• Web Configurator Online Help The embedded Web Help contains descriptions of individual screens and supplementary information. Note: It is recommended you use the web configurator to configure the NSA. • Support Disc Refer to the included CD for support documents. NSA320 User’s Guide...
Page 4
About This User's Guide Documentation Feedback Send your comments, questions or suggestions to: techwriters@zyxel.com.tw Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan. Need More Help? More help is available at www.zyxel.com.
Page 5
• Product model and serial number. • Warranty Information. • Date that you received your device. Brief description of the problem and the steps you took to solve it. NSA320 User’s Guide...
For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on. • “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”. NSA320 User’s Guide...
Page 7
Every effort has been made to ensure that the information in this manual is accurate. Computer Notebook computer Server Television Firewall Router Switch Wireless Access Point Internet NSA320 User’s Guide...
Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately. NSA320 User’s Guide...
2.6 Import Files or Folders with zPilot ..................43 2.7 Add a Network Drive to My Computer ................. 44 2.8 Manage the Device ......................45 2.9 Configure Network Setting ....................45 Chapter 3 Web Configurator Basics ....................... 49 3.1 Overview ..........................49 NSA320 User’s Guide...
Page 12
4.8.2 Creating a Share ......................87 4.8.3 Creating a Group ......................88 4.8.4 Accessing a Share From Windows Explorer .............. 89 4.8.5 Accessing a Share Using FTP ................... 91 4.8.6 Accessing a Share Through the Web Configurator ............ 93 NSA320 User’s Guide...
Page 13
6.4 The Server Name Screen ....................154 6.5 The Date/Time Screen ....................... 155 Chapter 7 Storage........................... 159 7.1 Overview ..........................159 7.1.1 What You Need to Know About Storage ..............159 7.2 The Storage Screen ......................160 NSA320 User’s Guide...
Page 14
9.6.5 Displaying the Task Information ................203 9.7 The Web Publishing Screen ....................204 9.8 The Broadcatching Screen ....................206 9.8.1 Adding a Broadcatching Channel ................208 9.8.2 Editing a Broadcatching Channel ................212 9.9 The Print Server Screen ....................214 NSA320 User’s Guide...
Page 16
12.2 What You Can Do ......................301 12.3 The Users Screen ......................302 12.3.1 User Icons ......................303 12.3.2 Adding or Editing an Account ................304 12.3.3 Usernames ......................305 12.4 Displaying User Info ......................306 Chapter 13 Groups ........................... 307 NSA320 User’s Guide...
Page 18
18.5 Supported iTunes Server Content Formats ..............381 18.6 Power Consumption ......................381 Appendix A Setting Up Your Computer’s IP Address ............383 Appendix B Pop-up Windows, JavaScripts and Java Permissions ........397 Appendix C Common Services .................... 407 NSA320 User’s Guide...
Page 19
Table of Contents Appendix D Importing Certificates..................411 Appendix E Open Source Licences..................443 Appendix F Legal Information ....................589 Index............................593 NSA320 User’s Guide...
• Use the NSA’s website to share files with remote users. • Use iTunes on your computer to play video and music files stored on the NSA. • Share printers. • Automatically upload photo and video files to your FTP server, Flickr and YouTube accounts. NSA320 User’s Guide...
Advanced Technology Attachment) hard disks. Note that both SATA hard disks are treated as internal or SATA volumes in the Storage > Volume screen (Section 7.4 on page 165). Any hard disk connected to the USB port(s) is considered an external or USB volume. NSA320 User’s Guide...
The NSA has fully started and is operating normally. Blinking The NSA is starting up. Amber Blinking The NSA is upgrading the firmware. Note: Do not turn off the NSA while it is upgrading the firmware or you may render it unusable. NSA320 User’s Guide...
1.3.1 COPY/SYNC Button Use the COPY/SYNC button on the front panel to copy or synchronize files between a connected USB device and the NSA. See Section 9.10 on page 216 more details on how to configure the copy/sync settings. NSA320 User’s Guide...
Auto-IP to assign itself an IP address and subnet mask. For example, you could connect the NSA directly to your computer. If the computer is also set to get an IP address automatically, the computer and the NSA will choose addresses for themselves and be able to communicate. NSA320 User’s Guide...
Page 28
Chapter 1 Getting to Know Your NSA NSA320 User’s Guide...
Utility screens. 2.3 NAS Discovery Screen Use this screen to view the NSAs in your network. The NSA’s Server Name (default is ‘nsa320’). See Section 2.9 on page 45 for how to change it to a more recognizable one in your network.
Page 30
IP shows the NSA’s current IP address. Model ID shows the NSA’s model name. Firmware Version shows the version of firmware the NSA is currently using. Status shows whether the NSA is Online, Unreachable, Configuring, or Config Failed. NSA320 User’s Guide...
Click this to add the NSA as a network drive in your computer’s drive to My Windows Explorer. Computer Manage the Click this to log into the advanced administration screens. See Section device 3.5 on page 66 for details on the administration screens. NSA320 User’s Guide...
Click Run the Initialization Wizard in the main utility screen to display the following screen. You must log in using an admin account. The default administrator username is ‘admin’ and the default password is ‘1234’ and click Next. Figure 6 Initialization Wizard Welcome NSA320 User’s Guide...
NSA to configure specific network settings. Click Next. Figure 7 Initialization Wizard: Wizard Type 2.5.1 Default Configuration The NAS Starter Utility checks the Internet connection. Figure 8 Check Network Connection NSA320 User’s Guide...
Page 34
Next. Figure 9 Change Admin Password Specify usernames and passwords for the individuals you want to be able to access the NSA. Figure 10 Create User Accounts NSA320 User’s Guide...
Page 35
Wait while the NAS Starter Utility configures the NSA. Figure 12 Setting the NAS After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA’s shares (see Section 2.5.3 on page 42) or NSA320 User’s Guide...
Finish to return to the main NAS Starter Utility screen (see Section 2.4 on page 31). Figure 13 Setting the NAS 2.5.2 Manual Configuration Set up the NSA’s basic network configuration first. Figure 14 Setup Network NSA320 User’s Guide...
Page 37
If your Internet connection requires you to enter a user name and password to connect to the Internet, enter them here and click Next. If you do not need to enter a user name and password to connect to the Internet, click Skip. Figure 15 PPPoE NSA320 User’s Guide...
Page 38
Type a new administrator password (and retype it to confirm) and click Next. If you do not want to change the administrator password, you can leave the fields blank and just click Next. Figure 17 Change Admin Password NSA320 User’s Guide...
Page 39
• JBOD: Use this if you want maximum storage capacity and/or you have other means of protecting your data. This combines the two physical disks into a single virtual one, so they appear as a single large disk. NSA320 User’s Guide...
Page 40
Select the ones you want to use as network drives in Windows Explorer. Figure 20 Connect Network Drives Specify usernames and passwords for the individuals you want to be able to access the NSA and click Next. Figure 21 Create User Accounts NSA320 User’s Guide...
Page 41
10 Wait while the NAS Starter Utility configures the NSA. Figure 23 Setting the NAS After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA’s shares (see Section 2.5.3 on page 42) or NSA320 User’s Guide...
31). Figure 24 Setting the NAS 2.5.3 Directory of the NAS Enter the administrator user name and password and click Login. Figure 25 Login The utility opens the NSA’s directory in Windows Explorer. Figure 26 Directory NSA320 User’s Guide...
Other types of files go to the Public folder. For folders of files you are prompted to choose the target destination. The zPilot icon shows the transfer rate. Figure 29 zPilot Showing Transfer Rate NSA320 User’s Guide...
For example, if share1 is private to user1, then only user1 is allowed to map share1. The table displays the NSA shares that are already mapped to drive letters on your computer. After you click OK you can see the new drive in NSA320 User’s Guide...
Section 3.5 on page 66 for more on the administration screens. 2.9 Configure Network Setting Use these screens to change the NSA network settings such as the NSA’s name, IP address, subnet mask, default gateway, DNS, or PPPoE. NSA320 User’s Guide...
Page 46
If you were given specific IP address(es) of the DNS server(s), select server manually this and enter the primary and secondary DNS in the corresponding fields. PPPoE Click this if your Internet connection requires you to enter a user name and password to connect to the Internet. NSA320 User’s Guide...
Page 47
Chapter 2 NAS Starter Utility If your Internet connection requires you to enter a user name and password to connect to the Internet, select Enable PPPoE Connection and enter your user name and password. Figure 35 PPPoE NSA320 User’s Guide...
Page 48
Chapter 2 NAS Starter Utility NSA320 User’s Guide...
3.2.1 Access the NSA Via NAS Starter Utility If you don’t know the IP address of the NSA, then use the NAS Starter Utility’s Play Media Files from Home Screen link to find it. Refer to the Quick Start NSA320 User’s Guide...
Configure the server name of your NSA using the Network Configuration screen (Section 2.9 on page 45) of the NAS Starter Utility. Open your browser and type in the server name of the NSA (“nsa320” by default). Figure 37 NSA URL 3.3 Login The default username and password are ‘admin’...
Page 51
If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore. Figure 39 Change Password Screen NSA320 User’s Guide...
Table 6 Main Home Screen Icons ICON DESCRIPTION Use Music, Photo, and Video to play and organize your music, picture, and video files. Use Favorite to create and edit playlists. Use File Browser to see your files in a tree-folder structure. NSA320 User’s Guide...
Page 53
Home Click this to return to the Home screen. Help Click this to open a web help page specific to the screen you are currently configuring. Logout Click this at any time to exit the web configurator. NSA320 User’s Guide...
Page 54
Click a letter to go to the first item starting with that letter. View files. Double-click an item to play it. Shows which page is displaying and the total number of pages of entries. Click an arrow or type a number to go to another page of entries. NSA320 User’s Guide...
A Now Playing link displays when a song is playing. Click it to display a panel like the following. This screen displays the name of the current song and it’s play progress and lets you control the playback. Figure 42 Now Playing NSA320 User’s Guide...
If a photo’s Exif data includes GPS location data, click the latitude or longitude link to display the location in Google Maps. Click Clear to delete the markers of other photos and only display the current photo’s marker. Figure 44 Google Maps NSA320 User’s Guide...
Use Favorite > Shared Playlist to view and play playlists that you created externally (in iTunes, Windows Media Player, VLC media player, or Winamp for example) and saved to the NSA. When using zPilot to move files to the NSA, playlists are automatically put into the music share. NSA320 User’s Guide...
(gives someone access to a folder). It is equivalent to the Windows concept of a shared folder, but the access rights are independent of the folder (you configure the share and the folder separately). You NSA320 User’s Guide...
Page 59
This column identifies the names of folders and files in the share. Click a file’s file name to open the file or save it to your computer. Click a folder’s name to display the folder’s contents. Size This column displays a file’s size in bytes. NSA320 User’s Guide...
Page 60
Select a file and click this to save the file to your computer. Note: Do not refresh the screen while a download is going Restore When you are in a recycle bin folder, select a folder or file and click this to restore it. NSA320 User’s Guide...
Page 61
Select this option to make the share’s files available to media clients. share to Media Server Publish this Select this option to let people use a web browser to access this share’s share to Web files without logging into the Home screens. NSA320 User’s Guide...
• Folder names must be unique (they cannot be the same as other folder names). • The minimum character length of a name is one character, that is a name cannot be blank. • The maximum character length of share name is 239 characters. NSA320 User’s Guide...
Some applications are always enabled and cannot be disabled. Disable Select an enabled application and click this to turn off the application. Select the Flickr or Youtube Uploadr entry and click this to cancel all uploading. Some applications are always enabled and cannot be disabled. NSA320 User’s Guide...
Select the Flickr or Youtube Uploadr entry and click this to resume current uploading. 3.4.8 System Settings Click System > Settings to open the following screen. Use this screen to change general settings and an account password. Figure 50 System > Settings NSA320 User’s Guide...
Page 65
Section 3.5 on page 66 for more on the advanced administration screens. Apply Click this to save your changes. Reset Click this to refresh the screen. Cancel Click this to exit the screen without saving your changes. NSA320 User’s Guide...
Click this to view the model name, firmware version and copyright. Home Click this to return to the Home screens. Logout Click this at any time to exit the web configurator. This is the same as clicking the Logout link at the bottom of the navigation panel. NSA320 User’s Guide...
Assign the NSA a dynamic or static IP address and DNS information. UPnP Port Configure your Internet gateway to allow access from the WAN Mapping (Internet) to services on the NSA. PPPoE Configure PPPoE settings for a direct Internet connection. NSA320 User’s Guide...
Page 68
Configure HTTPS and the NSA’s SSL certificate. FW Upgrade Upload/upgrade new firmware to your NSA. Shutdown Restart the NSA or shut it down. Logout Click this to exit the web configurator. This is recommended to prevent unauthorized administrator access to the NSA. NSA320 User’s Guide...
NSA automatically restores the volume. If the replacement disk already contains a volume, you need to delete the volume and then click the Repair icon to fix the degraded RAID volume. NSA320 User’s Guide...
