Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http:// www.adobe.com.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
Page 5
Document Conventions Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate. Computer Notebook computer Server...
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. •...
Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions ......................4 Safety Warnings........................6 Contents Overview ........................7 Table of Contents ........................9 Part I: User’s Guide ................19 Chapter 1 Getting to Know Your NSA..................... 21 1.1 Overview ..........................21 1.1.1 Smartphone App ......................22 1.1.2 Hard Disks for 2-Bay Models ..................22...
Page 10
Table of Contents 3.4 Main NAS Starter Utility Screen ...................37 3.4.1 Directory of the NAS ....................38 3.5 Import Files or Folders with zPilot ..................39 3.6 Network Drive ........................40 3.7 Manage the Device ......................41 3.8 Configure System Settings ....................41 Chapter 4 Web Configurator Basics .......................
Page 11
Table of Contents 5.6.2 Migrate Button ......................74 5.6.3 Create an Internal Volume Button ................74 5.7 Creating a Volume in a 1-Bay NSA ..................75 5.7.1 Creating a RAID 1 Volume ..................76 5.7.2 Migrate Button ......................76 5.7.3 Create a SATA Volume Button ..................77 5.7.4 Creating a PC Compatible Volume ................79 5.8 Deleting a Volume ........................82 5.9 File Sharing Tutorials ......................83...
Page 12
Table of Contents Chapter 6 Status Screen ........................149 6.1 Overview ..........................149 6.2 The Status Screen ......................149 Chapter 7 System Setting........................153 7.1 Overview ..........................153 7.2 What You Can Do ......................153 7.3 What You Need to Know ....................153 7.4 The Server Name Screen ....................154 7.5 The Date/Time Screen .......................154 Chapter 8 Storage ..........................
Page 13
Table of Contents Chapter 10 Applications .......................... 181 10.1 Overview ..........................181 10.2 What You Can Do ......................181 10.3 What You Need to Know ....................181 10.4 FTP Server ........................184 10.5 The Media Server Screens ....................185 10.5.1 The Media Server Share Publish Screen .............187 10.5.2 The Media Server ID3 Tag Decoding Screen ............188 10.5.3 The Media Server iTunes Server Screen...
Page 15
Table of Contents 11.15.1 S.M.A.R.T Attributes .....................272 Chapter 12 Auto Upload .......................... 275 12.1 Overview ..........................275 12.2 What You Can Do ......................275 12.3 What You Need to Know ....................275 12.4 The Flickr/YouTube Screen .....................275 12.4.1 Configuring the Flickr Settings ................276 12.4.2 Configuring the YouTube Settings .................281 12.5 The FTP Uploadr Screen ....................284 12.5.1 Adding or Editing an FTP Server Entry ..............285...
Page 16
Table of Contents 16.3.1 Adding or Editing Share ..................305 16.3.2 Configuring Advanced Share Access ..............306 16.3.3 Public and ANONYMOUS Share Access Rights ............307 16.4 The Recycle Bin Configuration Screen ................307 16.4.1 Recycle Bins ......................307 16.4.2 Configuring Recycle Bins ..................308 16.5 The Share Browser Screen .....................308 16.5.1 Moving or Copying Files ..................310 Chapter 17 Maintenance Screens ......................
Page 17
Table of Contents 19.3 Set Time Machine to Support Network Volume ...............339 19.4 Mounting the NSA on the Mac ..................340 19.5 Creating a Sparse Bundle File for the NSA ..............341 19.5.1 Finding out Computer Name and MAC Address ............341 19.5.2 Creating a Sparse Bundle File ................342 19.5.3 Mounting the Sparse Bundle to the NSA ..............344 19.6 Using Time Machine ......................345 Chapter 20...
Page 18
Table of Contents Index ............................439 Part III: Open Source Licences............447 Media Server User’s Guide...
H A PT ER Getting to Know Your NSA 1.1 Overview This chapter covers the main features and applications of the NSA. Use the NSA to do the following. • Back up and share files on your network. • Use the COPY/SYNC button to copy or synchronize files between the NSA and USB devices like card readers, MP3 players, mass storage devices, and digital cameras without using a computer.
• At the time of writing no 1-bay models support the firmware version documented in this User’s Guide. 1.1.1 Smartphone App Use ZyXEL’s zMedia app to play files and manage the NSA from your iOS version 3 or later device or Android version 2.1 or later smartphone. 1.1.2 Hard Disks for 2-Bay Models The 2-bay NSA models have two internal hard disk bays.
Chapter 1 Getting to Know Your NSA 1.1.4 COPY/SYNC Button Use the COPY/SYNC button on the front panel to copy or synchronize files between a connected USB device and the NSA. See Section 10.10 on page 211 for more details on how to configure the copy/sync settings.
Page 24
Chapter 1 Getting to Know Your NSA If you need to remove a hard drive, use the hard disk removal handle included inside the front lid. Figure 3 Removing a Hard Disk Media Server User’s Guide...
H A PT ER zMedia App 2.1 Overview Install ZyXEL’s zMedia app from the Apple App Store, Android Market, or www.zyxel.com to play files and manage the NSA from your iOS device or Android smartphone. 2.2 Log into zMedia Tap the zMedia icon to open the app and automatically search for NSAs on your network.
Chapter 2 zMedia App Use the admin user name and password to log in. Figure 6 zMedia Login 2.3 File Browser Tap File Browser to look through and play files on the NSA. Figure 7 zMedia File Browser Media Server User’s Guide...
Page 27
Chapter 2 zMedia App Tap a share to view its contents. Figure 8 zMedia Shares Media Server User’s Guide...
Page 28
Chapter 2 zMedia App Tap a file to play or open it using your device’s browser. Here are some examples. Figure 9 zMedia File Playback Photo Music Video Document Media Server User’s Guide...
Chapter 2 zMedia App 2.4 System Tap System to view configure the admin account password, view system status, shutdown (or restart), manage applications, or configure power schedule and management settings. Figure 10 zMedia System 2.4.1 Settings Set the admin account password. Figure 11 zMedia Settings 2.4.2 Status •...
Page 30
Chapter 2 zMedia App • Tap Active Sessions to see which users are connected to the NSA. Figure 12 zMedia Status 2.4.2.1 System Information An arrow indicates a newer firmware version is available. Tap the arrow to upgrade the firmware. Do not turn off the NSA while it is upgrading the firmware or you may render it unusable.
Page 31
Chapter 2 zMedia App 2.4.2.2 Volume Status Section 8.2.1 on page 158 for details on replacing a disk in a degraded or down RAID volume and resynchronizing or recovering a RAID 1 Volume. Figure 14 zMedia Volume Status 2.4.2.3 S.M.A.R.T. Self Monitoring, Analysis, and Reporting Technology (S.M.A.R.T) detects and reports the reliability of hard disks to help you anticipate possible disk failures.
Chapter 2 zMedia App 2.4.2.4 Active Sessions This shows the users connected to the NSA, whether it’s a Windows/CIFS, web (web configurator), or FTP connection, when they last connected, and the IP address of the user’s computer or device. Figure 16 zMedia Active Sessions 2.4.3 Shutdown Tap the Restart button to reboot the NSA or the Shutdown button to turn it off.
Chapter 2 zMedia App 2.4.4 Applications Enable or disable individual applications. Some applications only appear if the corresponding package is installed (see Chapter 11 on page 225). Tap the arrow next to Download Service or eMule to see task status details. Figure 18 zMedia Applications 2.4.4.1 Download Service and eMule Tap the arrow next to a category of download tasks to see the related tasks.
Chapter 2 zMedia App Tap the arrow next to a download task for details. Tap a button to remove, pause, or resume the task. Download Service screens are shown here as an example. eMule screens are similar. Figure 20 zMedia Download Service Active 2.4.5 Power Turn the power control schedule on or off and set how long to let the hard disks remain idle before putting them to sleep.
3.3 NAS Seeker Screen Use this screen to view the NSAs in your network. The NSA’s Server Name. The default is ‘nsa’ followed by the number of your model (‘nsa325’ for example). See Section 3.8 on page 41 for how to change it to a more recognizable one in your network.
Page 36
Chapter 3 NAS Starter Utility Start the NAS Starter Utility (click the icon in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility). The first time you open the NAS Starter Utility the discovery screen appears as follows.
Chapter 3 NAS Starter Utility 3.4 Main NAS Starter Utility Screen The main NAS Starter Utility screen displays after you select an NSA in the NSA Seeker screen. Figure 23 NAS Starter Utility Main Screen The following table describes the labels in this screen. Table 2 NAS Starter Utility Main Screen LABEL DESCRIPTION...
Chapter 3 NAS Starter Utility Table 2 NAS Starter Utility Main Screen LABEL DESCRIPTION Capacity This shows the NSA’s total, in-use, and remaining storage capacity. Media Player Click this to go to the Home screens where you can play media files. See Section 4.4 on page 46 for details on the Home screen.
Chapter 3 NAS Starter Utility The utility opens the NSA’s directory in Windows Explorer. Figure 25 Directory 3.5 Import Files or Folders with zPilot In the main NAS Starter Utility screen click zPilot to be able to drag and drop files from your computer to the NSA.
Chapter 3 NAS Starter Utility folder. For folders of files you are prompted to choose the target destination. The zPilot icon shows the transfer rate. Figure 28 zPilot Showing Transfer Rate Double-click the zPilot icon to display status details about the file transfers. Select an entry and click Pause, Resume, or Remove to control the transfer.
Chapter 3 NAS Starter Utility new drive in Windows Explorer (My Computer) where you can access and use it like your computer’s other drives. Figure 31 Network Drive 3.7 Manage the Device In the main NAS Starter Utility screen click Configuration > Manage the Device to log into the NSA’s administration screens where you can manage the NSA.
Page 42
Chapter 3 NAS Starter Utility Click Configuration > System Setting in the main utility screen to display the following screen. Figure 33 NAS Starter Utility > Configuration > System Setting The following table describes the labels in this screen. Table 3 NAS Starter Utility > Config LABEL DESCRIPTION Server Name...
H A PT ER Web Configurator Basics 4.1 Overview This chapter describes how to access the NSA web configurator and provides an overview of its screens. The web configurator is an HTML-based management interface that allows easy NSA setup and management using an Internet browser.
(Section 3.8 on page 41) of the NAS Starter Utility. Open your browser and type in the server name of the NSA. The default is ‘nsa’ followed by the number of your model (‘nsa325’ for example). Figure 35 NSA URL nsa325...
Chapter 4 Web Configurator Basics 4.3 Login The default username and password are ‘admin’ and ‘1234’ respectively. Enter your username and password. See Chapter 14 on page 293 for how to create other user accounts. If you use the option to stay logged in for two weeks (assuming you do not log out), make sure you keep your computer secure from unauthorized access.
Chapter 4 Web Configurator Basics If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore.
Page 47
Chapter 4 Web Configurator Basics The main Home screen displays icons for the various features you can access. Table 4 Main Home Screen Icons ICON DESCRIPTION Use Music, Photo, and Video to play and organize your music, picture, and video files. Use Favorite to create and edit playlists.
Page 48
Chapter 4 Web Configurator Basics Here are some Home screen descriptions. A music screen is shown here as an example. Other screens work in a similar way. Figure 39 Music Screen This table describes common labels in the Home media screens. Not every item displays in every screen.
Chapter 4 Web Configurator Basics Table 6 Home Media Screens LABEL DESCRIPTION List Click this to view the files as a list. Play Click this to play the currently selected file. You can also double-click a file to play it. Delete Select an item and click Delete to remove it.
Chapter 4 Web Configurator Basics 4.4.2 Exif and Google Maps (Photos) Click a photo’s EXIF button to display or hide the photo’s Exchangeable image file format (Exif) data. Figure 41 Exif Information If a photo’s Exif data includes GPS location data, click the latitude or longitude link to display the location in Google Maps.
Chapter 4 Web Configurator Basics Note: Your browser must have the Flash Player plug-in installed to view slideshows. Figure 43 Slideshow When the CoolIris plugin is installed in your browser, click the Launch CoolIris button to display your photos as a 3-D wall for quick browsing. 4.4.4 Favorite Use the Favorite menu to manage your playlists.
Chapter 4 Web Configurator Basics 4.4.4.2 My Favorite Use Favorite > My Favorite to create, edit, and play playlists. These playlists are specific to the NSA and cannot be used in external music players. Figure 44 Favorite > My Favorite This table describes labels in this menu.
Page 53
Chapter 4 Web Configurator Basics • The administrator owns and manages the public shares. • Double-click a media file to open it. Double-click other types of files to be able to save them. • Click to the right of a file or folder name to select it. •...
Page 54
Chapter 4 Web Configurator Basics Table 8 File Browser (continued) LABEL DESCRIPTION Configure Select a share and click this link to open a screen where you can see and configure share Share management details. Upload Click this to open the following screen where you can add files to the share. Use the Browse button to locate your file/s and click Apply to upload the file.
Chapter 4 Web Configurator Basics The following table describes the labels in the this screen. Table 9 File Browser > Configure Share LABEL DESCRIPTION Share Name Configure a name to identify this share. Type a share name from 1 to 239 single-byte (no Chinese characters allowed for example) ASCII characters.
Chapter 4 Web Configurator Basics • Multiple spaces within names are converted to a single space. • Share names must be unique (they cannot be the same as other share names). • The NSA creates automatic volume names for external (USB) disk volumes. These are a type of share, so the share name you configure cannot conflict with the external (USB) disk volume names.
Chapter 4 Web Configurator Basics Table 10 Application Zone (continued) LABEL DESCRIPTION Disable Select an enabled application and click this to turn off the application. Select the Flickr or Youtube Uploadr entry and click this to cancel all uploading. Some applications are always enabled and cannot be disabled.
