Media Server NSA325 Default Login Details Web Address nsa325 User Name admin Password 1234 Firmware Version 4.3 Edition 1, 08/2011 www.zyxel.com www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the Web Configurator. Note: This guide is a reference for a series of products. Therefore some features or options in this guide may not be available in your product.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NSA may be referred to as the “NSA”, the “device” or the “system” in this User’s Guide.
Document Conventions Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate.
Safety Warnings Safety Warnings • • • • • • • • • • • • • • • • • • • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. Do NOT expose your device to dampness, dust or corrosive liquids. Do NOT store things on the device. Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. Connect ONLY suitable accessories to the device. Do NOT open the device or unit.
Contents Overview Contents Overview User’s Guide ........................................................................................................................... 19 Getting to Know Your NSA .........................................................................................................21 zMedia App ................................................................................................................................25 NAS Starter Utility ........................................
Contents Overview 8 Media Server User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions ........................................................................................................... 4 Safety Warnings........................................................................................................................ 6 Contents Overview .......................................................
Table of Contents 3.4 Main NAS Starter Utility Screen ...........................................................................................37 3.4.1 Directory of the NAS ...................................................................................................38 3.5 Import Files or Folders with zPilot ........................................................................................39 3.6 Network Drive .....................................................................................
Table of Contents 5.6.2 Migrate Button ............................................................................................................74 5.6.3 Create an Internal Volume Button ..............................................................................74 5.7 Creating a Volume in a 1-Bay NSA ......................................................................................75 5.7.1 Creating a RAID 1 Volume ....................................................................................
Table of Contents Chapter 6 Status Screen ........................................................................................................................ 149 6.1 Overview ............................................................................................................................149 6.2 The Status Screen .............................................................................................................149 Chapter 7 System Setting...........................................
Table of Contents Chapter 10 Applications .......................................................................................................................... 181 10.1 Overview ..........................................................................................................................181 10.2 What You Can Do ............................................................................................................181 10.3 What You Need to Know ..........................................
Table of Contents 11.4 Package Management Screen ........................................................................................226 11.4.1 Displaying the Package Information ......................................................................229 11.5 DyDNS Screen ...............................................................................................................229 11.6 NFS Screen .........................................................................................................
Table of Contents 11.15.1 S.M.A.R.T Attributes .............................................................................................272 Chapter 12 Auto Upload .......................................................................................................................... 275 12.1 Overview ..........................................................................................................................275 12.2 What You Can Do .......................................................
Table of Contents 16.3.1 Adding or Editing Share .........................................................................................305 16.3.2 Configuring Advanced Share Access ....................................................................306 16.3.3 Public and ANONYMOUS Share Access Rights ....................................................307 16.4 The Recycle Bin Configuration Screen ...........................................................................307 16.4.1 Recycle Bins ...........
Table of Contents 19.3 Set Time Machine to Support Network Volume ...............................................................339 19.4 Mounting the NSA on the Mac .........................................................................................340 19.5 Creating a Sparse Bundle File for the NSA ......................................................................341 19.5.1 Finding out Computer Name and MAC Address ....................................................341 19.5.
Table of Contents Index ...................................................................................................................................... 439 Part III: Open Source Licences............................................................
P ART I User’s Guide 19
C HAPT ER 1 Getting to Know Your NSA 1.1 Overview This chapter covers the main features and applications of the NSA. Use the NSA to do the following. • Back up and share files on your network. • Use the COPY/SYNC button to copy or synchronize files between the NSA and USB devices like card readers, MP3 players, mass storage devices, and digital cameras without using a computer. • Have the NSA handle large file downloads. • Automatically download files from website feeds for convenient viewing.
Chapter 1 Getting to Know Your NSA Place the NSA behind a firewall and/or IDP (Intrusion Detection and Prevention) device to protect it from attacks from the Internet. Note: See Chapter 21 on page 365 for a more detailed list of NSA features. Refer to the Quick Start Guide for hardware connections and how to install hard drives. Note: Turn off and disconnect the NSA before you install or remove the internal hard disk or disks. • The NSA325 is a 2-bay model.
Chapter 1 Getting to Know Your NSA 1.1.4 COPY/SYNC Button Use the COPY/SYNC button on the front panel to copy or synchronize files between a connected USB device and the NSA. See Section 10.10 on page 211 for more details on how to configure the copy/sync settings. 1.1.5 RESET Button Use the RESET button on the rear panel to restore the NSA’s default settings.
Chapter 1 Getting to Know Your NSA If you need to remove a hard drive, use the hard disk removal handle included inside the front lid.
C HAPT ER 2 zMedia App 2.1 Overview Install ZyXEL’s zMedia app from the Apple App Store, Android Market, or www.zyxel.com to play files and manage the NSA from your iOS device or Android smartphone. 2.2 Log into zMedia 1 Tap the zMedia icon to open the app and automatically search for NSAs on your network. Figure 4 zMedia App Icon 2 Select an NSA if you have more than one.
Chapter 2 zMedia App 3 Use the admin user name and password to log in. Figure 6 zMedia Login 2.3 File Browser Tap File Browser to look through and play files on the NSA.
Chapter 2 zMedia App Tap a share to view its contents.
Chapter 2 zMedia App Tap a file to play or open it using your device’s browser. Here are some examples.
Chapter 2 zMedia App 2.4 System Tap System to view configure the admin account password, view system status, shutdown (or restart), manage applications, or configure power schedule and management settings. Figure 10 zMedia System 2.4.1 Settings Set the admin account password. Figure 11 zMedia Settings 2.4.2 Status • Tap System Information to see general NSA system information. • Tap Volume Status to view information about the internal and external volumes. • Tap S.M.A.R.
Chapter 2 zMedia App • Tap Active Sessions to see which users are connected to the NSA. Figure 12 zMedia Status 2.4.2.1 System Information An arrow indicates a newer firmware version is available. Tap the arrow to upgrade the firmware. Do not turn off the NSA while it is upgrading the firmware or you may render it unusable.
Chapter 2 zMedia App 2.4.2.2 Volume Status See Section 8.2.1 on page 158 for details on replacing a disk in a degraded or down RAID volume and resynchronizing or recovering a RAID 1 Volume. Figure 14 zMedia Volume Status 2.4.2.3 S.M.A.R.T. Self Monitoring, Analysis, and Reporting Technology (S.M.A.R.T) detects and reports the reliability of hard disks to help you anticipate possible disk failures. Figure 15 zMedia S.M.A.R.T.
Chapter 2 zMedia App 2.4.2.4 Active Sessions This shows the users connected to the NSA, whether it’s a Windows/CIFS, web (web configurator), or FTP connection, when they last connected, and the IP address of the user’s computer or device. Figure 16 zMedia Active Sessions 2.4.3 Shutdown Tap the Restart button to reboot the NSA or the Shutdown button to turn it off.
Chapter 2 zMedia App 2.4.4 Applications Enable or disable individual applications. Some applications only appear if the corresponding package is installed (see Chapter 11 on page 225). Tap the arrow next to Download Service or eMule to see task status details. Figure 18 zMedia Applications 2.4.4.1 Download Service and eMule Tap the arrow next to a category of download tasks to see the related tasks.
Chapter 2 zMedia App Tap the arrow next to a download task for details. Tap a button to remove, pause, or resume the task. Download Service screens are shown here as an example. eMule screens are similar. Figure 20 zMedia Download Service Active 2.4.5 Power Turn the power control schedule on or off and set how long to let the hard disks remain idle before putting them to sleep. Use the Web Configurator to configure the power control schedule (Section 17.3 on page 311).
C HAPT ER 3 NAS Starter Utility 3.1 Overview This chapter describes the NAS Starter Utility. Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it. Make sure you have a backup of any existing data in the hard disk before installing it in the NSA. Using the initialization wizard formats the hard disk and deletes all data in the process. There is a NAS Starter Utility available for Windows XP, Windows Vista, or Windows 7.
Chapter 3 NAS Starter Utility Start the NAS Starter Utility (click the icon in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility). The first time you open the NAS Starter Utility the discovery screen appears as follows. Figure 22 NAS Seeker The following table describes the labels in this screen. Table 1 NAS Seeker 36 LABEL DESCRIPTION Connect Select a NSA and click this to connect to it. Refresh Click this to refresh the screen.
Chapter 3 NAS Starter Utility 3.4 Main NAS Starter Utility Screen The main NAS Starter Utility screen displays after you select an NSA in the NSA Seeker screen. Figure 23 NAS Starter Utility Main Screen The following table describes the labels in this screen. Table 2 NAS Starter Utility Main Screen LABEL DESCRIPTION ? Click this to display the utility help. Configuration Click this to run the initialization wizard (see the utility help for details), configure system settings (see Section 3.
Chapter 3 NAS Starter Utility Table 2 NAS Starter Utility Main Screen LABEL DESCRIPTION Capacity This shows the NSA’s total, in-use, and remaining storage capacity. Media Player Click this to go to the Home screens where you can play media files. See Section 4.4 on page 46 for details on the Home screen. zPilot Click this to launch the zPilot to drag and drop files onto the NSA. Network Drive Click this to add the NSA as a network drive in your computer’s Windows Explorer.
Chapter 3 NAS Starter Utility The utility opens the NSA’s directory in Windows Explorer. Figure 25 Directory 3.5 Import Files or Folders with zPilot In the main NAS Starter Utility screen click zPilot to be able to drag and drop files from your computer to the NSA. Enter the administrator user name and password and click Login. Figure 26 Login The zPilot icon displays. Figure 27 zPilot Drag files onto the zPilot icon to move them to the NSA.
Chapter 3 NAS Starter Utility folder. For folders of files you are prompted to choose the target destination. The zPilot icon shows the transfer rate. Figure 28 zPilot Showing Transfer Rate Double-click the zPilot icon to display status details about the file transfers. Select an entry and click Pause, Resume, or Remove to control the transfer. After the transfer finishes you can select the entry and click Open Destination Folder to see the file on the NSA.
Chapter 3 NAS Starter Utility new drive in Windows Explorer (My Computer) where you can access and use it like your computer’s other drives. Figure 31 Network Drive 3.7 Manage the Device In the main NAS Starter Utility screen click Configuration > Manage the Device to log into the NSA’s administration screens where you can manage the NSA. Enter the administrator user name and password and click Login. Figure 32 Login See Section 4.5 on page 58 for more on the administration screens. 3.
Chapter 3 NAS Starter Utility Click Configuration > System Setting in the main utility screen to display the following screen. Figure 33 NAS Starter Utility > Configuration > System Setting The following table describes the labels in this screen. Table 3 NAS Starter Utility > Config LABEL DESCRIPTION Server Name Specify a name to uniquely identify the NSA on your network. You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character.
C HAPT ER 4 Web Configurator Basics 4.1 Overview This chapter describes how to access the NSA web configurator and provides an overview of its screens. The web configurator is an HTML-based management interface that allows easy NSA setup and management using an Internet browser. Use Internet Explorer 7.0, Mozilla Firefox 3.6, Safari 5, Google Chrome 10, or later versions of these browsers. The recommended screen resolution is 1024 by 768 pixels or higher.
Chapter 4 Web Configurator Basics 4.2.1 Access the NSA Via NAS Starter Utility If you don’t know the IP address of the NSA, use the NAS Starter Utility to find it. Refer to the Quick Start Guide for how to install and run the NAS Starter Utility. See Chapter 3 on page 35 for more information on the NAS Starter Utility. Figure 34 NAS Starter Utility Main Screen 4.2.2 Web Browser Access Configure the server name of your NSA using the Network Configuration screen (Section 3.