IP address. Initially you can only read and write to the Public, Video, Music, and Photo folders until you create other shares on the NSA. This session is then displayed as shown in the following figure. Session Example (Windows) NSA320 User’s Guide...
121 • Using FTPES to Connect to the NSA, see page 133 • How to Use the BackupPlanner, see page 134 4.2 Windows 7 Network To see your NSA in a Windows 7 home or work network: NSA320 User’s Guide...
Page 72
Chapter 4 Tutorials Click Start > Control Panel. Set View by to Category and click Network and Internet. Click View network computers and devices. NSA320 User’s Guide...
The network containing the NSA must be set as a home or work network in order for the NSA icons to display. If the network containing the NSA displays as “Public”: Click Network and Sharing Center and then the network’s link (circled in the figure). NSA320 User’s Guide...
78. Click Uninstall to remove the NSA from the list of devices installed in your computer. • View device web page opens the Web Configurator login screen. • Create shortcut adds a desktop shortcut to the Web Configurator login screen. NSA320 User’s Guide...
• IP address is the NSA’s IP address. It is also the IP address for accessing the Web Configurator. 4.3 Windows 7 Network Map To see your NSA in a Windows 7 home or work network map: NSA320 User’s Guide...
Page 76
If the network containing the NSA displays as “Public”, click the network’s link (2 in the figure, although it is already set to home here) and use the Set Network Location screen to set the network’s location to home or work (see page 74). NSA320 User’s Guide...
Page 77
Chapter 4 Tutorials Double-click the NSA’s icon to open the Web Configurator login screen. See Section 4.2.2 on page 74 for the NSA icon’s right-click options. NSA320 User’s Guide...
After you use the NSA’s network icon’s install option you can manage the NSA from the Windows 7 Devices and Printers folder. Click Start > Control Panel > Hardware and Sound > Devices and Printers. Select the NSA icon to display information about the NSA. Double-click the NSA NSA320 User’s Guide...
Page 79
• Create shortcut has Windows make a desktop shortcut to this screen. • Troubleshoot opens Windows’ device troubleshooting wizard. • Remove device removes the NSA from the Windows 7 Devices and Printers folder. • Properties opens a window of NSA details and troubleshooting information (see page 75). NSA320 User’s Guide...
• Restore previous versions is the Windows 7 option for restoring a file or folder. It does not apply to this shortcut. • Send to give you options for copying the shortcut to another location. NSA320 User’s Guide...
Your NSA has two bays for Serial Advanced Technology Attachment (SATA) hard disks. The JBOD storage method is used if you are using a single hard disk for your NSA. This JBOD volume shows up in the Storage > Volume screen (Section 7.4 on page 165) as follows. NSA320 User’s Guide...
4.6.3 Create an Internal Volume Button If you do not have an existing volume in the Storage > Volume screen, do the following steps to create a RAID 1 volume. NSA320 User’s Guide...
Page 83
This deletes all existing data in the SATA hard disk. Make sure you have a backup of any existing data in the hard disk. The NSA starts creating the volume and you can see the following progress bar. Wait for the RAID 1 volume to be created. NSA320 User’s Guide...
Delete an existing volume in your NSA by doing the following steps. In the Storage > Volume screen, select the volume you want to delete and click the delete icon. A confirmation window appears as follows. Click Yes. NSA320 User’s Guide...
Bob wants to create accounts for his sons Jimmy and Kevin. This is how he would do it. Log into the NSA web configurator (see Section 3.3 on page 50) and click System > Administration to go to the configuration screens. NSA320 User’s Guide...
Page 86
Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn’t get to configure the whole NSA. Click Apply to create the account. The account now displays in the Users screen. NSA320 User’s Guide...
In the NSA’s administration web configurator screens, click Shares > Add Share. Click Add Share to create a new share. Specify a name for the share and select which volume it should be on. Configure the screen as follows. Then click Edit. NSA320 User’s Guide...
Windows Explorer to transfer files to and from the NSA as if it was another folder on your computer. Here he maps Jimmy’s share to Jimmy’s computer. Start Windows Explorer and go to the NSA’s server name (“nsa320” is the default) or IP address.
Page 90
This example uses I. Then browse to and select the share on the NSA. Click Finish. Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login. NSA320 User’s Guide...
This is how he would do it. Open the FTP client (Windows Explorer is used here) and type “ftp:// username@server” where “username” is the account’s username and “server” is the NSA’s IP address or server name. NSA320 User’s Guide...
Page 92
Chapter 4 Tutorials Enter your password and click Login. Now you can access files and copy files from/to your local computer’s drives to or from this network folder. NSA320 User’s Guide...
Click a folder’s file name to browse the folder. You can open files or copy them to your computer. You can also create new folders and upload additional files to the share. Click the logout icon when your are done. NSA320 User’s Guide...
Note: It is also OK for the link to open a .torrent file. If you are redirected to a screen that says the download should start in a few seconds, there may be a link to click if the download does not start automatically. See if that link opens the file or the pop-up window. NSA320 User’s Guide...
Page 95
Right-click the download link and select Copy Shortcut in Internet Explorer (or Copy Link Location in Firefox). Log into the NSA web configurator (see Section 3.3 on page 50) using the administrator account and click Application Zone and the Application Zone > Download Service link. Click Add. NSA320 User’s Guide...
Page 96
The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share’s download folder. See Section 4.8.4 on page Section 4.8.5 on page 91, or Section 4.8.6 on page 93 for how to access a share. NSA320 User’s Guide...
Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7. Internet Explorer Open the folder containing the link capture browser plugin. Double-click on the plugin to display the following screen. Click I Agree to begin installation. NSA320 User’s Guide...
Page 98
Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting. NSA320 User’s Guide...
Page 99
Chapter 4 Tutorials Enter the NSA’s web address (nsa320 by default) and click Apply. A warning message displays asking for confirmation. Click OK to apply the setting. Firefox Open Firefox. Open the folder containing the link capture browser plugin. To install the plugin, drag and drop the plugin to Firefox.
Page 100
Chapter 4 Tutorials The following screen displays. Click Install Now. You need to restart Firefox after the installation. NSA320 User’s Guide...
Page 101
When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’s web address. Enter the NSA’s web address (nsa320 by default) and click OK. NSA320 User’s Guide...
Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s P-660W-T1 (an ADSL router). Right-click on the download link and select Send to NSA. NSA320 User’s Guide...
Page 103
A confirmation message displays. Log into the NSA web configurator (see Section 3.3 on page 50) using the administrator account and click Application Zone and the Application Zone > Download Service link. NSA320 User’s Guide...
23:30 to 09:00. Click Apply to save your changes. The NSA only downloads files within this 9.5-hour period every day. Note: If you configure the Power On/Off Schedule feature in the Power Management screen, make sure your active download period does not conflict with the power-off period. NSA320 User’s Guide...
Page 105
Enter 3 in the Maximum Number of Active Torrents field and enter 1 in the Maximum Number of Seeding Jobs field. • Keep sharing until the NSA has shared equal or greater amount of the downloaded files. Select the check box and enter 100 in the Upload/Download Ratio field. NSA320 User’s Guide...
Internet Explorer 7 or higher, or Firefox. You have to activate this feature in the Download Service screen. Click Applications > Download Service to open the following screen. Select Enable Download Notify and click Apply. NSA320 User’s Guide...
Page 107
Chapter 4 Tutorials Internet Explorer 7 Example After you activate download service notification, click the RSS feed icon. The following screen displays. Select Subscribe to this feed. The following screen displays. Click Subscribe. NSA320 User’s Guide...
Page 108
Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Firefox Example After you activate download service notification, click the RSS feed icon. The following screen displays. Select Live Bookmarks from the drop-down list and click Subscribe Now. NSA320 User’s Guide...
Page 109
Chapter 4 Tutorials The following screen displays. Select Bookmarks Menu and click Add. From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list. NSA320 User’s Guide...
One way to test this is by clicking the link. Clicking an actual RSS feed link opens a screen of XML code (in browsers without an RSS feed aggregator) or a window where you can add the RSS feed (in browsers with an RSS feed aggregator). NSA320 User’s Guide...
Page 111
Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer). Log into the NSA web configurator (see Section 3.3 on page 50) using the administrator account and click Administration > Applications > Broadcatching. Click Add Channel. NSA320 User’s Guide...
Page 112
Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later. Select a policy for what items to delete. This example keeps the most recent 10 items. 10 Click Apply. NSA320 User’s Guide...
Use a USB cable to connect the printer’s USB port to one of the NSA’s USB ports. Make sure the printer is also connected to an appropriate power source. Turn on the printer. The NSA detects the printer after a few moments. NSA320 User’s Guide...
Page 114
Use the wizard screens to install the printer driver on the computer. You may need to get the file from the printer’s CD or the printer manufacturer’s website (the driver is not installed on the NSA). Note: You must install the printer driver on each computer that will use the printer. NSA320 User’s Guide...
This is how Amy would transfer the files from her USB disk to the NSA. Click Applications > Copy/Sync Button in the navigation panel to open the screen. Configure the copy settings as shown and click Apply. NSA320 User’s Guide...
The NSA also automatically uploads the copied files to Flickr. 4.13 FTP Uploadr Tutorial FTP Uploadr can automatically upload files saved on the NSA to a remote FTP server. Amy wants to share files on her NSA with Susan. They each have an NSA NSA320 User’s Guide...
Page 117
The share is used for files uploaded from Amy’s NSA. Amy will then use the following information to configure FTP Uploadr on her NSA. Table 17 FTP Uploadr Tutorial: FTP Server Information FTP Domain Name or IP Address example2.com FTP User Name FTP Password xxxxx Share (Remote Path) NSA320 User’s Guide...
Page 118
Click Applications > Auto Upload > FTP Uploadr to open the FTP Uploadr screen. Select Enable FTP Uploadr and click Apply to turn on FTP Uploadr. Click Add Server. Enter the information as describe in Table 17 on page 117. Click Apply to add the server. NSA320 User’s Guide...
Page 119
Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List. NSA320 User’s Guide...
Page 120
Amy share on Susan’s NSA. Similarly, Susan can go through the steps described above to configure FTP Uploadr on her NSA. Once Susan completes the setup, Amy can also receive files from Susan’s NSA. Susan’s NSA Amy’s NSA NSA320 User’s Guide...
These tutorials show you how to configure security for the NSA’s Web Configurator sessions. You will customize the NSA’s self-signed SSL certificate and distribute it to your users. 4.14.1 Customizing the NSA’s Certificate Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit. NSA320 User’s Guide...
Page 122
Next, let’s modify the certificate by changing the Common Name to this NSA’s host name of “nsa”, the Organization to “ZyXEL” and the Key Length to 2048. The NSA restarts its network services and returns you to the login screen. NSA320 User’s Guide...
Chapter 4 Tutorials 4.14.2 Downloading and Installing Customized Certificate Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. Save the file to your computer. NSA320 User’s Guide...
Page 124
Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix D on page 411 for other examples. In the Certificate dialog box, click Install Certificate. NSA320 User’s Guide...
Page 125
Chapter 4 Tutorials In the Certificate Import Wizard, click Next. Leave Automatically select certificate store based on the type of certificate selected and click Next. NSA320 User’s Guide...
Page 126
Chapter 4 Tutorials In the Completing the Certificate Import Wizard screen, click Finish. If you are presented with another Security Warning, click Yes. Finally, click OK when presented with the successful certificate installation message. NSA320 User’s Guide...
Appendix D on page 411 for more information on browsers and certificates. Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. NSA320 User’s Guide...
Page 128
The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. NSA320 User’s Guide...
Page 130
Chapter 4 Tutorials Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View. NSA320 User’s Guide...
Page 131
Chapter 4 Tutorials The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close. NSA320 User’s Guide...
Page 132
Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s certificate so they can check it before adding a NSA320 User’s Guide...
Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA’s address. • Set the Servertype to FTPES - FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect. NSA320 User’s Guide...
For example, you might do daily backups of important individual files or folders and a weekly general archive. You can save backups to another location so your files can survive even if the original RAID or NSA fails. NSA320 User’s Guide...
This example sets the NSA to do another full backup after every four incremental backups. Figure 54 Protect > Backup > Add Job: Step 1 NSA320 User’s Guide...
Page 136
Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection. Figure 55 Protect > Backup > Add Job: Step 2 NSA320 User’s Guide...
Page 137
Have the NSA keep 3 backups. Figure 56 Protect > Backup > Add Job: Step 3 Set the frequency to Weekly. Schedule the backup for 5:00 every Saturday morning. Protect > Backup > Add Job: Step 4 NSA320 User’s Guide...
You want only your current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder. Figure 58 Protect > Backup > Add Job: Step 1 NSA320 User’s Guide...
Page 139
Figure 60 Protect > Backup > Add Job: Step 3 For this example, assume the connection to the German branch office is a good one and not many files need to be backed up so leave the compression off. NSA320 User’s Guide...
