ZyXEL Communications NSA320 User Manual

ZyXEL Communications NSA320 User Manual

2-bay digital media server
Hide thumbs Also See for NSA320:
Table of Contents

Advertisement

NSA320
2-Bay Digital Media Server
Default Login Details
Web Address
User Name
Password
Firmware Version 4.01
Edition 1, 06/2010
www.zyxel.com
www.zyxel.com
nsa320
admin
1234
Copyright © 2010
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NSA320

  • Page 1 NSA320 2-Bay Digital Media Server Default Login Details Web Address nsa320 User Name admin Password 1234 Firmware Version 4.01 Edition 1, 06/2010 www.zyxel.com www.zyxel.com Copyright © 2010 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    • Web Configurator Online Help The embedded Web Help contains descriptions of individual screens and supplementary information. Note: It is recommended you use the web configurator to configure the NSA. • Support Disc Refer to the included CD for support documents. NSA320 User’s Guide...
  • Page 4 About This User's Guide Documentation Feedback Send your comments, questions or suggestions to: techwriters@zyxel.com.tw Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan. Need More Help? More help is available at www.zyxel.com.
  • Page 5 • Product model and serial number. • Warranty Information. • Date that you received your device. Brief description of the problem and the steps you took to solve it. NSA320 User’s Guide...
  • Page 6: Document Conventions

    For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on. • “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”. NSA320 User’s Guide...
  • Page 7 Every effort has been made to ensure that the information in this manual is accurate. Computer Notebook computer Server Television Firewall Router Switch Wireless Access Point Internet NSA320 User’s Guide...
  • Page 8: Safety Warnings

    Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately. NSA320 User’s Guide...
  • Page 9: Table Of Contents

    Network ..........................173 Applications ..........................185 Package Management ......................231 Auto Upload ..........................285 Users ............................301 Groups ............................. 307 Shares ............................311 Maintenance Screens ......................323 Protecting Your Data ........................ 347 Troubleshooting ........................353 Product Specifications ......................373 NSA320 User’s Guide...
  • Page 10 Contents Overview NSA320 User’s Guide...
  • Page 11: Table Of Contents

    2.6 Import Files or Folders with zPilot ..................43 2.7 Add a Network Drive to My Computer ................. 44 2.8 Manage the Device ......................45 2.9 Configure Network Setting ....................45 Chapter 3 Web Configurator Basics ....................... 49 3.1 Overview ..........................49 NSA320 User’s Guide...
  • Page 12 4.8.2 Creating a Share ......................87 4.8.3 Creating a Group ......................88 4.8.4 Accessing a Share From Windows Explorer .............. 89 4.8.5 Accessing a Share Using FTP ................... 91 4.8.6 Accessing a Share Through the Web Configurator ............ 93 NSA320 User’s Guide...
  • Page 13 6.4 The Server Name Screen ....................154 6.5 The Date/Time Screen ....................... 155 Chapter 7 Storage........................... 159 7.1 Overview ..........................159 7.1.1 What You Need to Know About Storage ..............159 7.2 The Storage Screen ......................160 NSA320 User’s Guide...
  • Page 14 9.6.5 Displaying the Task Information ................203 9.7 The Web Publishing Screen ....................204 9.8 The Broadcatching Screen ....................206 9.8.1 Adding a Broadcatching Channel ................208 9.8.2 Editing a Broadcatching Channel ................212 9.9 The Print Server Screen ....................214 NSA320 User’s Guide...
  • Page 15 10.7.1 Add/Edit NFS Share ....................255 10.7.2 NFS Session ......................256 10.8 SMART Screen ......................257 10.8.1 SMART Brief Summary ..................258 10.8.2 SMART Full Summary ..................259 10.9 Protect Screens ......................261 10.10 Backup Screens ......................261 NSA320 User’s Guide...
  • Page 16 12.2 What You Can Do ......................301 12.3 The Users Screen ......................302 12.3.1 User Icons ......................303 12.3.2 Adding or Editing an Account ................304 12.3.3 Usernames ......................305 12.4 Displaying User Info ......................306 Chapter 13 Groups ........................... 307 NSA320 User’s Guide...
  • Page 17 15.6.1 Modifying or Creating a Certificate ................ 335 15.7 The Firmware Upgrade Screen ..................336 15.8 The Shutdown Screen ....................337 15.9 Technical Reference ......................338 15.9.1 Log Classes ......................338 15.9.2 Log Severity Levels ....................338 15.9.3 Log Messages ......................339 NSA320 User’s Guide...
  • Page 18 18.5 Supported iTunes Server Content Formats ..............381 18.6 Power Consumption ......................381 Appendix A Setting Up Your Computer’s IP Address ............383 Appendix B Pop-up Windows, JavaScripts and Java Permissions ........397 Appendix C Common Services .................... 407 NSA320 User’s Guide...
  • Page 19 Table of Contents Appendix D Importing Certificates..................411 Appendix E Open Source Licences..................443 Appendix F Legal Information ....................589 Index............................593 NSA320 User’s Guide...
  • Page 20 Table of Contents NSA320 User’s Guide...
  • Page 21: User's Guide

    User’s Guide...
  • Page 23: Getting To Know Your Nsa

    • Use the NSA’s website to share files with remote users. • Use iTunes on your computer to play video and music files stored on the NSA. • Share printers. • Automatically upload photo and video files to your FTP server, Flickr and YouTube accounts. NSA320 User’s Guide...
  • Page 24: Hard Disks

    Advanced Technology Attachment) hard disks. Note that both SATA hard disks are treated as internal or SATA volumes in the Storage > Volume screen (Section 7.4 on page 165). Any hard disk connected to the USB port(s) is considered an external or USB volume. NSA320 User’s Guide...
  • Page 25: Leds

    The NSA has fully started and is operating normally. Blinking The NSA is starting up. Amber Blinking The NSA is upgrading the firmware. Note: Do not turn off the NSA while it is upgrading the firmware or you may render it unusable. NSA320 User’s Guide...
  • Page 26: Copy/Sync Button

    1.3.1 COPY/SYNC Button Use the COPY/SYNC button on the front panel to copy or synchronize files between a connected USB device and the NSA. See Section 9.10 on page 216 more details on how to configure the copy/sync settings. NSA320 User’s Guide...
  • Page 27: Reset Button

    Auto-IP to assign itself an IP address and subnet mask. For example, you could connect the NSA directly to your computer. If the computer is also set to get an IP address automatically, the computer and the NSA will choose addresses for themselves and be able to communicate. NSA320 User’s Guide...
  • Page 28 Chapter 1 Getting to Know Your NSA NSA320 User’s Guide...
  • Page 29: Nas Starter Utility

    Utility screens. 2.3 NAS Discovery Screen Use this screen to view the NSAs in your network. The NSA’s Server Name (default is ‘nsa320’). See Section 2.9 on page 45 for how to change it to a more recognizable one in your network.
  • Page 30 IP shows the NSA’s current IP address. Model ID shows the NSA’s model name. Firmware Version shows the version of firmware the NSA is currently using. Status shows whether the NSA is Online, Unreachable, Configuring, or Config Failed. NSA320 User’s Guide...
  • Page 31: Main Nas Starter Utility Screen

    Click this to add the NSA as a network drive in your computer’s drive to My Windows Explorer. Computer Manage the Click this to log into the advanced administration screens. See Section device 3.5 on page 66 for details on the administration screens. NSA320 User’s Guide...
  • Page 32: Initialization Wizard

    Click Run the Initialization Wizard in the main utility screen to display the following screen. You must log in using an admin account. The default administrator username is ‘admin’ and the default password is ‘1234’ and click Next. Figure 6 Initialization Wizard Welcome NSA320 User’s Guide...
  • Page 33: Default Configuration

    NSA to configure specific network settings. Click Next. Figure 7 Initialization Wizard: Wizard Type 2.5.1 Default Configuration The NAS Starter Utility checks the Internet connection. Figure 8 Check Network Connection NSA320 User’s Guide...
  • Page 34 Next. Figure 9 Change Admin Password Specify usernames and passwords for the individuals you want to be able to access the NSA. Figure 10 Create User Accounts NSA320 User’s Guide...
  • Page 35 Wait while the NAS Starter Utility configures the NSA. Figure 12 Setting the NAS After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA’s shares (see Section 2.5.3 on page 42) or NSA320 User’s Guide...
  • Page 36: Manual Configuration

    Finish to return to the main NAS Starter Utility screen (see Section 2.4 on page 31). Figure 13 Setting the NAS 2.5.2 Manual Configuration Set up the NSA’s basic network configuration first. Figure 14 Setup Network NSA320 User’s Guide...
  • Page 37 If your Internet connection requires you to enter a user name and password to connect to the Internet, enter them here and click Next. If you do not need to enter a user name and password to connect to the Internet, click Skip. Figure 15 PPPoE NSA320 User’s Guide...
  • Page 38 Type a new administrator password (and retype it to confirm) and click Next. If you do not want to change the administrator password, you can leave the fields blank and just click Next. Figure 17 Change Admin Password NSA320 User’s Guide...
  • Page 39 • JBOD: Use this if you want maximum storage capacity and/or you have other means of protecting your data. This combines the two physical disks into a single virtual one, so they appear as a single large disk. NSA320 User’s Guide...
  • Page 40 Select the ones you want to use as network drives in Windows Explorer. Figure 20 Connect Network Drives Specify usernames and passwords for the individuals you want to be able to access the NSA and click Next. Figure 21 Create User Accounts NSA320 User’s Guide...
  • Page 41 10 Wait while the NAS Starter Utility configures the NSA. Figure 23 Setting the NAS After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA’s shares (see Section 2.5.3 on page 42) or NSA320 User’s Guide...
  • Page 42: Directory Of The Nas

    31). Figure 24 Setting the NAS 2.5.3 Directory of the NAS Enter the administrator user name and password and click Login. Figure 25 Login The utility opens the NSA’s directory in Windows Explorer. Figure 26 Directory NSA320 User’s Guide...
  • Page 43: Import Files Or Folders With Zpilot

    Other types of files go to the Public folder. For folders of files you are prompted to choose the target destination. The zPilot icon shows the transfer rate. Figure 29 zPilot Showing Transfer Rate NSA320 User’s Guide...
  • Page 44: Add A Network Drive To My Computer

    For example, if share1 is private to user1, then only user1 is allowed to map share1. The table displays the NSA shares that are already mapped to drive letters on your computer. After you click OK you can see the new drive in NSA320 User’s Guide...
  • Page 45: Manage The Device

    Section 3.5 on page 66 for more on the administration screens. 2.9 Configure Network Setting Use these screens to change the NSA network settings such as the NSA’s name, IP address, subnet mask, default gateway, DNS, or PPPoE. NSA320 User’s Guide...
  • Page 46 If you were given specific IP address(es) of the DNS server(s), select server manually this and enter the primary and secondary DNS in the corresponding fields. PPPoE Click this if your Internet connection requires you to enter a user name and password to connect to the Internet. NSA320 User’s Guide...
  • Page 47 Chapter 2 NAS Starter Utility If your Internet connection requires you to enter a user name and password to connect to the Internet, select Enable PPPoE Connection and enter your user name and password. Figure 35 PPPoE NSA320 User’s Guide...
  • Page 48 Chapter 2 NAS Starter Utility NSA320 User’s Guide...
  • Page 49: Web Configurator Basics

    3.2.1 Access the NSA Via NAS Starter Utility If you don’t know the IP address of the NSA, then use the NAS Starter Utility’s Play Media Files from Home Screen link to find it. Refer to the Quick Start NSA320 User’s Guide...
  • Page 50: Web Browser Access

    Configure the server name of your NSA using the Network Configuration screen (Section 2.9 on page 45) of the NAS Starter Utility. Open your browser and type in the server name of the NSA (“nsa320” by default). Figure 37 NSA URL 3.3 Login The default username and password are ‘admin’...
  • Page 51 If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore. Figure 39 Change Password Screen NSA320 User’s Guide...
  • Page 52: Home Screens

    Table 6 Main Home Screen Icons ICON DESCRIPTION Use Music, Photo, and Video to play and organize your music, picture, and video files. Use Favorite to create and edit playlists. Use File Browser to see your files in a tree-folder structure. NSA320 User’s Guide...
  • Page 53 Home Click this to return to the Home screen. Help Click this to open a web help page specific to the screen you are currently configuring. Logout Click this at any time to exit the web configurator. NSA320 User’s Guide...
  • Page 54 Click a letter to go to the first item starting with that letter. View files. Double-click an item to play it. Shows which page is displaying and the total number of pages of entries. Click an arrow or type a number to go to another page of entries. NSA320 User’s Guide...
  • Page 55: Now Playing (Music)

    A Now Playing link displays when a song is playing. Click it to display a panel like the following. This screen displays the name of the current song and it’s play progress and lets you control the playback. Figure 42 Now Playing NSA320 User’s Guide...
  • Page 56: Exif And Google Maps (Photos)

    If a photo’s Exif data includes GPS location data, click the latitude or longitude link to display the location in Google Maps. Click Clear to delete the markers of other photos and only display the current photo’s marker. Figure 44 Google Maps NSA320 User’s Guide...
  • Page 57: Slideshow And Cooliris (Photos)

    Use Favorite > Shared Playlist to view and play playlists that you created externally (in iTunes, Windows Media Player, VLC media player, or Winamp for example) and saved to the NSA. When using zPilot to move files to the NSA, playlists are automatically put into the music share. NSA320 User’s Guide...
  • Page 58: File Browser

    (gives someone access to a folder). It is equivalent to the Windows concept of a shared folder, but the access rights are independent of the folder (you configure the share and the folder separately). You NSA320 User’s Guide...
  • Page 59 This column identifies the names of folders and files in the share. Click a file’s file name to open the file or save it to your computer. Click a folder’s name to display the folder’s contents. Size This column displays a file’s size in bytes. NSA320 User’s Guide...
  • Page 60 Select a file and click this to save the file to your computer. Note: Do not refresh the screen while a download is going Restore When you are in a recycle bin folder, select a folder or file and click this to restore it. NSA320 User’s Guide...
  • Page 61 Select this option to make the share’s files available to media clients. share to Media Server Publish this Select this option to let people use a web browser to access this share’s share to Web files without logging into the Home screens. NSA320 User’s Guide...
  • Page 62: Share And Folder Names

    • Folder names must be unique (they cannot be the same as other folder names). • The minimum character length of a name is one character, that is a name cannot be blank. • The maximum character length of share name is 239 characters. NSA320 User’s Guide...
  • Page 63: Application Zone

    Some applications are always enabled and cannot be disabled. Disable Select an enabled application and click this to turn off the application. Select the Flickr or Youtube Uploadr entry and click this to cancel all uploading. Some applications are always enabled and cannot be disabled. NSA320 User’s Guide...
  • Page 64: System Settings

