in the Download Service screen, indicating the active download period. Click Applications > Download Service > Preferences > P2P download to open the following screen. Enter the information below and then click Apply. Here is a list of P2P download settings you want to configure for your NSA: •...
  • Page 92: Using Download Service Notification

    Chapter 4 Tutorials • Click Edit IP Filter. Use an online IP filter table from http://www.bluetack.co.uk/config/level1.gz for example to protect P2P downloads. Enter the URL in the Update IP Filter from the Internet Every Week field. 4.10.5 Using Download Service Notification Use an RSS feed reader on your computer to keep track of files the NSA has downloaded.
  • Page 93 Chapter 4 Tutorials Internet Explorer 7 Example After you activate download service notification, click the RSS feed icon. The following screen displays. Select Subscribe to this feed. The following screen displays. Click Subscribe. Media Server User’s Guide...
  • Page 94 Chapter 4 Tutorials Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Firefox Example After you activate download service notification, click the RSS feed icon. The following screen displays. Select Live Bookmarks from the drop-down list and click Subscribe Now.
  • Page 95: Broadcatching Tutorial

    Chapter 4 Tutorials From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list. 4.11 Broadcatching Tutorial Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV Internet television channel.
  • Page 96 Chapter 4 Tutorials Find the link for the RSS feed containing the channel you want to add. In this example, http:// reviews.cnet.com/4520-11455_7-6333605-1.html has an RSS link for subscribing to the CNET Live podcast. However this is not the link for the actual RSS feed. Click the link to go to another screen that has RSS feed links.
  • Page 97 Chapter 4 Tutorials Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer). Log into the NSA web configurator (see Section 3.3 on page 31) using the administrator account and click Administration > Applications > Broadcatching. Click Add Channel.
  • Page 98 Chapter 4 Tutorials Right-click the URL field and select Paste. The URL displays in the URL field. Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later. Select a policy for what items to delete.
  • Page 99: Printer Server Tutorial

    Chapter 4 Tutorials 4.12 Printer Server Tutorial Do the following to have the NSA let computers on your network share a printer. See www.zyxel.com for a list of compatible printers. Make sure the NSA is on and the SYS light is on steady (not blinking). Use a USB cable to connect the printer’s USB port to one of the NSA’s USB ports.
  • Page 100 Chapter 4 Tutorials If you get a warning screen, click the option that lets you continue (Yes in this example). If your computer does not already have the printer’s driver installed, you will need to install it. In this example, click OK. Use the wizard screens to install the printer driver on the computer.
  • Page 101: Copy And Flickr Auto Upload Tutorial

    Chapter 4 Tutorials 4.13 Copy and Flickr Auto Upload Tutorial Amy received some photos taken during her best friend’s wedding and saved the files on a USB disk. She wants to save a copy of the photos in the NSA and upload the photos to her Flickr account.
  • Page 102: Ftp Uploadr Tutorial

    Chapter 4 Tutorials The NSA also automatically uploads the copied files to Flickr. 4.14 FTP Uploadr Tutorial FTP Uploadr can automatically upload files saved on the NSA to a remote FTP server. Amy wants to share files on her NSA with Susan. They each have an NSA at home, so Susan has to set her NSA as an FTP server for Amy to automatically send files using FTP Uploadr.
  • Page 103 Chapter 4 Tutorials Susan also has to create a user account and share on her NSA for Amy to upload files. The share is used for files uploaded from Amy’s NSA. Amy will then use the following information to configure FTP Uploadr on her NSA.
  • Page 104 Chapter 4 Tutorials In the FTP Uploadr screen, click Preferences to configure the auto upload settings. Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List.
  • Page 105: Web Configurator's Security Sessions

    Chapter 4 Tutorials Amy also set the Bandwidth Limit to 20 KB/s so that the upload doesn’t slow down her Internet connection. Now Amy has set up FTP Uploadr to send files to Susan’s NSA. Every time Amy adds new files or renames files in the video share, these new or modified files will be uploaded automatically to the Amy share on Susan’s NSA.
  • Page 106: Customizing The Nsa's Certificate

    Chapter 4 Tutorials 4.15.1 Customizing the NSA’s Certificate Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit. Next, let’s modify the certificate by changing the Common Name to this NSA’s host name of “nsa”, the Organization to “ZyXEL”...
  • Page 107: Downloading And Installing Customized Certificate

    Chapter 4 Tutorials The NSA restarts its network services and returns you to the login screen. 4.15.2 Downloading and Installing Customized Certificate Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. Media Server User’s Guide...
  • Page 108 Chapter 4 Tutorials Save the file to your computer. Find the certificate file on your computer and double-click it. Media Server User’s Guide...
  • Page 109 Chapter 4 Tutorials Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. In the Certificate dialog box, click Install Certificate. In the Certificate Import Wizard, click Next. Media Server User’s Guide...
  • Page 110 Chapter 4 Tutorials Leave Automatically select certificate store based on the type of certificate selected and click Next. In the Completing the Certificate Import Wizard screen, click Finish. Media Server User’s Guide...
  • Page 111: Turn On The Nsa's Web Security

    Chapter 4 Tutorials If you are presented with another Security Warning, click Yes. Finally, click OK when presented with the successful certificate installation message. 4.15.3 Turn on the NSA’s Web Security Now that you have customized the NSA’s certificate and installed it in your computer, you can turn on security for your Web Configurator sessions.
  • Page 112 Chapter 4 Tutorials Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. A warning screen pops up if applying your change may disconnect some users. Click Apply to continue.
  • Page 113 Chapter 4 Tutorials The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. Click Add Exception.
  • Page 114 Chapter 4 Tutorials Click Get Certificate. Media Server User’s Guide...
  • Page 115 Chapter 4 Tutorials Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View. Media Server User’s Guide...
  • Page 116 Chapter 4 Tutorials The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close. Media Server User’s Guide...
  • Page 117 Chapter 4 Tutorials If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. The login screen displays. Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s certificate so they can check it before adding a security exception (as in steps on pages to 116).
  • Page 118: Using Ftpes To Connect To The Nsa

    Chapter 4 Tutorials 4.16 Using FTPES to Connect to the NSA This section covers how to use FTP over Explicit TLS/SSL with the NSA for secure FTP transfers. Before you go through this section, read Section 4.15 on page 105 to configure HTTPS.
  • Page 119: Using A Mac To Access The Nsa

    Chapter 4 Tutorials A security warning screen displays. The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). If they match, click OK. The shares and folders to which Gonzo has access display.
  • Page 120: Finder

    Chapter 4 Tutorials 4.17.1 Finder Open a new Finder window. Select All under the SHARED sidebar. Look for the NSA from the Network list. Media Server User’s Guide...
  • Page 121: Go Menu

    Chapter 4 Tutorials Expand the NSA to display the shares you may access. 4.17.2 Go Menu In the Finder, click Go > Connect to Server. Media Server User’s Guide...
  • Page 122: How To Use The Backupplanner

    Chapter 4 Tutorials When the Connect to Server dialog box opens, enter smb:// and the NSA’s IP address in the Server Address field. You may also click Browse to have the Mac search for the NSA. Click Connect. Once you establish the connection, you can access the NSA from the Finder or directly from the desktop.
  • Page 123 Chapter 4 Tutorials Click Protect > Backup > Add Job. Figure 32 Protect > Backup Identify the backup job and select Archive. New files are often added to the shares that you need to back up and existing files are not frequently changed so select Incremental.
  • Page 124 Chapter 4 Tutorials Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection. Figure 34 Protect >...
  • Page 125: Creating A Synchronization Backup

    Chapter 4 Tutorials In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the target NSA so you can leave the encryption off, too. Have the NSA keep 3 backups. Figure 35 Protect >...
  • Page 126 Chapter 4 Tutorials Click Protect > Backup > Add Job. Figure 36 Protect > Backup Name the backup job and select Synchronization. You want only your current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder.
  • Page 127 Chapter 4 Tutorials • Click Next. Figure 38 Protect > Backup > Add Job: Step 2 Click OK in the warning dialog box. Figure 39 Protect > Backup > Add Job: Step 3 For this example, assume the connection to the German branch office is a good one and not many files need to be backed up so leave the compression off.
  • Page 128: Restoring Archived Files By Backup Job

    Chapter 4 Tutorials • Click Next. Figure 40 Protect > Backup > Add Job: Step 3 Schedule the backup to occur every morning at 3:00 and click Done. Figure 41 Protect > Backup > Add Job: Step 4 You do not need to use a special restore process to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share.
  • Page 129 Chapter 4 Tutorials Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 42 Protect > Backup Select which backup to use and click Next. Figure 43 Protect > Backup > Restore Archive: Step 1 Media Server User’s Guide...
  • Page 130 Chapter 4 Tutorials Select the files and folders you want to restore and click Next. Figure 44 Protect > Backup > Restore Archive: Step 2 Select the original location and click Done. Figure 45 Protect > Backup > Restore Archive: Step 3 Media Server User’s Guide...
  • Page 131: Restoring By Backup Files