Chapter 4 Web Configurator Basics Table 11 System > Settings (continued) LABEL DESCRIPTION Slide Interval Select how long to display each image in a slideshow before changing to the next. Video Playback Select Play Next to play the rest of the video files in a folder. So for example, a folder has video files 1~10 and you play video 3.
Chapter 4 Web Configurator Basics The Status screen is the first advanced administration screen that displays. Figure 49 Status 4.5.1 Global Administration Icons The icons and language label at the top-right of the screen ( ) are visible from most of the administration screens.
Chapter 4 Web Configurator Basics 4.5.2 Navigation Panel The navigation panel on the left of the Web Configurator screen ( ) contains screen links. Click a link to display sub-links. There are no sub-links for the Status screen. Certain screens also contain hyper links that allow you to jump to another screen.
Chapter 4 Web Configurator Basics Table 13 Screens Summary (continued) LINK SCREEN FUNCTION Sharing Users View, create and edit administrator and user accounts to let people use the NSA. Groups View, create and edit groups. Groups allow you to organize users into specific groups.
Chapter 4 Web Configurator Basics Table 14 Common Configuration Screen Icons (continued) ICON DESCRIPTION User See the chapter on user accounts for detailed information on variants of this icon. Share See the chapter on shares for detailed information on variants of this icon. Healthy This represents a healthy volume.
H A PT ER Tutorials 5.1 Overview This chapter provides tutorials that show how to use the NSA. • Windows 7 Network, see page 63 • Windows 7 Network Map, see page 67 • Playing Media Files in Windows 7, see page 70 •...
Page 64
Chapter 5 Tutorials Click Start > Control Panel. Set View by to Category and click Network and Internet. Click View network computers and devices. Media Server User’s Guide...
Chapter 5 Tutorials The NSA icon displays twice because the NSA is both a media server and a storage device. Double- click either NSA icon to open the Web Configurator login screen. 5.2.1 If the NSA Icon Does Not Display The network containing the NSA must be set as a home or work network in order for the NSA icons to display.
Chapter 5 Tutorials Use the Set Network Location screen to set the network’s location to home or work. 5.2.2 NSA Icon Right-click Options Right-click the NSA’s icon to see these options: • Install/Uninstall: Click Install to add the NSA as a device in your computer. After you install the NSA you can see it in the computer’s list of devices (see Section 5.5 on page 70.
Chapter 5 Tutorials • Properties opens a window of NSA details and troubleshooting information. • Manufacturer identifies the company that produced the NSA. • Model identifies the NSA model. • identifies the NSA model number. Model number • Device webpage shows the IP address for accessing the Web Configurator. •...
Page 68
Chapter 5 Tutorials Click Start > Control Panel > View network status and tasks (or Network and Sharing Center if you view the Control Panel by icons). Click See full map (1 in the figure). The network containing the NSA must be set as a home or work network in order to use the full map feature.
Page 69
Chapter 5 Tutorials Double-click the NSA’s icon to open the Web Configurator login screen. See Section 5.2.2 on page for the NSA icon’s right-click options. Media Server User’s Guide...
Chapter 5 Tutorials 5.4 Playing Media Files in Windows 7 In Windows 7, the NSA automatically displays as a library in Windows Media Player. Figure 50 NSA in Windows Media Player 5.5 Windows 7 Devices and Printers After you use the NSA’s network icon’s install option you can manage the NSA from the Windows 7 Devices and Printers folder.
Page 71
Chapter 5 Tutorials Click Start > Control Panel > Hardware and Sound > Devices and Printers. Select the NSA icon to display information about the NSA. Double-click the NSA icon to open a properties window (see page 67). Right-click the icon to display these options: •...
Chapter 5 Tutorials 5.5.1 Windows 7 Desktop Shortcut This is the NSA’s desktop shortcut. Double-click it to open a properties window (see page 67). Right-click the NSA’s desktop shortcut icon to see these options: • Open file location takes you to the Windows 7 Devices and Printers folder. •...
Chapter 5 Tutorials • Delete sends the shortcut to the recycle bin. • Rename lets you change the name of the shortcut. • Troubleshoot opens Windows’ device troubleshooting wizard. • Remove device removes the NSA from the Windows 7 Devices and Printers folder. •...
Chapter 5 Tutorials 5.6.2 Migrate Button Do the following steps to create a RAID 1 volume. Once you install a second SATA hard disk in the NSA, the Storage > Volume screen shows the Migrate button. Click the button and you can see the following progress bar. Wait for the RAID 1 volume to Migrate be created.
Chapter 5 Tutorials This deletes all existing data in the SATA hard disk. Make sure you have a backup of any existing data in the hard disk. The NSA starts creating the volume and you can see the following progress bar. Wait for the RAID 1 volume to be created.
Chapter 5 Tutorials Your NSA has a single bay for a SATA (Serial Advanced Technology Attachment) hard disk. The firmware installed during hard disk initialization (Chapter 3 on page 35) automatically creates a JBOD volume on your SATA hard disk. JBOD is the default storage method if you are using a single hard disk for your NSA.
Chapter 5 Tutorials Click the button and you can see the following progress bar. Wait for up to 10 minutes for Migrate the RAID 1 volume to be created. 5.7.3 Create a SATA Volume Button If you do not have an existing volume in the Storage > Volume screen, do the following steps to create a RAID 1 volume.
Page 78
Chapter 5 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the RAID 1 volume to be created. The Storage > Volume screen displays with your RAID 1 volume. Media Server User’s Guide...
Chapter 5 Tutorials 5.7.4 Creating a PC Compatible Volume You can use your eSATA hard disk as a separate storage volume. The following section shows you how to create a PC Compatible Volume. Use this storage method if you have an eSATA hard disk that will be connected to a Windows computer when it is not connected to the NSA.
Page 80
Chapter 5 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the volume to be created. The Storage > Volume screen displays with your PC Compatible Volume. Media Server User’s Guide...
Page 81
Chapter 5 Tutorials 5.7.4.1 Checking Your PC Compatible Volume The files in the eSATA hard disk that you configured as a PC Compatible Volume should be accessible when you connect the eSATA hard disk to your computer. You can configure the features of your NSA to save files to your eSATA hard disk. For example, you can refer to Section 5.11 on page 107 to use the Broadcatching feature of your NSA to download...
Chapter 5 Tutorials Disconnect the eSATA hard disk from the NSA. Connect the eSATA hard disk to your computer. On some systems, you can see the following notification. The computer assigns a letter to the eSATA hard disk (drive F in this example) that is accessible from the My Computer screen.
Chapter 5 Tutorials In the Storage > Volume screen, select the volume you want to delete and click the delete icon. A confirmation window appears as follows. Click Yes. This deletes all existing data in the volume. Make sure you have a backup of any existing data in the hard disk.
Page 84
Chapter 5 Tutorials At the NSA web configurator login screen enter the administrator account and password and click Administrator Login to go to the advanced administration screens. Click Sharing > Users to open the Users screen. Then click Add User. Media Server User’s Guide...
Chapter 5 Tutorials Configure the screen as follows and write down the username and password to give to Jimmy. If the username and password are the same as Jimmy’s Windows login, Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn’t get to configure the whole NSA.
Page 86
Chapter 5 Tutorials In the NSA’s administration web configurator screens, click Shares > Add Share. Click Add Share to create a new share. Specify a name for the share and select which volume it should be on. Configure the screen as follows.
Chapter 5 Tutorials Configure the screen as follows to give Jimmy full access right to the share. Then click Apply to create the share. Now that Bob has created Jimmy’s share, he can go through the steps again to create another share for Kevin.
Jimmy’s share to Jimmy’s computer. Start Windows Explorer and go to the NSA’s server name. The default is ‘nsa’ followed by the number of your model (‘nsa325’ for example). Click Tools > Map Network Drive. Media Server User’s Guide...
Page 89
Chapter 5 Tutorials Select the network drive that you want to map the NSA to from the Drive list box. This example uses I. Then browse to and select the share on the NSA. Click Finish. Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login.
Chapter 5 Tutorials After the mapping is done, you can then simply copy and paste or drag and drop files from/to your local computer’s drives to or from this network folder. Just like the NSA’s share was another folder on your computer. Now that Bob has mapped Jimmy’s share to Jimmy’s computer, he can go through the steps again to map Kevin’s share to Kevin’s computer.
Chapter 5 Tutorials Enter your password and click Login. Now you can access files and copy files from/to your local computer’s drives to or from this network folder. 5.9.6 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator. Media Server User’s Guide...
Chapter 5 Tutorials Log into the NSA web configurator (see Section 4.3 on page 45) using the appropriate user name and password (this example uses Jimmy’s) and click File Browser. Click a share (the Jimmy share in this example) to see the top level of the share’s contents. Click a folder’s file name to browse the folder.
Page 93
Chapter 5 Tutorials Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a datasheet for ZyXEL’s GS-2024 (a device for making phone calls over the Internet). Note: Make sure the link opens either the file you want or a pop-up window about how to handle the file.
Page 94
Chapter 5 Tutorials Log into the NSA web configurator (see Section 4.3 on page 45) using the administrator account and click Application Zone and the Application Zone > Download Service link. Click Add. Media Server User’s Guide...
Chapter 5 Tutorials Right-click the URL field and select Paste. The URL displays in the URL field. Click Apply. After a few moments, the download task appears in the Download Service screen’s Active tab. The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share’s download folder.
Page 96
Chapter 5 Tutorials Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7. Internet Explorer Open the folder containing the link capture browser plugin. Double-click on the plugin to display the following screen. Click I Agree to begin installation. Select a location to save the plugin and click Install.
Page 97
Right-click on the download link and select NSA Setting. Enter the NSA’s web address. The default is ‘nsa’ followed by the number of your model (‘nsa325’ for example). Then click Apply. A warning message displays asking for confirmation. Click OK to apply the setting.
Page 98
Chapter 5 Tutorials To install the plugin, drag and drop the plugin to Firefox. The following screen displays. Click Install Now. Media Server User’s Guide...
Page 99
Chapter 5 Tutorials You need to restart Firefox after the installation. When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’s web address. Media Server User’s Guide...
Chapter 5 Tutorials Enter the NSA’s web address. The default is ‘nsa’ followed by the number of your model (‘nsa325’ for example). Then click OK. 5.10.3 Using the Link Capture Browser Plugin Once you install the plugin, you may begin sending download links to the NSA from your web browser.
Page 101
Chapter 5 Tutorials The login screen shows up. Enter your NSA’s login information and click Login to send the link to the download service. A confirmation message displays. Log into the NSA web configurator (see Section 4.3 on page 45) using the administrator account and click Application Zone and the Application Zone >...
Chapter 5 Tutorials By default the NSA stores all downloads in the admin share’s download folder. See Section 5.9.4 on page Section 5.9.5 on page 90, or Section 5.9.6 on page 91 for how to access a share. 5.10.4 Configuring the Download Service Preferences Once you added a list of download tasks to the NSA (see Section 5.10.1 on page 92 Section...
Page 103
Chapter 5 Tutorials When it is not the download time, you see a message in the Download Service screen, indicating the active download period. Click Applications > Download Service > Preferences > BitTorrent to open the following screen. Enter the information below and then click Apply. Here is a list of BitTorrent settings you want to configure for your NSA: •...
Chapter 5 Tutorials • Click Edit IP Filter. Use an online IP filter table from http://www.bluetack.co.uk/config/level1.gz for example to protect BitTorrent downloads. Enter the URL in the Update IP Filter from the Internet Every Week field. 5.10.5 Using Download Service Notification Use an RSS feed reader on your computer to keep track of files the NSA has downloaded.
Page 105
Chapter 5 Tutorials Internet Explorer 7 Example After you activate download service notification, click the RSS feed icon. The following screen displays. Select Subscribe to this feed. The following screen displays. Click Subscribe. Media Server User’s Guide...
Page 106
Chapter 5 Tutorials Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Firefox Example After you activate download service notification, click the RSS feed icon. The following screen displays. Select Live Bookmarks from the drop-down list and click Subscribe Now.
Chapter 5 Tutorials From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list. 5.11 Broadcatching Tutorial Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV Internet television channel.
Page 108
Chapter 5 Tutorials Find the link for the RSS feed containing the channel you want to add. In this example, http:// reviews.cnet.com/4520-11455_7-6333605-1.html has an RSS link for subscribing to the CNET Live podcast. However this is not the link for the actual RSS feed. Click the link to go to another screen that has RSS feed links.
Page 109
Chapter 5 Tutorials Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer). Log into the NSA web configurator (see Section 4.3 on page 45) using the administrator account and click Administration > Applications > Broadcatching. Click Add Channel.
Page 110
Chapter 5 Tutorials Right-click the URL field and select Paste. The URL displays in the URL field. Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later. Select a policy for what items to delete.
5.12 Printer Server Tutorial Do the following to have the NSA let computers on your network share a printer. See www.zyxel.com for a list of compatible printers. Make sure the NSA is on and the SYS light is on steady (not blinking).
Page 112
Chapter 5 Tutorials If you get a warning screen, click the option that lets you continue (Yes in this example). If your computer does not already have the printer’s driver installed, you will need to install it. In this example, click OK. Use the wizard screens to install the printer driver on the computer.
Chapter 5 Tutorials 5.13 Copy and Flickr Auto Upload Tutorial Amy received some photos taken during her best friend’s wedding and saved the files on a USB disk. She wants to save a copy of the photos in the NSA and upload the photos to her Flickr account.