Page 140
You do not need to use a special restore process to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share. NSA320 User’s Guide...
Click Protect > Restore. Specify where the archive files are located. In this example, enter “192.168.3.2” as the IP address, “admin” as the account name, “1234” as the password, and “Backups” as the share name. Click Test Connection. Click Next. Figure 68 Protect > Restore: Step 1 NSA320 User’s Guide...
Page 144
Chapter 4 Tutorials Select the backup job and backup time and click Next. Figure 69 Protect > Restore: Step 2 Select everything in the share except the recycle folder. Click Next. Figure 70 Protect > Restore: Step 3 NSA320 User’s Guide...
Page 145
Chapter 4 Tutorials Browse to the folder where you want to put the files. Click Done. Figure 71 Protect > Restore: Step 4 The NSA restores the files and you can use them again. NSA320 User’s Guide...
5.2 The Status Screen Click Administration in the Home screens (Section 3.5 on page 66) to open the Web Configurator. You can also view the status screen, by clicking Status on the top-left of the navigation panel. NSA320 User’s Guide...
Page 150
Maintenance > FW Upgrade screen from which you can upload/upgrade new firmware. MAC Address This displays the NSA’s unique physical hardware address (MAC). You need the MAC address to register the product at myZyXEL.com. Customer support may also request it for troubleshooting purposes. NSA320 User’s Guide...
Page 151
This displays the volumes created on the hard drives installed in the NSA. Click the Edit icon to open the Storage screen. You can create and edit the NSA’s internal volume. See Chapter 7 on page 159 for more details. NSA320 User’s Guide...
Page 152
Connected At This displays the date and time the user last connected to the NSA in year, month, day, hour, minute, second format. IP Address This displays the IP address of the computer connected to the NSA. NSA320 User’s Guide...
This may happen if: • the time server is no longer reachable • if the NSA is shut down often (the NSA internal battery keeps time when the NSA is shut down and this may cause possible variance) NSA320 User’s Guide...
Select this option if computers in your workgroup are named Being Master Browser with non-English characters (such as Chinese and Russian). When you perform a search in the workgroup, this option allows you to locate computers named with non-English characters. NSA320 User’s Guide...
Current System Date Time Setting Current Time This field displays the time used by your NSA for its logs and alerts. Current Date This field displays the date used by your NSA for its logs and alerts. Date Time Setup NSA320 User’s Guide...
Page 156
Select this option to manually enter Daylight Saving Time settings. Clear this option to have the NSA automatically retrieve Daylight Saving Time settings from the Internet. The NSA will download a new daylight saving resource file from the Internet every month. NSA320 User’s Guide...
Page 157
Click this to save your changes. If you configured a new time and date, Time Zone and Daylight Saving at the same time, all of the settings take affect. Cancel Click this to restore your previously saved settings. NSA320 User’s Guide...
Page 158
Chapter 6 System Setting NSA320 User’s Guide...
See Figure 7.6.2 on page 169 for details on choosing a storage method. Finding Out More Section 7.6 on page 168 for more technical background information on storage. NSA320 User’s Guide...
500 GB hard disk with another 1 TB hard disk and repair the volume again. After the NSA finishes the second repair, use the Expand icon to have the RAID1 volume use the rest of the hard disk capacity. NSA320 User’s Guide...
Type: Whether it is an internal or external (USB) hard drive. Model Name: This is the hard disk number that identifies the disk. File System: The file system that an external volume is using Capacity: The total storage space on the disk. NSA320 User’s Guide...
Page 162
You can also locate or eject an external volume. Note: If you delete a volume, all data in the volume disk(s) is erased. You see a warning screen before you delete a volume. Figure 76 Delete a Volume Warning Screen NSA320 User’s Guide...
Use this screen to create a new NSA internal disk drive volume. Note: Creating a volume formats the hard drive. All data on the disk will be lost. Figure 77 Storage > Create an Internal Volume NSA320 User’s Guide...
The NSA has the following classifications for the status of a volume: • Healthy if all disks in the volume are OK and the file system is functioning properly. • OK means the USB connected device is functioning properly. • Resync when you create a RAID volume. NSA320 User’s Guide...
7.4 Editing a Volume Click an internal volume’s Edit icon in the Storage screen as shown in Figure 75 on page 161 to open the following screen. Use this screen to change the volume’s name. Figure 78 Storage > Edit NSA320 User’s Guide...
Use this screen to create a new NSA external disk drive volume. Note: Creating a volume formats the drive. All data on the disk will be lost. Figure 79 Storage > Create an External Volume NSA320 User’s Guide...
Click this to exit this screen without saving changes. 7.5.1 External Disks You may connect USB storage devices that support the following file systems to the NSA. • Windows File Systems: FAT32 and FAT16. • Linux File Systems: ReiserFS, EXT2, EXT3, and XFS. NSA320 User’s Guide...
JBOD (Just a Bunch Of Disks) is not a RAID storage method but it is included in this discussion. These are some terms that you need to know in order to understand storage systems. NSA320 User’s Guide...
Page 170
(with one disk in each), a failure of one disk (volume) should not affect the other volume (disk). JBOD read performance is not as good as RAID as only one disk can be read at a time and they must be read sequentially. The following figure NSA320 User’s Guide...
Page 171
RAID 1 RAID 1 creates an exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity. The following NSA320 User’s Guide...
Page 172
IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL’s ZyWALL UTM products for example). • Use anti-virus software on your computer to scan files from others before saving the files on the NSA. • Keep another copy of important files (preferably in another location). NSA320 User’s Guide...
IP addresses. The NSA can receive the IP address of a DNS server automatically (along with the NSA’s own IP address). You can also manually enter a DNS server IP address in the NSA. NSA320 User’s Guide...
Page 174
NSA. If this occurs, you will have to restore the factory default configuration. Push the RESET button on the NSA’s rear panel and release it after you hear a beep. NSA320 User’s Guide...
8.4 The TCP/IP Screen Use the TCP/IP screen to have the NSA use a dynamic or static IP address, subnet mask, default gateway and DNS servers. Click Network > TCP/IP in the navigation panel to open the following screen. NSA320 User’s Guide...
Page 176
Select this option for the NSA to use fixed TCP/IP information. You must fill in the following fields. IP Address Type an IP address in this field. IP Subnet Mask Type an IP subnet mask in this field. NSA320 User’s Guide...
Page 177
Click this to save your TCP/IP configurations. After you click Apply, the NSA restarts. Wait until you see the Login screen or until the NSA fully boots and then use the NAS Starter Utility to rediscover it. Reset Click this to restore your previously saved settings. NSA320 User’s Guide...
Figure 83 UPnP Port Address Translation for FTP Example 192.168.1.20 a.b.c.d TCP: 21 TCP: 2100 In the above example, the Internet gateway uses PAT to accept Internet user FTP sessions on port 2100, translate them to port 21, and forward them to the NSA. NSA320 User’s Guide...
This section introduces the NSA’s services which an Internet gateway can use UPnP to allow access to from the Internet. BitTorrent BitTorrent is a distributed peer-to-peer file-sharing protocol that the NSA’s download service can use. Using UPnP port mapping for BitTorrent lets BitTorrent work faster. NSA320 User’s Guide...
Use this screen to set how the Internet gateway’s UPnP feature configure’s the Internet gateway’s NAT IP address mapping and port mapping settings. These settings allow Internet users connected to the Internet gateway’s WAN interface to NSA320 User’s Guide...
Page 181
Use these fields to specify what port Internet users must use to connect to the Internet gateway’s WAN port in order to connect to the service on the NSA. Service Name This read-only field identifies a service on the NSA. NSA320 User’s Guide...
Apply Click Apply to save your changes back to the NSA. Reset Click Reset to begin configuring this screen afresh. 8.6 The PPPoE Screen Use this screen to configure PPPoE settings for a direct Internet connection. NSA320 User’s Guide...
Page 183
Password Enter the password associated with the username above. Password Retype the password for confirmation. (Confirm) Apply Click this to save your changes. Reset Click this to restore previously saved settings. NSA320 User’s Guide...
NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps. • Use the Auto Upload screens (Chapter 11 on page 285) to upload files in selected shares to your Flickr and/or YouTube accounts. NSA320 User’s Guide...
NSA can function as a DLNA-compliant media server and/or an iTunes server. The NSA streams files to DLNA-compliant media clients or computers using iTunes. The Digital Living Network Alliance (DLNA) is a group of personal computer and electronics companies that works to make products compatible in a home network. NSA320 User’s Guide...
Page 187
NSA’s-IP-Address/MyWeb/FamilyPhotos. Broadcatching Broadcatching is the downloading of digital content from Internet feeds. Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio shows, podcasts (audio files), and blogs. NSA320 User’s Guide...
Enable FTP You can use FTP to send files to the NSA or get files from the NSA. Select this check box to allow users to connect to the NSA via FTP; otherwise clear the check box. NSA320 User’s Guide...
Page 189
This setting applies to all FTP client connections to the NSA. It does not affect your Windows/CIFS connections (it will not correct the character display in Windows Explorer). Apply Click this to save your changes. Reset Click this to restore your previously saved settings. NSA320 User’s Guide...
Number of Music This is how many music files the media server has to share out to Tracks media clients. Number of Photos This is how many photo files the media server has to share out to media clients. NSA320 User’s Guide...
Click Applications > Download Service to open the following screen. Use this screen to manage the NSA’s file downloads. Note: By default, the NSA saves downloads in the admin share’s download folder. Figure 90 Applications > Download Service NSA320 User’s Guide...
Page 192
Select an item on the list and click this to display information about the download task. See Section 9.6.5 on page 203 for more details. The table lists your downloads. Click a column’s heading to sort the entries by that criteria. NSA320 User’s Guide...
Page 193
This is the percentage of the file that the NSA has downloaded. Location This appears in the Completed tab. It displays the path for where the file is saved. Click on the location link to open the share browser and access the file. NSA320 User’s Guide...
Page 194
Error Code This appears in the Error tab. This shows the tag for the error that occurred. Error Message This appears in the Error tab. This message states what went wrong with the download. NSA320 User’s Guide...
A “torrent” file has information the NSA uses to do a BitTorrent download. A torrent file uses a .torrent extension. If you already have a torrent file saved on your computer, select the Torrent File option and specify its path or click Browse and look for its location. NSA320 User’s Guide...
Page 196
Select a folder. If you don’t select a folder, a forward slash (/) displays in the Path field. All contents within the specified share are automatically selected. Click Apply to save your settings and Cancel to close the screen. NSA320 User’s Guide...
Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period. Figure 92 Applications > Download Service > Preferences > General Settings NSA320 User’s Guide...
Page 198
“Move complete downloads to”:. • Share - Select the share from the list. • Path - Type the folder location in the share directly or click Browse to open the following screen and navigate to the file’s location. NSA320 User’s Guide...
Page 199
Apply Click this to save your changes. Reset Click this to restore your previously saved settings. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
Specify how many simultaneous seeds are allowed on the NSA. Enter Number of a number from 1 to 10. This value cannot exceed the one you Seeding Jobs configured in the Maximum Number of Active Torrents field. NSA320 User’s Guide...
Use this screen to enable or disable IP filtering for BitTorrent downloads. IP filtering blocks IP addresses known to share fake files. You can either get an IP filter table from a website or use your own table. NSA320 User’s Guide...
Page 202
Click this to save a copy of the IP filter table on your computer. IP Filter Table Apply Click Apply to update the IP filter table from the specified URL. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
The NSA can download a file with a higher health value more efficiently. If the health value is less than 1 (0.65 for example), there is no full copy of the file, and the NSA may not be able to complete downloading the file. NSA320 User’s Guide...
Click this to close the screen. 9.7 The Web Publishing Screen Use this screen to turn web publishing on or off and select shares to publish. Click Applications > Web Publishing to open the following screen. Figure 96 Applications > Web Publishing NSA320 User’s Guide...
Page 205
Click this to restore your previously saved settings. Note: If you installed php-MySQL-phpMyAdmin through the Package Management screen (Section 10.4 on page 232) and enable it, you can use PHP and MySQL in your published web page. NSA320 User’s Guide...
• If you add a channel that contains a torrent file, the NSA downloads the torrent file (.torrent) and transfers it to Download Service (Section 9.6 on page 191) and start the BitTorrent download task accordingly. Click Applications > Broadcatching to open the following screen. Figure 97 Applications > Broadcatching NSA320 User’s Guide...
Page 207
NSA stops trying to download the file. To try the download again, use the Add button to create a new task. Note: A ... indicates an abbreviated file name. Hold your cursor over the name to display the full name. NSA320 User’s Guide...
Applications > Broadcatching > Add Channel screen and you can download new files as they are added. Figure 98 Feed Icon A channel uses a feed to deliver its contents (items). Subscribe the NSA to a feed to be able to download the contents. NSA320 User’s Guide...
