ZyXEL Communications NSA 210 User Manual

ZyXEL Communications NSA 210 User Manual

1-bay digital media server
Hide thumbs Also See for NSA 210:
Table of Contents

Advertisement

NSA210
1-Bay Digital Media Server
Default Login Details
Web Address
User Name
Password
Firmware Version 4.10
Edition 1, 10/2010
www.zyxel.com
www.zyxel.com
nsa210
admin
1234
Copyright © 2010
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NSA 210

  • Page 1 NSA210 1-Bay Digital Media Server Default Login Details Web Address nsa210 User Name admin Password 1234 Firmware Version 4.10 Edition 1, 10/2010 www.zyxel.com www.zyxel.com Copyright © 2010 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    This manual is intended for people who want to configure the NSA using the Web Configurator. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http://www.adobe.com.
  • Page 4 • Knowledge Base If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products. • Forum This contains discussions on ZyXEL products. Learn from others who use ZyXEL products and share your experiences as well.
  • Page 5 Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office.
  • Page 6: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 7 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device. Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device.
  • Page 8: Safety Warnings

    Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. •...
  • Page 9: Table Of Contents

    Contents Overview Contents Overview User’s Guide ........................... 21 Getting to Know Your NSA ......................23 NAS Starter Utility ........................29 Web Configurator Basics ......................53 Tutorials ............................. 77 Technical Reference ......................159 Status Screen .......................... 161 System Setting ........................165 Storage ............................
  • Page 10 Contents Overview NSA210 User’s Guide...
  • Page 11: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................6 Safety Warnings........................8 Contents Overview ........................9 Table of Contents........................11 Part I: User’s Guide................21 Chapter 1 Getting to Know Your NSA..................... 23 1.1 Overview ..........................23 1.2 Firmware ..........................
  • Page 12 Table of Contents Chapter 3 Web Configurator Basics ....................... 53 3.1 Overview ..........................53 3.2 Accessing the NSA Web Configurator ................. 53 3.2.1 Access the NSA Via NAS Starter Utility ..............53 3.2.2 Web Browser Access ....................54 3.3 Login ............................ 54 3.4 Home Screens ........................
  • Page 13 Table of Contents 4.8.2 Creating a Share ......................96 4.8.3 Creating a Group ......................97 4.8.4 Accessing a Share From Windows Explorer .............. 98 4.8.5 Accessing a Share Using FTP ................. 100 4.8.6 Accessing a Share Through the Web Configurator ..........102 4.9 Download Service Tutorial ....................
  • Page 14 Table of Contents 6.4 The Server Name Screen ....................166 6.5 The Date/Time Screen ....................... 167 Chapter 7 Storage........................... 171 7.1 Overview ..........................171 7.2 What You Can Do ......................171 7.3 What You Need to Know ....................171 7.4 The Storage Screen ......................173 7.4.1 Creating a SATA Volume ..................
  • Page 15 Table of Contents 9.5.4 The Media Server SqueezeCenter Screen ............205 9.6 The Download Service Screen ..................206 9.6.1 Adding a Download Task ..................209 9.6.2 Configuring General Settings ................... 212 9.6.3 Configuring the BitTorrent Settings ................215 9.6.4 Edit IP Filter ......................216 9.6.5 Displaying the Task Information ................
  • Page 16 Table of Contents 10.5.9 Share Browsing ..................... 264 10.5.10 Task Info ......................265 10.5.11 eMule Search Screen ..................267 10.6 DyDNS Screen ......................268 10.7 NFS Screen ........................269 10.7.1 Add/Edit NFS Share ....................271 10.7.2 NFS Session ......................272 10.8 SMART Screen ......................
  • Page 17 Table of Contents 11.5.2 The FTP Uploadr Preferences Screen ..............319 Chapter 12 Users ............................321 12.1 Overview .......................... 321 12.2 What You Can Do ......................321 12.3 The Users Screen ......................322 12.3.1 User Icons ......................323 12.3.2 Adding or Editing General Account Settings ............324 12.3.3 Usernames ......................
  • Page 18 Table of Contents 15.4.1 Report Config Screen ..................... 349 15.4.2 Email Setting ......................349 15.4.3 Report Setting ....................... 350 15.4.4 Syslog Server Setting .................... 351 15.5 The Configuration Screen ....................352 15.6 SSL Certification ......................353 15.6.1 Modifying or Creating a Certificate ................ 355 15.7 The Firmware Upgrade Screen ..................
  • Page 19 Table of Contents 18.5 I Cannot Access The NSA ....................394 18.6 Users Cannot Access the NSA ..................395 18.7 Storage Volumes ......................397 18.8 External USB Drives ......................398 18.9 Firmware .......................... 398 18.10 File Transfer ........................398 18.11 Networking ........................399 18.12 Some Features’...
  • Page 20 Table of Contents NSA210 User’s Guide...
  • Page 21: User's Guide

    User’s Guide...
  • Page 23: Getting To Know Your Nsa

    H A P T E R Getting to Know Your NSA 1.1 Overview This chapter covers the main features and applications of the NSA. Use the NSA210 to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA. •...
  • Page 24 Chapter 1 Getting to Know Your NSA Figure 1 Example of the NSA in a Home Network Above is the NSA in a home network. Users back up and share data on the NSA. The DMA-2500 plays the NSA’s media files on the TV. A USB hard drive provides extra storage space and files are copied directly from the USB mass storage device to the NSA.
  • Page 25: Firmware

    Chapter 1 Getting to Know Your NSA 1.2 Firmware Before you can start using your NSA, you have to install the firmware on the hard disk. Use the NAS Starter Utility to do this. See Chapter 2 on page 29 for more information on the NAS Starter Utility.
  • Page 26: Leds

    Chapter 1 Getting to Know Your NSA 1.4 LEDs The NSA LEDs (lights) tell you important information. Figure 3 NSA Front Panel This table describes the NSA’s LEDs. Table 1 LEDs COLOR STATUS DESCRIPTION POWER Blue The NSA is turned on and receiving power. The NSA is turned off.
  • Page 27: Copy/Sync Button

    Chapter 1 Getting to Know Your NSA Table 1 LEDs (continued) COLOR STATUS DESCRIPTION Green The hard disk drive is connected properly to the NSA. Blinking The NSA is saving data to the hard disk drive. The hard disk drive has failed and the NSA can no longer detect it.
  • Page 28 Chapter 1 Getting to Know Your NSA • Press the RESET button until you hear two beeps. After the second beep, continue pressing the button for five more seconds, then release it. You will hear three quick beeps after you release the button. This resets the NSA to the factory default configuration.
  • Page 29: Nas Starter Utility

    H A P T E R NAS Starter Utility 2.1 Overview The NAS Starter Utility descriptions are divided into the following sections: • Starting the NAS Starter Utility on page 30 • NAS Discovery Screen on page 31 • Main NAS Starter Utility Screen on page 32 •...
  • Page 30: Starting The Nas Starter Utility

    Chapter 2 NAS Starter Utility The NAS Starter Utility formats the hard disk so that it installs the firmware on one partition and your data on another, as described in the following figure. Figure 5 NSA210 Hard Disk Partition Hard disk Hard disk Hard disk partition...
  • Page 31: Nas Discovery Screen

    Start the NAS Starter Utility (click the icon in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility). The first time you open the NAS Starter Utility the discovery screen appears as follows.
  • Page 32: Main Nas Starter Utility Screen

    Chapter 2 NAS Starter Utility The following table describes the labels in this screen. Table 2 NAS Discovery LABEL DESCRIPTION Refresh Click this to refresh the screen. The NAS Starter Utility does not automatically refresh. Hostname This is the server name you configured for the NSA. If you have more than one NSA in your network, it is recommended that you give each one a unique name for identification purposes.
  • Page 33: Initialization Wizard

    Chapter 2 NAS Starter Utility The following table describes the labels in this screen. NAS Starter Utility Table 3 Main Screen LABEL DESCRIPTION Discovery Click this to use the NSA Discovery screen (Section 2.3 on page 31) to find and select the NSA on your network to which you want to connect. The bar shows the NSA’s in-use and remaining storage capacity.
  • Page 34 Chapter 2 NAS Starter Utility administrator username is ‘admin’ and the default password is ‘1234’ and click Next. Figure 8 Initialization Wizard Welcome Choose Default Configuration (recommended) or manual configuration. Use the manual option if you need to name the NSA to configure specific network settings. Click Next.
  • Page 35: Default Configuration

    Chapter 2 NAS Starter Utility 2.5.1 Default Configuration The NAS Starter Utility checks the Internet connection. Figure 10 Check Network Connection Type a new administrator password (and retype it to confirm). If you do not want to change the administrator password, you can leave the fields blank and just click Next.
  • Page 36 Chapter 2 NAS Starter Utility Specify usernames and passwords for the individuals you want to be able to access the NSA. Figure 12 Create User Accounts Check your settings. If they are OK, click Next. Otherwise click Back. If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual.
  • Page 37 Chapter 2 NAS Starter Utility Wait while the NAS Starter Utility configures the NSA. Figure 14 Setting the NAS After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA’s shares (see Section 2.5.3 on page 44) or click Finish to return to the main NAS Starter Utility screen (see...
  • Page 38: Manual Configuration

    Chapter 2 NAS Starter Utility 2.5.2 Manual Configuration Set up the NSA’s basic network configuration first. Figure 16 Setup Network The following table describes the labels in this screen. Table 4 NAS Starter Utility > Config LABEL DESCRIPTION Get IP Select this if the NSA is automatically assigned an IP address from the automatically ISP or a DHCP server in your network.
  • Page 39 Chapter 2 NAS Starter Utility If your Internet connection requires you to enter a user name and password to connect to the Internet, enter them here and click Next. If you do not need to enter a user name and password to connect to the Internet, click Skip. Figure 17 PPPoE The NAS Starter Utility checks the Internet connection.
  • Page 40 Chapter 2 NAS Starter Utility Type a new administrator password (and retype it to confirm) and click Next. If you do not want to change the administrator password, you can leave the fields blank and just click Next. Figure 19 Change Admin Password Specify a name to uniquely identify the NSA on your network.
  • Page 41 Chapter 2 NAS Starter Utility Select how to configure the hard disks. Figure 21 Create User Accounts With only one hard disk installed, just click Next. If you have two hard disks installed choose one of the following: • RAID 1: Use this to mirror all data on one disk to the other disk to protect against data loss.
  • Page 42 Chapter 2 NAS Starter Utility This screen is available in Windows and lists the shares the NAS Starter Utility creates on the NSA by default. Select the ones you want to use as network drives in Windows Explorer. Figure 22 Connect Network Drives Specify usernames and passwords for the individuals you want to be able to access the NSA and click Next.
  • Page 43 Chapter 2 NAS Starter Utility If the settings are OK, click Next. Otherwise click Back. If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual. Figure 24 Confirm Settings 10 Wait while the NAS Starter Utility configures the NSA.
  • Page 44: Directory Of The Nas

    Chapter 2 NAS Starter Utility click Finish to return to the main NAS Starter Utility screen (see Section 2.4 on page 32). Figure 26 Setting the NAS 2.5.3 Directory of the NAS Clear the Guest option and enter the administrator user name and password and click Login to be able to view the NSA’s shares to which you have access.
  • Page 45: Import Files Or Folders With Zpilot

    Chapter 2 NAS Starter Utility The utility opens the NSA’s directory in Windows Explorer. Figure 28 Directory 2.6 Import Files or Folders with zPilot In the main NAS Starter Utility screen click Import files or folders with zPilot to be able to drag and drop files from your computer to the NSA. Enter the administrator user name and password and click Login.
  • Page 46: Add A Network Drive To My Computer

    Chapter 2 NAS Starter Utility you are prompted to choose the target destination. The zPilot icon shows the transfer rate. Figure 31 zPilot Showing Transfer Rate Double-click the zPilot icon to display the NAS Starter Utility screen with status details about the file transfers. Click the “x” button next to a file entry to stop transferring the file.
  • Page 47: Manage The Device

    Chapter 2 NAS Starter Utility permissions. For example, if share1 is private to user1, then only user1 is allowed to map share1. The table displays the NSA shares that are already mapped to drive letters on your computer. After you click OK you can see the new drive in Windows Explorer (My Computer) where you can access and use it like your computer’s other drives.
  • Page 48 Chapter 2 NAS Starter Utility Click Configure network setting in the main utility screen to display the following screen. Figure 36 NAS Starter Utility > Configure network setting The following table describes the labels in this screen. Table 5 NAS Starter Utility > Config LABEL DESCRIPTION NAS Name...
  • Page 49: Nas Starter Utility Icon Menu (Windows)

    Chapter 2 NAS Starter Utility If your Internet connection requires you to enter a user name and password to connect to the Internet, select Enable PPPoE Connection and enter your user name and password. Figure 37 PPPoE 2.10 NAS Starter Utility Icon Menu (Windows) To open the NSU Starter Utility icon’s menu on a Windows computer, right-click the NSU system tray icon.
  • Page 50: Nas Starter Utility Icon Menu (Mac)

    Chapter 2 NAS Starter Utility • Enable zPilot when system starts up has your computer automatically start the zPilot file transfer tool at startup. This is available when the NAS Starter Utility can connect to the NSA. • zPilot stays on top keeps the zPilot icon on top of any other open screens so it is easy to locate.
  • Page 51 Chapter 2 NAS Starter Utility NSA210 User’s Guide...
  • Page 52 Chapter 2 NAS Starter Utility NSA210 User’s Guide...
  • Page 53: Web Configurator Basics

    H A P T E R Web Configurator Basics 3.1 Overview This chapter describes how to access the NSA Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy NSA setup and management using an Internet browser. Use Internet Explorer 6.0, Mozilla Firefox 2.00, or Safari 4.04 or later versions of browsers.
  • Page 54: Web Browser Access

    Chapter 3 Web Configurator Basics how to install and run the NAS Starter Utility. See Chapter 2 on page 29 for more information on the NAS Starter Utility. Figure 40 NAS Starter Utility Main Screen 3.2.2 Web Browser Access Configure the server name of your NSA using the Network Configuration screen (Section 2.9 on page 47) of the NAS Starter Utility.
  • Page 55 Chapter 3 Web Configurator Basics Then click Login. See Chapter 12 on page 321 for how to create other user accounts. Figure 42 NSA Login Screen If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next.
  • Page 56: Home Screens

    Chapter 3 Web Configurator Basics 3.4 Home Screens All users (including the administrator) first see the Home screen after logging in. Figure 44 Home Note: If you did not select the option to stay logged in for two weeks when you logged in, the Web Configurator management session automatically times out if it is left idle for 15 minutes.
  • Page 57 Chapter 3 Web Configurator Basics Table 6 Main Home Screen Icons (continued) ICON DESCRIPTION Administrators can use Application Zone to install, access, and manage the NSA’s applications. Use System to edit general system settings or log into the administrator advanced configuration screens. Note: For Windows computers your browser may need VLC and Windows Media Player installed to play music and video files.
  • Page 58 Chapter 3 Web Configurator Basics Here are some Home screen descriptions. A music screen is shown here as an example. Other screens work in a similar way. Figure 45 Music Screen This table describes common labels in the Home media screens. Not every item displays in every screen.
  • Page 59: Now Playing (Music)

    Chapter 3 Web Configurator Basics Table 8 Home Media Screens LABEL DESCRIPTION Select the sorting criteria: Artist - Sort music by artist. All - All of the menu’s files display here. Genre - Sort music by category. Folder - List the folders containing music files. Album - List the identified music albums.
  • Page 60: Video Playback

    Chapter 3 Web Configurator Basics 3.4.2 Video Playback While playing a video through the Web Configurator Home screens, besides the usual reverse, play, pause, stop, full screen, and volume options, Windows computers also display an option to switch between VLC Player and Windows Media Player (WMP).
  • Page 61: Exif And Google Maps (Photos)

    Chapter 3 Web Configurator Basics 3.4.3 Exif and Google Maps (Photos) Click a photo’s EXIF button to display or hide the photo’s Exchangeable image file format (Exif) data. Figure 48 Exif Information If a photo’s Exif data includes GPS location data, click the latitude or longitude link to display the location in Google Maps.
  • Page 62: Slideshow And Cooliris (Photos)

    Chapter 3 Web Configurator Basics 3.4.4 Slideshow and CoolIris (Photos) In a Photo menu click the SlideShow button to display the menu’s files as a slideshow. Move your cursor over the slideshow’s screen to display full screen, previous, pause, and next buttons for controlling the slideshow. Figure 50 Slideshow When the CoolIris plugin is installed in your browser, click the Launch CoolIris button to display your photos as a 3-D wall for quick browsing.
  • Page 63: File Browser

    Chapter 3 Web Configurator Basics 3.4.5.2 My Favorite Use Favorite > My Favorite to create, edit, and play playlists. These playlists are specific to the NSA and cannot be used in external music players. Figure 51 Favorite > My Favorite This table describes labels in this menu.
  • Page 64 Chapter 3 Web Configurator Basics can map a share to a network drive for easy and familiar file transfer for Windows users. • A folder icon with a hand indicates a share. • The administrator owns and manages the public shares. •...
  • Page 65 Chapter 3 Web Configurator Basics Table 10 File Browser (continued) LABEL DESCRIPTION Last Modified This column displays the last time the file or folder was changed (in year-month-day hour:minute:second format). Create New Folder Click this to open the following screen where you can create a new folder within the share.
  • Page 66 Chapter 3 Web Configurator Basics 3.4.6.1 Configure Share Screen In the File Browser screen, select a share and click Configure Share to open the following screen where you can see and configure share management details. Figure 53 File Browser > Configure Share The following table describes the labels in the this screen.
  • Page 67: Share And Folder Names

    Chapter 3 Web Configurator Basics Table 11 File Browser > Configure Share (continued) LABEL DESCRIPTION Share Access Select who can access the files in the share and how much access they are to be given. If you publish the share to the media server or the web, all users will have at least read-only access to the share, regardless of what you configure here.
  • Page 68: Application Zone

    Chapter 3 Web Configurator Basics • Unicode is supported for share names, although your FTP client must support UTF-8. Full support should be available in all Windows versions after Windows 2000. 3.4.8 Application Zone Administrators can click Application Zone to go to a screen where you can enable or disable various applications for file sharing and downloading.
  • Page 69: System Settings

    Chapter 3 Web Configurator Basics Table 12 Application Zone (continued) LABEL DESCRIPTION Disable Select an enabled application and click this to turn off the application. Select the Flickr or Youtube Uploadr entry and click this to cancel all uploading. Some applications are always enabled and cannot be disabled.
  • Page 70 Chapter 3 Web Configurator Basics The following table describes the labels in this screen. Table 13 System > Settings LABEL DESCRIPTION Player For Windows computers your browser may need VLC and Windows Media Player installed to play music and video files. For Mac your browser may need VLC and QuickTime.
  • Page 71: Administration Screens