Chapter 5 Tutorials The NSA also automatically uploads the copied files to Flickr. 5.14 FTP Uploadr Tutorial FTP Uploadr can automatically upload files saved on the NSA to a remote FTP server. Amy wants to share files on her NSA with Susan. They each have an NSA at home, so Susan has to set her NSA as an FTP server for Amy to automatically send files using FTP Uploadr.
Page 115
Chapter 5 Tutorials Susan also has to create a user account and share on her NSA for Amy to upload files. The share is used for files uploaded from Amy’s NSA. Amy will then use the following information to configure FTP Uploadr on her NSA.
Page 116
Chapter 5 Tutorials In the FTP Uploadr screen, click Preferences to configure the auto upload settings. Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List.
Chapter 5 Tutorials Amy also set the Bandwidth Limit to 20KB/s so that the upload doesn’t slow down her Internet connection. Now Amy has set up FTP Uploadr to send files to Susan’s NSA. Every time Amy adds new files or renames files in the video share, these new or modified files will be uploaded automatically to the Amy share on Susan’s NSA.
Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit. Next, let’s modify the certificate by changing the Common Name to this NSA’s host name of “nsa”, the Organization to “ZyXEL” and the Key Length to 2048. Media Server User’s Guide...
Chapter 5 Tutorials The NSA restarts its network services and returns you to the login screen. 5.15.2 Downloading and Installing Customized Certificate Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. Media Server User’s Guide...
Page 120
Chapter 5 Tutorials Save the file to your computer. Find the certificate file on your computer and double-click it. Media Server User’s Guide...
Page 121
Chapter 5 Tutorials Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix D on page 411 for other examples. In the Certificate dialog box, click Install Certificate. In the Certificate Import Wizard, click Next.
Page 122
Chapter 5 Tutorials Leave Automatically select certificate store based on the type of certificate selected and click Next. In the Completing the Certificate Import Wizard screen, click Finish. Media Server User’s Guide...
Chapter 5 Tutorials If you are presented with another Security Warning, click Yes. Finally, click OK when presented with the successful certificate installation message. 5.15.3 Turn on the NSA’s Web Security Now that you have customized the NSA’s certificate and installed it in your computer, you can turn on security for your Web Configurator sessions.
Page 124
Chapter 5 Tutorials Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. A warning screen pops up if applying your change may disconnect some users. Click Apply to continue.
Page 125
Chapter 5 Tutorials The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. Click Add Exception.
Page 126
Chapter 5 Tutorials Click Get Certificate. Media Server User’s Guide...
Page 127
Chapter 5 Tutorials Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View. Media Server User’s Guide...
Page 128
Chapter 5 Tutorials The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close. Media Server User’s Guide...
Page 129
Chapter 5 Tutorials If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. The login screen displays. Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s certificate so they can check it before adding a security exception (as in steps on pages to 128).
Chapter 5 Tutorials 5.16 Using FTPES to Connect to the NSA This section covers how to use FTP over Explicit TLS/SSL with the NSA for secure FTP transfers. Before you go through this section, read Section 5.15 on page 117 to configure HTTPS.
Chapter 5 Tutorials A security warning screen displays. The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). If they match, click OK. The shares and folders to which Gonzo has access display.
Chapter 5 Tutorials 5.17.1 Finder Open a new Finder window. Select All under the SHARED sidebar. Look for the NSA from the Network list. Media Server User’s Guide...
Chapter 5 Tutorials Expand the NSA to display the shares you may access. 5.17.2 Go Menu In the Finder, click Go > Connect to Server. Media Server User’s Guide...
Chapter 5 Tutorials When the Connect to Server dialog box opens, enter smb:// and the NSA’s IP address in the Server Address field. You may also click Browse to have the Mac search for the NSA. Click Connect. Once you establish the connection, you can access the NSA from the Finder or directly from the desktop.
Page 135
Chapter 5 Tutorials Click Protect > Backup > Add Job. Figure 51 Protect > Backup Identify the backup job and select Archive. New files are often added to the shares that you need to back up and existing files are not frequently changed so select Incremental.
Page 136
Chapter 5 Tutorials Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection. Figure 53 Protect >...
Chapter 5 Tutorials In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the target NSA so you can leave the encryption off, too. Have the NSA keep 3 backups. Figure 54 Protect >...
Page 138
Chapter 5 Tutorials Click Protect > Backup > Add Job. Figure 55 Protect > Backup Name the backup job and select Synchronization. You want only your current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder.
Page 139
Chapter 5 Tutorials • Click Next. Figure 57 Protect > Backup > Add Job: Step 2 Click OK in the warning dialog box. Figure 58 Protect > Backup > Add Job: Step 3 For this example, assume the connection to the German branch office is a good one and not many files need to be backed up so leave the compression off.
Chapter 5 Tutorials • Click Next. Figure 59 Protect > Backup > Add Job: Step 3 Schedule the backup to occur every morning at 3:00 and click Done. Figure 60 Protect > Backup > Add Job: Step 4 You do not need to use a special restore process to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share.
Page 141
Chapter 5 Tutorials Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 61 Protect > Backup Select which backup to use and click Next. Figure 62 Protect > Backup > Restore Archive: Step 1 Media Server User’s Guide...
Page 142
Chapter 5 Tutorials Select the files and folders you want to restore and click Next. Figure 63 Protect > Backup > Restore Archive: Step 2 Select the original location and click Done. Figure 64 Protect > Backup > Restore Archive: Step 3 Media Server User’s Guide...
Chapter 5 Tutorials The NSA restores the files into the share. When it finishes you can access the files. Figure 65 Protect > Backup > Restore Archive: Progress 5.18.4 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore archived files by the backup job.
Page 144
Chapter 5 Tutorials Select the backup job and backup time and click Next. Figure 67 Protect > Restore: Step 2 Select everything in the share except the recycle folder. Click Next. Figure 68 Protect > Restore: Step 3 Media Server User’s Guide...
Page 145
Chapter 5 Tutorials Browse to the folder where you want to put the files. Click Done. Figure 69 Protect > Restore: Step 4 The NSA restores the files and you can use them again. Media Server User’s Guide...
Page 146
Chapter 5 Tutorials Media Server User’s Guide...
H A PT ER Status Screen 6.1 Overview This chapter describes the Status screen, which is the first advanced administration screen that displays. 6.2 The Status Screen Click Administration in the Home screens (Section 4.5 on page 58) to open the Web Configurator. You can also view the status screen, by clicking Status on the top-left of the navigation panel.
Page 150
Chapter 6 Status Screen The following table describes the labels in this screen. Table 16 Status LABEL DESCRIPTION Status Click this to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the Edit icon to go to the screen where you can configure this.
Page 151
Chapter 6 Status Screen Table 16 Status (continued) LABEL DESCRIPTION External Volume (or USB This displays the volumes created on USB hard drives connected to the NSA. USB Volume) disks are numbered in the order that you insert USB devices. Click the Edit icon to open the Storage screen.
Page 152
Chapter 6 Status Screen Media Server User’s Guide...
H A PT ER System Setting 7.1 Overview This chapter gives an overview of the various features included in the system setting screens. You can identify your NSA on the network and set the time that the NSA follows for its scheduled tasks/ logs.
Chapter 7 System Setting 7.4 The Server Name Screen Click System Setting > Server Name to open the following screen. Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup.
Page 155
Chapter 7 System Setting Click the System Setting link in the navigation panel and then click the Date/Time link to access the Date/Time screen. Figure 72 System Setting > Date/Time The following table describes the labels in this screen. Table 18 System Setting > Date/Time LABEL DESCRIPTION Current System Date Time Setting...
Page 156
Chapter 7 System Setting Table 18 System Setting > Date/Time (continued) LABEL DESCRIPTION Synchronize Click this for the NSA to retrieve the correct time from the configured time server right away. Time Zone Time Zone Choose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT).
H A PT ER Storage 8.1 Overview Several NSA features require a valid internal volume. This chapter covers the management of volumes and disks (both internal and external). Use the Storage screen (Section 8.2 on page 158) to display information on all volumes, create internal and external volumes, and configure the volume’s properties.
Chapter 8 Storage Note: 1-bay models configure the internal hard disk (SATA) as JBOD by default. You can modify it if you attach a second internal hard disk (an eSATA hard disk). Finding Out More Section 8.6 on page 166 for more technical background information on storage.
Chapter 8 Storage 8.2.2 Storage Screen Click Storage > Volume in the navigation panel to display the following screen. Use this screen to display internal and external volumes on the NSA. Note: It is recommended to scan the volume every three months or 32 reboots. Figure 73 Storage >...
Chapter 8 Storage Table 19 Storage > Volume (continued) LABEL DESCRIPTION Capacity This field shows total disk size, the percentage of the volume being used and the percentage that is available. Actions This field displays icons allowing you to edit, scan, repair, expand, migrate, or delete a volume.
Chapter 8 Storage If it’s down, then the only indication is that you can no longer transfer files to/from the shares in the down volume. If it’s degraded, then file transfer to/from the shares in the degraded volume will be slower. Note: There is no explicit message from CIFS that tells users their volume is degraded or down.
Page 162
Chapter 8 Storage The following table describes the labels in this screen. Table 20 Storage > Create an Internal Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters. To avoid confusion, it is highly recommended that each volume use a unique name.
Chapter 8 Storage Note: Once you create the first volume on the NSA, it is recommended to restart the NSA for better performance. 8.4 Editing a Volume Click an internal volume’s Edit icon in the Storage screen as shown in Figure 73 on page 159 open the following screen.
Chapter 8 Storage 8.4.1 Scanning a Volume Select a volume in the Storage > Volume screen (Section 8.2 on page 158) and click Scan to open the following screen. Use this screen to scan the volume for errors and select whether or not to have the NSA automatically repair them.
Chapter 8 Storage Note: Creating a volume formats the drive. All data on the disk will be lost. Figure 78 Storage > Create an External Volume The following table describes the labels in this screen. Table 23 Storage > Create an External Volume LABEL DESCRIPTION Volume Name...
Chapter 8 Storage 8.6 Storage Technical Reference This section provides some background information about the topics covered in this chapter. 8.6.1 Volumes and RAID A volume is a storage area on a disk or disks. You can create volumes on the internal disks and external disks attached to the USB port(s).
Chapter 8 Storage to your one-disk JBOD volume later without having to re-create shares, access rights, and so on. Alternatively, you could create a different JBOD volume if you install a second disk. (and create new shares, access rights and so on). Two Disks: You may choose JBOD, RAID 0 or RAID 1.
Page 168
Chapter 8 Storage it from the ‘n’ that remain, regardless of which piece is lost. Parity protection is used with striping, and the “n” pieces of data are typically the blocks or bytes distributed across the drives in the array. The parity information can either be stored on a separate, dedicated drive, or be mixed with the data across all the drives in the array.
Page 169
NSA malfunctioning. Here are some suggestions for helping to protect your data. • Place the NSA behind a hardware-based firewall. It should have stateful packet inspection, IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL’s ZyWALL UTM products for example).
Page 170
Chapter 8 Storage Media Server User’s Guide...
You can connect the NSA to both IPv4 and IPv6 networks. DNS Server Address A DNS (Domain Name System) server maps domain names (like www.zyxel.com) to their corresponding numerical IP addresses. This lets you use domain names to access web sites without having to know their IP addresses.
Page 172
Chapter 9 Network PPPoE Point-to-Point Protocol over Ethernet (PPPoE) allows the NSA to establish a direct Internet connection if you do not have a router. PPPoE is a dial-up connection. You need a username and password from your Internet Service Provider (ISP) to set up the connection. Jumbo Frames Jumbo frames are Ethernet frames larger than 1500 bytes.
Chapter 9 Network 9.4 The TCP/IP Screen Use the TCP/IP screen to have the NSA use a dynamic or static IP address, subnet mask, default gateway and DNS servers. Click Network > TCP/IP in the navigation panel to open the following screen. Note: If you change the NSA’s IP address, you need to log in again after you apply changes.
Page 174
Chapter 9 Network The following table describes the labels in this screen. Table 28 Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NSA get IP address information automatically. If no IP address information is assigned, the NSA uses Auto-IP to assign itself an IP address and subnet mask.
Chapter 9 Network Table 28 Network > TCP/IP (continued) LABEL DESCRIPTION Jumbo Frames Jumbo frames improve network performance. You must have a 1 Gbps (Gigabit Ethernet) network that supports jumbo frames. Select the largest size of frame that all of your network devices (including computer Ethernet cards and switches, hubs, or routers) support.
Chapter 9 Network If your Internet gateway supports Port Address Translation (PAT is sometimes included with a port forwarding feature), you can have the Internet users use a different TCP port number from the one the NSA uses for the service. Figure 82 UPnP Port Address Translation for FTP Example 192.168.1.20 a.b.c.d...
Chapter 9 Network 9.5.3 The NSA’s Services and UPnP This section introduces the NSA’s services which an Internet gateway can use UPnP to allow access to from the Internet. BitTorrent BitTorrent is a distributed peer-to-peer file-sharing protocol that the NSA’s download service can use.
Page 178
Chapter 9 Network to the Internet gateway’s WAN interface to access services on the NSA. You can set which port Internet users need to use to access a specific service on the NSA. Note: Some Internet gateways will delete all UPnP mappings after reboot. So if the Internet gateway reboots, you may need to use this screen again to re-apply the UPnP port mapping.
Chapter 9 Network Table 29 Network > UPnP > Port Mapping (continued) LABEL DESCRIPTION WAN Port When you enable WAN access for one of the NSA’s services, specify the port number (1~65,536) Internet uses need to use to connect to the Internet gateway’s WAN port in order to access the service on the NSA.