    Chapter 4 Tutorials The NSA restores the files into the share. When it finishes you can access the files. Figure 46 Protect > Backup > Restore Archive: Progress 4.18.4 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore archived files by the backup job.
  • Page 132 Chapter 4 Tutorials Select the backup job and backup time and click Next. Figure 48 Protect > Restore: Step 2 Select everything in the share except the recycle folder. Click Next. Figure 49 Protect > Restore: Step 3 Media Server User’s Guide...
  • Page 133 Chapter 4 Tutorials Browse to the folder where you want to put the files. Click Done. Figure 50 Protect > Restore: Step 4 The NSA restores the files and you can use them again. Media Server User’s Guide...
  • Page 134 Chapter 4 Tutorials Media Server User’s Guide...
  • Page 135: Technical Reference

    Technical Reference...
  • Page 137: Status Screen

    H A PT ER Status Screen 5.1 Overview This chapter describes the Status screen, which is the first advanced administration screen that displays. 5.2 The Status Screen Click Administration in the Home screens (Section 3.5 on page 44) to open the Web Configurator. You can also view the status screen, by clicking Status on the top-left of the navigation panel.
  • Page 138 Chapter 5 Status Screen The following table describes the labels in this screen. Table 16 Status LABEL DESCRIPTION Status Click this to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the Edit icon to go to the screen where you can configure this.
  • Page 139 Chapter 5 Status Screen Table 16 Status (continued) LABEL DESCRIPTION External Volume (or USB This displays the volumes created on USB hard drives connected to the NSA. USB Volume) disks are numbered in the order that you insert USB devices. Click the Edit icon to open the Storage screen.
  • Page 140 Chapter 5 Status Screen Media Server User’s Guide...
  • Page 141: System Setting

    H A PT ER System Setting 6.1 Overview This chapter gives an overview of the various features included in the system setting screens. Upgrade the NSA firmware. Use package management to add more useful applications in your NSA. Identify your NSA on the network and set the time that the NSA follows for its scheduled tasks/logs. 6.2 What You Can Do •...
  • Page 142 Chapter 6 System Setting • SMART - Use S.M.A.R.T. (Self Monitoring, Analysis, and Reporting Technology) to monitor hard disks. It detects and reports the reliability of hard disks using standard indicators, enabling administrators to anticipate possible disk failures. • SqueezeCenter - This enables you to manage a Logitech's Squeezebox device connected to the NSA.
  • Page 143: The Firmware Upgrade Screen

    Chapter 6 System Setting 6.4 The Firmware Upgrade Screen Use this screen to upgrade the NSA firmware. You should first have downloaded the latest firmware files from the ZyXEL website. Do not turn off the NSA while it is upgrading the firmware or you may render it unusable.
  • Page 144 Chapter 6 System Setting Click System Setting > Firmware / Packages > Package Management to open the following screen. Figure 53 System Setting > Firmware / Packages > Package Management The following table describes the labels in this screen. Table 18 System Setting > Firmware / Packages > Package Management LABEL DESCRIPTION Package Management...
  • Page 145 Chapter 6 System Setting Table 18 System Setting > Firmware / Packages > Package Management LABEL DESCRIPTION Disable This option is only for non built-in packages. Choose the item(s) on the list and click this to disable the application on your system. You have to enable the application again in order to use it.
  • Page 146: Displaying The Package Information

    Chapter 6 System Setting 6.5.1 Displaying the Package Information Select an item on the list and click Package Info. Use this screen to check detailed information about the task. Figure 54 System Setting > Firmware / Packages > Package Management > Package Info The following table describes the labels in this screen.
  • Page 147: The Server Name Screen

    Chapter 6 System Setting 6.6 The Server Name Screen Click System Setting > Server Name to open the following screen. Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup.
  • Page 148 Chapter 6 System Setting Click the System Setting link in the navigation panel and then click the Date/Time link to access the Date/Time screen. Figure 56 System Setting > Date/Time The following table describes the labels in this screen. Table 21 System Setting > Date/Time LABEL DESCRIPTION Current System Date Time Setting...
  • Page 149 Chapter 6 System Setting Table 21 System Setting > Date/Time (continued) LABEL DESCRIPTION Synchronize Click this for the NSA to retrieve the correct time from the configured time server right away. Time Zone Time Zone Choose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT).
  • Page 150 Chapter 6 System Setting Media Server User’s Guide...
  • Page 151: Storage

    H A PT ER Storage 7.1 Overview Several NSA features require a valid internal volume. This chapter covers the management of volumes and disks (both internal and external). Use the Storage screen (Section 7.2 on page 152) to display information on all volumes, create internal and external volumes, and configure the volume’s properties.
  • Page 152: The Storage Screen

    Chapter 7 Storage Note: 1-bay models configure the internal hard disk (SATA) as JBOD by default. You can modify it if you attach a second internal hard disk (an eSATA hard disk). Finding Out More Section 7.6 on page 160 for more technical background information on storage.
  • Page 153: Storage Screen

    Chapter 7 Storage 7.2.2 Storage Screen Click Storage > Volume in the navigation panel to display the following screen. Use this screen to display internal and external volumes on the NSA. Note: It is recommended to scan the volume every three months or 32 reboots. Figure 57 Storage >...
  • Page 154: Volume Status

    Chapter 7 Storage Table 22 Storage > Volume (continued) LABEL DESCRIPTION Capacity This field shows total disk size, the percentage of the volume being used and the percentage that is available. Actions This field displays icons allowing you to edit, scan, repair, expand, migrate, or delete a volume.
  • Page 155: Creating An Internal (Sata) Volume

    Chapter 7 Storage If it’s down, then the only indication is that you can no longer transfer files to/from the shares in the down volume. If it’s degraded, then file transfer to/from the shares in the degraded volume will be slower. Note: There is no explicit message from CIFS that tells users their volume is degraded or down.
  • Page 156 JBOD is the only option if you only have one disk installed. With two disks, you can choose to create a JBOD volume on one of the disks or both. JBOD is the only option for the NSA310S. Select which disks to use for this volume (disk1, disk2, or disk1 and disk2). A disk can only belong to one volume.
  • Page 157: Editing A Volume

    Chapter 7 Storage Note: Once you create the first volume on the NSA, it is recommended to restart the NSA for better performance. 7.4 Editing a Volume Click an internal volume’s Edit icon in the Storage screen as shown in Figure 57 on page 153 open the following screen.
  • Page 158: Scanning A Volume

    Chapter 7 Storage 7.4.1 Scanning a Volume Select a volume in the Storage > Volume screen (Section 7.2 on page 152) and click Scan to open the following screen. Use this screen to scan the volume for errors and select whether or not to have the NSA automatically repair them.
  • Page 159: External Disks

    Chapter 7 Storage Note: Creating a volume formats the drive. All data on the disk will be lost. Figure 62 Storage > Create an External Volume The following table describes the labels in this screen. Table 26 Storage > Create an External Volume LABEL DESCRIPTION Volume Name...
  • Page 160: Storage Technical Reference

    Chapter 7 Storage 7.6 Storage Technical Reference This section provides some background information about the topics covered in this chapter. 7.6.1 Volumes and RAID A volume is a storage area on a disk or disks. You can create volumes on the internal disks and external disks attached to the USB port(s).
  • Page 161: Storage Methods

    Chapter 7 Storage Two Disks: You may choose JBOD, RAID 0 or RAID 1. With two disks you could create: • up to two JBOD volumes • one RAID 0 or RAID 1 volume • Choose JBOD for flexibility and maximum usage of disk space for data. •...
  • Page 162 Chapter 7 Storage Note: In the following figures, A1, A2, A3 and so on are blocks of data from the A file. Similarly, B1, B2, B3 and C1, C2, C3 are blocks of data from the B and C files. JBOD JBOD allows you to combine multiple physical disk drives into a single virtual one, so they appear as a single large disk.
  • Page 163 Chapter 7 Storage RAID 1 RAID 1 creates an exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity. The following figure shows two disks in a single RAID 1 volume with mirrored data.
  • Page 164 Chapter 7 Storage Media Server User’s Guide...
  • Page 165: Network

    H A PT ER Network 8.1 Overview This chapter discusses the network configuration screens. The Network screens allow you to configure TCP/IP and PPPoE settings for the NSA. 8.2 What You Can Do • Use the TCP/IP screen (Section 8.4 on page 166) to assign the NSA a dynamic or static IP address and DNS information.
  • Page 166: The Tcp/Ip Screen

    Chapter 8 Network Jumbo Frames Jumbo frames are Ethernet frames larger than 1500 bytes. They enable data transfer with less overhead. The bigger the frame, the better the network performance. Your network equipment such as computers, switches and routers must be capable of supporting jumbo frames. You also need to enable jumbo frames in all related network devices.
  • Page 167 Chapter 8 Network Note: If you change the NSA’s IP address, you need to log in again after you apply changes. Figure 64 Network > TCP/IP The following table describes the labels in this screen. Table 31 Network > TCP/IP LABEL DESCRIPTION IP Address...
  • Page 168 Chapter 8 Network Table 31 Network > TCP/IP (continued) LABEL DESCRIPTION IPv6 Settings Click this to configure the following IPv6 settings. Mode - • Select Auto to have the Device use the IPv6 prefix from the connected router’s Router Advertisement (RA) to generate an IPv6 address. •...
  • Page 169: Upnp Port Mapping Screen

