Media Server NSA Series Version 4.70 Edition 3 Quick Start Guide User’s Guide Default Login Details Web Address nsa310 nsa310s nsa320 www.zyxel.
IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system. Every effort has been made to ensure that the information in this manual is accurate. Related Documentation • Quick Start Guide The Quick Start Guide shows how to connect the NSA and get up and running right away.
Contents Overview Contents Overview User’s Guide ........................................................................................................................... 15 Getting to Know Your NSA .........................................................................................................17 NAS Starter Utility ......................................................................................................................21 zCloud ......................................................
Contents Overview 4 Media Server User’s Guide
Table of Contents Table of Contents Contents Overview ..............................................................................................................................3 Table of Contents .................................................................................................................................5 Part I: User’s Guide ......................................................................................... 15 Chapter 1 Getting to Know Your NSA...............................
Table of Contents 4.1 Overview ...........................................................................................................................................41 4.2 Accessing the NSA Web Configurator ..............................................................................................41 4.2.1 Access the NSA Via NAS Starter Utility ...................................................................................42 4.2.2 Web Browser Access ..............................................
Table of Contents 5.9.1 Creating a User Account .........................................................................................................82 5.9.2 Creating a Share .....................................................................................................................84 5.9.3 Creating a Group .....................................................................................................................86 5.9.4 Accessing a Share From Windows Explorer .......................
Table of Contents 7.3 What You Need to Know .................................................................................................................151 7.4 The Firmware Upgrade Screen .......................................................................................................153 7.5 Package Management Screen .......................................................................................................153 7.5.1 Displaying the Package Information .................................
Table of Contents 10.3 What You Need to Know ...............................................................................................................185 10.4 FTP Server ....................................................................................................................................187 10.5 The Media Server Screens .........................................................................................................188 10.5.1 The Media Server Share Publish Screen ............
Table of Contents 11.5.2 NFS Session .......................................................................................................................232 11.6 Syslog Server Screen ..................................................................................................................233 11.7 TFTP Server Screen 11.8 eMule Screens ...................................................................................................................235 ...........................................
Table of Contents Chapter 12 Auto Upload ......................................................................................................................................285 12.1 Overview .......................................................................................................................................285 12.2 What You Can Do .........................................................................................................................285 12.3 What You Need to Know ......
Table of Contents Chapter 17 Shares................................................................................................................................................317 17.1 Overview .......................................................................................................................................317 17.2 What You Can Do .........................................................................................................................317 17.3 The Shares Screen ......
Table of Contents 20.1 Troubleshooting Overview ............................................................................................................347 20.2 Power, Hardware, Connections, and LEDs ...................................................................................347 20.3 NAS Starter Utility .........................................................................................................................349 20.4 NSA Login and Access ............................................
Table of Contents 14 Media Server User’s Guide
P ART I User’s Guide 15
C HAPT ER 1 Getting to Know Your NSA 1.1 Overview This chapter covers the main features and applications of the NSA. Use the NSA to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA. • Use the COPY/SYNC button to copy or synchronize files between the NSA and USB devices like card readers, MP3 players, mass storage devices, and digital cameras without using a computer. • Have the NSA handle large file downloads.
Chapter 1 Getting to Know Your NSA Above is the NSA in a home network. Users back up and share data on the NSA. The media player plays the NSA’s media files on the TV. A USB hard drive provides extra storage space and files are copied directly from the USB mass storage device to the NSA. Place the NSA behind a firewall and/or IDP (Intrusion Detection and Prevention) device to protect it from attacks from the Internet.
Chapter 1 Getting to Know Your NSA Note that both SATA and eSATA hard disks are treated as internal or SATA volumes in the Storage screen (Section 8.3 on page 165). Any hard disk connected to the USB port(s) is considered an external or USB volume. 1.1.3 COPY/SYNC Button Use the COPY/SYNC button on the front panel to copy or synchronize files between a connected USB device and the NSA. See Section 10.11 on page 212 for more details on how to configure the copy/sync settings. 1.1.
Chapter 1 Getting to Know Your NSA 20 Media Server User’s Guide
C HAPT ER 2 NAS Starter Utility Note: Installing this version of the NAS Starter Utility will uninstall previous versions. 2.1 Overview Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it. Make sure you have a backup of any existing data in the hard disk before installing it in the NSA. Using the initialization wizard formats the hard disk and deletes all data in the process.
Chapter 2 NAS Starter Utility Start the NAS Starter Utility (click the icon in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility). The first time you open the NAS Starter Utility the discovery screen appears as follows. Figure 3 NAS Seeker The following table describes the labels in this screen. Table 2 NAS Seeker 22 LABEL DESCRIPTION Connect Select a NSA and click this to connect to it. Refresh Click this to refresh the screen.
Chapter 2 NAS Starter Utility 2.4 Main NAS Starter Utility Screen The main NAS Starter Utility screen displays after you select an NSA in the NSA Seeker screen. Figure 4 NAS Starter Utility Main Screen The following table describes the labels in this screen. Table 3 NAS Starter Utility Main Screen LABEL DESCRIPTION ? Click this to display the utility help. Configuration Click this to run the initialization wizard (see the utility help for details), configure system settings (see Section 2.
Chapter 2 NAS Starter Utility Table 3 NAS Starter Utility Main Screen LABEL DESCRIPTION Capacity This shows the NSA’s total, in-use, and remaining storage capacity. Media Player Click this to go to the Playzone screens where you can play media files (see Section 4.4 on page 45 ). zPilot Click this to launch the zPilot to drag and drop files onto the NSA. Network Drive Click this to add the NSA as a network drive in your computer’s Windows Explorer.
Chapter 2 NAS Starter Utility The utility opens the NSA’s directory in Windows Explorer. Figure 6 Directory 2.5 Import Files or Folders with zPilot In the main NAS Starter Utility screen click zPilot to be able to drag and drop files from your computer to the NSA. Enter the administrator user name and password and click Login. Figure 7 Login The zPilot icon displays. Figure 8 zPilot Drag files onto the zPilot icon to move them to the NSA.
Chapter 2 NAS Starter Utility Public folder. For folders of files you are prompted to choose the target destination. The zPilot icon shows the transfer rate. Figure 9 zPilot Showing Transfer Rate Double-click the zPilot icon to display status details about the file transfers. Select an entry and click Pause, Resume, or Remove to control the transfer. After the transfer finishes you can select the entry and click Open Destination Folder to see the file on the NSA.
Chapter 2 NAS Starter Utility new drive in Windows Explorer (My Computer) where you can access and use it like your computer’s other drives. Figure 12 Network Drive 2.7 Manage the Device In the main NAS Starter Utility screen click Configuration > Administration to log into the NSA’s administration screens where you can manage the NSA. Enter the administrator user name and password and click Login. Figure 13 Login See Section 4.5 on page 57 for more on the administration screens. 2.
Chapter 2 NAS Starter Utility Click Configuration > System Setting in the main utility screen to display the following screen. Figure 14 NAS Starter Utility > Configuration > System Setting The following table describes the labels in this screen. Table 4 NAS Starter Utility > Configuration > System Setting LABEL DESCRIPTION Server Name Specify a name to uniquely identify the NSA on your network. You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character.
C HAPT ER 3 zCloud 3.1 zCloud Install the zCloud app from the Apple App store or Google Play on your iOS or Android phone or tablet to access the NSA’s media files from your mobile device and upload media files from your mobile device to the NSA. Note: The NSA325 v2, NSA325, NSA320S, NSA320, and NSA310S with firmware version 4.61 or higher supports this app.
Chapter 3 zCloud 30 2 Tap Add a NAS and enter your NSA’s IP address and your user name and password and tap Connect. The next time you use the zCloud NAS media function you can select the NSA from the list. 3 Go to the NSA’s published music, photo, or video files or upload media files to the NSA.
Chapter 3 zCloud 3.1.2 NSA Media Music Screens 1 Browse the NSA’s published music files by folders, all music files, or by artist.
Chapter 3 zCloud 2 Tap a song to play it or press your mobile device’s menu button to use select-n-go to select multiple files to play or download. When using select-n-go the top of the zCloud screen has a SELECT ALL option and a three squares menu option with Play Selected and Download Selected options. The playback screen displays song information and the playback progress and lets you control the playback.
Chapter 3 zCloud 4 When you finish viewing the NSA’s media files you can press your mobile device’s menu button to get the option to log out from the NSA (Logout). 3.1.3 NSA Media Photo Screens 1 Browse the NSA’s published photos by folders, all photos, or by date.
Chapter 3 zCloud 2 Tap a photo to display it or press your mobile device’s menu button to use select-n-go to select multiple files to download. With a photo displayed, press your mobile device’s menu button to get the option to start a slideshow.
Chapter 3 zCloud 3.1.4 NSA Media Video Screens 1 Browse the NSA’s published video files by folders or all video files. 2 Tap a video to play it or press your mobile device’s menu button to use select-n-go to select multiple files to download.
Chapter 3 zCloud 3.1.5 zCloud Uploader 36 1 Tap Uploader to upload music, photo, or video files from your mobile device to the NSA. Select a destination folder on the NSA and the photos, music, or video files to upload. 2 For example, if you selected Photo, select the folder containing the photos you want to upload to the NSA. Then select the photos and press your mobile device’s menu button to display the Upload option.
Chapter 3 zCloud 3 Press the mobile device’s menu button for options to select all files (Select All), show download and upload details (Show Download / Upload), and log out from the NSA (Logout). Here is an example of the download and upload details. 3.1.6 Browse zCloud Downloaded Media 1 In the main zCloud app screen, tap Downloaded Media to access music, photo, or video files downloaded from the NSA to your mobile device.
Chapter 3 zCloud 2 Tap the type of downloaded media files to display (photos for example). Tap a photo to display it or press your mobile device’s menu button to use select-n-go in the options menu to select multiple files to delete. 3 38 When using select-n-go the top of the zCloud screen has a SELECT ALL option and a three squares menu option with a Delete option.
Chapter 3 zCloud 4 After you display a photo, you can press your mobile device’s menu button to see the option to start a slideshow.
Chapter 3 zCloud 40 Media Server User’s Guide
C HAPT ER 4 Web Configurator Basics 4.1 Overview This chapter describes how to access the NSA web configurator and provides an overview of its screens. The web configurator is an HTML-based management interface that allows easy NSA setup and management using an Internet browser. Use Internet Explorer 7.0, Mozilla Firefox 3.6, Safari 5, Google Chrome 10, or later versions of these browsers. The recommended screen resolution is 1024 by 768 pixels or higher.
Chapter 4 Web Configurator Basics 4.2.1 Access the NSA Via NAS Starter Utility If you don’t know the IP address of the NSA, then use the NAS Starter Utility to find it. Refer to the Quick Start Guide for how to install and run the NAS Starter Utility. See Chapter 2 on page 21 for more information on the NAS Starter Utility. Figure 15 NAS Starter Utility Main Screen 4.2.2 Web Browser Access Configure the server name of your NSA using the Network Configuration screen (Section 2.
Chapter 4 Web Configurator Basics 4.3 Login The default username and password are ‘admin’ and ‘1234’ respectively. Enter your username and password. See Chapter 15 on page 307 for how to create other user accounts. If you use the option to stay logged in (assuming you do not log out), make sure you keep your computer secure from unauthorized access. Click User Login to go to the Playzone screens where you can play media files. Click Administrator Login to go to the advanced administration screens.
Chapter 4 Web Configurator Basics If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore.
Chapter 4 Web Configurator Basics 4.4 Playzone Screens The Playzone Home screen displays after you log in using the User Login button. Figure 19 Playzone Home Note: The Web Configurator session automatically times out if it is left idle for 15 minutes. Simply log back into the NSA if this happens to you. The Playzone Home screen displays icons for the various features you can access.
Chapter 4 Web Configurator Basics Table 5 Playzone Home Screen Icons (continued) ICON DESCRIPTION Use Playzone Settings to edit general Playzone screen settings and account passwords. Administrators can use Application Zone to manage the NSA’s applications. Normal users can go to the management page of installed, non-built-in packages. Administrators can use Administrator to go to the administrator configuration screens.
Chapter 4 Web Configurator Basics 4.4.1 Media Server Screens Use the Playzone media server screens to view published photos and play published music and video files. This following figures shows a folder within the Music media server screens with the files as thumbnails and as a list.
Chapter 4 Web Configurator Basics Figure 21 Music (List) A This table describes common labels in the Playzone media server screens. Not every item displays in every screen. Table 7 Playzone Media Server Screens LABEL DESCRIPTION ZyXEL The path of the current view. Click ZyXEL to return to the Playzone Home screen. Click an underlined link to go to that location in the path. Music, Photo, or Video indicates the category of files. Artist, All, Folder, Current Playlist indicates the current view type.
Chapter 4 Web Configurator Basics Table 7 Playzone Media Server Screens LABEL DESCRIPTION Add to Current Playlist Click this to add the selected music file to the currently playing playlist. Refresh Click this to update the display in the screen. Now Playing This link is available when a song is playing. Click it to see details about the song that is currently playing. 4.4.2 Now Playing (Music) A Now Playing link displays when a song is playing. Click it to display a panel like the following.
Chapter 4 Web Configurator Basics If a photo’s Exif data includes GPS location data, click the latitude or longitude link to display the location in Google Maps. Click Clear to delete the markers of other photos and only display the current photo’s marker. Figure 24 Google Maps 4.4.4 Slideshow (Photos) In a Photo menu click the SlideShow button to display the menu’s files as a slideshow.
Chapter 4 Web Configurator Basics 4.4.5 File Browser Click File Browser to open the following screen. Use the file browsing screens to play, open, upload, and download files. A share is a set of user access permissions for a specific folder on a volume (gives someone access to a folder). It is equivalent to the Windows concept of a shared folder, but the access rights are independent of the folder (you configure the share and the folder separately).
Chapter 4 Web Configurator Basics The following table describes the labels in this screen. Table 8 File Browser LABEL DESCRIPTION Up Click this to go to the next higher layer in the share’s folder tree. Name This column identifies the names of folders and files in the share. Click a file’s file name to open the file or save it to your computer. Click a folder’s name to display the folder’s contents. Size This column displays a file’s size in bytes.
Chapter 4 Web Configurator Basics Table 8 File Browser (continued) LABEL DESCRIPTION Restore When you are in a recycle bin folder, select a folder or file and click this to restore it. Refresh Click this to update the information displayed in the screen. Note: Do not refresh the screen while an upload or download is in progress. 4.4.5.
Chapter 4 Web Configurator Basics Table 9 File Browser > Configure Share (continued) LABEL DESCRIPTION Share Access Select who can access the files in the share and how much access they are to be given. If you publish the share to the media server or the web, all users will have at least readonly access to the share, regardless of what you configure here. Select Keep it private to owner to allow only the share owner to read files in the share, delete files in the share and save files to the share.
Chapter 4 Web Configurator Basics 4.4.7 Application Zone Administrators can click Application Zone to go to a screen where you can enable or disable various applications for file sharing and downloading. Normal users can go to the management page of installed, non-built-in packages. Figure 28 Application Zone The following table describes the labels in the this screen. Table 10 Application Zone LABEL DESCRIPTION Name This is the name of the application. Version This is the version number of the item.