Chapter 4 Web Configurator Basics 4.3 Login The default username and password are ‘admin’ and ‘1234’ respectively. Enter your username and password. See Chapter 14 on page 293 for how to create other user accounts. If you use the option to stay logged in for two weeks (assuming you do not log out), make sure you keep your computer secure from unauthorized access. Click User Login to go to the Home screens where you can play media files.
Chapter 4 Web Configurator Basics If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore. Figure 37 Change Password Screen 4.4 Home Screens The Home screen after you log in using User Login.
Chapter 4 Web Configurator Basics The main Home screen displays icons for the various features you can access. Table 4 Main Home Screen Icons ICON DESCRIPTION Use Music, Photo, and Video to play and organize your music, picture, and video files. Use Favorite to create and edit playlists. Use File Browser to see your files in a tree-folder structure. Administrators can use Application Zone to install, access, and manage the NSA’s applications.
Chapter 4 Web Configurator Basics Here are some Home screen descriptions. A music screen is shown here as an example. Other screens work in a similar way. Figure 39 Music Screen A B C D This table describes common labels in the Home media screens. Not every item displays in every screen. Table 6 Home Media Screens LABEL DESCRIPTION A Click a letter to go to the first item starting with that letter. B View files. Double-click an item to play it.
Chapter 4 Web Configurator Basics Table 6 Home Media Screens LABEL DESCRIPTION List Click this to view the files as a list. Play Click this to play the currently selected file. You can also double-click a file to play it. Delete Select an item and click Delete to remove it. Rename Select an item and click Rename to change its name. Note: When you change a file name, make sure you keep the file extension unchanged.
Chapter 4 Web Configurator Basics 4.4.2 Exif and Google Maps (Photos) Click a photo’s EXIF button to display or hide the photo’s Exchangeable image file format (Exif) data. Figure 41 Exif Information If a photo’s Exif data includes GPS location data, click the latitude or longitude link to display the location in Google Maps. Click Clear to delete the markers of other photos and only display the current photo’s marker. Figure 42 Google Maps 4.4.
Chapter 4 Web Configurator Basics Note: Your browser must have the Flash Player plug-in installed to view slideshows. Figure 43 Slideshow When the CoolIris plugin is installed in your browser, click the Launch CoolIris button to display your photos as a 3-D wall for quick browsing. 4.4.4 Favorite Use the Favorite menu to manage your playlists. 4.4.4.
Chapter 4 Web Configurator Basics 4.4.4.2 My Favorite Use Favorite > My Favorite to create, edit, and play playlists. These playlists are specific to the NSA and cannot be used in external music players. Figure 44 Favorite > My Favorite This table describes labels in this menu. Table 7 Favorite > My Favorite LABEL DESCRIPTION New Click this to create a new playlist. Edit Double-click a playlist or select it and click Edit to go to a screen where you can remove songs from the playlist.
Chapter 4 Web Configurator Basics • The administrator owns and manages the public shares. • Double-click a media file to open it. Double-click other types of files to be able to save them. • Click to the right of a file or folder name to select it. • Use the [SHIFT] key to select a range of entries. Hold down the [CTRL] key to select multiple individual entries. • Drag and drop files to open a screen that lets you choose whether to copy or move them. • You can upload files of up to 2 GB in size.
Chapter 4 Web Configurator Basics Table 8 File Browser (continued) LABEL DESCRIPTION Configure Share Select a share and click this link to open a screen where you can see and configure share management details. Upload Click this to open the following screen where you can add files to the share. Use the Browse button to locate your file/s and click Apply to upload the file. Click Cancel to close this screen. Note: Do not refresh the screen while an upload is going on.
Chapter 4 Web Configurator Basics The following table describes the labels in the this screen. Table 9 File Browser > Configure Share LABEL DESCRIPTION Share Name Configure a name to identify this share. Type a share name from 1 to 239 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing local share. See Section 4.4.6 on page 55 for more information on share names.
Chapter 4 Web Configurator Basics • Multiple spaces within names are converted to a single space. • Share names must be unique (they cannot be the same as other share names). • The NSA creates automatic volume names for external (USB) disk volumes. These are a type of share, so the share name you configure cannot conflict with the external (USB) disk volume names. “ExtVol1” or “ExtVol2” are examples of external (USB) disk volume names.
Chapter 4 Web Configurator Basics Table 10 Application Zone (continued) LABEL DESCRIPTION Disable Select an enabled application and click this to turn off the application. Select the Flickr or Youtube Uploadr entry and click this to cancel all uploading. Some applications are always enabled and cannot be disabled. Pause Select the Flickr or Youtube Uploadr entry and click this to pause current uploading. Resume will resume current uploading.
Chapter 4 Web Configurator Basics Table 11 System > Settings (continued) LABEL DESCRIPTION Slide Interval Select how long to display each image in a slideshow before changing to the next. Video Playback Select Play Next to play the rest of the video files in a folder. So for example, a folder has video files 1~10 and you play video 3. When video 3 finishes the device continues playing the rest of the videos in the folder (4~10). It does not loop back and play videos 1 and 2.
Chapter 4 Web Configurator Basics The Status screen is the first advanced administration screen that displays. Figure 49 Status 1 2 3 4 4.5.1 Global Administration Icons The icons and language label at the top-right of the screen ( 1 ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels. Table 12 Global Labels and Icons LABEL/ICON DESCRIPTION Language Select the web configurator language from the drop-down list box.
Chapter 4 Web Configurator Basics 4.5.2 Navigation Panel The navigation panel on the left of the Web Configurator screen ( 2 ) contains screen links. Click a link to display sub-links. There are no sub-links for the Status screen. Certain screens also contain hyper links that allow you to jump to another screen. The following table describes the navigation panel screens.
Chapter 4 Web Configurator Basics Table 13 Screens Summary (continued) LINK SCREEN FUNCTION Sharing Users View, create and edit administrator and user accounts to let people use the NSA. Groups View, create and edit groups. Groups allow you to organize users into specific groups. You can create shares accessible only by the group members. Shares View, create and edit shares. Shares are shared folders to which you can allow specific users read/write access rights.
Chapter 4 Web Configurator Basics Table 14 Common Configuration Screen Icons (continued) ICON DESCRIPTION User See the chapter on user accounts for detailed information on variants of this icon. Share See the chapter on shares for detailed information on variants of this icon. Healthy This represents a healthy volume. Degraded This represents a degraded RAID 1 volume. Replace the faulty disk. If the replacement disk does not contain any partition, the NSA automatically restores the volume.
C HAPT ER 5 Tutorials 5.1 Overview This chapter provides tutorials that show how to use the NSA.
Chapter 5 Tutorials 64 1 Click Start > Control Panel. Set View by to Category and click Network and Internet. 2 Click View network computers and devices.
Chapter 5 Tutorials 3 The NSA icon displays twice because the NSA is both a media server and a storage device. Doubleclick either NSA icon to open the Web Configurator login screen. 5.2.1 If the NSA Icon Does Not Display The network containing the NSA must be set as a home or work network in order for the NSA icons to display. If the network containing the NSA displays as “Public”: 1 Click Network and Sharing Center and then the network’s link (circled in the figure).
Chapter 5 Tutorials 2 Use the Set Network Location screen to set the network’s location to home or work. 5.2.2 NSA Icon Right-click Options Right-click the NSA’s icon to see these options: • Install/Uninstall: Click Install to add the NSA as a device in your computer. After you install the NSA you can see it in the computer’s list of devices (see Section 5.5 on page 70. Click Uninstall to remove the NSA from the list of devices installed in your computer.
Chapter 5 Tutorials • Properties opens a window of NSA details and troubleshooting information. • Manufacturer identifies the company that produced the NSA. • Model identifies the NSA model. • Model number identifies the NSA model number. • Device webpage shows the IP address for accessing the Web Configurator. • Serial number is unavailable because the NSA does not have one. • MAC address is the NSA’s unique physical hardware address (MAC). You need the MAC address to register the product at myZyXEL.
Chapter 5 Tutorials 1 Click Start > Control Panel > View network status and tasks (or Network and Sharing Center if you view the Control Panel by icons). 2 Click See full map (1 in the figure). The network containing the NSA must be set as a home or work network in order to use the full map feature.
Chapter 5 Tutorials 3 Double-click the NSA’s icon to open the Web Configurator login screen. See Section 5.2.2 on page 66 for the NSA icon’s right-click options.
Chapter 5 Tutorials 5.4 Playing Media Files in Windows 7 In Windows 7, the NSA automatically displays as a library in Windows Media Player. Figure 50 NSA in Windows Media Player 5.5 Windows 7 Devices and Printers After you use the NSA’s network icon’s install option you can manage the NSA from the Windows 7 Devices and Printers folder.
Chapter 5 Tutorials Click Start > Control Panel > Hardware and Sound > Devices and Printers. Select the NSA icon to display information about the NSA. Double-click the NSA icon to open a properties window (see page 67). Right-click the icon to display these options: • Download NAS Starter Utility downloads the NSA’s Starter Utility. It lets you find, set up, and manage the NSA as well as copy files to it and access the files on it. See Chapter 3 on page 35 for details.
Chapter 5 Tutorials 5.5.1 Windows 7 Desktop Shortcut This is the NSA’s desktop shortcut. Double-click it to open a properties window (see page 67). 1 Right-click the NSA’s desktop shortcut icon to see these options: • Open file location takes you to the Windows 7 Devices and Printers folder. • Download NAS Starter Utility downloads the NSA’s Starter Utility. It lets you find, set up, and manage the NSA as well as copy files to it and access the files on it. See Chapter 3 on page 35 for details.
Chapter 5 Tutorials • Delete sends the shortcut to the recycle bin. • Rename lets you change the name of the shortcut. • Troubleshoot opens Windows’ device troubleshooting wizard. • Remove device removes the NSA from the Windows 7 Devices and Printers folder. • Properties opens a window of details about the shortcut. 5.6 Creating a Volume in a 2-Bay NSA This section shows you how to create a volume in your 2-bay NSA. Creating a volume deletes all existing data in the hard disk.
Chapter 5 Tutorials 5.6.2 Migrate Button Do the following steps to create a RAID 1 volume. 1 Once you install a second SATA hard disk in the NSA, the Storage > Volume screen shows the Migrate button. 2 Click the Migrate button and you can see the following progress bar. Wait for the RAID 1 volume to be created. This may take quite a while depending on how much data you have in the original volume. 5.6.
Chapter 5 Tutorials This deletes all existing data in the SATA hard disk. Make sure you have a backup of any existing data in the hard disk. The NSA starts creating the volume and you can see the following progress bar. Wait for the RAID 1 volume to be created. 3 The Storage > Volume screen displays with your RAID 1 volume. 5.7 Creating a Volume in a 1-Bay NSA This section shows you how to create a volume on your 1-bay NSA. Creating a volume deletes all existing data in the SATA or eSATA hard disk.
Chapter 5 Tutorials Your NSA has a single bay for a SATA (Serial Advanced Technology Attachment) hard disk. The firmware installed during hard disk initialization (Chapter 3 on page 35) automatically creates a JBOD volume on your SATA hard disk. JBOD is the default storage method if you are using a single hard disk for your NSA. This JBOD volume shows up in the Storage > Volume screen (Section 8.2 on page 158) as follows.