    Chapter 8 Network 8.5 UPnP Port Mapping Screen Use UPnP (Universal Plug and Play) port mapping to allow access from the WAN to services you select on the NSA. It is recommended that you place the NSA behind an Internet gateway firewall device to protect the NSA from attacks from the Internet (see RAID and Data Protection on page for firewall type suggestions).
  • Page 170: Upnp And Security

    Chapter 8 Network For example, if the NSA’s IP address was 192.168.1.33 when you applied the UPnP Port Mapping screen’s settings and the NSA later gets a new IP address of 192.168.1.34 through DHCP, WAN access stops working because the Internet gateway still tries to forward traffic to IP address 192.168.1.33.
  • Page 171: Configuring Upnp Port Mapping

    Chapter 8 Network HTTP (Web Configurator) You can use UPnP port mapping to allow access to the NSA’s management screens. If you use UPnP to allow web configurator access from the WAN, you may want to use a different WAN port number (instead of the default of port 80) to make it more secure.
  • Page 172: The Pppoe Screen

    Chapter 8 Network The following table describes the labels in this screen. Table 32 Network > UPnP > Port Mapping LABEL DESCRIPTION Use these fields to specify what port the Internet gateway uses to connect from its LAN port to the service on the NSA. Service Name This read-only field identifies a service on the NSA.
  • Page 173: Telnet Screen

    Click this to save your changes. Reset Click this to restore previously saved settings. 8.7 Telnet Screen Use this screen to enable or disable Telnet access to the NSA. Telnet is available in the NSA310S, NSA325, and NSA325 v2. Media Server User’s Guide...
  • Page 174 Chapter 8 Network Telnet access lets you use line commands to configure the NSA. Use these commands at your own risk. The vendor takes no responsibility for any changes you make using the commands. Click Network > Telnet in the navigation panel to open the following screen. Figure 70 Network >...
  • Page 175: Applications

    H A PT ER Applications 9.1 Overview This chapter discusses the features in the Application screens. The NSA contains various applications for file sharing and downloading. 9.2 What You Can Do • Use the FTP Server screen (Section 9.4 on page 177) to configure settings for FTP file transfers to/from the NSA.
  • Page 176 Chapter 9 Applications It requests for a mutual method of encryption from the FTP server for its file transfer sessions. Your FTP client must be set to use FTPES as in the following example. Figure 71 FTP Client Example Media Server The media server feature lets anyone on your network play video, music, and photos from the NSA (without having to copy them to another computer).
  • Page 177: Ftp Server

    Chapter 9 Applications For example, if you want to share photos in a FamilyPhotos share, you could “web publish” it and others could use a web browser to access the photos at http://my-NSA’s-IP-Address/MyWeb/ FamilyPhotos. Broadcatching Broadcatching is the downloading of digital content from Internet feeds. Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio shows, podcasts (audio files), and blogs.
  • Page 178: The Media Server Screens

    Chapter 9 Applications The following table describes the labels in this screen. Table 35 Applications > FTP LABEL DESCRIPTION Enable FTP You can use FTP to send files to the NSA or get files from the NSA. Select this check box to allow users to connect to the NSA via FTP;...
  • Page 179: The Media Server Share Publish Screen

    Chapter 9 Applications Click Applications > Media Server to open the following screen. Use this screen to view the media server’s status and rebuild the media server database. Figure 73 Applications > Media Server > Media Server The following table describes the labels in this screen. Table 36 Applications >...
  • Page 180: The Media Server Squeezecenter Screen

    Chapter 9 Applications Table 37 Applications > Media Server > Share Publish LABEL DESCRIPTION Publish Photos Select this to give media clients access to the share’s photo files. Publish Videos Select this to give media clients access to the share’s video files. Apply Click this to save your changes.
  • Page 181: The Download Service Screen

    Chapter 9 Applications The following table describes the labels in this screen. Table 39 Applications > iTunes Server LABEL DESCRIPTION Enable iTunes Check this to let anyone on your network use iTunes to play music files in the published Server shares.
  • Page 182 Chapter 9 Applications Table 40 Applications > Download Service (continued) LABEL DESCRIPTION Preferences Click this to open a screen where you can set the default location for saving downloads and configure your P2P download settings. Refresh Click this to update the information displayed on the screen. Select Files A single P2P download torrent file is often for multiple files.
  • Page 183 Chapter 9 Applications Table 40 Applications > Download Service (continued) LABEL DESCRIPTION Status The following icons show the download’s status. Completed: The NSA has downloaded the whole file. Seeding: The download is finished and the NSA is allowing other P2P users to download Downloading: The NSA is getting the file.
  • Page 184: Adding A Download Task

    Chapter 9 Applications 9.7.1 Adding a Download Task Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 4.10 on page 80 provides a tutorial on adding a download task.
  • Page 185 Chapter 9 Applications Table 41 Applications > Download Service > Add LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete downloads in) and Downloaded Files where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded.
  • Page 186: Configuring General Download Settings

    Chapter 9 Applications 9.7.2 Configuring General Download Settings Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period. Figure 79 Applications > Download Service > Preferences > General Settings Media Server User’s Guide...
  • Page 187 Chapter 9 Applications The following table describes the labels in this screen. Table 42 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete downloads in) and Downloaded Files where the NSA moves completed downloads (Move completed downloads to).
  • Page 188: Configuring The P2P Download Settings

    Chapter 9 Applications Table 42 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Download Service Specify the time period for the NSA to download files. is active in the time period Note: If you also configured the Power On/Off Schedule feature in the Power (hh:mm - Management screen, make sure your active download period does not conflict with hh:mm)
  • Page 189 Chapter 9 Applications The following table describes the labels in this screen. Table 43 Applications > Download Service > Preferences > P2P download LABEL DESCRIPTION Port Number Assign a port number for P2P downloads. You can select a number from 2 to 65536. It is recommended to use a port number greater than 1025.
  • Page 190: Edit Ip Filter

    Chapter 9 Applications Table 43 Applications > Download Service > Preferences > P2P download LABEL DESCRIPTION Reset Click this to restore your previously saved settings. Cancel Click this to return to the previous screen without saving. 9.7.4 Edit IP Filter Use this screen to enable or disable IP filtering for P2P downloads.
  • Page 191: Selecting Files To Download

    Chapter 9 Applications 9.7.5 Selecting Files to Download Select an item in the Applications > Download Service screen’s list and click Select Files to open the following screen. Use this screen to select which of the torrent’s files to download. Section 4.10 on page 80 provides a tutorial on adding a download task.
  • Page 192: Displaying The Task Information

    Chapter 9 Applications 9.7.6 Displaying the Task Information Select an item on the list and click Task Info. Use this screen to check detailed information about the task. Figure 83 Applications > Download Service > Task Info The following table describes the labels in this screen. Table 46 Applications >...
  • Page 193: The Web Publishing Screen

    Chapter 9 Applications Table 46 Applications > Download Service > Task Info LABEL DESCRIPTION Priority Use this field to set the priority for downloading the task. Select Auto to have the NSA automatically determine the task’s priority. Select High to have the NSA download this file before the other files. Comment Enter a description for this task.
  • Page 194: The Broadcatching Screen

    Chapter 9 Applications Table 47 Applications > Web Publishing LABEL DESCRIPTION Port Number Specify a port number for accessing the published share websites hosted on the NSA. If you enter a number other than 80, make sure you include it when telling others how to access the web-published share.
  • Page 195 Chapter 9 Applications Click Applications > Broadcatching to open the following screen. Figure 85 Applications > Broadcatching The following table describes the labels in this screen. Table 48 Applications > Broadcatching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button.
  • Page 196: Adding A Broadcatching Channel

    Chapter 9 Applications Table 48 Applications > Broadcatching LABEL DESCRIPTION Item Name These are the downloadable files. The following icons show the file’s status in the NSA. Completed: The NSA has downloaded the whole file. Double-click the item to go to the Download Service screen where you can see the file’s name and location.
  • Page 197 Chapter 9 Applications select policies for downloading and deleting the channel’s items. Section 4.11 on page 95 provides a tutorial on adding a broadcatching channel. Figure 87 Applications > Broadcatching > Add Channel The following table describes the labels in this screen. Table 49 Applications >...
  • Page 198 Chapter 9 Applications Table 49 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete downloads in) and Downloaded where the NSA moves completed downloads (Move completed downloads to). Files The Share column shows the name of the share where the file is downloaded.
  • Page 199: Editing A Broadcatching Channel