Page 209
Set which of the channel’s items the NSA downloads. Download All Items: Download every file in the feed. Download Only New Items: Download new files from today on. Manually Choose Items for Download: Only download individual files you select later in the Broadcatching screen. NSA320 User’s Guide...
Page 210
HTTP/FTP jobs are stored in /* (where ‘*’ is a folder that you have set.) • All jobs triggered by RSS channels create the subfolder in /* using the channel name where it store all files downloaded from that channel (where ‘*’ is a folder that you have set.) NSA320 User’s Guide...
Page 211
Path field. All contents within the specified share are automatically selected. Click Apply to save your settings and Cancel to close the screen. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
Keep last N of items: Select this to set the NSA to only keep a number of the channel’s most recent files. When this number has been reached, if the NSA downloads another file from the channel, it deletes the oldest file from the NSA. NSA320 User’s Guide...
Page 213
Select a folder. If you don’t select a folder, a forward slash (/) displays in the Path field. All contents within the specified share are automatically selected. Click Apply to save your settings and Cancel to close the screen. NSA320 User’s Guide...
NSA’s USB port and reconnect it. If that does not work, disconnect the USB port and turn off the printer’s power. Then reconnect the printer and turn it back on. NSA320 User’s Guide...
Type a new name to identify the printer. The name must be unique from all the other names of printers connected to the NSA. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
Backup Files to be This option is only available if you do not select Create a New Replaced Folder for Copied Files. Select this option to save the files that will be replaced by the source files. NSA320 User’s Guide...
NSA can function as a DLNA-compliant media server and/or an iTunes server. The NSA streams files to DLNA-compliant media clients or computers using iTunes. The Digital Living Network Alliance (DLNA) is a group of personal computer and NSA320 User’s Guide...
Page 218
Store > Authorize Computer. A link for the NSA in iTunes under SHARED. Click it to display the NSA’s published media files as shown next. Figure 104 NSA link in iTunes NSA320 User’s Guide...
The link capture browser plugin is an add-on feature for your web browser. Use the plugin to directly add a file’s URL to the NSA’s download service. Note: The link capture browser plugin is located in the included CD. NSA320 User’s Guide...
Section 4.9.5 on page 106 for a tutorial about using the download service notification. In the Download Service screen, select Enable Download Notify and click Apply. An RSS feed icon appears. Click the icon to subscribe to the NSA’s download list. NSA320 User’s Guide...
Place a hardware-based firewall between your network and the Internet (a software-based firewall on your computer would just protect the computer itself, not the NSA since your computer is not between your NSA and the Internet). Figure 107 Firewall NSA320 User’s Guide...
Page 222
To speed up BitTorrent file transfers, configure your firewall’s port forwarding to send incoming TCP port 9090 and UDP port 9089 connections to the NSA. You probably need to use your firewall’s HTML (web-based) configuration interface to NSA320 User’s Guide...
This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet. NSA320 User’s Guide...
Page 224
FamilyPhotos. So you would enter “http:// 192.168.1.33/MyWeb/FamilyPhotos/” in your browser’s address bar. Then press [ENTER] or click Go. A screen displays listing the share’s files. Figure 111 Browsing to an NSA Share Example NSA320 User’s Guide...
The NSA’s web configurator uses port 80. To make the web configurator more secure, you can have the web-published shares use another port number. Then you can configure one set of firewall rules and NAT or port forwarding settings on NSA320 User’s Guide...
In the following example, the Internet gateway’s firewall is configured to allow anyone to access the NSA’s web-published screens using port 8080. Web configurator access (port 80) however, is only allowed from IP address a.b.c.d. Figure 112 Web Publishing Port Number Example NSA320 User’s Guide...
The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA’s USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers. Figure 113 Printer Sharing NSA320 User’s Guide...
After Copy Both storage devices contain file A. • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA. NSA320 User’s Guide...
• A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA. • File C on the NSA is deleted. NSA320 User’s Guide...
Page 230
• File B from the NSA replaces file B on the USB device. • A copy of file C from the USB device is transferred to the NSA. • A copy of file D from the NSA is transferred to the USB device. NSA320 User’s Guide...
Kad protocol. • DyDNS - This gives your NSA a domain name with a dynamic IP address. At the time of writing, this package supports accounts from the following service providers: DynDNS, NoIP, 3322, ZoneEdit, and DHS. NSA320 User’s Guide...
NSA to an internal drive, external storage device or to another NSA in the network. The following applications come with their own web configurator and documentation: • Gallery • PHP-MySQL-phpMyAdmin • SqueezeCenter • WordPress 10.4 Package Management Screen Use this screen to download and install applications from the web. NSA320 User’s Guide...
Page 233
This is only available if you have previously installed the package. Package Info Select an item on the list and click this to display information about the package. See Section 10.4.1 on page 235 for more details. NSA320 User’s Guide...
Page 234
Note: Once you install an application and enable it, additional links show up in the navigation panel. This applies to eMule, DyDNS, NFS, SMART and BackupPlanner. For Gallery, PHP-MySQL-phpMyAdmin, SqueezeCenter and WordPress, you can access the applications’ web configurators through the Package Management screen. NSA320 User’s Guide...
This shows the location of the screens, console or web configurator Page where you can manage the application (after the package has been installed on the system). Source This shows the location of the installed files of the application. NSA320 User’s Guide...
Add Server Click this to add an eMule server. A server provides a list of available files for download, users sharing them and other information. Refer to Section 10.5.2 on page 237 for the Add Server screen. NSA320 User’s Guide...
This shows the number of files available for download in the server. You see a warning screen before you delete a server. Figure 120 Delete a Server 10.5.2 Add Server Use this screen to add a server for the eMule application. NSA320 User’s Guide...
Click this to return to the previous screen without saving. 10.5.3 Edit Server Use this screen to edit a server for the eMule application. Click Edit in the Applications > eMule > Server screen to edit a server. Figure 122 Applications > eMule > Server: Edit NSA320 User’s Guide...
NSA is ED2k IP This is the IP address of the eMule server to which the connected NSA is ED2k Port This is the port number of the eMule server to which the connected NSA320 User’s Guide...
Figure 124 Applications > eMule > Task The following table describes the labels in this screen. Table 53 Applications > eMule > Task LABEL DESCRIPTION Task Enable eMule Check this and click Apply to enable the eMule application. NSA320 User’s Guide...
Page 241
Use this field to set the priority for the task. Choose from Auto, Low, Normal or High. Select Auto to have the NSA automatically determine the task’s priority. Select High to have the NSA complete this task before the others. NSA320 User’s Guide...
Depending on its status, it can eventually show up in the other tabs (Newly Completed, Uploading or Shared Files tabs). You see a warning screen before you delete a task. Figure 125 Delete a Task 10.5.6 Add Task Use this to add a download task to the NSA. NSA320 User’s Guide...
Page 243
NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files. NSA320 User’s Guide...
Click this to return to the previous screen without saving. 10.5.7 Preferences Use this screen to configure your eMule settings, such as port numbers to use, its download/upload rates and the maximum number of peers allowed to connect to the NSA. NSA320 User’s Guide...
Page 245
NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files. NSA320 User’s Guide...
Page 246
Max. download Enter the maximum download rate for download tasks. rate Max. upload rate Enter the maximum upload rate for upload tasks. Connection Maximum Enter the maximum number of eMule peer-to-peer connections. Number of Active Connections IP Filter NSA320 User’s Guide...
IP filter table available. Select Upload IP Filter Table if you want to use an IP filter table from your local computer. Apply Click this to save your changes. Reset Click this to return to the previous screen without saving. NSA320 User’s Guide...
Upload Click this to add files to the share. Use Browse to locate a file and click Apply to upload the file. Note that the size of each file should be less than 2 GB. NSA320 User’s Guide...
This field displays a file’s latest modification date. Close Click this to close the screen. 10.5.10 Task Info Use this screen to view eMule task details, such as status, file name, file size and its download progress. NSA320 User’s Guide...
Page 250
This shows the download speed for the task. Time Left This shows how much time is needed to complete the task. Priority This shows the priority of this task. You can set this in Section 10.5.5 on page 240. NSA320 User’s Guide...
Enter the file extensions separated by commas of files you want included in the search results. Search Click this to have the NSA search the eMule network for files that match the criteria you have set. Clear Click this to clear the fields. NSA320 User’s Guide...
Your friends or relatives will always be able to call you even if they don't know your IP address. Click Network > DyDNS to open the following screen. Figure 132 Network > DyDNS NSA320 User’s Guide...
Use this screen to enable and configure Network File System (NFS) settings on your NSA. NFS is a client/server distributed file service that provides transparent file sharing for network environments. This allows shared folders in your NSA to be accessible like a local folder in a user’s computer. NSA320 User’s Guide...
Page 254
This shows which domain name(s) or IP address(es) have read/write access to the NFS shares. Refer to Section 10.7.1 on page 255 for the screen where you can configure this. Comment This shows a short description of the share. NSA320 User’s Guide...
Enter the name you want to give to the NFS share. Full Path This shows the location of the NFS share in the NSA. The NFS server assigns this path to the share folder you input. Comment Enter a short description for the share. NSA320 User’s Guide...
This displays the date and time the user last connected to the NSA in year, month, day, hour, minute, second format. IP Address This shows the IP address of the user accessing the NFS share. Click this to close the window. NSA320 User’s Guide...
This shows the condition of the hard disk volume. Go to Section 7.3.1 on page 164 for more information. Name This shows the name assigned to the hard disk. Temperature This shows the temperature of the hard disk in degrees celsius. NSA320 User’s Guide...
Figure 138 Storage > S.M.A.R.T: Brief Summary The following table describes the labels in this screen. Table 65 Storage > S.M.A.R.T: Brief Summary LABEL DESCRIPTION Brief Summary Temperature This shows the current temperature of the hard disk in degrees celsius. NSA320 User’s Guide...
Click this to close the window. 10.8.2 SMART Full Summary Use this screen to display more details information about the volume. Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 139 Storage > S.M.A.R.T: Full Summary NSA320 User’s Guide...
Page 260
This indicates when the hard drive updates the value for this attribute. • Always means the hard drive updates this attribute during normal operation and during offline activities. • Offline means the hard drive only updates this attribute when no one is accessing the hard drive. NSA320 User’s Guide...
• Restore screens - These include steps to restore previous backups made with the NSA. 10.10 Backup Screens Use this screen to create and customize scheduled backup jobs for your files. You can have several backup jobs for specific folders and time periods. NSA320 User’s Guide...
Page 262
This shows the backup schedule, including the frequency, the time it was last run in (and whether or not it succeeded), and when it is scheduled to run again. The times use yyyy-mm-dd hh:mm:ss format. Refer to Section 10.10.4 on page 269. NSA320 User’s Guide...
The following table describes the labels in this screen. Table 68 Protect > Backup: Step 1 LABEL DESCRIPTION Job Information Job Name Enter a name to identify the backup job. Job Description Enter a short description (up to 100 keyboard characters) for the backup job. NSA320 User’s Guide...
Page 264
Publish- The NSA does a backup of individual files to the target folder without overwriting existing files in that folder. It makes a copy of the source files. Next Click this to go to the next step. NSA320 User’s Guide...
Chapter 10 Package Management 10.10.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored. Figure 142 Protect > Backup: Step 2 NSA320 User’s Guide...
Page 266
A list of your select folders and files displays below the selection fields. Selected Source This shows the path of the backup source folder you selected. Folders Backup Target Select the target folder where you want to place your backup. NSA320 User’s Guide...
Page 267
Select this if you have a USB hard disk connected to the NSA that you want to use for your backup. Select the folder where you want to place the backup. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. NSA320 User’s Guide...
Bandwidth Restrict the bandwidth of synchronization backups to help stop them from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet. NSA320 User’s Guide...
The following table describes the labels in this screen. Table 71 Protect > Backup: Step 4 LABEL DESCRIPTION Scheduler Backup Select from Hourly, Daily, Weekly and Monthly backup intervals. Frequency The screen changes depending on the item you select. NSA320 User’s Guide...
Click this to close the screen. 10.10.5 Edit Job Screen Use this screen to edit an existing backup job. Some attributes of the backup job cannot be changed, such as the name, backup type, source folder and so on. NSA320 User’s Guide...
This field is read-only and shows on which volume (whether internal or external) the backup files are stored. If the target location is a remote NSA, this shows the remote IP address. Target Path This field is read-only and shows the target folder for the backup files. NSA320 User’s Guide...
After this day has expired, all backup files will be deleted. Next Click this to go to the next screen. 10.10.7 Edit Job: Step 2 Use this screen to edit the schedule for the backup job. Figure 146 Protect > Backup > Edit: Step 2 NSA320 User’s Guide...
Select the day in a month when you want the NSA to perform the backup job. Previous Click this to go back to the previous screen. Done Click this to close the screen. 10.10.8 Restore Archive Screen Use this screen to restore previous backups made with the NSA. NSA320 User’s Guide...