Chapter 4 Web Configurator Basics Table 10 Application Zone (continued) LABEL DESCRIPTION Resume Select the Flickr or Youtube Uploadr entry and click this to resume current uploading. Refresh Update the list of applications in the screen. 4.4.8 Playzone Settings Click Playzone Settings to open the following screen. Use this screen to change general Play zone screen settings and account passwords. Figure 29 Playzone Settings The following table describes the labels in this screen.
Chapter 4 Web Configurator Basics Table 11 Playzone Settings (continued) LABEL DESCRIPTION Double Click Behavior Setting Select Replace current playlist and start to play to have double clicking a song cause the NSA to immediately stop any currently playing song and start playing the double-clicked song. Select Append to current playlist to have double clicking a song add a song to the end of the current playlist.
Chapter 4 Web Configurator Basics The Status screen is the first advanced administration screen that displays. See Chapter 6 on page 147 for more information about the Status screen. Figure 30 Status 1 2 3 4 4.5.1 Global Administration Icons The icons and language label at the top-right of the screen ( 1 ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels.
Chapter 4 Web Configurator Basics Table 12 Global Labels and Icons LABEL/ICON DESCRIPTION Home Click this to go to the Playzone Home screen. Logout Click this at any time to exit the web configurator. This is the same as clicking the Logout link at the bottom of the navigation panel. 4.5.2 Navigation Panel The navigation panel on the left of the Web Configurator screen ( 2 ) contains screen links. Click a link to display sub-links. There are no sub-links for the Status screen.
Chapter 4 Web Configurator Basics Table 13 Screens Summary (continued) LINK SCREEN FUNCTION Applications FTP Server Enable FTP file transfer to/from the NSA, set the number of FTP connections allowed, an FTP idle timeout, and the character set. Media Server Enable or disable the sharing of media files and select which shares to share. iTunes Server Use the iTunes server to share media files with iTunes users on your network. Download Service Have the NSA handle large file downloads.
Chapter 4 Web Configurator Basics Table 13 Screens Summary (continued) LINK SCREEN FUNCTION Protect Backup Create and customize backup jobs. Restore Restore previous backups made with the NSA. Logout Click this to exit the web configurator. This is recommended to prevent unauthorized administrator access to the NSA. 4.5.3 Main Window The main window ( 3 rest of this document. ) shows the screen you select in the navigation panel. It is discussed in the 4.5.
Chapter 4 Web Configurator Basics Table 14 Common Configuration Screen Icons (continued) ICON DESCRIPTION Scan Disk Click this to scan a hard disk for file system errors. Eject Click this before you remove an external hard drive so that you do not lose data that is being transferred to or from that hard drive. Locate Click this to cause the LED on the external storage device to blink.
C HAPT ER 5 Tutorials 5.1 Overview This chapter provides tutorials that show how to use the NSA.
Chapter 5 Tutorials 64 1 Click Start > Control Panel. Set View by to Category and click Network and Internet. 2 Click View network computers and devices.
Chapter 5 Tutorials 3 The NSA icon displays twice because the NSA is both a media server and a storage device. Doubleclick either NSA icon to open the Web Configurator login screen. 5.2.1 If the NSA Icon Does Not Display The network containing the NSA must be set as a home or work network in order for the NSA icons to display. If the network containing the NSA displays as “Public”: 1 Click Network and Sharing Center and then the network’s link (circled in the figure).
Chapter 5 Tutorials 2 Use the Set Network Location screen to set the network’s location to home or work. 5.2.2 NSA Icon Right-click Options Right-click the NSA’s icon to see these options: • Install/Uninstall: Click Install to add the NSA as a device in your computer. After you install the NSA you can see it in the computer’s list of devices (see Section 5.5 on page 69. Click Uninstall to remove the NSA from the list of devices installed in your computer.
Chapter 5 Tutorials • Properties opens a window of NSA details and troubleshooting information. • Manufacturer identifies the company that produced the NSA. • Model identifies the NSA model. • Model number identifies the NSA model number. • Device webpage shows the IP address for accessing the Web Configurator. • Serial number is unavailable because the NSA does not have one. • MAC address is the NSA’s unique physical hardware address (MAC). You need the MAC address to register the product at myZyXEL.
Chapter 5 Tutorials 1 Click Start > Control Panel > View network status and tasks (or Network and Sharing Center if you view the Control Panel by icons). 2 Click See full map (1 in the figure). The network containing the NSA must be set as a home or work network in order to use the full map feature.
Chapter 5 Tutorials 5.4 Playing Media Files in Windows 7 In Windows 7, the NSA automatically displays as a library in Windows Media Player. Figure 31 NSA in Windows Media Player 5.5 Windows 7 Devices and Printers After you use the NSA’s network icon’s install option you can manage the NSA from the Windows 7 Devices and Printers folder.
Chapter 5 Tutorials Click Start > Control Panel > Hardware and Sound > Devices and Printers. Select the NSA icon to display information about the NSA. Double-click the NSA icon to open a properties window (see page 67). Right-click the icon to display these options: • Open Media Player opens the computer’s default media player. • Create shortcut has Windows make a desktop shortcut to this screen. • Troubleshoot opens Windows’ device troubleshooting wizard.
Chapter 5 Tutorials 5.5.1 Windows 7 Desktop Shortcut This is the NSA’s desktop shortcut. Double-click it to open a properties window (see page 67). 1 Right-click the NSA’s desktop shortcut icon to see these options: • Open Media Player opens the computer’s default media player. • Open file location takes you to the Windows 7 Devices and Printers folder. • Download NAS Starter Utility downloads the NSA’s Starter Utility.
Chapter 5 Tutorials • Create shortcut has Windows make a desktop shortcut to this icon. • Delete sends the shortcut to the recycle bin. • Rename lets you change the name of the shortcut. • Troubleshoot opens Windows’ device troubleshooting wizard. • Remove device removes the NSA from the Windows 7 Devices and Printers folder. • Properties opens a window of details about the shortcut. 5.6 Creating a Volume in a 2-Bay NSA This section shows you how to create a volume in your 2-bay NSA.
Chapter 5 Tutorials 5.6.2 Migrate Button Do the following steps to create a RAID 1 volume. 1 Once you install a second SATA hard disk in the NSA, the Storage > Volume screen shows the Migrate button. 2 Click the Migrate button and you can see the following progress bar. Wait for the RAID 1 volume to be created. This may take quite a while depending on how much data you have in the original volume. 5.6.
Chapter 5 Tutorials This deletes all existing data in the SATA hard disk. Make sure you have a backup of any existing data in the hard disk. The NSA starts creating the volume and you can see the following progress bar. Wait for the RAID 1 volume to be created. 3 The Storage > Volume screen displays with your RAID 1 volume. 5.7 Creating a Volume in a 1-Bay NSA This section shows you how to create a volume on your 1-bay NSA. Creating a volume deletes all existing data in the SATA or eSATA hard disk.
Chapter 5 Tutorials Your NSA has a single bay for a SATA (Serial Advanced Technology Attachment) hard disk. JBOD is the only storage method for the NSA310S and the default storage method if you are using a single hard disk in the NSA310. This JBOD volume shows up in the Storage > Volume screen (Section 8.2 on page 162) as follows.
Chapter 5 Tutorials 2 Click the Migrate button and you can see the following progress bar. Wait for up to 10 minutes for the RAID 1 volume to be created. 5.7.3 Create a SATA Volume Button If you do not have an existing volume in the Storage > Volume screen, do the following steps to create a RAID 1 volume. 1 In the Storage > Volume screen, click Create a SATA Volume. 2 In the Disk Configuration screen, you can select the storage method. • Type in the Volume Name for your RAID 1 volume.
Chapter 5 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the RAID 1 volume to be created. 3 The Storage > Volume screen displays with your RAID 1 volume.
Chapter 5 Tutorials 5.7.4 Creating a PC Compatible Volume You can use your eSATA hard disk as a separate storage volume. The following section shows you how to create a PC Compatible Volume. Use this storage method if you have an eSATA hard disk that will be connected to a Windows computer when it is not connected to the NSA. However, the computer’s platform (for example, Windows XP SP2) should support the file system you selected for the eSATA hard disk.
Chapter 5 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the volume to be created. 3 The Storage > Volume screen displays with your PC Compatible Volume.
Chapter 5 Tutorials 5.7.4.1 Checking Your PC Compatible Volume The files in the eSATA hard disk that you configured as a PC Compatible Volume should be accessible when you connect the eSATA hard disk to your computer. You can configure the features of your NSA to save files to your eSATA hard disk. For example, you can refer to Section 5.11 on page 106 to use the Broadcatching feature of your NSA to download files to your eSATA disk.
Chapter 5 Tutorials 3 Disconnect the eSATA hard disk from the NSA. Connect the eSATA hard disk to your computer. On some systems, you can see the following notification. 4 The computer assigns a letter to the eSATA hard disk (drive F in this example) that is accessible from the My Computer screen. Double click the eSATA drive and check your files. They should be the same files that are in the My NSA > Share Browser screen. 5.
Chapter 5 Tutorials 1 2 In the Storage > Volume screen, select the volume you want to delete and click the delete icon. A confirmation window appears as follows. Click Yes. This deletes all existing data in the volume. Make sure you have a backup of any existing data in the hard disk. 5.9 File Sharing Tutorials The following sections cover using the NSA for file sharing.
Chapter 5 Tutorials 1 At the NSA web configurator login screen enter the administrator account and password and click Administrator Login to go to the advanced administration screens. 2 Click Sharing > Users to open the Users screen. Then click Add User.
Chapter 5 Tutorials 3 Configure the screen as follows and write down the username and password to give to Jimmy. If the username and password are the same as Jimmy’s Windows login, Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn’t get to configure the whole NSA. Click Apply to create the account. 4 The account now displays in the Users screen.
Chapter 5 Tutorials 1 In the NSA’s administration web configurator screens, click Shares > Add Share. Click Add Share to create a new share. 2 Specify a name for the share and select which volume it should be on. Configure the screen as follows. Then click Edit.
Chapter 5 Tutorials 3 Configure the screen as follows to give Jimmy full access right to the share. Then click Apply to create the share. Now that Bob has created Jimmy’s share, he can go through the steps again to create another share for Kevin. 5.9.3 Creating a Group After creating user accounts for Jimmy and Kevin, Bob wants to create a group for his sons and another one for the parents.
Chapter 5 Tutorials 2 Specify a name for the group. Select the user(s) you want to add to the group from the Available User(s) list and click Add Selected User(s). Configure the screen as follows. Then click Apply to create the group. Now that Bob has created a group for Jimmy and Kevin, he can go through the steps again to create another group for the parents. Then he can see the rest of the tutorials for how to use the groups in assigning access rights to shares. 5.9.
Chapter 5 Tutorials 88 3 Select the network drive that you want to map the NSA to from the Drive list box. This example uses I. Then browse to and select the share on the NSA. Click Finish. 4 Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login.
Chapter 5 Tutorials 5 After the mapping is done, you can then simply copy and paste or drag and drop files from/to your local computer’s drives to or from this network folder. Just like the NSA’s share was another folder on your computer. Now that Bob has mapped Jimmy’s share to Jimmy’s computer, he can go through the steps again to map Kevin’s share to Kevin’s computer. 5.9.5 Accessing a Share Using FTP You can also use FTP to access the NSA.
Chapter 5 Tutorials 2 Enter your password and click Login. 3 Now you can access files and copy files from/to your local computer’s drives to or from this network folder. 5.9.6 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator.
Chapter 5 Tutorials 1 Log into the NSA web configurator (see Section 4.3 on page 43) using the appropriate user name and password (this example uses Jimmy’s) and click File Browser. Click a share (the Jimmy share in this example) to see the top level of the share’s contents. 2 Click a folder’s file name to browse the folder. You can open files or copy them to your computer. You can also create new folders and upload additional files to the share. 3 Click the logout icon when your are done. 5.
Chapter 5 Tutorials 2 Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a datasheet for ZyXEL’s GS-2024 (a device for making phone calls over the Internet). Note: Make sure the link opens either the file you want or a pop-up window about how to handle the file. Note: It is also OK for the link to open a .torrent file.
Chapter 5 Tutorials 4 Log into the NSA web configurator (see Section 4.3 on page 43) using the administrator account and click Application Zone and the Application Zone > Download Service link. 5 Click Add.
Chapter 5 Tutorials 6 Right-click the URL field and select Paste. 7 The URL displays in the URL field. Click Apply. 8 After a few moments, the download task appears in the Download Service screen’s Active tab. The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share’s download folder. See Section 5.9.4 on page 87, Section 5.9.5 on page 89, or Section 5.9.6 on page 90 for how to access a share. 5.10.
Chapter 5 Tutorials Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7. Internet Explorer 1 Open the folder containing the link capture browser plugin. 2 Double-click on the plugin to display the following screen. Click I Agree to begin installation. 3 Select a location to save the plugin and click Install. Close the screen once the installation is complete.
Chapter 5 Tutorials 4 Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting. 5 Enter the NSA’s web address. The default is ‘nsa’ followed by the number of your model (‘nsa320’ for example). Then click Apply. A warning message displays asking for confirmation. Click OK to apply the setting. Firefox 96 1 Open Firefox.
Chapter 5 Tutorials 3 To install the plugin, drag and drop the plugin to Firefox. 4 The following screen displays. Click Install Now.
Chapter 5 Tutorials 98 5 You need to restart Firefox after the installation. 6 When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’s web address.
Chapter 5 Tutorials 7 Enter the NSA’s web address. The default is ‘nsa’ followed by the number of your model (‘nsa320’ for example). Then click OK. 5.10.3 Using the Link Capture Browser Plugin Once you install the plugin, you may begin sending download links to the NSA from your web browser. This example shows how to send a download link to the NSA’s download service using the link capture browser plugin. 1 Open your Internet browser (this example uses Firefox).
Chapter 5 Tutorials 100 4 The login screen shows up. Enter your NSA’s login information and click Login to send the link to the download service. A confirmation message displays. 5 Log into the NSA web configurator (see Section 4.3 on page 43) using the administrator account and click Application Zone and the Application Zone > Download Service link.
Chapter 5 Tutorials 6 The download task appears in the Download Service screen’s Active or Queue tab. It may appear in the Completed tab if the NSA already finished downloading the file or it may appear in the Error tab if the NSA failed to download the file. By default the NSA stores all downloads in the admin share’s download folder. See Section 5.9.4 on page 87, Section 5.9.5 on page 89, or Section 5.9.6 on page 90 for how to access a share. 5.10.
Chapter 5 Tutorials 3 When it is not the download time, you see a message in the Download Service screen, indicating the active download period. Click Applications > Download Service > Preferences > P2P download to open the following screen. Enter the information below and then click Apply. Here is a list of P2P download settings you want to configure for your NSA: • Limit the maximum upload rate to 20 KB/s. Enter this value in the Max. upload rate field.
Chapter 5 Tutorials • Scroll down and click Edit IP Filter. Use an online IP filter table from http://www.bluetack.co.uk/ config/level1.gz for example to protect P2P downloads. Enter the URL in the Update IP Filter from the Internet Every Week field. 5.10.5 Using Download Service Notification Use an RSS feed reader on your computer to keep track of files the NSA has downloaded. The following examples show how to subscribe to the NSA’s download service notifications. See Section 10.12.