    Chapter 3 Web Configurator Basics 3.5 Administration Screens The System > Administration link displays when you log in as the administrator. Click System > Administration in the Home screen to open the advanced administration screens. The Status screen is the first advanced administration screen that displays. Figure 56 Status 3.5.1 Global Administration Icons The icons and language label at the top-right of the screen (...
  • Page 72: Navigation Panel

    Chapter 3 Web Configurator Basics 3.5.2 Navigation Panel The navigation panel on the left of the Web Configurator screen ( ) contains screen links. Click a link to display sub-links. There are no sub-links for the Status screen. Certain screens also contain hyper links that allow you to jump to another screen.
  • Page 73 Chapter 3 Web Configurator Basics Table 15 Screens Summary (continued) LINK SCREEN FUNCTION Applications FTP Server Enable FTP file transfer to/from the NSA, set the number of FTP connections allowed, an FTP idle timeout, and the character set. Media Server Enable or disable the sharing of media files and select which shares to share.
  • Page 74: Main Window

    Chapter 3 Web Configurator Basics 3.5.3 Main Window The main window shows the screen you select in the navigation panel. It is discussed in the rest of this document. The Status screen is the first administration screen to display. See Chapter 5 on page 161 for more information about the Status screen.
  • Page 75: Session Example (Windows)

    Chapter 3 Web Configurator Basics Table 16 Common Configuration Screen Icons (continued) ICON DESCRIPTION Down This represents a down volume. Scan Disk Click this to scan a hard disk for file system errors. Eject Click this before you remove an external hard drive so that you do not lose data that is being transferred to or from that hard drive.
  • Page 76 Chapter 3 Web Configurator Basics NSA210 User’s Guide...
  • Page 77: Tutorials

    H A P T E R Tutorials 4.1 Overview This chapter provides tutorials that show how to use the NSA. • Windows 7 Network, see page 77 • Windows 7 Network Map, see page 81 • Playing Media Files in Windows 7, see page 83 •...
  • Page 78 Chapter 4 Tutorials Click Start > Control Panel. Set View by to Category and click Network and Internet. Click View network computers and devices. NSA210 User’s Guide...
  • Page 79: If The Nsa Icon Does Not Display

    Chapter 4 Tutorials The NSA icon displays twice because the NSA is both a media server and a storage device. Double-click either NSA icon to open the Web Configurator login screen. 4.2.1 If the NSA Icon Does Not Display The network containing the NSA must be set as a home or work network in order for the NSA icons to display.
  • Page 80: Nsa Icon Right-Click Options

    Chapter 4 Tutorials Use the Set Network Location screen to set the network’s location to home or work. 4.2.2 NSA Icon Right-click Options Right-click the NSA’s icon to see these options: • Install/Uninstall: Click Install to add the NSA as a device in your computer. After you install the NSA you can see it in the computer’s list of devices (see Section 4.5 on page 83.
  • Page 81: Windows 7 Network Map

    Chapter 4 Tutorials • Properties opens a window of NSA details and troubleshooting information. • Manufacturer identifies the company that produced the NSA. • Model identifies the NSA model. • identifies the NSA model number. Model number • Device webpage shows the IP address for accessing the Web Configurator. •...
  • Page 82 Chapter 4 Tutorials Click Start > Control Panel > View network status and tasks (or Network and Sharing Center if you view the Control Panel by icons). Click See full map (1 in the figure). The network containing the NSA must be set as a home or work network in order to use the full map feature.
  • Page 83: Playing Media Files In Windows 7

    Chapter 4 Tutorials Double-click the NSA’s icon to open the Web Configurator login screen. See Section 4.2.2 on page 80 for the NSA icon’s right-click options. 4.4 Playing Media Files in Windows 7 In Windows 7, the NSA automatically displays as a library in Windows Media Player.
  • Page 84 Chapter 4 Tutorials icon to open a properties window (see page 81). Right-click the icon to display these options: • Create shortcut has Windows make a desktop shortcut to this screen. • Troubleshoot opens Windows’ device troubleshooting wizard. • Remove device removes the NSA from the Windows 7 Devices and Printers folder.
  • Page 85: Windows 7 Desktop Shortcut

    Chapter 4 Tutorials 4.5.1 Windows 7 Desktop Shortcut This is the NSA’s desktop shortcut. Double-click it to open a properties window (see page 81). Right-click it to display the options shown here. About the right-click options: • Open file location takes you to the Windows 7 Devices and Printers folder. •...
  • Page 86: Creating A Volume

    Chapter 4 Tutorials 4.6 Creating a Volume This section shows you how to create a volume on your NSA. Creating a volume deletes all existing data in the SATA or eSATA hard disk. Make sure you have a backup of your existing data before following the steps in this section.
  • Page 87: Migrate Button

    Chapter 4 Tutorials 4.6.2 Migrate Button Do the following steps to create a RAID 1 volume. Once you attach the eSATA hard disk to the NSA, the Storage > Volume screen shows the Migrate button. Click the button and you can see the following progress bar. Wait for up to Migrate 10 minutes for the RAID 1 volume to be created.
  • Page 88 Chapter 4 Tutorials This deletes all existing data in the eSATA hard disk. Make sure you have a backup of any existing data in the hard disk. The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the RAID 1 volume to be created.
  • Page 89: Creating A Pc Compatible Volume

    Chapter 4 Tutorials 4.6.4 Creating a PC Compatible Volume You can use your eSATA hard disk as a separate storage volume. The following section shows you how to create a PC Compatible Volume. Use this storage method if you have an eSATA hard disk that will be connected to a Windows computer when it is not connected to the NSA.
  • Page 90 Chapter 4 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the volume to be created. The Storage > Volume screen displays with your PC Compatible Volume. NSA210 User’s Guide...
  • Page 91 Chapter 4 Tutorials 4.6.4.1 Checking Your PC Compatible Volume The files in the eSATA hard disk that you configured as a PC Compatible Volume should be accessible when you connect the eSATA hard disk to your computer. You can configure the features of your NSA to save files to your eSATA hard disk. For example, you can refer to Section 4.10 on page 119 to use the...
  • Page 92: Deleting A Volume

    Chapter 4 Tutorials Disconnect the eSATA hard disk from the NSA. Connect the eSATA hard disk to your computer. On some systems, you can see the following notification. The computer assigns a letter to the eSATA hard disk (drive F in this example) that is accessible from the My Computer screen.
  • Page 93: File Sharing Tutorials

    Chapter 4 Tutorials A confirmation window appears as follows. Click Yes. This deletes all existing data in the volume. Make sure you have a backup of any existing data in the hard disk. 4.8 File Sharing Tutorials The following sections cover using the NSA for file sharing. This chapter assumes you have already followed the Quick Start Guide instructions to perform initial setup and configuration (so you have a working volume).
  • Page 94 Chapter 4 Tutorials Log into the NSA Web Configurator (see Section 3.3 on page 54) and click System > Administration to go to the configuration screens. Click Sharing > Users to open the Users screen. Then click Add User. Users NSA210 User’s Guide...
  • Page 95 Chapter 4 Tutorials Configure the screen as follows and write down the username and password to give to Jimmy. If the username and password are the same as Jimmy’s Windows login, Jimmy will not need to enter a username and password when he logs into his share from his computer.
  • Page 96: Creating A Share

    Chapter 4 Tutorials 4.8.2 Creating a Share Suppose Bob has already created separate accounts for his sons Jimmy and Kevin. Now Bob wants to create a share for each son. He also wants to make sure that each son can only access his own share (to keep them from deleting each other’s files).
  • Page 97: Creating A Group

    Chapter 4 Tutorials Configure the screen as follows to give Jimmy full access right to the share. Then click Apply to create the share. Shares > Add Share > Share Access > Advanced Example Now that Bob has created Jimmy’s share, he can go through the steps again to create another share for Kevin.
  • Page 98: Accessing A Share From Windows Explorer

    Chapter 4 Tutorials Specify a name for the group. Select the user(s) you want to add to the group from the Available User(s) list and click Add Selected User(s). Configure the screen as follows. Then click Apply to create the group. Groups >...
  • Page 99 Chapter 4 Tutorials Select the network drive that you want to map the NSA to from the Drive list box. This example uses I. Then browse to and select the share on the NSA. Click Finish. Map Network Drive Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login.
  • Page 100: Accessing A Share Using Ftp

    Chapter 4 Tutorials After the mapping is done, you can then simply copy and paste or drag and drop files from/to your local computer’s drives to or from this network folder. Just like the NSA’s share was another folder on your computer. Example Share Mapped (Folders View) Now that Bob has mapped Jimmy’s share to Jimmy’s computer, he can go through the steps again to map Kevin’s share to Kevin’s computer.
  • Page 101 Chapter 4 Tutorials Enter your password and click Login. FTP Example: Enter the Password Now you can access files and copy files from/to your local computer’s drives to or from this network folder. FTP Example: Logged In NSA210 User’s Guide...
  • Page 102: Accessing A Share Through The Web Configurator

    Chapter 4 Tutorials 4.8.6 Accessing a Share Through the Web Configurator You can browse and access files through the Web Configurator. Log into the NSA Web Configurator (see Section 3.3 on page 54) using the appropriate user name and password (this example uses Jimmy’s) and click File Browser.
  • Page 103: Download Service Tutorial

    4.9.1 Copying/Pasting a Download Link Open your Internet browser (this example uses Internet Explorer). Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a datasheet for ZyXEL’s GS-2024 (an Ethernet switch).
  • Page 104 Chapter 4 Tutorials Right-click the download link and select Copy Shortcut in Internet Explorer (or Copy Link Location in Firefox). Copy Shortcut Log into the NSA Web Configurator (see Section 3.3 on page 54) using the administrator account and click Application Zone and the Application Zone > Download Service link.
  • Page 105 Chapter 4 Tutorials Right-click the URL field and select Paste. Download Service Tutorial: Paste Link The URL displays in the URL field. Click Apply. Download Service Tutorial: Apply Pasted Link After a few moments, the download task appears in the Download Service screen’s Active tab.
  • Page 106: Installing The Link Capture Browser Plugin

    Chapter 4 Tutorials 4.9.2 Installing the Link Capture Browser Plugin In addition to copying and pasting a download link to the Download Service screen, you can also install a link capture browser plugin in your web browser. Use the plugin to easily add a download link to the NSA’s download service. See Section 9.11.3 on page 234 for more on the link capture browser plugin.
  • Page 107 Link Capture Browser Plugin: IE Installation Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting.
  • Page 108 Chapter 4 Tutorials Enter the NSA’s web address (nsa210 by default) and click Apply. A warning message displays asking for confirmation. Click OK to apply the setting. Link Capture Browser Plugin: Setting NSA’s Web Address in IE Firefox Open Firefox. Open the folder containing the link capture browser plugin.
  • Page 109 Chapter 4 Tutorials The following screen displays. Click Install Now. Link Capture Browser Plugin: Firefox Installation You need to restart Firefox after the installation. Link Capture Browser Plugin: Restart Firefox NSA210 User’s Guide...
  • Page 110 Chapter 4 Tutorials When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’s web address. Link Capture Browser Plugin: Firefox Options Enter the NSA’s web address (nsa210 by default) and click OK. Link Capture Browser Plugin: Firefox Settings NSA210 User’s Guide...
  • Page 111: Using The Link Capture Browser Plugin

    NSA’s download service using the link capture browser plugin. Open your Internet browser (this example uses Firefox). Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s P-660W-T1 (an ADSL router).
  • Page 112 Chapter 4 Tutorials The login screen shows up. Enter your NSA’s login information and click Login to send the link to the download service. A confirmation message displays. Link Capture Confirmation Log into the NSA Web Configurator (see Section 3.3 on page 54) using the administrator account and click Application Zone and the Application Zone >...
  • Page 113: Configuring The Download Service Preferences

    Chapter 4 Tutorials The download task appears in the Download Service screen’s Active or Queue tab. It may appear in the Completed tab if the NSA already finished downloading the file or it may appear in the Error tab if the NSA failed to download the file. By default the NSA stores all downloads in the admin share’s download folder.
  • Page 114 Chapter 4 Tutorials Note: If power failure occurs during the active download period, the NSA will verify whether the downloaded files were damaged. If a file is corrupted, the NSA will download the file again. If the file is intact but not completely downloaded, the NSA will resume the download task after it restarts.
  • Page 115: Using Download Service Notification

    Chapter 4 Tutorials • Click Edit IP Filter. Use an online IP filter table from http:// www.bluetack.co.uk/config/level1.gz for example to protect BitTorrent downloads. Enter the URL in the Update IP Filter from the Internet Every Week field. 4.9.5 Using Download Service Notification Use an RSS feed reader on your computer to keep track of files the NSA has downloaded.
  • Page 116 Chapter 4 Tutorials Internet Explorer 7 Example After you activate download service notification, click the RSS feed icon. Download Service Notification: RSS Feed Icon The following screen displays. Select Subscribe to this feed. Subscribe to Download Service Notifications The following screen displays. Click Subscribe. Add the RSS Feed NSA210 User’s Guide...
  • Page 117 Chapter 4 Tutorials Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Download Service Notification Firefox Example After you activate download service notification, click the RSS feed icon. Download Service Notification: RSS Feed Icon The following screen displays.
  • Page 118 Chapter 4 Tutorials The following screen displays. Select Bookmarks Menu and click Add. Add the RSS Feed From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list. Download Service Notification NSA210 User’s Guide...
  • Page 119: Broadcatching Tutorial

    Chapter 4 Tutorials 4.10 Broadcatching Tutorial Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV Internet television channel. See Section 9.8 on page 221 for more on the broadcatching service.
  • Page 120 Chapter 4 Tutorials Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer). Copy Link Location Log into the NSA Web Configurator (see Section 3.3 on page 54) using the administrator account and click Administration > Applications > Broadcatching.
  • Page 121 Chapter 4 Tutorials Right-click the URL field and select Paste. Broadcatching Tutorial: Paste Link The URL displays in the URL field. Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later.
  • Page 122: Printer Server Tutorial

    4.11 Printer Server Tutorial Do the following to have the NSA let computers on your network share a printer. See www.zyxel.com for a list of compatible printers. Make sure the NSA is on and the SYS light is on steady (not blinking).
  • Page 123 Chapter 4 Tutorials On your computer, open your CIFS file sharing program (Windows Explorer for example) and browse to the NSA. Double-click the printer’s icon. Printer Connected to NSA: Windows Explorer If you get a warning screen, click the option that lets you continue (Yes in this example).
  • Page 124: Copy And Flickr Auto Upload Tutorial

    Chapter 4 Tutorials After the driver installation finishes, the computer is ready to use the printer. Select the printer in an application to use it to print. Browse to the NSA using a CIFS program (like Windows Explorer) and double-click the printer’s icon to open the printer’s queue of print jobs.
  • Page 125: Ftp Uploadr Tutorial

    Chapter 4 Tutorials Press and release the COPY/SYNC button on the NSA’s front panel to start copying files. The copied files can be found in a new folder in the photo share. The name of this folder is the date (yyyy-mm-dd) and time (hh:mm:ss) when the folder is created. Copy Tutorial: Copied Files The NSA also automatically uploads the copied files to Flickr.
  • Page 126 Chapter 4 Tutorials at home, so Susan has to set her NSA as an FTP server for Amy to automatically send files using FTP Uploadr. FTP Uploadr Tutorial Susan’s NSA Amy’s NSA To set the NSA as an FTP server, click Applications > FTP to open the FTP screen.
  • Page 127 Chapter 4 Tutorials This is how Amy would set up the NSA’s FTP Uploadr. Click Applications > Auto Upload > FTP Uploadr to open the FTP Uploadr screen. Select Enable FTP Uploadr and click Apply to turn on FTP Uploadr. FTP Uploadr Tutorial: Enable FTP Uploadr Click Add Server.
  • Page 128 Chapter 4 Tutorials In the FTP Uploadr screen, click Preferences to configure the auto upload settings. FTP Uploadr Tutorial: Preferences Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List.
  • Page 129 Chapter 4 Tutorials Amy also set the Bandwidth Limit to 20KB/s so that the upload doesn’t slow down her Internet connection. FTP Uploadr Tutorial: Bandwidth Limit Now Amy has set up FTP Uploadr to send files to Susan’s NSA. Every time Amy adds new files or renames files in the video share, these new or modified files will be uploaded automatically to the Amy share on Susan’s NSA.
  • Page 130: Web Configurator's Security Sessions

    Chapter 4 Tutorials 4.14 Web Configurator’s Security Sessions These tutorials show you how to configure security for the NSA’s Web Configurator sessions. You will customize the NSA’s self-signed SSL certificate and distribute it to your users. 4.14.1 Customizing the NSA’s Certificate Click Maintenance >...
  • Page 131 Chapter 4 Tutorials Next, let’s modify the certificate by changing the Common Name to this NSA’s host name of “nsa210”, the Organization to “Test” and the Key Length to 2048. Maintenance > SSL > Edit a Self-Signed Certificate The NSA restarts its network services and returns you to the login screen. Maintenance >...
  • Page 132: Downloading And Installing Customized Certificate

    Chapter 4 Tutorials 4.14.2 Downloading and Installing Customized Certificate Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. Maintenance > SSL Save the file to your computer. Downloading the NSA’s Certificate NSA210 User’s Guide...
  • Page 133 Chapter 4 Tutorials Find the certificate file on your computer and double-click it. Downloading the NSA’s Certificate Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix D on page 463 for other examples.
  • Page 134 Chapter 4 Tutorials In the Certificate Import Wizard, click Next. Certificate Import Wizard: Welcome Leave Automatically select certificate store based on the type of certificate selected and click Next. Certificate Import Wizard: Certificate Store NSA210 User’s Guide...
  • Page 135 Chapter 4 Tutorials In the Completing the Certificate Import Wizard screen, click Finish. Certificate Import Wizard: Finish If you are presented with another Security Warning, click Yes. Security Warning Finally, click OK when presented with the successful certificate installation message. Certificate Import Wizard: Successful NSA210 User’s Guide...
  • Page 136: Turn On The Nsa's Web Security

    Chapter 4 Tutorials 4.14.3 Turn on the NSA’s Web Security Now that you have customized the NSA’s certificate and installed it in your computer, you can turn on security for your Web Configurator sessions. This example uses Firefox 3.0. See Appendix D on page 463 for more information on browsers and certificates.
  • Page 137 Chapter 4 Tutorials A warning screen pops up if applying your change may disconnect some users. Click Apply to continue. Maintenance > SSL > Force HTTPS Warning The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate.
  • Page 138 Chapter 4 Tutorials Click Add Exception. Firefox: Secure Connection Failed Click Get Certificate. Firefox: Add Security Exception NSA210 User’s Guide...
  • Page 139 Chapter 4 Tutorials Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View. Firefox: Add Security Exception NSA210 User’s Guide...
  • Page 140 Chapter 4 Tutorials The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close. Firefox: Add Security Exception NSA210 User’s Guide...
  • Page 141 Chapter 4 Tutorials If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. Firefox: Add Security Exception The login screen displays. HTTPS Login Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s certificate so they can check it before adding a security exception (as in steps on pages...
  • Page 142: Using Ftpes To Connect To The Nsa