This is the type of backup implemented for the backup job. Scheduler This field displays the backup’s frequency. Information Restored Time Select a previous backup in the list that you want to restore to your NSA. Next Click this to go to the next screen. NSA320 User’s Guide...
Select the folder where the backup you want to restore is located. Selected Folder This shows the path of the folder you selected. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. NSA320 User’s Guide...
Click Apply to save your settings and Cancel to close the screen. Previous Click this to go back to the previous screen. Done Click this to run the restore process and go back to the Backup screen. NSA320 User’s Guide...
Enter the password of your NSA account. Share Name Enter the name of the share you want to use. Test Connection Click this to test your connection to the remote NSA that you have specified in the fields above. NSA320 User’s Guide...
Click Apply to save your settings and Cancel to close the screen. Next Click this to go to the next screen. 10.11.2 Restore: Step 2 Select a previous archive backup that you want to restore to the NSA. Figure 151 Protect > Restore: Step 2 NSA320 User’s Guide...
Click this to go back to the previous screen. Next Click this to go to the next screen. 10.11.3 Restore: Step 3 Use this screen to select the folder where the archive you want to restore is located. Figure 152 Protect > Restore: Step 3 NSA320 User’s Guide...
Next Click this to go to the next screen. 10.11.4 Restore: Step 4 Use this screen to select the location in the NSA where you want to restore your backup. Figure 153 Protect > Restore: Step 4 NSA320 User’s Guide...
This section provides technical background information on the topics discussed in this chapter. 10.12.1 S.M.A.R.T Attributes The following table describes some common S.M.A.R.T. attributes. If a higher or lower raw attribute value is better, it is indicated in the BETTER column. Since NSA320 User’s Guide...
Page 282
This is the number of times the hard drive has gone Cycle Count through a full power on and power off. Soft Read Error This is the number of uncorrected read errors the hard Rate drive has reported. If this is not zero, back up your data. NSA320 User’s Guide...
Page 283
Mark Errors could also be a different, manufacturer-specific attribute. Run Out Cancel This is the number of ECC (Error Correction Code) errors. Soft ECC This is the number of errors corrected by software ECC Correction (Error Correction Code). NSA320 User’s Guide...
Page 284
Temperature This is the hard drive’s temperature. Head Flying This is the total time that the head has been positioning. Hours Read Error This is the number of errors in reading from the disk. Retry Rate NSA320 User’s Guide...
File Transfer Protocol (FTP) is a file transfer service that operates on the Internet. A system running the FTP server accepts commands from a system running an FTP client. FTP is not a secure protocol. Your file transfers could be subject to snooping. NSA320 User’s Guide...
This field displays the name of a sharing website to which the NSA can automatically upload files. Account This field displays the username and related information of the Information account to use with the auto upload feature. NSA320 User’s Guide...
Click OK to continue the authorization process. Figure 155 Linking NSA to Flickr The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account’s information and click Sign In. Figure 156 Yahoo! Flickr Login Page NSA320 User’s Guide...
Page 288
IT to establish a link between the NSA and your Flickr account. Figure 157 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA web configurator. Click Get Ready in the following screen to complete the authorization process. Figure 158 Confirming Flickr Authorization NSA320 User’s Guide...
Page 289
Chapter 11 Auto Upload Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen. Figure 159 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) NSA320 User’s Guide...
Page 290
This is the path of a folder selected for auto upload. The NSA only uploads files stored in the specified share or folder to your Flickr account. Action Use the Remove icon to remove a folder from the Folder Watch List. NSA320 User’s Guide...
Page 291
You can set up a friend/family list in your Flickr account. Select Anyone to allow everyone to see your files. Hide from public Check this option to prevent others from finding your files when they site area perform a search in the Flickr website. NSA320 User’s Guide...
If you have not authorized a YouTube account on the NSA, the following screen displays. Enter your Google account’s e-mail address and password in the fields and click OK to authorize the service. Figure 160 YouTube Account Settings NSA320 User’s Guide...
Page 293
Chapter 11 Auto Upload Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen. Figure 161 Applications > Auto Upload > Flickr/YouTube > Config (YouTube) NSA320 User’s Guide...
Page 294
This field displays the path of a folder selected for auto upload. The NSA only uploads the files stored in the specified share or folder to your YouTube account. Action Use the Remove icon to delete a folder from the Folder Watch List. NSA320 User’s Guide...
Page 295
Select Only You if you do not want anyone else to see your files. Select Anyone to allow everyone to see your files. Apply Click this to save your changes. Reset Click this to restore your previously stored settings. NSA320 User’s Guide...
FTP server. Use this screen to configure the FTP Uploadr. Click Applications > Auto Upload > FTP Uploadr to open the screen shown next. Figure 162 Applications > Auto Upload > FTP Uploadr NSA320 User’s Guide...
Page 297
This is the port number used by the FTP server. Remote Path The NSA automatically uploads files to this location of the FTP server. Account Name This is the login account for the FTP server. Description This is the information related to the FTP server. NSA320 User’s Guide...
Click this to test your settings and check whether you can use the settings to connect to the FTP server. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
This is the path of a folder selected for auto upload. The NSA only uploads files stored in the specified share or folder to your FTP server. Action Use the Remove icon to delete a folder from the Folder Watch List. NSA320 User’s Guide...
Page 300
Internet connection has restricted upload speed. Apply Click this to save your changes in this section. Reset Click this to restore previously saved settings. Close Click this to return to the previous screen without saving. NSA320 User’s Guide...
304) to edit the properties of an existing account. • Use the User Info screen (Section 12.4 on page 306) to display the amount of volume space used by a selected account and the account’s membership in any groups. NSA320 User’s Guide...
Click Clear to close the search function. Edit User Select an account and click this to open a screen where you can edit the properties of the account. Refer to Section 12.3.2 on page 304 to see the screen. NSA320 User’s Guide...
This field displays the username of each account. 12.3.1 User Icons The following table describes the user icons. Table 89 User Icons ICON DESCRIPTION The blue icon is for an administrator account. The green icon is for a user account. NSA320 User’s Guide...
Select User to give the account basic access rights to the NSA and allow the user to manage his own shares, change his own password, and access the contents of other shares to which he is given access rights. Group Membership NSA320 User’s Guide...
• The username cannot be the same as a system username such as ANONYMOUS-FTP nor be the same as an existing user. Other reserved usernames that are not allowed are: • bin • daemon • ftp • anonymous-ftp NSA320 User’s Guide...
NSA while logged in with that username. Group Name This shows when you click the Group List tab. This displays the list of groups to which the selected user belongs. Click this to close the current screen. NSA320 User’s Guide...
(Section 13.3.1 on page 309) to create new groups. • Use the Edit Group screen (Section 13.3.1 on page 309) to edit the properties of an existing group. 13.3 The Groups Screen Use this screen to create and manage groups. NSA320 User’s Guide...
Page 308
Select a group and click this to open a screen where you can edit the properties of the selected group. Delete Selected Select a group and click this to open a screen where you can Group(s) delete the group. NSA320 User’s Guide...
Select a user account from the Group Membership list and User(s) click this to remove the account from the group. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
• The group name cannot be the same as a system group name such as EVERYONE nor be the same as an existing group. Other reserved groups names that are not allowed are: • nobody • root • everyone NSA320 User’s Guide...
• Use the Edit Share screen (Section 14.3.1 on page 314) to edit a share’s properties. • Use the Share Browser screen (Section 14.6 on page 319) to navigate, add and edit the contents in a share. NSA320 User’s Guide...
Select a share and click this to edit the share. Delete Share Select a share and click this to remove or restrict access to the share. Share Browser Select a share and click this to browse the share’s contents. NSA320 User’s Guide...
Page 313
This field displays the access permission of a share. Everyone on the network can access a Public share. Only the share owner can access a Private share. An Advanced share allows you to assign specific access rights (read-only for example) to individual users/groups. NSA320 User’s Guide...
Publish this This shows only when you enable the Web Publish ( page 204) share to Web Select this option to let people use a web browser to access this share’s files without logging into the Home screens. NSA320 User’s Guide...
Share Access drop-down list. Click Edit to open the following screen. Use this screen to configure share access rights for individual users and groups. Figure 172 Sharing > Shares > Add Share (or Edit Share) > Advanced NSA320 User’s Guide...
When you reconnect to the network, Windows uses a process called synchronization to update the files on the network with your changes. If others on the network modified the same file, you can save your version, the other version, or both. NSA320 User’s Guide...
Click this to save your changes. Cancel Click this to return to the previous screen without saving. 14.4.1 Using Windows Offline File Synchronization To use Windows offline file synchronization, in Windows Explorer right click an NSA share and select Always available offline. NSA320 User’s Guide...
Note: Cleaning up recycle bins permanently removes the files from the NSA. Clean all recycle bins Click this to immediately remove contents from all recycle bins. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
Upload Click this to add files to the share. Use Browse to locate a file and click Apply to upload the file. Note that the size of each file should be less than 2 GB. NSA320 User’s Guide...
Page 320
You can also click the folder’s name to navigate to a sub-folder within the folder. Size This field displays size of the file. Modified Date This field displays a file’s latest modification date. Close Click this to close the screen. NSA320 User’s Guide...
Path field. All contents within the specified share are automatically selected. Click Apply to save your settings and Cancel to close the screen. Click this to move or copy the file/folder to the designated share. Close Click this to return to the Share Browser screen. NSA320 User’s Guide...
333) to configure HTTPS and the NSA’s SSL certificate. • Use the Firmware Upgrade screen (Section 15.7 on page 336) to upload new firmware. • Use the Shutdown screen (Section 15.8 on page 337) to restart or shut down your NSA. NSA320 User’s Guide...
Table 101 Maintenance > Power LABEL DESCRIPTION Power Management Turn off hard Enter the number of minutes the NSA will sit idle before spinning the disk(s) hard disks down to sleep. The default power-off time is 15 minutes. Minimum UPS Capacity NSA320 User’s Guide...
Page 325
NSA supports sending magic packets. Use the NSA’s power button or the Web Configurator’s Maintenance > Shutdown menu to turn off the NSA. Apply Click this to save your changes. Reset Click this to restore previously saved settings. NSA320 User’s Guide...
(when the NSA is to turn on, turn off, or reboot). Actions Click the Delete icon to remove a power control schedule from the list. Add Power Use this part of the screen to configure power on, power off, and reboot Control times. Schedule NSA320 User’s Guide...
Page 327
Enter the interval between days for the power control schedule entry. Click this to add the power control schedule to the list. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
This displays how serious the log is rated by the NSA. See Table 113 on page 338for more information. Message This displays a description of the log. Click the top of the column to sort by alphabetical or reverse alphabetical order. NSA320 User’s Guide...
Select the e-mail format you want the NSA to use in its e-mail alerts. Use SMTP Click this if the e-mail server you want the NSA to use for its e-mail Authentication alerts requires a username and password. User Enter the username for the e-mail server. NSA320 User’s Guide...
Select how often (Weekly, Daily or Hourly), what day in the week (Monday to Sunday) and which time (hour:minutes) the NSA delivers its e-mail alerts. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
In the table below, check the type of log alerts you want to receive in your e-mail. Select All Log to include all types of log alerts. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit. Reset MySQL Database Click this to reset the password for your MySQL database. Password NSA320 User’s Guide...
Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that was issued by a known certificate authority. Figure 184 Maintenance > SSL NSA320 User’s Guide...
Page 334
Note: Use this method if the device is open to external access, such as allowing users to connect through the Internet using FTP over TLS or HTTPs. NSA320 User’s Guide...
Key Length Select the encryption key length. The longer the key, the better the encryption security. The only drawback to having a long key is that the file encrypted with it swells in size as well. NSA320 User’s Guide...
Click this to upload the new firmware. The NSA automatically restarts after you upgrade. Wait until the restart completes before accessing the NSA again. If you interrupt the upgrade, then the NSA may become unusable. Reset Click this to refresh the screen. NSA320 User’s Guide...
Click this to shut down the system and restart it again later. When you click the Restart button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the restart. Figure 188 Maintenance > Shutdown > Confirm Restart NSA320 User’s Guide...
6 with 0 being the most severe level log and 6 being an informational log only. Log levels are not displayed in the logs and are for your reference only. Table 113 Log Severity Levels LEVEL DESCRIPTION Emergency Alert NSA320 User’s Guide...
Folder. Copy/Sync INFO [USB Sync] Copying %s from Internal Volume to USB. Button Copy/Sync INFO [USB Sync] Copying %s from USB to Backup Folder. Button Copy/Sync INFO [USB Sync] Copying %s from USB to Internal Volume. Button NSA320 User’s Guide...
Page 340
INFO Download service set %s to %s priority by user Service Download INFO Download service set default download location to %s Service Download INFO Download service set max BT download rate to %d KB/s by Service user NSA320 User’s Guide...
Page 341
Download service will update ipfilter.dat from %s after %d Service day(s) Download INFO Download service added %d rules from ipfilter.dat Service Download INFO Download service detected invalid ip range %s in ipfilter.dat Service Download WARNING Download service default location does not exist. Load Service default NSA320 User’s Guide...