Chapter 5 Tutorials Internet Explorer 7 Example 104 1 After you activate download service notification, click the RSS feed icon. 2 The following screen displays. Select Subscribe to this feed. 3 The following screen displays. Click Subscribe.
Chapter 5 Tutorials 4 Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Firefox Example 1 After you activate download service notification, click the RSS feed icon. 2 The following screen displays. Select Live Bookmarks from the drop-down list and click Subscribe Now. 3 The following screen displays. Select Bookmarks Menu and click Add.
Chapter 5 Tutorials 4 From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list. 5.11 Broadcatching Tutorial Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV Internet television channel. See Section 10.9 on page 204 for more on the broadcatching service.
Chapter 5 Tutorials 2 Find the link for the RSS feed containing the channel you want to add. In this example, http:// reviews.cnet.com/4520-11455_7-6333605-1.html has an RSS link for subscribing to the CNET Live podcast. However this is not the link for the actual RSS feed. Click the link to go to another screen that has RSS feed links. Note: Make sure the link goes to the actual RSS feed instead of to another list of links or information about the channel. One way to test this is by clicking the link.
Chapter 5 Tutorials 108 3 Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer). 4 Log into the NSA web configurator (see Section 4.3 on page 43) using the administrator account and click Administration > Applications > Broadcatching. 5 Click Add Channel.
Chapter 5 Tutorials 6 Right-click the URL field and select Paste. 7 The URL displays in the URL field. 8 Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later. 9 Select a policy for what items to delete. This example keeps the most recent 10 items. 10 Click Apply. 11 After a few moments, the channel appears in the Broadcatching screen where you can select items you want to download.
Chapter 5 Tutorials 5.12 Printer Server Tutorial Do the following to have the NSA let computers on your network share a printer. See www.zyxel.com for a list of compatible printers. 1 Make sure the NSA is on and the SYS light is on steady (not blinking). 2 Use a USB cable to connect the printer’s USB port to one of the NSA’s USB ports. Make sure the printer is also connected to an appropriate power source. NSA 110 3 Turn on the printer. 4 The NSA detects the printer after a few moments.
Chapter 5 Tutorials 6 If you get a warning screen, click the option that lets you continue (Yes in this example). 7 If your computer does not already have the printer’s driver installed, you will need to install it. In this example, click OK. 8 Use the wizard screens to install the printer driver on the computer. You may need to get the file from the printer’s CD or the printer manufacturer’s website (the driver is not installed on the NSA).
Chapter 5 Tutorials 5.13 Copy and Flickr Auto Upload Tutorial Amy received some photos taken during her best friend’s wedding and saved the files on a USB disk. She wants to save a copy of the photos in the NSA and upload the photos to her Flickr account. Amy has to activate the NSA’s auto upload feature. See Section 12.4 on page 285 for more details on setting up a Flickr account for auto upload. In this example Amy select the NSA’s photo share for auto upload.
Chapter 5 Tutorials 5 The NSA also automatically uploads the copied files to Flickr. r 5.14 FTP Uploadr Tutorial FTP Uploadr can automatically upload files saved on the NSA to a remote FTP server. Amy wants to share files on her NSA with Susan. They each have an NSA at home, so Susan has to set her NSA as an FTP server for Amy to automatically send files using FTP Uploadr. l Amy’s NSA Susan’s NSA To set the NSA as an FTP server, click Applications > FTP to open the FTP screen.
Chapter 5 Tutorials Susan also has to create a user account and share on her NSA for Amy to upload files. The share is used for files uploaded from Amy’s NSA. Amy will then use the following information to configure FTP Uploadr on her NSA. Table 15 FTP Uploadr Tutorial: FTP Server Information FTP Domain Name or IP Address example2.com FTP User Name Amy FTP Password xxxxx Share (Remote Path) Amy This is how Amy would set up the NSA’s FTP Uploadr.
Chapter 5 Tutorials 4 In the FTP Uploadr screen, click Preferences to configure the auto upload settings. 5 Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List.
Chapter 5 Tutorials 6 Amy also set the Bandwidth Limit to 20 KB/s so that the upload doesn’t slow down her Internet connection. Now Amy has set up FTP Uploadr to send files to Susan’s NSA. Every time Amy adds new files or renames files in the video share, these new or modified files will be uploaded automatically to the Amy share on Susan’s NSA. Similarly, Susan can go through the steps described above to configure FTP Uploadr on her NSA.
Chapter 5 Tutorials 5.15.1 Customizing the NSA’s Certificate 1 Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit. 2 Next, let’s modify the certificate by changing the Common Name to this NSA’s host name of “nsa”, the Organization to “ZyXEL” and the Key Length to 2048.
Chapter 5 Tutorials 3 The NSA restarts its network services and returns you to the login screen. 5.15.2 Downloading and Installing Customized Certificate 1 118 Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download.
Chapter 5 Tutorials 2 Save the file to your computer. 3 Find the certificate file on your computer and double-click it.
Chapter 5 Tutorials 120 4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. In the Certificate dialog box, click Install Certificate. 5 In the Certificate Import Wizard, click Next.
Chapter 5 Tutorials 6 Leave Automatically select certificate store based on the type of certificate selected and click Next. 7 In the Completing the Certificate Import Wizard screen, click Finish.
Chapter 5 Tutorials 8 If you are presented with another Security Warning, click Yes. 9 Finally, click OK when presented with the successful certificate installation message. 5.15.3 Turn on the NSA’s Web Security Now that you have customized the NSA’s certificate and installed it in your computer, you can turn on security for your Web Configurator sessions. This example uses Firefox 3.0.
Chapter 5 Tutorials 1 Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. 2 A warning screen pops up if applying your change may disconnect some users. Click Apply to continue.
Chapter 5 Tutorials 124 3 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. 4 Click Add Exception.
Chapter 5 Tutorials 5 Click Get Certificate.
Chapter 5 Tutorials 6 126 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View.
Chapter 5 Tutorials 7 The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close.
Chapter 5 Tutorials 8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. 9 The login screen displays. Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s certificate so they can check it before adding a security exception (as in steps 6 to 7 on pages 126 to 127).
Chapter 5 Tutorials 5.16 Using FTPES to Connect to the NSA This section covers how to use FTP over Explicit TLS/SSL with the NSA for secure FTP transfers. Before you go through this section, read Section 5.15 on page 116 to configure HTTPS. This example uses FileZilla. 1 Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA’s address. • Set the Servertype to FTPES - FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect.
Chapter 5 Tutorials 2 A security warning screen displays. The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). If they match, click OK. The shares and folders to which Gonzo has access display. Now you can use FTP to securely transfer files to or from the NSA.
Chapter 5 Tutorials 5.17.1 Finder 1 Open a new Finder window. 2 Select All under the SHARED sidebar. Look for the NSA from the Network list.
Chapter 5 Tutorials 3 Expand the NSA to display the shares you may access. 5.17.2 Go Menu 4 132 In the Finder, click Go > Connect to Server.
Chapter 5 Tutorials 5 When the Connect to Server dialog box opens, enter smb:// and the NSA’s IP address in the Server Address field. You may also click Browse to have the Mac search for the NSA. Click Connect. 6 Once you establish the connection, you can access the NSA from the Finder or directly from the desktop. 5.18 How to Use the BackupPlanner Note: The screens and links in this section appear only after you have installed and enabled BackupPlanner.
Chapter 5 Tutorials 1 Click Protect > Backup > Add Job. Figure 32 Protect > Backup 2 Identify the backup job and select Archive. New files are often added to the shares that you need to back up and existing files are not frequently changed so select Incremental. The NSA does a full backup first and later only copies source files that are new and/or modified since the last backup. This example sets the NSA to do another full backup after every four incremental backups.
Chapter 5 Tutorials 3 Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection.
Chapter 5 Tutorials 4 In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the target NSA so you can leave the encryption off, too. Have the NSA keep 3 backups. Figure 35 Protect > Backup > Add Job: Step 3 5 Set the frequency to Weekly. Schedule the backup for 5:00 every Saturday morning. Protect > Backup > Add Job: Step 4 5.18.
Chapter 5 Tutorials 1 Click Protect > Backup > Add Job. Figure 36 Protect > Backup Name the backup job and select Synchronization. You want only your current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder. Figure 37 Protect > Backup > Add Job: Step 1 2 Select the folder that needs to be mirrored (your Private folder in this example) and Remote.
Chapter 5 Tutorials • Click Next. Figure 38 Protect > Backup > Add Job: Step 2 3 Click OK in the warning dialog box. Figure 39 Protect > Backup > Add Job: Step 3 4 For this example, assume the connection to the German branch office is a good one and not many files need to be backed up so leave the compression off. • Turn on the encryption to protect these sensitive files during the transfer. The final files stored on the remote NSA will be unencrypted (usable).
Chapter 5 Tutorials • Click Next. Figure 40 Protect > Backup > Add Job: Step 3 5 Schedule the backup to occur every morning at 3:00 and click Done. Figure 41 Protect > Backup > Add Job: Step 4 You do not need to use a special restore process to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share. 5.18.
Chapter 5 Tutorials 1 Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 42 Protect > Backup 2 Select which backup to use and click Next.
Chapter 5 Tutorials 3 Select the files and folders you want to restore and click Next. Figure 44 Protect > Backup > Restore Archive: Step 2 4 Select the original location and click Done.
Chapter 5 Tutorials 5 The NSA restores the files into the share. When it finishes you can access the files. Figure 46 Protect > Backup > Restore Archive: Progress 5.18.4 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore archived files by the backup job. In this example, the NSA’s RAID array failed. You’ve replaced the hard drives and re-configured the RAID. To restore by backup files: 1 Click Protect > Restore.
Chapter 5 Tutorials 2 Select the backup job and backup time and click Next. Figure 48 Protect > Restore: Step 2 3 Select everything in the share except the recycle folder. Click Next.
Chapter 5 Tutorials 4 Browse to the folder where you want to put the files. Click Done. Figure 50 Protect > Restore: Step 4 5 144 The NSA restores the files and you can use them again.
P ART II Technical Reference 145
C HAPT ER 6 Status Screen 6.1 Overview This chapter describes the Status screen, which is the first advanced administration screen that displays. 6.2 The Status Screen Use the login screen’s Administrator Login button or click Administration in the Playzone Home screen (Section 4.5 on page 57) to open the Web Configurator. You can also view the status screen, by clicking Status on the top-left of the navigation panel.
Chapter 6 Status Screen The following table describes the labels in this screen. Table 16 Status LABEL DESCRIPTION Status Click this to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the Edit icon to go to the screen where you can configure this. Model Name This displays which model this NSA device is. Firmware Version This is the NSA firmware version.
Chapter 6 Status Screen Table 16 Status (continued) LABEL DESCRIPTION External Volume (or USB Volume) This displays the volumes created on USB hard drives connected to the NSA. USB disks are numbered in the order that you insert USB devices. Click the Edit icon to open the Storage screen. You can create and edit the external volume. See Chapter 8 on page 161 for more details. Status This icon indicates whether the volume is healthy, degraded, or down. Name This field shows the name for the volume.
Chapter 6 Status Screen 150 Media Server User’s Guide
C HAPT ER 7 System Setting 7.1 Overview This chapter gives an overview of the various features included in the system setting screens. Upgrade the NSA firmware. Use package management to add more useful applications in your NSA. Identify your NSA on the network and set the time that the NSA follows for its scheduled tasks/logs. 7.2 What You Can Do • Use the Firmware / Packages screens (Section 7.4 on page 153 to Section 7.
Chapter 7 System Setting • SMART - Use S.M.A.R.T. (Self Monitoring, Analysis, and Reporting Technology) to monitor hard disks. It detects and reports the reliability of hard disks using standard indicators, enabling administrators to anticipate possible disk failures. • SqueezeCenter - This enables you to manage a Logitech's Squeezebox device connected to the NSA. • Syslog - Use this to configure the NSA to accept syslog logs from syslog clients.
Chapter 7 System Setting 7.4 The Firmware Upgrade Screen Use this screen to upgrade the NSA firmware. You should first have downloaded the latest firmware files from the ZyXEL website. Do not turn off the NSA while it is upgrading the firmware or you may render it unusable. Click System Setting > Firmware / Packages to open the following screen. Figure 52 System Setting > Firmware / Packages The following table describes the labels in this screen.
Chapter 7 System Setting Click System Setting > Firmware / Packages > Package to open the following screen. Figure 53 System Setting > Firmware / Packages > Package The following table describes the labels in this screen. Table 18 System Setting > Firmware / Packages > Package LABEL DESCRIPTION Package Management Retrieve List From Internet Click this to retrieve a list of available packages from the ZyXEL website.
Chapter 7 System Setting Table 18 System Setting > Firmware / Packages > Package (continued) LABEL DESCRIPTION Disable This option is only for non built-in packages. Choose the item(s) on the list and click this to disable the application on your system. You have to enable the application again in order to use it. This is only available if you have previously installed the package. Package Info Status Select an item on the list and click this to display information about the package. See Section 7.5.
Chapter 7 System Setting 7.5.1 Displaying the Package Information Select an item on the list and click Package Info. Use this screen to check detailed information about the application. Figure 54 System Setting > Firmware / Packages > Package > Package Info The following table describes the labels in this screen. Table 19 System Setting > Firmware / Packages > Package > Package Info LABEL DESCRIPTION Status This is the current status of the application.
Chapter 7 System Setting 7.6 The Server Name Screen Click System Setting > Server Name to open the following screen. Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup. Note: CIFS cannot be disabled on the NSA. Figure 55 System Setting > Server Name The following table describes the labels in these screens.
Chapter 7 System Setting Click the System Setting link in the navigation panel and then click the Date/Time link to access the Date/Time screen. Figure 56 System Setting > Date/Time The following table describes the labels in this screen. Table 21 System Setting > Date/Time LABEL DESCRIPTION Current System Date Time Setting Current Time This field displays the time used by your NSA for its logs and alerts. Current Date This field displays the date used by your NSA for its logs and alerts.
Chapter 7 System Setting Table 21 System Setting > Date/Time (continued) LABEL Synchronize Now DESCRIPTION Click this for the NSA to retrieve the correct time from the configured time server right away. Time Zone Time Zone Choose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT).
Chapter 7 System Setting 160 Media Server User’s Guide
C HAPT ER 8 Storage 8.1 Overview Several NSA features require a valid internal volume. This chapter covers the management of volumes and disks (both internal and external). Use the Storage screen (Section 8.2 on page 162) to display information on all volumes, create internal and external volumes, and configure the volume’s properties. 8.1.
Chapter 8 Storage Note: 1-bay models configure the internal hard disk (SATA) as JBOD by default. You can modify it if you attach a second internal hard disk (an eSATA hard disk). Finding Out More See Section 8.6 on page 169 for more technical background information on storage. 8.2 The Storage Screen The Storage screen allows you to create and edit volumes in the NSA. 8.2.1 Disk Replacement Restrictions See the Quick Start Guide for information on replacing disks in the NSA.
Chapter 8 Storage 8.2.2 Storage Screen Click Storage > Volume in the navigation panel to display the following screen. Use this screen to display internal and external volumes on the NSA. Note: It is recommended to scan the volume every three months or 32 reboots. Figure 57 Storage > Volume The following table describes the labels in this screen.