    Select the Flickr or Youtube Uploadr entry and click this to resume current uploading. 3.4.8 System Settings Click System > Settings to open the following screen. Use this screen to change general settings and an account password. Figure 50 System > Settings NSA320 User’s Guide...
  • Page 65 Section 3.5 on page 66 for more on the advanced administration screens. Apply Click this to save your changes. Reset Click this to refresh the screen. Cancel Click this to exit the screen without saving your changes. NSA320 User’s Guide...
  • Page 66: Administration Screens

    Click this to view the model name, firmware version and copyright. Home Click this to return to the Home screens. Logout Click this at any time to exit the web configurator. This is the same as clicking the Logout link at the bottom of the navigation panel. NSA320 User’s Guide...
  • Page 67: Navigation Panel

    Assign the NSA a dynamic or static IP address and DNS information. UPnP Port Configure your Internet gateway to allow access from the WAN Mapping (Internet) to services on the NSA. PPPoE Configure PPPoE settings for a direct Internet connection. NSA320 User’s Guide...
  • Page 68 Configure HTTPS and the NSA’s SSL certificate. FW Upgrade Upload/upgrade new firmware to your NSA. Shutdown Restart the NSA or shut it down. Logout Click this to exit the web configurator. This is recommended to prevent unauthorized administrator access to the NSA. NSA320 User’s Guide...
  • Page 69: Main Window

    NSA automatically restores the volume. If the replacement disk already contains a volume, you need to delete the volume and then click the Repair icon to fix the degraded RAID volume. NSA320 User’s Guide...
  • Page 70: Session Example (Windows)

    IP address. Initially you can only read and write to the Public, Video, Music, and Photo folders until you create other shares on the NSA. This session is then displayed as shown in the following figure. Session Example (Windows) NSA320 User’s Guide...
  • Page 71: Tutorials

    121 • Using FTPES to Connect to the NSA, see page 133 • How to Use the BackupPlanner, see page 134 4.2 Windows 7 Network To see your NSA in a Windows 7 home or work network: NSA320 User’s Guide...
  • Page 72 Chapter 4 Tutorials Click Start > Control Panel. Set View by to Category and click Network and Internet. Click View network computers and devices. NSA320 User’s Guide...
  • Page 73: If The Nsa Icon Does Not Display

    The network containing the NSA must be set as a home or work network in order for the NSA icons to display. If the network containing the NSA displays as “Public”: Click Network and Sharing Center and then the network’s link (circled in the figure). NSA320 User’s Guide...
  • Page 74: Nsa Icon Right-Click Options

    78. Click Uninstall to remove the NSA from the list of devices installed in your computer. • View device web page opens the Web Configurator login screen. • Create shortcut adds a desktop shortcut to the Web Configurator login screen. NSA320 User’s Guide...
  • Page 75: Windows 7 Network Map

    • IP address is the NSA’s IP address. It is also the IP address for accessing the Web Configurator. 4.3 Windows 7 Network Map To see your NSA in a Windows 7 home or work network map: NSA320 User’s Guide...
  • Page 76 If the network containing the NSA displays as “Public”, click the network’s link (2 in the figure, although it is already set to home here) and use the Set Network Location screen to set the network’s location to home or work (see page 74). NSA320 User’s Guide...
  • Page 77 Chapter 4 Tutorials Double-click the NSA’s icon to open the Web Configurator login screen. See Section 4.2.2 on page 74 for the NSA icon’s right-click options. NSA320 User’s Guide...
  • Page 78: Playing Media Files In Windows 7

    After you use the NSA’s network icon’s install option you can manage the NSA from the Windows 7 Devices and Printers folder. Click Start > Control Panel > Hardware and Sound > Devices and Printers. Select the NSA icon to display information about the NSA. Double-click the NSA NSA320 User’s Guide...
  • Page 79 • Create shortcut has Windows make a desktop shortcut to this screen. • Troubleshoot opens Windows’ device troubleshooting wizard. • Remove device removes the NSA from the Windows 7 Devices and Printers folder. • Properties opens a window of NSA details and troubleshooting information (see page 75). NSA320 User’s Guide...
  • Page 80: Windows 7 Desktop Shortcut

    • Restore previous versions is the Windows 7 option for restoring a file or folder. It does not apply to this shortcut. • Send to give you options for copying the shortcut to another location. NSA320 User’s Guide...
  • Page 81: Creating A Volume

    Your NSA has two bays for Serial Advanced Technology Attachment (SATA) hard disks. The JBOD storage method is used if you are using a single hard disk for your NSA. This JBOD volume shows up in the Storage > Volume screen (Section 7.4 on page 165) as follows. NSA320 User’s Guide...
  • Page 82: Creating A Raid 1 Volume

    4.6.3 Create an Internal Volume Button If you do not have an existing volume in the Storage > Volume screen, do the following steps to create a RAID 1 volume. NSA320 User’s Guide...
  • Page 83 This deletes all existing data in the SATA hard disk. Make sure you have a backup of any existing data in the hard disk. The NSA starts creating the volume and you can see the following progress bar. Wait for the RAID 1 volume to be created. NSA320 User’s Guide...
  • Page 84: Deleting A Volume

    Delete an existing volume in your NSA by doing the following steps. In the Storage > Volume screen, select the volume you want to delete and click the delete icon. A confirmation window appears as follows. Click Yes. NSA320 User’s Guide...
  • Page 85: File Sharing Tutorials

    Bob wants to create accounts for his sons Jimmy and Kevin. This is how he would do it. Log into the NSA web configurator (see Section 3.3 on page 50) and click System > Administration to go to the configuration screens. NSA320 User’s Guide...
  • Page 86 Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn’t get to configure the whole NSA. Click Apply to create the account. The account now displays in the Users screen. NSA320 User’s Guide...
  • Page 87: Creating A Share

    In the NSA’s administration web configurator screens, click Shares > Add Share. Click Add Share to create a new share. Specify a name for the share and select which volume it should be on. Configure the screen as follows. Then click Edit. NSA320 User’s Guide...
  • Page 88: Creating A Group

    This is how he would create the group. In the NSA’s administration web configurator screen, click Groups > Add Group. NSA320 User’s Guide...
  • Page 89: Accessing A Share From Windows Explorer

    Windows Explorer to transfer files to and from the NSA as if it was another folder on your computer. Here he maps Jimmy’s share to Jimmy’s computer. Start Windows Explorer and go to the NSA’s server name (“nsa320” is the default) or IP address.
  • Page 90 This example uses I. Then browse to and select the share on the NSA. Click Finish. Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login. NSA320 User’s Guide...
  • Page 91: Accessing A Share Using Ftp

    This is how he would do it. Open the FTP client (Windows Explorer is used here) and type “ftp:// username@server” where “username” is the account’s username and “server” is the NSA’s IP address or server name. NSA320 User’s Guide...
  • Page 92 Chapter 4 Tutorials Enter your password and click Login. Now you can access files and copy files from/to your local computer’s drives to or from this network folder. NSA320 User’s Guide...
  • Page 93: Accessing A Share Through The Web Configurator

    Click a folder’s file name to browse the folder. You can open files or copy them to your computer. You can also create new folders and upload additional files to the share. Click the logout icon when your are done. NSA320 User’s Guide...
  • Page 94: Download Service Tutorial

    Note: It is also OK for the link to open a .torrent file. If you are redirected to a screen that says the download should start in a few seconds, there may be a link to click if the download does not start automatically. See if that link opens the file or the pop-up window. NSA320 User’s Guide...
  • Page 95 Right-click the download link and select Copy Shortcut in Internet Explorer (or Copy Link Location in Firefox). Log into the NSA web configurator (see Section 3.3 on page 50) using the administrator account and click Application Zone and the Application Zone > Download Service link. Click Add. NSA320 User’s Guide...
  • Page 96 The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share’s download folder. See Section 4.8.4 on page Section 4.8.5 on page 91, or Section 4.8.6 on page 93 for how to access a share. NSA320 User’s Guide...
  • Page 97: Installing The Link Capture Browser Plugin

    Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7. Internet Explorer Open the folder containing the link capture browser plugin. Double-click on the plugin to display the following screen. Click I Agree to begin installation. NSA320 User’s Guide...
  • Page 98 Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting. NSA320 User’s Guide...
  • Page 99 Chapter 4 Tutorials Enter the NSA’s web address (nsa320 by default) and click Apply. A warning message displays asking for confirmation. Click OK to apply the setting. Firefox Open Firefox. Open the folder containing the link capture browser plugin. To install the plugin, drag and drop the plugin to Firefox.
  • Page 100 Chapter 4 Tutorials The following screen displays. Click Install Now. You need to restart Firefox after the installation. NSA320 User’s Guide...
  • Page 101 When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’s web address. Enter the NSA’s web address (nsa320 by default) and click OK. NSA320 User’s Guide...
  • Page 102: Using The Link Capture Browser Plugin

    Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s P-660W-T1 (an ADSL router). Right-click on the download link and select Send to NSA. NSA320 User’s Guide...
  • Page 103 A confirmation message displays. Log into the NSA web configurator (see Section 3.3 on page 50) using the administrator account and click Application Zone and the Application Zone > Download Service link. NSA320 User’s Guide...
  • Page 104: Configuring The Download Service Preferences

    23:30 to 09:00. Click Apply to save your changes. The NSA only downloads files within this 9.5-hour period every day. Note: If you configure the Power On/Off Schedule feature in the Power Management screen, make sure your active download period does not conflict with the power-off period. NSA320 User’s Guide...
  • Page 105 Enter 3 in the Maximum Number of Active Torrents field and enter 1 in the Maximum Number of Seeding Jobs field. • Keep sharing until the NSA has shared equal or greater amount of the downloaded files. Select the check box and enter 100 in the Upload/Download Ratio field. NSA320 User’s Guide...
  • Page 106: Using Download Service Notification

    Internet Explorer 7 or higher, or Firefox. You have to activate this feature in the Download Service screen. Click Applications > Download Service to open the following screen. Select Enable Download Notify and click Apply. NSA320 User’s Guide...
  • Page 107 Chapter 4 Tutorials Internet Explorer 7 Example After you activate download service notification, click the RSS feed icon. The following screen displays. Select Subscribe to this feed. The following screen displays. Click Subscribe. NSA320 User’s Guide...
  • Page 108 Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Firefox Example After you activate download service notification, click the RSS feed icon. The following screen displays. Select Live Bookmarks from the drop-down list and click Subscribe Now. NSA320 User’s Guide...
  • Page 109 Chapter 4 Tutorials The following screen displays. Select Bookmarks Menu and click Add. From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list. NSA320 User’s Guide...
  • Page 110: Broadcatching Tutorial

    One way to test this is by clicking the link. Clicking an actual RSS feed link opens a screen of XML code (in browsers without an RSS feed aggregator) or a window where you can add the RSS feed (in browsers with an RSS feed aggregator). NSA320 User’s Guide...
  • Page 111 Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer). Log into the NSA web configurator (see Section 3.3 on page 50) using the administrator account and click Administration > Applications > Broadcatching. Click Add Channel. NSA320 User’s Guide...
  • Page 112 Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later. Select a policy for what items to delete. This example keeps the most recent 10 items. 10 Click Apply. NSA320 User’s Guide...
  • Page 113: Printer Server Tutorial

    Use a USB cable to connect the printer’s USB port to one of the NSA’s USB ports. Make sure the printer is also connected to an appropriate power source. Turn on the printer. The NSA detects the printer after a few moments. NSA320 User’s Guide...
  • Page 114 Use the wizard screens to install the printer driver on the computer. You may need to get the file from the printer’s CD or the printer manufacturer’s website (the driver is not installed on the NSA). Note: You must install the printer driver on each computer that will use the printer. NSA320 User’s Guide...
  • Page 115: Copy And Flickr Auto Upload Tutorial

    This is how Amy would transfer the files from her USB disk to the NSA. Click Applications > Copy/Sync Button in the navigation panel to open the screen. Configure the copy settings as shown and click Apply. NSA320 User’s Guide...
  • Page 116: Ftp Uploadr Tutorial

    The NSA also automatically uploads the copied files to Flickr. 4.13 FTP Uploadr Tutorial FTP Uploadr can automatically upload files saved on the NSA to a remote FTP server. Amy wants to share files on her NSA with Susan. They each have an NSA NSA320 User’s Guide...
  • Page 117 The share is used for files uploaded from Amy’s NSA. Amy will then use the following information to configure FTP Uploadr on her NSA. Table 17 FTP Uploadr Tutorial: FTP Server Information FTP Domain Name or IP Address example2.com FTP User Name FTP Password xxxxx Share (Remote Path) NSA320 User’s Guide...
  • Page 118 Click Applications > Auto Upload > FTP Uploadr to open the FTP Uploadr screen. Select Enable FTP Uploadr and click Apply to turn on FTP Uploadr. Click Add Server. Enter the information as describe in Table 17 on page 117. Click Apply to add the server. NSA320 User’s Guide...
  • Page 119 Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List. NSA320 User’s Guide...
  • Page 120 Amy share on Susan’s NSA. Similarly, Susan can go through the steps described above to configure FTP Uploadr on her NSA. Once Susan completes the setup, Amy can also receive files from Susan’s NSA. Susan’s NSA Amy’s NSA NSA320 User’s Guide...
  • Page 121: Web Configurator's Security Sessions

    These tutorials show you how to configure security for the NSA’s Web Configurator sessions. You will customize the NSA’s self-signed SSL certificate and distribute it to your users. 4.14.1 Customizing the NSA’s Certificate Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit. NSA320 User’s Guide...
  • Page 122 Next, let’s modify the certificate by changing the Common Name to this NSA’s host name of “nsa”, the Organization to “ZyXEL” and the Key Length to 2048. The NSA restarts its network services and returns you to the login screen. NSA320 User’s Guide...
  • Page 123: Downloading And Installing Customized Certificate

    Chapter 4 Tutorials 4.14.2 Downloading and Installing Customized Certificate Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. Save the file to your computer. NSA320 User’s Guide...
  • Page 124 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix D on page 411 for other examples. In the Certificate dialog box, click Install Certificate. NSA320 User’s Guide...
  • Page 125 Chapter 4 Tutorials In the Certificate Import Wizard, click Next. Leave Automatically select certificate store based on the type of certificate selected and click Next. NSA320 User’s Guide...
  • Page 126 Chapter 4 Tutorials In the Completing the Certificate Import Wizard screen, click Finish. If you are presented with another Security Warning, click Yes. Finally, click OK when presented with the successful certificate installation message. NSA320 User’s Guide...
  • Page 127: Turn On The Nsa's Web Security