Chapter 5 Tutorials 2 Click the Migrate button and you can see the following progress bar. Wait for up to 10 minutes for the RAID 1 volume to be created. 5.7.3 Create a SATA Volume Button If you do not have an existing volume in the Storage > Volume screen, do the following steps to create a RAID 1 volume. 1 In the Storage > Volume screen, click Create a SATA Volume. 2 In the Disk Configuration screen, you can select the storage method. • Type in the Volume Name for your RAID 1 volume.
Chapter 5 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the RAID 1 volume to be created. 3 78 The Storage > Volume screen displays with your RAID 1 volume.
Chapter 5 Tutorials 5.7.4 Creating a PC Compatible Volume You can use your eSATA hard disk as a separate storage volume. The following section shows you how to create a PC Compatible Volume. Use this storage method if you have an eSATA hard disk that will be connected to a Windows computer when it is not connected to the NSA. However, the computer’s platform (for example, Windows XP SP2) should support the file system you selected for the eSATA hard disk.
Chapter 5 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the volume to be created. 3 80 The Storage > Volume screen displays with your PC Compatible Volume.
Chapter 5 Tutorials 5.7.4.1 Checking Your PC Compatible Volume The files in the eSATA hard disk that you configured as a PC Compatible Volume should be accessible when you connect the eSATA hard disk to your computer. You can configure the features of your NSA to save files to your eSATA hard disk. For example, you can refer to Section 5.11 on page 107 to use the Broadcatching feature of your NSA to download files to your eSATA disk.
Chapter 5 Tutorials 3 Disconnect the eSATA hard disk from the NSA. Connect the eSATA hard disk to your computer. On some systems, you can see the following notification. 4 The computer assigns a letter to the eSATA hard disk (drive F in this example) that is accessible from the My Computer screen. Double click the eSATA drive and check your files. They should be the same files that are in the My NSA > Share Browser screen. 5.
Chapter 5 Tutorials 1 2 In the Storage > Volume screen, select the volume you want to delete and click the delete icon. A confirmation window appears as follows. Click Yes. This deletes all existing data in the volume. Make sure you have a backup of any existing data in the hard disk. 5.9 File Sharing Tutorials The following sections cover using the NSA for file sharing.
Chapter 5 Tutorials 84 1 At the NSA web configurator login screen enter the administrator account and password and click Administrator Login to go to the advanced administration screens. 2 Click Sharing > Users to open the Users screen. Then click Add User.
Chapter 5 Tutorials 3 Configure the screen as follows and write down the username and password to give to Jimmy. If the username and password are the same as Jimmy’s Windows login, Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn’t get to configure the whole NSA. Click Apply to create the account. 4 The account now displays in the Users screen.
Chapter 5 Tutorials 86 1 In the NSA’s administration web configurator screens, click Shares > Add Share. Click Add Share to create a new share. 2 Specify a name for the share and select which volume it should be on. Configure the screen as follows. Then click Edit.
Chapter 5 Tutorials 3 Configure the screen as follows to give Jimmy full access right to the share. Then click Apply to create the share. Now that Bob has created Jimmy’s share, he can go through the steps again to create another share for Kevin. 5.9.3 Creating a Group After creating user accounts for Jimmy and Kevin, Bob wants to create a group for his sons and another one for the parents.
Chapter 5 Tutorials 2 Specify a name for the group. Select the user(s) you want to add to the group from the Available User(s) list and click Add Selected User(s). Configure the screen as follows. Then click Apply to create the group. Now that Bob has created a group for Jimmy and Kevin, he can go through the steps again to create another group for the parents. Then he can see the rest of the tutorials for how to use the groups in assigning access rights to shares. 5.9.
Chapter 5 Tutorials 3 Select the network drive that you want to map the NSA to from the Drive list box. This example uses I. Then browse to and select the share on the NSA. Click Finish. 4 Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login.
Chapter 5 Tutorials 5 After the mapping is done, you can then simply copy and paste or drag and drop files from/to your local computer’s drives to or from this network folder. Just like the NSA’s share was another folder on your computer. Now that Bob has mapped Jimmy’s share to Jimmy’s computer, he can go through the steps again to map Kevin’s share to Kevin’s computer. 5.9.5 Accessing a Share Using FTP You can also use FTP to access the NSA.
Chapter 5 Tutorials 2 Enter your password and click Login. 3 Now you can access files and copy files from/to your local computer’s drives to or from this network folder. 5.9.6 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator.
Chapter 5 Tutorials 1 Log into the NSA web configurator (see Section 4.3 on page 45) using the appropriate user name and password (this example uses Jimmy’s) and click File Browser. Click a share (the Jimmy share in this example) to see the top level of the share’s contents. 2 Click a folder’s file name to browse the folder. You can open files or copy them to your computer. You can also create new folders and upload additional files to the share. 3 Click the logout icon when your are done. 5.
Chapter 5 Tutorials 2 Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a datasheet for ZyXEL’s GS-2024 (a device for making phone calls over the Internet). Note: Make sure the link opens either the file you want or a pop-up window about how to handle the file. Note: It is also OK for the link to open a .torrent file.
Chapter 5 Tutorials 94 4 Log into the NSA web configurator (see Section 4.3 on page 45) using the administrator account and click Application Zone and the Application Zone > Download Service link. 5 Click Add.
Chapter 5 Tutorials 6 Right-click the URL field and select Paste. 7 The URL displays in the URL field. Click Apply. 8 After a few moments, the download task appears in the Download Service screen’s Active tab. The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share’s download folder. See Section 5.9.4 on page 88, Section 5.9.5 on page 90, or Section 5.9.6 on page 91 for how to access a share. 5.10.
Chapter 5 Tutorials Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7. Internet Explorer 96 1 Open the folder containing the link capture browser plugin. 2 Double-click on the plugin to display the following screen. Click I Agree to begin installation. 3 Select a location to save the plugin and click Install. Close the screen once the installation is complete.
Chapter 5 Tutorials 4 Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting. 5 Enter the NSA’s web address. The default is ‘nsa’ followed by the number of your model (‘nsa325’ for example). Then click Apply. A warning message displays asking for confirmation. Click OK to apply the setting. Firefox 1 Open Firefox.
Chapter 5 Tutorials 98 3 To install the plugin, drag and drop the plugin to Firefox. 4 The following screen displays. Click Install Now.
Chapter 5 Tutorials 5 You need to restart Firefox after the installation. 6 When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’s web address.
Chapter 5 Tutorials 7 Enter the NSA’s web address. The default is ‘nsa’ followed by the number of your model (‘nsa325’ for example). Then click OK. 5.10.3 Using the Link Capture Browser Plugin Once you install the plugin, you may begin sending download links to the NSA from your web browser. This example shows how to send a download link to the NSA’s download service using the link capture browser plugin. 100 1 Open your Internet browser (this example uses Firefox).
Chapter 5 Tutorials 4 The login screen shows up. Enter your NSA’s login information and click Login to send the link to the download service. A confirmation message displays. 5 Log into the NSA web configurator (see Section 4.3 on page 45) using the administrator account and click Application Zone and the Application Zone > Download Service link. 6 The download task appears in the Download Service screen’s Active or Queue tab.
Chapter 5 Tutorials By default the NSA stores all downloads in the admin share’s download folder. See Section 5.9.4 on page 88, Section 5.9.5 on page 90, or Section 5.9.6 on page 91 for how to access a share. 5.10.4 Configuring the Download Service Preferences Once you added a list of download tasks to the NSA (see Section 5.10.1 on page 92 and Section 5.10.3 on page 100), you can have the NSA download files during a specific time period of the day.
Chapter 5 Tutorials 3 When it is not the download time, you see a message in the Download Service screen, indicating the active download period. Click Applications > Download Service > Preferences > BitTorrent to open the following screen. Enter the information below and then click Apply. Here is a list of BitTorrent settings you want to configure for your NSA: • Limit the maximum upload rate to 20 KB/s. Enter this value in the Max. upload rate field.
Chapter 5 Tutorials • Click Edit IP Filter. Use an online IP filter table from http://www.bluetack.co.uk/config/level1.gz for example to protect BitTorrent downloads. Enter the URL in the Update IP Filter from the Internet Every Week field. 5.10.5 Using Download Service Notification Use an RSS feed reader on your computer to keep track of files the NSA has downloaded. The following examples show how to subscribe to the NSA’s download service notifications. See Section 10.11.
Chapter 5 Tutorials Internet Explorer 7 Example 1 After you activate download service notification, click the RSS feed icon. 2 The following screen displays. Select Subscribe to this feed. 3 The following screen displays. Click Subscribe.
Chapter 5 Tutorials 4 Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Firefox Example 106 1 After you activate download service notification, click the RSS feed icon. 2 The following screen displays. Select Live Bookmarks from the drop-down list and click Subscribe Now. 3 The following screen displays. Select Bookmarks Menu and click Add.
Chapter 5 Tutorials 4 From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list. 5.11 Broadcatching Tutorial Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV Internet television channel. See Section 10.8 on page 203 for more on the broadcatching service.
Chapter 5 Tutorials 2 Find the link for the RSS feed containing the channel you want to add. In this example, http:// reviews.cnet.com/4520-11455_7-6333605-1.html has an RSS link for subscribing to the CNET Live podcast. However this is not the link for the actual RSS feed. Click the link to go to another screen that has RSS feed links. Note: Make sure the link goes to the actual RSS feed instead of to another list of links or information about the channel. One way to test this is by clicking the link.
Chapter 5 Tutorials 3 Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer). 4 Log into the NSA web configurator (see Section 4.3 on page 45) using the administrator account and click Administration > Applications > Broadcatching. 5 Click Add Channel.
Chapter 5 Tutorials 6 Right-click the URL field and select Paste. 7 The URL displays in the URL field. 8 Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later. 9 Select a policy for what items to delete. This example keeps the most recent 10 items. 10 Click Apply. 11 After a few moments, the channel appears in the Broadcatching screen where you can select items you want to download.
Chapter 5 Tutorials 5.12 Printer Server Tutorial Do the following to have the NSA let computers on your network share a printer. See www.zyxel.com for a list of compatible printers. 1 Make sure the NSA is on and the SYS light is on steady (not blinking). 2 Use a USB cable to connect the printer’s USB port to one of the NSA’s USB ports. Make sure the printer is also connected to an appropriate power source. NSA 3 Turn on the printer. 4 The NSA detects the printer after a few moments.
Chapter 5 Tutorials 6 If you get a warning screen, click the option that lets you continue (Yes in this example). 7 If your computer does not already have the printer’s driver installed, you will need to install it. In this example, click OK. 8 Use the wizard screens to install the printer driver on the computer. You may need to get the file from the printer’s CD or the printer manufacturer’s website (the driver is not installed on the NSA).
Chapter 5 Tutorials 5.13 Copy and Flickr Auto Upload Tutorial Amy received some photos taken during her best friend’s wedding and saved the files on a USB disk. She wants to save a copy of the photos in the NSA and upload the photos to her Flickr account. Amy has to activate the NSA’s auto upload feature. See Section 12.4 on page 275 for more details on setting up a Flickr account for auto upload. In this example Amy select the NSA’s photo share for auto upload.