Chapter 8 Storage Table 22 Storage > Volume (continued) LABEL DESCRIPTION Capacity This field shows total disk size, the percentage of the volume being used and the percentage that is available. Actions This field displays icons allowing you to edit, scan, repair, expand, migrate, or delete a volume. You can also locate or eject an external volume. Note: If you delete a volume, all data in the volume disk(s) is erased. You see a warning screen before you delete a volume.
Chapter 8 Storage If it’s down, then the only indication is that you can no longer transfer files to/from the shares in the down volume. If it’s degraded, then file transfer to/from the shares in the degraded volume will be slower. Note: There is no explicit message from CIFS that tells users their volume is degraded or down. 8.
Chapter 8 Storage The following table describes the labels in this screen. Table 23 Storage > Create an Internal Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters. To avoid confusion, it is highly recommended that each volume use a unique name. Acceptable characters are all alphanumeric characters, " " [spaces], "_" [underscores], and "." [periods]. The first character must be alphanumeric (A-Z 0-9). The last character cannot be a space " ".
Chapter 8 Storage Note: Once you create the first volume on the NSA, it is recommended to restart the NSA for better performance. 8.4 Editing a Volume Click an internal volume’s Edit icon in the Storage screen as shown in Figure 57 on page 163 to open the following screen. Use this screen to change the volume’s name. Figure 60 Storage > Edit The following table describes the labels in this screen.
Chapter 8 Storage The following table describes the labels in this screen. Table 25 Storage > Volume > Scan LABEL DESCRIPTION Auto File Repair Select this to have the NSA automatically attempt to repair any errored files it detects during the scan. This may also result in the NSA finding some files and placing them in the Lost and Found share. Apply Click this to have the NSA scan the volume. Cancel Click this to close this screen without scanning the volume. 8.
Chapter 8 Storage Table 26 Storage > Create an External Volume (continued) LABEL DESCRIPTION File System Select the file system you want the new volume to use. Windows file systems NTFS: Recommended. FAT32: Newer, and more efficient than FAT16. Supports a volume size of up to 2 TB (Tera Bytes) and individual file sizes of up to 4 GB. FAT16: Compatible with older Windows operating systems. Supports volume and file sizes of up to 2 GB. Linux file systems EXT2: Older file system.
Chapter 8 Storage Performance rankings are approximations. Table 27 RAID Quick Comparison RAID Level 0 1 Number of Disks 2 2 Capacity S*N S*N/2 Storage Efficiency 100% 50% Fault Tolerance None YYYY Y YYYY Read Performance YYYY YYY Write Performance YYYY YYY Availability 8.6.2 Choosing a Storage Method for a Volume The following is a guide to help you choose a storage method for the various number of disks supported on the NSA. See Section 8.6.
Chapter 8 Storage These are some terms that you need to know in order to understand storage systems. • Mirroring In a RAID system using mirroring, all data in the system is written simultaneously to two hard disks instead of one. This provides 100% data redundancy as if one disk fails the other has the duplicated data. Mirroring setups always require an even number of drives.
Chapter 8 Storage RAID 0 RAID 0 spreads data evenly across two or more disks (data striping) with no mirroring nor parity for data redundancy, so if one disk fails the entire volume will be lost. The major benefit of RAID 0 is performance. The following figure shows two disks in a single RAID 0 volume. Data can be written and read across disks simultaneously for faster performance.
Chapter 8 Storage Typical applications for RAID 1 are those requiring high fault tolerance without need of large amounts of storage capacity or top performance, for example, accounting and financial data, small database systems, and enterprise servers. RAID and Data Protection If a hard disk fails and you’re using a RAID 1 volume, then your data will still be available (but at degraded speeds until you replace the hard disk that failed and resynchronize the volume).
Chapter 8 Storage 174 Media Server User’s Guide
C HAPT ER 9 Network 9.1 Overview This chapter discusses the network configuration screens. The Network screens allow you to configure TCP/IP and PPPoE settings for the NSA. 9.2 What You Can Do • Use the TCP/IP screen (Section 9.4 on page 176) to assign the NSA a dynamic or static IP address and DNS information. • Use UPnP port mapping (Section 9.5 on page 179) to automatically configure your Internet gateway’s firewall and Network Address Translation (NAT) to allow access to the NSA from the Internet.
Chapter 9 Network Jumbo Frames Jumbo frames are Ethernet frames larger than 1500 bytes. They enable data transfer with less overhead. The bigger the frame, the better the network performance. Your network equipment such as computers, switches and routers must be capable of supporting jumbo frames. You also need to enable jumbo frames in all related network devices. To use jumbo frames, your LAN must support 1 Gbps transmissions (Gigabit Ethernet).
Chapter 9 Network Note: If you change the NSA’s IP address, you need to log in again after you apply changes. Figure 64 Network > TCP/IP The following table describes the labels in this screen. Table 31 Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NSA get IP address information automatically. If no IP address information is assigned, the NSA uses Auto-IP to assign itself an IP address and subnet mask.
Chapter 9 Network Table 31 Network > TCP/IP (continued) LABEL IPv6 Settings DESCRIPTION Click this to configure the following IPv6 settings. Mode • • • Select Auto to have the Device use the IPv6 prefix from the connected router’s Router Advertisement (RA) to generate an IPv6 address. Select Static if you have a fixed IPv6 address assigned by your ISP. Select Disable to not assign any IPv6 address for the NSA. Address - Enter the IPv6 address assigned by your ISP.
Chapter 9 Network 9.5 UPnP Port Mapping Screen Use UPnP (Universal Plug and Play) port mapping to allow access from the WAN to services you select on the NSA. It is recommended that you place the NSA behind an Internet gateway firewall device to protect the NSA from attacks from the Internet (see RAID and Data Protection on page 173 for firewall type suggestions). Many such Internet gateways use UPnP to simplify peer-to-peer network connectivity between devices.
Chapter 9 Network For example, if the NSA’s IP address was 192.168.1.33 when you applied the UPnP Port Mapping screen’s settings and the NSA later gets a new IP address of 192.168.1.34 through DHCP, WAN access stops working because the Internet gateway still tries to forward traffic to IP address 192.168.1.33.
Chapter 9 Network HTTP (Web Configurator) You can use UPnP port mapping to allow access to the NSA’s management screens. If you use UPnP to allow web configurator access from the WAN, you may want to use a different WAN port number (instead of the default of port 80) to make it more secure. Remember to use the custom port number when accessing the NSA’s web configurator from the Internet.
Chapter 9 Network The following table describes the labels in this screen. Table 32 Network > UPnP > Port Mapping LABEL DESCRIPTION LAN Use these fields to specify what port the Internet gateway uses to connect from its LAN port to the service on the NSA. Service Name This read-only field identifies a service on the NSA. LAN Port Specify the port number (1~65,536) the Internet gateway needs to use to connect from its LAN port to the service on the NSA.
Chapter 9 Network Click Network > PPPoE in the navigation panel to open the following screen. Figure 69 Network > PPPoE The following table describes the labels in this screen. Table 33 Network > PPPoE LABEL DESCRIPTION Status Status This field displays the status of PPPoE connection. IP Address This field displays the IP address of your PPPoE connection. IP Subnet Mask This field displays the IP subnet mask of your PPPoE connection.
Chapter 9 Network Telnet access lets you use line commands to configure the NSA. Use these commands at your own risk. The vendor takes no responsibility for any changes you make using the commands. Click Network > Telnet in the navigation panel to open the following screen. Figure 70 Network > Telnet The following table describes the labels in this screen. Table 34 Network > Telnet LABEL DESCRIPTION Enable Telnet Service Select this to enable Telnet access to the NSA.
C HAPTER 10 Applications 10.1 Overview This chapter discusses the features in the Application screens. The NSA contains various applications for file sharing and downloading. 10.2 What You Can Do • Use the FTP Server screen (Section 10.4 on page 187) to configure settings for FTP file transfers to/from the NSA. • Use the Media Server screens (Section 10.5 on page 188) to share files with media clients. • Use the iTunes Server screens (Section 10.
Chapter 10 Applications It requests for a mutual method of encryption from the FTP server for its file transfer sessions. Your FTP client must be set to use FTPES as in the following example. Figure 71 FTP Client Example Media Server The media server feature lets anyone on your network play video, music, and photos from the NSA (without having to copy them to another computer). The NSA can function as a DLNA-compliant media server and/or an iTunes server.
Chapter 10 Applications For example, if you want to share photos in a FamilyPhotos share, you could “web publish” it and others could use a web browser to access the photos at http://my-NSA’s-IP-Address/MyWeb/ FamilyPhotos. Broadcatching Broadcatching is the downloading of digital content from Internet feeds. Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio shows, podcasts (audio files), and blogs.
Chapter 10 Applications The following table describes the labels in this screen. Table 35 Applications > FTP LABEL DESCRIPTION FTP Enable FTP You can use FTP to send files to the NSA or get files from the NSA. Select this check box to allow users to connect to the NSA via FTP; otherwise clear the check box. Connection Limit Enter the maximum number of concurrent FTP connections allowed on the NSA in this field. See your screen for your model’s connection limit.
Chapter 10 Applications Click Applications > Media Server to open the following screen. Use this screen to view the media server’s status and rebuild the media server database. Figure 73 Applications > Media Server > Media Server The following table describes the labels in this screen. Table 36 Applications > Media Server > Media Server LABEL DESCRIPTION Enable Twonky Media Server Select this to have the NSA share the media files in the shares selected in the Share Publish tab.
Chapter 10 Applications Table 37 Applications > Media Server > Share Publish LABEL DESCRIPTION Publish Photos Select this to give media clients access to the share’s photo files. Publish Videos Select this to give media clients access to the share’s video files. Apply Click this to save your changes. Reset Click this to restore your previously saved settings. 10.5.2 The Media Server SqueezeCenter Screen SqueezeCenter enables you to manage a Logitech's Squeezebox device connected to the NSA.
Chapter 10 Applications The following table describes the labels in this screen. Table 39 Applications > iTunes Server LABEL DESCRIPTION Enable iTunes Server Check this to let anyone on your network use iTunes to play music files in the published shares. Apply Click this to save your changes. Reset Click this to restore your previously saved settings. 10.7 The Download Service Screen The Download Service screen allows you to download files from the Internet.
Chapter 10 Applications Table 40 Applications > Download Service (continued) LABEL DESCRIPTION Preferences Click this to open a screen where you can set the default location for saving downloads and configure your P2P download settings. Refresh Click this to update the information displayed on the screen. Select Files A single P2P download torrent file is often for multiple files. If you do not need all of the files the torrent file specifies, click this to select which files to download.
Chapter 10 Applications Table 40 Applications > Download Service (continued) LABEL Status DESCRIPTION The following icons show the download’s status. Completed: The NSA has downloaded the whole file. Seeding: The download is finished and the NSA is allowing other P2P users to download it. Downloading: The NSA is getting the file. Queued: The download is waiting in line for the NSA to download it. Pause: The download has been manually stopped. Select it and click Resume to continue it.
Chapter 10 Applications 10.7.1 Adding a Download Task Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 5.10 on page 91 provides a tutorial on adding a download task. Figure 78 Applications > Download Service > Add The following table describes the labels in this screen.
Chapter 10 Applications Table 41 Applications > Download Service > Add LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 10 Applications 10.7.2 Configuring General Download Settings Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period.
Chapter 10 Applications The following table describes the labels in this screen. Table 42 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded.
Chapter 10 Applications Table 42 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Download Service is active in the time period (hh:mm hh:mm) Specify the time period for the NSA to download files. Note: If you also configured the Power On/Off Schedule feature in the Power Management screen, make sure your active download period does not conflict with the power-off period. Apply Click this to save your changes.
Chapter 10 Applications The following table describes the labels in this screen. Table 43 Applications > Download Service > Preferences > P2P download LABEL DESCRIPTION Port Number Assign a port number for P2P downloads. You can select a number from 2 to 65536. It is recommended to use a port number greater than 1025. DHT Select Enable or Disable to use Distributed Hash Table (DHT) or not.
Chapter 10 Applications Table 43 Applications > Download Service > Preferences > P2P download LABEL DESCRIPTION Reset Click this to restore your previously saved settings. Cancel Click this to return to the previous screen without saving. 10.7.4 Edit IP Filter Use this screen to enable or disable IP filtering for P2P downloads. IP filtering blocks IP addresses known to share fake files. You can either get an IP filter table from a website or use your own table.
Chapter 10 Applications 10.7.5 Selecting Files to Download Select an item in the Applications > Download Service screen’s list and click Select Files to open the following screen. Use this screen to select which of the torrent’s files to download. Section 5.10 on page 91 provides a tutorial on adding a download task. Figure 82 Applications > Download Service > Select Files The following table describes the labels in this screen.
Chapter 10 Applications 10.7.6 Displaying the Task Information Select an item on the list and click Task Info. Use this screen to check detailed information about the task. Figure 83 Applications > Download Service > Task Info The following table describes the labels in this screen. Table 46 Applications > Download Service > Task Info 202 LABEL DESCRIPTION Status This is the current status of the task. Name This is the name of the task. Size This is the size of the file to be downloaded.
Chapter 10 Applications Table 46 Applications > Download Service > Task Info LABEL DESCRIPTION Priority Use this field to set the priority for downloading the task. Select Auto to have the NSA automatically determine the task’s priority. Select High to have the NSA download this file before the other files. Comment Enter a description for this task. Click Apply to save the description. Start Time This field displays when the NSA started to download files.
Chapter 10 Applications Table 47 Applications > Web Publishing LABEL DESCRIPTION Port Number Specify a port number for accessing the published share websites hosted on the NSA. If you enter a number other than 80, make sure you include it when telling others how to access the web-published share. For example, say you specified port 8080, the NSA’s IP address is 192.168.1.23, and the name of the web-published share is FamilyPhotos. You would have to enter “http://192.168.1.
Chapter 10 Applications Click Applications > Broadcatching to open the following screen. Figure 85 Applications > Broadcatching The following table describes the labels in this screen. Table 48 Applications > Broadcatching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button. A screen opens for you to subscribe to the feed. When you are done, the feed’s channel and contents display in the Applications > Broadcatching screen.
Chapter 10 Applications Table 48 Applications > Broadcatching LABEL Item Name DESCRIPTION These are the downloadable files. The following icons show the file’s status in the NSA. Completed: The NSA has downloaded the whole file. Double-click the item to go to the Download Service screen where you can see the file’s name and location. Seeding: The NSA downloaded the complete file and NSA is sharing it with other P2P download users. Double-click the item to go to the Download Service screen.
Chapter 10 Applications select policies for downloading and deleting the channel’s items. Section 5.11 on page 106 provides a tutorial on adding a broadcatching channel. Figure 87 Applications > Broadcatching > Add Channel The following table describes the labels in this screen. Table 49 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Subscribe to Channel Feed Paste (or type) the URL of the feed for the channel to which you want to subscribe into this field.
Chapter 10 Applications Table 49 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 10 Applications 10.9.2 Editing a Broadcatching Channel Click Applications > Broadcatching, then select a channel and click Edit Channel to open a similar Edit screen. Use the Edit Channel screen to change the download or delete policies. Figure 88 Applications > Broadcatching > Edit Channel The following table describes the labels in this screen.