    Appendix D on page 411 for more information on browsers and certificates. Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. NSA320 User’s Guide...
  • Page 128 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. NSA320 User’s Guide...
  • Page 129 Chapter 4 Tutorials Click Add Exception. Click Get Certificate. NSA320 User’s Guide...
  • Page 130 Chapter 4 Tutorials Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View. NSA320 User’s Guide...
  • Page 131 Chapter 4 Tutorials The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close. NSA320 User’s Guide...
  • Page 132 Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s certificate so they can check it before adding a NSA320 User’s Guide...
  • Page 133: Using Ftpes To Connect To The Nsa

    Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA’s address. • Set the Servertype to FTPES - FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect. NSA320 User’s Guide...
  • Page 134: How To Use The Backupplanner

    For example, you might do daily backups of important individual files or folders and a weekly general archive. You can save backups to another location so your files can survive even if the original RAID or NSA fails. NSA320 User’s Guide...
  • Page 135: Creating An Archive Backup

    This example sets the NSA to do another full backup after every four incremental backups. Figure 54 Protect > Backup > Add Job: Step 1 NSA320 User’s Guide...
  • Page 136 Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection. Figure 55 Protect > Backup > Add Job: Step 2 NSA320 User’s Guide...
  • Page 137 Have the NSA keep 3 backups. Figure 56 Protect > Backup > Add Job: Step 3 Set the frequency to Weekly. Schedule the backup for 5:00 every Saturday morning. Protect > Backup > Add Job: Step 4 NSA320 User’s Guide...
  • Page 138: Creating A Synchronization Backup

    You want only your current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder. Figure 58 Protect > Backup > Add Job: Step 1 NSA320 User’s Guide...
  • Page 139 Figure 60 Protect > Backup > Add Job: Step 3 For this example, assume the connection to the German branch office is a good one and not many files need to be backed up so leave the compression off. NSA320 User’s Guide...
  • Page 140 You do not need to use a special restore process to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share. NSA320 User’s Guide...
  • Page 141: Restoring Archived Files By Backup Job

    Do the following: Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 63 Protect > Backup Select which backup to use and click Next. Figure 64 Protect > Backup > Restore Archive: Step 1 NSA320 User’s Guide...
  • Page 142 Select the files and folders you want to restore and click Next. Figure 65 Protect > Backup > Restore Archive: Step 2 Select the original location and click Done. Figure 66 Protect > Backup > Restore Archive: Step 3 NSA320 User’s Guide...
  • Page 143: Restoring By Backup Files

    Click Protect > Restore. Specify where the archive files are located. In this example, enter “192.168.3.2” as the IP address, “admin” as the account name, “1234” as the password, and “Backups” as the share name. Click Test Connection. Click Next. Figure 68 Protect > Restore: Step 1 NSA320 User’s Guide...
  • Page 144 Chapter 4 Tutorials Select the backup job and backup time and click Next. Figure 69 Protect > Restore: Step 2 Select everything in the share except the recycle folder. Click Next. Figure 70 Protect > Restore: Step 3 NSA320 User’s Guide...
  • Page 145 Chapter 4 Tutorials Browse to the folder where you want to put the files. Click Done. Figure 71 Protect > Restore: Step 4 The NSA restores the files and you can use them again. NSA320 User’s Guide...
  • Page 146 Chapter 4 Tutorials NSA320 User’s Guide...
  • Page 147: Technical Reference

    Technical Reference...
  • Page 149: Status Screen

    5.2 The Status Screen Click Administration in the Home screens (Section 3.5 on page 66) to open the Web Configurator. You can also view the status screen, by clicking Status on the top-left of the navigation panel. NSA320 User’s Guide...
  • Page 150 Maintenance > FW Upgrade screen from which you can upload/upgrade new firmware. MAC Address This displays the NSA’s unique physical hardware address (MAC). You need the MAC address to register the product at myZyXEL.com. Customer support may also request it for troubleshooting purposes. NSA320 User’s Guide...
  • Page 151 This displays the volumes created on the hard drives installed in the NSA. Click the Edit icon to open the Storage screen. You can create and edit the NSA’s internal volume. See Chapter 7 on page 159 for more details. NSA320 User’s Guide...
  • Page 152 Connected At This displays the date and time the user last connected to the NSA in year, month, day, hour, minute, second format. IP Address This displays the IP address of the computer connected to the NSA. NSA320 User’s Guide...
  • Page 153: System Setting

    This may happen if: • the time server is no longer reachable • if the NSA is shut down often (the NSA internal battery keeps time when the NSA is shut down and this may cause possible variance) NSA320 User’s Guide...
  • Page 154: The Server Name Screen

    Select this option if computers in your workgroup are named Being Master Browser with non-English characters (such as Chinese and Russian). When you perform a search in the workgroup, this option allows you to locate computers named with non-English characters. NSA320 User’s Guide...
  • Page 155: The Date/Time Screen

    Current System Date Time Setting Current Time This field displays the time used by your NSA for its logs and alerts. Current Date This field displays the date used by your NSA for its logs and alerts. Date Time Setup NSA320 User’s Guide...
  • Page 156 Select this option to manually enter Daylight Saving Time settings. Clear this option to have the NSA automatically retrieve Daylight Saving Time settings from the Internet. The NSA will download a new daylight saving resource file from the Internet every month. NSA320 User’s Guide...
  • Page 157 Click this to save your changes. If you configured a new time and date, Time Zone and Daylight Saving at the same time, all of the settings take affect. Cancel Click this to restore your previously saved settings. NSA320 User’s Guide...
  • Page 158 Chapter 6 System Setting NSA320 User’s Guide...
  • Page 159: Storage

    See Figure 7.6.2 on page 169 for details on choosing a storage method. Finding Out More Section 7.6 on page 168 for more technical background information on storage. NSA320 User’s Guide...
  • Page 160: The Storage Screen

    500 GB hard disk with another 1 TB hard disk and repair the volume again. After the NSA finishes the second repair, use the Expand icon to have the RAID1 volume use the rest of the hard disk capacity. NSA320 User’s Guide...
  • Page 161: Storage Screen

    Type: Whether it is an internal or external (USB) hard drive. Model Name: This is the hard disk number that identifies the disk. File System: The file system that an external volume is using Capacity: The total storage space on the disk. NSA320 User’s Guide...
  • Page 162 You can also locate or eject an external volume. Note: If you delete a volume, all data in the volume disk(s) is erased. You see a warning screen before you delete a volume. Figure 76 Delete a Volume Warning Screen NSA320 User’s Guide...
  • Page 163: Creating An Internal Volume

    Use this screen to create a new NSA internal disk drive volume. Note: Creating a volume formats the hard drive. All data on the disk will be lost. Figure 77 Storage > Create an Internal Volume NSA320 User’s Guide...
  • Page 164: Volume Status

    The NSA has the following classifications for the status of a volume: • Healthy if all disks in the volume are OK and the file system is functioning properly. • OK means the USB connected device is functioning properly. • Resync when you create a RAID volume. NSA320 User’s Guide...
  • Page 165: Editing A Volume

    7.4 Editing a Volume Click an internal volume’s Edit icon in the Storage screen as shown in Figure 75 on page 161 to open the following screen. Use this screen to change the volume’s name. Figure 78 Storage > Edit NSA320 User’s Guide...
  • Page 166: Creating An External Volume

    Use this screen to create a new NSA external disk drive volume. Note: Creating a volume formats the drive. All data on the disk will be lost. Figure 79 Storage > Create an External Volume NSA320 User’s Guide...
  • Page 167: External Disks

    Click this to exit this screen without saving changes. 7.5.1 External Disks You may connect USB storage devices that support the following file systems to the NSA. • Windows File Systems: FAT32 and FAT16. • Linux File Systems: ReiserFS, EXT2, EXT3, and XFS. NSA320 User’s Guide...
  • Page 168: Storage Technical Reference

    Storage efficiency assumes all drives are of identical size. Performance rankings are approximations. Table 25 RAID Quick Comparison RAID Level Number of Disks Capacity S*N/2 Storage 100% Efficiency Fault Tolerance None YYYY Availability YYYY Read YYYY Performance Write YYYY Performance NSA320 User’s Guide...
  • Page 169: Choosing A Storage Method For A Volume

    JBOD (Just a Bunch Of Disks) is not a RAID storage method but it is included in this discussion. These are some terms that you need to know in order to understand storage systems. NSA320 User’s Guide...
  • Page 170 (with one disk in each), a failure of one disk (volume) should not affect the other volume (disk). JBOD read performance is not as good as RAID as only one disk can be read at a time and they must be read sequentially. The following figure NSA320 User’s Guide...
  • Page 171 RAID 1 RAID 1 creates an exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity. The following NSA320 User’s Guide...
  • Page 172 IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL’s ZyWALL UTM products for example). • Use anti-virus software on your computer to scan files from others before saving the files on the NSA. • Keep another copy of important files (preferably in another location). NSA320 User’s Guide...
  • Page 173: Network

    IP addresses. The NSA can receive the IP address of a DNS server automatically (along with the NSA’s own IP address). You can also manually enter a DNS server IP address in the NSA. NSA320 User’s Guide...
  • Page 174 NSA. If this occurs, you will have to restore the factory default configuration. Push the RESET button on the NSA’s rear panel and release it after you hear a beep. NSA320 User’s Guide...
  • Page 175: The Tcp/Ip Screen

    8.4 The TCP/IP Screen Use the TCP/IP screen to have the NSA use a dynamic or static IP address, subnet mask, default gateway and DNS servers. Click Network > TCP/IP in the navigation panel to open the following screen. NSA320 User’s Guide...
  • Page 176 Select this option for the NSA to use fixed TCP/IP information. You must fill in the following fields. IP Address Type an IP address in this field. IP Subnet Mask Type an IP subnet mask in this field. NSA320 User’s Guide...
  • Page 177 Click this to save your TCP/IP configurations. After you click Apply, the NSA restarts. Wait until you see the Login screen or until the NSA fully boots and then use the NAS Starter Utility to rediscover it. Reset Click this to restore your previously saved settings. NSA320 User’s Guide...
  • Page 178: Upnp Port Mapping Screen

    Figure 83 UPnP Port Address Translation for FTP Example 192.168.1.20 a.b.c.d TCP: 21 TCP: 2100 In the above example, the Internet gateway uses PAT to accept Internet user FTP sessions on port 2100, translate them to port 21, and forward them to the NSA. NSA320 User’s Guide...
  • Page 179: Upnp And The Nsa's Ip Address

    This section introduces the NSA’s services which an Internet gateway can use UPnP to allow access to from the Internet. BitTorrent BitTorrent is a distributed peer-to-peer file-sharing protocol that the NSA’s download service can use. Using UPnP port mapping for BitTorrent lets BitTorrent work faster. NSA320 User’s Guide...
  • Page 180: Configuring Upnp Port Mapping

    Use this screen to set how the Internet gateway’s UPnP feature configure’s the Internet gateway’s NAT IP address mapping and port mapping settings. These settings allow Internet users connected to the Internet gateway’s WAN interface to NSA320 User’s Guide...
  • Page 181 Use these fields to specify what port Internet users must use to connect to the Internet gateway’s WAN port in order to connect to the service on the NSA. Service Name This read-only field identifies a service on the NSA. NSA320 User’s Guide...
  • Page 182: The Pppoe Screen

    Apply Click Apply to save your changes back to the NSA. Reset Click Reset to begin configuring this screen afresh. 8.6 The PPPoE Screen Use this screen to configure PPPoE settings for a direct Internet connection. NSA320 User’s Guide...
  • Page 183 Password Enter the password associated with the username above. Password Retype the password for confirmation. (Confirm) Apply Click this to save your changes. Reset Click this to restore previously saved settings. NSA320 User’s Guide...
  • Page 184 Chapter 8 Network NSA320 User’s Guide...
  • Page 185: Applications

    NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps. • Use the Auto Upload screens (Chapter 11 on page 285) to upload files in selected shares to your Flickr and/or YouTube accounts. NSA320 User’s Guide...
  • Page 186: What You Need To Know

    NSA can function as a DLNA-compliant media server and/or an iTunes server. The NSA streams files to DLNA-compliant media clients or computers using iTunes. The Digital Living Network Alliance (DLNA) is a group of personal computer and electronics companies that works to make products compatible in a home network. NSA320 User’s Guide...
  • Page 187 NSA’s-IP-Address/MyWeb/FamilyPhotos. Broadcatching Broadcatching is the downloading of digital content from Internet feeds. Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio shows, podcasts (audio files), and blogs. NSA320 User’s Guide...
  • Page 188: Ftp Server

    Enable FTP You can use FTP to send files to the NSA or get files from the NSA. Select this check box to allow users to connect to the NSA via FTP; otherwise clear the check box. NSA320 User’s Guide...
  • Page 189 This setting applies to all FTP client connections to the NSA. It does not affect your Windows/CIFS connections (it will not correct the character display in Windows Explorer). Apply Click this to save your changes. Reset Click this to restore your previously saved settings. NSA320 User’s Guide...
  • Page 190: The Media Server Screen

    Number of Music This is how many music files the media server has to share out to Tracks media clients. Number of Photos This is how many photo files the media server has to share out to media clients. NSA320 User’s Guide...
  • Page 191: The Download Service Screen

    Click Applications > Download Service to open the following screen. Use this screen to manage the NSA’s file downloads. Note: By default, the NSA saves downloads in the admin share’s download folder. Figure 90 Applications > Download Service NSA320 User’s Guide...
  • Page 192 Select an item on the list and click this to display information about the download task. See Section 9.6.5 on page 203 for more details. The table lists your downloads. Click a column’s heading to sort the entries by that criteria. NSA320 User’s Guide...
  • Page 193 This is the percentage of the file that the NSA has downloaded. Location This appears in the Completed tab. It displays the path for where the file is saved. Click on the location link to open the share browser and access the file. NSA320 User’s Guide...
  • Page 194 Error Code This appears in the Error tab. This shows the tag for the error that occurred. Error Message This appears in the Error tab. This message states what went wrong with the download. NSA320 User’s Guide...
  • Page 195: Adding A Download Task

    A “torrent” file has information the NSA uses to do a BitTorrent download. A torrent file uses a .torrent extension. If you already have a torrent file saved on your computer, select the Torrent File option and specify its path or click Browse and look for its location. NSA320 User’s Guide...
  • Page 196 Select a folder. If you don’t select a folder, a forward slash (/) displays in the Path field. All contents within the specified share are automatically selected. Click Apply to save your settings and Cancel to close the screen. NSA320 User’s Guide...
  • Page 197: Configuring General Settings

    Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period. Figure 92 Applications > Download Service > Preferences > General Settings NSA320 User’s Guide...
  • Page 198 “Move complete downloads to”:. • Share - Select the share from the list. • Path - Type the folder location in the share directly or click Browse to open the following screen and navigate to the file’s location. NSA320 User’s Guide...
  • Page 199 Apply Click this to save your changes. Reset Click this to restore your previously saved settings. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 200: Configuring The Bittorrent Settings