Page 180
Chapter 9 Network The following table describes the labels in this screen. Table 30 Network > PPPoE LABEL DESCRIPTION Status Status This field displays the status of PPPoE connection. IP Address This field displays the IP address of your PPPoE connection. IP Subnet Mask This field displays the IP subnet mask of your PPPoE connection.
HAPTER Applications 10.1 Overview This chapter discusses the features in the Application screens. The NSA contains various applications for file sharing and downloading. 10.2 What You Can Do • Use the FTP Server screen (Section 10.4 on page 184) to configure settings for FTP file transfers to/from the NSA.
Page 182
Chapter 10 Applications FTPES (File Transfer Protocol over Explicit TLS/SSL) File Transfer Protocol over Explicit TLS/SSL (FTPES) is a file transfer service that uses either TLS (Transport Layer Security) or SSL (Secure Sockets Layer) for secure transfers across the Internet. It requests for a mutual method of encryption from the FTP server for its file transfer sessions.
Page 183
Chapter 10 Applications BitTorrent The NSA includes a BitTorrent client for fast downloading and sharing of large files (such as educational public domain videos). With BitTorrent, you share while you’re downloading the file. BitTorrent breaks up the file and distributes it in hundreds of chunks. You start sharing the file as soon as you have downloaded a single chunk.
Chapter 10 Applications 10.4 FTP Server Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA and download files from the NSA. Click Applications > FTP to open the following screen. Figure 87 Applications > FTP The following table describes the labels in this screen.
Chapter 10 Applications Table 31 Applications > FTP LABEL DESCRIPTION Customize the port Select this check box to assign a port range for FTP clients to use when downloading range for data files from the NSA using passive mode. transfer The connection limit is restricted to half of the port numbers within the range if this value is smaller than the one configured in the Connection Limit field.
Page 186
Chapter 10 Applications Click Applications > Media Server to open the following screen. Use this screen to view the media server’s status and rebuild the media server database. Figure 88 Applications > Media Server > Media Server The following table describes the labels in this screen. Table 32 Applications >...
Chapter 10 Applications Table 32 Applications > Media Server > Media Server LABEL DESCRIPTION Auto Scan Published The NSA has to scan the published shares and find the media files before the media Shares server can share them. Select this to automatically scan the published shares for media files.
Chapter 10 Applications Table 33 Applications > Media Server > Share Publish LABEL DESCRIPTION Apply Click this to save your changes. Reset Click this to restore your previously saved settings. 10.5.2 The Media Server ID3 Tag Decoding Screen Click Applications > Media Server > ID3 Tag Decoding to open the following screen. ID3 tags store information about a media file such as the title, artist, album, and genre in the file itself.
Chapter 10 Applications Table 34 Applications > Media Server > ID3 Tag Decoding LABEL DESCRIPTION Selected Character This list box displays the character sets the NSA can use to decode ID3 tags in your Sets media files. The NSA attempts to use them in the order listed so select character sets and use the up or down arrow to change their order to match the types of files you have.
Chapter 10 Applications The following table describes the labels in this screen. Table 36 Applications > Media Server > SqueezeCenter LABEL DESCRIPTION Enable Check this to enable SqueezeCenter. SqueezeCenter Apply Click this to save your changes. Reset Click this to restore your previously saved settings. 10.6 The Download Service Screen The Download Service screen allows you to download files from the Internet.
Page 191
Chapter 10 Applications Table 37 Applications > Download Service (continued) LABEL DESCRIPTION Preferences Click this to open a screen where you can set the default location for saving downloads and configure your BitTorrent settings. Refresh Click this to update the information displayed on the screen. Select Files A single BitTorrent torrent file is often for multiple files.
Page 192
Chapter 10 Applications Table 37 Applications > Download Service (continued) LABEL DESCRIPTION Status The following icons show the download’s status. Completed: The NSA has downloaded the whole file. Seeding: The download is finished and the NSA is allowing other BitTorrent users to download it.
Chapter 10 Applications 10.6.1 Adding a Download Task Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 5.10 on page 92 provides a tutorial on adding a download task.
Page 194
Chapter 10 Applications Table 38 Applications > Download Service > Add LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete downloads in) and Downloaded Files where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded.
Chapter 10 Applications 10.6.2 Configuring General Settings Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period. Figure 95 Applications > Download Service > Preferences > General Settings Media Server User’s Guide...
Page 196
Chapter 10 Applications The following table describes the labels in this screen. Table 39 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete downloads in) and Downloaded Files where the NSA moves completed downloads (Move completed downloads to).
Chapter 10 Applications Table 39 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Download Service Specify the time period for the NSA to download files. is active in the time period Note: If you also configured the Power On/Off Schedule feature in the Power (hh:mm - Management screen, make sure your active download period does not conflict with hh:mm)
Page 198
Chapter 10 Applications The following table describes the labels in this screen. Table 40 Applications > Download Service > Preferences > BitTorrent LABEL DESCRIPTION Port Number Assign a port number for BitTorrent downloads. You can select a number from 2 to 65536.
Chapter 10 Applications Table 40 Applications > Download Service > Preferences > BitTorrent LABEL DESCRIPTION Reset Click this to restore your previously saved settings. Cancel Click this to return to the previous screen without saving. 10.6.4 Edit IP Filter Use this screen to enable or disable IP filtering for BitTorrent downloads. IP filtering blocks IP addresses known to share fake files.
Chapter 10 Applications 10.6.5 Selecting Files to Download Select an item in the Applications > Download Service screen’s list and click Select Files to open the following screen. Use this screen to select which of the torrent’s files to download. Section 5.10 on page 92 provides a tutorial on adding a download task.
Chapter 10 Applications 10.6.6 Displaying the Task Information Select an item on the list and click Task Info. Use this screen to check detailed information about the task. Figure 99 Applications > Download Service > Task Info The following table describes the labels in this screen. Table 43 Applications >...
Chapter 10 Applications Table 43 Applications > Download Service > Task Info LABEL DESCRIPTION Priority Use this field to set the priority for downloading the task. Select Auto to have the NSA automatically determine the task’s priority. Select High to have the NSA download this file before the other files. Comment Enter a description for this task.
Chapter 10 Applications Table 44 Applications > Web Publishing LABEL DESCRIPTION Port Number Specify a port number for accessing the published share websites hosted on the NSA. If you enter a number other than 80, make sure you include it when telling others how to access the web-published share.
Page 204
Chapter 10 Applications Click Applications > Broadcatching to open the following screen. Figure 101 Applications > Broadcatching The following table describes the labels in this screen. Table 45 Applications > Broadcatching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button.
Chapter 10 Applications Table 45 Applications > Broadcatching LABEL DESCRIPTION Item Name These are the downloadable files. The following icons show the file’s status in the NSA. Completed: The NSA has downloaded the whole file. Double-click the item to go to the Download Service screen where you can see the file’s name and location.
Page 206
Chapter 10 Applications select policies for downloading and deleting the channel’s items. Section 5.11 on page 107 provides a tutorial on adding a broadcatching channel. Figure 103 Applications > Broadcatching > Add Channel The following table describes the labels in this screen. Table 46 Applications >...
Page 207
Chapter 10 Applications Table 46 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete downloads in) and Downloaded where the NSA moves completed downloads (Move completed downloads to). Files The Share column shows the name of the share where the file is downloaded.
Chapter 10 Applications 10.8.2 Editing a Broadcatching Channel Click Applications > Broadcatching, then select a channel and click Edit Channel to open a similar Edit screen. Use the Edit Channel screen to change the download or delete policies. Figure 104 Applications > Broadcatching > Edit Channel The following table describes the labels in this screen.
Chapter 10 Applications Table 47 Applications > Broadcatching > Edit Channel LABEL DESCRIPTION Location of This shows where the NSA stores new downloads (Put incomplete downloads in) and Downloaded Files where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded.
Chapter 10 Applications Click Applications > Print Server to open the following screen. Figure 105 Applications > Print Server The following table describes the labels in this screen. Table 48 Applications > Print Server LABEL DESCRIPTION Refresh Click this to update the list of printers and print jobs. The table lists printers and their queued print jobs.
Chapter 10 Applications 10.10 The Copy/Sync Button Screen The Copy/Sync button on the front panel allows you to copy or synchronize files between a connected USB device and the NSA. Click Applications > Copy/Sync Button to open the following screen. Figure 107 Applications >...
Chapter 10 Applications Table 50 Applications > Copy/Sync Button LABEL DESCRIPTION USB Volume If your USB device has multiple partitions, select which partition to use with the synchronization function. Sync Direction Select USB -> NSA to synchronize files from your USB device to the NSA. Select NSA ->...
You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof. ZyXEL bears NO responsibility or liability for your use of the download service feature.
Chapter 10 Applications If you already have the torrent file saved on your computer, you can just specify its location when adding a download task through the web configurator. Another method is to use FTP or a CIFS program (Windows Explorer for example) to copy the torrent file into the torrent folder. The NSA automatically uses the torrent file.
Chapter 10 Applications Note: The download service notification only keeps track of files downloaded via BitTorrent. Figure 110 Download Service Notification 10.11.5 BitTorrent Security When you download using BitTorrent, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall.
Page 216
Chapter 10 Applications • Anti-virus to check files you download for computer viruses. BitTorrent and Your Firewall The anti-virus feature on a firewall probably cannot check BitTorrent downloads for viruses, so use anti-virus software on your computer to scan the NSA for viruses. When you download using BitTorrent, many other BitTorrent users are also trying to download the file from you.
Chapter 10 Applications HTML (web-based) configuration interface to set this up (see the firewall’s manual for details). You may also have to configure a corresponding firewall rule. Figure 113 Firewall Configured to Allow Incoming BitTorrent Requests 10.11.6 Web Publishing Example This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet.
Chapter 10 Applications Now open your web browser and type in the address of the NSA’s FamilyPhotos web page. In this example, the NSA’s IP address is 192.168.1.33, and the name of the web-published share is FamilyPhotos. So you would enter “http://192.168.1.33/MyWeb/FamilyPhotos/” in your browser’s address bar.
10.11.8 Channel Guides for Broadcatching Here are some popular broadcatching channel guide web sites. Note: ZyXEL does not endorse these web sites and is not responsible for any of their contents. Use these or any other web sites at your own risk and discretion.
The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA’s USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers.
Chapter 10 Applications The following figure illustrates how copying files works when you copy files from a USB device to the NSA. The same concept applies when you copy files from the NSA to a USB device. Figure 118 Copying Files Example Before Copy After Copy Both storage devices contain file A.
Page 222
Chapter 10 Applications The following figure illustrates how synchronization works when you synchronize files from a USB device to the NSA. The same concept applies when you synchronize files from the NSA to a USB device. Figure 119 Synchronizing Files Example 1 Before Sync After Sync Both storage devices contain A.
Page 223
Chapter 10 Applications The following figure illustrates how synchronization works when you synchronize files in both directions simultaneously. Figure 120 Synchronizing Files Example 2 Before Sync (new) (new) After Sync (new) (new) (new) (new) A on the USB device and B on the NSA are modified more recently. •...
Page 224
Chapter 10 Applications Media Server User’s Guide...
HAPTER Package Management 11.1 Overview Package Management can be used to set up more useful applications in your NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps. 11.2 What You Can Do •...
Chapter 11 Package Management • Gallery - This web-based application allows your NSA to host pictures. You can upload images in your local computer or shares to this application. Use the administrator account of your NSA to log in to the Gallery console. The administrator can then create accounts for other users. •...
Page 227
LABEL DESCRIPTION Package Management Retrieve List From Click this to retrieve a list of available packages from the ZyXEL website. Internet Install/Upgrade Choose the item(s) on the list and click this to install the selected application(s) on your system or upgrade to the latest version if you have previously installed the application.
Page 228
Chapter 11 Package Management Table 51 Applications > Package (continued) LABEL DESCRIPTION Status This is the current status of the application. It shows: • Not Installed - This displays for applications that have not been installed by the NSA. • Installing (%) - This displays when the application is being installed.
Chapter 11 Package Management 11.4.1 Displaying the Package Information Select an item on the list and click Package Info. Use this screen to check detailed information about the task. Figure 122 Applications > Package Management > Package Info The following table describes the labels in this screen. Table 52 Applications >...
Chapter 11 Package Management Dynamic DNS allows you to update your current dynamic IP address with a dynamic DNS service so that anyone can contact you (such as through NetMeeting or CUSeeMe). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
Page 231
Chapter 11 Package Management NFS is a client/server distributed file service that provides transparent file sharing for network environments. This allows shared folders in your NSA to be accessible like a local folder in a user’s computer. Click Network > NFS to open the following screen. Figure 124 Network >...
Chapter 11 Package Management You see a warning screen before you delete a volume. Figure 125 Delete an NFS Share 11.6.1 Add/Edit NFS Share Use this screen to add or edit an NFS share. Note: Some attributes of the NFS share cannot be edited. Click Add or Edit in the Network >...
Chapter 11 Package Management Table 55 Network > NFS: Add/Edit LABEL DESCRIPTION DN/IP Filter Enter the domain name(s) or IP address(es) that can have access to the NFS share. Enter ‘*’ to make the share available to all users in the network. You can also enter a wildcard, such as ‘*.domain.com’...
Page 234
Chapter 11 Package Management Self Monitoring, Analysis, and Reporting Technology (S.M.A.R.T) detects and reports the reliability of hard disks using standard indicators (called “attributes”), to help you anticipate possible disk failures. Note: The fields included the screens may vary depending on the hard disk that you use. Click Storage >...
Chapter 11 Package Management 11.7.1 SMART Brief Summary Use this screen to display information about the volume, such as the hard disk vendor, specific model, hard disk capacity and so on. Click Brief Summary in the Storage > S.M.A.R.T screen to display the following. Figure 129 Storage >...