Chapter 10 Applications Table 50 Applications > Broadcatching > Edit Channel LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 10 Applications Click Applications > Print Server to open the following screen. Figure 89 Applications > Print Server The following table describes the labels in this screen. Table 51 Applications > Print Server LABEL DESCRIPTION Refresh Click this to update the list of printers and print jobs. The table lists printers and their queued print jobs. Click a column’s heading to sort the entries by that criteria.
Chapter 10 Applications 10.11 The Copy/Sync Button Screen The Copy/Sync button on the front panel allows you to copy or synchronize files between a connected USB device and the NSA. Click Applications > Copy/Sync Button to open the following screen. Figure 91 Applications > Copy/Sync Button The following table describes the labels in this screen. Table 53 Applications > Copy/Sync Button LABEL DESCRIPTION Copy Settings NSA Copy Target Select the NSA share to use with the copy function.
Chapter 10 Applications Table 53 Applications > Copy/Sync Button LABEL DESCRIPTION USB Volume If your USB device has multiple partitions, select which partition to use with the synchronization function. Sync Direction Select USB -> NSA to synchronize files from your USB device to the NSA. Select NSA -> USB to synchronize files from the NSA to your USB device. Select NSA <-> USB to synchronize files in both directions simultaneously.
Chapter 10 Applications A link for the NSA in iTunes under SHARED. Click it to display the NSA’s published media files as shown next. Figure 92 NSA link in iTunes 10.12.2 Download Service The NSA’s download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA. This can free up your computer’s system resources. The download service also handles your broadcatching downloads. See Section 10.
Chapter 10 Applications If you already have the torrent file saved on your computer, you can just specify its location when adding a download task through the web configurator. Another method is to use FTP or a CIFS program (Windows Explorer for example) to copy the torrent file into the torrent folder. The NSA automatically uses the torrent file. After your P2P download and sharing are finished, you can go to the incoming folder within the destination share or folder and delete the .
Chapter 10 Applications Note: The download service notification only keeps track of files downloaded via P2P download. Figure 94 Download Service Notification 10.12.5 P2P Download Security When you download using P2P, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall.
Chapter 10 Applications • Anti-virus to check files you download for computer viruses. P2P Download and Your Firewall The anti-virus feature on a firewall probably cannot check P2P downloads for viruses, so use antivirus software on your computer to scan the NSA for viruses. When you download using P2P download, many other P2P download users are also trying to download the file from you.
Chapter 10 Applications HTML (web-based) configuration interface to set this up (see the firewall’s manual for details). You may also have to configure a corresponding firewall rule. Figure 97 Firewall Configured to Allow Incoming P2P Download Requests 10.12.
Chapter 10 Applications 2 Now open your web browser and type in the address of the NSA’s FamilyPhotos web page. In this example, the NSA’s IP address is 192.168.1.33, and the name of the web-published share is FamilyPhotos. So you would enter “http://192.168.1.33/MyWeb/FamilyPhotos/” in your browser’s address bar. Then press [ENTER] or click Go. A screen displays listing the share’s files. Figure 99 Browsing to an NSA Share Example • Click a file’s link to open the file.
Chapter 10 Applications Web Publishing Port Number If the web-published shares use a port number other than 80 (the normal port for web traffic), users must include it after the NSA’s IP address in order to access the NSA’s web-published shares. For example, say you specified port 8080, the NSA’s IP address is 192.168.1.23, and the name of the web-published share is FamilyPhotos. You would have to enter “http://192.168.1.
Chapter 10 Applications 10.12.9 Printer Sharing The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA’s USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers. Figure 101 Printer Sharing 10.12.10 Copying Files You can copy files from a USB device to the NSA or from the NSA to a USB device. Simply press and release the COPY/SYNC button to start copying files. See Section 10.
Chapter 10 Applications The following figure illustrates how copying files works when you copy files from a USB device to the NSA. The same concept applies when you copy files from the NSA to a USB device. Figure 102 Copying Files Example Before Copy NSA USB B A C A After Copy NSA USB A B A B C Both storage devices contain file A. • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA. 10.12.
Chapter 10 Applications The following figure illustrates how synchronization works when you synchronize files from a USB device to the NSA. The same concept applies when you synchronize files from the NSA to a USB device. Figure 103 Synchronizing Files Example 1 Before Sync NSA USB B A A C After Sync NSA USB A B A B Both storage devices contain A. • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA.
Chapter 10 Applications The following figure illustrates how synchronization works when you synchronize files in both directions simultaneously. Figure 104 Synchronizing Files Example 2 Before Sync NSA USB C B A D B A (new) (new) After Sync NSA USB A B (new) (new) C D A B C D (new) (new) A on the USB device and B on the NSA are modified more recently. • File A from the USB device replaces file A on the NSA. • File B from the NSA replaces file B on the USB device.
C HAPTER 11 Packages 11.1 Overview This chapter describes features you can add to the NSA by installing packages. See Section 7.5 on page 153 for how to manage packages. 11.2 What You Can Do • Use the SMART screens (Section 11.3 on page 225) to view your NSA hard disk(s) statistics and monitor their performance. • Use the DyDNS screen (Section 11.4 on page 229) to configure the domain name settings of your NSA. • Use the NFS screen (Section 11.
Chapter 11 Packages Self Monitoring, Analysis, and Reporting Technology (S.M.A.R.T) detects and reports the reliability of hard disks using standard indicators (called “attributes”), to help you anticipate possible disk failures. Note: The fields included the screens may vary depending on the hard disk that you use. Click Storage > S.M.A.R.T to open the following screen. Figure 105 Storage > S.M.A.R.T The following table describes the labels in this screen. Table 54 Storage > S.M.A.R.
Chapter 11 Packages 11.3.1 SMART Brief Summary Use this screen to display information about the volume, such as the hard disk vendor, specific model, hard disk capacity and so on. Click Brief Summary in the Storage > S.M.A.R.T screen to display the following. Figure 106 Storage > S.M.A.R.T: Brief Summary The following table describes the labels in this screen. Table 55 Storage > S.M.A.R.
Chapter 11 Packages 11.3.2 SMART Full Summary Use this screen to display more details information about the volume. Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 107 Storage > S.M.A.R.T: Full Summary The following table describes the labels in this screen. Table 56 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION ID This is the identification number used to tag a hard disk attribute. This is standard across all S.M.A.R.T-enabled storage devices.
Chapter 11 Packages Table 56 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION Updated This indicates when the hard drive updates the value for this attribute. • • When Failed Always means the hard drive updates this attribute during normal operation and during offline activities. Offline means the hard drive only updates this attribute when no one is accessing the hard drive. This column indicates when (if ever) the attribute failed.
Chapter 11 Packages The following table describes the labels in this screen. Table 57 Network > DyDNS LABEL DESCRIPTION Gateway Information Internal Address This shows the IP address assigned to the NSA by the gateway in your local network. External Address This shows the IP address of the NSA that can be accessed in the Wide Area Network (WAN). Note that this is not assigned by the DyDNS server. Configuration Enable DyDNS Select this to use dynamic DNS.
Chapter 11 Packages Table 58 Network > NFS LABEL DESCRIPTION Disable NFS Server Click this to stop using NFS. This makes all NFS shares unavailable. Add NFS Share Click this to add an NFS share. Refer to Section 11.5.1 on page 231 for the Add NFS Share screen. NFS Session Click this to view active NFS sessions. You can see the list of users who have access to the NFS shares. Refer to Section 11.5.2 on page 232 for the NFS Session screen.
Chapter 11 Packages Click Add or Edit in the Network > NFS screen to open the following: Figure 111 Network > NFS: Add/Edit The following table describes the labels in this screen. Table 59 Network > NFS: Add/Edit LABEL DESCRIPTION Volume Name Select the volume where the folder you want to add as an NFS share is located. NFS Share Name Enter the name you want to give to the NFS share. Full Path This shows the location of the NFS share in the NSA.
Chapter 11 Packages Click NFS Session in the Network > NFS screen to open the following. Figure 112 Network > NFS: NFS Session The following table describes the labels in this screen. Table 60 Network > NFS: NFS Session LABEL DESCRIPTION Type This shows if the NFS share is active or not. NFS Share Path This shows the location of the share in the NSA. Username This shows the username of the active user connected to the NFS share.
Chapter 11 Packages Click Applications > Syslog Server to open the following screen. Figure 113 Applications > Syslog Server The following table describes the labels in this screen. Table 61 Applications > Syslog Server LABEL DESCRIPTION Enable Syslog Server Select this to have the NSA accept syslog logs from syslog clients. Clear it to stop the NSA from accepting syslog logs from syslog clients. Log Location Click View Files to browse to where you want to store the syslog logs on the NSA.
Chapter 11 Packages Table 61 Applications > Syslog Server LABEL DESCRIPTION Log Format Select the format you want to use for recording the received logs. The Example item below the drop-down list boxes displays how the selected custom format looks. For example, if you select Full Date, the individual log entries would display with something like 2009 May 13 17:15:51 in front of them. Apply Click this to save your changes. Reset Click this to restore the screen’s last-saved settings. 11.
Chapter 11 Packages Table 62 Applications > TFTP Server LABEL DESCRIPTION Path Use this if you want to further specify a folder within the share This field displays the share folder’s path. Type the location of the folder using forward slashes as branch separators or use Browse to find or create a folder on the NSA. Apply Click this to save your changes. Reset Click this to restore the screen’s last-saved settings. 11.8 eMule Screens Use these screens to manage the eMule application in your NSA.
Chapter 11 Packages The following table describes the labels in this screen. Table 63 Applications > eMule > Server LABEL DESCRIPTION Server - You can add multiple servers in this screen. However, the NSA can only connect to one eMule server at a time. Enable eMule Check this and click Apply to enable the eMule application. Add Server Click this to add an eMule server. A server provides a list of available files for download, users sharing them and other information. Refer to Section 11.8.
Chapter 11 Packages 11.8.2 Add Server Use this screen to add a server for the eMule application. Click Add in the Applications > eMule > Server screen to add a server. Figure 117 Applications > eMule > Server: Add The following table describes the labels in this screen. Table 64 Applications > eMule > Server: Add LABEL DESCRIPTION Server IP Select this if you know the server name, IP address and port number of the eMule server you want to add. Server Name Enter the server name.
Chapter 11 Packages The following table describes the labels in this screen. Table 65 Applications > eMule > Server: Edit LABEL DESCRIPTION Server Name Enter the server name. IP Address Enter the IP address of the server. Port Number Enter the port number of the server. Apply Click this to apply your changes. Cancel Click this to return to the previous screen without saving. 11.8.4 My Info Use this screen to view the server details, including the status, IP address and download/upload speeds.
Chapter 11 Packages Table 66 Applications > eMule > Server: MyInfo LABEL DESCRIPTION Sources This shows the total number of peers that can share the required files to the NSA eMule client. Close Click this to exit the screen. 11.8.5 eMule Task Screen Use this screen to view tasks, including completed, downloading, uploading and shared tasks, that are being handled by the NSA. Click Applications > eMule > Task screen to view the task details.
Chapter 11 Packages Table 67 Applications > eMule > Task LABEL DESCRIPTION Resume Select a paused item from the list and click this to resume the task. Task Info Select an item from the list and click this to view the details and status of the task. The table lists your tasks. Click a column’s heading to sort the entries by that criteria. Downloading This table shows a list of download tasks that are still in progress.
Chapter 11 Packages You see a warning screen before you delete a task. Figure 121 Delete a Task 11.8.6 Add Task Use this to add a download task to the NSA. Click Add in the Applications > eMule > Task screen to add a task. Figure 122 Applications > eMule > Task: Add The following table describes the labels in this screen. Table 68 Applications > eMule > Task: Add LABEL DESCRIPTION Source ED2K Link Paste the ED2K link of the file you want to download into this field.
Chapter 11 Packages Table 68 Applications > eMule > Task: Add LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. • • Share - Select the destination share from the drop-down list. Path - This field displays the share folder’s path. You can use Browse to find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators.
Chapter 11 Packages Click Applications > eMule > Task > Preferences to open the following screen. Figure 123 Applications > eMule > Task > Preferences The following table describes the labels in this screen. Table 69 Applications > eMule > Task > Preferences LABEL DESCRIPTION Username Username Enter your user name that identifies the NSA in the eMule network.
Chapter 11 Packages Table 69 Applications > eMule > Task > Preferences LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. • • Share - Select the destination share from the drop-down list. Path - This field displays the share folder’s path.
Chapter 11 Packages Table 69 Applications > eMule > Task > Preferences LABEL DESCRIPTION Reset Click this to clear the fields. Cancel Click this to return to the previous screen without saving. 11.8.8 Edit IP Filter Use this screen to enable IP filtering which prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs. Figure 124 Applications > eMule > Task > Preferences: Edit IP Filter The following table describes the labels in this screen.
Chapter 11 Packages Click Applications > eMule > Task > Browse Incomplete Downloads to open the following screen. Figure 125 Applications > eMule > Task > Browse Incomplete Downloads The following table describes the labels in this screen. Table 71 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder Type a folder name and click Apply to make a new folder. The name can be 1 to 239 singlebyte (no Chinese characters allowed for example) ASCII characters.
Chapter 11 Packages Table 71 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Delete Select a file/folder from the list and click this to open a warning screen. Click Yes to delete the file/folder, or click No to close the screen. Move Select a file/folder from the list and click this to relocate the file/folder to another share. Copy Select a file/folder from the list and click this to make a duplicate of the file/folder to another share.
Chapter 11 Packages The following table describes the labels in this screen. Table 72 Applications > eMule > Task: Task Info LABEL DESCRIPTION Status This shows the current status of the task - Waiting or Downloading. Name This shows the file name of the file associated with the task. part.met File This shows the temporary file name for an incomplete file. You can change this file name by entering the new name and clicking Apply.
Chapter 11 Packages Click Applications > eMule > Search to open the following screen. Figure 127 Applications > eMule > Search The following table describes the labels in this screen. Table 73 Applications > eMule > Search LABEL DESCRIPTION Search Enable eMule Check this and click Apply to enable the eMule application. Keyword(s) Enter words that are related to the file you want to download. File Type Select the file type that you want to download.
Chapter 11 Packages Click Applications > pyLoad to open the following screen. Figure 128 Applications > pyLoad The following table describes the labels in this screen. Table 74 Applications > pyLoad LABEL DESCRIPTION Enable pyLoad Select this to have the NSA manage your downloads. Clear it to turn the feature off. Management Page This is the IP address and port number of the NSA’s pyLoad management login screen.
Chapter 11 Packages Note: If ownCloud does not appear, click the Retrieve List from Internet icon to update the list. 2 252 The following confirmation screen appears. Click Apply. The NSA must have a connection to the Internet to download the package.
Chapter 11 Packages 3 Select the share in which to create a folder for ownCloud data and click Create. 4 The installation progress appears in the ownCloud row. 5 A link appears in the Management Page column after installation finishes. Click this link. 6 The ownCloud login screen appears. Use admin and 1234 for your first login.
Chapter 11 Packages 7 The main ownCloud screen displays. Click the drop-down arrow next to your user name in the upper-right corner to see the help for more information on using ownCloud. Note: Get ownCloud desktop clients from www.owncloud.com and ownCloud mobile apps from the Apple App Store, Google Play, or Amazon Appstore. 11.11 Polkast Setup Use the Package Management screen to install the Polkast package.