    Specify how many simultaneous seeds are allowed on the NSA. Enter Number of a number from 1 to 10. This value cannot exceed the one you Seeding Jobs configured in the Maximum Number of Active Torrents field. NSA320 User’s Guide...
  • Page 201: Edit Ip Filter

    Use this screen to enable or disable IP filtering for BitTorrent downloads. IP filtering blocks IP addresses known to share fake files. You can either get an IP filter table from a website or use your own table. NSA320 User’s Guide...
  • Page 202 Click this to save a copy of the IP filter table on your computer. IP Filter Table Apply Click Apply to update the IP filter table from the specified URL. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 203: Displaying The Task Information

    The NSA can download a file with a higher health value more efficiently. If the health value is less than 1 (0.65 for example), there is no full copy of the file, and the NSA may not be able to complete downloading the file. NSA320 User’s Guide...
  • Page 204: The Web Publishing Screen

    Click this to close the screen. 9.7 The Web Publishing Screen Use this screen to turn web publishing on or off and select shares to publish. Click Applications > Web Publishing to open the following screen. Figure 96 Applications > Web Publishing NSA320 User’s Guide...
  • Page 205 Click this to restore your previously saved settings. Note: If you installed php-MySQL-phpMyAdmin through the Package Management screen (Section 10.4 on page 232) and enable it, you can use PHP and MySQL in your published web page. NSA320 User’s Guide...
  • Page 206: The Broadcatching Screen

    • If you add a channel that contains a torrent file, the NSA downloads the torrent file (.torrent) and transfers it to Download Service (Section 9.6 on page 191) and start the BitTorrent download task accordingly. Click Applications > Broadcatching to open the following screen. Figure 97 Applications > Broadcatching NSA320 User’s Guide...
  • Page 207 NSA stops trying to download the file. To try the download again, use the Add button to create a new task. Note: A ... indicates an abbreviated file name. Hold your cursor over the name to display the full name. NSA320 User’s Guide...
  • Page 208: Adding A Broadcatching Channel

    Applications > Broadcatching > Add Channel screen and you can download new files as they are added. Figure 98 Feed Icon A channel uses a feed to deliver its contents (items). Subscribe the NSA to a feed to be able to download the contents. NSA320 User’s Guide...
  • Page 209 Set which of the channel’s items the NSA downloads. Download All Items: Download every file in the feed. Download Only New Items: Download new files from today on. Manually Choose Items for Download: Only download individual files you select later in the Broadcatching screen. NSA320 User’s Guide...
  • Page 210 HTTP/FTP jobs are stored in /* (where ‘*’ is a folder that you have set.) • All jobs triggered by RSS channels create the subfolder in /* using the channel name where it store all files downloaded from that channel (where ‘*’ is a folder that you have set.) NSA320 User’s Guide...
  • Page 211 Path field. All contents within the specified share are automatically selected. Click Apply to save your settings and Cancel to close the screen. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 212: Editing A Broadcatching Channel

    Keep last N of items: Select this to set the NSA to only keep a number of the channel’s most recent files. When this number has been reached, if the NSA downloads another file from the channel, it deletes the oldest file from the NSA. NSA320 User’s Guide...
  • Page 213 Select a folder. If you don’t select a folder, a forward slash (/) displays in the Path field. All contents within the specified share are automatically selected. Click Apply to save your settings and Cancel to close the screen. NSA320 User’s Guide...
  • Page 214: The Print Server Screen

    NSA’s USB port and reconnect it. If that does not work, disconnect the USB port and turn off the printer’s power. Then reconnect the printer and turn it back on. NSA320 User’s Guide...
  • Page 215: Print Server Rename

    Type a new name to identify the printer. The name must be unique from all the other names of printers connected to the NSA. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 216: The Copy/Sync Button Screen

    Backup Files to be This option is only available if you do not select Create a New Replaced Folder for Copied Files. Select this option to save the files that will be replaced by the source files. NSA320 User’s Guide...
  • Page 217: Technical Reference

    NSA can function as a DLNA-compliant media server and/or an iTunes server. The NSA streams files to DLNA-compliant media clients or computers using iTunes. The Digital Living Network Alliance (DLNA) is a group of personal computer and NSA320 User’s Guide...
  • Page 218 Store > Authorize Computer. A link for the NSA in iTunes under SHARED. Click it to display the NSA’s published media files as shown next. Figure 104 NSA link in iTunes NSA320 User’s Guide...
  • Page 219: Download Service

    The link capture browser plugin is an add-on feature for your web browser. Use the plugin to directly add a file’s URL to the NSA’s download service. Note: The link capture browser plugin is located in the included CD. NSA320 User’s Guide...
  • Page 220: Download Service Notification

    Section 4.9.5 on page 106 for a tutorial about using the download service notification. In the Download Service screen, select Enable Download Notify and click Apply. An RSS feed icon appears. Click the icon to subscribe to the NSA’s download list. NSA320 User’s Guide...
  • Page 221: Bittorrent Security

    Place a hardware-based firewall between your network and the Internet (a software-based firewall on your computer would just protect the computer itself, not the NSA since your computer is not between your NSA and the Internet). Figure 107 Firewall NSA320 User’s Guide...
  • Page 222 To speed up BitTorrent file transfers, configure your firewall’s port forwarding to send incoming TCP port 9090 and UDP port 9089 connections to the NSA. You probably need to use your firewall’s HTML (web-based) configuration interface to NSA320 User’s Guide...
  • Page 223: Web Publishing Example

    This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet. NSA320 User’s Guide...
  • Page 224 FamilyPhotos. So you would enter “http:// 192.168.1.33/MyWeb/FamilyPhotos/” in your browser’s address bar. Then press [ENTER] or click Go. A screen displays listing the share’s files. Figure 111 Browsing to an NSA Share Example NSA320 User’s Guide...
  • Page 225: Web Publishing

    The NSA’s web configurator uses port 80. To make the web configurator more secure, you can have the web-published shares use another port number. Then you can configure one set of firewall rules and NAT or port forwarding settings on NSA320 User’s Guide...
  • Page 226: Channel Guides For Broadcatching

    In the following example, the Internet gateway’s firewall is configured to allow anyone to access the NSA’s web-published screens using port 8080. Web configurator access (port 80) however, is only allowed from IP address a.b.c.d. Figure 112 Web Publishing Port Number Example NSA320 User’s Guide...
  • Page 227: Printer Sharing

    The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA’s USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers. Figure 113 Printer Sharing NSA320 User’s Guide...
  • Page 228: Copying Files

    After Copy Both storage devices contain file A. • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA. NSA320 User’s Guide...
  • Page 229: Synchronizing Files

    • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA. • File C on the NSA is deleted. NSA320 User’s Guide...
  • Page 230 • File B from the NSA replaces file B on the USB device. • A copy of file C from the USB device is transferred to the NSA. • A copy of file D from the NSA is transferred to the USB device. NSA320 User’s Guide...
  • Page 231: Package Management

    Kad protocol. • DyDNS - This gives your NSA a domain name with a dynamic IP address. At the time of writing, this package supports accounts from the following service providers: DynDNS, NoIP, 3322, ZoneEdit, and DHS. NSA320 User’s Guide...
  • Page 232: Package Management Screen

    NSA to an internal drive, external storage device or to another NSA in the network. The following applications come with their own web configurator and documentation: • Gallery • PHP-MySQL-phpMyAdmin • SqueezeCenter • WordPress 10.4 Package Management Screen Use this screen to download and install applications from the web. NSA320 User’s Guide...
  • Page 233 This is only available if you have previously installed the package. Package Info Select an item on the list and click this to display information about the package. See Section 10.4.1 on page 235 for more details. NSA320 User’s Guide...
  • Page 234 Note: Once you install an application and enable it, additional links show up in the navigation panel. This applies to eMule, DyDNS, NFS, SMART and BackupPlanner. For Gallery, PHP-MySQL-phpMyAdmin, SqueezeCenter and WordPress, you can access the applications’ web configurators through the Package Management screen. NSA320 User’s Guide...
  • Page 235: Displaying The Package Information

    This shows the location of the screens, console or web configurator Page where you can manage the application (after the package has been installed on the system). Source This shows the location of the installed files of the application. NSA320 User’s Guide...
  • Page 236: Emule Screens

    Add Server Click this to add an eMule server. A server provides a list of available files for download, users sharing them and other information. Refer to Section 10.5.2 on page 237 for the Add Server screen. NSA320 User’s Guide...
  • Page 237: Add Server

    This shows the number of files available for download in the server. You see a warning screen before you delete a server. Figure 120 Delete a Server 10.5.2 Add Server Use this screen to add a server for the eMule application. NSA320 User’s Guide...
  • Page 238: Edit Server

    Click this to return to the previous screen without saving. 10.5.3 Edit Server Use this screen to edit a server for the eMule application. Click Edit in the Applications > eMule > Server screen to edit a server. Figure 122 Applications > eMule > Server: Edit NSA320 User’s Guide...
  • Page 239: My Info

    NSA is ED2k IP This is the IP address of the eMule server to which the connected NSA is ED2k Port This is the port number of the eMule server to which the connected NSA320 User’s Guide...
  • Page 240: Emule Task Screen

    Figure 124 Applications > eMule > Task The following table describes the labels in this screen. Table 53 Applications > eMule > Task LABEL DESCRIPTION Task Enable eMule Check this and click Apply to enable the eMule application. NSA320 User’s Guide...
  • Page 241 Use this field to set the priority for the task. Choose from Auto, Low, Normal or High. Select Auto to have the NSA automatically determine the task’s priority. Select High to have the NSA complete this task before the others. NSA320 User’s Guide...
  • Page 242: Add Task

    Depending on its status, it can eventually show up in the other tabs (Newly Completed, Uploading or Shared Files tabs). You see a warning screen before you delete a task. Figure 125 Delete a Task 10.5.6 Add Task Use this to add a download task to the NSA. NSA320 User’s Guide...
  • Page 243 NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files. NSA320 User’s Guide...
  • Page 244: Preferences

    Click this to return to the previous screen without saving. 10.5.7 Preferences Use this screen to configure your eMule settings, such as port numbers to use, its download/upload rates and the maximum number of peers allowed to connect to the NSA. NSA320 User’s Guide...
  • Page 245 NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files. NSA320 User’s Guide...
  • Page 246 Max. download Enter the maximum download rate for download tasks. rate Max. upload rate Enter the maximum upload rate for upload tasks. Connection Maximum Enter the maximum number of eMule peer-to-peer connections. Number of Active Connections IP Filter NSA320 User’s Guide...
  • Page 247: Edit Ip Filter

    IP filter table available. Select Upload IP Filter Table if you want to use an IP filter table from your local computer. Apply Click this to save your changes. Reset Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 248: Share Browsing

    Upload Click this to add files to the share. Use Browse to locate a file and click Apply to upload the file. Note that the size of each file should be less than 2 GB. NSA320 User’s Guide...
  • Page 249: Task Info

    This field displays a file’s latest modification date. Close Click this to close the screen. 10.5.10 Task Info Use this screen to view eMule task details, such as status, file name, file size and its download progress. NSA320 User’s Guide...
  • Page 250 This shows the download speed for the task. Time Left This shows how much time is needed to complete the task. Priority This shows the priority of this task. You can set this in Section 10.5.5 on page 240. NSA320 User’s Guide...
  • Page 251: Emule Search Screen

    Enter the file extensions separated by commas of files you want included in the search results. Search Click this to have the NSA search the eMule network for files that match the criteria you have set. Clear Click this to clear the fields. NSA320 User’s Guide...
  • Page 252: Dydns Screen

    Your friends or relatives will always be able to call you even if they don't know your IP address. Click Network > DyDNS to open the following screen. Figure 132 Network > DyDNS NSA320 User’s Guide...
  • Page 253: Nfs Screen

    Use this screen to enable and configure Network File System (NFS) settings on your NSA. NFS is a client/server distributed file service that provides transparent file sharing for network environments. This allows shared folders in your NSA to be accessible like a local folder in a user’s computer. NSA320 User’s Guide...
  • Page 254 This shows which domain name(s) or IP address(es) have read/write access to the NFS shares. Refer to Section 10.7.1 on page 255 for the screen where you can configure this. Comment This shows a short description of the share. NSA320 User’s Guide...
  • Page 255: Add/Edit Nfs Share

    Enter the name you want to give to the NFS share. Full Path This shows the location of the NFS share in the NSA. The NFS server assigns this path to the share folder you input. Comment Enter a short description for the share. NSA320 User’s Guide...
  • Page 256: Nfs Session

    This displays the date and time the user last connected to the NSA in year, month, day, hour, minute, second format. IP Address This shows the IP address of the user accessing the NFS share. Click this to close the window. NSA320 User’s Guide...
  • Page 257: Smart Screen

    This shows the condition of the hard disk volume. Go to Section 7.3.1 on page 164 for more information. Name This shows the name assigned to the hard disk. Temperature This shows the temperature of the hard disk in degrees celsius. NSA320 User’s Guide...
  • Page 258: Smart Brief Summary

    Figure 138 Storage > S.M.A.R.T: Brief Summary The following table describes the labels in this screen. Table 65 Storage > S.M.A.R.T: Brief Summary LABEL DESCRIPTION Brief Summary Temperature This shows the current temperature of the hard disk in degrees celsius. NSA320 User’s Guide...
  • Page 259: Smart Full Summary

    Click this to close the window. 10.8.2 SMART Full Summary Use this screen to display more details information about the volume. Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 139 Storage > S.M.A.R.T: Full Summary NSA320 User’s Guide...
  • Page 260 This indicates when the hard drive updates the value for this attribute. • Always means the hard drive updates this attribute during normal operation and during offline activities. • Offline means the hard drive only updates this attribute when no one is accessing the hard drive. NSA320 User’s Guide...
  • Page 261: Protect Screens

    • Restore screens - These include steps to restore previous backups made with the NSA. 10.10 Backup Screens Use this screen to create and customize scheduled backup jobs for your files. You can have several backup jobs for specific folders and time periods. NSA320 User’s Guide...
  • Page 262 This shows the backup schedule, including the frequency, the time it was last run in (and whether or not it succeeded), and when it is scheduled to run again. The times use yyyy-mm-dd hh:mm:ss format. Refer to Section 10.10.4 on page 269. NSA320 User’s Guide...
  • Page 263: Backup: Step 1

    The following table describes the labels in this screen. Table 68 Protect > Backup: Step 1 LABEL DESCRIPTION Job Information Job Name Enter a name to identify the backup job. Job Description Enter a short description (up to 100 keyboard characters) for the backup job. NSA320 User’s Guide...
  • Page 264 Publish- The NSA does a backup of individual files to the target folder without overwriting existing files in that folder. It makes a copy of the source files. Next Click this to go to the next step. NSA320 User’s Guide...
  • Page 265: Backup: Step 2