    Chapter 4 Tutorials 4.15 Using FTPES to Connect to the NSA This section covers how to use FTP over Explicit TLS/SSL with the NSA for secure FTP transfers. Before you go through this section, read Section 4.14 on page 130 to configure HTTPS.
  • Page 143: Using A Mac To Access The Nsa

    Chapter 4 Tutorials A security warning screen displays. The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). If they match, click OK.
  • Page 144: Finder

    Chapter 4 Tutorials 4.16.1 Finder Open a new Finder window. Select All under the SHARED sidebar. Look for the NSA from the Network list. NSA210 User’s Guide...
  • Page 145: Go Menu

    Chapter 4 Tutorials Expand the NSA to display the shares you may access. 4.16.2 Go Menu In the Finder, click Go > Connect to Server. NSA210 User’s Guide...
  • Page 146: How To Use Backupplanner

    Chapter 4 Tutorials When the Connect to Server dialog box opens, enter smb:// and the NSA’s IP address in the Server Address field. You may also click Browse to have the Mac search for the NSA. Click Connect. Once you establish the connection, you can access the NSA from the Finder or directly from the desktop.
  • Page 147: Creating An Archive Backup

    Chapter 4 Tutorials 4.17.1 Creating an Archive Backup To backup the NSA every week to a remote NSA: Click Protect > Backup > Add Job. Figure 58 Protect > Backup Identify the backup job and select Archive. New files are often added to the shares that you need to back up and existing files are not frequently changed so select Incremental.
  • Page 148 Chapter 4 Tutorials Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection. Figure 60 Protect >...
  • Page 149 Chapter 4 Tutorials In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the target NSA so you can leave the encryption off, too. Have the NSA keep 3 backups. Figure 61 Protect >...
  • Page 150: Creating A Synchronization Backup

    Chapter 4 Tutorials 4.17.2 Creating a Synchronization Backup To create a synchronization backup: Click Protect > Backup > Add Job. Figure 62 Protect > Backup Name the backup job and select Synchronization. You want only your current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder.
  • Page 151 Chapter 4 Tutorials Select the folder that needs to be mirrored (your Private folder in this example) and Remote. • Enter the other NSA’s address and administrator password. • Click Show target content to display the remote NSA’s contents. • Select the destination on the remote NSA (Backups in this example). •...
  • Page 152 Chapter 4 Tutorials • Turn on the encryption to protect these sensitive files during the transfer. The final files stored on the remote NSA will be unencrypted (usable). • Restrict the bandwidth usage to 256 KB/s to stop the archives from using all of your network connection’s available bandwidth.
  • Page 153: Restoring Archived Files By Backup Job

    Chapter 4 Tutorials 4.17.3 Restoring Archived Files by Backup Job If you have backup jobs for which the NSA has already performed backups, you can restore the files based on the backup job. Do the following: Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 68 Protect >...
  • Page 154 Chapter 4 Tutorials Select the share where you have stored your the backup you want to restore and click Next. Figure 70 Protect > Backup > Restore Archive: Step 2 Select the original location and click Done. Figure 71 Protect > Backup > Restore Archive: Step 3 NSA210 User’s Guide...
  • Page 155: Restoring By Backup Files

    Chapter 4 Tutorials The NSA restores the files into the share. When it finishes you can access the files. Figure 72 Protect > Backup > Restore Archive: Progress 4.17.4 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore archived files by the backup job.
  • Page 156 Chapter 4 Tutorials Select the backup job and backup time and click Next. Figure 74 Protect > Restore: Step 2 Select everything in the share except the recycle folder. Click Next. Figure 75 Protect > Restore: Step 3 NSA210 User’s Guide...
  • Page 157 Chapter 4 Tutorials Browse to the folder where you want to put the files. Click Done. Figure 76 Protect > Restore: Step 4 The NSA restores the files and you can use them again. NSA210 User’s Guide...
  • Page 158 Chapter 4 Tutorials NSA210 User’s Guide...
  • Page 159: Technical Reference

    Technical Reference...
  • Page 161: Status Screen

    H A P T E R Status Screen 5.1 Overview This chapter describes the Status screen, which is the first advanced administration screen that displays. 5.2 The Status Screen Click Administration in the Home screens (Section 3.5 on page 71) to open the Web Configurator.
  • Page 162 Chapter 5 Status Screen Figure 77 Status The following table describes the labels in this screen. Table 18 Status LABEL DESCRIPTION System Information Server Name This displays the name which helps you find the NSA on the network. Click the Edit icon to go to the screen where you can configure this.
  • Page 163 Chapter 5 Status Screen Table 18 Status (continued) LABEL DESCRIPTION FTP Server Status This shows whether the FTP server function is enabled or disabled. It must be enabled to use FTP file transfer to/from the NSA. Click the edit icon to go to the screen where you can configure this.
  • Page 164 Chapter 5 Status Screen Table 18 Status (continued) LABEL DESCRIPTION Name This field shows the name for the volume. Configuration This field (also known as Type) shows what type of data storage system (a RAID type or JBOD) an internal volume is using. File System This field shows what file system an external (USB) volume is using.
  • Page 165: System Setting

    H A P T E R System Setting 6.1 Overview This chapter gives an overview of the various features included in the system setting screens. You can identify your NSA on the network and set the time that the NSA follows for its scheduled tasks/logs. 6.2 What You Can Do •...
  • Page 166: The Server Name Screen

    Chapter 6 System Setting • power surges occur. The NSA gives no warning if time lag occurs. You should resynchronize the time after a power surge or after you have shut down the NSA several times. 6.4 The Server Name Screen Click System Setting >...
  • Page 167: The Date/Time Screen

    Chapter 6 System Setting Table 19 System Setting > Server Name (continued) LABEL DESCRIPTION Apply Click this to save your changes. Reset Click this to restore previously saved settings. 6.5 The Date/Time Screen Use this screen to select a time zone and a time server from which your NSA can get the time and date.
  • Page 168 Chapter 6 System Setting Table 20 System Setting > Date/Time (continued) LABEL DESCRIPTION Manual Select this radio button to enter the time and date manually. When you enter the time settings manually, the NSA uses the new setting once you click Apply. Note: If you enter time settings manually, they revert to their defaults when power is lost.
  • Page 169 Chapter 6 System Setting Table 20 System Setting > Date/Time (continued) LABEL DESCRIPTION Start Date Configure the day and time when Daylight Saving Time starts if you selected Enable Daylight Saving. The hour field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time starts in most parts of the United States on the second Sunday of March.
  • Page 170 Chapter 6 System Setting NSA210 User’s Guide...
  • Page 171: Storage

    H A P T E R Storage 7.1 Overview Several NSA features require a valid internal volume. This chapter covers the management of volumes and disks (both internal and external). 7.2 What You Can Do Use the Storage screen (Section 7.4 on page 173) to create and edit volumes in the NSA.
  • Page 172 Chapter 7 Storage Volume A volume is a storage area on a disk or disks. You can create volumes on the internal disks and external disks attached to the USB port(s). You can spread a volume across internal disks but not between internal and external disks. An internal disk/volume is the disk/volume that is physically installed in the NSA hard disk tray.
  • Page 173: The Storage Screen

    Chapter 7 Storage 7.4 The Storage Screen The Storage screen allows you to create and edit volumes in the NSA. Click Storage > Volume in the navigation panel to display the following screen. Use this screen to display SATA (internal) and USB (external) volumes on the NSA. Note: It is recommended to scan the volume every three months or 32 reboots.
  • Page 174: Creating A Sata Volume

    Chapter 7 Storage Table 21 Storage > Volume (continued) LABEL DESCRIPTION Disk(s) Click or roll your mouse over a link in this column to display the following details about the hard drive located in the corresponding hard drive bay. Type: Whether it is an internal or external (USB) hard drive. Model Name: This is the hard disk number that identifies the disk.
  • Page 175 Chapter 7 Storage Click the Create a SATA Volume button in the Storage > Volume screen as shown in Section 7.4 on page 173 to open the following screen. Use this screen to create a new NSA internal disk drive volume. Note: Creating a volume formats the hard drive.
  • Page 176 Chapter 7 Storage The following table describes the labels in this screen. Table 22 Storage > Volume > Create a SATA Volume Volume Name Type a volume name from 1 to 31 characters. To avoid confusion, it is highly recommended that each volume use a unique name. Acceptable characters are all alphanumeric characters, "...
  • Page 177: Editing A Volume

    Chapter 7 Storage Table 22 Storage > Volume > Create a SATA Volume (continued) RAID 1 Use this if you want to mirror all data on one disk to the other disk. This is only available when you have two hard disks installed (that is, the hard disk inside the NSA and an eSATA hard disk attached to the NSA.
  • Page 178: Creating A Usb Volume

    Chapter 7 Storage 7.4.3 Creating a USB Volume Click the Create a USB Volume button in the Storage > Volume screen as shown in Section 7.4 on page 173 to open the following screen. Use this screen to create a new NSA external disk drive volume. Note: Creating a volume formats the drive.
  • Page 179: Storage Technical Reference

    Chapter 7 Storage Table 24 Storage > Volume > Create a USB Volume (continued) LABEL DESCRIPTION Apply Click this to save your changes and create the volume. Cancel Click this to exit this screen without saving changes. 7.5 Storage Technical Reference This section provides some background information about the topics covered in this chapter.
  • Page 180: Storage Methods

    Chapter 7 Storage 7.5.2 Storage Methods This section contains theoretical background on JBOD, PC Compatible Volume and the RAID levels used on the NSA. Redundant Array of Independent Disks (RAID) is a method of storing data on multiple disks to provide a combination of greater capacity, reliability, and/or speed.
  • Page 181: Volume Status

    • Place the NSA behind a hardware-based firewall. It should have stateful packet inspection, IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL’s ZyWALL UTM products for example). • Use anti-virus software on your computer to scan files from others before saving the files on the NSA.
  • Page 182: Volumes And Raid

    Chapter 7 Storage available but the volume can still be used. For a degraded volume, you should replace the faulty disk as soon as possible to obtain previous performance. See your Quick Start Guide for more information on replacing a disk. If it’s down, then the only indication is that you can no longer transfer files to/from the shares in the down volume.
  • Page 183: External Disks

    Chapter 7 Storage See the Quick Start Guide for information on replacing disks in the NSA. When replacing a disk in a degraded or down RAID volume, the new disk must be at least the same size or bigger than the other disks that are already in the RAID volume, so as all data in the volume can be restored.
  • Page 184 Chapter 7 Storage NSA210 User’s Guide...
  • Page 185: Network

    Or you can assign the NSA a static (fixed) IP address. DNS Server Address A DNS (Domain Name System) server maps domain names (like www.zyxel.com) to their corresponding numerical IP addresses. This lets you use domain names to access web sites without having to know their IP addresses.
  • Page 186 Chapter 8 Network PPPoE Point-to-Point Protocol over Ethernet (PPPoE) allows the NSA to establish a direct Internet connection if you do not have a router. PPPoE is a dial-up connection. You need a username and password from your Internet Service Provider (ISP) to set up the connection.
  • Page 187: The Tcp/Ip Screen

    Chapter 8 Network In the following example, the NSA has jumbo frames enabled and set to 8KB frames. This means the computer, notebook computer, and switch must also have jumbo frames enabled and be capable of supporting 8KB frames. Figure 85 Jumbo Frames 8.4 The TCP/IP Screen Use the TCP/IP screen to have the NSA use a dynamic or static IP address, subnet mask, default gateway and DNS servers.
  • Page 188 Chapter 8 Network Note: If you change the NSA’s IP address, you need to log in again after you apply changes. Figure 86 Network > TCP/IP The following table describes the labels in this screen. Table 27 Network > TCP/IP LABEL DESCRIPTION IP Address...
  • Page 189 Chapter 8 Network Table 27 Network > TCP/IP (continued) LABEL DESCRIPTION Default Type a default gateway address in this field. Gateway DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. If you have the IP address(es) of the DNS server(s), enter them.
  • Page 190: Upnp Port Mapping Screen

    Chapter 8 Network 8.5 UPnP Port Mapping Screen Use UPnP (Universal Plug and Play) port mapping to allow access from the WAN to services you select on the NSA. It is recommended that you place the NSA behind an Internet gateway firewall device to protect the NSA from attacks from the Internet (see RAID 1 and Data Protection on page 181 for firewall type...
  • Page 191: Upnp And The Nsa's Ip Address

    Chapter 8 Network 8.5.1 UPnP and the NSA’s IP Address It is recommended that the NSA use a static IP address (or a static DHCP IP address) if you will allow access to the NSA from the Internet. The UPnP-created NAT mappings keep the IP address the NSA had when you applied your settings in the UPnP Port Mapping screen.
  • Page 192: Configuring Upnp Port Mapping

    Chapter 8 Network CIFS (Windows File Sharing) Common Internet File System (CIFS) is a standard protocol supported by most operating systems in order to share files across the network. Using UPnP port mapping for CIFS allows users to connect from the Internet and use programs like Windows Explorer to access the NSA’s shares to copy files from the NSA, delete files on the NSA, or upload files to the NSA from the Internet.
  • Page 193 Chapter 8 Network access services on the NSA. You can set which port Internet users need to use to access a specific service on the NSA. Note: Some Internet gateways will delete all UPnP mappings after reboot. So if the Internet gateway reboots, you may need to use this screen again to re-apply the UPnP port mapping.
  • Page 194: The Pppoe Screen

    Chapter 8 Network Table 28 Network > UPnP > Port Mapping (continued) LABEL DESCRIPTION Enable WAN Select this check box to have UPnP configure your Internet gateway to Access allow access from the Internet to the NSA’s service. If you clear this check box, people will not be able to access the NSA’s service from the Internet unless you manually configure the Internet gateway’s firewall and NAT rules to allow access.
  • Page 195 Chapter 8 Network Click Network > PPPoE in the navigation panel to open the following screen. Figure 91 Network > PPPoE The following table describes the labels in this screen. Table 29 Network > PPPoE LABEL DESCRIPTION Status Status This field displays the status of PPPoE connection. IP Address This field displays the IP address of your PPPoE connection.
  • Page 196 Chapter 8 Network NSA210 User’s Guide...
  • Page 197: Applications

    H A P T E R Applications 9.1 Overview This chapter discusses the features in the Application screens. The NSA contains various applications for file sharing and downloading. 9.2 What You Can Do • Use the FTP Server screen (Section 9.4 on page 200) to configure settings for FTP file transfers to/from the NSA.
  • Page 198: What You Need To Know

    Chapter 9 Applications 9.3 What You Need to Know File Transfer Protocol (FTP) is a file transfer service that operates on the Internet. A system running the FTP server accepts commands from a system running an FTP client. FTP is not a secure protocol. Your file transfers could be subject to snooping.
  • Page 199 Chapter 9 Applications iTunes Server The NSA iTunes server feature lets you use Apple’s iTunes software on a computer to play music and video files stored on the NSA. You can download iTunes from www.apple.com. Download Service The NSA’s download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA.
  • Page 200: Ftp Server

    Chapter 9 Applications RSS (Really Simple Syndication) is a format for delivering frequently updated digital content. A channel uses a feed to deliver its contents (items). Subscribe the NSA to a feed to be able to download the contents. 9.4 FTP Server Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA and download files from the NSA.
  • Page 201 Chapter 9 Applications Table 30 Applications > FTP LABEL DESCRIPTION Connection Enter the maximum number of concurrent FTP connections allowed Limit on the NSA in this field. The connection limit is 20. Idle Timeout Enter the length of time that an FTP connection can be idle before timing out.
  • Page 202: The Media Server Screen

    Chapter 9 Applications 9.5 The Media Server Screen The media server application allows you to share files with media clients. Click Applications > Media Server to open the following screen. Use this screen to view the media server’s status and rebuild the media server database. Figure 94 Applications >...
  • Page 203: The Media Server Share Publish Screen

    Chapter 9 Applications 9.5.1 The Media Server Share Publish Screen Click Applications > Media Server > Share Publish to open the following screen. Use this screen to select shares to publish (share with media clients like the DMA-2500 and iTunes). Figure 95 Applications >...
  • Page 204 Chapter 9 Applications Note: It may take some time for the media server to rebuild the database after you change the ID3 tag character set settings. How long it takes depends on how many media files you have. Some of the media files may not appear in the Home screens until the rebuilding finishes.
  • Page 205: The Media Server Itunes Server Screen

    Chapter 9 Applications 9.5.3 The Media Server iTunes Server Screen Click Applications > Media Server > iTunes Server to open the following screen. Use this screen to turn the iTunes server on or off. Figure 97 Applications > Media Server > iTunes Server The following table describes the labels in this screen.
  • Page 206: The Download Service Screen

    Chapter 9 Applications 9.6 The Download Service Screen The Download Service screen allows you to download files from the Internet. Click Applications > Download Service to open the following screen. Use this screen to manage the NSA’s file downloads. Note: By default, the NSA saves downloads in the admin share’s download folder. Figure 99 Applications >...
  • Page 207 Chapter 9 Applications Table 36 Applications > Download Service (continued) LABEL DESCRIPTION Delete To delete download tasks (or manually clear out completed download tasks), select a download task and click this to remove it from the list. A pop-up screen asks you to confirm. Click Apply to delete or Cancel to quit.
  • Page 208 Chapter 9 Applications Table 36 Applications > Download Service (continued) LABEL DESCRIPTION Status The following icons show the download’s status. Completed: The NSA has downloaded the whole file. Seeding: The download is finished and the NSA is allowing other BitTorrent users to download it. Downloading: The NSA is getting the file.
  • Page 209: Adding A Download Task

    Chapter 9 Applications Table 36 Applications > Download Service (continued) LABEL DESCRIPTION Priority This is the download’s priority on the NSA. You can set a currently downloading or queued download to high or automatic priority. You can set a download to high priority to have the NSA try to download it before the other files.
  • Page 210 Chapter 9 Applications The following table describes the labels in this screen. Table 37 Applications > Download Service > Add LABEL DESCRIPTION Source Paste the URL of the file you want to download into this field. The URL can be for an HTTP, FTP, or BitTorrent download. For a BitTorrent download, you can copy and paste the URL of the .torrent file.
  • Page 211 Chapter 9 Applications Table 37 Applications > Download Service > Add LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. •...
  • Page 212: Configuring General Settings