    Chapter 9 Applications 9.9.2 Editing a Broadcatching Channel Click Applications > Broadcatching, then select a channel and click Edit Channel to open a similar Edit screen. Use the Edit Channel screen to change the download or delete policies. Figure 88 Applications > Broadcatching > Edit Channel The following table describes the labels in this screen.
  • Page 200: The Print Server Screen

    Chapter 9 Applications Table 50 Applications > Broadcatching > Edit Channel LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete downloads in) and Downloaded Files where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded.
  • Page 201: Print Server Rename

    Chapter 9 Applications Click Applications > Print Server to open the following screen. Figure 89 Applications > Print Server The following table describes the labels in this screen. Table 51 Applications > Print Server LABEL DESCRIPTION Refresh Click this to update the list of printers and print jobs. The table lists printers and their queued print jobs.
  • Page 202: The Copy/Sync Button Screen

    Chapter 9 Applications 9.11 The Copy/Sync Button Screen The Copy/Sync button on the front panel allows you to copy or synchronize files between a connected USB device and the NSA. Click Applications > Copy/Sync Button to open the following screen. Figure 91 Applications >...
  • Page 203: Technical Reference

    Chapter 9 Applications Table 53 Applications > Copy/Sync Button LABEL DESCRIPTION USB Volume If your USB device has multiple partitions, select which partition to use with the synchronization function. Sync Direction Select USB -> NSA to synchronize files from your USB device to the NSA. Select NSA ->...
  • Page 204: Download Service

    Chapter 9 Applications A link for the NSA in iTunes under SHARED. Click it to display the NSA’s published media files as shown next. Figure 92 NSA link in iTunes 9.12.2 Download Service The NSA’s download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA.
  • Page 205: Link Capture Browser Plugin

    Chapter 9 Applications If you already have the torrent file saved on your computer, you can just specify its location when adding a download task through the web configurator. Another method is to use FTP or a CIFS program (Windows Explorer for example) to copy the torrent file into the torrent folder. The NSA automatically uses the torrent file.
  • Page 206: P2P Download Security

    Chapter 9 Applications Note: The download service notification only keeps track of files downloaded via P2P download. Figure 94 Download Service Notification 9.12.5 P2P Download Security When you download using P2P, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall.
  • Page 207 Chapter 9 Applications • Anti-virus to check files you download for computer viruses. P2P Download and Your Firewall The anti-virus feature on a firewall probably cannot check P2P downloads for viruses, so use anti- virus software on your computer to scan the NSA for viruses. When you download using P2P download, many other P2P download users are also trying to download the file from you.
  • Page 208: Web Publishing Example

    Chapter 9 Applications HTML (web-based) configuration interface to set this up (see the firewall’s manual for details). You may also have to configure a corresponding firewall rule. Figure 97 Firewall Configured to Allow Incoming P2P Download Requests 9.12.6 Web Publishing Example This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet.
  • Page 209: Web Publishing

    Chapter 9 Applications Now open your web browser and type in the address of the NSA’s FamilyPhotos web page. In this example, the NSA’s IP address is 192.168.1.33, and the name of the web-published share is FamilyPhotos. So you would enter “http://192.168.1.33/MyWeb/FamilyPhotos/” in your browser’s address bar.
  • Page 210: Channel Guides For Broadcatching

    Chapter 9 Applications Web Publishing Port Number If the web-published shares use a port number other than 80 (the normal port for web traffic), users must include it after the NSA’s IP address in order to access the NSA’s web-published shares. For example, say you specified port 8080, the NSA’s IP address is 192.168.1.23, and the name of the web-published share is FamilyPhotos.
  • Page 211: Printer Sharing

    Chapter 9 Applications 9.12.9 Printer Sharing The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA’s USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers.
  • Page 212: Synchronizing Files

    Chapter 9 Applications The following figure illustrates how copying files works when you copy files from a USB device to the NSA. The same concept applies when you copy files from the NSA to a USB device. Figure 102 Copying Files Example Before Copy After Copy Both storage devices contain file A.
  • Page 213 Chapter 9 Applications The following figure illustrates how synchronization works when you synchronize files from a USB device to the NSA. The same concept applies when you synchronize files from the NSA to a USB device. Figure 103 Synchronizing Files Example 1 Before Sync After Sync Both storage devices contain A.
  • Page 214 Chapter 9 Applications The following figure illustrates how synchronization works when you synchronize files in both directions simultaneously. Figure 104 Synchronizing Files Example 2 Before Sync (new) (new) After Sync (new) (new) (new) (new) A on the USB device and B on the NSA are modified more recently. •...
  • Page 215: Packages

    HAPTER Packages 10.1 Overview This chapter describes features you can add to the NSA by installing packages. See Section 6.5 on page 143 for how to manage packages. 10.2 What You Can Do • Use the SMART screens (Section 10.3 on page 215) to view your NSA hard disk(s) statistics and monitor their performance.
  • Page 216: Smart Brief Summary

    Chapter 10 Packages Click Storage > S.M.A.R.T to open the following screen. Figure 105 Storage > S.M.A.R.T The following table describes the labels in this screen. Table 54 Storage > S.M.A.R.T LABEL DESCRIPTION S.M.A.R.T. Information Brief Summary Select a hard disk volume from the list and click this to display information about the volume, such as the hard disk vendor, specific model, hard disk capacity and so on.
  • Page 217: Smart Full Summary

    Chapter 10 Packages Click Brief Summary in the Storage > S.M.A.R.T screen to display the following. Figure 106 Storage > S.M.A.R.T: Brief Summary The following table describes the labels in this screen. Table 55 Storage > S.M.A.R.T: Brief Summary LABEL DESCRIPTION Brief Summary Temperature...
  • Page 218 Chapter 10 Packages Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 107 Storage > S.M.A.R.T: Full Summary The following table describes the labels in this screen. Table 56 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION This is the identification number used to tag a hard disk attribute.
  • Page 219: Dydns Screen

    Chapter 10 Packages Table 56 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION When Failed This column indicates when (if ever) the attribute failed. An attribute has failed if the normalized value is less than or equal to the threshold. • -: This displays if the attribute is not failing now and has never failed in the past.
  • Page 220: Nfs Screen

    Chapter 10 Packages Table 57 Network > DyDNS LABEL DESCRIPTION External Address This shows the IP address of the NSA that can be accessed in the Wide Area Network (WAN). Note that this is not assigned by the DyDNS server. Configuration Enable DyDNS Select this to use dynamic DNS.
  • Page 221: Add/Edit Nfs Share

    Chapter 10 Packages Table 58 Network > NFS LABEL DESCRIPTION NFS Session Click this to view active NFS sessions. You can see the list of users who have access to the NFS shares. Refer to Section 10.5.2 on page 222 for the NFS Session screen.
  • Page 222: Nfs Session

    Chapter 10 Packages Click Add or Edit in the Network > NFS screen to open the following: Figure 111 Network > NFS: Add/Edit The following table describes the labels in this screen. Table 59 Network > NFS: Add/Edit LABEL DESCRIPTION Volume Name Select the volume where the folder you want to add as an NFS share is located.
  • Page 223: Syslog Server Screen

    Chapter 10 Packages Click NFS Session in the Network > NFS screen to open the following. Figure 112 Network > NFS: NFS Session The following table describes the labels in this screen. Table 60 Network > NFS: NFS Session LABEL DESCRIPTION Type This shows if the NFS share is active or not.
  • Page 224 Chapter 10 Packages Click Applications > Syslog Server to open the following screen. Figure 113 Applications > Syslog Server The following table describes the labels in this screen. Table 61 Applications > Syslog Server LABEL DESCRIPTION Enable Syslog Select this to have the NSA accept syslog logs from syslog clients. Clear it to Server stop the NSA from accepting syslog logs from syslog clients.
  • Page 225: Tftp Server Screen

    Chapter 10 Packages Table 61 Applications > Syslog Server LABEL DESCRIPTION Log Format Select the format you want to use for recording the received logs. The Example item below the drop-down list boxes displays how the selected custom format looks. For example, if you select Full Date, the individual log entries would display with something like 2009 May 13 17:15:51 in front of them.
  • Page 226: Emule Screens

    Chapter 10 Packages Table 62 Applications > TFTP Server LABEL DESCRIPTION Path Use this if you want to further specify a folder within the share This field displays the share folder’s path. Type the location of the folder using forward slashes as branch separators or use Browse to find or create a folder on the NSA.
  • Page 227 Chapter 10 Packages The following table describes the labels in this screen. Table 63 Applications > eMule > Server LABEL DESCRIPTION Server - You can add multiple servers in this screen. However, the NSA can only connect to one eMule server at a time.
  • Page 228: Add Server

    Chapter 10 Packages 10.8.2 Add Server Use this screen to add a server for the eMule application. Click Add in the Applications > eMule > Server screen to add a server. Figure 117 Applications > eMule > Server: Add The following table describes the labels in this screen. Table 64 Applications >...
  • Page 229: My Info