Chapter 5 Tutorials 5 The NSA also automatically uploads the copied files to Flickr. r 5.14 FTP Uploadr Tutorial FTP Uploadr can automatically upload files saved on the NSA to a remote FTP server. Amy wants to share files on her NSA with Susan. They each have an NSA at home, so Susan has to set her NSA as an FTP server for Amy to automatically send files using FTP Uploadr. l Amy’s NSA Susan’s NSA To set the NSA as an FTP server, click Applications > FTP to open the FTP screen.
Chapter 5 Tutorials Susan also has to create a user account and share on her NSA for Amy to upload files. The share is used for files uploaded from Amy’s NSA. Amy will then use the following information to configure FTP Uploadr on her NSA. Table 15 FTP Uploadr Tutorial: FTP Server Information FTP Domain Name or IP Address example2.com FTP User Name Amy FTP Password xxxxx Share (Remote Path) Amy This is how Amy would set up the NSA’s FTP Uploadr.
Chapter 5 Tutorials 4 In the FTP Uploadr screen, click Preferences to configure the auto upload settings. 5 Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List.
Chapter 5 Tutorials 6 Amy also set the Bandwidth Limit to 20KB/s so that the upload doesn’t slow down her Internet connection. Now Amy has set up FTP Uploadr to send files to Susan’s NSA. Every time Amy adds new files or renames files in the video share, these new or modified files will be uploaded automatically to the Amy share on Susan’s NSA. Similarly, Susan can go through the steps described above to configure FTP Uploadr on her NSA.
Chapter 5 Tutorials 5.15.1 Customizing the NSA’s Certificate 118 1 Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit. 2 Next, let’s modify the certificate by changing the Common Name to this NSA’s host name of “nsa”, the Organization to “ZyXEL” and the Key Length to 2048.
Chapter 5 Tutorials 3 The NSA restarts its network services and returns you to the login screen. 5.15.2 Downloading and Installing Customized Certificate 1 Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download.
Chapter 5 Tutorials 120 2 Save the file to your computer. 3 Find the certificate file on your computer and double-click it.
Chapter 5 Tutorials 4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix D on page 411 for other examples. In the Certificate dialog box, click Install Certificate. 5 In the Certificate Import Wizard, click Next.
Chapter 5 Tutorials 122 6 Leave Automatically select certificate store based on the type of certificate selected and click Next. 7 In the Completing the Certificate Import Wizard screen, click Finish.
Chapter 5 Tutorials 8 If you are presented with another Security Warning, click Yes. 9 Finally, click OK when presented with the successful certificate installation message. 5.15.3 Turn on the NSA’s Web Security Now that you have customized the NSA’s certificate and installed it in your computer, you can turn on security for your Web Configurator sessions. This example uses Firefox 3.0. See Appendix D on page 411 for more information on browsers and certificates.
Chapter 5 Tutorials 124 1 Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. 2 A warning screen pops up if applying your change may disconnect some users. Click Apply to continue.
Chapter 5 Tutorials 3 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. 4 Click Add Exception.
Chapter 5 Tutorials 5 126 Click Get Certificate.
Chapter 5 Tutorials 6 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View.
Chapter 5 Tutorials 7 128 The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close.
Chapter 5 Tutorials 8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. 9 The login screen displays. Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s certificate so they can check it before adding a security exception (as in steps 6 to 7 on pages 127 to 128).
Chapter 5 Tutorials 5.16 Using FTPES to Connect to the NSA This section covers how to use FTP over Explicit TLS/SSL with the NSA for secure FTP transfers. Before you go through this section, read Section 5.15 on page 117 to configure HTTPS. This example uses FileZilla. 1 Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA’s address. • Set the Servertype to FTPES - FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect.
Chapter 5 Tutorials 2 A security warning screen displays. The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). If they match, click OK. The shares and folders to which Gonzo has access display. Now you can use FTP to securely transfer files to or from the NSA.
Chapter 5 Tutorials 5.17.1 Finder 132 1 Open a new Finder window. 2 Select All under the SHARED sidebar. Look for the NSA from the Network list.
Chapter 5 Tutorials 3 Expand the NSA to display the shares you may access. 5.17.2 Go Menu 4 In the Finder, click Go > Connect to Server.
Chapter 5 Tutorials 5 When the Connect to Server dialog box opens, enter smb:// and the NSA’s IP address in the Server Address field. You may also click Browse to have the Mac search for the NSA. Click Connect. 6 Once you establish the connection, you can access the NSA from the Finder or directly from the desktop. 5.18 How to Use the BackupPlanner Note: The screens and links in this section appear only after you have installed and enabled BackupPlanner.
Chapter 5 Tutorials 1 Click Protect > Backup > Add Job. Figure 51 Protect > Backup 2 Identify the backup job and select Archive. New files are often added to the shares that you need to back up and existing files are not frequently changed so select Incremental. The NSA does a full backup first and later only copies source files that are new and/or modified since the last backup. This example sets the NSA to do another full backup after every four incremental backups.
Chapter 5 Tutorials 3 Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection.
Chapter 5 Tutorials 4 In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the target NSA so you can leave the encryption off, too. Have the NSA keep 3 backups. Figure 54 Protect > Backup > Add Job: Step 3 5 Set the frequency to Weekly. Schedule the backup for 5:00 every Saturday morning. Protect > Backup > Add Job: Step 4 5.18.
Chapter 5 Tutorials 1 Click Protect > Backup > Add Job. Figure 55 Protect > Backup Name the backup job and select Synchronization. You want only your current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder. Figure 56 Protect > Backup > Add Job: Step 1 2 Select the folder that needs to be mirrored (your Private folder in this example) and Remote.
Chapter 5 Tutorials • Click Next. Figure 57 Protect > Backup > Add Job: Step 2 3 Click OK in the warning dialog box. Figure 58 Protect > Backup > Add Job: Step 3 4 For this example, assume the connection to the German branch office is a good one and not many files need to be backed up so leave the compression off. • Turn on the encryption to protect these sensitive files during the transfer. The final files stored on the remote NSA will be unencrypted (usable).
Chapter 5 Tutorials • Click Next. Figure 59 Protect > Backup > Add Job: Step 3 5 Schedule the backup to occur every morning at 3:00 and click Done. Figure 60 Protect > Backup > Add Job: Step 4 You do not need to use a special restore process to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share. 5.18.
Chapter 5 Tutorials 1 Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 61 Protect > Backup 2 Select which backup to use and click Next.
Chapter 5 Tutorials 3 Select the files and folders you want to restore and click Next. Figure 63 Protect > Backup > Restore Archive: Step 2 4 Select the original location and click Done.
Chapter 5 Tutorials 5 The NSA restores the files into the share. When it finishes you can access the files. Figure 65 Protect > Backup > Restore Archive: Progress 5.18.4 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore archived files by the backup job. In this example, the NSA’s RAID array failed. You’ve replaced the hard drives and re-configured the RAID. To restore by backup files: 1 Click Protect > Restore.
Chapter 5 Tutorials 2 Select the backup job and backup time and click Next. Figure 67 Protect > Restore: Step 2 3 Select everything in the share except the recycle folder. Click Next.
Chapter 5 Tutorials 4 Browse to the folder where you want to put the files. Click Done. Figure 69 Protect > Restore: Step 4 5 The NSA restores the files and you can use them again.
Chapter 5 Tutorials 146 Media Server User’s Guide
P ART II Technical Reference 147
C HAPT ER 6 Status Screen 6.1 Overview This chapter describes the Status screen, which is the first advanced administration screen that displays. 6.2 The Status Screen Click Administration in the Home screens (Section 4.5 on page 58) to open the Web Configurator. You can also view the status screen, by clicking Status on the top-left of the navigation panel.
Chapter 6 Status Screen The following table describes the labels in this screen. Table 16 Status LABEL DESCRIPTION Status Click this to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the Edit icon to go to the screen where you can configure this. Model Name This displays which model this NSA device is. Firmware Version This is the NSA firmware version.
Chapter 6 Status Screen Table 16 Status (continued) LABEL DESCRIPTION External Volume (or USB Volume) This displays the volumes created on USB hard drives connected to the NSA. USB disks are numbered in the order that you insert USB devices. Click the Edit icon to open the Storage screen. You can create and edit the external volume. See Chapter 8 on page 157 for more details. Status This icon indicates whether the volume is healthy, degraded, or down. Name This field shows the name for the volume.
Chapter 6 Status Screen 152 Media Server User’s Guide
C HAPT ER 7 System Setting 7.1 Overview This chapter gives an overview of the various features included in the system setting screens. You can identify your NSA on the network and set the time that the NSA follows for its scheduled tasks/ logs. 7.2 What You Can Do • Use the Server Name screen (Section 7.4 on page 154) to specify the NSA’s server and workgroup names. • Use the Date/Time screen (Section 7.5 on page 154) to set up date/time and choose a time zone for the NSA. 7.
Chapter 7 System Setting 7.4 The Server Name Screen Click System Setting > Server Name to open the following screen. Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup. Note: CIFS cannot be disabled on the NSA. Figure 71 System Setting > Server Name The following table describes the labels in these screens.
Chapter 7 System Setting Click the System Setting link in the navigation panel and then click the Date/Time link to access the Date/Time screen. Figure 72 System Setting > Date/Time The following table describes the labels in this screen. Table 18 System Setting > Date/Time LABEL DESCRIPTION Current System Date Time Setting Current Time This field displays the time used by your NSA for its logs and alerts. Current Date This field displays the date used by your NSA for its logs and alerts.
Chapter 7 System Setting Table 18 System Setting > Date/Time (continued) LABEL Synchronize Now DESCRIPTION Click this for the NSA to retrieve the correct time from the configured time server right away. Time Zone Time Zone Choose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT).
C HAPT ER 8 Storage 8.1 Overview Several NSA features require a valid internal volume. This chapter covers the management of volumes and disks (both internal and external). Use the Storage screen (Section 8.2 on page 158) to display information on all volumes, create internal and external volumes, and configure the volume’s properties. 8.1.
Chapter 8 Storage Note: 1-bay models configure the internal hard disk (SATA) as JBOD by default. You can modify it if you attach a second internal hard disk (an eSATA hard disk). Finding Out More See Section 8.6 on page 166 for more technical background information on storage. 8.2 The Storage Screen The Storage screen allows you to create and edit volumes in the NSA. 8.2.1 Disk Replacement Restrictions See the Quick Start Guide for information on replacing disks in the NSA.
Chapter 8 Storage 8.2.2 Storage Screen Click Storage > Volume in the navigation panel to display the following screen. Use this screen to display internal and external volumes on the NSA. Note: It is recommended to scan the volume every three months or 32 reboots. Figure 73 Storage > Volume The following table describes the labels in this screen.
Chapter 8 Storage Table 19 Storage > Volume (continued) LABEL DESCRIPTION Capacity This field shows total disk size, the percentage of the volume being used and the percentage that is available. Actions This field displays icons allowing you to edit, scan, repair, expand, migrate, or delete a volume. You can also locate or eject an external volume. Note: If you delete a volume, all data in the volume disk(s) is erased. You see a warning screen before you delete a volume.
Chapter 8 Storage If it’s down, then the only indication is that you can no longer transfer files to/from the shares in the down volume. If it’s degraded, then file transfer to/from the shares in the degraded volume will be slower. Note: There is no explicit message from CIFS that tells users their volume is degraded or down. 8.