    Chapter 9 Applications 9.6.2 Configuring General Settings Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period. Figure 101 Applications > Download Service > Preferences > General Settings NSA210 User’s Guide...
  • Page 213 Chapter 9 Applications The following table describes the labels in this screen. Table 38 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete Downloaded Files downloads in) and where the NSA moves completed downloads (Move completed downloads to).
  • Page 214 Chapter 9 Applications Table 38 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION • Current Location - This is the location of the selected folder. • Folder Name - Enter a new folder name and click to create •...
  • Page 215: Configuring The Bittorrent Settings

    Chapter 9 Applications 9.6.3 Configuring the BitTorrent Settings Click Applications > Download Service > Preferences > BitTorrent to open the following screen. Use this screen to configure BitTorrent settings. Figure 102 Applications > Download Service > Preferences > BitTorrent The following table describes the labels in this screen. Table 39 Applications >...
  • Page 216: Edit Ip Filter

    Chapter 9 Applications Table 39 Applications > Download Service > Preferences > BitTorrent LABEL DESCRIPTION Maximum Specify how many active connections are allowed on the NSA. Enter a Number of Active number from 1 to 500. This specifies the number of computers that Connections can connect to the NSA to download files being shared by the NSA.
  • Page 217 Chapter 9 Applications Click Edit IP Filter in the Applications > Download Service > Preferences > BitTorrent screen. Figure 103 Applications > Download Service > Preferences > BitTorrent > Edit IP Filter The following table describes the labels in this screen. Table 40 Applications >...
  • Page 218: Displaying The Task Information

    Chapter 9 Applications 9.6.5 Displaying the Task Information Select an item on the list and click Task Info. Use this screen to check detailed information about the task. Figure 104 Applications > Download Service > Task Info The following table describes the labels in this screen. Table 41 Applications >...
  • Page 219: The Web Publishing Screen

    Chapter 9 Applications Table 41 Applications > Download Service > Task Info LABEL DESCRIPTION Time Left This is the time remaining to complete the task. Priority Use this field to set the priority for downloading the task. Select Auto to have the NSA automatically determine the task’s priority.
  • Page 220 Chapter 9 Applications The following table describes the labels in this screen. Table 42 Applications > Web Publishing LABEL DESCRIPTION Web Publishing Disable / Enable Turn on web publishing to let people access files in the published Web Publishing shares using a web browser, without having to log into the Home screens.
  • Page 221: The Broadcatching Screen

    Chapter 9 Applications 9.8 The Broadcatching Screen This screen displays the NSA’s subscribed channels and the associated contents. • The NSA saves a channel’s downloaded items in a folder named after the channel. • The NSA creates the channel folders in the same destination as the download service.
  • Page 222 Chapter 9 Applications The following table describes the labels in this screen. Table 43 Applications > Broadcatching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button. A screen opens for you to subscribe to the feed.
  • Page 223: Adding A Broadcatching Channel

    Chapter 9 Applications Table 43 Applications > Broadcatching LABEL DESCRIPTION Published This is when the file was made available for download. Date Description This is the publishers introduction for the file. Actions Start Downloading: Click this to add the file to the NSA’s download queue or check the file’s status in the NSA’s download service.
  • Page 224 Chapter 9 Applications Click Applications > Broadcatching > Add Channel to open the following screen. Use the Add Channel screen to subscribe the NSA to a channel’s feed so you can view the channel. You also select policies for downloading and deleting the channel’s items.
  • Page 225 Chapter 9 Applications Table 44 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Delete Policy Set how the NSA handles deleting the items downloaded from the channel. Manual: Only delete individual files you select later in the Broadcatching screen. Keep last N of items: Select this to set the NSA to only keep a number of the channel’s most recent files.
  • Page 226 Chapter 9 Applications Table 44 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. •...
  • Page 227: Editing A Broadcatching Channel

    Chapter 9 Applications 9.8.2 Editing a Broadcatching Channel Click Applications > Broadcatching, then select a channel and click Edit Channel to open a similar Edit screen. Use the Edit Channel screen to change the download or delete policies. Figure 109 Applications > Broadcatching > Edit Channel The following table describes the labels in this screen.
  • Page 228 Chapter 9 Applications Table 45 Applications > Broadcatching > Edit Channel LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete Downloaded Files downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded.
  • Page 229: The Print Server Screen

    Chapter 9 Applications Table 45 Applications > Broadcatching > Edit Channel LABEL DESCRIPTION Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. 9.9 The Print Server Screen Use the Print Server screen to view and manage the NSA’s list of printers and print jobs.
  • Page 230: Print Server Rename

    Chapter 9 Applications 9.9.1 Print Server Rename Click Applications > Print Server and a printer’s Rename icon to open the following screen. Use this screen to change the name the NSA uses for the printer. Figure 111 Applications > Print Server > Rename The following table describes the labels in this screen.
  • Page 231: The Copy/Sync Button Screen

    Chapter 9 Applications 9.10 The Copy/Sync Button Screen The Copy/Sync button on the front panel allows you to copy or synchronize files between a connected USB device and the NSA. Click Applications > Copy/Sync Button to open the following screen. Figure 112 Applications >...
  • Page 232: Technical Reference

    Chapter 9 Applications Table 48 Applications > Copy/Sync Button LABEL DESCRIPTION Backup Target Select a share in which to save the backup files. Note: The NSA will not create a new folder to store the backup files. It is recommended to create a specific share (such as “backup”) for backup purposes.
  • Page 233 Chapter 9 Applications electronics companies that works to make products compatible in a home network. • Publish shares to let others play the contained media files. • The media server is a convenient way to share files you download using the broadcatching service (see Section 9.8 on page 221).
  • Page 234: Download Service

    You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof. ZyXEL bears NO responsibility or liability for your use of the download service feature.
  • Page 235: Download Service Notification

    Chapter 9 Applications The following screen displays how the plugin works. Figure 114 Link Capture Browser Plugin Instead of copying and pasting a file’s URL to the NSA’s download service, you can right-click on the URL in the web browser and select Send to NSA. The URL is then added to the NSA’s download service list.
  • Page 236: Bittorrent Security

    Chapter 9 Applications Note: The download service notification only keeps track of files downloaded via BitTorrent. Figure 115 Download Service Notification 9.11.5 BitTorrent Security When you download using BitTorrent, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall. Use a Hardware-based Firewall Place a hardware-based firewall between your network and the Internet (a software-based firewall on your computer would just protect the computer itself,...
  • Page 237 Chapter 9 Applications Ideally your firewall should have the following: • Stateful packet inspection to control access between the Internet and your network and protect your NSA (and computers) from hacking attacks. • IDP (Intrusion Detection and Prevention) to detect malicious packets within normal network traffic and take immediate action against them.
  • Page 238: Web Publishing Example

    Chapter 9 Applications set this up (see the firewall’s manual for details). You may also have to configure a corresponding firewall rule. Figure 118 Firewall Configured to Allow Incoming BitTorrent Requests 9.11.6 Web Publishing Example This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet.
  • Page 239 Chapter 9 Applications Click Applications > Web Publishing and configure the screen as shown (enable the web publishing and move FamilyPhotos over to Published Shares) and click Apply. Figure 119 Applications > Web Publishing (Example) Now open your web browser and type in the address of the NSA’s FamilyPhotos web page.
  • Page 240: Web Publishing

    Chapter 9 Applications • Click a file’s link to open the file. • Right-click a file’s link and select Save Target As.. (in Internet Explorer) to save a copy of the file. • Click a label in the heading row to sort the files by that criteria. •...
  • Page 241: Channel Guides For Broadcatching

    9.11.8 Channel Guides for Broadcatching Here are some popular broadcatching channel guide web sites. Note: ZyXEL does not endorse these web sites and is not responsible for any of their contents. Use these or any other web sites at your own risk and discretion.
  • Page 242: Printer Sharing

    The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA’s USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers. Figure 122 Printer Sharing...
  • Page 243: Copying Files

    Chapter 9 Applications 9.11.10 Copying Files You can copy files from a USB device to the NSA or from the NSA to a USB device. Simply press and release the COPY/SYNC button to start copying files. See Section 9.10 on page 231 for details about configuring the copy settings.
  • Page 244: Synchronizing Files

    Chapter 9 Applications 9.11.11 Synchronizing Files Synchronization makes the contents on the target device identical to the ones on the source device. You can synchronize files from a USB device to the NSA or from the NSA to a USB device. In addition, you may also synchronize files in both directions simultaneously.
  • Page 245 Chapter 9 Applications USB <-> NSA When you synchronize files in both directions simultaneously, both storage devices transfer unique files to one another. Files with the same file name are synchronized according to their modification date/time. The difference in modification time between the two files has to be greater than five minutes. More recently modified files overwrite the older ones during synchronization.
  • Page 246 Chapter 9 Applications NSA210 User’s Guide...
  • Page 247: Package Management

    H A P T E R Package Management 10.1 Overview Package Management can be used to set up more useful applications in your NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps. 10.2 What You Can Do •...
  • Page 248: Package Management Screen

    Chapter 10 Package Management • DyDNS - This gives your NSA a domain name with a dynamic IP address. At the time of writing, this package supports accounts from the following service providers: DynDNS, NoIP, 3322, ZoneEdit, and DHS. • Gallery - This web-based application allows your NSA to host pictures. You can upload images in your local computer or shares to this application.
  • Page 249 Table 49 Applications > Package Management LABEL DESCRIPTION Package Management Retrieve List Click this to retrieve a list of available packages from the ZyXEL From Internet website. Install/Upgrade Choose the item(s) on the list and click this to install the selected application(s) on your system or upgrade to the latest version if you have previously installed the application.
  • Page 250 Chapter 10 Package Management Table 49 Applications > Package Management LABEL DESCRIPTION Status This is the current status of the application. It shows: • Not Installed - This displays for applications that have not been installed by the NSA. • Installing (%) - This displays when the application is being installed.
  • Page 251: Displaying Package Information

    Chapter 10 Package Management 10.4.1 Displaying Package Information Select an installed package from the list and click Package Info. Use this screen to check detailed information about the application. Figure 127 Applications > Package Management > Package Info The following table describes the labels in this screen. Table 50 Applications >...
  • Page 252: Emule Screens

    Chapter 10 Package Management Table 50 Applications > Package Management > Package Info LABEL DESCRIPTION Description This shows a brief description of the item. Close Click this to close the screen. 10.5 eMule Screens Use these screens to manage the eMule application in your NSA. eMule is a peer- to-peer (P2P) file-sharing console that lets you download files from the Internet.
  • Page 253: Add Server

    Chapter 10 Package Management Table 51 Applications > eMule > Server LABEL DESCRIPTION My Info Select a server from the list and click this to view the details and connection status of the server. Refer to Section 10.5.4 on page 255 for the My Info screen.
  • Page 254: Edit Server

    Chapter 10 Package Management Click Add in the Applications > eMule > Server screen to add a server. Figure 130 Applications > eMule > Server: Add The following table describes the labels in this screen. Table 52 Applications > eMule > Server: Add LABEL DESCRIPTION Server IP...
  • Page 255: My Info

    Chapter 10 Package Management The following table describes the labels in this screen. Table 53 Applications > eMule > Server: Edit LABEL DESCRIPTION Server Name Enter the server name. IP Address Enter the IP address of the server. Port Number Enter the port number of the server.
  • Page 256: Emule Task Screen

    Chapter 10 Package Management Table 54 Applications > eMule > Server: MyInfo LABEL DESCRIPTION This shows the status of the NSA’s connection to the Kad network: Connected or Not Connected. Kad is a shortcut for Kademlia network, which does not use servers to store files or user information in order to run a peer-to-peer network.
  • Page 257 Chapter 10 Package Management Table 55 Applications > eMule > Task LABEL DESCRIPTION Click this to add a download task (ED2K link) to the list. Refer to Section 10.5.6 on page 258 for the Add Task screen. Preferences Click this to open a screen where you can set the default location for saving downloaded files.
  • Page 258: Add Task

    Chapter 10 Package Management Table 55 Applications > eMule > Task LABEL DESCRIPTION Transferred This shows what percent of the file the NSA has uploaded to other peers. This column is available in the Uploading tab. Upload Speed This shows the upload speed of the NSA. This column is available in the Uploading tab.
  • Page 259 Chapter 10 Package Management Click Add in the Applications > eMule > Task screen to add a task. Figure 135 Applications > eMule > Task: Add The following table describes the labels in this screen. Table 56 Applications > eMule > Task: Add LABEL DESCRIPTION Source...
  • Page 260: Preferences

    Chapter 10 Package Management Table 56 Applications > eMule > Task: Add LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. •...
  • Page 261 Chapter 10 Package Management Click Applications > eMule > Task > Preferences to open the following screen. Figure 136 Applications > eMule > Task > Preferences The following table describes the labels in this screen. Table 57 Applications > eMule > Task > Preferences LABEL DESCRIPTION Username...
  • Page 262 Chapter 10 Package Management Table 57 Applications > eMule > Task > Preferences LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. •...
  • Page 263: Edit Ip Filter

    Chapter 10 Package Management Table 57 Applications > eMule > Task > Preferences LABEL DESCRIPTION Edit IP Filter Click this to edit the IP Filter. IP filtering prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs. Refer to Section 10.5.8 on page 263 to view and configure the Edit...
  • Page 264: Share Browsing

    Chapter 10 Package Management 10.5.9 Share Browsing Use this screen to view a list of files that are still being downloaded by the NSA. The files are located in the eMule\Temp folder in the Admin share by default. Click Applications > eMule > Task > Browse Incomplete Downloads to open the following screen.
  • Page 265: Task Info

    Chapter 10 Package Management Table 59 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Rename Select a folder or file and click this to open a screen. Enter the name you want and click OK to make the changes. Note: When you change a file name, make sure you keep the file extention.
  • Page 266 Chapter 10 Package Management Click Task Info in Applications > eMule > Task screen to open the following. Figure 139 Applications > eMule > Task: Task Info The following table describes the labels in this screen. Table 60 Applications > eMule > Task: Task Info LABEL DESCRIPTION Status...
  • Page 267: Emule Search Screen

    Chapter 10 Package Management Table 60 Applications > eMule > Task: Task Info LABEL DESCRIPTION Seen Complete This shows the last time a source with the complete file was online. Close Click this to exit the screen. 10.5.11 eMule Search Screen Use this screen to search for files available in an eMule server using keywords and other parameters, such as file type, file size and extension names.
  • Page 268: Dydns Screen

    Chapter 10 Package Management Table 61 Applications > eMule > Search LABEL DESCRIPTION Download Select a file from the results and click this to start downloading the file. This table shows the results of the search. File Name This shows the name of the file(s) that match the criteria you have set.
  • Page 269: Nfs Screen

    Chapter 10 Package Management The following table describes the labels in this screen. Table 62 Network > DyDNS LABEL DESCRIPTION Gateway Information Internal Address This shows the IP address assigned to the NSA by the gateway in your local network. External Address This shows the IP address of the NSA that can be accessed in the Wide Area Network (WAN).
  • Page 270 Chapter 10 Package Management Click Network > NFS to open the following screen. Figure 142 Network > NFS The following table describes the labels in this screen. Table 63 Network > NFS LABEL DESCRIPTION NFS Service Enable NFS Click this to employ NFS in your NSA. Server Disable NFS Click this to stop using NFS.
  • Page 271: Add/Edit Nfs Share

    Chapter 10 Package Management You see a warning screen before you delete a volume. Figure 143 Delete an NFS Share 10.7.1 Add/Edit NFS Share Use this screen to add or edit an NFS share. Note: Some attributes of the NFS share cannot be edited. Click Add or Edit in the Network >...
  • Page 272: Nfs Session

    Chapter 10 Package Management Table 64 Network > NFS: Add/Edit LABEL DESCRIPTION DN/IP Filter Enter the domain name(s) or IP address(es) that can have access to the NFS share. Enter ‘*’ to make the share available to all users in the network. You can also enter a wildcard, such as ‘*.domain.com’...
  • Page 273: Smart Screen

    Chapter 10 Package Management 10.8 SMART Screen Use this screen to view indicators of your NSA’s hard disk(s) health. Self Monitoring, Analysis, and Reporting Technology (S.M.A.R.T) detects and reports the reliability of hard disks using standard indicators (called “attributes”), to help you anticipate possible disk failures. Note: The fields included the screens may vary depending on the hard disk that you use.
  • Page 274: Smart Brief Summary

    Chapter 10 Package Management Table 66 Storage > S.M.A.R.T LABEL DESCRIPTION Performance This shows your hard disk’s performance. Refer to Section 10.8.2 on page 275 for more information on how S.M.A.R.T determines your hard disk’s condition. This displays: • Good - This shows when you compare each Value with the Threshold Value and all the Value is greater than the Threshold Value.
  • Page 275: Smart Full Summary

    Chapter 10 Package Management Table 67 Storage > S.M.A.R.T: Brief Summary LABEL DESCRIPTION Health This describes the overall health of the volume based on S.M.A.R.T diagnostics. Performance This shows your hard disk’s performance. Refer to Section 10.8.2 on page 275 for more information on how S.M.A.R.T determines your hard disk’s condition.
  • Page 276 Chapter 10 Package Management The following table describes the labels in this screen. Table 68 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION This is the identification number used to tag a hard disk attribute. This is standard across all S.M.A.R.T-enabled storage devices. However it depends on the storage vendor which attributes it will allow S.M.A.R.T to diagnose.
  • Page 277: Protect Screens

    Chapter 10 Package Management Table 68 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION When Failed This column indicates when (if ever) the attribute failed. An attribute has failed if the normalized value is less than or equal to the threshold. •...
  • Page 278 Chapter 10 Package Management Click Protect > Backup to open the following screen. Figure 149 Protect > Backup The following table describes the labels in this screen. Table 69 Protect > Backup LABEL DESCRIPTION Backup Add Job Click this to create and customize a backup job. Edit Job Select a backup job in the list and click this to make some changes to Delete Selected...
  • Page 279: Backup: Step 1

    Chapter 10 Package Management 10.10.1 Backup: Step 1 Use this screen to specify the job information and back up type. Click Add Job in the Protect > Backup screen to open the following: Figure 150 Protect > Backup: Step 1 The following table describes the labels in this screen.
  • Page 280 Chapter 10 Package Management Table 70 Protect > Backup: Step 1 LABEL DESCRIPTION Backup Type Choose the backup type that you want the NSA to implement for the backup job. Archive - This is a backup of the source folder in an archive format. Once you backup your files in the target folder, you cannot access the files individually unless you have the extracting tool used by the NSA.
  • Page 281: Backup: Step 2