Page 342
MyClock has set timezone to %s Services INFO MyClock has set timezone to default Services INFO The date and time are updated from NTP server. Services INFO The date and time are updated manually. Services INFO The time is updated manually. NSA320 User’s Guide...
Page 344
The user %s from %s has attempted to change the user %s password but old password verification fail. Users NOTICE User %s on %u.%u.%u.%u has been denied access from Users NOTICE User %s password has been changed by %s from %s. NSA320 User’s Guide...
Page 345
Job [%s] is canceled by user Management Power INFO Restore job [%s] is triggered by user Management Power INFO [Power On] schedule is triggered. Management Power INFO [Power Off] schedule is triggered. Management Power INFO [Reboot] schedule is triggered. Management NSA320 User’s Guide...
Network down Natural disaster such as a fire or earthquake occurs where your NSA is located The following sections describe these methods in more detail. See Section 7.6.3 on page 169 for more information on RAID. NSA320 User’s Guide...
16.4.1 Memeo Autobackup Installation and Setup Note: The Memeo Autobackup program uses the same network port as the discovery utility to discover the NSA. To avoid a port conflict, turn off the discovery utility before using Memeo Autobackup. NSA320 User’s Guide...
Page 349
When you see the following screen, select Network Places and click the link to select your backup folder. Figure 190 Memeo Autobackup Configuration Select the NSA’s mapped drive and click OK. Figure 191 Mapped Drive NSA320 User’s Guide...
Page 350
Chapter 16 Protecting Your Data In this screen, select the items that you want to back up. Figure 192 Backup Items This screen lists the items you selected for backup. Confirm your selections and click Next. Figure 193 Confirm Backup Items NSA320 User’s Guide...
After you have installed and configured Memeo Autobackup, double-click the icon in the system tray to open the program’s start screen. If the icon is not displayed, you can click Start > Programs > Memeo Autobackup > Memeo Autobackup to start it. Figure 195 Memeo Autobackup NSA320 User’s Guide...
Page 352
Chapter 16 Protecting Your Data NSA320 User’s Guide...
• Web Publishing • Auto Upload • Package Management • Backups 17.2 Power, Hardware, Connections, and LEDs The NSA PWR LED does not turn on (no LEDs are on). • Make sure the NSA is turned on. NSA320 User’s Guide...
Page 354
• If you have a RAID I volume click the Repair icon next to the new drive. • If you are using RAID 0 you will need to recreate the whole volume. All of your data is lost. NSA320 User’s Guide...
Page 355
• If a file is corrupted, the NSA will download the file again. • If the file is intact but not completely downloaded, the NSA will resume the download task after it restarts. NSA320 User’s Guide...
NSA. Press the RESET button until you hear two beeps. After the second beep, continue pressing the button for five more seconds, then release it. You will hear three quick beeps after you release the button. NSA320 User’s Guide...
17.4 NSA Login and Access I forgot the server name of the NSA. • The default server name is nsa320. • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility.
Page 358
Chapter 17 Troubleshooting • The default server name is nsa320, if you have changed the server name, use the new one. • If the server name has been changed and you do not know the new server name, see the troubleshooting suggestions for I forgot the server name of the NSA.
In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 196 Internet Options: Security Click the Custom Level... button. Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default). NSA320 User’s Guide...
Page 360
ActiveX controls. The Web Configurator logs out by itself. The web configurator management session automatically times out if it is left idle for 15 minutes. Simply log back into the NSA if this happens to you. NSA320 User’s Guide...
NSA or use the NAS Starter Utility to discover it. • The local user should check that he entered his login name and password correctly. • Check if the share exists and has the correct access settings for this user. NSA320 User’s Guide...
Page 362
IP address, the NSA needs to use a private DNS server. If the domain controller uses a public IP address, the NSA needs to use a public DNS server. • Leave the domain and re-join it. A domain user can’t access a share. NSA320 User’s Guide...
NSA. Try to save the files onto a computer and then from the computer to the NSA (through the network connection). 17.8 Firmware I want to know the firmware version on the NSA. Go to the Status screen. The Firmware field shows you the current firmware version running. NSA320 User’s Guide...
NSA and transfer files in the same way you transfer files in your local computer: On your Windows computer, click Start > Run or open a web browser. Enter \\nsa320 (default) or the Server Name you assigned the NSA. This shows you the folders in the NSA.
• Create a new volume if you do not have one on the internal disk yet. • Make sure the volume on the installed internal disk is in a healthy state. I cannot use some applications in the Web Configurator. NSA320 User’s Guide...
The media client may not support the file’s format. iTunes does not display the names of all the music files I just put on the NSA. Make sure the files are a format supported by iTunes. See Section 18.5 on page 381. NSA320 User’s Guide...
Page 367
Applications > Media Server and disable and re-enable the iTunes server option. If you uploaded many files, it may take awhile for the NSA to find and list all of them. Then try reconnecting your iTunes client. NSA320 User’s Guide...
Check the Download Policy for that channel (see Section 9.8.1 on page 208). It may be set to manual download. You can configure your NSA to download all items or only new items automatically once the channel is updated. NSA320 User’s Guide...
• Web publishing uses TCP protocol and the port number you specify. Make sure there is not another service using TCP protocol with the same port number. See Appendix C on page 407 for a list of common services and their associated protocols and port numbers. NSA320 User’s Guide...
The NSA does not automatically upload files to Flickr or YouTube. Make sure the NSA is connected to the Internet. See Section 8.4 on page 175 details about testing network connections. Click Maintenance > Log to check the NSA’s log for a message about the file. NSA320 User’s Guide...
• The web location of the package may be undergoing maintenance. Try again at a later time. Upgrade the firmware of the NSA. • If a new firmware is available, do an upgrade and try installing the package(s) again. The eMule Search screen does not work. NSA320 User’s Guide...
The backup does not run at the time configured. • Check that the correct time is configured on the NSA. • Check that the NSA is able to access the time server from which it gets the time; see Section 6.5 on page 155. NSA320 User’s Guide...
The NSA supports two SATA II interfaces (backwards compatible to SATA). Serial ATA is a low cost interface technology that allows high speed data transfer. Serial ATA also allows more efficient internal airflow and smaller chassis design. NSA320 User’s Guide...
Page 374
All settings you have configured on the NSA, including IP address, password, user accounts, groups, and so on will be reset to the factory defaults. The reset process does NOT affect the volume settings, nor data stored on the NSA. NSA320 User’s Guide...
Windows computers to an NSA. This software is included on the CD. Time and Date Configure a time server and set a time zone for your NSA to show the correct times in logs. NSA320 User’s Guide...
IP address in the 169.254.X.X subnet (where X is a number from 1 to 254). Default Subnet Mask DHCP client by default. If no DHCP server is found, the subnet mask defaults to 255.255.255.0 (24 bits). Default Username admin NSA320 User’s Guide...
Page 377
The NSA firmware specifications are shown in the following table Table 120 NSA Firmware Specifications File Storage System JBOD, RAID 0, RAID 1 Network Protocols TCP/IP, UDP/IP DHCP Client FTP, FTPES (TLS explicit mode) HTTP, HTTPS File Management Create/Delete System Volume NSA320 User’s Guide...
Page 378
DLNA clients play files stored on DLNA servers. ECMA-262 The original ECMAScript standard, also known as JavaScript. NSA320 User’s Guide...
Page 379
Wide Web Consortium) recommendations for the "text/html" MIME type. RFC 3066, BCP 47 Language tags (Best Current Practice) RFC 3282 "Content-language:" headers. RFC 3986 (STD-66) - Uniform Resource Identifier (URI): Generic Syntax RFC 4120 The Kerberos Network Authentication Service (V5) NSA320 User’s Guide...
MPEG-4 m4v, mp4 DivX divx, avi Motion JPEG mjpeg, mjpg Quick Time Video mov, qt RealMedia rmvb, rm Matroska Windows Media Video asf, wmv Flash Video Subtitle srt, ssa, idx, sub NSA320 User’s Guide...
At the time of writing, the NSA supports iTunes publishing audio files of the following formats: mp3, m4a, m4p, wav, and mp4. 18.6 Power Consumption The NSA’s power consumption was tested using two 7,200 RPM 1.5 TB hard drives and 3 USB storage devices. NSA320 User’s Guide...
Page 382
Chapter 18 Product Specifications Note: These are results from a laboratory test and are for your reference only. Table 123 Power Consumption in Watts (W) POWER MODE POWER CONSUMPTION Access Mode 32.2 Watts Hard Disk Hibernation Mode 10 Watts NSA320 User’s Guide...
IP addresses that place them in the same subnet. In this appendix, you can set up an IP address for: • Windows XP/NT/2000 page 384 • Windows Vista page 387 • Windows 7 page 391 NSA320 User’s Guide...
Page 384
Appendix A Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. Click Start > Control Panel. In the Control Panel, click the Network Connections icon. NSA320 User’s Guide...
Page 385
Appendix A Setting Up Your Computer’s IP Address Right-click Local Area Connection and then select Properties. On the General tab, select Internet Protocol (TCP/IP) and then click Properties. NSA320 User’s Guide...
Page 386
In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. NSA320 User’s Guide...
Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. In the Control Panel, click the Network and Internet icon. Click the Network and Sharing Center icon. NSA320 User’s Guide...
Page 388
Appendix A Setting Up Your Computer’s IP Address Click Manage network connections. Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NSA320 User’s Guide...
Page 389
Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NSA320 User’s Guide...
Page 390
ISP. You may also have to enter a Preferred DNS server and an Alternate DNS server, if that information was provided.Click Advanced. Click OK to close the Internet Protocol (TCP/IP) Properties window. 10 Click OK to close the Local Area Connection Properties window. NSA320 User’s Guide...
Page 391
Status and then click the Support tab to view your IP address and connection information. Windows 7 This section shows screens from Windows 7 Enterprise. Click Start > Control Panel. In the Control Panel, click View network status and tasks under the Network and Internet category. NSA320 User’s Guide...
Page 392
Appendix A Setting Up Your Computer’s IP Address Click Change adapter settings. Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NSA320 User’s Guide...
Page 393
Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NSA320 User’s Guide...
Page 394
DNS server and an Alternate DNS server, if that information was provided. Click Advanced if you want to configure advanced settings for IP, DNS and WINS. Click OK to close the Internet Protocol (TCP/IP) Properties window. Click OK to close the Local Area Connection Properties window. NSA320 User’s Guide...
Page 395
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Click Start > All Programs > Accessories > Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. The IP settings are displayed as follows. NSA320 User’s Guide...
Page 396
Appendix A Setting Up Your Computer’s IP Address NSA320 User’s Guide...
Disable Pop-up Blockers In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 200 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. NSA320 User’s Guide...
Page 398
Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. In Internet Explorer, select Tools, Internet Options and then the Privacy tab. NSA320 User’s Guide...
Page 399
Select Settings…to open the Pop-up Blocker Settings screen. Figure 202 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. NSA320 User’s Guide...
Page 400
Figure 203 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. NSA320 User’s Guide...
Page 401
Figure 204 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default). NSA320 User’s Guide...
Page 402
Figure 205 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. NSA320 User’s Guide...
Page 403
Click OK to close the window. Figure 206 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. NSA320 User’s Guide...
Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears. Figure 208 Mozilla Firefox: Tools > Options NSA320 User’s Guide...
Page 405
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 209 Mozilla Firefox Content Security NSA320 User’s Guide...
Page 406
Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA320 User’s Guide...
Border Gateway Protocol. BOOTP_CLIENT DHCP Client. BOOTP_SERVER DHCP Server. CU-SEEME 7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. NSA320 User’s Guide...
Page 408
ICMP echo requests to test whether or not a remote host is reachable. POP3 Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other). NSA320 User’s Guide...
Page 409
Access Controller Access Control System). TELNET Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems. NSA320 User’s Guide...
Page 410
Table 124 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE 7000 Another videoconferencing solution. NSA320 User’s Guide...
In this appendix, you can import a public key certificate for: • Internet Explorer on page 412 • Firefox on page 422 • Opera on page 428 • Konqueror on page 436 NSA320 User’s Guide...
If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 210 Internet Explorer 7: Certification Error Click Continue to this website (not recommended). Figure 211 Internet Explorer 7: Certification Error NSA320 User’s Guide...
Page 413
Appendix D Importing Certificates In the Address Bar, click Certificate Error > View certificates. Figure 212 Internet Explorer 7: Certificate Error In the Certificate dialog box, click Install Certificate. Figure 213 Internet Explorer 7: Certificate NSA320 User’s Guide...
Page 414
Figure 214 Internet Explorer 7: Certificate Import Wizard If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 215 Internet Explorer 7: Certificate Import Wizard NSA320 User’s Guide...
Page 415
Browse. Figure 216 Internet Explorer 7: Certificate Import Wizard In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK. Figure 217 Internet Explorer 7: Select Certificate Store NSA320 User’s Guide...