    Chapter 10 Package Management 10.10.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored. Figure 142 Protect > Backup: Step 2 NSA320 User’s Guide...
  • Page 266 A list of your select folders and files displays below the selection fields. Selected Source This shows the path of the backup source folder you selected. Folders Backup Target Select the target folder where you want to place your backup. NSA320 User’s Guide...
  • Page 267 Select this if you have a USB hard disk connected to the NSA that you want to use for your backup. Select the folder where you want to place the backup. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. NSA320 User’s Guide...
  • Page 268: Backup: Step 3

    Bandwidth Restrict the bandwidth of synchronization backups to help stop them from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet. NSA320 User’s Guide...
  • Page 269: Backup: Step 4

    The following table describes the labels in this screen. Table 71 Protect > Backup: Step 4 LABEL DESCRIPTION Scheduler Backup Select from Hourly, Daily, Weekly and Monthly backup intervals. Frequency The screen changes depending on the item you select. NSA320 User’s Guide...
  • Page 270: Edit Job Screen

    Click this to close the screen. 10.10.5 Edit Job Screen Use this screen to edit an existing backup job. Some attributes of the backup job cannot be changed, such as the name, backup type, source folder and so on. NSA320 User’s Guide...
  • Page 271: Edit Job: Step 1

    This field is read-only and shows on which volume (whether internal or external) the backup files are stored. If the target location is a remote NSA, this shows the remote IP address. Target Path This field is read-only and shows the target folder for the backup files. NSA320 User’s Guide...
  • Page 272: Edit Job: Step 2

    After this day has expired, all backup files will be deleted. Next Click this to go to the next screen. 10.10.7 Edit Job: Step 2 Use this screen to edit the schedule for the backup job. Figure 146 Protect > Backup > Edit: Step 2 NSA320 User’s Guide...
  • Page 273: Restore Archive Screen

    Select the day in a month when you want the NSA to perform the backup job. Previous Click this to go back to the previous screen. Done Click this to close the screen. 10.10.8 Restore Archive Screen Use this screen to restore previous backups made with the NSA. NSA320 User’s Guide...
  • Page 274: Restore Archive: Step 1

    This is the type of backup implemented for the backup job. Scheduler This field displays the backup’s frequency. Information Restored Time Select a previous backup in the list that you want to restore to your NSA. Next Click this to go to the next screen. NSA320 User’s Guide...
  • Page 275: Restore Archive: Step 2

    Select the folder where the backup you want to restore is located. Selected Folder This shows the path of the folder you selected. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. NSA320 User’s Guide...
  • Page 276: Restore Archive: Step 3

    Click Apply to save your settings and Cancel to close the screen. Previous Click this to go back to the previous screen. Done Click this to run the restore process and go back to the Backup screen. NSA320 User’s Guide...
  • Page 277: Restore Screen

    Enter the password of your NSA account. Share Name Enter the name of the share you want to use. Test Connection Click this to test your connection to the remote NSA that you have specified in the fields above. NSA320 User’s Guide...
  • Page 278: Restore: Step 2

    Click Apply to save your settings and Cancel to close the screen. Next Click this to go to the next screen. 10.11.2 Restore: Step 2 Select a previous archive backup that you want to restore to the NSA. Figure 151 Protect > Restore: Step 2 NSA320 User’s Guide...
  • Page 279: Restore: Step 3

    Click this to go back to the previous screen. Next Click this to go to the next screen. 10.11.3 Restore: Step 3 Use this screen to select the folder where the archive you want to restore is located. Figure 152 Protect > Restore: Step 3 NSA320 User’s Guide...
  • Page 280: Restore: Step 4

    Next Click this to go to the next screen. 10.11.4 Restore: Step 4 Use this screen to select the location in the NSA where you want to restore your backup. Figure 153 Protect > Restore: Step 4 NSA320 User’s Guide...
  • Page 281: Technical Reference

    This section provides technical background information on the topics discussed in this chapter. 10.12.1 S.M.A.R.T Attributes The following table describes some common S.M.A.R.T. attributes. If a higher or lower raw attribute value is better, it is indicated in the BETTER column. Since NSA320 User’s Guide...
  • Page 282 This is the number of times the hard drive has gone Cycle Count through a full power on and power off. Soft Read Error This is the number of uncorrected read errors the hard Rate drive has reported. If this is not zero, back up your data. NSA320 User’s Guide...
  • Page 283 Mark Errors could also be a different, manufacturer-specific attribute. Run Out Cancel This is the number of ECC (Error Correction Code) errors. Soft ECC This is the number of errors corrected by software ECC Correction (Error Correction Code). NSA320 User’s Guide...
  • Page 284 Temperature This is the hard drive’s temperature. Head Flying This is the total time that the head has been positioning. Hours Read Error This is the number of errors in reading from the disk. Retry Rate NSA320 User’s Guide...
  • Page 285: Auto Upload

    File Transfer Protocol (FTP) is a file transfer service that operates on the Internet. A system running the FTP server accepts commands from a system running an FTP client. FTP is not a secure protocol. Your file transfers could be subject to snooping. NSA320 User’s Guide...
  • Page 286: The Flickr/Youtube Screen

    This field displays the name of a sharing website to which the NSA can automatically upload files. Account This field displays the username and related information of the Information account to use with the auto upload feature. NSA320 User’s Guide...
  • Page 287: Configuring The Flickr Settings

    Click OK to continue the authorization process. Figure 155 Linking NSA to Flickr The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account’s information and click Sign In. Figure 156 Yahoo! Flickr Login Page NSA320 User’s Guide...
  • Page 288 IT to establish a link between the NSA and your Flickr account. Figure 157 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA web configurator. Click Get Ready in the following screen to complete the authorization process. Figure 158 Confirming Flickr Authorization NSA320 User’s Guide...
  • Page 289 Chapter 11 Auto Upload Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen. Figure 159 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) NSA320 User’s Guide...
  • Page 290 This is the path of a folder selected for auto upload. The NSA only uploads files stored in the specified share or folder to your Flickr account. Action Use the Remove icon to remove a folder from the Folder Watch List. NSA320 User’s Guide...
  • Page 291 You can set up a friend/family list in your Flickr account. Select Anyone to allow everyone to see your files. Hide from public Check this option to prevent others from finding your files when they site area perform a search in the Flickr website. NSA320 User’s Guide...
  • Page 292: Configuring The Youtube Settings

    If you have not authorized a YouTube account on the NSA, the following screen displays. Enter your Google account’s e-mail address and password in the fields and click OK to authorize the service. Figure 160 YouTube Account Settings NSA320 User’s Guide...
  • Page 293 Chapter 11 Auto Upload Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen. Figure 161 Applications > Auto Upload > Flickr/YouTube > Config (YouTube) NSA320 User’s Guide...
  • Page 294 This field displays the path of a folder selected for auto upload. The NSA only uploads the files stored in the specified share or folder to your YouTube account. Action Use the Remove icon to delete a folder from the Folder Watch List. NSA320 User’s Guide...
  • Page 295 Select Only You if you do not want anyone else to see your files. Select Anyone to allow everyone to see your files. Apply Click this to save your changes. Reset Click this to restore your previously stored settings. NSA320 User’s Guide...
  • Page 296: The Ftp Uploadr Screen

    FTP server. Use this screen to configure the FTP Uploadr. Click Applications > Auto Upload > FTP Uploadr to open the screen shown next. Figure 162 Applications > Auto Upload > FTP Uploadr NSA320 User’s Guide...
  • Page 297 This is the port number used by the FTP server. Remote Path The NSA automatically uploads files to this location of the FTP server. Account Name This is the login account for the FTP server. Description This is the information related to the FTP server. NSA320 User’s Guide...
  • Page 298: Adding Or Editing An Ftp Server Entry

    Click this to test your settings and check whether you can use the settings to connect to the FTP server. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 299: The Ftp Uploadr Preferences Screen

    This is the path of a folder selected for auto upload. The NSA only uploads files stored in the specified share or folder to your FTP server. Action Use the Remove icon to delete a folder from the Folder Watch List. NSA320 User’s Guide...
  • Page 300 Internet connection has restricted upload speed. Apply Click this to save your changes in this section. Reset Click this to restore previously saved settings. Close Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 301: Users

    304) to edit the properties of an existing account. • Use the User Info screen (Section 12.4 on page 306) to display the amount of volume space used by a selected account and the account’s membership in any groups. NSA320 User’s Guide...
  • Page 302: The Users Screen

    Click Clear to close the search function. Edit User Select an account and click this to open a screen where you can edit the properties of the account. Refer to Section 12.3.2 on page 304 to see the screen. NSA320 User’s Guide...
  • Page 303: User Icons

    This field displays the username of each account. 12.3.1 User Icons The following table describes the user icons. Table 89 User Icons ICON DESCRIPTION The blue icon is for an administrator account. The green icon is for a user account. NSA320 User’s Guide...
  • Page 304: Adding Or Editing An Account

    Select User to give the account basic access rights to the NSA and allow the user to manage his own shares, change his own password, and access the contents of other shares to which he is given access rights. Group Membership NSA320 User’s Guide...
  • Page 305: Usernames

    • The username cannot be the same as a system username such as ANONYMOUS-FTP nor be the same as an existing user. Other reserved usernames that are not allowed are: • bin • daemon • ftp • anonymous-ftp NSA320 User’s Guide...
  • Page 306: Displaying User Info

    NSA while logged in with that username. Group Name This shows when you click the Group List tab. This displays the list of groups to which the selected user belongs. Click this to close the current screen. NSA320 User’s Guide...
  • Page 307: Groups

    (Section 13.3.1 on page 309) to create new groups. • Use the Edit Group screen (Section 13.3.1 on page 309) to edit the properties of an existing group. 13.3 The Groups Screen Use this screen to create and manage groups. NSA320 User’s Guide...
  • Page 308 Select a group and click this to open a screen where you can edit the properties of the selected group. Delete Selected Select a group and click this to open a screen where you can Group(s) delete the group. NSA320 User’s Guide...
  • Page 309: Adding Or Editing A Group

    Select a user account from the Group Membership list and User(s) click this to remove the account from the group. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 310: Group Names

    • The group name cannot be the same as a system group name such as EVERYONE nor be the same as an existing group. Other reserved groups names that are not allowed are: • nobody • root • everyone NSA320 User’s Guide...
  • Page 311: Shares

    • Use the Edit Share screen (Section 14.3.1 on page 314) to edit a share’s properties. • Use the Share Browser screen (Section 14.6 on page 319) to navigate, add and edit the contents in a share. NSA320 User’s Guide...
  • Page 312: The Shares Screen

    Select a share and click this to edit the share. Delete Share Select a share and click this to remove or restrict access to the share. Share Browser Select a share and click this to browse the share’s contents. NSA320 User’s Guide...
  • Page 313 This field displays the access permission of a share. Everyone on the network can access a Public share. Only the share owner can access a Private share. An Advanced share allows you to assign specific access rights (read-only for example) to individual users/groups. NSA320 User’s Guide...
  • Page 314: Adding Or Editing Share

    Publish this This shows only when you enable the Web Publish ( page 204) share to Web Select this option to let people use a web browser to access this share’s files without logging into the Home screens. NSA320 User’s Guide...
  • Page 315: Configuring Advanced Share Access

    Share Access drop-down list. Click Edit to open the following screen. Use this screen to configure share access rights for individual users and groups. Figure 172 Sharing > Shares > Add Share (or Edit Share) > Advanced NSA320 User’s Guide...
  • Page 316: Public And Anonymous Share Access Rights

    When you reconnect to the network, Windows uses a process called synchronization to update the files on the network with your changes. If others on the network modified the same file, you can save your version, the other version, or both. NSA320 User’s Guide...
  • Page 317: Using Windows Offline File Synchronization

    Click this to save your changes. Cancel Click this to return to the previous screen without saving. 14.4.1 Using Windows Offline File Synchronization To use Windows offline file synchronization, in Windows Explorer right click an NSA share and select Always available offline. NSA320 User’s Guide...
  • Page 318: The Recycle Bin Configuration Screen

    Note: Cleaning up recycle bins permanently removes the files from the NSA. Clean all recycle bins Click this to immediately remove contents from all recycle bins. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 319: The Share Browser Screen

    Upload Click this to add files to the share. Use Browse to locate a file and click Apply to upload the file. Note that the size of each file should be less than 2 GB. NSA320 User’s Guide...
  • Page 320 You can also click the folder’s name to navigate to a sub-folder within the folder. Size This field displays size of the file. Modified Date This field displays a file’s latest modification date. Close Click this to close the screen. NSA320 User’s Guide...
  • Page 321: Moving Or Copying Files

    Path field. All contents within the specified share are automatically selected. Click Apply to save your settings and Cancel to close the screen. Click this to move or copy the file/folder to the designated share. Close Click this to return to the Share Browser screen. NSA320 User’s Guide...
  • Page 322 Chapter 14 Shares NSA320 User’s Guide...
  • Page 323: Maintenance Screens

    333) to configure HTTPS and the NSA’s SSL certificate. • Use the Firmware Upgrade screen (Section 15.7 on page 336) to upload new firmware. • Use the Shutdown screen (Section 15.8 on page 337) to restart or shut down your NSA. NSA320 User’s Guide...
  • Page 324: The Power Screen

    Table 101 Maintenance > Power LABEL DESCRIPTION Power Management Turn off hard Enter the number of minutes the NSA will sit idle before spinning the disk(s) hard disks down to sleep. The default power-off time is 15 minutes. Minimum UPS Capacity NSA320 User’s Guide...
  • Page 325 NSA supports sending magic packets. Use the NSA’s power button or the Web Configurator’s Maintenance > Shutdown menu to turn off the NSA. Apply Click this to save your changes. Reset Click this to restore previously saved settings. NSA320 User’s Guide...
  • Page 326: Editing The Power Control Schedule Screen

    (when the NSA is to turn on, turn off, or reboot). Actions Click the Delete icon to remove a power control schedule from the list. Add Power Use this part of the screen to configure power on, power off, and reboot Control times. Schedule NSA320 User’s Guide...
  • Page 327 Enter the interval between days for the power control schedule entry. Click this to add the power control schedule to the list. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 328: The Log Screen

    This displays how serious the log is rated by the NSA. See Table 113 on page 338for more information. Message This displays a description of the log. Click the top of the column to sort by alphabetical or reverse alphabetical order. NSA320 User’s Guide...
  • Page 329: Report Config Screen

    Select the e-mail format you want the NSA to use in its e-mail alerts. Use SMTP Click this if the e-mail server you want the NSA to use for its e-mail Authentication alerts requires a username and password. User Enter the username for the e-mail server. NSA320 User’s Guide...
  • Page 330: Report Setting