    Chapter 10 Package Management 10.10.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored. Figure 151 Protect > Backup: Step 2 NSA210 User’s Guide...
  • Page 282 Chapter 10 Package Management The following table describes the labels in this screen. Table 71 Protect > Backup: Step 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files.
  • Page 283 Chapter 10 Package Management Table 71 Protect > Backup: Step 2 LABEL DESCRIPTION Remote Select this to back up to another device. For Archives: The remote device can be another NSA in the network. Fill in the following fields in order to be able to access it. •...
  • Page 284: Backup: Step 3

    Chapter 10 Package Management 10.10.3 Backup: Step 3 Use this screen to specify compression, encryption and purge policies for the backup job. This step is only available if you are doing an archive backup or a synchronization backup to a remote target. Figure 152 Protect >...
  • Page 285: Backup: Step 4

    Chapter 10 Package Management Table 72 Protect > Backup: Step 3 LABEL DESCRIPTION Purge Policy The NSA maintains the files that have been included in your backups. However to save hard disk space, you can choose to delete files that have been included in previous backups.
  • Page 286: Edit Job Screen

    Chapter 10 Package Management Table 73 Protect > Backup: Step 4 LABEL DESCRIPTION Every how many This is only available if you selected Hourly as your backup hours? frequency. Select every how many hours the NSA performs the backup job. On which minute This is only available if you selected Hourly as your backup of the hour?
  • Page 287: Edit Job: Step 1

    Chapter 10 Package Management 10.10.6 Edit Job: Step 1 Click Protect > Backup. Select a backup job from the list and click Edit Job to open the following. Figure 154 Protect > Backup > Edit: Step 1 The following table describes the labels in this screen. Table 74 Protect >...
  • Page 288: Edit Job: Step 2

    Chapter 10 Package Management Table 74 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Compression This field is read-only and shows whether the backup employs compression. Compression reduces the size of the file that you want to back up. Backup is then faster, but restoring may be slower, so if backup space is not a concern and recovery speed is, then turn off compression.
  • Page 289: Restore Archive Screen

    Chapter 10 Package Management The following table describes the labels in this screen. Table 75 Protect > Backup > Edit: Step 2 LABEL DESCRIPTION Scheduler Settings Backup Edit this by selecting from Hourly, Daily, Weekly and Monthly Frequency backup intervals. The screen changes depending on the item you select.
  • Page 290: Restore Archive: Step 1

    Chapter 10 Package Management 10.10.9 Restore Archive: Step 1 Click Protect > Backup screen (Section 10.10 on page 277). You can restore a previous backup job by selecting a backup job from the list and clicking Restore Archive. Figure 156 Protect > Backup > Restore Archive: Step 1 The following table describes the labels in this screen.
  • Page 291: Restore Archive: Step 2

    Chapter 10 Package Management 10.10.10 Restore Archive: Step 2 Use this screen to select the folder where the archive you want to restore is located. Figure 157 Protect > Backup > Restore Archive: Step 2 The following table describes the labels in this screen. Table 77 Protect >...
  • Page 292: Restore Archive: Step 3

    Chapter 10 Package Management 10.10.11 Restore Archive: Step 3 Use this screen to select the location in the NSA where you want to restore your backup. Figure 158 Protect > Backup > Restore Archive: Step 3 The following table describes the labels in this screen. Table 78 Protect >...
  • Page 293: Restore Screen

    Chapter 10 Package Management 10.11 Restore Screen Use this screen to restore previous backups made with the NSA, including archives and folders from internal, external or remote NSAs to the NSA. 10.11.1 Restore: Step 1 You can access this screen by clicking Protect > Restore. Figure 159 Protect >...
  • Page 294: Restore: Step 2

    Chapter 10 Package Management Table 79 Protect > Restore: Step 1 LABEL DESCRIPTION Browse Click this to select where the previous backup that you want to restore is located. • Volume - Select a volume from the list. • Current Location - This is the location of the selected folder. •...
  • Page 295: Restore: Step 3

    Chapter 10 Package Management The following table describes the labels in this screen. Table 80 Protect > Restore: Step 2 LABEL DESCRIPTION Step 2. Select If you selected Remote NSA for the backup you want to restore, you Restore Point can see a list of all the backups you performed in the Job Name table.
  • Page 296: Restore: Step 4

    Chapter 10 Package Management The following table describes the labels in this screen. Table 81 Protect > Restore: Step 3 LABEL DESCRIPTION Step 3. Please select which file(s)/folder(s) to restore. Folder Chooser Select the folder where the backup you want to restore is located. Selected Folder This shows the path of the folder you selected.
  • Page 297: Syslog Server Screen

    10.12 Syslog Server Screen Use this screen to configure the NSA to accept syslog logs from syslog clients such as ZyXEL’s G-4100 v2. Note: You may need to configure any firewalls between the NSA and the syslog clients in order to let the syslog traffic go to the NSA.
  • Page 298 Chapter 10 Package Management Click Applications > Syslog Server to open the following screen. Figure 163 Applications > Syslog Server The following table describes the labels in this screen. Table 83 Applications > Syslog Server LABEL DESCRIPTION Enable Syslog Select this to have the NSA accept syslog logs from syslog clients. Server Clear it to stop the NSA from accepting syslog logs from syslog clients.
  • Page 299: Tftp Server Screen

    FTP and often used for transmitting large numbers of small files. Use this screen to configure the NSA to accept log files from TFTP clients such as ZyXEL’s G-4100 Note: You may need to configure any firewalls between the NSA and the TFTP clients in order to let the log files go to the NSA.
  • Page 300: Technical Reference

    Chapter 10 Package Management The following table describes the labels in this screen. Table 84 Applications > TFTP Server LABEL DESCRIPTION Enable TFTP Select this to have the NSA accept log files from TFTP clients. Clear it Server to stop the NSA from accepting log files from TFTP clients. Upload / Click View Files to browse to where you want to store the log files on Download...
  • Page 301 Chapter 10 Package Management Table 85 S.M.A.R.T. Attributes (continued) ATTRIBUTE BETTE DESCRIPTION NAME Spin-Up Time This is the average number of milliseconds the hard drive took for spindle spin up (from zero RPM to fully operational). Start/Stop The total number of spindle start and stop cycles. Count Reallocated Total number of reallocated sectors on the hard drive.
  • Page 302 Chapter 10 Package Management Table 85 S.M.A.R.T. Attributes (continued) ATTRIBUTE BETTE DESCRIPTION NAME Power-off This is how many times the heads are loaded off the Retract Count media. Load/Unload This is the number of load and unload cycles into head Cycle landing zone position.
  • Page 303 Chapter 10 Package Management Table 85 S.M.A.R.T. Attributes (continued) ATTRIBUTE BETTE DESCRIPTION NAME Spin Buzz This is the number of buzz routines to spin up the drive. When the arm holding the read/write heads is stuck, the motor driving it tries to oscillate the arm to free it. This causes an audible vibration.
  • Page 304 Chapter 10 Package Management NSA210 User’s Guide...
  • Page 305: Auto Upload

    H A P T E R Auto Upload 11.1 Overview This chapter discusses the features in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family.
  • Page 306: The Flickr/Youtube Screen

    Chapter 11 Auto Upload FTPES (File Transfer Protocol over Explicit TLS/SSL) File Transfer Protocol over Explicit TLS/SSL (FTPES) is a file transfer service that uses TLS (Transport Layer Security) or Secure Socket Layer (SSL) for secure transfers across the Internet. 11.4 The Flickr/YouTube Screen Use this screen to upload photos and videos to your Flickr and YouTube accounts.
  • Page 307: Configuring The Flickr Settings

    Chapter 11 Auto Upload 11.4.1 Configuring the Flickr Settings In the Applications > Auto Upload > Flickr/YouTube screen, select Flickr from the list and then click the Config button. The following screen displays if you have not authorized the NSA to use a Flickr account.
  • Page 308 Chapter 11 Auto Upload The following page displays asking for your authorization. Click OK, I’LL ALLOW IT to establish a link between the NSA and your Flickr account. Figure 168 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA Web Configurator.
  • Page 309 Chapter 11 Auto Upload Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen. Figure 170 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) NSA210 User’s Guide...
  • Page 310 Chapter 11 Auto Upload The following table describes the labels in this screen. Table 87 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) LABEL DESCRIPTION Flickr Account Configuration Username This field displays the Flickr account authorized for the auto upload feature.
  • Page 311 Chapter 11 Auto Upload Table 87 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) (continued) LABEL DESCRIPTION Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. •...
  • Page 312: Configuring The Youtube Settings

    Chapter 11 Auto Upload Table 87 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) (continued) LABEL DESCRIPTION Default Safety Assign a safety level to your files. Level Select Safe if the contents of your files are suitable for the general public.
  • Page 313 Chapter 11 Auto Upload Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen. Figure 172 Applications > Auto Upload > Flickr/YouTube > Config (YouTube) NSA210 User’s Guide...
  • Page 314 Chapter 11 Auto Upload The following table describes the labels in this screen. Table 88 Applications > Auto Upload > Config (YouTube) LABEL DESCRIPTION Youtube Account Configuration Username This field displays the Youtube account authorized for the auto upload feature. Switch User Click this to use a different YouTube account for the auto upload feature.
  • Page 315 Chapter 11 Auto Upload Table 88 Applications > Auto Upload > Config (YouTube) (continued) LABEL DESCRIPTION Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. • Share - Select the share from the list.
  • Page 316: The Ftp Uploadr Screen

    Chapter 11 Auto Upload 11.5 The FTP Uploadr Screen The FTP Uploadr feature uploads files stored in the NSA to FTP servers. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family. You can link the NSA to the FTP server or the FTP server on another NSA and select shares or folders for the NSA to upload.
  • Page 317 Chapter 11 Auto Upload The following table describes the labels in this screen. Table 89 Applications > Auto Upload > FTP Uploadr LABEL DESCRIPTION Enable FTP Use the check box to enable or disable the FTP Uploadr. Click Apply Uploadr to save your changes.
  • Page 318: Adding Or Editing An Ftp Server Entry

    Chapter 11 Auto Upload 11.5.1 Adding or Editing an FTP Server Entry Use this screen to add or edit an FTP server entry for auto upload. In the FTP Uploadr screen, click the Add Server or Edit Server button to open the following screen.
  • Page 319: The Ftp Uploadr Preferences Screen

    Chapter 11 Auto Upload 11.5.2 The FTP Uploadr Preferences Screen Use this screen to configure the general settings for the FTP Uploadr. In the FTP Uploadr screen, click the Preferences icon to open the following screen. Figure 175 Applications > Auto Upload > FTP Uploadr > Preferences The following table describes the labels in this screen.
  • Page 320 Chapter 11 Auto Upload Table 91 Applications > Auto Upload > FTP Uploadr > Preferences (continued) LABEL DESCRIPTION Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. •...
  • Page 321: Users

    H A P T E R Users 12.1 Overview This chapter introduces the Users screens of the NSA. Use the Users screens to create and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. •...
  • Page 322: The Users Screen

    Chapter 12 Users 12.3 The Users Screen Click Sharing > Users to display the screen shown next. Use this screen to create and manage accounts for users who can store files on the NSA. Figure 176 Sharing > Users The following table describes the labels in this screen. Table 92 Sharing >...
  • Page 323: User Icons

    Chapter 12 Users Table 92 Sharing > Users (continued) LABEL DESCRIPTION Delete Selected Users Select an account and click this to open a screen where you can delete the user account. User Info Select an account and click this to open a screen displaying the amount of storage space used by the account.
  • Page 324: Adding Or Editing General Account Settings

    Chapter 12 Users 12.3.2 Adding or Editing General Account Settings Use this screen to create or edit a NSA user account with NSA access password. Click the Add User button in the Users screen to open the following screen. Click the Edit User button in the screen shown previously to edit an existing account.
  • Page 325: Usernames

    Chapter 12 Users 12.3.3 Usernames Enter a username from one to 32 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characters are not allowed as the first character. The username can only contain the following characters: •...
  • Page 326: Account Quota Per Volume

    Chapter 12 Users 12.3.4 Account Quota Per Volume Click Sharing > Users > Add User (or Edit User) > Quota (per volume) to open the following screen. Use this screen to set how much storage space the user can use in specific volumes. Figure 178 Sharing >...
  • Page 327: Account Group Membership

    Chapter 12 Users 12.3.5 Account Group Membership Click Sharing > Users > Add User (or Edit User) > Group Membership to open the following screen. Use this screen to set which groups the user accounts belongs. Figure 179 Sharing > Users > Add User > Group Membership The following table describes the labels in this screen.
  • Page 328: Displaying User Info

    Chapter 12 Users 12.4 Displaying User Info Use this screen to display a user’s information. In the Users screen, select an account and click User Info to open the following screen. Figure 180 Sharing > Users > User Info The following table describes the labels in this screen. Table 97 Sharing >...
  • Page 329: Groups

    H A P T E R Groups 13.1 Overview This chapter introduces the Groups screens. Use the Groups screens to create and manage groups. You can assign users to groups and grant individual groups access rights to specific shares. 13.2 What You Can Do •...
  • Page 330 Chapter 13 Groups Click Sharing > Groups to display the screen shown next. Figure 181 Sharing > Groups The following table describes the labels in this screen. Table 98 Sharing > Groups LABEL DESCRIPTION Add Group Click this to open a screen where you can configure a new group.
  • Page 331: Adding Or Editing A Group

    Chapter 13 Groups Table 98 Sharing > Groups (continued) LABEL DESCRIPTION Display Number Click the drop-down menu to set how many groups you want to display in one screen. Go to Page Click the drop-down menu to select a page number. Jump to a different page to display and access more groups.
  • Page 332: Group Names

    Chapter 13 Groups 13.3.2 Group Names Enter a group name from 1 to 32 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characters are not allowed as the first character. The group name can only contain the following characters: •...
  • Page 333: Shares

    H A P T E R Shares 14.1 Overview A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder. You can map a share to a network drive for easy and familiar file transfer for Windows users.
  • Page 334: The Shares Screen

    Chapter 14 Shares 14.3 The Shares Screen Click Sharing > Shares in the navigation panel to open the following screen. This screen lists all shares created on the NSA. Figure 183 Sharing > Shares The following table describes the labels in this screen. Table 100 Sharing >...
  • Page 335 Chapter 14 Shares Table 100 Sharing > Shares (continued) LABEL DESCRIPTION Status This field displays the share icons. represents a Built-in share on a volume on the internal hard drives. represents a Predefined or User-Created share on a volume on the internal hard drives. represents an Auto or User-Created share on a volume on the external (USB) devices.
  • Page 336: Adding Or Editing Share

    Chapter 14 Shares 14.3.1 Adding or Editing Share Click Add Share to create a new share. In the Shares screen, select a share and click Edit Share to open the following screen. Use this screen to create or edit a share.
  • Page 337: Configuring Advanced Share Access

    Chapter 14 Shares Table 101 Shares > Add Share (or Edit Share) (continued) LABEL DESCRIPTION Share Access Assign access rights (full, read only or deny) to users or groups. If you publish the share to the media server or the web, all users will have at least read-only access to the share, regardless of what you configure here.
  • Page 338: Public And Anonymous Share Access Rights

    Chapter 14 Shares The following table describes the labels in this screen. Table 102 Sharing > Shares > Add Share (or Edit Share) > Advanced LABEL DESCRIPTION Available Users/Groups This field lists the users/groups to which you can assign access rights.
  • Page 339: The Recycle Bin Configuration Screen

    Chapter 14 Shares 14.4 The Recycle Bin Configuration Screen Use this screen to periodically clean up items in all recycle bins. 14.4.1 Recycle Bins Recycle bins in the NSA help users recover accidentally deleted files or folders in the shares. When you delete an item, a recycle folder is created within the share to hold the deleted item.
  • Page 340: The Share Browser Screen

    Chapter 14 Shares 14.5 The Share Browser Screen Use this screen to create folders, upload files, and edit files within the share. Figure 187 Sharing > Shares > Share Browser The following table describes the labels in this screen. Table 104 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder...
  • Page 341 Chapter 14 Shares Table 104 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Rename Select a folder or file and click this to open a screen. Enter the name you want and click OK to make the changes. Note: When you change a file name, make sure you keep the file extention.
  • Page 342: Moving Or Copying Files

    Chapter 14 Shares 14.5.1 Moving or Copying Files Use this screen to move or copy files to another share. In the Share Browser screen, select a file or folder and click Move or Copy to open the following screen. Figure 188 Sharing > Shares > Share Browser > Move (or Copy) The following table describes the labels in this screen.
  • Page 343: Maintenance Screens

    H A P T E R Maintenance Screens 15.1 Overview This chapter discusses the Maintenance screens. The Maintenance screens allow you to manage system configurations. 15.2 What You Can Do • Use the Power screen (Section 15.3 on page 344) to configure power settings for the NSA, including power saving, UPS, power on/off after power failure, and a power on/off schedule.
  • Page 344: The Power Screen

    Chapter 15 Maintenance Screens 15.3 The Power Screen Use this screen to manage power settings for the NSA. Click Maintenance > Power to display the following screen. Figure 189 Maintenance > Power The following table describes the labels in this screen. Table 106 Maintenance >...
  • Page 345 Chapter 15 Maintenance Screens Table 106 Maintenance > Power (continued) LABEL DESCRIPTION Minimum UPS When you use an APC Uninterruptible Power Supply (UPS) with a USB Capacity connection to the NSA, the NSA shuts itself down if the APC UPS’s battery charge gets down to the percentage you specify in this field.
  • Page 346: Editing The Power Control Schedule Screen

    Chapter 15 Maintenance Screens 15.3.1 Editing the Power Control Schedule Screen Click Maintenance > Power Management > Edit to open this screen. Use this screen to configure power control schedules to have the NSA turn on, turn off, or reboot at specified times. Figure 190 Maintenance >...
  • Page 347 Chapter 15 Maintenance Screens Table 107 Maintenance > Power Management > Edit (continued) LABEL DESCRIPTION Type Select whether this power control schedule has the NSA turn on, turn off, or reboot. Frequency Select whether the NSA is to apply this power control schedule entry on a monthly, weekly, or daily basis.
  • Page 348: The Log Screen

    Chapter 15 Maintenance Screens 15.4 The Log Screen Click Maintenance > Log to open the following screen. Use this screen to display all NSA logs. There are at most 512 entries in the log. Older logs are removed by the system. You cannot download the log file via FTP or CIFS.
  • Page 349: Report Config Screen

    Chapter 15 Maintenance Screens 15.4.1 Report Config Screen In the Log screen, click Report Config do the following: • Use the Email Setting screen (Section 15.4.2 on page 349) to enable and configure e-mail alerts from the NSA. • Use the Report Setting screen (Section 15.4.3 on page 350) to select the type of alerts you want to receive through e-mail and schedule when the NSA e-mails...
  • Page 350: Report Setting