Page 416
Appendix D Importing Certificates In the Completing the Certificate Import Wizard screen, click Finish. Figure 218 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 219 Internet Explorer 7: Security Warning NSA320 User’s Guide...
Page 417
12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information. Figure 221 Internet Explorer 7: Website Identification NSA320 User’s Guide...
Page 418
Figure 222 Internet Explorer 7: Public Key Certificate File In the security warning dialog box, click Open. Figure 223 Internet Explorer 7: Open File - Security Warning Refer to steps 4-12 in the Internet Explorer procedure beginning on page 412 complete the installation process. NSA320 User’s Guide...
Page 419
This section shows you how to remove a public key certificate in Internet Explorer Open Internet Explorer and click Tools > Internet Options. Figure 224 Internet Explorer 7: Tools Menu In the Internet Options dialog box, click Content > Certificates. Figure 225 Internet Explorer 7: Internet Options NSA320 User’s Guide...
Page 420
Remove. Figure 226 Internet Explorer 7: Certificates In the Certificates confirmation, click Yes. Figure 227 Internet Explorer 7: Certificates In the Root Certificate Store dialog box, click Yes. Figure 228 Internet Explorer 7: Root Certificate Store NSA320 User’s Guide...
Page 421
Appendix D Importing Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA320 User’s Guide...
Page 422
If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Select Accept this certificate permanently and click OK. Figure 229 Firefox 2: Website Certified by an Unknown Authority NSA320 User’s Guide...
Page 423
The certificate is stored and you can now connect securely to the Web Configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information. Figure 230 Firefox 2: Page Info NSA320 User’s Guide...
Page 424
Open Firefox and click Tools > Options. Figure 231 Firefox 2: Tools Menu In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 232 Firefox 2: Options NSA320 User’s Guide...
Page 425
Use the Select File dialog box to locate the certificate and then click Open. Figure 234 Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information. NSA320 User’s Guide...
Page 426
This section shows you how to remove a public key certificate in Firefox 2. Open Firefox and click Tools > Options. Figure 235 Firefox 2: Tools Menu In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 236 Firefox 2: Options NSA320 User’s Guide...
Page 427
In the Delete Web Site Certificates dialog box, click OK. Figure 238 Firefox 2: Delete Web Site Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA320 User’s Guide...
Page 428
If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Click Install to accept the certificate. Figure 239 Opera 9: Certificate signer not found NSA320 User’s Guide...
Page 429
Appendix D Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. Figure 240 Opera 9: Security information NSA320 User’s Guide...
Page 430
Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Open Opera and click Tools > Preferences. Figure 241 Opera 9: Tools Menu NSA320 User’s Guide...
Page 431
Appendix D Importing Certificates In Preferences, click Advanced > Security > Manage certificates. Figure 242 Opera 9: Preferences NSA320 User’s Guide...
Page 432
Appendix D Importing Certificates In the Certificates Manager, click Authorities > Import. Figure 243 Opera 9: Certificate manager Use the Import certificate dialog box to locate the certificate and then click Open. Figure 244 Opera 9: Import certificate NSA320 User’s Guide...
Page 433
Next, click OK. Figure 246 Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. NSA320 User’s Guide...
Page 434
This section shows you how to remove a public key certificate in Opera 9. Open Opera and click Tools > Preferences. Figure 247 Opera 9: Tools Menu In Preferences, Advanced > Security > Manage certificates. Figure 248 Opera 9: Preferences NSA320 User’s Guide...
Page 435
The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button. NSA320 User’s Guide...
Page 436
If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Click Continue. Figure 250 Konqueror 3.5: Server Authentication Click Forever when prompted to accept the certificate. Figure 251 Konqueror 3.5: Server Authentication NSA320 User’s Guide...
Page 437
Appendix D Importing Certificates Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 252 Konqueror 3.5: KDE SSL Information NSA320 User’s Guide...
Page 438
Figure 253 Konqueror 3.5: Public Key Certificate File In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 254 Konqueror 3.5: Certificate Import Result The public key certificate appears in the KDE certificate manager, Kleopatra. Figure 255 Konqueror 3.5: Kleopatra NSA320 User’s Guide...
Page 439
Appendix D Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page’s security details. NSA320 User’s Guide...
Page 440
On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 257 Konqueror 3.5: Configure The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA320 User’s Guide...
Page 441
Appendix D Importing Certificates Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button. NSA320 User’s Guide...
Page 442
Appendix D Importing Certificates NSA320 User’s Guide...
NOTICE AS BELOW FOR THE SOFTWARE. 1.Grant of License for Personal Use ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, non- sublicense, non-transferable license to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for up to the number...
Page 444
To the extent that the Software contains third party software, ZyXEL has no express or implied obligation to provide any technical or other support for such software. Please contact the appropriate software vendor or manufacturer directly for technical support and customer service related to its software and products. NSA320 User’s Guide...
Page 445
OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED THE PRODUCT’S PRICE. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. 8.Export Restrictions NSA320 User’s Guide...
Page 446
If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties. NSA320 User’s Guide...
Page 447
This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General NSA320 User’s Guide...
Page 448
General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a NSA320 User’s Guide...
Page 449
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such NSA320 User’s Guide...
Page 450
License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as NSA320 User’s Guide...
Page 451
When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially NSA320 User’s Guide...
Page 452
For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not NSA320 User’s Guide...
Page 453
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this NSA320 User’s Guide...
Page 454
Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NSA320 User’s Guide...
Page 455
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. NSA320 User’s Guide...
Page 456
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or NSA320 User’s Guide...
Page 457
Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to NSA320 User’s Guide...
Page 458
Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. NSA320 User’s Guide...
Page 459
License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in NSA320 User’s Guide...
Page 460
IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein, if any, are the property of their respective owners. NSA320 User’s Guide...
Page 461
GNU LESSER GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. NSA320 User’s Guide...
Page 462
•a) under this License, provided that you make a good faith effort to ensure that, in the event an Application does not supply the function or data, the facility still operates, and performs whatever part of its purpose remains meaningful, or NSA320 User’s Guide...
Page 463
(a) uses at run time a copy of the Library already present on the user's computer system, and (b) will operate properly with a modified version of the Library that is interface-compatible with the Linked Version. NSA320 User’s Guide...
Page 464
If the Library as you received it specifies that a proxy can decide whether future versions of the GNU Lesser General Public License shall apply, that proxy's public statement of acceptance of any version is permanent authorization for you to choose that version for the Library. ________________________________________ NSA320 User’s Guide...
Page 465
For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions. NSA320 User’s Guide...
Page 466
To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying. NSA320 User’s Guide...
Page 467
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. NSA320 User’s Guide...
Page 468
License along with the Program. You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. 5. Conveying Modified Source Versions. NSA320 User’s Guide...
Page 469
(1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for NSA320 User’s Guide...
Page 470
User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made. NSA320 User’s Guide...
Page 471
(if authorized by the copyright holders of that material) supplement the terms of this License with terms: •a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or NSA320 User’s Guide...
Page 472
(a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. NSA320 User’s Guide...
Page 473
(including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. NSA320 User’s Guide...
Page 474
License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the NSA320 User’s Guide...
Page 475
Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation. NSA320 User’s Guide...
Page 476
Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee. This Product includes rsync software under GPL 3.0 license GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 NSA320 User’s Guide...
Page 477
This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products NSA320 User’s Guide...
Page 478
An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for NSA320 User’s Guide...
Page 479
Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, NSA320 User’s Guide...
Page 480
You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: NSA320 User’s Guide...
Page 481
License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. NSA320 User’s Guide...
Page 482
User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is NSA320 User’s Guide...
Page 483
•a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or •b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or NSA320 User’s Guide...
Page 484
60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of NSA320 User’s Guide...
Page 485
Program or any portion of it. 11. Patents. A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”. NSA320 User’s Guide...
Page 486
(a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) NSA320 User’s Guide...
Page 487
If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. NSA320 User’s Guide...
Page 488
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; NSA320 User’s Guide...
Page 489
<program> Copyright (C) <year> <name of author> This program comes with ABSOLUTELY NO WARRANTY; for details type `show This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. NSA320 User’s Guide...
Page 490
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY NSA320 User’s Guide...
Page 491
License. Such a notice grants a world-wide, royalty-free license, unlimited in duration, to use that work under the conditions stated herein. The "Document", NSA320 User’s Guide...
Page 492
Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modification. Examples of transparent image formats include PNG, XCF NSA320 User’s Guide...
Page 493
The front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the covers, as NSA320 User’s Guide...
Page 494
Modified Version, together with at least five of the principal authors of the Document (all of its principal authors, if it has fewer than five), unless they release you from this requirement. NSA320 User’s Guide...
Page 495
M. Delete any section Entitled "Endorsements". Such a section may not be included in the Modified Version. N. Do not retitle any existing section to be Entitled "Endorsements" or to conflict in title with any Invariant Section. O. Preserve any Warranty Disclaimers. NSA320 User’s Guide...
Page 496
In the combination, you must combine any sections Entitled "History" in the various original documents, forming one section Entitled "History"; likewise combine any sections Entitled "Acknowledgements", and any sections Entitled "Dedications". You must delete all sections Entitled "Endorsements". NSA320 User’s Guide...
Page 497
In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the original version will prevail. If a section in the Document is Entitled "Acknowledgements", "Dedications", or "History", the requirement (section 4) to Preserve NSA320 User’s Guide...
Page 498
Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the "with...Texts." line with this: NSA320 User’s Guide...
Page 499
Original Code and Modifications, in each case including portions thereof. 1.4. "Electronic Distribution Mechanism" means a mechanism generally accepted in the software development community for the electronic transfer of data. 1.5. "Executable" means Covered Code in any form other than Source NSA320 User’s Guide...
Page 500
Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License. 1.10.1. "Patent Claims" means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, NSA320 User’s Guide...
Page 501
(50%) of the outstanding shares or beneficial ownership of such entity. 2. Source Code License. 2.1. The Initial Developer Grant. The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims: NSA320 User’s Guide...
Page 502
(a) under intellectual property rights (other than patent or trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered Code NSA320 User’s Guide...
Page 503
Covered Code in the absence of Modifications made by that Contributor. 3. Distribution Obligations. 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation NSA320 User’s Guide...
Page 504
You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change. You must include a prominent statement that NSA320 User’s Guide...
Page 505
Code that new knowledge has been obtained. (b) Contributor APIs. If Contributor's Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API, Contributor must also include this information in the LEGAL file. NSA320 User’s Guide...
Page 506
You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer. NSA320 User’s Guide...
Page 507
Initial Developer or such Contributor as a result of any such terms You offer. 3.7. Larger Works. You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger NSA320 User’s Guide...
Page 508
6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that NSA320 User’s Guide...
Page 509
CODE IS WITH YOU. SHOULD ANY COVERED CODE PROVE DEFECTIVE IN ANY RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS NSA320 User’s Guide...
Page 510
Contributor Version against such Participant. If within 60 days of notice, a reasonable royalty and payment arrangement are not mutually agreed upon in writing by the parties or the litigation claim is not withdrawn, the rights granted by Participant to You under NSA320 User’s Guide...
Page 511
UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO NSA320 User’s Guide...
Page 512
With respect to disputes in which at least one party is a citizen of, or an entity chartered or registered to do business in the United States of America, any litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the Northern NSA320 User’s Guide...
Page 513
Initial Developer in the file described in Exhibit A. EXHIBIT A -Mozilla Public License. ``The contents of this file are subject to the Mozilla Public License Version 1.1 (the "License"); you may not use this file except in NSA320 User’s Guide...
Page 514
[NOTE: The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.] NSA320 User’s Guide...
Page 515
License. On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL file. many parts of this package are covered by the BSD license. These include central error processing code (sg_lib.[hc]), NSA320 User’s Guide...
Page 516
Winamp 2 plugin which is LGPL (see COPYING.LGPL). The documentation is released under the FDL (see COPYING.FDL). This Product includes boost software under below license BOOST SOFTWARE LICENSE o License text o Introduction o History o Rationale o FAQ NSA320 User’s Guide...
Page 517
The result is the Boost Software License: Boost Software License - Version 1.0 - August 17th, 2003 Permission is hereby granted, free of charge, to any person or organization NSA320 User’s Guide...
Page 518
[Standardizing the license will not] necessarily address the issue of satisfying corporate licensees. Each corporation will have its own concerns, based on their own experiences with software licensing and distribution and, if they're careful, NSA320 User’s Guide...
Page 519
(including intellectual property infringement liability), and requires that all subsequent copies of the code [except machine-executable object code], including partial copies and derivative works, include the license. NSA320 User’s Guide...
Page 520
To distinguish cases where we do not require reproduction of the copyrights and license, such as object libraries, shared libraries, and final program executables, from cases where reproduction is still required, such as distribution of self-extracting archives of source code or precompiled header files. More NSA320 User’s Guide...