    Chapter 10 Packages The following table describes the labels in this screen. Table 65 Applications > eMule > Server: Edit LABEL DESCRIPTION Server Name Enter the server name. IP Address Enter the IP address of the server. Port Number Enter the port number of the server. Apply Click this to apply your changes.
  • Page 230: Emule Task Screen

    Chapter 10 Packages Table 66 Applications > eMule > Server: MyInfo LABEL DESCRIPTION Sources This shows the total number of peers that can share the required files to the NSA eMule client. Close Click this to exit the screen. 10.8.5 eMule Task Screen Use this screen to view tasks, including completed, downloading, uploading and shared tasks, that are being handled by the NSA.
  • Page 231 Chapter 10 Packages Table 67 Applications > eMule > Task LABEL DESCRIPTION Resume Select a paused item from the list and click this to resume the task. Task Info Select an item from the list and click this to view the details and status of the task. The table lists your tasks.
  • Page 232: Add Task

    Chapter 10 Packages You see a warning screen before you delete a task. Figure 121 Delete a Task 10.8.6 Add Task Use this to add a download task to the NSA. Click Add in the Applications > eMule > Task screen to add a task. Figure 122 Applications >...
  • Page 233: Preferences

    Chapter 10 Packages Table 68 Applications > eMule > Task: Add LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. •...
  • Page 234 Chapter 10 Packages Click Applications > eMule > Task > Preferences to open the following screen. Figure 123 Applications > eMule > Task > Preferences The following table describes the labels in this screen. Table 69 Applications > eMule > Task > Preferences LABEL DESCRIPTION Username...
  • Page 235 Chapter 10 Packages Table 69 Applications > eMule > Task > Preferences LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. •...
  • Page 236: Edit Ip Filter

    Chapter 10 Packages Table 69 Applications > eMule > Task > Preferences LABEL DESCRIPTION Reset Click this to clear the fields. Cancel Click this to return to the previous screen without saving. 10.8.8 Edit IP Filter Use this screen to enable IP filtering which prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs.
  • Page 237 Chapter 10 Packages Click Applications > eMule > Task > Browse Incomplete Downloads to open the following screen. Figure 125 Applications > eMule > Task > Browse Incomplete Downloads The following table describes the labels in this screen. Table 71 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder...
  • Page 238: Task Info

    Chapter 10 Packages Table 71 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Delete Select a file/folder from the list and click this to open a warning screen. Click Yes to delete the file/folder, or click No to close the screen. Move Select a file/folder from the list and click this to relocate the file/folder to another share.
  • Page 239: Emule Search Screen

    Chapter 10 Packages The following table describes the labels in this screen. Table 72 Applications > eMule > Task: Task Info LABEL DESCRIPTION Status This shows the current status of the task - Waiting or Downloading. Name This shows the file name of the file associated with the task. You can change this file name by entering the new name and clicking Apply.
  • Page 240: Pyload Screen

    Chapter 10 Packages Click Applications > eMule > Search to open the following screen. Figure 127 Applications > eMule > Search The following table describes the labels in this screen. Table 73 Applications > eMule > Search LABEL DESCRIPTION Search Enable eMule Check this and click Apply to enable the eMule application.
  • Page 241: Polkast Setup

    Chapter 10 Packages Click Applications > pyLoad to open the following screen. Figure 128 Applications > pyLoad The following table describes the labels in this screen. Table 74 Applications > pyLoad LABEL DESCRIPTION Enable pyLoad Select this to have the NSA manage your downloads. Clear it to turn the feature off.
  • Page 242 Chapter 10 Packages Note: If Polkast does not appear, click the Retrieve List from Internet icon to update the list. Figure 129 Polkast Installation Step 1 The following confirmation screen appears. Click Apply. The NSA must have a connection to the Internet to download the Polkast package.
  • Page 243 Chapter 10 Packages The installation progress appears in the Polkast row. Figure 131 Polkast Installation Step 3 Media Server User’s Guide...
  • Page 244 Chapter 10 Packages A link appears in the Management Page column after installation finishes. Click this link. Figure 132 Polkast Installation Step 4 Media Server User’s Guide...
  • Page 245: Protect Screens

    Chapter 10 Packages The Polkast login screen appears. Click the link to create a new account or enter your login information for an existing account. Figure 133 Polkast Login Note: For more information on using Polkast, visit www.polkast.com. Get free Polkast mobile apps from the Apple App Store, Amazon AppStore, and Android Market.
  • Page 246: Backup Screens

    Chapter 10 Packages 10.12 Backup Screens Use this screen to create and customize scheduled backup jobs for your files. You can have several backup jobs for specific folders and time periods. Click Protect > Backup to open the following screen. Figure 134 Protect >...
  • Page 247: Backup: Step 1

    Chapter 10 Packages 10.12.1 Backup: Step 1 Use this screen to specify the job information and back up type. Click Add Job in the Protect > Backup screen to open the following: Figure 135 Protect > Backup: Step 1 The following table describes the labels in this screen. Table 76 Protect >...
  • Page 248: Backup: Step 2

    Chapter 10 Packages 10.12.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored. Figure 136 Protect > Backup: Step 2 Media Server User’s Guide...
  • Page 249 Chapter 10 Packages The following table describes the labels in this screen. Table 77 Protect > Backup: Step 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files.
  • Page 250: Backup: Step 3

    Chapter 10 Packages Table 77 Protect > Backup: Step 2 LABEL DESCRIPTION Previous Click this to go back to the previous screen. Next Click this to go to the next screen. 10.12.3 Backup: Step 3 Use this screen to specify compression, encryption and purge policies for the backup job. This step is only available if you are doing an archive backup or a synchronization backup to a remote target.
  • Page 251: Backup: Step 4

    Chapter 10 Packages Table 78 Protect > Backup: Step 3 LABEL DESCRIPTION Purge Policy The NSA maintains the files that have been included in your backups. However to save hard disk space, you can choose to delete files that have been included in previous backups. •...
  • Page 252: Edit Job Screen

    Chapter 10 Packages Table 79 Protect > Backup: Step 4 LABEL DESCRIPTION Start Time This is available if you selected Daily, Weekly or Monthly as your backup frequency. (hh:mm) Select the time in hour:minute format when you want the NSA to perform the backup job.
  • Page 253: Edit Job: Step 1

    Chapter 10 Packages 10.12.6 Edit Job: Step 1 Click Protect > Backup. Select a backup job from the list and click Edit Job to open the following. Figure 139 Protect > Backup > Edit: Step 1 The following table describes the labels in this screen. Table 80 Protect >...
  • Page 254: Edit Job: Step 2

    Chapter 10 Packages Table 80 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Bandwidth For backups to a remote NSA, you can restrict the bandwidth to help prevent the backups from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet.
  • Page 255: Restore Archive Screen

    Chapter 10 Packages Table 81 Protect > Backup > Edit: Step 2 LABEL DESCRIPTION Start Time (hh:mm) This is available if you selected Daily, Weekly or Monthly as your backup frequency. Select the time in hour:minute format when you want the NSA to perform the backup job.
  • Page 256: Restore Archive: Step 2

    Chapter 10 Packages Table 82 Protect > Backup > Restore Archive: Step 1 LABEL DESCRIPTION Job Description This is a short description (up to 100 keyboard characters) for the backup job. Backup Type This is the type of backup implemented for the backup job. Scheduler This field displays the backup’s frequency.
  • Page 257: Restore Archive: Step 3

    Chapter 10 Packages 10.12.11 Restore Archive: Step 3 Use this screen to select the location in the NSA where you want to restore your backup. Figure 143 Protect > Backup > Restore Archive: Step 3 The following table describes the labels in this screen. Table 84 Protect >...
  • Page 258: Restore: Step 1

    Chapter 10 Packages 10.13.1 Restore: Step 1 You can access this screen by clicking Protect > Restore. Figure 144 Protect > Restore: Step 1 The following table describes the labels in this screen. Table 85 Protect > Restore: Step 1 LABEL DESCRIPTION Step 1.
  • Page 259: Restore: Step 2

    Chapter 10 Packages Table 85 Protect > Restore: Step 1 LABEL DESCRIPTION Browse Click this to select where the previous backup that you want to restore is located. • Volume - Select a volume from the list. • Current Location - This is the location of the selected folder. •...
  • Page 260: Restore: Step 3

    Chapter 10 Packages Table 86 Protect > Restore: Step 2 LABEL DESCRIPTION Restored Time Select a previous backup job in the list that you want to restore to your NSA. Previous Click this to go back to the previous screen. Next Click this to go to the next screen.
  • Page 261: Restore: Step 4

    Chapter 10 Packages 10.13.4 Restore: Step 4 Use this screen to select the location in the NSA where you want to restore your backup. Figure 147 Protect > Restore: Step 4 The following table describes the labels in this screen. Table 88 Protect >...
  • Page 262: Attributes