Chapter 11 Package Management 11.7.2 SMART Full Summary Use this screen to display more details information about the volume. Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 130 Storage > S.M.A.R.T: Full Summary The following table describes the labels in this screen. Table 59 Storage >...
Chapter 11 Package Management Table 59 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION Updated This indicates when the hard drive updates the value for this attribute. • Always means the hard drive updates this attribute during normal operation and during offline activities. •...
Chapter 11 Package Management The following table describes the labels in this screen. Table 60 Protect > Backup LABEL DESCRIPTION Backup Add Job Click this to create and customize a backup job. Edit Job Select a backup job in the list and click this to make some changes to it. Delete Selected Select a backup job in the list and click this to delete it.
Page 239
Chapter 11 Package Management Click Add Job in the Protect > Backup screen to open the following: Figure 132 Protect > Backup: Step 1 The following table describes the labels in this screen. Table 61 Protect > Backup: Step 1 LABEL DESCRIPTION Job Information...
Chapter 11 Package Management 11.9.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored. Figure 133 Protect > Backup: Step 2 Media Server User’s Guide...
Page 241
Chapter 11 Package Management The following table describes the labels in this screen. Table 62 Protect > Backup: Step 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files.
Chapter 11 Package Management Table 62 Protect > Backup: Step 2 LABEL DESCRIPTION Previous Click this to go back to the previous screen. Next Click this to go to the next screen. 11.9.3 Backup: Step 3 Use this screen to specify compression, encryption and purge policies for the backup job. This step is only available if you are doing an archive backup or a synchronization backup to a remote target.
Chapter 11 Package Management Table 63 Protect > Backup: Step 3 LABEL DESCRIPTION Purge Policy The NSA maintains the files that have been included in your backups. However to save hard disk space, you can choose to delete files that have been included in previous backups. •...
Chapter 11 Package Management Table 64 Protect > Backup: Step 4 LABEL DESCRIPTION Start Time This is available if you selected Daily, Weekly or Monthly as your backup frequency. (hh:mm) Select the time in hour:minute format when you want the NSA to perform the backup job.
Chapter 11 Package Management 11.9.6 Edit Job: Step 1 Click Protect > Backup. Select a backup job from the list and click Edit Job to open the following. Figure 136 Protect > Backup > Edit: Step 1 The following table describes the labels in this screen. Table 65 Protect >...
Chapter 11 Package Management Table 65 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Bandwidth For backups to a remote NSA, you can restrict the bandwidth to help prevent the backups from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet.
Chapter 11 Package Management Table 66 Protect > Backup > Edit: Step 2 LABEL DESCRIPTION Start Time (hh:mm) This is available if you selected Daily, Weekly or Monthly as your backup frequency. Select the time in hour:minute format when you want the NSA to perform the backup job.
Chapter 11 Package Management Table 67 Protect > Backup > Restore Archive: Step 1 LABEL DESCRIPTION Job Description This is a short description (up to 100 keyboard characters) for the backup job. Backup Type This is the type of backup implemented for the backup job. Scheduler This field displays the backup’s frequency.
Chapter 11 Package Management 11.9.11 Restore Archive: Step 3 Use this screen to select the location in the NSA where you want to restore your backup. Figure 140 Protect > Backup > Restore Archive: Step 3 The following table describes the labels in this screen. Table 69 Protect >...
Chapter 11 Package Management 11.10.1 Restore: Step 1 You can access this screen by clicking Protect > Restore. Figure 141 Protect > Restore: Step 1 The following table describes the labels in this screen. Table 70 Protect > Restore: Step 1 LABEL DESCRIPTION Step 1.
Chapter 11 Package Management Table 70 Protect > Restore: Step 1 LABEL DESCRIPTION Browse Click this to select where the previous backup that you want to restore is located. • Volume - Select a volume from the list. • Current Location - This is the location of the selected folder. •...
Chapter 11 Package Management Table 71 Protect > Restore: Step 2 LABEL DESCRIPTION Restored Time Select a previous backup job in the list that you want to restore to your NSA. Previous Click this to go back to the previous screen. Next Click this to go to the next screen.
Click this to run the restore process and go back to the Backup screen. 11.11 Syslog Server Screen Use this screen to configure the NSA to accept syslog logs from syslog clients such as ZyXEL’s G- 4100 v2. Note: You may need to configure any firewalls between the NSA and the syslog clients in order to let the syslog traffic go to the NSA.
Page 254
Chapter 11 Package Management Click Applications > Syslog Server to open the following screen. Figure 145 Applications > Syslog Server The following table describes the labels in this screen. Table 74 Applications > Syslog Server LABEL DESCRIPTION Enable Syslog Select this to have the NSA accept syslog logs from syslog clients. Clear it to Server stop the NSA from accepting syslog logs from syslog clients.
Use this screen to configure the NSA to accept log files from TFTP clients such as ZyXEL’s G-4100 v2. Note: You may need to configure any firewalls between the NSA and the TFTP clients in order to let the log files go to the NSA.
Chapter 11 Package Management Table 75 Applications > TFTP Server LABEL DESCRIPTION Path Use this if you want to further specify a folder within the share This field displays the share folder’s path. Type the location of the folder using forward slashes as branch separators or use Browse to find or create a folder on the NSA.
Page 257
Chapter 11 Package Management The following table describes the labels in this screen. Table 76 Applications > eMule > Server LABEL DESCRIPTION Server - You can add multiple servers in this screen. However, the NSA can only connect to one eMule server at a time.
Chapter 11 Package Management 11.13.2 Add Server Use this screen to add a server for the eMule application. Click Add in the Applications > eMule > Server screen to add a server. Figure 149 Applications > eMule > Server: Add The following table describes the labels in this screen.
Chapter 11 Package Management The following table describes the labels in this screen. Table 78 Applications > eMule > Server: Edit LABEL DESCRIPTION Server Name Enter the server name. IP Address Enter the IP address of the server. Port Number Enter the port number of the server.
Chapter 11 Package Management Table 79 Applications > eMule > Server: MyInfo LABEL DESCRIPTION Sources This shows the total number of peers that can share the required files to the NSA eMule client. Close Click this to exit the screen. 11.13.5 eMule Task Screen Use this screen to view tasks, including completed, downloading, uploading and shared tasks, that are being handled by the NSA.
Page 261
Chapter 11 Package Management Table 80 Applications > eMule > Task LABEL DESCRIPTION Resume Select a paused item from the list and click this to resume the task. Task Info Select an item from the list and click this to view the details and status of the task. The table lists your tasks.
Chapter 11 Package Management You see a warning screen before you delete a task. Figure 153 Delete a Task 11.13.6 Add Task Use this to add a download task to the NSA. Click Add in the Applications > eMule > Task screen to add a task. Figure 154 Applications >...
Chapter 11 Package Management Table 81 Applications > eMule > Task: Add LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. •...
Page 264
Chapter 11 Package Management Click Applications > eMule > Task > Preferences to open the following screen. Figure 155 Applications > eMule > Task > Preferences The following table describes the labels in this screen. Table 82 Applications > eMule > Task > Preferences LABEL DESCRIPTION Username...
Page 265
Chapter 11 Package Management Table 82 Applications > eMule > Task > Preferences LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. •...
Chapter 11 Package Management Table 82 Applications > eMule > Task > Preferences LABEL DESCRIPTION Reset Click this to clear the fields. Cancel Click this to return to the previous screen without saving. 11.13.8 Edit IP Filter Use this screen to enable IP filtering which prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs.
Page 267
Chapter 11 Package Management Click Applications > eMule > Task > Browse Incomplete Downloads to open the following screen. Figure 157 Applications > eMule > Task > Browse Incomplete Downloads The following table describes the labels in this screen. Table 84 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder...
Chapter 11 Package Management Table 84 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Delete Select a file/folder from the list and click this to open a warning screen. Click Yes to delete the file/folder, or click No to close the screen. Move Select a file/folder from the list and click this to relocate the file/folder to another share.
Chapter 11 Package Management The following table describes the labels in this screen. Table 85 Applications > eMule > Task: Task Info LABEL DESCRIPTION Status This shows the current status of the task - Waiting or Downloading. Name This shows the file name of the file associated with the task. You can change this file name by entering the new name and clicking Apply.
Page 270
Chapter 11 Package Management Click Applications > eMule > Search to open the following screen. Figure 159 Applications > eMule > Search The following table describes the labels in this screen. Table 86 Applications > eMule > Search LABEL DESCRIPTION Search Enable eMule Check this and click Apply to enable the eMule application.
Chapter 11 Package Management 11.14 pyLoad Screen Use this screen to configure the NAS so you can use pyLoad to manage your downloads, including those from one-click hosting sites. Click Applications > pyLoad to open the following screen. Figure 160 Applications > pyLoad The following table describes the labels in this screen.
Chapter 11 Package Management 11.15.1 S.M.A.R.T Attributes The following table describes some common S.M.A.R.T. attributes. If a higher or lower raw attribute value is better, it is indicated in the BETTER column. Since S.M.A.R.T. attributes and their definitions vary by manufacturer, refer to the hard drive manufacturer for details about the attributes your hard drive supports.
Page 273
Chapter 11 Package Management Table 88 S.M.A.R.T. Attributes (continued) ATTRIBUTE BETTER DESCRIPTION NAME Power-off Retract This is how many times the heads are loaded off the media. Count Load/Unload This is the number of load and unload cycles into head landing zone Cycle position.
Page 274
Chapter 11 Package Management Table 88 S.M.A.R.T. Attributes (continued) ATTRIBUTE BETTER DESCRIPTION NAME Load/Unload This is how many time the magnetic head has changed position. Retry Count Load Friction This is resistance caused by friction in mechanical parts during operation. Load/Unload This is the total number of load cycles.
HAPTER Auto Upload 12.1 Overview This chapter discusses the features in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family.
Chapter 12 Auto Upload Click Applications > Auto Upload > Flickr/YouTube to open the following screen. Figure 161 Applications > Auto Upload > Flickr/YouTube The following table describes the labels in this screen. Table 89 Applications > Auto Upload > Flickr/YouTube LABEL DESCRIPTION Flickr/YouTube...
Page 277
Chapter 12 Auto Upload The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account’s information and click Sign In. Figure 163 Yahoo! Flickr Login Page Media Server User’s Guide...
Page 278
Chapter 12 Auto Upload The following page displays asking for your authorization. Click OK, I’LL ALLOW IT to establish a link between the NSA and your Flickr account. Figure 164 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA web configurator.
Page 279
Chapter 12 Auto Upload Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen. Figure 166 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) Media Server User’s Guide...
Page 280
Chapter 12 Auto Upload The following table describes the labels in this screen. Table 90 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) LABEL DESCRIPTION Flickr Account Configuration Username This field displays the Flickr account authorized for the auto upload feature. Photo Space Usage This shows how much storage space for photos (in size and percentage) you have used and how much space is still available on your Flickr account.
Chapter 12 Auto Upload Table 90 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) (continued) LABEL DESCRIPTION Grace Period N Specify how long the NSA should wait when you add a new file for auto upload. For minutes example, if you set the grace period to 5 minutes, the NSA uploads a new file after it has been in a watched folder for 5 minutes.
Page 282
Chapter 12 Auto Upload Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen. Figure 168 Applications > Auto Upload > Flickr/YouTube > Config (YouTube) The following table describes the labels in this screen. Table 91 Applications >...
Page 283
Chapter 12 Auto Upload Table 91 Applications > Auto Upload > Config (YouTube) (continued) LABEL DESCRIPTION Switch User Click this to use a different YouTube account for the auto upload feature. Folder Selection Folder Watch List This table displays a list of shares and folders selected for auto upload. Files stored in these locations are uploaded to your YouTube account.
Chapter 12 Auto Upload Table 91 Applications > Auto Upload > Config (YouTube) (continued) LABEL DESCRIPTION Who can see your Determine who has the right to see files uploaded to your YouTube account. media files on Select Only You if you do not want anyone else to see your files. YouTube? Select Anyone to allow everyone to see your files.
Chapter 12 Auto Upload The following table describes the labels in this screen. Table 92 Applications > Auto Upload > FTP Uploadr LABEL DESCRIPTION Enable FTP Uploadr Use the check box to enable or disable the FTP Uploadr. Click Apply to save your changes.
Chapter 12 Auto Upload In the FTP Uploadr screen, click the Add Server or Edit Server button to open the following screen. Figure 170 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server The following table describes the labels in this screen. Table 93 Applications >...
Page 287
Chapter 12 Auto Upload In the FTP Uploadr screen, click the Preferences icon to open the following screen. Figure 171 Applications > Auto Upload > FTP Uploadr > Preferences The following table describes the labels in this screen. Table 94 Applications > Auto Upload > FTP Uploadr > Preferences LABEL DESCRIPTION Folder Watch List...
Page 288
Chapter 12 Auto Upload Table 94 Applications > Auto Upload > FTP Uploadr > Preferences (continued) LABEL DESCRIPTION Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. •...
HAPTER Dropbox 13.1 Overview The Dropbox Web-based file hosting service uses cloud computing to let you use file synchronization to store and share files and folders with others across the Internet. Use your Dropbox account to easily move files to your NSA and have the NSA download *.torrent files. 13.2 Dropbox Screen Use the Dropbox screen to log the NSA into your Dropbox account.
Page 290
Chapter 13 Dropbox The following table describes the labels in this screen. Table 95 Applications > Dropbox LABEL DESCRIPTION Status This shows the status of the NSA Dropbox application’s interaction with the Dropbox server. Disable: The NSA Dropbox application is turned off. Ready: The NSA Dropbox application has authenticated with the Dropbox server and is ready to use.