Page 521
Can I use the Boost license for my own projects outside Boost? Sure; there are no restrictions on the use of the license itself. Is the Boost license "Open Source"? Yes. The Open Source Initiative certified the Boost Software License 1.0 in early 2008. NSA320 User’s Guide...
Page 522
Distributed under the Boost Software License, Version 1.0. This Product includes curl software under below license COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2009, Daniel Stenberg, <daniel@haxx.se>. All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose NSA320 User’s Guide...
Page 523
6.2 I have a closed-source program, can I use the libcurl library? Yes! libcurl does not put any restrictions on the program that uses the library. 6.3 I have a BSD licensed program, can I use the libcurl library? NSA320 User’s Guide...
Page 524
"all copies" and that you may not use the copyright holder's name when promoting your software. You do not have to release any of your source code. You do not have to reveal or make public any changes to the libcurl source NSA320 User’s Guide...
Page 525
Bell Communications Research, Inc (Bellcore). Regular expression support is provided by the PCRE library package, which is open source software, written by Philip Hazel, and copyright by the University of Cambridge, England. The original software is available from ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/ Apache License NSA320 User’s Guide...
Page 526
"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, NSA320 User’s Guide...
Page 527
Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." NSA320 User’s Guide...
Page 528
You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the NSA320 User’s Guide...
Page 529
The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside NSA320 User’s Guide...
Page 530
Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions NSA320 User’s Guide...
Page 531
Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. NSA320 User’s Guide...
Page 532
The Apache HTTP Server includes a number of subcomponents with separate copyright notices and license terms. Your use of the source code for the these subcomponents is subject to the terms and conditions of the following licenses. NSA320 User’s Guide...
Page 533
* computer system, and to alter it and redistribute it freely, subject to * the following restrictions: * 1. The author is not responsible for the consequences of use of this * software, no matter how awful, even if they arise from flaws in it. NSA320 User’s Guide...
Page 534
"macmartinized" polygon code copyright 1992 by Eric Haines, erich@eye.com For the server\util_md5.c component: ***************************************************************** ******* * NCSA HTTPd Server * Software Development Group * National Center for Supercomputing Applications * University of Illinois at Urbana-Champaign * 605 E. Springfield, Champaign, IL 61820 NSA320 User’s Guide...
Page 535
* All Rights Reserved. * Permission to use, copy, modify, distribute, and sell this software * and its documentation for any purpose is hereby granted without * fee, provided that the above copyright notice appear in all copies NSA320 User’s Guide...
Page 536
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS * SOFTWARE. * Copyright (c) 1991 Bell Communications Research, Inc. (Bellcore) NSA320 User’s Guide...
Page 537
* licence for the modifications made to that material. /* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest NSA320 User’s Guide...
Page 538
* The RSA copyright statement and Licence for that original material is * included below. This is followed by the Apache copyright statement and * licence for the modifications made to that material. /* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm NSA320 User’s Guide...
Page 539
* The apr_md5_encode() routine uses much code obtained from the FreeBSD 3.0 * MD5 crypt() function, which is licenced as follows: * ---------------------------------------------------------------------------- * "THE BEER-WARE LICENSE" (Revision 42): * <phk@login.dknet.dk> wrote this file. As long as you retain this notice you NSA320 User’s Guide...
Page 540
* Security, Inc. MD4 Message-Digest Algorithm" in all material * mentioning or referencing the derived work. * RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this NSA320 User’s Guide...
Page 541
* License is also granted to make and use derivative works provided * that such works are identified as "derived from the RSA Data * Security, Inc. MD4 Message-Digest Algorithm" in all material * mentioning or referencing the derived work. NSA320 User’s Guide...
Page 542
* RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this * software for any particular purpose. It is provided "as is" * without express or implied warranty of any kind. NSA320 User’s Guide...
Page 543
# publicity pertaining to distribution of the software without specific, # written prior permission. M.I.T. makes no representations about the # suitability of this software for any purpose. It is provided "as is" # without express or implied warranty. For the srclib\pcre\install-sh component: NSA320 User’s Guide...
Page 544
Perl 5 language. Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" directory, is distributed under the same terms as the software itself. NSA320 User’s Guide...
Page 545
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, NSA320 User’s Guide...
Page 546
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF POSSIBILITY OF SUCH DAMAGE. End PCRE LICENCE For the test\zb.c component: ZeusBench V1.01 =============== This program is Copyright (C) Zeus Technology Limited 1996. This program may be used and copied freely providing this copyright notice NSA320 User’s Guide...
Page 547
Written by Adam Twiss (adam@zeus.co.uk). March 1996 Thanks to the following people for their input: Mike Belshe (mbelshe@netscape.com) Michael Campanella (campanella@stevms.enet.dec.com) For the expat xml parser component: Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd and Clark Cooper NSA320 User’s Guide...
Page 548
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ================================================== ================== This Product includes libtecla software under below license NSA320 User’s Guide...
Page 549
HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION NSA320 User’s Guide...
Page 550
* Neither the name of Rasterbar Software nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. NSA320 User’s Guide...
Page 551
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. NSA320 User’s Guide...
Page 552
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This Product includes libxml2 software under below license Except where otherwise noted in the source code (e.g. the files hash.c, list.c and the trio files, which are covered by a similar licence but NSA320 User’s Guide...
Page 553
University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Delaware makes no representations about the suitability this software for any purpose. It is provided "as is" without express or implied warranty. NSA320 User’s Guide...
Page 554
15.Torsten Duwe <duwe@immd4.informatik.uni-erlangen.de> Linux port 16.Dennis Ferguson <dennis@mrbill.canet.ca> foundation code for NTP Version 2 as specified in RFC-1119 17.John Hay <jhay@icomtek.csir.co.za> IPv6 support and testing 18.Dave Hart <davehart@davehart.com> General maintenance, Windows port interpolation rewrite. 19.Claas Hilbrecht <neoclock4x@linum.com> NeoClock4X clock driver NSA320 User’s Guide...
Page 555
Heath, ATOM, ACTS, KSI/Odetics; audio clock drivers: CHU, WWV/H, IRIG 35.Wolfgang Moeller <moeller@gwdgv1.dnet.gwdg.de> VMS port 36.Jeffrey Mogul <mogul@pa.dec.com> ntptrace utility 37.Tom Moore <tmoore@fievel.daytonoh.ncr.com> i386 svr4 port 38.Kamal A Mostafa <kamal@whence.com> SCO OpenServer port 39.Derek Mulcahy <derek@toybox.demon.co.uk> and Damon Hart-Davis <d@hd.org> ARCRON MSF clock driver NSA320 User’s Guide...
Page 556
Redistribution and use in source and binary forms of Linux-PAM, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain any existing copyright notice, and this entire permission notice in its entirety, including the disclaimer of warranties. NSA320 User’s Guide...
Page 557
* Frank Denis <j@pureftpd.org> with the help of all Pure-FTPd contributors. * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. NSA320 User’s Guide...
Page 558
The previous paragraph applies to the deliverable code in SQLite - those parts of the SQLite library that you actually bundle and ship with a larger application. Portions of the documentation and some code used as part of the build process NSA320 User’s Guide...
Page 559
We are not able to accept patches or changes to SQLite that are not accompanied by a statement such as the above. In addition, if you make changes or enhancements as an employee, then a simple statement such as the above is NSA320 User’s Guide...
Page 560
SQLite. The header comments on the SQLite source files exhort the reader to share freely and to never take more than one gives. In the spirit of that exhortation I make the following declarations: NSA320 User’s Guide...
Page 561
Signature: Date: Name (printed): This Product includes tz32 software under below license === asctime.c========== ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur David Olson. NSA320 User’s Guide...
Page 562
* IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANT[A]BILITY AND FITNESS FOR A PARTICULAR PURPOSE. === difftime.c ========== ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur David Olson. ============= ====== localtime.c ===== NSA320 User’s Guide...
Page 563
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANT[A]BILITY AND FITNESS FOR A PARTICULAR PURPOSE. =================== ====== private.h ===== ** This file is in the public domain, so clarified as of NSA320 User’s Guide...
Page 564
Compilation Copyright (c) 1995-2009 by Wei Dai. All rights reserved. This copyright applies only to this software distribution package as a compilation, and does not imply a copyright on any particular file in the package. The following files are copyrighted by their respective original authors, NSA320 User’s Guide...
Page 565
1. Any copy or modification of this compilation in any form, except in object code form as part of an application software, must include the above copyright notice and this license. 2. Users of this software agree that any modification or extension NSA320 User’s Guide...
Page 566
If this compilation is used in object code form in an application software, acknowledgement of the author is not required but would be appreciated. The contribution of any useful modifications or extensions to Wei Dai is not required but would also be appreciated. NSA320 User’s Guide...
Page 567
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public Licence as published by the Free Software Foundation; either version 2 of the Licence, or (at NSA320 User’s Guide...
Page 568
To avoid misleading anyone as to the status of such modified files, you must delete this exception notice from such code and/or adjust the licensing conditions notice NSA320 User’s Guide...
Page 569
- SoftSqueeze is (c) Richard Titmuss and is licensed under GPL. - The CODE2000 TrueType Font is (c) James Kass and is Shareware. See Graphics/CODE2000.HTM for more information. - Certain integral components of Slim Server, such as CPAN modules, NSA320 User’s Guide...
Page 570
- Squeezebox2 firmware additionally contains the following code: - Kiss FFT, Copyright (c) 2003-2004, Mark Borgerding, licensed under a modified BSD license (reproduced below). - 16:16 fixed math routines, Copyright (c) 2001 Beartronics, licensed under the "Artistic License" (http://www.opensource.org/licenses/artistic-license.html). Copies of NSA320 User’s Guide...
Page 571
Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. NSA320 User’s Guide...
Page 572
Finally, any free program is threatened constantly by software NSA320 User’s Guide...
Page 573
Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's NSA320 User’s Guide...
Page 574
(or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this NSA320 User’s Guide...
Page 575
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable NSA320 User’s Guide...
Page 576
(in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. NSA320 User’s Guide...
Page 577
Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the NSA320 User’s Guide...
Page 578
It is not the purpose of this section to induce you to infringe any NSA320 User’s Guide...
Page 579
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. NSA320 User’s Guide...
Page 580
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. NSA320 User’s Guide...
Page 581
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. NSA320 User’s Guide...
Page 582
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in NSA320 User’s Guide...
Page 583
License. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes PHP software, freely available from <http://www.php.net/software/>". THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND NSA320 User’s Guide...
Page 584
HTML-Parser, JSON-XS, Module-Build, Sub-Name, Template-Toolkit and XML- Parser software under the same terms as Perl ‘s license Perl5 is Copyright (C) 1993-2005, by Larry Wall and others. It is free software; you can redistribute it and/or modify it under the terms of either: NSA320 User’s Guide...
Page 585
P41-RR02188 by the National Institutes of Health. Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner. Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg NSA320 User’s Guide...
Page 586
If you have questions, ask. "Derived works" includes all programs that utilize the library. Credit must be given in user-accessible documentation. This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but not NSA320 User’s Guide...
Page 587
Although their code does not appear in gd, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions. NSA320 User’s Guide...
Page 588
Appendix E Open Source Licences NSA320 User’s Guide...
ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
Page 590
God, or subjected to abnormal working conditions. Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, NSA320 User’s Guide...
Page 591
Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com North American products. NSA320 User’s Guide...
Page 592
Appendix F Legal Information NSA320 User’s Guide...
Page 594
YouTube 292, 293 notifications CoolIris activation COPY/SYNC button preferences 26, 216 configuration status example URL, download service 195, 243 synchronization downloading files copying contents duplexing temperature usage creating NSA320 User’s Guide...
Page 595
IP filtering 201, 202 over TLS iTunes server 186, 217, 218 passive mode transfer FTP Uploadr activation bandwidth limit configuration JBOD grace period 164, 168, 169, 170 server entry jumbo frames 174, 177 FTPES NSA320 User’s Guide...
Page 596
186, 190 resume configuration schedule iTunes server 186, 218 membership PPPoE 174, 183 groups 304, 309 activation mirroring preferences, download service moving contents print server configuration name protect backup backup tutorial naming server protection, download service 221, 222 NSA320 User’s Guide...
Page 597
159, 164, 168 setup degraded BitTorrent RAID 0 169, 171 COPY/SYNC button RAID 1 169, 171, 172 download service recovering Flickr resynchronization FTP Uploadr status 161, 164 media server USB devices 166, 167 print server volumes 159, 168 NSA320 User’s Guide...
Page 598
159, 164, 168 file access degraded files not in proper folders RAID 0 169, 171 folder access RAID 1 169, 171, 172 forgot password recovering 357, 358 LED indicators resynchronization status 161, 164 local user share access storage methods NSA320 User’s Guide...
Page 599
51, 64 status web publishing 187, 204, 225 activation example port number troubleshooting web security wizard workgroup name YouTube access rights activation authorization configuration 292, 293 grace period video category zPilot NSA320 User’s Guide...