Chapter 8 Storage The following table describes the labels in this screen. Table 20 Storage > Create an Internal Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters. To avoid confusion, it is highly recommended that each volume use a unique name. Acceptable characters are all alphanumeric characters, " " [spaces], "_" [underscores], and "." [periods]. The first character must be alphanumeric (A-Z 0-9). The last character cannot be a space " ".
Chapter 8 Storage Note: Once you create the first volume on the NSA, it is recommended to restart the NSA for better performance. 8.4 Editing a Volume Click an internal volume’s Edit icon in the Storage screen as shown in Figure 73 on page 159 to open the following screen. Use this screen to change the volume’s name. Figure 76 Storage > Edit The following table describes the labels in this screen.
Chapter 8 Storage 8.4.1 Scanning a Volume Select a volume in the Storage > Volume screen (Section 8.2 on page 158) and click Scan to open the following screen. Use this screen to scan the volume for errors and select whether or not to have the NSA automatically repair them. Figure 77 Storage > Volume > Scan The following table describes the labels in this screen.
Chapter 8 Storage Note: Creating a volume formats the drive. All data on the disk will be lost. Figure 78 Storage > Create an External Volume The following table describes the labels in this screen. Table 23 Storage > Create an External Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters. The name cannot be the same as another existing external volume. Acceptable characters are all alphanumeric characters and " " [spaces], "_" [underscores], and "." [periods].
Chapter 8 Storage 8.6 Storage Technical Reference This section provides some background information about the topics covered in this chapter. 8.6.1 Volumes and RAID A volume is a storage area on a disk or disks. You can create volumes on the internal disks and external disks attached to the USB port(s). You can spread a volume across internal disks but not between internal and external disks. RAID (Redundant Array of Independent Disks) or JBOD is the storage method that the NSA uses.
Chapter 8 Storage to your one-disk JBOD volume later without having to re-create shares, access rights, and so on. Alternatively, you could create a different JBOD volume if you install a second disk. (and create new shares, access rights and so on). Two Disks: You may choose JBOD, RAID 0 or RAID 1. With two disks you could create: • up to two JBOD volumes • one RAID 0 or RAID 1 volume • Choose JBOD for flexibility and maximum usage of disk space for data.
Chapter 8 Storage it from the ‘n’ that remain, regardless of which piece is lost. Parity protection is used with striping, and the “n” pieces of data are typically the blocks or bytes distributed across the drives in the array. The parity information can either be stored on a separate, dedicated drive, or be mixed with the data across all the drives in the array. Note: In the following figures, A1, A2, A3 and so on are blocks of data from the A file.
Chapter 8 Storage Typical applications for RAID 0 are non-critical data (or data that changes infrequently and is backed up regularly) requiring high write speed such as audio, video, graphics, games and so on. RAID 1 RAID 1 creates an exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity. The following figure shows two disks in a single RAID 1 volume with mirrored data.
Chapter 8 Storage 170 Media Server User’s Guide
C HAPT ER 9 Network 9.1 Overview This chapter discusses the network configuration screens. The Network screens allow you to configure TCP/IP and PPPoE settings for the NSA. 9.2 What You Can Do • Use the TCP/IP screen (Section 9.4 on page 173) to assign the NSA a dynamic or static IP address and DNS information. • Use UPnP port mapping (Section 9.5 on page 175) to automatically configure your Internet gateway’s firewall and Network Address Translation (NAT) to allow access to the NSA from the Internet.
Chapter 9 Network PPPoE Point-to-Point Protocol over Ethernet (PPPoE) allows the NSA to establish a direct Internet connection if you do not have a router. PPPoE is a dial-up connection. You need a username and password from your Internet Service Provider (ISP) to set up the connection. Jumbo Frames Jumbo frames are Ethernet frames larger than 1500 bytes. They enable data transfer with less overhead. The bigger the frame, the better the network performance.
Chapter 9 Network 9.4 The TCP/IP Screen Use the TCP/IP screen to have the NSA use a dynamic or static IP address, subnet mask, default gateway and DNS servers. Click Network > TCP/IP in the navigation panel to open the following screen. Note: If you change the NSA’s IP address, you need to log in again after you apply changes.
Chapter 9 Network The following table describes the labels in this screen. Table 28 Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NSA get IP address information automatically. If no IP address information is assigned, the NSA uses Auto-IP to assign itself an IP address and subnet mask. For example, you could connect the NSA directly to your computer.
Chapter 9 Network Table 28 Network > TCP/IP (continued) LABEL DESCRIPTION Jumbo Frames Jumbo frames improve network performance. You must have a 1 Gbps (Gigabit Ethernet) network that supports jumbo frames. Select the largest size of frame that all of your network devices (including computer Ethernet cards and switches, hubs, or routers) support. When enabled, you can choose between 4 KB, 8 KB, and 9 KB frame sizes.
Chapter 9 Network If your Internet gateway supports Port Address Translation (PAT is sometimes included with a port forwarding feature), you can have the Internet users use a different TCP port number from the one the NSA uses for the service. Figure 82 UPnP Port Address Translation for FTP Example 192.168.1.20 a.b.c.d TCP: 21 TCP: 2100 In the above example, the Internet gateway uses PAT to accept Internet user FTP sessions on port 2100, translate them to port 21, and forward them to the NSA. 9.5.
Chapter 9 Network 9.5.3 The NSA’s Services and UPnP This section introduces the NSA’s services which an Internet gateway can use UPnP to allow access to from the Internet. BitTorrent BitTorrent is a distributed peer-to-peer file-sharing protocol that the NSA’s download service can use. Using UPnP port mapping for BitTorrent lets BitTorrent work faster.
Chapter 9 Network to the Internet gateway’s WAN interface to access services on the NSA. You can set which port Internet users need to use to access a specific service on the NSA. Note: Some Internet gateways will delete all UPnP mappings after reboot. So if the Internet gateway reboots, you may need to use this screen again to re-apply the UPnP port mapping. Figure 84 Network > UPnP > Port Mapping The following table describes the labels in this screen.
Chapter 9 Network Table 29 Network > UPnP > Port Mapping (continued) LABEL DESCRIPTION WAN Port When you enable WAN access for one of the NSA’s services, specify the port number (1~65,536) Internet uses need to use to connect to the Internet gateway’s WAN port in order to access the service on the NSA. Whoever wants to access a service on the NSA from the Internet must use this port number. BitTorrent’s WAN port must be the same as the LAN port.
Chapter 9 Network The following table describes the labels in this screen. Table 30 Network > PPPoE LABEL DESCRIPTION Status Status This field displays the status of PPPoE connection. IP Address This field displays the IP address of your PPPoE connection. IP Subnet Mask This field displays the IP subnet mask of your PPPoE connection. Configuration Enable PPPoE Connection 180 Select this option to establish a direct Internet connection for the NSA.
C HAPTER 10 Applications 10.1 Overview This chapter discusses the features in the Application screens. The NSA contains various applications for file sharing and downloading. 10.2 What You Can Do • Use the FTP Server screen (Section 10.4 on page 184) to configure settings for FTP file transfers to/from the NSA. • Use the Media Server screen (Section 10.5 on page 185) to share files with media clients. • Use the Download Service screen (Section 10.6 on page 190) to download files from the Internet.
Chapter 10 Applications FTPES (File Transfer Protocol over Explicit TLS/SSL) File Transfer Protocol over Explicit TLS/SSL (FTPES) is a file transfer service that uses either TLS (Transport Layer Security) or SSL (Secure Sockets Layer) for secure transfers across the Internet. It requests for a mutual method of encryption from the FTP server for its file transfer sessions. Your FTP client must be set to use FTPES as in the following example.
Chapter 10 Applications BitTorrent The NSA includes a BitTorrent client for fast downloading and sharing of large files (such as educational public domain videos). With BitTorrent, you share while you’re downloading the file. BitTorrent breaks up the file and distributes it in hundreds of chunks. You start sharing the file as soon as you have downloaded a single chunk.
Chapter 10 Applications 10.4 FTP Server Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA and download files from the NSA. Click Applications > FTP to open the following screen. Figure 87 Applications > FTP The following table describes the labels in this screen. Table 31 Applications > FTP LABEL DESCRIPTION FTP Enable FTP Connection Limit Enter the maximum number of concurrent FTP connections allowed on the NSA in this field. See your screen for your model’s connection limit.
Chapter 10 Applications Table 31 Applications > FTP LABEL DESCRIPTION Customize the port range for data transfer Select this check box to assign a port range for FTP clients to use when downloading files from the NSA using passive mode. The connection limit is restricted to half of the port numbers within the range if this value is smaller than the one configured in the Connection Limit field. For example, you specified a port range from 1024 to 1029 and configured 10 in the Connection Limit field.
Chapter 10 Applications Click Applications > Media Server to open the following screen. Use this screen to view the media server’s status and rebuild the media server database. Figure 88 Applications > Media Server > Media Server The following table describes the labels in this screen. Table 32 Applications > Media Server > Media Server LABEL DESCRIPTION Status This shows the media server’s current state of activity. Synchronizing displays while the NSA is building the media database.
Chapter 10 Applications Table 32 Applications > Media Server > Media Server LABEL DESCRIPTION Auto Scan Published Shares The NSA has to scan the published shares and find the media files before the media server can share them. Select this to automatically scan the published shares for media files. The auto-scan after adding a large number of files to your published shares could take up enough of the NSA’s resources to slow other functions like file downloads or sharing.
Chapter 10 Applications Table 33 Applications > Media Server > Share Publish LABEL DESCRIPTION Apply Click this to save your changes. Reset Click this to restore your previously saved settings. 10.5.2 The Media Server ID3 Tag Decoding Screen Click Applications > Media Server > ID3 Tag Decoding to open the following screen. ID3 tags store information about a media file such as the title, artist, album, and genre in the file itself.
Chapter 10 Applications Table 34 Applications > Media Server > ID3 Tag Decoding LABEL DESCRIPTION Selected Character Sets This list box displays the character sets the NSA can use to decode ID3 tags in your media files. The NSA attempts to use them in the order listed so select character sets and use the up or down arrow to change their order to match the types of files you have. So if most of your files are German, move the French, German and Italian (ISO-8859-15) selection to the top of the list.
Chapter 10 Applications The following table describes the labels in this screen. Table 36 Applications > Media Server > SqueezeCenter LABEL DESCRIPTION Enable SqueezeCenter Check this to enable SqueezeCenter. Apply Click this to save your changes. Reset Click this to restore your previously saved settings. 10.6 The Download Service Screen The Download Service screen allows you to download files from the Internet. Click Applications > Download Service to open the following screen.
Chapter 10 Applications Table 37 Applications > Download Service (continued) LABEL DESCRIPTION Preferences Click this to open a screen where you can set the default location for saving downloads and configure your BitTorrent settings. Refresh Click this to update the information displayed on the screen. Select Files A single BitTorrent torrent file is often for multiple files. If you do not need all of the files the torrent file specifies, click this to select which files to download.
Chapter 10 Applications Table 37 Applications > Download Service (continued) LABEL Status DESCRIPTION The following icons show the download’s status. Completed: The NSA has downloaded the whole file. Seeding: The download is finished and the NSA is allowing other BitTorrent users to download it. Downloading: The NSA is getting the file. Queued: The download is waiting in line for the NSA to download it. Pause: The download has been manually stopped. Select it and click Resume to continue it.