    Select how often (Weekly, Daily or Hourly), what day in the week (Monday to Sunday) and which time (hour:minutes) the NSA delivers its e-mail alerts. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 331: Syslog Server Setting

    In the table below, check the type of log alerts you want to receive in your e-mail. Select All Log to include all types of log alerts. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA320 User’s Guide...
  • Page 332: The Configuration Screen

    A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit. Reset MySQL Database Click this to reset the password for your MySQL database. Password NSA320 User’s Guide...
  • Page 333: Ssl Certification

    Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that was issued by a known certificate authority. Figure 184 Maintenance > SSL NSA320 User’s Guide...
  • Page 334 Note: Use this method if the device is open to external access, such as allowing users to connect through the Internet using FTP over TLS or HTTPs. NSA320 User’s Guide...
  • Page 335: Modifying Or Creating A Certificate

    Key Length Select the encryption key length. The longer the key, the better the encryption security. The only drawback to having a long key is that the file encrypted with it swells in size as well. NSA320 User’s Guide...
  • Page 336: The Firmware Upgrade Screen

    Click this to upload the new firmware. The NSA automatically restarts after you upgrade. Wait until the restart completes before accessing the NSA again. If you interrupt the upgrade, then the NSA may become unusable. Reset Click this to refresh the screen. NSA320 User’s Guide...
  • Page 337: The Shutdown Screen

    Click this to shut down the system and restart it again later. When you click the Restart button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the restart. Figure 188 Maintenance > Shutdown > Confirm Restart NSA320 User’s Guide...
  • Page 338: Technical Reference

    6 with 0 being the most severe level log and 6 being an informational log only. Log levels are not displayed in the logs and are for your reference only. Table 113 Log Severity Levels LEVEL DESCRIPTION Emergency Alert NSA320 User’s Guide...
  • Page 339: Log Messages

    Folder. Copy/Sync INFO [USB Sync] Copying %s from Internal Volume to USB. Button Copy/Sync INFO [USB Sync] Copying %s from USB to Backup Folder. Button Copy/Sync INFO [USB Sync] Copying %s from USB to Internal Volume. Button NSA320 User’s Guide...
  • Page 340 INFO Download service set %s to %s priority by user Service Download INFO Download service set default download location to %s Service Download INFO Download service set max BT download rate to %d KB/s by Service user NSA320 User’s Guide...
  • Page 341 Download service will update ipfilter.dat from %s after %d Service day(s) Download INFO Download service added %d rules from ipfilter.dat Service Download INFO Download service detected invalid ip range %s in ipfilter.dat Service Download WARNING Download service default location does not exist. Load Service default NSA320 User’s Guide...
  • Page 342 MyClock has set timezone to %s Services INFO MyClock has set timezone to default Services INFO The date and time are updated from NTP server. Services INFO The date and time are updated manually. Services INFO The time is updated manually. NSA320 User’s Guide...
  • Page 343 Create Internal Volume [%s] (%s): FAILED Storage ERROR Rename External Volume to [%s]: FAILED Storage ERROR Scan External Volume: FAILED Storage ERROR Scan Internal Volume (%s operation): FAILED Storage INFO Cancel External Volume Scan: SUCCESS Storage INFO Cancel Internal Volume Scan: SUCCESS NSA320 User’s Guide...
  • Page 344 The user %s from %s has attempted to change the user %s password but old password verification fail. Users NOTICE User %s on %u.%u.%u.%u has been denied access from Users NOTICE User %s password has been changed by %s from %s. NSA320 User’s Guide...
  • Page 345 Job [%s] is canceled by user Management Power INFO Restore job [%s] is triggered by user Management Power INFO [Power On] schedule is triggered. Management Power INFO [Power Off] schedule is triggered. Management Power INFO [Reboot] schedule is triggered. Management NSA320 User’s Guide...
  • Page 346 Chapter 15 Maintenance Screens NSA320 User’s Guide...
  • Page 347: Protecting Your Data

    Network down Natural disaster such as a fire or earthquake occurs where your NSA is located The following sections describe these methods in more detail. See Section 7.6.3 on page 169 for more information on RAID. NSA320 User’s Guide...
  • Page 348: Configuration File Backup And Restoration

    16.4.1 Memeo Autobackup Installation and Setup Note: The Memeo Autobackup program uses the same network port as the discovery utility to discover the NSA. To avoid a port conflict, turn off the discovery utility before using Memeo Autobackup. NSA320 User’s Guide...
  • Page 349 When you see the following screen, select Network Places and click the link to select your backup folder. Figure 190 Memeo Autobackup Configuration Select the NSA’s mapped drive and click OK. Figure 191 Mapped Drive NSA320 User’s Guide...
  • Page 350 Chapter 16 Protecting Your Data In this screen, select the items that you want to back up. Figure 192 Backup Items This screen lists the items you selected for backup. Confirm your selections and click Next. Figure 193 Confirm Backup Items NSA320 User’s Guide...
  • Page 351: Using Memeo Autobackup After The Initial Setup

    After you have installed and configured Memeo Autobackup, double-click the icon in the system tray to open the program’s start screen. If the icon is not displayed, you can click Start > Programs > Memeo Autobackup > Memeo Autobackup to start it. Figure 195 Memeo Autobackup NSA320 User’s Guide...
  • Page 352 Chapter 16 Protecting Your Data NSA320 User’s Guide...
  • Page 353: Troubleshooting

    • Web Publishing • Auto Upload • Package Management • Backups 17.2 Power, Hardware, Connections, and LEDs The NSA PWR LED does not turn on (no LEDs are on). • Make sure the NSA is turned on. NSA320 User’s Guide...
  • Page 354 • If you have a RAID I volume click the Repair icon next to the new drive. • If you are using RAID 0 you will need to recreate the whole volume. All of your data is lost. NSA320 User’s Guide...
  • Page 355 • If a file is corrupted, the NSA will download the file again. • If the file is intact but not completely downloaded, the NSA will resume the download task after it restarts. NSA320 User’s Guide...
  • Page 356: Nas Starter Utility

    NSA. Press the RESET button until you hear two beeps. After the second beep, continue pressing the button for five more seconds, then release it. You will hear three quick beeps after you release the button. NSA320 User’s Guide...
  • Page 357: Nsa Login And Access

    17.4 NSA Login and Access I forgot the server name of the NSA. • The default server name is nsa320. • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility.
  • Page 358 Chapter 17 Troubleshooting • The default server name is nsa320, if you have changed the server name, use the new one. • If the server name has been changed and you do not know the new server name, see the troubleshooting suggestions for I forgot the server name of the NSA.
  • Page 359: Enabling Scripting Of Safe Activex Controls

    In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 196 Internet Options: Security Click the Custom Level... button. Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default). NSA320 User’s Guide...
  • Page 360 ActiveX controls. The Web Configurator logs out by itself. The web configurator management session automatically times out if it is left idle for 15 minutes. Simply log back into the NSA if this happens to you. NSA320 User’s Guide...
  • Page 361: I Cannot Access The Nsa

    NSA or use the NAS Starter Utility to discover it. • The local user should check that he entered his login name and password correctly. • Check if the share exists and has the correct access settings for this user. NSA320 User’s Guide...
  • Page 362 IP address, the NSA needs to use a private DNS server. If the domain controller uses a public IP address, the NSA needs to use a public DNS server. • Leave the domain and re-join it. A domain user can’t access a share. NSA320 User’s Guide...
  • Page 363: External Usb Drives

    NSA. Try to save the files onto a computer and then from the computer to the NSA (through the network connection). 17.8 Firmware I want to know the firmware version on the NSA. Go to the Status screen. The Firmware field shows you the current firmware version running. NSA320 User’s Guide...
  • Page 364: File Transfer

    NSA and transfer files in the same way you transfer files in your local computer: On your Windows computer, click Start > Run or open a web browser. Enter \\nsa320 (default) or the Server Name you assigned the NSA. This shows you the folders in the NSA.
  • Page 365: Networking

    • Create a new volume if you do not have one on the internal disk yet. • Make sure the volume on the installed internal disk is in a healthy state. I cannot use some applications in the Web Configurator. NSA320 User’s Guide...
  • Page 366: Media Server Functions

    The media client may not support the file’s format. iTunes does not display the names of all the music files I just put on the NSA. Make sure the files are a format supported by iTunes. See Section 18.5 on page 381. NSA320 User’s Guide...
  • Page 367 Applications > Media Server and disable and re-enable the iTunes server option. If you uploaded many files, it may take awhile for the NSA to find and list all of them. Then try reconnecting your iTunes client. NSA320 User’s Guide...
  • Page 368: Download Service And Broadcatching Functions

    Check the Download Policy for that channel (see Section 9.8.1 on page 208). It may be set to manual download. You can configure your NSA to download all items or only new items automatically once the channel is updated. NSA320 User’s Guide...
  • Page 369: Web Publishing

    • Web publishing uses TCP protocol and the port number you specify. Make sure there is not another service using TCP protocol with the same port number. See Appendix C on page 407 for a list of common services and their associated protocols and port numbers. NSA320 User’s Guide...
  • Page 370: Auto Upload

    The NSA does not automatically upload files to Flickr or YouTube. Make sure the NSA is connected to the Internet. See Section 8.4 on page 175 details about testing network connections. Click Maintenance > Log to check the NSA’s log for a message about the file. NSA320 User’s Guide...
  • Page 371: Package Management

    • The web location of the package may be undergoing maintenance. Try again at a later time. Upgrade the firmware of the NSA. • If a new firmware is available, do an upgrade and try installing the package(s) again. The eMule Search screen does not work. NSA320 User’s Guide...
  • Page 372: Backups

    The backup does not run at the time configured. • Check that the correct time is configured on the NSA. • Check that the NSA is able to access the time server from which it gets the time; see Section 6.5 on page 155. NSA320 User’s Guide...
  • Page 373: Product Specifications

    The NSA supports two SATA II interfaces (backwards compatible to SATA). Serial ATA is a low cost interface technology that allows high speed data transfer. Serial ATA also allows more efficient internal airflow and smaller chassis design. NSA320 User’s Guide...
  • Page 374 All settings you have configured on the NSA, including IP address, password, user accounts, groups, and so on will be reset to the factory defaults. The reset process does NOT affect the volume settings, nor data stored on the NSA. NSA320 User’s Guide...
  • Page 375: Firmware Features

    Windows computers to an NSA. This software is included on the CD. Time and Date Configure a time server and set a time zone for your NSA to show the correct times in logs. NSA320 User’s Guide...
  • Page 376: Specification Tables

    IP address in the 169.254.X.X subnet (where X is a number from 1 to 254). Default Subnet Mask DHCP client by default. If no DHCP server is found, the subnet mask defaults to 255.255.255.0 (24 bits). Default Username admin NSA320 User’s Guide...
  • Page 377 The NSA firmware specifications are shown in the following table Table 120 NSA Firmware Specifications File Storage System JBOD, RAID 0, RAID 1 Network Protocols TCP/IP, UDP/IP DHCP Client FTP, FTPES (TLS explicit mode) HTTP, HTTPS File Management Create/Delete System Volume NSA320 User’s Guide...
  • Page 378 DLNA clients play files stored on DLNA servers. ECMA-262 The original ECMAScript standard, also known as JavaScript. NSA320 User’s Guide...
  • Page 379 Wide Web Consortium) recommendations for the "text/html" MIME type. RFC 3066, BCP 47 Language tags (Best Current Practice) RFC 3282 "Content-language:" headers. RFC 3986 (STD-66) - Uniform Resource Identifier (URI): Generic Syntax RFC 4120 The Kerberos Network Authentication Service (V5) NSA320 User’s Guide...
  • Page 380: Supported Media Server Content Formats

    MPEG-4 m4v, mp4 DivX divx, avi Motion JPEG mjpeg, mjpg Quick Time Video mov, qt RealMedia rmvb, rm Matroska Windows Media Video asf, wmv Flash Video Subtitle srt, ssa, idx, sub NSA320 User’s Guide...
  • Page 381: Supported Itunes Server Content Formats

    At the time of writing, the NSA supports iTunes publishing audio files of the following formats: mp3, m4a, m4p, wav, and mp4. 18.6 Power Consumption The NSA’s power consumption was tested using two 7,200 RPM 1.5 TB hard drives and 3 USB storage devices. NSA320 User’s Guide...
  • Page 382 Chapter 18 Product Specifications Note: These are results from a laboratory test and are for your reference only. Table 123 Power Consumption in Watts (W) POWER MODE POWER CONSUMPTION Access Mode 32.2 Watts Hard Disk Hibernation Mode 10 Watts NSA320 User’s Guide...
  • Page 383: Appendix A Setting Up Your Computer's Ip Address

    IP addresses that place them in the same subnet. In this appendix, you can set up an IP address for: • Windows XP/NT/2000 page 384 • Windows Vista page 387 • Windows 7 page 391 NSA320 User’s Guide...
  • Page 384 Appendix A Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. Click Start > Control Panel. In the Control Panel, click the Network Connections icon. NSA320 User’s Guide...
  • Page 385 Appendix A Setting Up Your Computer’s IP Address Right-click Local Area Connection and then select Properties. On the General tab, select Internet Protocol (TCP/IP) and then click Properties. NSA320 User’s Guide...
  • Page 386 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. NSA320 User’s Guide...
  • Page 387: Windows Vista

    Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. In the Control Panel, click the Network and Internet icon. Click the Network and Sharing Center icon. NSA320 User’s Guide...
  • Page 388 Appendix A Setting Up Your Computer’s IP Address Click Manage network connections. Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NSA320 User’s Guide...
  • Page 389 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NSA320 User’s Guide...
  • Page 390 ISP. You may also have to enter a Preferred DNS server and an Alternate DNS server, if that information was provided.Click Advanced. Click OK to close the Internet Protocol (TCP/IP) Properties window. 10 Click OK to close the Local Area Connection Properties window. NSA320 User’s Guide...
  • Page 391 Status and then click the Support tab to view your IP address and connection information. Windows 7 This section shows screens from Windows 7 Enterprise. Click Start > Control Panel. In the Control Panel, click View network status and tasks under the Network and Internet category. NSA320 User’s Guide...
  • Page 392 Appendix A Setting Up Your Computer’s IP Address Click Change adapter settings. Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NSA320 User’s Guide...
  • Page 393 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NSA320 User’s Guide...
  • Page 394 DNS server and an Alternate DNS server, if that information was provided. Click Advanced if you want to configure advanced settings for IP, DNS and WINS. Click OK to close the Internet Protocol (TCP/IP) Properties window. Click OK to close the Local Area Connection Properties window. NSA320 User’s Guide...
  • Page 395 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Click Start > All Programs > Accessories > Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. The IP settings are displayed as follows. NSA320 User’s Guide...
  • Page 396 Appendix A Setting Up Your Computer’s IP Address NSA320 User’s Guide...
  • Page 397: Appendix B Pop-Up Windows, Javascripts And Java Permissions