Chapter 13 Dropbox Table 95 Applications > Dropbox (continued) LABEL DESCRIPTION Enable Dropbox Select this to synchronize and back up your Dropbox account. The first time you do this a Dropbox screen prompts you to log into your Dropbox account. Then a NSA pop-up opens.
Page 292
Chapter 13 Dropbox admin\Dropbox\FromDropbox folder in the format of “filename(n).extension”. Here is an example of the Drop2NAS folder. Note: Do not delete the NAStoken file as it is needed for your NSA to work with the Dropbox account. Figure 173 Dropbox\Drop2NAS Using the zDownload Folder The NSA copies *.torrent files in the zDownload folder to the NSA’s admin\download\torrents folder and automatically starts downloading them.
HAPTER Users 14.1 Overview This chapter introduces the Users screens of the NSA. Use the Users screens to create and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. •...
Page 294
Chapter 14 Users Use this screen to create and manage accounts for users who can store files on the NSA. Figure 175 Sharing > Users The following table describes the labels in this screen. Table 96 Sharing > Users LABEL DESCRIPTION Add User Click this to open a screen where you can configure a new user account.
Chapter 14 Users Table 96 Sharing > Users (continued) LABEL DESCRIPTION Delete Selected Select an account and click this to open a screen where you can delete the user Users account. User Info Select an account and click this to open a screen displaying the amount of storage space used by the account.
Page 296
Chapter 14 Users Click the Add User button in the Users screen to open the following screen. Click the Edit User button in the screen shown previously to edit an existing account. Figure 176 Sharing > Users > Add or Edit a User The following table describes the labels in this screen.
Chapter 14 Users 14.3.3 Usernames Enter a username from one to 32 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characters are not allowed as the first character. The username can only contain the following characters: •...
Page 298
Chapter 14 Users In the Users screen, select an account and click User Info to open the following screen. Figure 177 Sharing > Users > User Info The following table describes the labels in this screen. Table 99 Sharing > Users > User Info LABEL DESCRIPTION Username...
HAPTER Groups 15.1 Overview This chapter introduces the Groups screens. Use the Groups screens to create and manage groups. You can assign users to groups and grant individual groups access rights to specific shares. 15.2 What You Can Do • Use the main Groups screen (Section 15.3 on page 299) to display and manage a list of groups created on the NSA.
Chapter 15 Groups The following table describes the labels in this screen. Table 100 Sharing > Groups LABEL DESCRIPTION Add Group Click this to open a screen where you can configure a new group. Search Click this to display a search field. Type the name of a group and then click Search to look up the group you specified.
Chapter 15 Groups Click the Add Group button in the Groups screen to open the following screen. Click the Edit Group button in the screen shown previously to edit an existing group. Figure 179 Sharing > Groups > Add or Edit a Group The following table describes the labels in this screen.
Page 302
Chapter 15 Groups • Multiple spaces within names are converted to a single space. • Group names are case insensitive. The group name cannot be the same (no matter the letter case) as an existing group. For example, if a group exists with the name 'FAMILY', you cannot create a group named 'family'.
HAPTER Shares 16.1 Overview A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder. You can map a share to a network drive for easy and familiar file transfer for Windows users.
Page 304
Chapter 16 Shares The following table describes the labels in this screen. Table 102 Sharing > Shares LABEL DESCRIPTION Add Share Click this to create a new share. Recycle Bin Click this to configure recycle bins. Edit Share Select a share and click this to edit the share. Delete Share Select a share and click this to remove or restrict access to the share.
Chapter 16 Shares Table 102 Sharing > Shares (continued) LABEL DESCRIPTION Share Path This field displays the share’s file path, for example, volume1/music. Share Owner This is the name of the user account to which this share belongs. Permission Type This field displays the access permission of a share.
Chapter 16 Shares Table 103 Shares > Add Share (or Edit Share) (continued) LABEL DESCRIPTION Section 10.7 on page 202) Publish this share This shows only when you enable the Web Publish ( to Web Select this option to let people use a web browser to access this share’s files without logging into the Home screens.
Chapter 16 Shares The following table describes the labels in this screen. Table 104 Sharing > Shares > Add Share (or Edit Share) > Advanced LABEL DESCRIPTION Available Users/Groups This field lists the users/groups to which you can assign access rights. Authority Use this field to assign access rights to users/groups.
Chapter 16 Shares 16.4.2 Configuring Recycle Bins In the Sharing > Shares screen, click Recycle Bin to open the following screen. Figure 183 Sharing > Shares > Recycle Bin The following table describes the labels in this screen. Table 105 Sharing > Shares > Recycle Bin LABEL DESCRIPTION Clean Recycle Bin every N...
Page 309
Chapter 16 Shares The following table describes the labels in this screen. Table 106 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder Type a folder name and click Apply to make a new folder. The name can be 1 to 239 single- byte (no Chinese characters allowed for example) ASCII characters.
Chapter 16 Shares Table 106 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Modified Date This field displays a file’s latest modification date. Close Click this to close the screen. 16.5.1 Moving or Copying Files Use this screen to move or copy files to another share. In the Share Browser screen, select a file or folder and click Move or Copy to open the following screen.
HAPTER Maintenance Screens 17.1 Overview This chapter discusses the Maintenance screens. The Maintenance screens allow you to manage system configurations. 17.2 What You Can Do • Use the Power screen (Section 17.3 on page 311) to configure power settings for the NSA, including power saving, UPS, power on/off after power failure, power on/off schedule, and Wake on LAN.
Page 312
Chapter 17 Maintenance Screens Click Maintenance > Power to display the following screen. Figure 186 Maintenance > Power The following table describes the labels in this screen. Table 108 Maintenance > Power LABEL DESCRIPTION Power Management Turn off hard Enter the number of minutes the NSA will sit idle before spinning the hard disks down to disk(s) sleep.
Chapter 17 Maintenance Screens Table 108 Maintenance > Power (continued) LABEL DESCRIPTION Always Power Select this option to keep the NSA from automatically restarting when the power is restored after a power failure. This is a computer’s “traditional” behavior. Select this if you have other servers such as a domain controller or DNS server that you want to start or check after a power failure before the NSA turns on.
Page 314
Chapter 17 Maintenance Screens The following table describes the labels in this screen. Table 109 Maintenance > Power Management > Edit LABEL DESCRIPTION Power Control This table lists the power on, power off, and reboot schedules. For example, you could Schedule List have one schedule to turn the NSA on every morning, at 8:00, another schedule to turn it off every evening at 18:00, and a third schedule to have it reboot every Friday at 14:00.
Chapter 17 Maintenance Screens 17.4 The Log Screen Click Maintenance > Log to open the following screen. Use this screen to display all NSA logs. There are at most 512 entries in the log. Older logs are removed by the system. You cannot download the log file via FTP or CIFS. Figure 188 Maintenance >...
Chapter 17 Maintenance Screens • Use the Email Setting screen (Section 17.4.2 on page 316) to enable and configure e-mail alerts from the NSA. • Use the Report Setting screen (Section 17.4.3 on page 317) to select the type of alerts you want to receive through e-mail and schedule when the NSA e-mails the alerts.
Chapter 17 Maintenance Screens 17.4.3 Report Setting You can select the type of alerts you want to receive through e-mail and schedule when the NSA e- mails the alerts. In the Report Config screen, click the Report Setting tab to open the following screen.
Chapter 17 Maintenance Screens The following table describes the labels in this screen. Table 113 Maintenance > Log > Report Config: Syslog Server Setting LABEL DESCRIPTION Enable Syslog Check this to enable syslog server. Server Server Address Enter the syslog server address you want the NSA to use for its log alerts. In the table below, check the type of log alerts you want to receive in your e-mail.
Chapter 17 Maintenance Screens Table 114 Maintenance > Configuration LABEL DESCRIPTION Restore Click this to load the previously-saved configuration file to the NSA. This replaces your current NSA configuration settings with the settings in the previously-saved configuration file. A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit.
Chapter 17 Maintenance Screens The following table describes the labels in this screen. Table 115 Maintenance > SSL LABEL DESCRIPTION Force HTTPs Select the Force HTTPs option to turn on the NSA’s web browser security. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it.
17.7 The Firmware Upgrade Screen Use this screen to upgrade the NSA firmware. You should first have downloaded the latest firmware files from the ZyXEL website. Do not turn off the NSA while it is upgrading the firmware or you may render it unusable.
LED behavior during firmware upgrade. Reset Click this to refresh the screen. Periodically Check for Select this to have the NSA regularly check ZyXEL’s server for updated firmware. The Latest Firmware NSA notifies you at login if a new firmware is available. Automatically Click Apply to save this field’s setting.
Chapter 17 Maintenance Screens Click Maintenance > Shutdown to open the following screen. Figure 196 Maintenance > Shutdown The following table describes the labels in this screen. Table 118 Maintenance > Shutdown LABEL DESCRIPTION Restart Click this to have the device perform a software restart. Shutdown Click this to shut down the system and restart it again later.
Chapter 17 Maintenance Screens Table 119 Log Classes (continued) DESCRIPTION CATEGORY Network This log class shows information on network configuration, setting changes and so on. Storage This log class shows information on the NSA’s internal and external storage activities. Backup This log class shows information on all backup-related activities.
Page 326
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) CLASS SEVERITY MESSAGE Download INFO Download service initialized Service Download INFO Download service pause %s by user Service Download INFO Download service set %s to %s priority by user Service Download INFO Download service set default download location to %s Service...
Page 327
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) CLASS SEVERITY MESSAGE Download INFO Download service added %d rules from ipfilter.dat Service Download INFO Download service detected invalid ip range %s in ipfilter.dat Service Download WARNING Download service default location does not exist. Load default Service Download WARNING...
Page 328
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) CLASS SEVERITY MESSAGE Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to '%s' Services NOTICE NTP server has set to null Services NOTICE The NTP service is disabled.
Page 329
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) CLASS SEVERITY MESSAGE System INFO NTP fails to update from %s System INFO Device is rebooted by administrator! System INFO Device is shutdown by administrator! System NOTICE DNS server is changed. System NOTICE Hostname is cleared.
Page 330
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) CLASS SEVERITY MESSAGE Backup/ INFO Start to restore backup job [%s] from [%s]. Restore Backup/ INFO Restore from [%s] successfully. Restore Backup/ ERROR Restore from [%s] failed: %s Restore Backup/ ERROR When restore [%s]: %s Restore Backup/...
HAPTER Protecting Your Data 18.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 18.2 Protection Methods There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.
Chapter 18 Protecting Your Data If you forgot the NSA password, then use the RESET button (see Section 1.1.5 on page 23) to return the NSA to the factory default configuration. Note: Configuration File Backup and Restoration does not affect data (your files and folders), volumes on the NSA.
Page 333
Chapter 18 Protecting Your Data When you see the following screen, select Network Places and click the link to select your backup folder. Figure 199 Memeo Autobackup Configuration Select the NSA’s mapped drive and click OK. Figure 200 Mapped Drive In this screen, select the items that you want to back up.
Chapter 18 Protecting Your Data This screen lists the items you selected for backup. Confirm your selections and click Next. Figure 202 Confirm Backup Items Specify a name for your backup plan (or just use the default). Click Next and then Done. Figure 203 Backup Plan Name 18.4.2 Using Memeo Autobackup After the Initial Setup After you have installed and configured Memeo Autobackup, double-click the...
Page 335
Chapter 18 Protecting Your Data If the icon is not displayed, you can click Start > Programs > Memeo Autobackup > Memeo Autobackup to start it. Figure 204 Memeo Autobackup Media Server User’s Guide...
Page 336
Chapter 18 Protecting Your Data Media Server User’s Guide...
HAPTER Using Time Machine with the NSA 19.1 Overview Time Machine is a backup system provided by Mac OS X. It automatically backs up everything on your Mac, including pictures, music, videos, documents, applications, and settings. This chapter helps you to enable Time Machine in OS X to allow and use your NSA as a backup volume. Follow the steps below to set up Time Machine on your Mac so your NSA can be used for backup.
Page 338
Chapter 19 Using Time Machine with the NSA Enter user1 as the Username and 12345 as the New Password. Retype the password to confirm. Then click Apply to finish adding the new user account. User1 will be added to the list on the Users screen.
Chapter 19 Using Time Machine with the NSA Note: It is suggested to set a static IP address for the NSA so you do not need to update the IP each time your computer connects to the NSA. Refer to Section 9.4 on page for more information on how to set your NSA to a static IP address.
Chapter 19 Using Time Machine with the NSA This allows Time Machine to support a network volume. Reboot your computer. 19.4 Mounting the NSA on the Mac Now you need to mount share01 on the NSA to your computer. This is the place where you will backup your files.
Chapter 19 Using Time Machine with the NSA 19.5 Creating a Sparse Bundle File for the NSA Now you need to create a sparse bundle disk image file, which is a virtual file system image that Time Machine can backup your files. It should be created locally on the Mac and then mounted to share01 of the NSA.
Chapter 19 Using Time Machine with the NSA Press [Enter] to display the MAC address. 19.5.2 Creating a Sparse Bundle File There are two ways to create a sparse bundle disk image file. You can use Disk Utility or Terminal. 19.5.2.1 Disk Utility Click Finder >...
Page 343
Chapter 19 Using Time Machine with the NSA Click File > New > Blank Disk Image. In the New Blank Image screen, do the following: Enter the name of the sparse bundle in Save As. The format of the name is “ComputerName_MacAddress”.