Chapter 11 Packages Note: If Polkast does not appear, click the Retrieve List from Internet icon to update the list. Figure 129 Polkast Installation Step 1 2 The following confirmation screen appears. Click Apply. The NSA must have a connection to the Internet to download the Polkast package. Figure 130 Polkast Installation Step 2 3 The installation progress appears in the Polkast row.
Chapter 11 Packages 4 A link appears in the Management Page column after installation finishes. Click this link. Figure 132 Polkast Installation Step 4 5 The Polkast login screen appears. Click the link to create a new account or enter your login information for an existing account. Figure 133 Polkast Login Note: For more information on using Polkast, visit www.polkast.com. Get free Polkast mobile apps from the Apple App Store, Amazon AppStore, and Android Market.
Chapter 11 Packages 11.12 GoogleDrive Install the GoogleDrive package to synchronize local NSA user folders and Google Drive cloud storage accounts. This two-way synchronization means changes in the Google Drive account appear in the local sync folder and changes in the local sync folder appear in the Google Drive account. Note: Do not store your only copy of a document in Google Drive or the local sync folder. • Modifying or deleting a file or folder at either end modifies or deletes it at the other end.
Chapter 11 Packages The following table describes the labels in this screen. Table 75 Applications > GoogleDrive > Account Setting LABEL DESCRIPTION Linked Account Select a Google account linked to an NSA user account. Click Add to open a screen where you can link an NSA user account and a Google account. Click Delete to remove the NSA’s link to the selected Google account. You must disable the Google Drive feature for the account before you can do this.
Chapter 11 Packages Note: The user has to log into the Google account on the same computer to allow the NSA to link to it. Figure 135 Applications > GoogleDrive > Account Setting > Add The following table describes the labels in this screen. Table 76 Applications > GoogleDrive > Account Setting > Add LABEL DESCRIPTION Step 1 Specify the folder on the NSA to synchronize with Google Drive for the local user.
Chapter 11 Packages Table 76 Applications > GoogleDrive > Account Setting > Add (continued) LABEL DESCRIPTION Step 3 Click the link to get the authorization code from Google. The user must sign into the Google account. You may need to sign out of Google’s services first if another user account is already signed in. The NSA GoogleDrive package uses the Grive app. Review what the Grive app wants to use and click Accept if you agree.
Chapter 11 Packages Table 76 Applications > GoogleDrive > Account Setting > Add (continued) LABEL DESCRIPTION Apply Click this to save your changes and complete the authorization. Cancel Click this to return to the previous screen without saving. 11.12.3 Update Period Screen Use the Update Period screen to set how often the NSA synchronizes with Google Drive. The NSA initiates the connections, thus you do not have to configure rules on a firewall located in front of the NSA to allow access.
Chapter 11 Packages Click Applications > Memopal to open the following screen.
Chapter 11 Packages The following table describes the labels in this screen. Table 78 Applications > Memopal LABEL DESCRIPTION Status This shows the status of the Memopal application’s interaction with the Memopal server. Disabled: The NSA Memopal application is turned off. Starting: The backup job is initializing and the NSA is getting ready to back up. Running: The backup job is executing. Stopped: The backup job is stopped. This may be due to a network error, remote server error, or other issue.
Chapter 11 Packages Table 78 Applications > Memopal (continued) LABEL DESCRIPTION Path Identify the folder to back up to the Memopal server. Use Browse to find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators. Click Add to add the folder to the list of folders the NSA Memopal application backs up to the Memopal server. Apply Click this to save your changes. Reset Click this to restore the screen’s last-saved settings. 11.
Chapter 11 Packages Table 79 Protect > Backup LABEL DESCRIPTION Execute Job Now Select a backup job in the list and click this to run the backup job immediately. Restore Archive Select a backup job in the list and click this to restore the file(s) included in that backup job to the NSA. This applies to Archive backups only. Refer to Section 11.15.8 on page 274 to see the screens. Abort Job Select a backup job in the list and click this to stop the process if the backup job is currently active.
Chapter 11 Packages The following table describes the labels in this screen. Table 80 Protect > Backup: Step 1 LABEL DESCRIPTION Job Information Job Name Enter a name to identify the backup job. Job Description Enter a short description (up to 100 keyboard characters) for the backup job. Backup Type Choose the backup type the NSA implements for the backup job. Archive - This is a backup of the source folder in an archive format.
Chapter 11 Packages 11.15.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored.
Chapter 11 Packages The following table describes the labels in this screen. Table 81 Protect > Backup: Step 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files. Click to close a folder in the tree. This is useful if there are many folders or files that you wish to hide from view. Click to select a folder or file to back up. This also selects all sub-folders and files.
Chapter 11 Packages Table 81 Protect > Backup: Step 2 LABEL DESCRIPTION Remote Select this to back up to another device. For Archives: The remote device can be another NSA in the network. Fill in the following fields in order to be able to access it. • • • • Remote NSA Address Username Password Share Name Click Test Connection to see if your NSA can communicate with the remote device. For Synchronization: The remote device must be another NSA compatible with the NSA’s synchronization feature.
Chapter 11 Packages 11.15.3 Backup: Step 3 Use this screen to specify compression, encryption and purge policies for the backup job. This step is only available if you are doing an archive backup or a synchronization backup to a remote target. Figure 141 Protect > Backup: Step 3 The following table describes the labels in this screen. Table 82 Protect > Backup: Step 3 LABEL DESCRIPTION Compression Select Yes if you want NSA to compress the files for your backup. Otherwise, choose No.
Chapter 11 Packages Table 82 Protect > Backup: Step 3 LABEL DESCRIPTION Previous Click this to go back to the previous screen. Next Click this to go to the next screen. 11.15.4 Backup: Step 4 Click this to specify the schedule for the backup job. The backup job automatically runs according to the schedule that you set in this screen. Figure 142 Protect > Backup: Step 4 The following table describes the labels in this screen.
Chapter 11 Packages Table 83 Protect > Backup: Step 4 LABEL DESCRIPTION Step 2: Please select the day of the month This is only available if you selected Monthly as your backup frequency. Previous Click this to go back to the previous screen. Done Click this to close the screen. Select the day in a month when you want the NSA to perform the backup job. 11.15.5 Edit Job Screen Use this screen to edit an existing backup job.
Chapter 11 Packages Table 84 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Source folder(s)/ file(s) This is read-only and shows the path of the source folder for backup. Backup Target This field is read-only and shows on which volume (whether internal or external) the backup files are stored. If the target location is a remote NSA, this shows the remote IP address. Target Path This field is read-only and shows the target folder for the backup files.
Chapter 11 Packages The following table describes the labels in this screen. Table 85 Protect > Backup > Edit: Step 2 LABEL DESCRIPTION Scheduler Settings Backup Frequency Edit this by selecting from Hourly, Daily, Weekly and Monthly backup intervals. The screen changes depending on the item you select. Every how many hours? This is only available if you selected Hourly as your backup frequency. On which minute of the hour? This is only available if you selected Hourly as your backup frequency.
Chapter 11 Packages The following table describes the labels in this screen. Table 86 Protect > Backup > Restore Archive: Step 1 LABEL DESCRIPTION Step 1. Select Restore Source Select a previous archive backup that you want to restore to the NSA. Job Information Job Name This is the name to identify the backup job. Job Description This is a short description (up to 100 keyboard characters) for the backup job. Backup Type This is the type of backup implemented for the backup job.
Chapter 11 Packages 11.15.11 Restore Archive: Step 3 Use this screen to select the location in the NSA where you want to restore your backup. Figure 147 Protect > Backup > Restore Archive: Step 3 The following table describes the labels in this screen. Table 88 Protect > Backup > Restore Archive: Step 3 LABEL DESCRIPTION Step 3. Set a restore target and start restoring Original Location Select this to restore the files to their original location in the NSA.
Chapter 11 Packages 11.16.1 Restore: Step 1 You can access this screen by clicking Protect > Restore. Figure 148 Protect > Restore: Step 1 The following table describes the labels in this screen. Table 89 Protect > Restore: Step 1 LABEL DESCRIPTION Step 1. Select Restore Source Select a previous archive backup that you want to restore to the NSA. Select Remote NSA if the file is in another NSA in the network that you used for your backup. Fill in the fields below when you choose this option.
Chapter 11 Packages Table 89 Protect > Restore: Step 1 LABEL DESCRIPTION Browse Click this to select where the previous backup that you want to restore is located. • • • • Volume - Select a volume from the list. Current Location - This is the location of the selected folder. Type - This identifies the item as a file or folder. Name - This is the name of the folder/file. Click Apply to save your settings and Cancel to close the screen. Next Click this to go to the next screen. 11.16.
Chapter 11 Packages Table 90 Protect > Restore: Step 2 LABEL DESCRIPTION Restored Time Select a previous backup job in the list that you want to restore to your NSA. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. 11.16.3 Restore: Step 3 Use this screen to select the folder where the archive you want to restore is located. Figure 150 Protect > Restore: Step 3 The following table describes the labels in this screen.
Chapter 11 Packages 11.16.4 Restore: Step 4 Use this screen to select the location in the NSA where you want to restore your backup. Figure 151 Protect > Restore: Step 4 The following table describes the labels in this screen. Table 92 Protect > Restore: Step 4 LABEL DESCRIPTION Step 3. Set a restore target and start restoring Browse Click this to select a folder where you want to place the restored files. • • • • Volume - Select a volume from the list.
Chapter 11 Packages 11.17.1 S.M.A.R.T Attributes The following table describes some common S.M.A.R.T. attributes. If a higher or lower raw attribute value is better, it is indicated in the BETTER column. Since S.M.A.R.T. attributes and their definitions vary by manufacturer, refer to the hard drive manufacturer for details about the attributes your hard drive supports. Table 93 S.M.A.R.T. Attributes ID ATTRIBUTE NAME BETTER DESCRIPTION 01 Read Error Rate Low Shows the rate of hardware read errors.
Chapter 11 Packages Table 93 S.M.A.R.T. Attributes (continued) ID 282 ATTRIBUTE NAME BETTER DESCRIPTION 190 Temperature Difference from 100 High This indicates the value of 100 - the temperature in degrees Celsius. Manufacturers can set a minimum threshold that corresponds to a maximum temperature. 191 G-sense error rate Low This is the number of mistakes caused by impact loads. 192 Power-off Retract Count Low This is how many times the heads are loaded off the media.
Chapter 11 Packages Table 93 S.M.A.R.T. Attributes (continued) ID ATTRIBUTE NAME BETTER DESCRIPTION 220 Disk Shift Low This is how far the disk has moved relative to the spindle (this kind of shift is usually due to shock). 221 G-Sense Error Rate Low This is the number of errors that have resulted from external vibration and shock. 222 Loaded Hours This is how long the hard drive has operated under data load (this requires movement of the magnetic head armature).
Chapter 11 Packages 284 Media Server User’s Guide
C HAPTER 12 Auto Upload 12.1 Overview This chapter discusses the features in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family. You can link the NSA to your Flickr and/or YouTube account and select shares for the NSA to upload.
Chapter 12 Auto Upload Click Applications > Auto Upload > Flickr/YouTube to open the following screen. Figure 152 Applications > Auto Upload > Flickr/YouTube The following table describes the labels in this screen. Table 94 Applications > Auto Upload > Flickr/YouTube LABEL DESCRIPTION Flickr/YouTube Disable/Enable Select a service from the list and click this to turn the service on or off. If you disable the service and add more files to the watch folder(s), the NSA will not auto upload these files.
Chapter 12 Auto Upload The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account’s information and click Sign In.
Chapter 12 Auto Upload The following page displays asking for your authorization. Click OK, I’LL ALLOW IT to establish a link between the NSA and your Flickr account. Figure 155 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA web configurator. Click Get Ready in the following screen to complete the authorization process.
Chapter 12 Auto Upload Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen.
Chapter 12 Auto Upload The following table describes the labels in this screen. Table 95 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) LABEL DESCRIPTION Flickr Account Configuration Username This field displays the Flickr account authorized for the auto upload feature. Photo Space Usage This shows how much storage space for photos (in size and percentage) you have used and how much space is still available on your Flickr account.
Chapter 12 Auto Upload Table 95 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) (continued) LABEL DESCRIPTION Grace Period N minutes Specify how long the NSA should wait when you add a new file for auto upload. For example, if you set the grace period to 5 minutes, the NSA uploads a new file after it has been in a watched folder for 5 minutes. You can choose from a range of 1 to 10080 minutes (up to one week).
Chapter 12 Auto Upload Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen. Figure 159 Applications > Auto Upload > Flickr/YouTube > Config (YouTube) The following table describes the labels in this screen. Table 96 Applications > Auto Upload > Config (YouTube) LABEL DESCRIPTION Youtube Account Configuration Username 292 This field displays the Youtube account authorized for the auto upload feature.
Chapter 12 Auto Upload Table 96 Applications > Auto Upload > Config (YouTube) (continued) LABEL Switch User DESCRIPTION Click this to use a different YouTube account for the auto upload feature. Folder Selection Folder Watch List This table displays a list of shares and folders selected for auto upload. Files stored in these locations are uploaded to your YouTube account. Status This field indicates whether the share or folder is available. represents a valid folder.
Chapter 12 Auto Upload Table 96 Applications > Auto Upload > Config (YouTube) (continued) LABEL DESCRIPTION Who can see your media files on YouTube? Determine who has the right to see files uploaded to your YouTube account. Select Only You if you do not want anyone else to see your files. Select Anyone to allow everyone to see your files. Apply Click this to save your changes. Reset Click this to restore your previously stored settings. 12.
Chapter 12 Auto Upload The following table describes the labels in this screen. Table 97 Applications > Auto Upload > FTP Uploadr LABEL DESCRIPTION Enable FTP Uploadr Use the check box to enable or disable the FTP Uploadr. Click Apply to save your changes. When you disable the FTP Uploadr, a screen opens requesting confirmation. Select the check box to stop any current or queued uploads.
Chapter 12 Auto Upload In the FTP Uploadr screen, click the Add Server or Edit Server button to open the following screen. Figure 161 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server The following table describes the labels in this screen. Table 98 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server LABEL DESCRIPTION Domain Name/IP Address Enter the domain name or IP address of the FTP server. Account Name Enter the account name used to access the FTP server.
Chapter 12 Auto Upload In the FTP Uploadr screen, click the Preferences icon to open the following screen. Figure 162 Applications > Auto Upload > FTP Uploadr > Preferences The following table describes the labels in this screen. Table 99 Applications > Auto Upload > FTP Uploadr > Preferences LABEL DESCRIPTION Folder Watch List Status This field indicates whether the share or folder is available. represents a valid folder. The folder is available for auto upload. represents a missing folder.
Chapter 12 Auto Upload Table 99 Applications > Auto Upload > FTP Uploadr > Preferences (continued) LABEL DESCRIPTION Add Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. • • Share - Select the share from the list. Path - Type the folder location in the share directly or click Browse to open the following screen and navigate to the folder’s location. • • • • Current Location - This is the location of the selected folder.