    Disable Pop-up Blockers In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 200 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. NSA320 User’s Guide...
  • Page 398 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. In Internet Explorer, select Tools, Internet Options and then the Privacy tab. NSA320 User’s Guide...
  • Page 399 Select Settings…to open the Pop-up Blocker Settings screen. Figure 202 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. NSA320 User’s Guide...
  • Page 400 Figure 203 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. NSA320 User’s Guide...
  • Page 401 Figure 204 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default). NSA320 User’s Guide...
  • Page 402 Figure 205 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. NSA320 User’s Guide...
  • Page 403 Click OK to close the window. Figure 206 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. NSA320 User’s Guide...
  • Page 404: Mozilla Firefox

    Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears. Figure 208 Mozilla Firefox: Tools > Options NSA320 User’s Guide...
  • Page 405 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 209 Mozilla Firefox Content Security NSA320 User’s Guide...
  • Page 406 Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA320 User’s Guide...
  • Page 407: Appendix C Common Services

    Border Gateway Protocol. BOOTP_CLIENT DHCP Client. BOOTP_SERVER DHCP Server. CU-SEEME 7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. NSA320 User’s Guide...
  • Page 408 ICMP echo requests to test whether or not a remote host is reachable. POP3 Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other). NSA320 User’s Guide...
  • Page 409 Access Controller Access Control System). TELNET Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems. NSA320 User’s Guide...
  • Page 410 Table 124 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE 7000 Another videoconferencing solution. NSA320 User’s Guide...
  • Page 411: Appendix D Importing Certificates

    In this appendix, you can import a public key certificate for: • Internet Explorer on page 412 • Firefox on page 422 • Opera on page 428 • Konqueror on page 436 NSA320 User’s Guide...
  • Page 412: Internet Explorer

    If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 210 Internet Explorer 7: Certification Error Click Continue to this website (not recommended). Figure 211 Internet Explorer 7: Certification Error NSA320 User’s Guide...
  • Page 413 Appendix D Importing Certificates In the Address Bar, click Certificate Error > View certificates. Figure 212 Internet Explorer 7: Certificate Error In the Certificate dialog box, click Install Certificate. Figure 213 Internet Explorer 7: Certificate NSA320 User’s Guide...
  • Page 414 Figure 214 Internet Explorer 7: Certificate Import Wizard If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 215 Internet Explorer 7: Certificate Import Wizard NSA320 User’s Guide...
  • Page 415 Browse. Figure 216 Internet Explorer 7: Certificate Import Wizard In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK. Figure 217 Internet Explorer 7: Select Certificate Store NSA320 User’s Guide...
  • Page 416 Appendix D Importing Certificates In the Completing the Certificate Import Wizard screen, click Finish. Figure 218 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 219 Internet Explorer 7: Security Warning NSA320 User’s Guide...
  • Page 417 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information. Figure 221 Internet Explorer 7: Website Identification NSA320 User’s Guide...
  • Page 418 Figure 222 Internet Explorer 7: Public Key Certificate File In the security warning dialog box, click Open. Figure 223 Internet Explorer 7: Open File - Security Warning Refer to steps 4-12 in the Internet Explorer procedure beginning on page 412 complete the installation process. NSA320 User’s Guide...
  • Page 419 This section shows you how to remove a public key certificate in Internet Explorer Open Internet Explorer and click Tools > Internet Options. Figure 224 Internet Explorer 7: Tools Menu In the Internet Options dialog box, click Content > Certificates. Figure 225 Internet Explorer 7: Internet Options NSA320 User’s Guide...
  • Page 420 Remove. Figure 226 Internet Explorer 7: Certificates In the Certificates confirmation, click Yes. Figure 227 Internet Explorer 7: Certificates In the Root Certificate Store dialog box, click Yes. Figure 228 Internet Explorer 7: Root Certificate Store NSA320 User’s Guide...
  • Page 421 Appendix D Importing Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA320 User’s Guide...
  • Page 422 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Select Accept this certificate permanently and click OK. Figure 229 Firefox 2: Website Certified by an Unknown Authority NSA320 User’s Guide...
  • Page 423 The certificate is stored and you can now connect securely to the Web Configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information. Figure 230 Firefox 2: Page Info NSA320 User’s Guide...
  • Page 424 Open Firefox and click Tools > Options. Figure 231 Firefox 2: Tools Menu In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 232 Firefox 2: Options NSA320 User’s Guide...
  • Page 425 Use the Select File dialog box to locate the certificate and then click Open. Figure 234 Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information. NSA320 User’s Guide...
  • Page 426 This section shows you how to remove a public key certificate in Firefox 2. Open Firefox and click Tools > Options. Figure 235 Firefox 2: Tools Menu In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 236 Firefox 2: Options NSA320 User’s Guide...
  • Page 427 In the Delete Web Site Certificates dialog box, click OK. Figure 238 Firefox 2: Delete Web Site Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA320 User’s Guide...
  • Page 428 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Click Install to accept the certificate. Figure 239 Opera 9: Certificate signer not found NSA320 User’s Guide...
  • Page 429 Appendix D Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. Figure 240 Opera 9: Security information NSA320 User’s Guide...
  • Page 430 Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Open Opera and click Tools > Preferences. Figure 241 Opera 9: Tools Menu NSA320 User’s Guide...
  • Page 431 Appendix D Importing Certificates In Preferences, click Advanced > Security > Manage certificates. Figure 242 Opera 9: Preferences NSA320 User’s Guide...
  • Page 432 Appendix D Importing Certificates In the Certificates Manager, click Authorities > Import. Figure 243 Opera 9: Certificate manager Use the Import certificate dialog box to locate the certificate and then click Open. Figure 244 Opera 9: Import certificate NSA320 User’s Guide...
  • Page 433 Next, click OK. Figure 246 Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. NSA320 User’s Guide...
  • Page 434 This section shows you how to remove a public key certificate in Opera 9. Open Opera and click Tools > Preferences. Figure 247 Opera 9: Tools Menu In Preferences, Advanced > Security > Manage certificates. Figure 248 Opera 9: Preferences NSA320 User’s Guide...
  • Page 435 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button. NSA320 User’s Guide...
  • Page 436 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Click Continue. Figure 250 Konqueror 3.5: Server Authentication Click Forever when prompted to accept the certificate. Figure 251 Konqueror 3.5: Server Authentication NSA320 User’s Guide...
  • Page 437 Appendix D Importing Certificates Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 252 Konqueror 3.5: KDE SSL Information NSA320 User’s Guide...
  • Page 438 Figure 253 Konqueror 3.5: Public Key Certificate File In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 254 Konqueror 3.5: Certificate Import Result The public key certificate appears in the KDE certificate manager, Kleopatra. Figure 255 Konqueror 3.5: Kleopatra NSA320 User’s Guide...
  • Page 439 Appendix D Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page’s security details. NSA320 User’s Guide...
  • Page 440 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 257 Konqueror 3.5: Configure The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA320 User’s Guide...
  • Page 441 Appendix D Importing Certificates Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button. NSA320 User’s Guide...
  • Page 442 Appendix D Importing Certificates NSA320 User’s Guide...
  • Page 443: Appendix E Open Source Licences