Chapter 10 Applications 10.6.1 Adding a Download Task Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 5.10 on page 92 provides a tutorial on adding a download task. Figure 94 Applications > Download Service > Add The following table describes the labels in this screen. Table 38 Applications > Download Service > Add LABEL DESCRIPTION Source URL Paste the URL of the file you want to download into this field.
Chapter 10 Applications Table 38 Applications > Download Service > Add LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 10 Applications 10.6.2 Configuring General Settings Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period.
Chapter 10 Applications The following table describes the labels in this screen. Table 39 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded.
Chapter 10 Applications Table 39 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Download Service is active in the time period (hh:mm hh:mm) Specify the time period for the NSA to download files. Note: If you also configured the Power On/Off Schedule feature in the Power Management screen, make sure your active download period does not conflict with the power-off period. Apply Click this to save your changes.
Chapter 10 Applications The following table describes the labels in this screen. Table 40 Applications > Download Service > Preferences > BitTorrent LABEL DESCRIPTION Port Number Assign a port number for BitTorrent downloads. You can select a number from 2 to 65536. It is recommended to use a port number greater than 1025. DHT Select Enable or Disable to use Distributed Hash Table (DHT) or not.
Chapter 10 Applications Table 40 Applications > Download Service > Preferences > BitTorrent LABEL DESCRIPTION Reset Click this to restore your previously saved settings. Cancel Click this to return to the previous screen without saving. 10.6.4 Edit IP Filter Use this screen to enable or disable IP filtering for BitTorrent downloads. IP filtering blocks IP addresses known to share fake files. You can either get an IP filter table from a website or use your own table.
Chapter 10 Applications 10.6.5 Selecting Files to Download Select an item in the Applications > Download Service screen’s list and click Select Files to open the following screen. Use this screen to select which of the torrent’s files to download. Section 5.10 on page 92 provides a tutorial on adding a download task. Figure 98 Applications > Download Service > Select Files The following table describes the labels in this screen.
Chapter 10 Applications 10.6.6 Displaying the Task Information Select an item on the list and click Task Info. Use this screen to check detailed information about the task. Figure 99 Applications > Download Service > Task Info The following table describes the labels in this screen. Table 43 Applications > Download Service > Task Info LABEL DESCRIPTION Status This is the current status of the task. Name This is the name of the task. Size This is the size of the file to be downloaded.
Chapter 10 Applications Table 43 Applications > Download Service > Task Info LABEL DESCRIPTION Priority Use this field to set the priority for downloading the task. Select Auto to have the NSA automatically determine the task’s priority. Select High to have the NSA download this file before the other files. Comment Enter a description for this task. Click Apply to save the description. Start Time This field displays when the NSA started to download files.
Chapter 10 Applications Table 44 Applications > Web Publishing LABEL DESCRIPTION Port Number Specify a port number for accessing the published share websites hosted on the NSA. If you enter a number other than 80, make sure you include it when telling others how to access the web-published share. For example, say you specified port 8080, the NSA’s IP address is 192.168.1.23, and the name of the web-published share is FamilyPhotos. You would have to enter “http://192.168.1.
Chapter 10 Applications Click Applications > Broadcatching to open the following screen. Figure 101 Applications > Broadcatching The following table describes the labels in this screen. Table 45 Applications > Broadcatching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button. A screen opens for you to subscribe to the feed. When you are done, the feed’s channel and contents display in the Applications > Broadcatching screen.
Chapter 10 Applications Table 45 Applications > Broadcatching LABEL Item Name DESCRIPTION These are the downloadable files. The following icons show the file’s status in the NSA. Completed: The NSA has downloaded the whole file. Double-click the item to go to the Download Service screen where you can see the file’s name and location. Seeding: The NSA downloaded the complete file and NSA is sharing it with other BitTorrent users. Double-click the item to go to the Download Service screen.
Chapter 10 Applications select policies for downloading and deleting the channel’s items. Section 5.11 on page 107 provides a tutorial on adding a broadcatching channel. Figure 103 Applications > Broadcatching > Add Channel The following table describes the labels in this screen. Table 46 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Subscribe to Channel Feed Paste (or type) the URL of the feed for the channel to which you want to subscribe into this field.
Chapter 10 Applications Table 46 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 10 Applications 10.8.2 Editing a Broadcatching Channel Click Applications > Broadcatching, then select a channel and click Edit Channel to open a similar Edit screen. Use the Edit Channel screen to change the download or delete policies. Figure 104 Applications > Broadcatching > Edit Channel The following table describes the labels in this screen.
Chapter 10 Applications Table 47 Applications > Broadcatching > Edit Channel LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 10 Applications Click Applications > Print Server to open the following screen. Figure 105 Applications > Print Server The following table describes the labels in this screen. Table 48 Applications > Print Server LABEL DESCRIPTION Refresh Click this to update the list of printers and print jobs. The table lists printers and their queued print jobs. Click a column’s heading to sort the entries by that criteria.
Chapter 10 Applications 10.10 The Copy/Sync Button Screen The Copy/Sync button on the front panel allows you to copy or synchronize files between a connected USB device and the NSA. Click Applications > Copy/Sync Button to open the following screen. Figure 107 Applications > Copy/Sync Button The following table describes the labels in this screen. Table 50 Applications > Copy/Sync Button LABEL DESCRIPTION Copy Settings NSA Copy Target Select the NSA share to use with the copy function.
Chapter 10 Applications Table 50 Applications > Copy/Sync Button LABEL DESCRIPTION USB Volume If your USB device has multiple partitions, select which partition to use with the synchronization function. Sync Direction Select USB -> NSA to synchronize files from your USB device to the NSA. Select NSA -> USB to synchronize files from the NSA to your USB device. Select NSA <-> USB to synchronize files in both directions simultaneously.
Chapter 10 Applications A link for the NSA in iTunes under SHARED. Click it to display the NSA’s published media files as shown next. Figure 108 NSA link in iTunes 10.11.2 Download Service The NSA’s download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA. This can free up your computer’s system resources. The download service also handles your broadcatching downloads. See Section 10.
Chapter 10 Applications If you already have the torrent file saved on your computer, you can just specify its location when adding a download task through the web configurator. Another method is to use FTP or a CIFS program (Windows Explorer for example) to copy the torrent file into the torrent folder. The NSA automatically uses the torrent file. After your BitTorrent download and sharing are finished, you can go to the incoming folder within the destination share or folder and delete the .
Chapter 10 Applications Note: The download service notification only keeps track of files downloaded via BitTorrent. Figure 110 Download Service Notification 10.11.5 BitTorrent Security When you download using BitTorrent, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall.
Chapter 10 Applications • Anti-virus to check files you download for computer viruses. BitTorrent and Your Firewall The anti-virus feature on a firewall probably cannot check BitTorrent downloads for viruses, so use anti-virus software on your computer to scan the NSA for viruses. When you download using BitTorrent, many other BitTorrent users are also trying to download the file from you.
Chapter 10 Applications HTML (web-based) configuration interface to set this up (see the firewall’s manual for details). You may also have to configure a corresponding firewall rule. Figure 113 Firewall Configured to Allow Incoming BitTorrent Requests 10.11.6 Web Publishing Example This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet.
Chapter 10 Applications 2 Now open your web browser and type in the address of the NSA’s FamilyPhotos web page. In this example, the NSA’s IP address is 192.168.1.33, and the name of the web-published share is FamilyPhotos. So you would enter “http://192.168.1.33/MyWeb/FamilyPhotos/” in your browser’s address bar. Then press [ENTER] or click Go. A screen displays listing the share’s files. Figure 115 Browsing to an NSA Share Example • Click a file’s link to open the file.
Chapter 10 Applications Web Publishing Port Number If the web-published shares use a port number other than 80 (the normal port for web traffic), users must include it after the NSA’s IP address in order to access the NSA’s web-published shares. For example, say you specified port 8080, the NSA’s IP address is 192.168.1.23, and the name of the web-published share is FamilyPhotos. You would have to enter “http://192.168.1.
Chapter 10 Applications 10.11.9 Printer Sharing The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA’s USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers. Figure 117 Printer Sharing 10.11.10 Copying Files You can copy files from a USB device to the NSA or from the NSA to a USB device. Simply press and release the COPY/SYNC button to start copying files. See Section 10.
Chapter 10 Applications The following figure illustrates how copying files works when you copy files from a USB device to the NSA. The same concept applies when you copy files from the NSA to a USB device. Figure 118 Copying Files Example Before Copy NSA USB B A C A After Copy NSA USB A B A B C Both storage devices contain file A. • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA. 10.11.
Chapter 10 Applications The following figure illustrates how synchronization works when you synchronize files from a USB device to the NSA. The same concept applies when you synchronize files from the NSA to a USB device. Figure 119 Synchronizing Files Example 1 Before Sync NSA USB B A A C After Sync NSA USB A B A B Both storage devices contain A. • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA.
Chapter 10 Applications The following figure illustrates how synchronization works when you synchronize files in both directions simultaneously. Figure 120 Synchronizing Files Example 2 Before Sync NSA USB C B A D B A (new) (new) After Sync NSA USB A B (new) (new) C D A B C D (new) (new) A on the USB device and B on the NSA are modified more recently. • File A from the USB device replaces file A on the NSA. • File B from the NSA replaces file B on the USB device.
Chapter 10 Applications 224 Media Server User’s Guide
C HAPTER 11 Package Management 11.1 Overview Package Management can be used to set up more useful applications in your NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps. 11.2 What You Can Do • Use the Package Management screen (Section 11.4 on page 226) to download and install applications from the web. • Use the DyDNS screen (Section 11.5 on page 229) to configure the domain name settings of your NSA. • Use the NFS screen (Section 11.
Chapter 11 Package Management • Gallery - This web-based application allows your NSA to host pictures. You can upload images in your local computer or shares to this application. Use the administrator account of your NSA to log in to the Gallery console. The administrator can then create accounts for other users. • NFS - NFS (Network File System) is a file-sharing protocol most commonly implemented on Unix-like systems. • PHP-MySQL-phpMyAdmin - This tool can be used to manage MySQL through the web.
Chapter 11 Package Management Click Applications > Package to open the following screen. Figure 121 Applications > Package The following table describes the labels in this screen. Table 51 Applications > Package LABEL DESCRIPTION Package Management Retrieve List From Internet Click this to retrieve a list of available packages from the ZyXEL website.
Chapter 11 Package Management Table 51 Applications > Package (continued) LABEL Status DESCRIPTION This is the current status of the application. It shows: • • • • • • Not Installed - This displays for applications that have not been installed by the NSA. Installing (%) - This displays when the application is being installed. It also shows the percent of the package already installed. Built-in - This displays for applications installed by the NSA that you can configure in the NSA Web Configurator.
Chapter 11 Package Management 11.4.1 Displaying the Package Information Select an item on the list and click Package Info. Use this screen to check detailed information about the task. Figure 122 Applications > Package Management > Package Info The following table describes the labels in this screen. Table 52 Applications > Package Management > Package Info LABEL DESCRIPTION Status This is the current status of the application.
Chapter 11 Package Management Dynamic DNS allows you to update your current dynamic IP address with a dynamic DNS service so that anyone can contact you (such as through NetMeeting or CUSeeMe). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
Chapter 11 Package Management NFS is a client/server distributed file service that provides transparent file sharing for network environments. This allows shared folders in your NSA to be accessible like a local folder in a user’s computer. Click Network > NFS to open the following screen. Figure 124 Network > NFS The following table describes the labels in this screen. Table 54 Network > NFS LABEL DESCRIPTION NFS Service Enable NFS Server Click this to employ NFS in your NSA.