C HAPTER 13 Dropbox 13.1 Overview The Dropbox Web-based file hosting service uses cloud computing to let you use file synchronization to store and share files and folders with others across the Internet. Use your Dropbox account to easily move files to your NSA and have the NSA download *.torrent files. 13.2 Dropbox Screen Use the Dropbox screen to log the NSA into your Dropbox account. This creates Drop2NAS and zDownload folders in your Dropbox account. See Section 13.
Chapter 13 Dropbox The following table describes the labels in this screen. Table 100 Applications > Dropbox LABEL DESCRIPTION Status This shows the status of the NSA Dropbox application’s interaction with the Dropbox server. Disable: The NSA Dropbox application is turned off. Ready: The NSA Dropbox application has authenticated with the Dropbox server and is ready to use. Authenticating with Dropbox. Please wait.: The NSA Dropbox application is logging into the Dropbox server.
Chapter 13 Dropbox Table 100 Applications > Dropbox (continued) LABEL DESCRIPTION Enable Dropbox Select this to synchronize and back up your Dropbox account. The first time you do this a Dropbox screen prompts you to log into your Dropbox account. Then a NSA pop-up opens. Click Get Ready. Click Allow when the Dropbox screen notifies you of the NSA’s DropNAS application trying to connect to your Dropbox account.
Chapter 13 Dropbox admin\Dropbox\FromDropbox folder in the format of “filename(n).extension”. Here is an example of the Drop2NAS folder. Note: Do not delete the NAStoken file as it is needed for your NSA to work with the Dropbox account. Figure 164 Dropbox\Drop2NAS Using the zDownload Folder The NSA copies *.torrent files in the zDownload folder to the NSA’s admin\download\torrents folder and automatically starts downloading them.
C HAPTER 14 Using Time Machine with the NSA 14.1 Overview Time Machine is a backup system provided by Mac OS X. It automatically backs up everything on your Mac, including pictures, music, videos, documents, applications, and settings. This chapter helps you to enable Time Machine in OS X to use your NSA as a backup volume. 14.2 Time Machine Screen Use the Time Machine screen to turn Time Machine support on or off, and designate the share for Time Machine backups.
Chapter 14 Using Time Machine with the NSA 304 1 Click Apple > System Preferences. Then go to System and select Time Machine. 2 Turn Time Machine ON. Then click Change Disk. 3 Select share01 as the backup disk. Then click Use for Backup.
Chapter 14 Using Time Machine with the NSA 4 When prompted for the username and password of share01, enter the login information for an existing user account with write access permission on share01 (for information on configuring user accounts and shares see Section 5.9 on page 82). In this example user1/12345 is used. Then click Connect. 5 Time Machine starts backing up files to share01 after 120 seconds. If you want to backup immediately, click Time Machine icon and select Back Up Now.
Chapter 14 Using Time Machine with the NSA 306 Media Server User’s Guide
C HAPTER 15 Users 15.1 Overview This chapter introduces the Users screens of the NSA. Use the Users screens to create and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. • Assign individual users specific access rights for specific shares. Users are people who have access rights to the NSA and can store files there for later retrieval. A user can: • Manage shares that he owns. • Change his own password.
Chapter 15 Users Use this screen to create and manage accounts for users who can store files on the NSA. Figure 167 Sharing > Users The following table describes the labels in this screen. Table 102 Sharing > Users LABEL DESCRIPTION Add User Click this to open a screen where you can configure a new user account. Refer to Section 15.3.2 on page 309 to see the screen. Search Click this to display a search field. Type in the name of an account and then click Search to look up the account you specified.
Chapter 15 Users Table 102 Sharing > Users (continued) LABEL DESCRIPTION Delete Selected Users Select an account and click this to open a screen where you can delete the user account. User Info Select an account and click this to open a screen displaying the amount of storage space used by the account. You can also check the account’s membership in any groups. Refer to Section 15.4 on page 312 to see the screen.
Chapter 15 Users Click the Add User button in the Users screen to open the following screens. Click the Edit User button in the screen shown previously to edit an existing account. Figure 168 Sharing > Users > Add or Edit a User: General Settings Figure 169 Sharing > Users > Add or Edit a User: Quota (per volume) Figure 170 Sharing > Users > Add or Edit a User: General Settings The following table describes the labels in these screens.
Chapter 15 Users Table 104 Users > Add or Edit a User (continued) LABEL DESCRIPTION Password (Confirm) You must type the exact same password that you just typed in the above field. Account Type Select Administrator to give the account full configuration and management access to the NSA. Select User to give the account basic access rights to the NSA and allow the user to manage his own shares, change his own password, and access the contents of other shares to which he is given access rights.
Chapter 15 Users • ftp • anonymous-ftp • anonymous • nobody • root • pc-guest • admin • password 15.4 Displaying User Info Use this screen to display a user’s information. In the Users screen, select an account and click User Info to open the following screen. Figure 171 Sharing > Users > User Info The following table describes the labels in this screen. Table 105 Sharing > Users > User Info LABEL DESCRIPTION Username This field displays the selected username.
C HAPTER 16 Groups 16.1 Overview This chapter introduces the Groups screens. Use the Groups screens to create and manage groups. You can assign users to groups and grant individual groups access rights to specific shares. 16.2 What You Can Do • Use the main Groups screen (Section 16.3 on page 313) to display and manage a list of groups created on the NSA. • Use the Add Group screen (Section 16.3.1 on page 314) to create new groups. • Use the Edit Group screen (Section 16.3.
Chapter 16 Groups The following table describes the labels in this screen. Table 106 Sharing > Groups LABEL DESCRIPTION Add Group Click this to open a screen where you can configure a new group. Search Click this to display a search field. Type the name of a group and then click Search to look up the group you specified. Click Clear to close the search function. Edit Group Select a group and click this to open a screen where you can edit the properties of the selected group.
Chapter 16 Groups Click the Add Group button in the Groups screen to open the following screen. Click the Edit Group button in the screen shown previously to edit an existing group. Figure 173 Sharing > Groups > Add or Edit a Group The following table describes the labels in this screen. Table 107 Sharing > Groups > Add or Edit a Group LABEL DESCRIPTION Group Name Type a name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. See Section 16.3.
Chapter 16 Groups • Multiple spaces within names are converted to a single space. • Group names are case insensitive. The group name cannot be the same (no matter the letter case) as an existing group. For example, if a group exists with the name 'FAMILY', you cannot create a group named 'family'. • The group name cannot be the same as a system group name such as EVERYONE nor be the same as an existing group.
C HAPTER 17 Shares 17.1 Overview A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder. You can map a share to a network drive for easy and familiar file transfer for Windows users. 17.2 What You Can Do • Use the Shares screen (Section 17.3 on page 317) to navigate a list of shares created on the NSA. • Use the Add Shares screen (Section 17.3.1 on page 319) to create additional shares on the NSA.
Chapter 17 Shares The following table describes the labels in this screen. Table 108 Sharing > Shares LABEL DESCRIPTION Add Share Click this to create a new share. Recycle Bin Click this to configure recycle bins. Edit Share Select a share and click this to edit the share. Delete Share Select a share and click this to remove or restrict access to the share. Share Browser Select a share and click this to browse the share’s contents. Status This field displays the share icons.
Chapter 17 Shares Table 108 Sharing > Shares (continued) LABEL DESCRIPTION Share Path This field displays the share’s file path, for example, volume1/music. Share Owner This is the name of the user account to which this share belongs. Permission Type This field displays the access permission of a share. Everyone on the network can access a Public share. Only the share owner can access a Private share.
Chapter 17 Shares Table 109 Shares > Add Share (or Edit Share) (continued) LABEL DESCRIPTION Publish this share to Media Server This option is available only when you enable the Media Server (Section 10.5 on page 188). Select this option to have the NSA make media files in this share available to media clients and through the Playzone screens. When you publish a share, you can also select whether or not to publish music tracks, photos, and videos.
Chapter 17 Shares The following table describes the labels in this screen. Table 110 Sharing > Shares > Add Share (or Edit Share) > Advanced LABEL DESCRIPTION Available Users/Groups This field lists the users/groups to which you can assign access rights. Authority Use this field to assign access rights to users/groups. Full Control gives users/groups full access (read, write and execute) to all files contained within this share.
Chapter 17 Shares 17.4.2 Configuring Recycle Bins In the Sharing > Shares screen, click Recycle Bin to open the following screen. Figure 177 Sharing > Shares > Recycle Bin The following table describes the labels in this screen. Table 111 Sharing > Shares > Recycle Bin LABEL DESCRIPTION Clean Recycle Bin every N days Specify how often you want to clear the contents in all recycle bins. The specified days correspond to how long a file has been stored in a recycle bin.
Chapter 17 Shares The following table describes the labels in this screen. Table 112 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder Type a folder name and click Apply to make a new folder. The name can be 1 to 239 singlebyte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing folder in the same path. See Section 4.4.6 on page 54 for more information on folder names. Upload Click this to add files to the share.
Chapter 17 Shares Table 112 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Modified Date This field displays a file’s latest modification date. Close Click this to close the screen. 17.5.1 Moving or Copying Files Use this screen to move or copy files to another share. In the Share Browser screen, select a file or folder and click Move or Copy to open the following screen.
C HAPTER 18 Maintenance Screens 18.1 Overview This chapter discusses the Maintenance screens. The Maintenance screens allow you to manage system configurations. 18.2 What You Can Do • Use the Power screen (Section 18.3 on page 325) to configure power settings for the NSA, including power saving, UPS, power on/off after power failure, power on/off schedule, and Wake on LAN. • Use the Log screen (Section 18.4 on page 329) to check the system’s logs. • Use the Configuration screen (Section 18.
Chapter 18 Maintenance Screens Click Maintenance > Power to display the following screen. Figure 180 Maintenance > Power The following table describes the labels in this screen. Table 114 Maintenance > Power LABEL DESCRIPTION Power Management Turn off hard disk(s) Enter the number of minutes to wait when the NSA is idle before spinning the hard disks down to sleep (hibernation). The default time is 15 minutes.
Chapter 18 Maintenance Screens Table 114 Maintenance > Power (continued) LABEL Always Power Off DESCRIPTION Select this option to keep the NSA from automatically restarting when the power is restored after a power failure. This is a computer’s “traditional” behavior. Select this if you have other servers such as a domain controller or DNS server that you want to start or check after a power failure before the NSA turns on.
Chapter 18 Maintenance Screens 18.3.2 Editing the Power Control Schedule Screen Click Maintenance > Power Management > Edit to open this screen. Use this screen to configure power control schedules to have the NSA turn on, turn off, or reboot at specified times. Figure 181 Maintenance > Power Management > Edit The following table describes the labels in this screen.
Chapter 18 Maintenance Screens Table 115 Maintenance > Power Management > Edit (continued) LABEL DESCRIPTION Execute Time (hh:mm) Enter the time, day, and/or day of the month as appropriate for this power control schedule entry. Leave more than 10 minutes between the execution times of the entries. If the NSA turns off or restarts while a user is transferring files to or from the NSA, the transfer fails. The user will need to restart the transfer.
Chapter 18 Maintenance Screens Use this screen to display all NSA logs. There are at most 512 entries in the log. Older logs are removed by the system. You cannot download the log file via FTP or CIFS. Figure 182 Maintenance > Log The following table describes the labels in this screen. Table 116 Maintenance > Log LABEL DESCRIPTION Refresh Click this to update the log display. Purge all Logs Click this to erase all logs from the NSA.
Chapter 18 Maintenance Screens • Use the Syslog Server Setting screen (Section 18.4.4 on page 332) to enable the syslog server and select the categories to include in the log report. 18.4.2 Email Setting You can enable and configure e-mail alerts from the NSA. In the Report Config screen, click the Email Setting tab to open the following screen. Figure 183 Maintenance > Log > Report Config: Email Setting The following table describes the labels in this screen.
Chapter 18 Maintenance Screens 18.4.3 Report Setting You can select the type of alerts you want to receive through e-mail and schedule when the NSA emails the alerts. In the Report Config screen, click the Report Setting tab to open the following screen. Figure 184 Maintenance > Log > Report Config: Report Setting The following table describes the labels in this screen.
Chapter 18 Maintenance Screens The following table describes the labels in this screen. Table 119 Maintenance > Log > Report Config: Syslog Server Setting LABEL DESCRIPTION Enable Syslog Server Check this to enable syslog server. Server Address Enter the syslog server address you want the NSA to use for its log alerts. In the table below, check the type of log alerts you want to receive in your e-mail. Select All Log to include all types of log alerts. Apply Click this to save your changes.
Chapter 18 Maintenance Screens Table 120 Maintenance > Configuration LABEL Restore DESCRIPTION Click this to load the previously-saved configuration file to the NSA. This replaces your current NSA configuration settings with the settings in the previously-saved configuration file. A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit. Reset MySQL Database Password Click this to reset the password for your MySQL database. 18.
Chapter 18 Maintenance Screens The following table describes the labels in this screen. Table 121 Maintenance > SSL LABEL DESCRIPTION Force HTTPs Select the Force HTTPs option to turn on the NSA’s web browser security. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it. Note: The NSA will restart the web configurator after you click Apply. The NSA displays a warning screen if applying your change may disconnect some users.
Chapter 18 Maintenance Screens The screen is also the same for the Create a certificate authorized by other CA option. Figure 188 Maintenance > SSL > Create or Edit a Certificate The following table describes the labels in this screen. Table 122 Maintenance > SSL > Create or Edit a Certificate LABEL DESCRIPTION Common Name This name describes the certificate’s origin, either in the form of an IP address or a domain name.
Chapter 18 Maintenance Screens Click Maintenance > Shutdown to open the following screen. Figure 189 Maintenance > Shutdown The following table describes the labels in this screen. Table 123 Maintenance > Shutdown LABEL DESCRIPTION Restart Click this to have the device perform a software restart. Shutdown Click this to shut down the system and restart it again later. When you click the Restart button a pop-up screen will appear asking you to confirm.
Chapter 18 Maintenance Screens Table 124 Log Classes (continued) LOG CATEGORY DESCRIPTION Network This log class shows information on network configuration, setting changes and so on. Storage This log class shows information on the NSA’s internal and external storage activities. Backup This log class shows information on all backup-related activities. Auto Upload This log class shows information on automatic uploads done by the NSA. 18.8.
Chapter 18 Maintenance Screens Table 126 Log Messages (continued) CLASS SEVERITY MESSAGE Copy/Sync Button ERROR [USB Sync] Sync Failed at Folder %s. Copy/Sync Button ERROR Modify COPY/SYNC Button Configuration: %s Copy/Sync Button ERROR Please Change Your Folder Name. Invalid Path: %s Copy/Sync Button INFO [USB Sync] Copying %s from Internal Volume to Backup Folder. Copy/Sync Button INFO [USB Sync] Copying %s from Internal Volume to USB.
Chapter 18 Maintenance Screens Table 126 Log Messages (continued) 340 CLASS SEVERITY MESSAGE Download Service INFO Download service initialized Download Service INFO Download service pause %s by user Download Service INFO Download service set %s to %s priority by user Download Service INFO Download service set default download location to %s Download Service INFO Download service set max P2P download rate to %d KB/s by user Download Service INFO Download service set max P2P upload rate
Chapter 18 Maintenance Screens Table 126 Log Messages (continued) CLASS SEVERITY MESSAGE Download Service INFO Download service added %d rules from ipfilter.dat Download Service INFO Download service detected invalid ip range %s in ipfilter.dat Download Service WARNING Download service default location does not exist. Load default Download Service WARNING Download service default torrent location does not exist. Load default Groups NOTICE Add new group %s. Groups NOTICE Delete group %s.