Chapter 19 Using Time Machine with the NSA 19.5.2.2 Terminal You can also create a sparse bundle file by using Terminal. Enter the following: sudo hdiutil create -size $SPECSIZE -type SPARSEBUNDLE - nospotlight -volname $VOLUMENAME -fs "Case-sensitive Journaled HFS+" -verbose ./$COMPUTERNAME_MACADDRESS In $SPECSIZE, enter the volume size for the sparse bundle.
Chapter 19 Using Time Machine with the NSA 19.6 Using Time Machine Now the NSA is ready to be used as a backup volume for your computer. Click Apple > System Preferences. Then go to System and select Time Machine. Turn Time Machine ON.
Page 346
Chapter 19 Using Time Machine with the NSA When prompted, the username and password of share01, enter user1/12345. Then click Connect. Time Machine starts backing up files to share01 after 120 seconds. If you want to backup immediately, click Time Machine icon and select Backup Now. The screen shows the status of the backup once the process begins.
HAPTER Troubleshooting 20.1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware, Connections, and LEDs • NAS Starter Utility • NSA Login and Access •...
Page 348
Chapter 20 Troubleshooting An HDD LED is off. The HDD LED is off when the NSA cannot detect a hard drive in the drive bay. Replace or install a hard drive. See Installing or replacing a hard disk. An HDD LED is red. Red means that the NSA detected an error on the hard drive (like a bad sector for example).
Chapter 20 Troubleshooting • Use another Ethernet cable. If you’re connecting to a Gigabit Ethernet, make sure you’re using an 8-wire Ethernet cable. • If the problem continues, contact the vendor. Section 21.1 on page 365 for a description of NSA LEDs. The NSA turns off or reboots by itself.
I forgot the server name of the NSA. • The default server name is ‘nsa’ followed by the number of your model (‘nsa325’ for example). • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility.
Page 351
• The default server name is ‘nsa’ followed by the number of your model (‘nsa325’ for example). If you have changed the server name, use the new one.
Chapter 20 Troubleshooting 20.4.1 Enabling Scripting of Safe ActiveX Controls If pages of the web configurator do not display properly in Internet Explorer, check that scripting of safe ActiveX controls is enabled. In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 205 Internet Options: Security Click the Custom Level...
Page 353
Chapter 20 Troubleshooting Click OK to close the window. Figure 206 Security Settings - Script Safe ActiveX Controls I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly. The default username is admin, and the default password is 1234.
Chapter 20 Troubleshooting 20.5 I Cannot Access The NSA I cannot access a share. • Check that the NSA is turned on and connected to the network. Try to ping the NSA or use the NAS Starter Utility to discover it. •...
Page 355
Chapter 20 Troubleshooting • The user’s computer may already be connected to another of the NSA’s shares using a different user name and/or password. This can happen without the user realizing it if the user’s computer automatically connects to a share at logon. Right-click any other connected shares and click Disconnect.
Chapter 20 Troubleshooting 20.7 External USB Drives The COPY LED is red. Copying files from a USB device failed. The USB device may not be compatible with the NSA. Try to save the files onto a computer and then from the computer to the NSA (through the network connection).
Chapter 20 Troubleshooting On your Windows computer, click Start > Run or open a web browser. Enter \\nsa followed by the number of your model (320 for example) or the Server Name you assigned the NSA. This shows you the folders in the NSA. Use drag-and-drop or copy-and-paste to transfer files from your NSA to your local computer’s folder or your storage device.
Chapter 20 Troubleshooting I cannot use some applications in the Web Configurator. • The firmware installed in your NSA includes the features mentioned in Section 4.5.2 on page This does not include the applications you can install using the Package Management screen. •...
Page 359
Chapter 20 Troubleshooting If an iTunes client is connected, the NSA’s iTunes server function scans the published media server folders for files every three minutes. Leave iTunes connected to the NSA for three minutes. Then use the NSA’s eject button (as shown next) to disconnect. Figure 207 iTunes Eject Button Then click the NSA’s link to reconnect.
Chapter 20 Troubleshooting If you have files from the iTunes Store that use DRM, you need to use your Apple account ID and password to authorize other computers to play the files. Apple permits you to authorize up to five computers at a time.
Chapter 20 Troubleshooting 20.14 Web Publishing A web-published share cannot be accessed by web browser from the Internet. • Make sure the person trying to access the share is using the correct web address (and port number if the NSA’s web publishing feature is not using port 80). See page 219 for details.
Chapter 20 Troubleshooting • Make sure your ISP allows you to run a server and is not blocking the port number of the NSA’s web publishing feature. 20.15 Auto Upload The NSA does not automatically upload files to Flickr or YouTube. Make sure the NSA is connected to the Internet.
Chapter 20 Troubleshooting • The web location of the package may be undergoing maintenance. Try again at a later time. Upgrade the firmware of the NSA. • If a new firmware is available, do an upgrade and try installing the package(s) again. The eMule Search screen does not work.
Page 364
Chapter 20 Troubleshooting Media Server User’s Guide...
HAPTER Product Specifications See also Chapter 1 on page 21 for a general overview of the key features. 21.1 LEDs This table describes the NSA’s LEDs. Table 124 LEDs NAME COLOR STATUS DESCRIPTION POWER Blue The NSA is turned on and receiving power. The NSA is turned off.
Chapter 21 Product Specifications Table 124 LEDs (continued) NAME COLOR STATUS DESCRIPTION COPY/ Green A USB device is connected to the NSA. SYNC Blinking The NSA is copying or synchronizing files to or from the USB device. Copying or synchronizing files to or from the USB device failed. No USB device is connected.
PP EN D I X Setting Up Your Computer’s IP Address Note: Your specific NSA may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Page 370
Appendix A Setting Up Your Computer’s IP Address Click Start > Control Panel. In the Control Panel, click the Network Connections icon. Right-click Local Area Connection and then select Properties. Media Server User’s Guide...
Page 371
Appendix A Setting Up Your Computer’s IP Address On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Media Server User’s Guide...
Page 372
Appendix A Setting Up Your Computer’s IP Address The Internet Protocol TCP/IP Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Page 373
Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. In the Control Panel, click the Network and Internet icon. Click the Network and Sharing Center icon. Media Server User’s Guide...
Page 374
Appendix A Setting Up Your Computer’s IP Address Click Manage network connections. Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. Media Server User’s Guide...
Page 375
Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Media Server User’s Guide...
Page 376
Appendix A Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Page 377
Appendix A Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. Click Start > Control Panel. In the Control Panel, click View network status and tasks under the Network and Internet category. Click Change adapter settings. Media Server User’s Guide...
Page 378
Appendix A Setting Up Your Computer’s IP Address Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. Media Server User’s Guide...
Page 379
Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Media Server User’s Guide...
Page 380
Appendix A Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Page 381
Appendix A Setting Up Your Computer’s IP Address The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. Click Apple > System Preferences. Media Server User’s Guide...
Page 382
Appendix A Setting Up Your Computer’s IP Address In the System Preferences window, click the Network icon. When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Media Server User’s Guide...
Page 383
Appendix A Setting Up Your Computer’s IP Address For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. •...
Page 384
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 209 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6.
Page 385
Appendix A Setting Up Your Computer’s IP Address In System Preferences, click the Network icon. When the Network preferences pane opens, select Ethernet from the list of available connection types. From the Configure list, select Using DHCP for dynamically assigned settings. For statically assigned settings, do the following: Media Server User’s Guide...
Page 386
Appendix A Setting Up Your Computer’s IP Address • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NSA. Click Apply and close the window.
Page 387
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 210 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Page 388
Appendix A Setting Up Your Computer’s IP Address When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Page 389
Appendix A Setting Up Your Computer’s IP Address In the Network Settings window, select the connection that you want to configure, then click Properties. The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address.
Page 390
Appendix A Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Click the Close button to apply the changes. Media Server User’s Guide...
Page 391
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 211 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop...
Page 392
Appendix A Setting Up Your Computer’s IP Address Click K Menu > Computer > Administrator Settings (YaST). When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Media Server User’s Guide...
Page 393
Appendix A Setting Up Your Computer’s IP Address When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Media Server User’s Guide...
Page 394
Appendix A Setting Up Your Computer’s IP Address When the Network Card Setup window opens, click the Address tab Figure 212 openSUSE 10.3: Network Card Setup Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
Page 395
Appendix A Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties.
Page 396
Appendix A Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 214 openSUSE: Connection Status - KNetwork Manager Media Server User’s Guide...
PP EN D I X Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here.
Page 398
Appendix B Pop-up Windows, JavaScripts and Java Permissions Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 216 Internet Options: Privacy Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Page 399
Appendix B Pop-up Windows, JavaScripts and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 217 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”.
Page 400
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 218 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Page 401
Appendix B Pop-up Windows, JavaScripts and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 219 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
Page 402
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 220 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
Page 403
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 221 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. Media Server User’s Guide...
Page 404
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 222 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Page 405
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 224 Mozilla Firefox Content Security Media Server User’s Guide...
Page 406
Appendix B Pop-up Windows, JavaScripts and Java Permissions Media Server User’s Guide...
7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. User-Defined The IPSEC ESP (Encapsulation Security Protocol) (IPSEC_TUNNEL) tunneling protocol uses this service. FINGER Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
Page 408
Appendix C Common Services Table 126 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION ICMP User-Defined Internet Control Message Protocol is often used for diagnostic or routing purposes. 4000 This is a popular Internet chat program. IGMP (MULTICAST) User-Defined Internet Group Management Protocol is used when sending packets to a specific group of hosts.
Page 409
Appendix C Common Services Table 126 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION STRM WORKS 1558 Stream Works Protocol. SYSLOG Syslog allows you to send system logs to a UNIX server. TACACS Login Host Protocol used for (Terminal Access Controller Access Control System).
Page 410
Appendix C Common Services Media Server User’s Guide...
Many ZyXEL products, such as the NSA-2401, issue their own public key certificates. These can be used by web browsers on a LAN or WAN to verify that they are in fact connecting to the legitimate device and not one masquerading as it.
Page 412
Appendix D Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
Page 413
Appendix D Importing Certificates In the Certificate dialog box, click Install Certificate. Figure 228 Internet Explorer 7: Certificate In the Certificate Import Wizard, click Next. Figure 229 Internet Explorer 7: Certificate Import Wizard Media Server User’s Guide...
Page 414
Appendix D Importing Certificates If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 230 Internet Explorer 7: Certificate Import Wizard Otherwise, select Place all certificates in the following store and then click Browse. Figure 231 Internet Explorer 7: Certificate Import Wizard In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Page 415
Appendix D Importing Certificates In the Completing the Certificate Import Wizard screen, click Finish. Figure 233 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 234 Internet Explorer 7: Security Warning 11 Finally, click OK when presented with the successful certificate installation message.
Page 416
Appendix D Importing Certificates 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information. Figure 236 Internet Explorer 7: Website Identification...
Page 417
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
Page 418
Appendix D Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. Open Internet Explorer and click Tools > Internet Options. Figure 239 Internet Explorer 7: Tools Menu In the Internet Options dialog box, click Content >...
Page 419
Appendix D Importing Certificates In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 241 Internet Explorer 7: Certificates In the Certificates confirmation, click Yes. Figure 242 Internet Explorer 7: Certificates In the Root Certificate Store dialog box, click Yes.
Page 420
Appendix D Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
Page 421
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
Page 422
Appendix D Importing Certificates In the Certificate Manager dialog box, click Web Sites > Import. Firefox 2: Certificate Manager Figure 248 Use the Select File dialog box to locate the certificate and then click Open. Firefox 2: Select File Figure 249 The next time you visit the web site, click the padlock in the address bar to open the Page Info >...
Page 423
Appendix D Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. Open Firefox and click Tools > Options. Figure 250 Firefox 2: Tools Menu In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 251 Firefox 2: Options Media Server User’s Guide...
Page 424
Appendix D Importing Certificates In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Firefox 2: Certificate Manager Figure 252 In the Delete Web Site Certificates dialog box, click OK. Figure 253 Firefox 2: Delete Web Site Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Page 425
Appendix D Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
Page 426
Appendix D Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. Figure 255 Opera 9: Security information Media Server User’s Guide...
Page 427
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
Page 428
Appendix D Importing Certificates In the Certificates Manager, click Authorities > Import. Opera 9: Certificate manager Figure 258 Use the Import certificate dialog box to locate the certificate and then click Open. Opera 9: Import certificate Figure 259 Media Server User’s Guide...
Page 429
Appendix D Importing Certificates In the Install authority certificate dialog box, click Install. Opera 9: Install authority certificate Figure 260 Next, click OK. Opera 9: Install authority certificate Figure 261 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Page 430
Appendix D Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. Open Opera and click Tools > Preferences. Figure 262 Opera 9: Tools Menu In Preferences, Advanced > Security > Manage certificates. Figure 263 Opera 9: Preferences Media Server User’s Guide...
Page 431
Appendix D Importing Certificates In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Opera 9: Certificate manager Figure 264 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Page 432
Appendix D Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
Page 433
Appendix D Importing Certificates Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 267 Konqueror 3.5: KDE SSL Information Media Server User’s Guide...
Page 434
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
Page 435
Appendix D Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. Open Konqueror and click Settings > Configure Konqueror. Figure 271 Konqueror 3.5: Settings Menu In the Configure dialog box, select Crypto. On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove.
Page 436
Appendix D Importing Certificates Media Server User’s Guide...
Make sure all data and programs on the NSA are also stored elsewhere. ZyXEL is not responsible for any loss of or damage to any data, programs, or storage media resulting from the use, misuse, or disuse of this or any other ZyXEL product.