    Chapter 15 Maintenance Screens Table 109 Maintenance > Log > Report Config: Email Setting (continued) LABEL DESCRIPTION Password Enter the password for the e-mail server. Password Re-enter the password to confirm it. (Confirm) After apply Click this to have the NSA send a test e-mail to the settings you have settings, send a entered.
  • Page 351: Syslog Server Setting

    Chapter 15 Maintenance Screens 15.4.4 Syslog Server Setting You can enable the syslog server and select the categories to include in the log report. In the Report Config screen, click the Syslog Server Setting tab to open the following screen. Figure 194 Maintenance >...
  • Page 352: The Configuration Screen

    Chapter 15 Maintenance Screens 15.5 The Configuration Screen Click Maintenance > Configuration to open the following screen. Use this screen to backup or restore the NSA configuration settings. Figure 195 Maintenance > Configuration The following table describes the labels in this screen. Table 112 Maintenance >...
  • Page 353: Ssl Certification

    Chapter 15 Maintenance Screens 15.6 SSL Certification Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that was issued by a known certificate authority. Figure 196 Maintenance >...
  • Page 354 Chapter 15 Maintenance Screens The following table describes the labels in this screen. Table 113 Maintenance > SSL LABEL DESCRIPTION Force HTTPs Select the Force HTTPs option to turn on the NSA’s web browser security. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it.
  • Page 355: Modifying Or Creating A Certificate

    Chapter 15 Maintenance Screens 15.6.1 Modifying or Creating a Certificate When you select the Edit a self-signed CA certificate option, then click the Edit button, a screen opens to allow you to make adjustments to the NSA’s public key certificate. The screen is also the same for the Create a certificate authorized by other CA option Figure 197 Maintenance >...
  • Page 356: The Firmware Upgrade Screen

    15.7 The Firmware Upgrade Screen Use this screen to upgrade the NSA firmware. You should first have downloaded the latest firmware files from the ZyXEL website. Do not turn off the NSA while it is upgrading the firmware or you may render it unusable.
  • Page 357: The Shutdown Screen

    Table 115 Maintenance > FW Upgrade (continued) LABEL DESCRIPTION Periodically Check for Select this to have the NSA regularly check ZyXEL’s server for Latest Firmware updated firmware. The NSA notifies you at login if a new Automatically firmware is available.
  • Page 358: Technical Reference

    Chapter 15 Maintenance Screens When you click the Shutdown button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the shutdown. Figure 201 Maintenance > Shutdown > Confirm Shutdown 15.9 Technical Reference This section provides technical background information on the topics discussed in this chapter.
  • Page 359: Log Messages

    Chapter 15 Maintenance Screens Table 118 Log Severity Levels (continued) LEVEL DESCRIPTION Critical Error Warning Notice Info 15.9.3 Log Messages Here are some example log messages. Table 119 Log Messages CLASS SEVERITY MESSAGE Auto upload INFO %s is queued. Auto upload INFO %s uploaded (Flickr or YouTube Upload).
  • Page 360 Chapter 15 Maintenance Screens Table 119 Log Messages (continued) CLASS SEVERITY MESSAGE Copy/Sync INFO [USB Sync] Deleting %s from Internal Volume. Button Copy/Sync INFO [USB Sync] Deleting %s from USB. Button Copy/Sync INFO [USB Sync] Deleting %s from USB Recursively. Button Copy/Sync INFO...
  • Page 361 Chapter 15 Maintenance Screens Table 119 Log Messages (continued) CLASS SEVERITY MESSAGE Download INFO Download service set max BT upload rate to %d KB/s by Service user Download INFO Download service set max download slot to %d Service Download INFO Download service set seeding time to %d minutues Service Download...
  • Page 362 Chapter 15 Maintenance Screens Table 119 Log Messages (continued) CLASS SEVERITY MESSAGE Download WARNING Download service default torrent location does not exist. Service Load default Groups NOTICE Add new group %s. Groups NOTICE Delete group %s. Network NOTICE %s is active because of changing Port Group. Enable DHCP client.
  • Page 363 Chapter 15 Maintenance Screens Table 119 Log Messages (continued) CLASS SEVERITY MESSAGE Services NOTICE FTP server stops Services NOTICE FTP server starts Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to '%s' Services NOTICE...
  • Page 364 Chapter 15 Maintenance Screens Table 119 Log Messages (continued) CLASS SEVERITY MESSAGE Storage INFO Create External Normal Volume [%s] (%s): SUCCESS Storage INFO Create Internal Volume [%s] (%s): SUCCESS Storage INFO Rename External Volume to [%s]: SUCCESS Storage INFO Scan External Volume: SUCCESS Storage INFO Scan Internal Volume (%s operation): SUCCESS...
  • Page 365 Chapter 15 Maintenance Screens Table 119 Log Messages (continued) CLASS SEVERITY MESSAGE Backup/ ERROR When query remote target [%s]: %s Restore Backup/ INFO Backup job [%s] successfully Restore Backup/ ERROR When backup [%s]: %s Restore Backup/ ERROR When backup [%s], error happens: %s Restore Backup/ INFO...
  • Page 366 Chapter 15 Maintenance Screens NSA210 User’s Guide...
  • Page 367: Protecting Your Data

    H A P T E R Protecting Your Data 16.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 16.2 Protection Methods There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.
  • Page 368: Configuration File Backup And Restoration

    Chapter 16 Protecting Your Data 16.3 Configuration File Backup and Restoration Use the Maintenance > Configuration menus to create a file of your NSA configurations such as passwords, shares and volumes created, network settings and so on. If you’re going to do some major configuration changes, then it is advisable to create a configuration backup file.
  • Page 369 Chapter 16 Protecting Your Data Since a computer restart is required, close your other files and programs before installing the Memeo Autobackup software. Insert the included CD into your CD-ROM drive. Click the Tools icon in the screen that displays. Then click Memeo Instant Backup Software. Note: If this screen does not display, use Windows Explorer (My Computer) to go to the CD-ROM (commonly drive D).
  • Page 370 Chapter 16 Protecting Your Data In this screen, select the items that you want to back up. Figure 204 Backup Items This screen lists the items you selected for backup. Confirm your selections and click Next. Figure 205 Confirm Backup Items NSA210 User’s Guide...
  • Page 371: Using Memeo Autobackup After The Initial Setup

    Chapter 16 Protecting Your Data Specify a name for your backup plan (or just use the default). Click Next and then Done. Figure 206 Backup Plan Name 16.4.2 Using Memeo Autobackup After the Initial Setup After you have installed and configured Memeo Autobackup, double-click the icon in the system tray to open the program’s start screen.
  • Page 372 Chapter 16 Protecting Your Data NSA210 User’s Guide...
  • Page 373: Using Time Machine With The Nsa

    H A P T E R Using Time Machine with the 17.1 Overview Time Machine is a backup system provided by Mac OS X. It automatically backs up everything on your Mac, including pictures, music, videos, documents, applications, and settings. This chapter helps you to enable Time Machine in OS X to allow and use your NSA as a backup volume.
  • Page 374 Chapter 17 Using Time Machine with the NSA Login to your NSA. Click Sharing > Users to display the Users screen. Click Add User. Enter user1 as the Username and 12345 as the New Password. Retype the password to confirm. Then click Apply to finish adding the new user account. User1 will be added to the list on the Users screen.
  • Page 375: Set Time Machine To Support Network Volume

    Chapter 17 Using Time Machine with the NSA Enter share01 as the Share Name. In the Make this share owned by list, select user1. Then in the Share Access list, select Keep it private to owner. Click Apply to save the settings. Share01 is added to the list on the Shares screen.
  • Page 376 Chapter 17 Using Time Machine with the NSA Click Finder > Go > Utilities to open the Utilities window. Open the Terminal application. Enter the following in Terminal: defaults write com.apple.systempreferences TMShowUnsupportedNetworkVolumes 1 then press [Enter]. This allows Time Machine to support a network volume. Reboot your computer. NSA210 User’s Guide...
  • Page 377: Mounting The Nsa On The Mac

    Chapter 17 Using Time Machine with the NSA 17.4 Mounting the NSA on the Mac Now you need to mount share01 on the NSA to your computer. This is the place where you will backup your files. Click Finder > Go > Connect to Server. The Connect to Server window opens. In the Sever Address box, enter: smb://username@ip-address-of-nas/backup- folder.
  • Page 378: Creating A Sparse Bundle File For The Nsa

    Chapter 17 Using Time Machine with the NSA 17.5 Creating a Sparse Bundle File for the NSA Now you need to create a sparse bundle disk image file, which is a virtual file system image that Time Machine can backup your files. It should be created locally on the Mac and then mounted to share01 of the NSA.
  • Page 379: Creating A Sparse Bundle File

    Chapter 17 Using Time Machine with the NSA Press [Enter] to display the MAC address. 17.5.2 Creating a Sparse Bundle File There are two ways to create a sparse bundle disk image file. You can use Disk Utility or Terminal. 17.5.2.1 Disk Utility Click Finder >...
  • Page 380 Chapter 17 Using Time Machine with the NSA Click File > New > Blank Disk Image. In the New Blank Image screen, do the following: Enter the name of the sparse bundle in Save As. The format of the name is “ComputerName_MacAddress”.
  • Page 381 Chapter 17 Using Time Machine with the NSA Note: Set the Volume Size after you’ve set Image Format to sparse bundle disk The size of a sparse bundle file is smaller than the full physical size image. because it only takes up as much actual disk space as the data contained within (without unused space).
  • Page 382: Mounting The Sparse Bundle To The Nsa

    Chapter 17 Using Time Machine with the NSA 17.5.3 Mounting the Sparse Bundle to the NSA After the sparse bundle file is created on the desktop or Home folder, copy the file to share01 of the NSA. Open share01 on your NSA. There should be a sparse bundle folder. This is the place where all your backup files from Time Machine will be.
  • Page 383 Chapter 17 Using Time Machine with the NSA Click Apple > System Preferences. Then go to System and select Time Machine. Turn Time Machine ON. Then click Change Disk. Select share01 as the backup disk. Then click Use for Backup. NSA210 User’s Guide...
  • Page 384 Chapter 17 Using Time Machine with the NSA When prompted, the username and password of share01, enter user1/12345. Then click Connect. Time Machine starts backing up files to share01 after 120 seconds. If you want to backup immediately, click Time Machine icon and select Backup Now. The screen shows the status of the backup once the process begins.
  • Page 385: Troubleshooting

    H A P T E R Troubleshooting 18.1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware, Connections, and LEDs • NAS Starter Utility •...
  • Page 386: Power, Hardware, Connections, And Leds

    Chapter 18 Troubleshooting 18.2 Power, Hardware, Connections, and LEDs The NSA PWR LED does not turn on (no LEDs are on). • Make sure the NSA is turned on. • Make sure you are using the power adaptor or cord included with the NSA. •...
  • Page 387 Chapter 18 Troubleshooting I want to install another hard disk in my NSA. • The NSA has one internal hard disk bay. It can only support one internal hard disk. • You can attach an external (SATA) hard disk to your NSA. Use the eSATA port in the rear panel of the device.
  • Page 388 Chapter 18 Troubleshooting You need to turn the external (SATA) hard disk into a volume using the Storage > Volume screen before the NSA can use it. In the process, all existing data in the hard disk is deleted. The LAN LED (by the LAN port) is off. •...
  • Page 389: Nas Starter Utility

    Chapter 18 Troubleshooting 18.3 NAS Starter Utility The NAS Starter Utility cannot discover my NSA. • Close the NAS Starter Utility and reopen it. • Check your hardware connections and make sure they are set up correctly. • Only one instance of the NAS Starter Utility can run on your computer. Make sure you close any duplicate windows for this application.
  • Page 390: Nsa Login And Access

    Chapter 18 Troubleshooting Connect the hard disk to your Windows computer (follow the instructions of your hard disk manufacturer on how to do this). Go to My Computer > Manage > Disk Management. Locate the hard disk (on some systems, the hard disk shows up as the disk without a drive letter assigned to it).
  • Page 391 Chapter 18 Troubleshooting • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility. • If the server name has changed and you don’t have the NAS Starter Utility, see Section 18.4.1 on page 392 to use the RESET button to return the default setting.
  • Page 392: Reset The Nsa

    Chapter 18 Troubleshooting • Make sure your Internet browser does not block pop-up windows and has JavaScript and Java enabled. See Appendix B on page 447. With Internet Explorer 6, you may also have to enable scripting of safe ActiveX controls. See Section 18.4.2 on page 392.
  • Page 393 Chapter 18 Troubleshooting In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 208 Internet Options: Security Click the Custom Level... button. Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default). Click OK to close the window.
  • Page 394: I Cannot Access The Nsa

    Chapter 18 Troubleshooting I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly. The default username is admin, and the default password is 1234. These fields are case- sensitive, so make sure [Caps Lock] is not on.
  • Page 395: Users Cannot Access The Nsa

    Chapter 18 Troubleshooting • Check if there are any existing mapped network drives to the NSA. You may need to disconnect existing mapped network drives as a new mapped network drive connection may use (different) previously-saved login information. To do this, open Windows Explorer and click Tools >...
  • Page 396 Chapter 18 Troubleshooting • Check if the user belongs to a group with conflicting access rights. DENY always takes precedence. If you allow a user FULL access to a share but set his group to DENY, then he will NOT be able to access the share. •...
  • Page 397: Storage Volumes

    Chapter 18 Troubleshooting 18.7 Storage Volumes I want to use my external (SATA) hard disk to create a RAID 1 volume but I cannot see RAID 1 in the list when I click Create a SATA volume. • Refer to Section 4.6.1 on page 86 for a tutorial on how to create a RAID 1 volume.
  • Page 398: External Usb Drives

    Chapter 18 Troubleshooting • If you are using RAID 1 and the hard disk inside the NSA fails but the eSATA hard disk is still working, you can remove the hard disk inside the NSA and install the eSATA hard disk inside the NSA. Your NSA runs normally again, but you will need to have another eSATA hard disk attached to the NSA in order to employ RAID 1.
  • Page 399: Networking

    Chapter 18 Troubleshooting On your Windows computer, click Start > Run or open a web browser. Enter \\nsa210 (default) or the Server Name you assigned the NSA. This shows you the folders in the NSA. Use drag-and-drop or copy-and-paste to transfer files over to your NSA. •...
  • Page 400: Some Features' Screens Do Not Display

    Chapter 18 Troubleshooting One of the computers in my network cannot use the printer I connected to the NSA. • You must install the printer driver on each computer that will use the printer. • Check Section 18.4 on page 390 and check for related connectivity issues.
  • Page 401: Media Server Functions

    Chapter 18 Troubleshooting 18.13 Media Server Functions I set the media server function to publish a folder, but some of the files in the folder do not display in the list on the media client. Files with formats that are not supported on the media server may not display in the list.
  • Page 402 Chapter 18 Troubleshooting I published a folder with the media server function, but the media client does not play some of the files (or does not play them properly). Files with formats that are not supported on the media server may not display in the list.
  • Page 403 Chapter 18 Troubleshooting Then click the NSA’s link to reconnect. Figure 212 iTunes Reconnected Another way to get the NSA’s iTunes server function to scan the published media server folders for files is to go to Applications > Media Server and disable and re-enable the iTunes server option.
  • Page 404: Download Service And Broadcatching Functions

    Chapter 18 Troubleshooting 18.14 Download Service and Broadcatching Functions The download list or broadcatching items are missing after I removed a hard drive. The NSA’s download and broadcatching lists are stored on the system volume. If you have two JBOD volumes, it is possible to remove one and still use the other. However if you remove the system volume, you may lose the download and broadcasting lists.
  • Page 405: Web Publishing

    Chapter 18 Troubleshooting 18.15 Web Publishing A web-published share cannot be accessed by web browser from the Internet. • Make sure the person trying to access the share is using the correct web address (and port number if the NSA’s web publishing feature is not using port 80).
  • Page 406: Auto Upload

    Chapter 18 Troubleshooting Table 121 Ports Blocked By Default in Firefox PORT SERVICE PORT SERVICE PORT SERVICE time loc-srv IMAP+SSL epmap name netbios POP3+SSL nicname IMAP2 2049 domain 4045 lockd priv-rjs LDAP 6000 finger SMTP+SSL ttylink print exec • Make sure your ISP allows you to run a server and is not blocking the port number of the NSA’s web publishing feature.
  • Page 407: Package Management

    Chapter 18 Troubleshooting Make sure the file size does not exceed the limit imposed by the service. At the time of writing, Flickr restricts the file size to 10 MB, and YouTube restricts the file size to 100 MB. Make sure you did not exceed the service’s upload quota. Flickr and YouTube have different policies about how much you can upload within a certain period, for example, 100 MB/week.
  • Page 408: Backups

    Chapter 18 Troubleshooting 18.18 Backups I cannot make a backup. • Check that enough space is available on the external disk. If there isn’t you may need to purge older backups or delete other files on the backup USB disk or NSA (see Section 10.9 on page 277).
  • Page 409: Product Specifications

    H A P T E R Product Specifications See also Chapter 1 on page 23 for a general overview of the key features. 19.1 Physical Features These are the main external physical features. Table 122 Physical Features USB Ports 2 USB (version 2) ports. Copy or sync files directly from the NSA to compatible USB devices like card readers, MP3 players, mass storage devices, and digital cameras without using a computer.
  • Page 410: Firmware Features

    Chapter 19 Product Specifications Table 122 Physical Features Power Button Press the Power button for one second to turn it on. Turn off the NSA before unplugging the device. Press the Power button for 3 seconds until you hear one beep, then release it. The NSA goes starts to shutdown its software and turns off.
  • Page 411 Chapter 19 Product Specifications Table 123 Firmware Features Client Support Data can be shared among all Windows, Mac, Linux, and UNIX users that have FTP client software or CIFS file sharing support (such as Samba for Linux and UNIX users). The NSA is also a DLNA-certified media server that lets DLNA-compliant media clients play video, audio, and photo content files stored on the NSA.
  • Page 412: Specification Tables