    Chapter 10 Packages 10.14.1 S.M.A.R.T Attributes The following table describes some common S.M.A.R.T. attributes. If a higher or lower raw attribute value is better, it is indicated in the BETTER column. Since S.M.A.R.T. attributes and their definitions vary by manufacturer, refer to the hard drive manufacturer for details about the attributes your hard drive supports.
  • Page 263 Chapter 10 Packages Table 89 S.M.A.R.T. Attributes (continued) ATTRIBUTE BETTER DESCRIPTION NAME Temperature High This indicates the value of 100 - the temperature in degrees Celsius. Difference from Manufacturers can set a minimum threshold that corresponds to a maximum temperature. G-sense error This is the number of mistakes caused by impact loads.
  • Page 264 Chapter 10 Packages Table 89 S.M.A.R.T. Attributes (continued) ATTRIBUTE BETTER DESCRIPTION NAME Disk Shift This is how far the disk has moved relative to the spindle (this kind of shift is usually due to shock). G-Sense Error This is the number of errors that have resulted from external vibration Rate and shock.
  • Page 265: Auto Upload

    HAPTER Auto Upload 11.1 Overview This chapter discusses the features in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family.
  • Page 266: Configuring The Flickr Settings

    Chapter 11 Auto Upload Click Applications > Auto Upload > Flickr/YouTube to open the following screen. Figure 148 Applications > Auto Upload > Flickr/YouTube The following table describes the labels in this screen. Table 90 Applications > Auto Upload > Flickr/YouTube LABEL DESCRIPTION Flickr/YouTube...
  • Page 267 Chapter 11 Auto Upload The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account’s information and click Sign In. Figure 150 Yahoo! Flickr Login Page Media Server User’s Guide...
  • Page 268 Chapter 11 Auto Upload The following page displays asking for your authorization. Click OK, I’LL ALLOW IT to establish a link between the NSA and your Flickr account. Figure 151 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA web configurator.
  • Page 269 Chapter 11 Auto Upload Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen. Figure 153 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) Media Server User’s Guide...
  • Page 270 Chapter 11 Auto Upload The following table describes the labels in this screen. Table 91 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) LABEL DESCRIPTION Flickr Account Configuration Username This field displays the Flickr account authorized for the auto upload feature. Photo Space Usage This shows how much storage space for photos (in size and percentage) you have used and how much space is still available on your Flickr account.
  • Page 271: Configuring The Youtube Settings

    Chapter 11 Auto Upload Table 91 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) (continued) LABEL DESCRIPTION Grace Period N Specify how long the NSA should wait when you add a new file for auto upload. For minutes example, if you set the grace period to 5 minutes, the NSA uploads a new file after it has been in a watched folder for 5 minutes.
  • Page 272 Chapter 11 Auto Upload Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen. Figure 155 Applications > Auto Upload > Flickr/YouTube > Config (YouTube) The following table describes the labels in this screen. Table 92 Applications >...
  • Page 273 Chapter 11 Auto Upload Table 92 Applications > Auto Upload > Config (YouTube) (continued) LABEL DESCRIPTION Switch User Click this to use a different YouTube account for the auto upload feature. Folder Selection Folder Watch List This table displays a list of shares and folders selected for auto upload. Files stored in these locations are uploaded to your YouTube account.
  • Page 274: The Ftp Uploadr Screen

    Chapter 11 Auto Upload Table 92 Applications > Auto Upload > Config (YouTube) (continued) LABEL DESCRIPTION Who can see your Determine who has the right to see files uploaded to your YouTube account. media files on Select Only You if you do not want anyone else to see your files. YouTube? Select Anyone to allow everyone to see your files.
  • Page 275: Adding Or Editing An Ftp Server Entry

    Chapter 11 Auto Upload The following table describes the labels in this screen. Table 93 Applications > Auto Upload > FTP Uploadr LABEL DESCRIPTION Enable FTP Uploadr Use the check box to enable or disable the FTP Uploadr. Click Apply to save your changes.
  • Page 276: The Ftp Uploadr Preferences Screen

    Chapter 11 Auto Upload In the FTP Uploadr screen, click the Add Server or Edit Server button to open the following screen. Figure 157 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server The following table describes the labels in this screen. Table 94 Applications >...
  • Page 277 Chapter 11 Auto Upload In the FTP Uploadr screen, click the Preferences icon to open the following screen. Figure 158 Applications > Auto Upload > FTP Uploadr > Preferences The following table describes the labels in this screen. Table 95 Applications > Auto Upload > FTP Uploadr > Preferences LABEL DESCRIPTION Folder Watch List...
  • Page 278 Chapter 11 Auto Upload Table 95 Applications > Auto Upload > FTP Uploadr > Preferences (continued) LABEL DESCRIPTION Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. •...
  • Page 279: Dropbox

    HAPTER Dropbox 12.1 Overview The Dropbox Web-based file hosting service uses cloud computing to let you use file synchronization to store and share files and folders with others across the Internet. Use your Dropbox account to easily move files to your NSA and have the NSA download *.torrent files. 12.2 Dropbox Screen Use the Dropbox screen to log the NSA into your Dropbox account.
  • Page 280 Chapter 12 Dropbox The following table describes the labels in this screen. Table 96 Applications > Dropbox LABEL DESCRIPTION Status This shows the status of the NSA Dropbox application’s interaction with the Dropbox server. Disable: The NSA Dropbox application is turned off. Ready: The NSA Dropbox application has authenticated with the Dropbox server and is ready to use.
  • Page 281: How To Use Dropbox With The Nsa

    Chapter 12 Dropbox Table 96 Applications > Dropbox (continued) LABEL DESCRIPTION Enable Dropbox Select this to synchronize and back up your Dropbox account. The first time you do this a Dropbox screen prompts you to log into your Dropbox account. Then a NSA pop-up opens.
  • Page 282 Chapter 12 Dropbox admin\Dropbox\FromDropbox folder in the format of “filename(n).extension”. Here is an example of the Drop2NAS folder. Note: Do not delete the NAStoken file as it is needed for your NSA to work with the Dropbox account. Figure 160 Dropbox\Drop2NAS Using the zDownload Folder The NSA copies *.torrent files in the zDownload folder to the NSA’s admin\download\torrents folder and automatically starts downloading them.
  • Page 283: Using Time Machine With The Nsa

    HAPTER Using Time Machine with the NSA 13.1 Overview Time Machine is a backup system provided by Mac OS X. It automatically backs up everything on your Mac, including pictures, music, videos, documents, applications, and settings. This chapter helps you to enable Time Machine in OS X to use your NSA as a backup volume. 13.2 Time Machine Screen Use the Time Machine screen to turn Time Machine support on or off, and designate the share for Time Machine backups.
  • Page 284 Chapter 13 Using Time Machine with the NSA Click Apple > System Preferences. Then go to System and select Time Machine. Turn Time Machine ON. Then click Change Disk. Select share01 as the backup disk. Then click Use for Backup. Media Server User’s Guide...
  • Page 285 Chapter 13 Using Time Machine with the NSA When prompted for the username and password of share01, enter the login information for an existing user account with write access permission on share01 (for information on configuring user accounts and shares see Section 4.9 on page 71).
  • Page 286 Chapter 13 Using Time Machine with the NSA Media Server User’s Guide...
  • Page 287: Users

    HAPTER Users 14.1 Overview This chapter introduces the Users screens of the NSA. Use the Users screens to create and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. •...
  • Page 288 Chapter 14 Users Use this screen to create and manage accounts for users who can store files on the NSA. Figure 163 Sharing > Users The following table describes the labels in this screen. Table 98 Sharing > Users LABEL DESCRIPTION Add User Click this to open a screen where you can configure a new user account.
  • Page 289: User Icons

    Chapter 14 Users Table 98 Sharing > Users (continued) LABEL DESCRIPTION Delete Selected Select an account and click this to open a screen where you can delete the user Users account. User Info Select an account and click this to open a screen displaying the amount of storage space used by the account.
  • Page 290 Chapter 14 Users Click the Add User button in the Users screen to open the following screens. Click the Edit User button in the screen shown previously to edit an existing account. Figure 164 Sharing > Users > Add or Edit a User: General Settings Figure 165 Sharing >...
  • Page 291: Usernames

    Chapter 14 Users Table 100 Users > Add or Edit a User (continued) LABEL DESCRIPTION Password (Confirm) You must type the exact same password that you just typed in the above field. Account Type Select Administrator to give the account full configuration and management access to the NSA.
  • Page 292: Displaying User Info

    Chapter 14 Users • ftp • anonymous-ftp • anonymous • nobody • root • pc-guest • admin • password 14.4 Displaying User Info Use this screen to display a user’s information. In the Users screen, select an account and click User Info to open the following screen. Figure 167 Sharing >...
  • Page 293: Groups

    HAPTER Groups 15.1 Overview This chapter introduces the Groups screens. Use the Groups screens to create and manage groups. You can assign users to groups and grant individual groups access rights to specific shares. 15.2 What You Can Do • Use the main Groups screen (Section 15.3 on page 293) to display and manage a list of groups created on the NSA.
  • Page 294: Adding Or Editing A Group