Chapter 18 Maintenance Screens Table 126 Log Messages (continued) CLASS 342 SEVERITY MESSAGE Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to '%s' Services NOTICE NTP server has set to null Services NOTICE The NTP service is disabled. Services NOTICE The NTP service is enabled.
Chapter 18 Maintenance Screens Table 126 Log Messages (continued) CLASS SEVERITY MESSAGE System INFO NTP fails to update from %s System INFO Device is rebooted by administrator! System INFO Device is shutdown by administrator! System NOTICE DNS server is changed. System NOTICE Hostname is cleared. System NOTICE Hostname is set to '%s'. System NOTICE System description is changed. System NOTICE System description is empty now.
Chapter 18 Maintenance Screens Table 126 Log Messages (continued) 344 CLASS SEVERITY MESSAGE Backup/ Restore INFO Start to restore backup job [%s] from [%s]. Backup/ Restore INFO Restore from [%s] successfully.
C HAPTER 19 Protecting Your Data 19.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 19.2 Protection Methods There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.
Chapter 19 Protecting Your Data If you forgot the NSA password, then use the RESET button (see Section 1.1.4 on page 19) to return the NSA to the factory default configuration. Note: Configuration File Backup and Restoration does not affect data (your files and folders), volumes on the NSA.
C HAPTER 20 Troubleshooting 20.1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories.
Chapter 20 Troubleshooting • If the problem continues, contact the vendor. An HDD LED is off. The HDD LED is off when the NSA cannot detect a hard drive in the drive bay. Replace or install a hard drive. See Installing or replacing a hard disk. An HDD LED is red. Red means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector, but the LED stays red until the NSA restarts.
Chapter 20 Troubleshooting • Make sure the Ethernet cable is connected properly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it’s connected directly to a computer, make sure that the computer network card is working (ping 127.0.0.1 on the computer). • Use another Ethernet cable. If you’re connecting to a Gigabit Ethernet, make sure you’re using an 8-wire Ethernet cable. • If the problem continues, contact the vendor. See Section 21.
Chapter 20 Troubleshooting The NAS Starter Utility discovered my NSA but the status is always unreachable, even though I can access it. You may need to add the NAS Starter Utility to your software firewall’s allow list or lower your software firewall or anti-virus scanner’s security level. Alternatively you may have to configure your software firewall or other security software to allow UDP port 50127 traffic from the NSA.
Chapter 20 Troubleshooting I cannot get to the NSA login screen. • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility. • Make sure you have used the NAS Starter Utility to initialize your NSA. • If you used the RESET button, the NSA may have a new IP address. Close and reopen the NAS Starter Utility to discover the NSA. • Make sure the NSA is turned on.
Chapter 20 Troubleshooting 20.4.1 Enabling Scripting of Safe ActiveX Controls If pages of the web configurator do not display properly in Internet Explorer, check that scripting of safe ActiveX controls is enabled. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 192 Internet Options: Security 352 2 Click the Custom Level... button. 3 Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default).
Chapter 20 Troubleshooting 4 Click OK to close the window. Figure 193 Security Settings - Script Safe ActiveX Controls I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly. The default username is admin, and the default password is 1234. These fields are case-sensitive, so make sure [Caps Lock] is not on. • Turn the NSA off and on. • If this does not work, see Section 1.1.4 on page 19 to reset the device.
Chapter 20 Troubleshooting 20.5 I Cannot Access The NSA I cannot access a share. • Check that the NSA is turned on and connected to the network. Try to ping the NSA or use the NAS Starter Utility to discover it. • Make sure you have used the NAS Starter Utility to initialize your NSA. See Chapter 2 on page 21 for more information. • Check that you entered your login name and password correctly. • Check that the share exists and check its access settings.
Chapter 20 Troubleshooting • The user’s computer may already be connected to another of the NSA’s shares using a different user name and/or password. This can happen without the user realizing it if the user’s computer automatically connects to a share at logon. Right-click any other connected shares and click Disconnect. Then re-attempt to connect to the desired share. • Check if the share has an ANONYMOUS or EVERYONE access right.
Chapter 20 Troubleshooting 20.7 External USB Drives The COPY LED is red. Copying files from a USB device failed. The USB device may not be compatible with the NSA. Try to save the files onto a computer and then from the computer to the NSA (through the network connection). 20.8 Firmware I want to know the firmware version on the NSA. Go to the Status screen. The Firmware field shows you the current firmware version running. 20.
Chapter 20 Troubleshooting 1 On your Windows computer, click Start > Run or open a web browser. 2 Enter \\nsa followed by the number of your model (320 for example) or the Server Name you assigned the NSA. This shows you the folders in the NSA. 3 Use drag-and-drop or copy-and-paste to transfer files from your NSA to your local computer’s folder or your storage device. • You can download the files from your NSA. Just click on the file(s) in the Share Browsing screen (Section 4.4.5 on page 51).
Chapter 20 Troubleshooting I cannot use some applications in the Web Configurator. • The firmware installed in your NSA includes the features mentioned in Section 4.5.2 on page 59. This does not include the applications you can install using the Package Management screen. • You can use the Package Management screen (Chapter 11 on page 225) to install more applications from a web location (specified in the firmware) to your NSA.
Chapter 20 Troubleshooting 3 If an iTunes client is connected, the NSA’s iTunes server function scans the published media server folders for files every three minutes. Leave iTunes connected to the NSA for three minutes. Then use the NSA’s eject button (as shown next) to disconnect. Figure 194 iTunes Eject Button 4 Then click the NSA’s link to reconnect.
Chapter 20 Troubleshooting 2 If you have files from the iTunes Store that use DRM, you need to use your Apple account ID and password to authorize other computers to play the files. Apple permits you to authorize up to five computers at a time. To authorize a computer, open iTunes and click Store > Authorize Computer.
Chapter 20 Troubleshooting 20.14 Web Publishing A web-published share cannot be accessed by web browser from the Internet. • Make sure the person trying to access the share is using the correct web address (and port number if the NSA’s web publishing feature is not using port 80). See page 220 for details. • Make sure the publishing feature is turned on and the share is in the list of published shares. • Make sure the person trying to access the share is using Internet Explorer 6.
Chapter 20 Troubleshooting • Make sure your ISP allows you to run a server and is not blocking the port number of the NSA’s web publishing feature. 20.15 Auto Upload The NSA does not automatically upload files to Flickr or YouTube. 1 Make sure the NSA is connected to the Internet. See Section 9.4 on page 176 for details about testing network connections. 2 Click Maintenance > Log to check the NSA’s log for a message about the file.
Chapter 20 Troubleshooting • The web location of the package may be undergoing maintenance. Try again at a later time. Upgrade the firmware of the NSA. • If a new firmware is available, do an upgrade and try installing the package(s) again. The eMule Search screen does not work. You need to be connected to an eMule server before you can use the Search screen. Wait for the NSA to connect to a server before configuring the Search screen. I want to know how my hard disk is performing. Use S.M.A.R.T.
Chapter 20 Troubleshooting 20.18 Google Drive Google Drive stopped syncing. 1 Make sure the NSA is connected to the Internet. See Section 9.4 on page 176 for details about testing network connections. 2 Check if you have exceeded the Google Drive account’s storage quota. You may need to: • Delete unneeded files. • Empty the Google Drive trash bin.
A PPENDIX A Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. Regional websites are listed below (see also http://www.zyxel.com/ about_zyxel/zyxel_worldwide.shtml). Please have the following information ready when you contact an office. Required Information • Product model and serial number. • Warranty Information.
Appendix A Customer Support Korea • ZyXEL Korea Corp. • http://www.zyxel.kr Malaysia • ZyXEL Malaysia Sdn Bhd. • http://www.zyxel.com.my Pakistan • ZyXEL Pakistan (Pvt.) Ltd. • http://www.zyxel.com.pk Philippines • ZyXEL Philippines • http://www.zyxel.com.ph Singapore • ZyXEL Singapore Pte Ltd. • http://www.zyxel.com.sg Taiwan • ZyXEL Communications Corporation • http://www.zyxel.com Thailand • ZyXEL Thailand Co., Ltd • http://www.zyxel.co.
Appendix A Customer Support Belgium • ZyXEL Communications B.V. • http://www.zyxel.com/be/nl/ Bulgaria • ZyXEL България • http://www.zyxel.com/bg/bg/ Czech • ZyXEL Communications Czech s.r.o • http://www.zyxel.cz Denmark • ZyXEL Communications A/S • http://www.zyxel.dk Estonia • ZyXEL Estonia • http://www.zyxel.com/ee/et/ Finland • ZyXEL Communications • http://www.zyxel.fi France • ZyXEL France • http://www.zyxel.fr Germany • ZyXEL Deutschland GmbH • http://www.zyxel.
Appendix A Customer Support Lithuania • ZyXEL Lithuania • http://www.zyxel.com/lt/lt/homepage.shtml Netherlands • ZyXEL Benelux • http://www.zyxel.nl Norway • ZyXEL Communications • http://www.zyxel.no Poland • ZyXEL Communications Poland • http://www.zyxel.pl Romania • ZyXEL Romania • http://www.zyxel.com/ro/ro Russia • ZyXEL Russia • http://www.zyxel.ru Slovakia • ZyXEL Communications Czech s.r.o. organizacna zlozka • http://www.zyxel.sk Spain • ZyXEL Spain • http://www.zyxel.
Appendix A Customer Support Turkey • ZyXEL Turkey A.S. • http://www.zyxel.com.tr UK • ZyXEL Communications UK Ltd. • http://www.zyxel.co.uk Ukraine • ZyXEL Ukraine • http://www.ua.zyxel.com Latin America Argentina • ZyXEL Communication Corporation • http://www.zyxel.com/ec/es/ Ecuador • ZyXEL Communication Corporation • http://www.zyxel.com/ec/es/ Middle East Egypt • ZyXEL Communication Corporation • http://www.zyxel.com/homepage.shtml Middle East • ZyXEL Communication Corporation • http://www.zyxel.
Appendix A Customer Support Oceania Australia • ZyXEL Communications Corporation • http://www.zyxel.com/au/en/ Africa South Africa • Nology (Pty) Ltd. • http://www.zyxel.co.
C HAPTER 21 Product Specifications See also Chapter 1 on page 17 for a general overview of the key features. 21.1 LEDs This table describes the NSA’s LEDs. Table 129 LEDs LED NAME COLOR STATUS DESCRIPTION POWER Blue SYSTEM Green On The NSA is turned on and receiving power. Off The NSA is turned off. On The NSA has fully started and is operating normally. Blinking The NSA is starting up. Note: Do not turn off the NSA while it is upgrading the firmware or you may render it unusable.
Chapter 21 Product Specifications Table 129 LEDs (continued) LED NAME COLOR STATUS DESCRIPTION LAN Green Amber COPY/ SYNC Green Red On The NSA has a successful 10/100 Mbps Ethernet connection. Blinking The 100M LAN is sending or receiving packets. Off The NSA does not have a 10/100 Mbps Ethernet connection. On The NSA has a successful 1000 Mbps Ethernet connection. Blinking The 1000 M LAN is sending or receiving packets. Off The NSA does not have a 1000 Mbps Ethernet connection.
A PPENDIX B Legal Information Copyright Copyright © 2014 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix B Legal Information Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page.
Appendix B Legal Information Safety Warnings • • • • • • • • • • • • • • • • • • • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. Do NOT expose your device to dampness, dust or corrosive liquids. Do NOT store things on the device. Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. Connect ONLY suitable accessories to the device. Do NOT open the device or unit.
Appendix B Legal Information Lo smaltimento abusivo del prodotto da parte del detentore comporta l’applicazione delle sanzioni amministrative previste dalla normativa vigente.
Index Index media server 186, 188 configuration 189 iTunes server 186, 213, 214 print server 221 configuration 211 name 211 web publishing 186, 203, 219 activation 203 example 218 port number 220 A access rights 54 Flickr 291 shares 320, 321 YouTube 294 activation download service 191 Flickr/YouTube 286 FTP 188 FTP Uploadr 295 recycle bins 53, 319 web publishing 203 ANONYMOUS FTP 355 anonymous FTP access 188 application zone 55 applications 185, 285 auto upload Flickr/YouTube 285 FTP Uploadr 294 broadcatc
Index RSS 187 date 157 browser plugin, capturing link 215 diagnostic tool 178 browsing shares 51 diagnostic tools 178 discovery 21 C disk S.M.A.R.T.
Index F Google Drive 257 fan speed 148 GPS 50 file troubleshooting access 355 grace period 291, 293, 298 file browser configure share 53 share browser 51 file synchronization 257 File Transfer Protocol over Explicit TLS, see FTPES File Transfer Protocol over TLS, see FTPS files downloading 52 uploading 52 FileZilla 129 Google Maps 50 groups 313 adding 314, 315 editing 315 membership 311, 315 names 315 searching 314 Guide Quick Start 2 H fingerprint 127 firmware, upgrading 153 Flickr 285 access ri
Index volumes 167 workgroup 157 L lag, time 152 NAS Starter Utility 21, 42 language 57 navigation panel 59 latitude 50 network 175 diagnostic tools 178 DNS 175, 178 HTTP port 178 IP address 175 jumbo frames 176, 178 PPPoE 175, 183, 184 activation 183 TCP/IP 176 link capture browser plugin 215 login 43 Logitech SqueezeCenter 190 logs 329 longitude 50 M maintenance 325 backup settings 333 logs 329 power management 325 failure 326 resume 326 schedule 328 UPS 326 reset 333 restoring settings 333 shutdo
Index port mapping 179 by backup job tutorial 139 files 139 port, HTTP 178 power management 325 failure 326 resume 326 schedule 328 UPS 326 PPPoE 175, 183, 184 activation 183 preferences, download service 196 print server 221 configuration 211 name 211 private cloud 251 protect 133 backup 133 backup tutorial 136 restoring settings 333 RSS 187 download service notifications 215 S S.M.A.R.T.
Index share browser 318, 322 status 318 types 318 uploading files 52, 247, 323 shutdown 337 settings 151 status 148 time lag 152 workgroup name 157 system settings 56 SqueezeCenter 190 SSL 129, 334 certificate 335 editing 335 tutorial 117 status 58, 148 download service 193 shares 318 volume 163, 164 storage 161 creating volumes 165 disk replacement 162 JBOD 161, 166, 169, 170, 171 methods 170 duplexing 171 mirroring 171 parity 171 striping 171 naming volumes 167 RAID 161, 166, 169 degraded 164 RAID 0 17
Index login 43 navigation panel 59 password 44, 56 status 58 upgrading firmware 153 uploading files 52, 247, 323 UPnP 179 port mapping 179 User Name 230 web publishing 186, 203, 219 activation 203 example 218 port number 220 troubleshooting 361 usernames 311 web security 122 users 307 adding an account 308, 309 displaying information 309, 312 editing an account 309 group membership 311, 315 icons 309 search 308 usernames 311 workgroup name 157 UPS 326 URL 194, 242 USB devices 168, 169 V video cate
Index 384 Media Server User’s Guide