    Chapter 19 Product Specifications Table 123 Firmware Features Dynamic DNS allows you to update your current DyDNS dynamic IP address with a dynamic DNS service so that anyone can contact you (in NetMeeting, CUSeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an...
  • Page 413 Chapter 19 Product Specifications Table 124 NSA Hardware Specifications (continued) USB v2.0 Storage One port in the back panel and one port in the front panel. Windows: NTFS, FAT32 and FAT16 Linux: ReiserFS, XFS, EXT2, and EXT3. eSATA port One port in the back panel. LEDs PWR, SYSTEM, HDD, eSATA, USB and COPY.
  • Page 414 Chapter 19 Product Specifications Table 125 NSA Firmware Specifications (continued) Maximum Number of Concurrent FTP Sessions Maximum Number of Concurrent CIFS Sessions System Management Remote Management via Web Configurator (HTTP) NAS Starter Utility Logging/Monitoring Centralized Logs Firmware Upgrade Web Configurator Web Browsers Supported Internet Explorer 6.0 and later versions Firefox 2.00 and later versions...
  • Page 415 Chapter 19 Product Specifications Table 126 Supported Standards and Recommendations ISO 15740 Picture Transfer Protocol (PTP) from the International imaging Industry Association allows you to transfer pictures from digital cameras or other devices without needing additional device drivers. RFC 1001 (STD-19) - Protocol standard for NetBIOS service on a TCP/UDP transport: Concepts and methods RFC 1002...
  • Page 416: Supported Media Server Content Formats

    Chapter 19 Product Specifications 19.4 Supported Media Server Content Formats The following describes the details about the files that the NSA media server can publish. Table 127 Supported Media Server Content Formats CATEGORY FILE TYPE EXTENSION Video MPEG-1/MPEG-2 dat, dvr-ms, iso, m1v, m2p, m2t, m2v, mp2, mpe, mpeg, mpeg2, mpg, mpg2, ts, vob, m2ts, tts MPEG-4 m4v, mp4...
  • Page 417: Supported Itunes Server Content Formats

    Chapter 19 Product Specifications Table 127 Supported Media Server Content Formats CATEGORY FILE TYPE EXTENSION JPEG jpe, jpeg, jpg Note: Not all published file types can be viewed by all client applications. 19.5 Supported iTunes Server Content Formats At the time of writing, the NSA’s supports iTunes versions 7 through 9 and publishing mp3, m4a, m4p, wav, mp4, and m4v format audio files.
  • Page 418 Chapter 19 Product Specifications NSA210 User’s Guide...
  • Page 419: Appendix A Setting Up Your Computer's Ip Address

    P P E N D I X Setting Up Your Computer’s IP Address Note: Your specific NSA may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
  • Page 420 Appendix A Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. Click Start > Control Panel. In the Control Panel, click the Network Connections icon. NSA210 User’s Guide...
  • Page 421 Appendix A Setting Up Your Computer’s IP Address Right-click Local Area Connection and then select Properties. On the General tab, select Internet Protocol (TCP/IP) and then click Properties. NSA210 User’s Guide...
  • Page 422 Appendix A Setting Up Your Computer’s IP Address The Internet Protocol TCP/IP Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 423 Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. In the Control Panel, click the Network and Internet icon. Click the Network and Sharing Center icon. NSA210 User’s Guide...
  • Page 424 Appendix A Setting Up Your Computer’s IP Address Click Manage network connections. Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NSA210 User’s Guide...
  • Page 425 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NSA210 User’s Guide...
  • Page 426 Appendix A Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 427 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Click Start > All Programs > Accessories > Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information.
  • Page 428 Appendix A Setting Up Your Computer’s IP Address Click Change adapter settings. Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NSA210 User’s Guide...
  • Page 429 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NSA210 User’s Guide...
  • Page 430 Appendix A Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 431 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Click Start > All Programs > Accessories > Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3.
  • Page 432 Appendix A Setting Up Your Computer’s IP Address In the System Preferences window, click the Network icon. When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. NSA210 User’s Guide...
  • Page 433 Appendix A Setting Up Your Computer’s IP Address For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. •...
  • Page 434 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 213 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6.
  • Page 435 Appendix A Setting Up Your Computer’s IP Address In System Preferences, click the Network icon. When the Network preferences pane opens, select Ethernet from the list of available connection types. From the Configure list, select Using DHCP for dynamically assigned settings. NSA210 User’s Guide...
  • Page 436 Appendix A Setting Up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. •...
  • Page 437 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 214 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
  • Page 438 Appendix A Setting Up Your Computer’s IP Address Follow the steps below to configure your computer IP address in GNOME: Click System > Administration > Network. When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
  • Page 439 Appendix A Setting Up Your Computer’s IP Address In the Authenticate window, enter your admin account name and password then click the Authenticate button. In the Network Settings window, select the connection that you want to configure, then click Properties. NSA210 User’s Guide...
  • Page 440 Appendix A Setting Up Your Computer’s IP Address The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address.
  • Page 441 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly.
  • Page 442 Appendix A Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
  • Page 443 Appendix A Setting Up Your Computer’s IP Address When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. NSA210 User’s Guide...
  • Page 444 Appendix A Setting Up Your Computer’s IP Address When the Network Card Setup window opens, click the Address tab Figure 216 openSUSE 10.3: Network Card Setup Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
  • Page 445 Appendix A Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties.
  • Page 446 Appendix A Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 218 openSUSE: Connection Status - KNetwork Manager NSA210 User’s Guide...
  • Page 447: Appendix B Pop-Up Windows, Javascript And Java Permissions

    P P E N D I X Pop-up Windows, JavaScript and Java Permissions In order to use the Web Configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8.
  • Page 448 Appendix B Pop-up Windows, JavaScript and Java Permissions In Internet Explorer, select Tools, Internet Options, Privacy. Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 220 Internet Options: Privacy Click Apply to save this setting.
  • Page 449 Appendix B Pop-up Windows, JavaScript and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 221 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. NSA210 User’s Guide...
  • Page 450 Appendix B Pop-up Windows, JavaScript and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 222 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScript If pages of the Web Configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
  • Page 451 Appendix B Pop-up Windows, JavaScript and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 223 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
  • Page 452 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 224 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
  • Page 453 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 225 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. NSA210 User’s Guide...
  • Page 454 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 226 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, JavaScript and pop-ups in one screen.
  • Page 455 Appendix B Pop-up Windows, JavaScript and Java Permissions Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 228 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly. NSA210 User’s Guide...
  • Page 456 Appendix B Pop-up Windows, JavaScript and Java Permissions Allowing Pop-Ups From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer to handle pop-ups and select Open all pop-ups. Figure 229 Opera: Allowing Pop-Ups NSA210 User’s Guide...
  • Page 457 Appendix B Pop-up Windows, JavaScript and Java Permissions Enabling Java From Opera, click Tools, then Preferences. In the Advanced tab, select Content from the left-side menu. Select the check boxes as shown in the following screen. Figure 230 Opera: Enabling Java To customize JavaScript behavior in the Opera browser, click JavaScript Options.
  • Page 458 Appendix B Pop-up Windows, JavaScript and Java Permissions NSA210 User’s Guide...
  • Page 459: Appendix C Common Services

    Border Gateway Protocol. BOOTP_CLIENT DHCP Client. BOOTP_SERVER DHCP Server. CU-SEEME 7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. NSA210 User’s Guide...
  • Page 460 Appendix C Common Services Table 129 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION User-Defined The IPSEC ESP (Encapsulation (IPSEC_TUNNEL) Security Protocol) tunneling protocol uses this service. FINGER Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
  • Page 461 Appendix C Common Services Table 129 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL User-Defined PPTP (Point-to-Point Tunneling (GRE) Protocol) enables secure transfer of data over public networks.
  • Page 462 Appendix C Common Services Table 129 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE 7000 Another videoconferencing solution.
  • Page 463: Appendix D Importing Certificates

    However, because the certificates were not issued by one of the several organizations officially recognized by the most common web browsers, you will need to import the ZyXEL-created certificate into your web browser and flag that certificate as a trusted authority.
  • Page 464 Appendix D Importing Certificates If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 232 Internet Explorer 7: Certification Error Click Continue to this website (not recommended). Figure 233 Internet Explorer 7: Certification Error In the Address Bar, click Certificate Error >...
  • Page 465 Appendix D Importing Certificates In the Certificate dialog box, click Install Certificate. Figure 235 Internet Explorer 7: Certificate In the Certificate Import Wizard, click Next. Figure 236 Internet Explorer 7: Certificate Import Wizard NSA210 User’s Guide...
  • Page 466 Appendix D Importing Certificates If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 237 Internet Explorer 7: Certificate Import Wizard Otherwise, select Place all certificates in the following store and then click Browse.
  • Page 467 Appendix D Importing Certificates In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK. Figure 239 Internet Explorer 7: Select Certificate Store In the Completing the Certificate Import Wizard screen, click Finish. Figure 240 Internet Explorer 7: Certificate Import Wizard NSA210 User’s Guide...
  • Page 468 Figure 242 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
  • Page 469 Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
  • Page 470 Appendix D Importing Certificates Open Internet Explorer and click Tools > Internet Options. Figure 246 Internet Explorer 7: Tools Menu In the Internet Options dialog box, click Content > Certificates. Figure 247 Internet Explorer 7: Internet Options NSA210 User’s Guide...
  • Page 471 Appendix D Importing Certificates In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 248 Internet Explorer 7: Certificates In the Certificates confirmation, click Yes. Figure 249 Internet Explorer 7: Certificates In the Root Certificate Store dialog box, click Yes.
  • Page 472 Appendix D Importing Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 473 Figure 252 Firefox 2: Page Info Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
  • Page 474 Appendix D Importing Certificates Open Firefox and click Tools > Options. Figure 253 Firefox 2: Tools Menu In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 254 Firefox 2: Options NSA210 User’s Guide...
  • Page 475 Appendix D Importing Certificates In the Certificate Manager dialog box, click Web Sites > Import. Figure 255 Firefox 2: Certificate Manager Use the Select File dialog box to locate the certificate and then click Open. Figure 256 Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info >...
  • Page 476 Appendix D Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. Open Firefox and click Tools > Options. Figure 257 Firefox 2: Tools Menu In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 258 Firefox 2: Options NSA210 User’s Guide...
  • Page 477 Appendix D Importing Certificates In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 259 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 260 Firefox 2: Delete Web Site Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 478 Appendix D Importing Certificates If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Click Install to accept the certificate. Figure 261 Opera 9: Certificate signer not found The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
  • Page 479 Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
  • Page 480 Appendix D Importing Certificates In Preferences, click Advanced > Security > Manage certificates. Figure 264 Opera 9: Preferences NSA210 User’s Guide...
  • Page 481 Appendix D Importing Certificates In the Certificates Manager, click Authorities > Import. Figure 265 Opera 9: Certificate manager Use the Import certificate dialog box to locate the certificate and then click Open. Figure 266 Opera 9: Import certificate NSA210 User’s Guide...
  • Page 482 Appendix D Importing Certificates In the Install authority certificate dialog box, click Install. Figure 267 Opera 9: Install authority certificate Next, click OK. Figure 268 Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
  • Page 483 Appendix D Importing Certificates Open Opera and click Tools > Preferences. Figure 269 Opera 9: Tools Menu In Preferences, Advanced > Security > Manage certificates. Figure 270 Opera 9: Preferences NSA210 User’s Guide...
  • Page 484 Appendix D Importing Certificates In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 271 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 485 Appendix D Importing Certificates Click Continue. Figure 272 Konqueror 3.5: Server Authentication Click Forever when prompted to accept the certificate. Figure 273 Konqueror 3.5: Server Authentication Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details.
  • Page 486 Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
  • Page 487 Appendix D Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page’s security details. Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. Open Konqueror and click Settings >...
  • Page 488 Appendix D Importing Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button. NSA210 User’s Guide...
  • Page 489: Appendix E Open Source Licences

    BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. IF YOU DO NOT AGREE TO THESE TERMS, THEN ZyXEL IS UNWILLING TO LICENSE THE SOFTWARE TO YOU, IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED OR ZyXEL, AND YOUR MONEY WILL BE REFUNDED.
  • Page 490 Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
  • Page 491 SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF...
  • Page 492 Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed.
  • Page 493 Documentation shall not be assigned by you without the prior written consent of ZyXEL. Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of this...
  • Page 494 Appendix E Open Source Licences This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.
  • Page 495 Appendix E Open Source Licences General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library.
  • Page 496 Appendix E Open Source Licences may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables.
  • Page 497 Appendix E Open Source Licences entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole.
  • Page 498 Appendix E Open Source Licences However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License.
  • Page 499 Appendix E Open Source Licences than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy.
  • Page 500 Appendix E Open Source Licences rights granted herein. You are not responsible for enforcing compliance by third parties with this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
  • Page 501 Appendix E Open Source Licences permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
  • Page 502 Appendix E Open Source Licences Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
  • Page 503 Appendix E Open Source Licences have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0.
  • Page 504 Appendix E Open Source Licences itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
  • Page 505 Appendix E Open Source Licences place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.
  • Page 506 Appendix E Open Source Licences 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded.
  • Page 507 Appendix E Open Source Licences IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein, if any, are the property of their respective owners. This Product includes mediainfo software under below license MediaInfo(Lib) License Version 1.1, 3 January 2010...
  • Page 508 Appendix E Open Source Licences GNU LESSER GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3 of the GNU General Public License, supplemented by the additional permissions listed below.
  • Page 509 Appendix E Open Source Licences If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be supplied by an Application that uses the facility (other than as an argument passed when the facility is invoked), then you may convey a copy of the modified version: •a) under this License, provided that you make a good faith effort to ensure that, in the event an Application does not supply the function or data, the facility still...
  • Page 510 Appendix E Open Source Licences that permit, the user to recombine or relink the Application with a modified version of the Linked Version to produce a modified Combined Work, in the manner specified by section 6 of the GNU GPL for conveying Corresponding Source.
  • Page 511 Appendix E Open Source Licences not specify a version number of the GNU Lesser General Public License, you may choose any version of the GNU Lesser General Public License ever published by the Free Software Foundation. If the Library as you received it specifies that a proxy can decide whether future versions of the GNU Lesser General Public License shall apply, that proxy's public statement of acceptance of any version is permanent authorization for you to choose that version for the Library.
  • Page 512 Appendix E Open Source Licences must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.
  • Page 513 Appendix E Open Source Licences A “covered work” means either the unmodified Program or a work based on the Program. To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy.
  • Page 514 Appendix E Open Source Licences includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.
  • Page 515 Appendix E Open Source Licences You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code;...
  • Page 516 Appendix E Open Source Licences •a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange. •b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a...
  • Page 517 Appendix E Open Source Licences industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product. “Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source.
  • Page 518 Appendix E Open Source Licences Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: •a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License;...
  • Page 519 Appendix E Open Source Licences will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
  • Page 520 Appendix E Open Source Licences You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.
  • Page 521 Appendix E Open Source Licences to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it. A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License.
  • Page 522 Appendix E Open Source Licences spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version”...
  • Page 523 Appendix E Open Source Licences If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
  • Page 524 Appendix E Open Source Licences Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it. For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software.
  • Page 525 Appendix E Open Source Licences To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well.
  • Page 526 Appendix E Open Source Licences is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work.
  • Page 527 Appendix E Open Source Licences 4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code;...
  • Page 528 Appendix E Open Source Licences 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: •a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
  • Page 529 Appendix E Open Source Licences determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product.
  • Page 530 Appendix E Open Source Licences When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.
  • Page 531 Appendix E Open Source Licences Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way. 8. Termination. You may not propagate or modify a covered work except as expressly provided under this License.
  • Page 532 Appendix E Open Source Licences organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.
  • Page 533 Appendix E Open Source Licences that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid. If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them...
  • Page 534 Appendix E Open Source Licences License, section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
  • Page 535 Appendix E Open Source Licences A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability...
  • Page 536 Appendix E Open Source Licences Also add information on how to contact you by electronic and paper mail. If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode: <program> Copyright (C) <year> <name of author> This program comes with ABSOLUTELY NO WARRANTY;...
  • Page 537 Appendix E Open Source Licences Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS E ARE DISCLAIMED.
  • Page 538 Appendix E Open Source Licences recommend this License principally for works whose purpose is instruction or reference. 1. APPLICABILITY AND DEFINITIONS This License applies to any manual or other work, in any medium, that contains a notice placed by the copyright holder saying it can be distributed under the terms of this License.
  • Page 539 Appendix E Open Source Licences Transparent. An image format is not Transparent if used for any substantial amount of text. A copy that is not "Transparent" is called "Opaque". Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modification.
  • Page 540 Appendix E Open Source Licences If you publish printed copies (or copies in media that commonly have printed covers) of the Document, numbering more than 100, and the Document's license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the back cover.
  • Page 541 Appendix E Open Source Licences responsible for authorship of the modifications in the Modified Version, together with at least five of the principal authors of the Document (all of its principal authors, if it has fewer than five), unless they release you from this requirement. C.
  • Page 542 Appendix E Open Source Licences M. Delete any section Entitled "Endorsements". Such a section may not be included in the Modified Version. N. Do not retitle any existing section to be Entitled "Endorsements" or to conflict in title with any Invariant Section. O.
  • Page 543 Appendix E Open Source Licences number. Make the same adjustment to the section titles in the list of Invariant Sections in the license notice of the combined work. In the combination, you must combine any sections Entitled "History" in the various original documents, forming one section Entitled "History";...
  • Page 544 Appendix E Open Source Licences translations of some or all Invariant Sections in addition to the original versions of these Invariant Sections. You may include a translation of this License, and all the license notices in the Document, and any Warranty Disclaimers, provided that you also include the original English version of this License and the original versions of those notices and disclaimers.
  • Page 545 Appendix E Open Source Licences Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the "with...Texts." line with this: with the Invariant Sections being LIST THEIR TITLES, with the Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST.
  • Page 546 Appendix E Open Source Licences 1.5. "Executable" means Covered Code in any form other than Source Code. 1.6. "Initial Developer" means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit 1.7. "Larger Work" means a work which combines Covered Code or portions thereof with code not governed by the terms of this License.
  • Page 547 Appendix E Open Source Licences and apparatus claims, in any patent Licensable by grantor. 1.11. "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice.
  • Page 548 Appendix E Open Source Licences (a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and (b) under Patents Claims infringed by the making, using or selling of Original Code, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the...
  • Page 549 Appendix E Open Source Licences and/or as part of a Larger Work; and (b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: 1) Modifications made by that Contributor (or portions thereof);...
  • Page 550 Appendix E Open Source Licences Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute.
  • Page 551 Appendix E Open Source Licences the Modification is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code.
  • Page 552 Appendix E Open Source Licences Representations. Contributor represents that, except as disclosed pursuant to Section 3.4(a) above, Contributor believes that Contributor's Modifications are Contributor's original creation(s) and/or Contributor has sufficient rights to grant the rights conveyed by this license. 3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code.
  • Page 553 Appendix E Open Source Licences 3.6. Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code, and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License, including a description of how and where You have fulfilled the obligations of Section 3.2.
  • Page 554 Appendix E Open Source Licences Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Code. 4. Inability to Comply Due to Statute or Regulation. If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible;...
  • Page 555 Appendix E Open Source Licences of any subsequent version of the License published by Netscape. No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License. 6.3. Derivative Works. If You create or use a modified version of this License (which you may only do in order to apply it to code which is not already Covered Code governed by this License), You must (a) rename Your license so that the phrases "Mozilla", "MOZILLAPL", "MOZPL", "Netscape",...
  • Page 556 Appendix E Open Source Licences 8. TERMINATION. 8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License.
  • Page 557 Appendix E Open Source Licences the 60 day notice period specified above. (b) any software, hardware, or device, other than such Participant's Contributor Version, directly or indirectly infringes any patent, then any rights granted to You by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the date You first made, used, sold, distributed, or had made, Modifications made by that Participant.
  • Page 558 Appendix E Open Source Licences SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.
  • Page 559 Appendix E Open Source Licences without limitation, court costs and reasonable attorneys' fees and expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License.
  • Page 560 Appendix E Open Source Licences Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. The Original Code is ______________________________________.
  • Page 561 Appendix E Open Source Licences Copyright (c) 1997-2003 Jochen Wiedmann You may distribute under the terms of either the GNU General Public License or the Artistic License, as specified in the Perl README file. This Product includes sg3_utils software under below license Upstream Authors: Douglas Gilbert <dgilbert at interlog dot com>, Bruce Allen <ballen at gravity dot phys dot uwm dot edu>, Peter Allworth <linsol at zeta dot org dot au>,...
  • Page 562 Appendix E Open Source Licences freely by others. On Debian systems, the complete text of the BSD License can be found in `/usr/share/common-licenses/BSD'. This Product includes DBI software under below license The DBI module is Copyright (c) 1994-2008 Tim Bunce. Ireland. All rights reserved.
  • Page 563 Appendix E Open Source Licences Currently, some Boost libraries have their own licenses. The hope is that eventually all Boost libraries will be covered by the Boost Software License. In the meantime, all libraries comply with the Boost License requirements. HISTORY As Boost grew, it became unmanageable for each Boost file to have its own license.
  • Page 564 Appendix E Open Source Licences do so, all subject to the following: The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solely in the form of machine-executable object code generated by a source language processor.
  • Page 565 Appendix E Open Source Licences own experiences with software licensing and distribution and, if they're careful, will want to carefully review each license, even if they've been told that they're all standard. I would expect that, unless we're remarkably brilliant (or lucky) in drafting the standard Boost license, the standard license won't satisfy the legal departments of all corporations.
  • Page 566 Appendix E Open Source Licences How should Boost programmers apply the license to source and header files? Add a comment based on the following template, substituting appropriate text for the italicized portion: Copyright Joe Coder 2004 - 2006. // Distributed under the Boost Software License, Version 1.0. (See accompanying file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) Please leave an empty line before and after the above comment block.
  • Page 567 Appendix E Open Source Licences of self-extracting archives of source code or precompiled header files. More detailed wording was rejected as not being legally necessary, and reducing readability. Why is the "disclaimer" paragraph of the license entirely in uppercase? Capitalization of these particular provisions is a US legal mandate for consumer protection.
  • Page 568 Appendix E Open Source Licences TRANSITION To ease the transition of the code base towards the new common license, several people decided to give a blanket permission for all their contributions to use the new license. This hopefully helps maintainers to switch to the new license once the list contains enough names without asking over and over again for each change.
  • Page 569 Appendix E Open Source Licences Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder. License Issues Curl and libcurl are released under a MIT/X derivate license.
  • Page 570 Appendix E Open Source Licences The MIT/X derivate license practically allows you to do almost anything with the sources, on the condition that the copyright texts in the sources are left intact. 6.6 Can you please change the curl/libcurl license to XXXX? We have carefully picked this license after years of development and discussions and a large amount of people have contributed with source code knowing that this is the license we use.
  • Page 571 Appendix E Open Source Licences This Product includes httpd software under below license Apache HTTP Server Copyright 2008 The Apache Software Foundation. This product includes software developed at The Apache Software Foundation (http://www.apache.org/). Portions of this software were developed at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign.
  • Page 572 Appendix E Open Source Licences "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity.
  • Page 573 Appendix E Open Source Licences (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship.
  • Page 574 Appendix E Open Source Licences on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the...
  • Page 575 Appendix E Open Source Licences 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License;...
  • Page 576 Appendix E Open Source Licences documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License.
  • Page 577 Appendix E Open Source Licences 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7.
  • Page 578 Appendix E Open Source Licences has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License.
  • Page 579 Appendix E Open Source Licences Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS"...
  • Page 580 Appendix E Open Source Licences * mod_mime_magic: MIME type lookup via file magic numbers * Copyright (c) 1996-1997 Cisco Systems, Inc. * This software was submitted by Cisco Systems to the Apache Group in July * 1997. Future revisions and derivatives of this source code must * acknowledge Cisco Systems as the original contributor of this module.
  • Page 581 Appendix E Open Source Licences * explicit claim or by omission. Since few users ever read sources, credits * must appear in the documentation. * 3. Altered versions must be plainly marked as such, and must not be * misrepresented as being the original software. Since few users ever read * sources, credits must appear in the documentation.
  • Page 582 Appendix E Open Source Licences * 605 E. Springfield, Champaign, IL 61820 * httpd@ncsa.uiuc.edu * Copyright (C) 1995, Board of Trustees of the University of Illinois ***************************************************************** ******* * md5.c: NCSA HTTPd code which uses the md5c.c RSA Code * Original Code Copyright (C) 1994, Jeff Hostetler, Spyglass, Inc. * Portions of Content-MD5 code Copyright (C) 1993, 1994 by Carnegie Mellon University (see Copyright below).
  • Page 583 Appendix E Open Source Licences * Permission to use, copy, modify, distribute, and sell this software * and its documentation for any purpose is hereby granted without * fee, provided that the above copyright notice appear in all copies * and that both that copyright notice and this permission notice * appear in supporting documentation, and that the name of Carnegie * Mellon University not be used in advertising or publicity * pertaining to distribution of the software without specific,...
  • Page 584 Appendix E Open Source Licences * Copyright (c) 1991 Bell Communications Research, Inc. (Bellcore) * Permission to use, copy, modify, and distribute this material * for any purpose and without fee is hereby granted, provided * that the above copyright notice and this permission notice * appear in all copies, and that the name of Bellcore not be * used in advertising or publicity pertaining to this * material without the specific, prior written permission...
  • Page 585 Appendix E Open Source Licences rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc.
  • Page 586 Appendix E Open Source Licences * The RSA copyright statement and Licence for that original material is * included below. This is followed by the Apache copyright statement and * licence for the modifications made to that material. /* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm /* Copyright (C) 1991-2, RSA Data Security, Inc.
  • Page 587 Appendix E Open Source Licences without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. * The apr_md5_encode() routine uses much code obtained from the FreeBSD 3.0 * MD5 crypt() function, which is licenced as follows: * ---------------------------------------------------------------------------- * "THE BEER-WARE LICENSE"...
  • Page 588 Appendix E Open Source Licences * is identified as the "RSA Data Security, Inc. MD4 Message-Digest * Algorithm" in all material mentioning or referencing this software * or this function. * License is also granted to make and use derivative works provided * that such works are identified as "derived from the RSA Data * Security, Inc.
  • Page 589 Appendix E Open Source Licences * rights reserved. * License to copy and use this software is granted provided that it * is identified as the "RSA Data Security, Inc. MD4 Message-Digest * Algorithm" in all material mentioning or referencing this software * or this function.
  • Page 590 Appendix E Open Source Licences * This is derived from material copyright RSA Data Security, Inc. * Their notice is reproduced below in its entirety. * Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All * rights reserved. * RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this * software for any particular purpose.
  • Page 591 Appendix E Open Source Licences # the above copyright notice appear in all copies and that both that # copyright notice and this permission notice appear in supporting # documentation, and that the name of M.I.T. not be used in advertising or # publicity pertaining to distribution of the software without specific, # written prior permission.
  • Page 592 Appendix E Open Source Licences PCRE LICENCE ------------ PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language. Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below.
  • Page 593 Appendix E Open Source Licences * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 594 Appendix E Open Source Licences is not removed. This software is provided "as is" and any express or implied waranties, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall Zeus Technology Ltd.
  • Page 595 Appendix E Open Source Licences "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
  • Page 596 Appendix E Open Source Licences Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies of...
  • Page 597 Appendix E Open Source Licences Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 598 Appendix E Open Source Licences modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 599 Appendix E Open Source Licences Except where otherwise noted in the source code (e.g. the files hash.c, list.c and the trio files, which are covered by a similar licence but with different Copyright notices) all the files are: Copyright (C) 1998-2003 Daniel Veillard. All Rights Reserved. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights...
  • Page 600 Appendix E Open Source Licences Permission to use, copy, modify, and distribute this software and its documentation for any purpose with or without fee is hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.
  • Page 601 Appendix E Open Source Licences 14.John A. Dundas III <dundas@salt.jpl.nasa.gov> Apple A/UX port 15.Torsten Duwe <duwe@immd4.informatik.uni-erlangen.de> Linux port 16.Dennis Ferguson <dennis@mrbill.canet.ca> foundation code for NTP Version 2 as specified in RFC-1119 17.John Hay <jhay@icomtek.csir.co.za> IPv6 support and testing 18.Dave Hart <davehart@davehart.com> General maintenance, Windows port interpolation rewrite.
  • Page 602 Appendix E Open Source Licences 34.David L. Mills <mills@udel.edu> Version 4 foundation: clock discipline, authentication, precision kernel; clock drivers: Spectracom, Austron, Arbiter, Heath, ATOM, ACTS, KSI/Odetics; audio clock drivers: CHU, WWV/H, IRIG 35.Wolfgang Moeller <moeller@gwdgv1.dnet.gwdg.de> VMS port 36.Jeffrey Mogul <mogul@pa.dec.com> ntptrace utility 37.Tom Moore <tmoore@fievel.daytonoh.ncr.com>...
  • Page 603 Appendix E Open Source Licences 54.Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> corrected and validated HTML documents according to the HTML DTD This Product includes pam software under below license Unless otherwise *explicitly* stated the following text describes the licensed conditions under which the contents of this Linux-PAM release may be distributed: Redistribution and use in source and binary forms of Linux-PAM, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 604 Appendix E Open Source Licences OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  • Page 605 Appendix E Open Source Licences This Product includes setsystz software under below license /* setsystz: set the Linux kernel's idea of the time zone */ /* Copyright (c) 2007 David A. Madore, Public Domain */ This Product includes sqlite software under below license SQLite Copyright All of the deliverable code in SQLite has been dedicated to the public domain by the authors.
  • Page 606 Appendix E Open Source Licences •You want to hold a tangible legal document as evidence that you have the legal right to use and distribute SQLite. •Your legal department tells you that you have to purchase a license. If you feel like you really have to purchase a license for SQLite, Hwaci, the company that employs the architect and principal developers of SQLite, will sell you one.
  • Page 607 Appendix E Open Source Licences Copyright Release for Contributions To SQLite SQLite is software that implements an embeddable SQL database engine. SQLite is available for free download from http://www.sqlite.org/. The principal author and maintainer of SQLite has disclaimed all copyright interest in his contributions to SQLite and thus released his contributions into the public domain.
  • Page 608 Appendix E Open Source Licences 3.To the best of my knowledge and belief, no individual, business, organization, government, or other entity has any copyright interest in the SQLite software as it existed on the SQLite website as of the date on the signature line below. 4.I agree never to publish any additional information to the SQLite website (by CVS, email, scp, FTP, or any other means) unless that information is an original work of authorship by me or is derived from prior published versions of SQLite.
  • Page 609 Appendix E Open Source Licences * advertising materials, and other materials related to such * distribution and use acknowledge that the software was developed * by the University of California, Berkeley. The name of the * University may not be used to endorse or promote products derived * from this software without specific prior written permission.
  • Page 610 Appendix E Open Source Licences * Redistribution and use in source and binary forms are permitted * provided that the above copyright notice and this paragraph are * duplicated in all such forms and that any documentation, * advertising materials, and other materials related to such * distribution and use acknowledge that the software was developed * by the University of California, Berkeley.
  • Page 611 Appendix E Open Source Licences License The License of Crypto++ is somewhat unusual amongst open source projects. A distinction is made between the library as a compilation (i.e., collection), which is copyrighted by Wei Dai, and the individual files in it, which are public domain (with the exception of mars.cpp which is subject to its own license, included in that file).
  • Page 612 Appendix E Open Source Licences the public domain: Joan Daemen - 3way.cpp Leonard Janke - cast.cpp, seal.cpp Steve Reid - cast.cpp Phil Karn - des.cpp Andrew M. Kuchling - md2.cpp, md4.cpp Colin Plumb - md5.cpp Seal Woods - rc6.cpp Chris Morgan - rijndael.cpp Paulo Baretto - rijndael.cpp, skipjack.cpp, square.cpp Richard De Moliner - safer.cpp Matthew Skala - twofish.cpp...
  • Page 613 Appendix E Open Source Licences copyrighted unless it includes an explicit copyright notice. 3. Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error-free, and Wei Dai is under no obligation to provide any services, by way of maintenance, update, or otherwise.
  • Page 614 Appendix E Open Source Licences This Product includes wxWidgets software under below license Licence Background wxWidgets is currently licensed under the "wxWindows Licence" pending approval of the "wxWidgets Licence" which will be identical apart from the name. The wxWindows Licence is essentially the L-GPL (Library General Public Licence), with an exception stating that derived works in binary form may be distributed on the user's own terms.
  • Page 615 Appendix E Open Source Licences your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public Licence for more details.
  • Page 616 Appendix E Open Source Licences accordingly. 4. If you write modifications of your own for this library, it is your choice whether to permit this exception to apply to your modifications. If you do not wish that, you must delete the exception notice from such code and/or adjust the licensing conditions notice accordingly.
  • Page 617 Appendix E Open Source Licences - The CODE2000 TrueType Font is (c) James Kass and is Shareware. See Graphics/CODE2000.HTM for more information. - Certain integral components of Slim Server, such as CPAN modules, are (c) of their respective authors, and are included in Squeezebox Server per their respective licenses.
  • Page 618 Appendix E Open Source Licences written permission to redistribute, which we will grant for any reasonable purpose. - Squeezebox2 firmware additionally contains the following code: - Kiss FFT, Copyright (c) 2003-2004, Mark Borgerding, licensed under a modified BSD license (reproduced below). - 16:16 fixed math routines, Copyright (c) 2001 Beartronics, licensed under the "Artistic License"...
  • Page 619 Appendix E Open Source Licences Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
  • Page 620 Appendix E Open Source Licences you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
  • Page 621 Appendix E Open Source Licences GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
  • Page 622 Appendix E Open Source Licences and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2.
  • Page 623 Appendix E Open Source Licences these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole.
  • Page 624 Appendix E Open Source Licences 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange;...
  • Page 625 Appendix E Open Source Licences control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  • Page 626 Appendix E Open Source Licences modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6.
  • Page 627 Appendix E Open Source Licences If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
  • Page 628 Appendix E Open Source Licences countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
  • Page 629 Appendix E Open Source Licences 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"...
  • Page 630 Appendix E Open Source Licences PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS #------------------------------------------------------------------ Kiss FFT used under the following license: Copyright (c) 2003-2004, Mark Borgerding All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list...
  • Page 631 Appendix E Open Source Licences IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,...
  • Page 632 Appendix E Open Source Licences Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
  • Page 633 Appendix E Open Source Licences Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group.
  • Page 634 Appendix E Open Source Licences -------------------------------------------------------------------- This software consists of voluntary contributions made by many individuals on behalf of the PHP Group. The PHP Group can be contacted via Email at group@php.net. For more information on the PHP Group and the PHP project, please see <http://www.php.net>.
  • Page 635 Appendix E Open Source Licences Furthermore, any object code linked with perl does not automatically fall under the terms of the GPL, provided such object code only adds definitions of subroutines and variables, and does not otherwise impair the resulting interpreter from executing any standard Perl script.
  • Page 636 Appendix E Open Source Licences Portions relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellson (ellson@lucent.com). Portions relating to gdft.c copyright 2001, 2002 John Ellson (ellson@lucent.com). Portions copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Pierre-Alain Joye (pierre@libgd.org). Portions relating to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G.
  • Page 637 No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. (Insert the license term as below)
  • Page 638 Appendix E Open Source Licences NSA210 User’s Guide...
  • Page 639: Appendix F Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice.
  • Page 640 Viewing Certifications Go to http://www.zyxel.com. Select your product on the ZyXEL home page to go to that product's page. Select the certification you wish to view from this page. ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
  • Page 641 Appendix F Legal Information including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http:// www.zyxel.com/web/support_warranty_info.php.
  • Page 642 Appendix F Legal Information NSA210 User’s Guide...
  • Page 643: Index

    Index Index 1. passive mode transfer notifications preferences protection 236, 237 status Numerics 210, 259 198, 200, 305 3-D photo wall activation anonymous access passive mode transfer media server 198, 202 configuration iTunes server 198, 232, 233 access rights print server Flickr configuration shares...
  • Page 644 Index restoring files by copying contents backup job restoring files by temperature usage backup settings creating bandwidth limit groups 330, 331 BitTorrent shares 334, 336 IP filtering 216, 217 users 322, 324 protection 236, 237 volumes 175, 178 re-seeding settings torrent files 210, 234 health...
  • Page 645 Index downloading files configuration grace period duplexing server entry FTPES FTPES - FTP over explicit TLS/SSL FTPS 142, 306 Exchangeable image file format, see Exif Exif explicit TLS/SSL external volumes global icons 57, 71 Google Maps grace period 311, 315, 320 fan speed group membership file...
  • Page 646 Index share publish SqueezeCenter status JBOD 176, 179 membership jumbo frames 186, 189 groups mirroring moving contents My Computer Ken Burns naming server lag, time shares language volumes workgroup latitude NAS Starter Utility LEDs 29, 53 add network drive link capture browser plugin icon menu 49, 50 login...
  • Page 647 Index photo wall rebuild media server database ping recycle bins activation Play Next 66, 336 configuration 334, 339 playing videos related documentation plugins replacing disks CoolIris QuickTime reset 27, 352 restoring Windows Media Player by backup files tutorial port mapping by backup job tutorial files port, HTTP...
  • Page 648 Index copying contents system downloading files date/time editing login folder creation master browser moving contents password names reset recycle bins server name 334, 339 activation settings configuration status share browser time lag 334, 340 status workgroup name types system settings uploading files 65, 264, 340 shutdown...
  • Page 649 Index Web Configurator access mirroring Universal Plug and Play. See UPnP. Web Configurator icons upgrading firmware login uploading files 65, 264, 340 navigation panel UPnP password 55, 69 port mapping status web publishing 199, 219, 240 210, 259 activation USB devices 178, 183 example User Name...
  • Page 650 Index NSA210 User’s Guide...

Table of Contents