    Chapter 15 Groups The following table describes the labels in this screen. Table 102 Sharing > Groups LABEL DESCRIPTION Add Group Click this to open a screen where you can configure a new group. Search Click this to display a search field. Type the name of a group and then click Search to look up the group you specified.
  • Page 295: Group Names

    Chapter 15 Groups Click the Add Group button in the Groups screen to open the following screen. Click the Edit Group button in the screen shown previously to edit an existing group. Figure 169 Sharing > Groups > Add or Edit a Group The following table describes the labels in this screen.
  • Page 296 Chapter 15 Groups • Multiple spaces within names are converted to a single space. • Group names are case insensitive. The group name cannot be the same (no matter the letter case) as an existing group. For example, if a group exists with the name 'FAMILY', you cannot create a group named 'family'.
  • Page 297: Shares

    HAPTER Shares 16.1 Overview A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder. You can map a share to a network drive for easy and familiar file transfer for Windows users.
  • Page 298 Chapter 16 Shares The following table describes the labels in this screen. Table 104 Sharing > Shares LABEL DESCRIPTION Add Share Click this to create a new share. Recycle Bin Click this to configure recycle bins. Edit Share Select a share and click this to edit the share. Delete Share Select a share and click this to remove or restrict access to the share.
  • Page 299: Adding Or Editing Share

    Chapter 16 Shares Table 104 Sharing > Shares (continued) LABEL DESCRIPTION Share Path This field displays the share’s file path, for example, volume1/music. Share Owner This is the name of the user account to which this share belongs. Permission Type This field displays the access permission of a share.
  • Page 300: Configuring Advanced Share Access

    Chapter 16 Shares Table 105 Shares > Add Share (or Edit Share) (continued) LABEL DESCRIPTION Publish this share This shows only when you enable the Web Publish (Section 9.8 on page 193). to Web Select this option to let people use a web browser to access this share’s files without logging into the Home screens.
  • Page 301: Public And Anonymous Share Access Rights

    Chapter 16 Shares The following table describes the labels in this screen. Table 106 Sharing > Shares > Add Share (or Edit Share) > Advanced LABEL DESCRIPTION Available Users/Groups This field lists the users/groups to which you can assign access rights. Authority Use this field to assign access rights to users/groups.
  • Page 302: Configuring Recycle Bins

    Chapter 16 Shares 16.4.2 Configuring Recycle Bins In the Sharing > Shares screen, click Recycle Bin to open the following screen. Figure 173 Sharing > Shares > Recycle Bin The following table describes the labels in this screen. Table 107 Sharing > Shares > Recycle Bin LABEL DESCRIPTION Clean Recycle Bin every N...
  • Page 303 Chapter 16 Shares The following table describes the labels in this screen. Table 108 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder Type a folder name and click Apply to make a new folder. The name can be 1 to 239 single- byte (no Chinese characters allowed for example) ASCII characters.
  • Page 304: Moving Or Copying Files

    Chapter 16 Shares Table 108 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Modified Date This field displays a file’s latest modification date. Close Click this to close the screen. 16.5.1 Moving or Copying Files Use this screen to move or copy files to another share. In the Share Browser screen, select a file or folder and click Move or Copy to open the following screen.
  • Page 305: Maintenance Screens

    HAPTER Maintenance Screens 17.1 Overview This chapter discusses the Maintenance screens. The Maintenance screens allow you to manage system configurations. 17.2 What You Can Do • Use the Power screen (Section 17.3 on page 305) to configure power settings for the NSA, including power saving, UPS, power on/off after power failure, power on/off schedule, and Wake on LAN.
  • Page 306 Chapter 17 Maintenance Screens Click Maintenance > Power to display the following screen. Figure 176 Maintenance > Power The following table describes the labels in this screen. Table 110 Maintenance > Power LABEL DESCRIPTION Power Management Turn off hard Enter the number of minutes to wait when the NSA is idle before spinning the hard disks disk(s) down to sleep (hibernation).
  • Page 307 Chapter 17 Maintenance Screens Table 110 Maintenance > Power (continued) LABEL DESCRIPTION Always Select this option to keep the NSA operating as much of the time as possible. The NSA Power On restarts automatically even if it was turned off when the power failed. Always Select this option to keep the NSA from automatically restarting when the power is Power Off...
  • Page 308: Editing The Power Control Schedule Screen

    Chapter 17 Maintenance Screens 17.3.2 Editing the Power Control Schedule Screen Click Maintenance > Power Management > Edit to open this screen. Use this screen to configure power control schedules to have the NSA turn on, turn off, or reboot at specified times. Figure 177 Maintenance >...
  • Page 309: The Log Screen

    Chapter 17 Maintenance Screens Table 111 Maintenance > Power Management > Edit (continued) LABEL DESCRIPTION Execute Time Enter the time, day, and/or day of the month as appropriate for this power control (hh:mm) schedule entry. Leave more than 10 minutes between the execution times of the entries. If the NSA turns off or restarts while a user is transferring files to or from the NSA, the transfer fails.
  • Page 310: Report Config Screen

    Chapter 17 Maintenance Screens Use this screen to display all NSA logs. There are at most 512 entries in the log. Older logs are removed by the system. You cannot download the log file via FTP or CIFS. Figure 178 Maintenance > Log The following table describes the labels in this screen.
  • Page 311: Email Setting

    Chapter 17 Maintenance Screens • Use the Syslog Server Setting screen (Section 17.4.4 on page 312) to enable the syslog server and select the categories to include in the log report. 17.4.2 Email Setting You can enable and configure e-mail alerts from the NSA. In the Report Config screen, click the Email Setting tab to open the following screen.
  • Page 312: Report Setting

    Chapter 17 Maintenance Screens 17.4.3 Report Setting You can select the type of alerts you want to receive through e-mail and schedule when the NSA e- mails the alerts. In the Report Config screen, click the Report Setting tab to open the following screen.
  • Page 313: The Configuration Screen

    Chapter 17 Maintenance Screens The following table describes the labels in this screen. Table 115 Maintenance > Log > Report Config: Syslog Server Setting LABEL DESCRIPTION Enable Syslog Check this to enable syslog server. Server Server Address Enter the syslog server address you want the NSA to use for its log alerts. In the table below, check the type of log alerts you want to receive in your e-mail.
  • Page 314: Ssl Certification

    Chapter 17 Maintenance Screens Table 116 Maintenance > Configuration LABEL DESCRIPTION Restore Click this to load the previously-saved configuration file to the NSA. This replaces your current NSA configuration settings with the settings in the previously-saved configuration file. A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit.
  • Page 315: Modifying Or Creating A Certificate

    Chapter 17 Maintenance Screens The following table describes the labels in this screen. Table 117 Maintenance > SSL LABEL DESCRIPTION Force HTTPs Select the Force HTTPs option to turn on the NSA’s web browser security. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it.
  • Page 316: The Shutdown Screen

    Chapter 17 Maintenance Screens The screen is also the same for the Create a certificate authorized by other CA option. Figure 184 Maintenance > SSL > Create or Edit a Certificate The following table describes the labels in this screen. Table 118 Maintenance >...
  • Page 317: Technical Reference

    Chapter 17 Maintenance Screens Click Maintenance > Shutdown to open the following screen. Figure 185 Maintenance > Shutdown The following table describes the labels in this screen. Table 119 Maintenance > Shutdown LABEL DESCRIPTION Restart Click this to have the device perform a software restart. Shutdown Click this to shut down the system and restart it again later.
  • Page 318: Log Severity Levels

    Chapter 17 Maintenance Screens Table 120 Log Classes (continued) DESCRIPTION CATEGORY Network This log class shows information on network configuration, setting changes and so on. Storage This log class shows information on the NSA’s internal and external storage activities. Backup This log class shows information on all backup-related activities.
  • Page 319 Chapter 17 Maintenance Screens Table 122 Log Messages (continued) CLASS SEVERITY MESSAGE Copy/Sync ERROR [USB Sync] Sync Failed at Folder %s. Button Copy/Sync ERROR Modify COPY/SYNC Button Configuration: %s Button Copy/Sync ERROR Please Change Your Folder Name. Invalid Path: %s Button Copy/Sync INFO...
  • Page 320 Chapter 17 Maintenance Screens Table 122 Log Messages (continued) CLASS SEVERITY MESSAGE Download INFO Download service initialized Service Download INFO Download service pause %s by user Service Download INFO Download service set %s to %s priority by user Service Download INFO Download service set default download location to %s Service...
  • Page 321 Chapter 17 Maintenance Screens Table 122 Log Messages (continued) CLASS SEVERITY MESSAGE Download INFO Download service added %d rules from ipfilter.dat Service Download INFO Download service detected invalid ip range %s in ipfilter.dat Service Download WARNING Download service default location does not exist. Load default Service Download WARNING...
  • Page 322 Chapter 17 Maintenance Screens Table 122 Log Messages (continued) CLASS SEVERITY MESSAGE Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to '%s' Services NOTICE NTP server has set to null Services NOTICE The NTP service is disabled.
  • Page 323 Chapter 17 Maintenance Screens Table 122 Log Messages (continued) CLASS SEVERITY MESSAGE System INFO NTP fails to update from %s System INFO Device is rebooted by administrator! System INFO Device is shutdown by administrator! System NOTICE DNS server is changed. System NOTICE Hostname is cleared.
  • Page 324 Chapter 17 Maintenance Screens Table 122 Log Messages (continued) CLASS SEVERITY MESSAGE Backup/ INFO Start to restore backup job [%s] from [%s]. Restore Backup/ INFO Restore from [%s] successfully. Restore Backup/ ERROR Restore from [%s] failed: %s Restore Backup/ ERROR When restore [%s]: %s Restore Backup/...
  • Page 325: Protecting Your Data