Chapter 11 Package Management You see a warning screen before you delete a volume. Figure 125 Delete an NFS Share 11.6.1 Add/Edit NFS Share Use this screen to add or edit an NFS share. Note: Some attributes of the NFS share cannot be edited. Click Add or Edit in the Network > NFS screen to open the following: Figure 126 Network > NFS: Add/Edit The following table describes the labels in this screen.
Chapter 11 Package Management Table 55 Network > NFS: Add/Edit LABEL DESCRIPTION DN/IP Filter Enter the domain name(s) or IP address(es) that can have access to the NFS share. Enter ‘*’ to make the share available to all users in the network. You can also enter a wildcard, such as ‘*.domain.com’ to indicate that all users within that network have access to the share. Select the access rights you want to grant to each domain name or IP address you enter and click Add.
Chapter 11 Package Management Self Monitoring, Analysis, and Reporting Technology (S.M.A.R.T) detects and reports the reliability of hard disks using standard indicators (called “attributes”), to help you anticipate possible disk failures. Note: The fields included the screens may vary depending on the hard disk that you use. Click Storage > S.M.A.R.T to open the following screen. Figure 128 Storage > S.M.A.R.T The following table describes the labels in this screen. Table 57 Storage > S.M.A.R.
Chapter 11 Package Management 11.7.1 SMART Brief Summary Use this screen to display information about the volume, such as the hard disk vendor, specific model, hard disk capacity and so on. Click Brief Summary in the Storage > S.M.A.R.T screen to display the following. Figure 129 Storage > S.M.A.R.T: Brief Summary The following table describes the labels in this screen. Table 58 Storage > S.M.A.R.
Chapter 11 Package Management 11.7.2 SMART Full Summary Use this screen to display more details information about the volume. Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 130 Storage > S.M.A.R.T: Full Summary The following table describes the labels in this screen. Table 59 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION ID This is the identification number used to tag a hard disk attribute. This is standard across all S.M.A.R.T-enabled storage devices.
Chapter 11 Package Management Table 59 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION Updated This indicates when the hard drive updates the value for this attribute. • • When Failed Always means the hard drive updates this attribute during normal operation and during offline activities. Offline means the hard drive only updates this attribute when no one is accessing the hard drive. This column indicates when (if ever) the attribute failed.
Chapter 11 Package Management The following table describes the labels in this screen. Table 60 Protect > Backup LABEL DESCRIPTION Backup Add Job Click this to create and customize a backup job. Edit Job Select a backup job in the list and click this to make some changes to it. Delete Selected Job(s) Select a backup job in the list and click this to delete it. Execute Job Now Select a backup job in the list and click this to run the backup job immediately.
Chapter 11 Package Management Click Add Job in the Protect > Backup screen to open the following: Figure 132 Protect > Backup: Step 1 The following table describes the labels in this screen. Table 61 Protect > Backup: Step 1 LABEL DESCRIPTION Job Information Job Name Enter a name to identify the backup job. Job Description Enter a short description (up to 100 keyboard characters) for the backup job. Backup Type Choose the backup type that you want the NSA to implement for the backup job.
Chapter 11 Package Management 11.9.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored.
Chapter 11 Package Management The following table describes the labels in this screen. Table 62 Protect > Backup: Step 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files. Click to close a folder in the tree. This is useful if there are many folders or files that you wish to hide from view. Click to select a folder or file to back up.
Chapter 11 Package Management Table 62 Protect > Backup: Step 2 LABEL DESCRIPTION Previous Click this to go back to the previous screen. Next Click this to go to the next screen. 11.9.3 Backup: Step 3 Use this screen to specify compression, encryption and purge policies for the backup job. This step is only available if you are doing an archive backup or a synchronization backup to a remote target. Figure 134 Protect > Backup: Step 3 The following table describes the labels in this screen.
Chapter 11 Package Management Table 63 Protect > Backup: Step 3 LABEL DESCRIPTION Purge Policy The NSA maintains the files that have been included in your backups. However to save hard disk space, you can choose to delete files that have been included in previous backups. • • • Select Keep All Old Backup files to store all files that have been included in previous backups. If you want to store a certain number of backup files, select Keep Only the last n backup files (1-30).
Chapter 11 Package Management Table 64 Protect > Backup: Step 4 LABEL DESCRIPTION Start Time (hh:mm) This is available if you selected Daily, Weekly or Monthly as your backup frequency. Select the time in hour:minute format when you want the NSA to perform the backup job. Every how many days? This is only available if you selected Daily as your backup frequency. Every how many weeks? This is only available if you selected Weekly as your backup frequency.
Chapter 11 Package Management 11.9.6 Edit Job: Step 1 Click Protect > Backup. Select a backup job from the list and click Edit Job to open the following. Figure 136 Protect > Backup > Edit: Step 1 The following table describes the labels in this screen. Table 65 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Job Settings Job Name This field is read-only and shows the name of the backup job. Job Description Enter a short description for the backup job.
Chapter 11 Package Management Table 65 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Bandwidth For backups to a remote NSA, you can restrict the bandwidth to help prevent the backups from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet. Purge Policy The NSA maintains the files that have been included in your backups.
Chapter 11 Package Management Table 66 Protect > Backup > Edit: Step 2 LABEL DESCRIPTION Start Time (hh:mm) This is available if you selected Daily, Weekly or Monthly as your backup frequency. Select the time in hour:minute format when you want the NSA to perform the backup job. Every how many days? This is only available if you selected Daily as your backup frequency. Every how many weeks? This is only available if you selected Weekly as your backup frequency.
Chapter 11 Package Management Table 67 Protect > Backup > Restore Archive: Step 1 LABEL DESCRIPTION Job Description This is a short description (up to 100 keyboard characters) for the backup job. Backup Type This is the type of backup implemented for the backup job. Scheduler Information This field displays the backup’s frequency. Restored Time Select a previous backup in the list that you want to restore to your NSA. Next Click this to go to the next screen. 11.9.
Chapter 11 Package Management 11.9.11 Restore Archive: Step 3 Use this screen to select the location in the NSA where you want to restore your backup. Figure 140 Protect > Backup > Restore Archive: Step 3 The following table describes the labels in this screen. Table 69 Protect > Backup > Restore Archive: Step 3 LABEL DESCRIPTION Step 3. Set a restore target and start restoring Original Location Select this to restore the files to their original location in the NSA.
Chapter 11 Package Management 11.10.1 Restore: Step 1 You can access this screen by clicking Protect > Restore. Figure 141 Protect > Restore: Step 1 The following table describes the labels in this screen. Table 70 Protect > Restore: Step 1 LABEL DESCRIPTION Step 1. Select Restore Source Select a previous archive backup that you want to restore to the NSA. Select Remote NSA if the file is in another NSA in the network that you used for your backup. Fill in the fields below when you choose this option.
Chapter 11 Package Management Table 70 Protect > Restore: Step 1 LABEL DESCRIPTION Browse Click this to select where the previous backup that you want to restore is located. • • • • Volume - Select a volume from the list. Current Location - This is the location of the selected folder. Type - This identifies the item as a file or folder. Name - This is the name of the folder/file. Click Apply to save your settings and Cancel to close the screen. Next Click this to go to the next screen. 11.10.
Chapter 11 Package Management Table 71 Protect > Restore: Step 2 LABEL DESCRIPTION Restored Time Select a previous backup job in the list that you want to restore to your NSA. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. 11.10.3 Restore: Step 3 Use this screen to select the folder where the archive you want to restore is located. Figure 143 Protect > Restore: Step 3 The following table describes the labels in this screen.
Chapter 11 Package Management 11.10.4 Restore: Step 4 Use this screen to select the location in the NSA where you want to restore your backup. Figure 144 Protect > Restore: Step 4 The following table describes the labels in this screen. Table 73 Protect > Restore: Step 4 LABEL DESCRIPTION Step 3. Set a restore target and start restoring Browse Click this to select a folder where you want to place the restored files. • • • • Volume - Select a volume from the list.
Chapter 11 Package Management Click Applications > Syslog Server to open the following screen. Figure 145 Applications > Syslog Server The following table describes the labels in this screen. Table 74 Applications > Syslog Server LABEL DESCRIPTION Enable Syslog Server Select this to have the NSA accept syslog logs from syslog clients. Clear it to stop the NSA from accepting syslog logs from syslog clients. Log Location Click View Files to browse to where you want to store the syslog logs on the NSA.
Chapter 11 Package Management Table 74 Applications > Syslog Server LABEL DESCRIPTION Log Format Select the format you want to use for recording the received logs. The Example item below the drop-down list boxes displays how the selected custom format looks. For example, if you select Full Date, the individual log entries would display with something like 2009 May 13 17:15:51 in front of them. Apply Click this to save your changes. Reset Click this to restore the screen’s last-saved settings. 11.
Chapter 11 Package Management Table 75 Applications > TFTP Server LABEL DESCRIPTION Path Use this if you want to further specify a folder within the share This field displays the share folder’s path. Type the location of the folder using forward slashes as branch separators or use Browse to find or create a folder on the NSA. Apply Click this to save your changes. Reset Click this to restore the screen’s last-saved settings. 11.
Chapter 11 Package Management The following table describes the labels in this screen. Table 76 Applications > eMule > Server LABEL DESCRIPTION Server - You can add multiple servers in this screen. However, the NSA can only connect to one eMule server at a time. Enable eMule Check this and click Apply to enable the eMule application. Add Server Click this to add an eMule server. A server provides a list of available files for download, users sharing them and other information. Refer to Section 11.13.
Chapter 11 Package Management 11.13.2 Add Server Use this screen to add a server for the eMule application. Click Add in the Applications > eMule > Server screen to add a server. Figure 149 Applications > eMule > Server: Add The following table describes the labels in this screen. Table 77 Applications > eMule > Server: Add LABEL DESCRIPTION Server IP Select this if you know the server name, IP address and port number of the eMule server you want to add. Server Name Enter the server name.
Chapter 11 Package Management The following table describes the labels in this screen. Table 78 Applications > eMule > Server: Edit LABEL DESCRIPTION Server Name Enter the server name. IP Address Enter the IP address of the server. Port Number Enter the port number of the server. Apply Click this to apply your changes. Cancel Click this to return to the previous screen without saving. 11.13.
Chapter 11 Package Management Table 79 Applications > eMule > Server: MyInfo LABEL DESCRIPTION Sources This shows the total number of peers that can share the required files to the NSA eMule client. Close Click this to exit the screen. 11.13.5 eMule Task Screen Use this screen to view tasks, including completed, downloading, uploading and shared tasks, that are being handled by the NSA. Click Applications > eMule > Task screen to view the task details.
Chapter 11 Package Management Table 80 Applications > eMule > Task LABEL DESCRIPTION Resume Select a paused item from the list and click this to resume the task. Task Info Select an item from the list and click this to view the details and status of the task. The table lists your tasks. Click a column’s heading to sort the entries by that criteria. Downloading This table shows a list of download tasks that are still in progress.