    NOTICE AS BELOW FOR THE SOFTWARE. 1.Grant of License for Personal Use ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, non- sublicense, non-transferable license to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for up to the number...
  • Page 444 To the extent that the Software contains third party software, ZyXEL has no express or implied obligation to provide any technical or other support for such software. Please contact the appropriate software vendor or manufacturer directly for technical support and customer service related to its software and products. NSA320 User’s Guide...
  • Page 445 OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED THE PRODUCT’S PRICE. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. 8.Export Restrictions NSA320 User’s Guide...
  • Page 446 If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties. NSA320 User’s Guide...
  • Page 447 This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General NSA320 User’s Guide...
  • Page 448 General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a NSA320 User’s Guide...
  • Page 449 A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such NSA320 User’s Guide...
  • Page 450 License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as NSA320 User’s Guide...
  • Page 451 When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially NSA320 User’s Guide...
  • Page 452 For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not NSA320 User’s Guide...
  • Page 453 (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this NSA320 User’s Guide...
  • Page 454 Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NSA320 User’s Guide...
  • Page 455 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. NSA320 User’s Guide...
  • Page 456 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or NSA320 User’s Guide...
  • Page 457 Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to NSA320 User’s Guide...
  • Page 458 Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. NSA320 User’s Guide...
  • Page 459 License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in NSA320 User’s Guide...
  • Page 460 IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein, if any, are the property of their respective owners. NSA320 User’s Guide...
  • Page 461 GNU LESSER GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. NSA320 User’s Guide...
  • Page 462 •a) under this License, provided that you make a good faith effort to ensure that, in the event an Application does not supply the function or data, the facility still operates, and performs whatever part of its purpose remains meaningful, or NSA320 User’s Guide...
  • Page 463 (a) uses at run time a copy of the Library already present on the user's computer system, and (b) will operate properly with a modified version of the Library that is interface-compatible with the Linked Version. NSA320 User’s Guide...
  • Page 464 If the Library as you received it specifies that a proxy can decide whether future versions of the GNU Lesser General Public License shall apply, that proxy's public statement of acceptance of any version is permanent authorization for you to choose that version for the Library. ________________________________________ NSA320 User’s Guide...
  • Page 465 For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions. NSA320 User’s Guide...
  • Page 466 To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying. NSA320 User’s Guide...
  • Page 467 The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. NSA320 User’s Guide...
  • Page 468 License along with the Program. You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. 5. Conveying Modified Source Versions. NSA320 User’s Guide...
  • Page 469 (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for NSA320 User’s Guide...
  • Page 470 User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made. NSA320 User’s Guide...
  • Page 471 (if authorized by the copyright holders of that material) supplement the terms of this License with terms: •a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or NSA320 User’s Guide...
  • Page 472 (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. NSA320 User’s Guide...
  • Page 473 (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. NSA320 User’s Guide...
  • Page 474 License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the NSA320 User’s Guide...
  • Page 475 Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation. NSA320 User’s Guide...
  • Page 476 Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee. This Product includes rsync software under GPL 3.0 license GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 NSA320 User’s Guide...
  • Page 477 This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products NSA320 User’s Guide...
  • Page 478 An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for NSA320 User’s Guide...
  • Page 479 Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, NSA320 User’s Guide...
  • Page 480 You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: NSA320 User’s Guide...
  • Page 481 License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. NSA320 User’s Guide...
  • Page 482 User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is NSA320 User’s Guide...
  • Page 483 •a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or •b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or NSA320 User’s Guide...
  • Page 484 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of NSA320 User’s Guide...
  • Page 485 Program or any portion of it. 11. Patents. A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”. NSA320 User’s Guide...
  • Page 486 (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) NSA320 User’s Guide...
  • Page 487 If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. NSA320 User’s Guide...
  • Page 488 To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; NSA320 User’s Guide...
  • Page 489 <program> Copyright (C) <year> <name of author> This program comes with ABSOLUTELY NO WARRANTY; for details type `show This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. NSA320 User’s Guide...
  • Page 490 CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY NSA320 User’s Guide...
  • Page 491 License. Such a notice grants a world-wide, royalty-free license, unlimited in duration, to use that work under the conditions stated herein. The "Document", NSA320 User’s Guide...
  • Page 492 Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modification. Examples of transparent image formats include PNG, XCF NSA320 User’s Guide...
  • Page 493 The front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the covers, as NSA320 User’s Guide...
  • Page 494 Modified Version, together with at least five of the principal authors of the Document (all of its principal authors, if it has fewer than five), unless they release you from this requirement. NSA320 User’s Guide...
  • Page 495 M. Delete any section Entitled "Endorsements". Such a section may not be included in the Modified Version. N. Do not retitle any existing section to be Entitled "Endorsements" or to conflict in title with any Invariant Section. O. Preserve any Warranty Disclaimers. NSA320 User’s Guide...
  • Page 496 In the combination, you must combine any sections Entitled "History" in the various original documents, forming one section Entitled "History"; likewise combine any sections Entitled "Acknowledgements", and any sections Entitled "Dedications". You must delete all sections Entitled "Endorsements". NSA320 User’s Guide...
  • Page 497 In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the original version will prevail. If a section in the Document is Entitled "Acknowledgements", "Dedications", or "History", the requirement (section 4) to Preserve NSA320 User’s Guide...
  • Page 498 Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the "with...Texts." line with this: NSA320 User’s Guide...
  • Page 499 Original Code and Modifications, in each case including portions thereof. 1.4. "Electronic Distribution Mechanism" means a mechanism generally accepted in the software development community for the electronic transfer of data. 1.5. "Executable" means Covered Code in any form other than Source NSA320 User’s Guide...
  • Page 500 Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License. 1.10.1. "Patent Claims" means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, NSA320 User’s Guide...
  • Page 501 (50%) of the outstanding shares or beneficial ownership of such entity. 2. Source Code License. 2.1. The Initial Developer Grant. The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims: NSA320 User’s Guide...
  • Page 502 (a) under intellectual property rights (other than patent or trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered Code NSA320 User’s Guide...
  • Page 503 Covered Code in the absence of Modifications made by that Contributor. 3. Distribution Obligations. 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation NSA320 User’s Guide...
  • Page 504 You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change. You must include a prominent statement that NSA320 User’s Guide...
  • Page 505 Code that new knowledge has been obtained. (b) Contributor APIs. If Contributor's Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API, Contributor must also include this information in the LEGAL file. NSA320 User’s Guide...
  • Page 506 You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer. NSA320 User’s Guide...
  • Page 507 Initial Developer or such Contributor as a result of any such terms You offer. 3.7. Larger Works. You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger NSA320 User’s Guide...
  • Page 508 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that NSA320 User’s Guide...
  • Page 509 CODE IS WITH YOU. SHOULD ANY COVERED CODE PROVE DEFECTIVE IN ANY RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS NSA320 User’s Guide...
  • Page 510 Contributor Version against such Participant. If within 60 days of notice, a reasonable royalty and payment arrangement are not mutually agreed upon in writing by the parties or the litigation claim is not withdrawn, the rights granted by Participant to You under NSA320 User’s Guide...
  • Page 511 UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO NSA320 User’s Guide...
  • Page 512 With respect to disputes in which at least one party is a citizen of, or an entity chartered or registered to do business in the United States of America, any litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the Northern NSA320 User’s Guide...
  • Page 513 Initial Developer in the file described in Exhibit A. EXHIBIT A -Mozilla Public License. ``The contents of this file are subject to the Mozilla Public License Version 1.1 (the "License"); you may not use this file except in NSA320 User’s Guide...
  • Page 514 [NOTE: The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.] NSA320 User’s Guide...
  • Page 515 License. On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL file. many parts of this package are covered by the BSD license. These include central error processing code (sg_lib.[hc]), NSA320 User’s Guide...
  • Page 516 Winamp 2 plugin which is LGPL (see COPYING.LGPL). The documentation is released under the FDL (see COPYING.FDL). This Product includes boost software under below license BOOST SOFTWARE LICENSE o License text o Introduction o History o Rationale o FAQ NSA320 User’s Guide...
  • Page 517 The result is the Boost Software License: Boost Software License - Version 1.0 - August 17th, 2003 Permission is hereby granted, free of charge, to any person or organization NSA320 User’s Guide...
  • Page 518 [Standardizing the license will not] necessarily address the issue of satisfying corporate licensees. Each corporation will have its own concerns, based on their own experiences with software licensing and distribution and, if they're careful, NSA320 User’s Guide...
  • Page 519 (including intellectual property infringement liability), and requires that all subsequent copies of the code [except machine-executable object code], including partial copies and derivative works, include the license. NSA320 User’s Guide...
  • Page 520 To distinguish cases where we do not require reproduction of the copyrights and license, such as object libraries, shared libraries, and final program executables, from cases where reproduction is still required, such as distribution of self-extracting archives of source code or precompiled header files. More NSA320 User’s Guide...
  • Page 521 Can I use the Boost license for my own projects outside Boost? Sure; there are no restrictions on the use of the license itself. Is the Boost license "Open Source"? Yes. The Open Source Initiative certified the Boost Software License 1.0 in early 2008. NSA320 User’s Guide...
  • Page 522 Distributed under the Boost Software License, Version 1.0. This Product includes curl software under below license COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2009, Daniel Stenberg, <daniel@haxx.se>. All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose NSA320 User’s Guide...
  • Page 523 6.2 I have a closed-source program, can I use the libcurl library? Yes! libcurl does not put any restrictions on the program that uses the library. 6.3 I have a BSD licensed program, can I use the libcurl library? NSA320 User’s Guide...
  • Page 524 "all copies" and that you may not use the copyright holder's name when promoting your software. You do not have to release any of your source code. You do not have to reveal or make public any changes to the libcurl source NSA320 User’s Guide...
  • Page 525 Bell Communications Research, Inc (Bellcore). Regular expression support is provided by the PCRE library package, which is open source software, written by Philip Hazel, and copyright by the University of Cambridge, England. The original software is available from ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/ Apache License NSA320 User’s Guide...
  • Page 526 "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, NSA320 User’s Guide...
  • Page 527 Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." NSA320 User’s Guide...
  • Page 528 You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the NSA320 User’s Guide...
  • Page 529 The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside NSA320 User’s Guide...
  • Page 530 Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions NSA320 User’s Guide...
  • Page 531 Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. NSA320 User’s Guide...
  • Page 532 The Apache HTTP Server includes a number of subcomponents with separate copyright notices and license terms. Your use of the source code for the these subcomponents is subject to the terms and conditions of the following licenses. NSA320 User’s Guide...
  • Page 533 * computer system, and to alter it and redistribute it freely, subject to * the following restrictions: * 1. The author is not responsible for the consequences of use of this * software, no matter how awful, even if they arise from flaws in it. NSA320 User’s Guide...
  • Page 534 "macmartinized" polygon code copyright 1992 by Eric Haines, erich@eye.com For the server\util_md5.c component: ***************************************************************** ******* * NCSA HTTPd Server * Software Development Group * National Center for Supercomputing Applications * University of Illinois at Urbana-Champaign * 605 E. Springfield, Champaign, IL 61820 NSA320 User’s Guide...
  • Page 535 * All Rights Reserved. * Permission to use, copy, modify, distribute, and sell this software * and its documentation for any purpose is hereby granted without * fee, provided that the above copyright notice appear in all copies NSA320 User’s Guide...
  • Page 536 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS * SOFTWARE. * Copyright (c) 1991 Bell Communications Research, Inc. (Bellcore) NSA320 User’s Guide...
  • Page 537 * licence for the modifications made to that material. /* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest NSA320 User’s Guide...
  • Page 538 * The RSA copyright statement and Licence for that original material is * included below. This is followed by the Apache copyright statement and * licence for the modifications made to that material. /* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm NSA320 User’s Guide...
  • Page 539 * The apr_md5_encode() routine uses much code obtained from the FreeBSD 3.0 * MD5 crypt() function, which is licenced as follows: * ---------------------------------------------------------------------------- * "THE BEER-WARE LICENSE" (Revision 42): * <phk@login.dknet.dk> wrote this file. As long as you retain this notice you NSA320 User’s Guide...
  • Page 540 * Security, Inc. MD4 Message-Digest Algorithm" in all material * mentioning or referencing the derived work. * RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this NSA320 User’s Guide...
  • Page 541 * License is also granted to make and use derivative works provided * that such works are identified as "derived from the RSA Data * Security, Inc. MD4 Message-Digest Algorithm" in all material * mentioning or referencing the derived work. NSA320 User’s Guide...
  • Page 542 * RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this * software for any particular purpose. It is provided "as is" * without express or implied warranty of any kind. NSA320 User’s Guide...
  • Page 543 # publicity pertaining to distribution of the software without specific, # written prior permission. M.I.T. makes no representations about the # suitability of this software for any purpose. It is provided "as is" # without express or implied warranty. For the srclib\pcre\install-sh component: NSA320 User’s Guide...
  • Page 544 Perl 5 language. Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" directory, is distributed under the same terms as the software itself. NSA320 User’s Guide...
  • Page 545 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, NSA320 User’s Guide...
  • Page 546 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF POSSIBILITY OF SUCH DAMAGE. End PCRE LICENCE For the test\zb.c component: ZeusBench V1.01 =============== This program is Copyright (C) Zeus Technology Limited 1996. This program may be used and copied freely providing this copyright notice NSA320 User’s Guide...
  • Page 547 Written by Adam Twiss (adam@zeus.co.uk). March 1996 Thanks to the following people for their input: Mike Belshe (mbelshe@netscape.com) Michael Campanella (campanella@stevms.enet.dec.com) For the expat xml parser component: Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd and Clark Cooper NSA320 User’s Guide...
  • Page 548 CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ================================================== ================== This Product includes libtecla software under below license NSA320 User’s Guide...
  • Page 549 HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION NSA320 User’s Guide...
  • Page 550 * Neither the name of Rasterbar Software nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. NSA320 User’s Guide...
  • Page 551 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. NSA320 User’s Guide...
  • Page 552 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This Product includes libxml2 software under below license Except where otherwise noted in the source code (e.g. the files hash.c, list.c and the trio files, which are covered by a similar licence but NSA320 User’s Guide...
  • Page 553 University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Delaware makes no representations about the suitability this software for any purpose. It is provided "as is" without express or implied warranty. NSA320 User’s Guide...
  • Page 554 15.Torsten Duwe <duwe@immd4.informatik.uni-erlangen.de> Linux port 16.Dennis Ferguson <dennis@mrbill.canet.ca> foundation code for NTP Version 2 as specified in RFC-1119 17.John Hay <jhay@icomtek.csir.co.za> IPv6 support and testing 18.Dave Hart <davehart@davehart.com> General maintenance, Windows port interpolation rewrite. 19.Claas Hilbrecht <neoclock4x@linum.com> NeoClock4X clock driver NSA320 User’s Guide...
  • Page 555 Heath, ATOM, ACTS, KSI/Odetics; audio clock drivers: CHU, WWV/H, IRIG 35.Wolfgang Moeller <moeller@gwdgv1.dnet.gwdg.de> VMS port 36.Jeffrey Mogul <mogul@pa.dec.com> ntptrace utility 37.Tom Moore <tmoore@fievel.daytonoh.ncr.com> i386 svr4 port 38.Kamal A Mostafa <kamal@whence.com> SCO OpenServer port 39.Derek Mulcahy <derek@toybox.demon.co.uk> and Damon Hart-Davis <d@hd.org> ARCRON MSF clock driver NSA320 User’s Guide...
  • Page 556 Redistribution and use in source and binary forms of Linux-PAM, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain any existing copyright notice, and this entire permission notice in its entirety, including the disclaimer of warranties. NSA320 User’s Guide...
  • Page 557 * Frank Denis <j@pureftpd.org> with the help of all Pure-FTPd contributors. * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. NSA320 User’s Guide...
  • Page 558 The previous paragraph applies to the deliverable code in SQLite - those parts of the SQLite library that you actually bundle and ship with a larger application. Portions of the documentation and some code used as part of the build process NSA320 User’s Guide...
  • Page 559 We are not able to accept patches or changes to SQLite that are not accompanied by a statement such as the above. In addition, if you make changes or enhancements as an employee, then a simple statement such as the above is NSA320 User’s Guide...
  • Page 560 SQLite. The header comments on the SQLite source files exhort the reader to share freely and to never take more than one gives. In the spirit of that exhortation I make the following declarations: NSA320 User’s Guide...
  • Page 561 Signature: Date: Name (printed): This Product includes tz32 software under below license === asctime.c========== ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur David Olson. NSA320 User’s Guide...
  • Page 562 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANT[A]BILITY AND FITNESS FOR A PARTICULAR PURPOSE. === difftime.c ========== ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur David Olson. ============= ====== localtime.c ===== NSA320 User’s Guide...
  • Page 563 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANT[A]BILITY AND FITNESS FOR A PARTICULAR PURPOSE. =================== ====== private.h ===== ** This file is in the public domain, so clarified as of NSA320 User’s Guide...
  • Page 564 Compilation Copyright (c) 1995-2009 by Wei Dai. All rights reserved. This copyright applies only to this software distribution package as a compilation, and does not imply a copyright on any particular file in the package. The following files are copyrighted by their respective original authors, NSA320 User’s Guide...
  • Page 565 1. Any copy or modification of this compilation in any form, except in object code form as part of an application software, must include the above copyright notice and this license. 2. Users of this software agree that any modification or extension NSA320 User’s Guide...
  • Page 566 If this compilation is used in object code form in an application software, acknowledgement of the author is not required but would be appreciated. The contribution of any useful modifications or extensions to Wei Dai is not required but would also be appreciated. NSA320 User’s Guide...
  • Page 567 This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public Licence as published by the Free Software Foundation; either version 2 of the Licence, or (at NSA320 User’s Guide...
  • Page 568 To avoid misleading anyone as to the status of such modified files, you must delete this exception notice from such code and/or adjust the licensing conditions notice NSA320 User’s Guide...
  • Page 569 - SoftSqueeze is (c) Richard Titmuss and is licensed under GPL. - The CODE2000 TrueType Font is (c) James Kass and is Shareware. See Graphics/CODE2000.HTM for more information. - Certain integral components of Slim Server, such as CPAN modules, NSA320 User’s Guide...
  • Page 570 - Squeezebox2 firmware additionally contains the following code: - Kiss FFT, Copyright (c) 2003-2004, Mark Borgerding, licensed under a modified BSD license (reproduced below). - 16:16 fixed math routines, Copyright (c) 2001 Beartronics, licensed under the "Artistic License" (http://www.opensource.org/licenses/artistic-license.html). Copies of NSA320 User’s Guide...
  • Page 571 Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. NSA320 User’s Guide...
  • Page 572 Finally, any free program is threatened constantly by software NSA320 User’s Guide...
  • Page 573 Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's NSA320 User’s Guide...
  • Page 574 (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this NSA320 User’s Guide...
  • Page 575 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable NSA320 User’s Guide...
  • Page 576 (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. NSA320 User’s Guide...
  • Page 577 Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the NSA320 User’s Guide...
  • Page 578 It is not the purpose of this section to induce you to infringe any NSA320 User’s Guide...
  • Page 579 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. NSA320 User’s Guide...
  • Page 580 THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. NSA320 User’s Guide...
  • Page 581 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. NSA320 User’s Guide...
  • Page 582 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in NSA320 User’s Guide...
  • Page 583 License. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes PHP software, freely available from <http://www.php.net/software/>". THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND NSA320 User’s Guide...
  • Page 584 HTML-Parser, JSON-XS, Module-Build, Sub-Name, Template-Toolkit and XML- Parser software under the same terms as Perl ‘s license Perl5 is Copyright (C) 1993-2005, by Larry Wall and others. It is free software; you can redistribute it and/or modify it under the terms of either: NSA320 User’s Guide...
  • Page 585 P41-RR02188 by the National Institutes of Health. Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner. Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg NSA320 User’s Guide...
  • Page 586 If you have questions, ask. "Derived works" includes all programs that utilize the library. Credit must be given in user-accessible documentation. This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but not NSA320 User’s Guide...
  • Page 587 Although their code does not appear in gd, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions. NSA320 User’s Guide...
  • Page 588 Appendix E Open Source Licences NSA320 User’s Guide...
  • Page 589: Appendix F Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 590 God, or subjected to abnormal working conditions. Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, NSA320 User’s Guide...
  • Page 591 Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com North American products. NSA320 User’s Guide...
  • Page 592 Appendix F Legal Information NSA320 User’s Guide...
  • Page 593: Index

    187, 219, 376 activation backup 134, 135 adding a task archive BitTorrent 187, 195, 219 synchronization tutorial configuration tutorial link capture browser plugin backup files notifications restoring files by preferences backup job protection 221, 222 restoring files by NSA320 User’s Guide...
  • Page 594 YouTube 292, 293 notifications CoolIris activation COPY/SYNC button preferences 26, 216 configuration status example URL, download service 195, 243 synchronization downloading files copying contents duplexing temperature usage creating NSA320 User’s Guide...
  • Page 595 IP filtering 201, 202 over TLS iTunes server 186, 217, 218 passive mode transfer FTP Uploadr activation bandwidth limit configuration JBOD grace period 164, 168, 169, 170 server entry jumbo frames 174, 177 FTPES NSA320 User’s Guide...
  • Page 596 186, 190 resume configuration schedule iTunes server 186, 218 membership PPPoE 174, 183 groups 304, 309 activation mirroring preferences, download service moving contents print server configuration name protect backup backup tutorial naming server protection, download service 221, 222 NSA320 User’s Guide...
  • Page 597 159, 164, 168 setup degraded BitTorrent RAID 0 169, 171 COPY/SYNC button RAID 1 169, 171, 172 download service recovering Flickr resynchronization FTP Uploadr status 161, 164 media server USB devices 166, 167 print server volumes 159, 168 NSA320 User’s Guide...
  • Page 598 159, 164, 168 file access degraded files not in proper folders RAID 0 169, 171 folder access RAID 1 169, 171, 172 forgot password recovering 357, 358 LED indicators resynchronization status 161, 164 local user share access storage methods NSA320 User’s Guide...
  • Page 599 51, 64 status web publishing 187, 204, 225 activation example port number troubleshooting web security wizard workgroup name YouTube access rights activation authorization configuration 292, 293 grace period video category zPilot NSA320 User’s Guide...

Table of Contents