    HAPTER Protecting Your Data 18.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 18.2 Protection Methods There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.
  • Page 326 Chapter 18 Protecting Your Data If you forgot the NSA password, then use the RESET button (see Section 1.1.4 on page 19) to return the NSA to the factory default configuration. Note: Configuration File Backup and Restoration does not affect data (your files and folders), volumes on the NSA.
  • Page 327: Troubleshooting

    HAPTER Troubleshooting 19.1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware, Connections, and LEDs • NAS Starter Utility • NSA Login and Access •...
  • Page 328 Chapter 19 Troubleshooting An HDD LED is off. The HDD LED is off when the NSA cannot detect a hard drive in the drive bay. Replace or install a hard drive. See Installing or replacing a hard disk. An HDD LED is red. Red means that the NSA detected an error on the hard drive (like a bad sector for example).
  • Page 329: Nas Starter Utility

    Chapter 19 Troubleshooting • Use another Ethernet cable. If you’re connecting to a Gigabit Ethernet, make sure you’re using an 8-wire Ethernet cable. • If the problem continues, contact the vendor. Section 20.1 on page 345 for a description of NSA LEDs. The NSA turns off or reboots by itself.
  • Page 330: Nsa Login And Access

    Chapter 19 Troubleshooting The NAS Starter Utility discovered my NSA but the status is always unreachable, even though I can access it. You may need to add the NAS Starter Utility to your software firewall’s allow list or lower your software firewall or anti-virus scanner’s security level.
  • Page 331 Chapter 19 Troubleshooting I cannot get to the NSA login screen. • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility. •...
  • Page 332: Enabling Scripting Of Safe Activex Controls

    Chapter 19 Troubleshooting 19.4.1 Enabling Scripting of Safe ActiveX Controls If pages of the web configurator do not display properly in Internet Explorer, check that scripting of safe ActiveX controls is enabled. In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 188 Internet Options: Security Click the Custom Level...
  • Page 333 Chapter 19 Troubleshooting Click OK to close the window. Figure 189 Security Settings - Script Safe ActiveX Controls I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly. The default username is admin, and the default password is 1234.
  • Page 334: I Cannot Access The Nsa

    Chapter 19 Troubleshooting 19.5 I Cannot Access The NSA I cannot access a share. • Check that the NSA is turned on and connected to the network. Try to ping the NSA or use the NAS Starter Utility to discover it. •...
  • Page 335 Chapter 19 Troubleshooting • The user’s computer may already be connected to another of the NSA’s shares using a different user name and/or password. This can happen without the user realizing it if the user’s computer automatically connects to a share at logon. Right-click any other connected shares and click Disconnect.
  • Page 336: External Usb Drives

    Chapter 19 Troubleshooting 19.7 External USB Drives The COPY LED is red. Copying files from a USB device failed. The USB device may not be compatible with the NSA. Try to save the files onto a computer and then from the computer to the NSA (through the network connection).
  • Page 337: Networking

    Chapter 19 Troubleshooting On your Windows computer, click Start > Run or open a web browser. Enter \\nsa followed by the number of your model (320 for example) or the Server Name you assigned the NSA. This shows you the folders in the NSA. Use drag-and-drop or copy-and-paste to transfer files from your NSA to your local computer’s folder or your storage device.
  • Page 338: Media Server Functions

    Chapter 19 Troubleshooting I cannot use some applications in the Web Configurator. • The firmware installed in your NSA includes the features mentioned in Section 3.5.2 on page This does not include the applications you can install using the Package Management screen. •...
  • Page 339 Chapter 19 Troubleshooting If an iTunes client is connected, the NSA’s iTunes server function scans the published media server folders for files every three minutes. Leave iTunes connected to the NSA for three minutes. Then use the NSA’s eject button (as shown next) to disconnect. Figure 190 iTunes Eject Button Then click the NSA’s link to reconnect.
  • Page 340: Download Service And Broadcatching Functions

    Chapter 19 Troubleshooting If you have files from the iTunes Store that use DRM, you need to use your Apple account ID and password to authorize other computers to play the files. Apple permits you to authorize up to five computers at a time.
  • Page 341: Web Publishing

    Chapter 19 Troubleshooting 19.14 Web Publishing A web-published share cannot be accessed by web browser from the Internet. • Make sure the person trying to access the share is using the correct web address (and port number if the NSA’s web publishing feature is not using port 80). See page 210 for details.
  • Page 342: Auto Upload

    Chapter 19 Troubleshooting • Make sure your ISP allows you to run a server and is not blocking the port number of the NSA’s web publishing feature. 19.15 Auto Upload The NSA does not automatically upload files to Flickr or YouTube. Make sure the NSA is connected to the Internet.
  • Page 343: Backups

    Chapter 19 Troubleshooting • The web location of the package may be undergoing maintenance. Try again at a later time. Upgrade the firmware of the NSA. • If a new firmware is available, do an upgrade and try installing the package(s) again. The eMule Search screen does not work.
  • Page 344 Chapter 19 Troubleshooting Media Server User’s Guide...
  • Page 345: Product Specifications

    HAPTER Product Specifications See also Chapter 1 on page 17 for a general overview of the key features. 20.1 LEDs This table describes the NSA’s LEDs. Table 125 LEDs NAME COLOR STATUS DESCRIPTION POWER Blue The NSA is turned on and receiving power. The NSA is turned off.
  • Page 346: Supported Media Server Content Formats

    Chapter 20 Product Specifications Table 125 LEDs (continued) NAME COLOR STATUS DESCRIPTION COPY/ Green A USB device is connected to the NSA. SYNC Blinking The NSA is copying or synchronizing files to or from the USB device. Copying or synchronizing files to or from the USB device failed. No USB device is connected.
  • Page 347: Appendix A Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 348 Appendix A Legal Information Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications Go to http://www.zyxel.com.
  • Page 349 Appendix A Legal Information • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information. •...
  • Page 350 Appendix A Legal Information Media Server User’s Guide...
  • Page 351: Index

    Index Index media server 176, 178 configuration iTunes server 176, 203, 204 access rights print server Flickr configuration shares 300, 301 name YouTube web publishing 176, 193, 209 activation activation download service example Flickr/YouTube port number archive FTP Uploadr authorization recycle bins 40, 299 Flickr...
  • Page 352 Index S.M.A.R.T. attributes browser plugin, capturing link disk replacement browsing shares displaying user information DLNA 176, 203 165, 168 documentation related Domain Name System, see DNS capturing download links domain user certificate troubleshooting editing troubleshooting share access tutorial download period control verifying download service changing password...
  • Page 353 Index file browser membership 291, 295 configure share names share browser searching File Transfer Protocol over Explicit TLS, see FTPES Guide Quick Start File Transfer Protocol over TLS, see FTPS files downloading uploading FileZilla fingerprint Home firmware, upgrading icons Flickr HTTP port access rights HTTPS...
  • Page 354 Index logs PPPoE 165, 173, 174 activation longitude TCP/IP network connection test notifications download service activation maintenance notifications, download service backup settings logs power management failure resume schedule other documentation reset restoring settings shutdown upgrading firmware master browser P2P download IP filtering media server 189, 190...
  • Page 355 Index backup tutorial secure connections protection, download service server 206, 207 Syslog public key certificate TFTP editing server entry, FTP Uploadr publishing shares server name setup COPY/SYNC button download service Flickr Quick Start Guide FTP Uploadr media server P2P download print server YouTube 271, 272...
  • Page 356 Index disk replacement JBOD server 151, 156, 160, 162 methods zone 28, 149 duplexing Time Machine mirroring 118, 175, 265 parity torrent files 184, 204 striping health naming volumes info-hash RAID 151, 156, 160 trackers degraded Transport Layer Security, see TLS RAID 0 161, 162 troubleshooting...
  • Page 357 Index grace period video category video category, YouTube video playback volumes 151, 160 creation 155, 158 JBOD zPilot 151, 156, 160, 162 names RAID 151, 156, 160 degraded RAID 0 161, 162 RAID 1 161, 163 recovering resynchronization scanning status 153, 154 storage methods duplexing...
  • Page 358 Index Media Server User’s Guide...

This manual is also suitable for:

Nsa325-v2Nsa310Nsa320Nsa325

Table of Contents