Page 438
ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Page 439
Index Index preferences Numbers protection 215, 216 status 1-bay 193, 262 2-bay 181, 184, 275 3-D photo wall activation anonymous access passive mode transfer media server 182, 185 configuration iTunes server 182, 212, 213 access rights print server Flickr configuration shares 306, 307 name...
Page 440
Index backup job usage restoring files by creating backup settings groups 300, 301 shares bandwidth limit 304, 305 users 294, 295 BitTorrent volumes 161, 164 IP filtering 198, 199 protection 215, 216 re-seeding settings torrent files 193, 213 health data protection info-hash date trackers...
Page 441
Index FTPS 130, 275 Exchangeable image file format, see Exif Exif explicit TLS/SSL external volumes global icons 47, 59 42, 156 Google Maps grace period 281, 283, 288 groups fan speed adding 300, 301 file editing troubleshooting access membership 296, 301 file browser names configure share...
Page 442
Index Ken Burns naming server shares volumes workgroup NAS Starter Utility 35, 44 lag, time navigation panel language network latitude diagnostic tools link capture browser plugin 171, 174 login HTTP port IP address Logitech SqueezeCenter jumbo frames 172, 175 logs PPPoE 172, 179 longitude...
Page 443
Index protect TFTP backup server entry, FTP Uploadr backup tutorial server name protection, download service 215, 216 setup public key certificate BitTorrent editing COPY/SYNC button publishing shares download service Flickr FTP Uploadr media server print server YouTube 281, 282 RAID 162, 166 share degraded...
Page 444
Index duplexing Time Machine mirroring 130, 182, 275 parity torrent files 193, 213 striping health naming volumes info-hash RAID 157, 162, 166 trackers degraded Transport Layer Security, see TLS RAID 0 167, 168 troubleshooting RAID 1 167, 169 domain user recovering domain user share access resynchronization...
Page 445
Index grace period video category video category, YouTube video playback volumes 157, 166 creation 161, 164 JBOD zPilot 157, 162, 166, 168 names RAID 157, 162, 166 degraded RAID 0 167, 168 RAID 1 167, 169 recovering resynchronization scanning status 159, 160 storage methods duplexing...
Page 449
Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
Page 450
ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement.
Page 451
For at least three (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical Support (support@zyxel.com.tw), for a charge of no more than our cost of physically performing source code distribution, a complete machine-readable copy of the complete corresponding source code for the version of the Programs that we distributed to you if we are in possession of such.
Page 452
No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes Linux Kernel, uboot, cups, busybox, dhcpcd, fuse, gphoto2, gphotofs, ipkg, libeeprog, libid3tag, libol,...
Page 453
conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
Page 454
this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
Page 455
Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
Page 456
License"). Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such software library or work which has been distributed under these terms.
Page 457
is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.
Page 458
this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library.
Page 459
Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to any other libraries whose authors decide to use it.
Page 460
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that companies distributing free software will individually obtain patent licenses, thus in effect transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
Page 461
GNU LIBRARY GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Library General Public License (also called "this License").
Page 462
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library.
Page 463
that version instead if you wish.) Do not make any other change in these notices.
Page 464
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library.
Page 465
6. As an exception to the Sections above, you may also compile or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.
Page 466
7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work...
Page 467
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Page 468
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation;...
Page 469
Appendix: How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License).
Page 470
***************************************************************************/ This Product includes mediainfo software under below license MediaInfo(Lib) License Version 1.1, 3 January 2010 Copyright 2002-2010 MediaArea.net SARL. All rights reserved. Redistribution and use in source and binary forms, without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Page 471
a) Give prominent notice with each copy of the object code that the Library is used in it and that the Library and its use are covered by this License. b) Accompany the object code with a copy of the GNU GPL and this license document. 4.
Page 472
To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.
Page 473
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met.
Page 474
c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.
Page 475
All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term.
Page 476
If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.
Page 478
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form.
Page 479
6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: ...
Page 480
Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or ...
Page 481
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement).
Page 482
LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 17.
Page 483
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Page 484
openssl-core@openssl.org. * 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. * 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"...
Page 485
* This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@cryptsoft.com).
Page 486
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE.
Page 487
A "Transparent" copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, that is suitable for revising the document straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text or matters or for automatic translation to a variety of formats suitable for input to text formatters.
Page 488
You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above, provided that you release the Modified Version under precisely this License, with the Modified Version filling the role of the Document, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of it.
Page 489
unique by adding at the end of it, in parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to the section titles in the list of Invariant Sections in the license notice of the combined work.
Page 490
version or of any later version that has been published (not as a draft) by the Free Software Foundation. If the Document does not specify a version number of this License, you may choose any version ever published (not as a draft) by the Free Software Foundation.
Page 491
1.8. "License" means this document. 1.8.1. "Licensable" means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein. 1.9. "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications.
Page 492
sell, and offer for sale, and/or otherwise dispose of the Original Code (or portions thereof). (c) the licenses granted in this Section 2.1(a) and (b) are effective on the date Initial Developer first distributes Original Code under the terms of this License. (d) Notwithstanding Section 2.1(b) above, no patent license is granted: 1) for code that You delete from the Original Code;...
Page 493
Section 3.5. 3.2. Availability of Source Code. Any Modification which You create or to which You contribute must be made available in Source Code form under the terms of this License either on the same media as an Executable version or via an accepted Electronic Distribution Mechanism to anyone to whom you made an Executable version available;...
Page 494
You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code.
Page 495
6. Versions of the License. 6.1. New Versions. Netscape Communications Corporation ("Netscape") may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version.
Page 496
Participant to You under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively, unless if within 60 days after receipt of notice You either: (i) agree in writing to pay Participant a mutually agreeable reasonable royalty for Your past and future use of Modifications made by such Participant, or (ii) withdraw Your litigation claim with respect to the Contributor Version against such Participant.
Page 497
11. MISCELLANEOUS. This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by California law provisions (except to the extent applicable law, if any, provides otherwise), excluding its conflict-of-law provisions.
Page 498
of the _____ license (the "[___] License"), in which case the provisions of [______] License are applicable instead of those above. If you wish to allow use of your version of this file only under the terms of the [____] License and not to allow others to use your version of this file under the MPL, indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the [___] License.
Page 499
You may distribute under the terms of either the GNU General Public License or the Artistic License, as specified in the Perl README file. This Product includes flac software under below license This is the Win32 binary release for the FLAC project. All programs and plugins are released under the GPL (see COPYING.GPL) except the Winamp 2 plugin which is LGPL (see COPYING.LGPL).
Page 500
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Page 501
(../LICENSE_1_0.txt, ../../LICENSE_1_0.txt etc.) How is the Boost license different from the GNU General Public License (GPL)? The Boost license permits the creation of derivative works for commercial or non-commercial use with no legal requirement to release your source code. Other differences include Boost not requiring reproduction of copyright messages for object code redistribution, and the fact that the Boost license is not "viral": if you distribute your own code along with some Boost code, the Boost license applies only to the Boost code (and modified versions thereof);...
Page 502
with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
Page 503
You do not have to release any of your source code. You do not have to reveal or make public any changes to the libcurl source code. You do not have to reveal or make public that you are using libcurl within your app.
Page 504
exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.
Page 505
or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:...
Page 506
agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE.
Page 507
APACHE HTTP SERVER SUBCOMPONENTS: The Apache HTTP Server includes a number of subcomponents with separate copyright notices and license terms. Your use of the source code for the these subcomponents is subject to the terms and conditions of the following licenses. For the mod_mime_magic component: * mod_mime_magic: MIME type lookup via file magic numbers * Copyright (c) 1996-1997 Cisco Systems, Inc.
Page 508
* 605 E. Springfield, Champaign, IL 61820 * httpd@ncsa.uiuc.edu * Copyright (C) 1995, Board of Trustees of the University of Illinois ************************************************************************ * md5.c: NCSA HTTPd code which uses the md5c.c RSA Code * Original Code Copyright (C) 1994, Jeff Hostetler, Spyglass, Inc. * Portions of Content-MD5 code Copyright (C) 1993, 1994 by Carnegie Mellon University (see Copyright below).
Page 509
For the srclib\apr\include\apr_md5.h component: * This is work is derived from material Copyright RSA Data Security, Inc. * The RSA copyright statement and Licence for that original material is * included below. This is followed by the Apache copyright statement and * licence for the modifications made to that material.
Page 510
software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. * The apr_md5_encode() routine uses much code obtained from the FreeBSD 3.0 * MD5 crypt() function, which is licenced as follows: * ---------------------------------------------------------------------------- * "THE BEER-WARE LICENSE"...
Page 511
* Security, Inc. MD4 Message-Digest Algorithm" in all material * mentioning or referencing the derived work. * RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this * software for any particular purpose. It is provided "as is" * without express or implied warranty of any kind.
Page 512
# publicity pertaining to distribution of the software without specific, # written prior permission. M.I.T. makes no representations about the # suitability of this software for any purpose. It is provided "as is" # without express or implied warranty. For the pcre component: PCRE LICENCE ------------ PCRE is a library of functions to support regular expressions whose syntax...
Page 513
This program may be used and copied freely providing this copyright notice is not removed. This software is provided "as is" and any express or implied waranties, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall Zeus Technology Ltd.
Page 514
to whom the Software is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies of the Software and that both the above copyright notice(s) and this permission notice appear in supporting documentation. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT...
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
Page 516
For those not familiar with the GNU GPL, the license basically allows you to: Use the CUPS software at no charge. Distribute verbatim copies of the software in source or binary form. Sell verbatim copies of the software for a media fee, or sell support for the software.
Page 517
b. An Apple Operating System means any operating system software developed and/or marketed by Apple Computer, Inc., including but not limited to all existing releases and versions of Apple's Darwin, Mac OS X, and Mac OS X Server products and all follow-on releases and future versions thereof.
Page 518
Email: derekn@foolabs.com WWW: http://www.foolabs.com/xpdf/ Support Easy Software Products sells software support for CUPS as well as a commercial printing product based on CUPS called ESP Print Pro. You can find out more at our web site: http://www.easysw.com/ This Product includes libxml2 software under below license Except where otherwise noted in the source code (e.g.
Page 519
Michael Barone <michael,barone@lmco.com> GPSVME fixes Jean-Francois Boudreault <Jean-Francois.Boudreault@viagenie.qc.ca>IPv6 support Karl Berry <karl@owl.HQ.ileaf.com> syslog to file option Greg Brackley <greg.brackley@bigfoot.com> Major rework of WINNT port. Clean up recvbuf and iosignal code into separate modules. Marc Brett <Marc.Brett@westgeo.com> Magnavox GPS clock driver Piete Brooks <Piete.Brooks@cl.cam.ac.uk>...
Page 520
Linux-PAM release may be distributed: Redistribution and use in source and binary forms of Linux-PAM, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain any existing copyright notice, and this entire permission notice in its entirety, including the disclaimer of warranties.
Page 521
This Product includes setsystz software under below license /* setsystz: set the Linux kernel's idea of the time zone */ /* Copyright (c) 2007 David A. Madore, Public Domain */ This Product includes sqlite software under below license SQLite Copyright All of the deliverable code in SQLite has been dedicated to the public domain by the authors.
Page 522
For the purposes of this document, "SQLite software" shall mean any computer source code, documentation, makefiles, test scripts, or other information that is published on the SQLite website, http://www.sqlite.org/. Precompiled binaries are excluded from the definition of "SQLite software" in this document because the process of compiling the software may introduce information from outside sources which is not properly a part of SQLite.
Page 523
** 1996-06-05 by Arthur David Olson. ================== ====== logwtmp.c ===== * Copyright (c) 1988 The Regents of the University of California. * All rights reserved. * Redistribution and use in source and binary forms are permitted * provided that the above copyright notice and this paragraph are * duplicated in all such forms and that any documentation, * advertising materials, and other materials related to such * distribution and use acknowledge that the software was developed...
Page 524
the public domain: Joan Daemen - 3way.cpp Leonard Janke - cast.cpp, seal.cpp Steve Reid - cast.cpp Phil Karn - des.cpp Andrew M. Kuchling - md2.cpp, md4.cpp Colin Plumb - md5.cpp Seal Woods - rc6.cpp Chris Morgan - rijndael.cpp Paulo Baretto - rijndael.cpp, skipjack.cpp, square.cpp Richard De Moliner - safer.cpp Matthew Skala - twofish.cpp Kevin Springle - camellia.cpp, shacal2.cpp, ttmac.cpp, whrlpool.cpp, ripemd.cpp...
Page 525
The wxWindows Licence is essentially the L-GPL (Library General Public Licence), with an exception stating that derived works in binary form may be distributed on the user's own terms. This is a solution that satisfies those who wish to produce GPL'ed software using wxWidgets, and also those producing proprietary software.
Page 526
questions, or would like permission to distribute our other non-GPL programs. Also, be aware that standard copyright rules apply in any case where no particular license is given. Each of the software products we ship are licensed as follows: - All of Squeezebox Server's perl code is licensed for redistribution or inclusion in other software per version 2 of the GPL license, included below for your convenience.
Page 527
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Page 528
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another...
Page 529
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
Page 530
except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
Page 531
those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time.
Page 532
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the author nor the names of any contributors may be used to endorse or promote products derived from this software without specific prior written permission.
Page 533
5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version.
Page 534
language itself. You may sell such an object file as proprietary provided that you provide or offer to provide the Perl source, as specified by the GNU General Public License. (This is merely an alternate way of specifying input to the program.) You may also sell a binary produced by the dumping of a running Perl script that belongs to you, provided that you provide or offer to provide the Perl source as specified by the GPL.
Page 535
David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions.
Need help?
Do you have a question about the NSA325 and is the answer not in the manual?
Questions and answers