Chapter 11 Package Management You see a warning screen before you delete a task. Figure 153 Delete a Task 11.13.6 Add Task Use this to add a download task to the NSA. Click Add in the Applications > eMule > Task screen to add a task. Figure 154 Applications > eMule > Task: Add The following table describes the labels in this screen. Table 81 Applications > eMule > Task: Add LABEL DESCRIPTION Source ED2K Link Paste the ED2K link of the file you want to download into this field.
Chapter 11 Package Management Table 81 Applications > eMule > Task: Add LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. • • Share - Select the destination share from the drop-down list. Path - This field displays the share folder’s path.
Chapter 11 Package Management Click Applications > eMule > Task > Preferences to open the following screen. Figure 155 Applications > eMule > Task > Preferences The following table describes the labels in this screen. Table 82 Applications > eMule > Task > Preferences LABEL DESCRIPTION Username Username Enter your user name that identifies the NSA in the eMule network.
Chapter 11 Package Management Table 82 Applications > eMule > Task > Preferences LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. • • Share - Select the destination share from the drop-down list. Path - This field displays the share folder’s path.
Chapter 11 Package Management Table 82 Applications > eMule > Task > Preferences LABEL DESCRIPTION Reset Click this to clear the fields. Cancel Click this to return to the previous screen without saving. 11.13.8 Edit IP Filter Use this screen to enable IP filtering which prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs. Figure 156 Applications > eMule > Task > Preferences: Edit IP Filter The following table describes the labels in this screen.
Chapter 11 Package Management Click Applications > eMule > Task > Browse Incomplete Downloads to open the following screen. Figure 157 Applications > eMule > Task > Browse Incomplete Downloads The following table describes the labels in this screen. Table 84 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder Type a folder name and click Apply to make a new folder. The name can be 1 to 239 singlebyte (no Chinese characters allowed for example) ASCII characters.
Chapter 11 Package Management Table 84 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Delete Select a file/folder from the list and click this to open a warning screen. Click Yes to delete the file/folder, or click No to close the screen. Move Select a file/folder from the list and click this to relocate the file/folder to another share. Copy Select a file/folder from the list and click this to make a duplicate of the file/folder to another share.
Chapter 11 Package Management The following table describes the labels in this screen. Table 85 Applications > eMule > Task: Task Info LABEL DESCRIPTION Status This shows the current status of the task - Waiting or Downloading. Name This shows the file name of the file associated with the task. part.met File This shows the temporary file name for an incomplete file. You can change this file name by entering the new name and clicking Apply.
Chapter 11 Package Management Click Applications > eMule > Search to open the following screen. Figure 159 Applications > eMule > Search The following table describes the labels in this screen. Table 86 Applications > eMule > Search LABEL DESCRIPTION Search Enable eMule Check this and click Apply to enable the eMule application. Keyword(s) Enter words that are related to the file you want to download. File Type Select the file type that you want to download.
Chapter 11 Package Management 11.14 pyLoad Screen Use this screen to configure the NAS so you can use pyLoad to manage your downloads, including those from one-click hosting sites. Click Applications > pyLoad to open the following screen. Figure 160 Applications > pyLoad The following table describes the labels in this screen. Table 87 Applications > pyLoad LABEL DESCRIPTION Enable pyLoad Select this to have the NSA manage your downloads. Clear it to turn the feature off.
Chapter 11 Package Management 11.15.1 S.M.A.R.T Attributes The following table describes some common S.M.A.R.T. attributes. If a higher or lower raw attribute value is better, it is indicated in the BETTER column. Since S.M.A.R.T. attributes and their definitions vary by manufacturer, refer to the hard drive manufacturer for details about the attributes your hard drive supports. Table 88 S.M.A.R.T.
Chapter 11 Package Management Table 88 S.M.A.R.T. Attributes (continued) ID ATTRIBUTE NAME BETTER DESCRIPTION 192 Power-off Retract Count Low This is how many times the heads are loaded off the media. 193 Load/Unload Cycle Low This is the number of load and unload cycles into head landing zone position. 194 Temperature Low This is the hard drive’s internal temperature. 195 Hardware ECC Recovered High This is the time between ECC (Error Correction Code)-corrected errors.
Chapter 11 Package Management Table 88 S.M.A.R.T. Attributes (continued) ID 274 ATTRIBUTE NAME BETTER DESCRIPTION 223 Load/Unload Retry Count This is how many time the magnetic head has changed position. 224 Load Friction Low This is resistance caused by friction in mechanical parts during operation. 225 Load/Unload Cycle Count Low This is the total number of load cycles.
C HAPTER 12 Auto Upload 12.1 Overview This chapter discusses the features in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family. You can link the NSA to your Flickr and/or YouTube account and select shares for the NSA to upload.
Chapter 12 Auto Upload Click Applications > Auto Upload > Flickr/YouTube to open the following screen. Figure 161 Applications > Auto Upload > Flickr/YouTube The following table describes the labels in this screen. Table 89 Applications > Auto Upload > Flickr/YouTube LABEL DESCRIPTION Flickr/YouTube Disable/Enable Select a service from the list and click this to turn the service on or off. If you disable the service and add more files to the watch folder(s), the NSA will not auto upload these files.
Chapter 12 Auto Upload The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account’s information and click Sign In.
Chapter 12 Auto Upload The following page displays asking for your authorization. Click OK, I’LL ALLOW IT to establish a link between the NSA and your Flickr account. Figure 164 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA web configurator. Click Get Ready in the following screen to complete the authorization process.
Chapter 12 Auto Upload Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen.
Chapter 12 Auto Upload The following table describes the labels in this screen. Table 90 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) LABEL DESCRIPTION Flickr Account Configuration Username This field displays the Flickr account authorized for the auto upload feature. Photo Space Usage This shows how much storage space for photos (in size and percentage) you have used and how much space is still available on your Flickr account.
Chapter 12 Auto Upload Table 90 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) (continued) LABEL DESCRIPTION Grace Period N minutes Specify how long the NSA should wait when you add a new file for auto upload. For example, if you set the grace period to 5 minutes, the NSA uploads a new file after it has been in a watched folder for 5 minutes. You can choose from a range of 1 to 10080 minutes (up to one week).
Chapter 12 Auto Upload Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen. Figure 168 Applications > Auto Upload > Flickr/YouTube > Config (YouTube) The following table describes the labels in this screen. Table 91 Applications > Auto Upload > Config (YouTube) LABEL DESCRIPTION Youtube Account Configuration Username 282 This field displays the Youtube account authorized for the auto upload feature.
Chapter 12 Auto Upload Table 91 Applications > Auto Upload > Config (YouTube) (continued) LABEL Switch User DESCRIPTION Click this to use a different YouTube account for the auto upload feature. Folder Selection Folder Watch List This table displays a list of shares and folders selected for auto upload. Files stored in these locations are uploaded to your YouTube account. Status This field indicates whether the share or folder is available. represents a valid folder.
Chapter 12 Auto Upload Table 91 Applications > Auto Upload > Config (YouTube) (continued) LABEL DESCRIPTION Who can see your media files on YouTube? Determine who has the right to see files uploaded to your YouTube account. Select Only You if you do not want anyone else to see your files. Select Anyone to allow everyone to see your files. Apply Click this to save your changes. Reset Click this to restore your previously stored settings. 12.
Chapter 12 Auto Upload The following table describes the labels in this screen. Table 92 Applications > Auto Upload > FTP Uploadr LABEL DESCRIPTION Enable FTP Uploadr Use the check box to enable or disable the FTP Uploadr. Click Apply to save your changes. When you disable the FTP Uploadr, a screen opens requesting confirmation. Select the check box to stop any current or queued uploads.
Chapter 12 Auto Upload In the FTP Uploadr screen, click the Add Server or Edit Server button to open the following screen. Figure 170 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server The following table describes the labels in this screen. Table 93 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server LABEL DESCRIPTION Domain Name/IP Address Enter the domain name or IP address of the FTP server. Account Name Enter the account name used to access the FTP server.
Chapter 12 Auto Upload In the FTP Uploadr screen, click the Preferences icon to open the following screen. Figure 171 Applications > Auto Upload > FTP Uploadr > Preferences The following table describes the labels in this screen. Table 94 Applications > Auto Upload > FTP Uploadr > Preferences LABEL DESCRIPTION Folder Watch List Status This field indicates whether the share or folder is available. represents a valid folder. The folder is available for auto upload. represents a missing folder.
Chapter 12 Auto Upload Table 94 Applications > Auto Upload > FTP Uploadr > Preferences (continued) LABEL DESCRIPTION Add Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. • • Share - Select the share from the list. Path - Type the folder location in the share directly or click Browse to open the following screen and navigate to the folder’s location. • • • • Current Location - This is the location of the selected folder.
C HAPTER 13 Dropbox 13.1 Overview The Dropbox Web-based file hosting service uses cloud computing to let you use file synchronization to store and share files and folders with others across the Internet. Use your Dropbox account to easily move files to your NSA and have the NSA download *.torrent files. 13.2 Dropbox Screen Use the Dropbox screen to log the NSA into your Dropbox account. This creates Drop2NAS and zDownload folders in your Dropbox account. See Section 13.
Chapter 13 Dropbox The following table describes the labels in this screen. Table 95 Applications > Dropbox LABEL DESCRIPTION Status This shows the status of the NSA Dropbox application’s interaction with the Dropbox server. Disable: The NSA Dropbox application is turned off. Ready: The NSA Dropbox application has authenticated with the Dropbox server and is ready to use. Authenticating with Dropbox. Please wait.: The NSA Dropbox application is logging into the Dropbox server.
Chapter 13 Dropbox Table 95 Applications > Dropbox (continued) LABEL DESCRIPTION Enable Dropbox Select this to synchronize and back up your Dropbox account. The first time you do this a Dropbox screen prompts you to log into your Dropbox account. Then a NSA pop-up opens. Click Get Ready. Click Allow when the Dropbox screen notifies you of the NSA’s DropNAS application trying to connect to your Dropbox account.
Chapter 13 Dropbox admin\Dropbox\FromDropbox folder in the format of “filename(n).extension”. Here is an example of the Drop2NAS folder. Note: Do not delete the NAStoken file as it is needed for your NSA to work with the Dropbox account. Figure 173 Dropbox\Drop2NAS Using the zDownload Folder The NSA copies *.torrent files in the zDownload folder to the NSA’s admin\download\torrents folder and automatically starts downloading them.
C HAPTER 14 Users 14.1 Overview This chapter introduces the Users screens of the NSA. Use the Users screens to create and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. • Assign individual users specific access rights for specific shares. Users are people who have access rights to the NSA and can store files there for later retrieval. A user can: • Manage shares that he owns. • Change his own password.
Chapter 14 Users Use this screen to create and manage accounts for users who can store files on the NSA. Figure 175 Sharing > Users The following table describes the labels in this screen. Table 96 Sharing > Users LABEL DESCRIPTION Add User Click this to open a screen where you can configure a new user account. Refer to Section 14.3.2 on page 295 to see the screen. Search Click this to display a search field. Type in the name of an account and then click Search to look up the account you specified.
Chapter 14 Users Table 96 Sharing > Users (continued) LABEL DESCRIPTION Delete Selected Users Select an account and click this to open a screen where you can delete the user account. User Info Select an account and click this to open a screen displaying the amount of storage space used by the account. You can also check the account’s membership in any groups. Refer to Section 14.4 on page 297 to see the screen.
Chapter 14 Users Click the Add User button in the Users screen to open the following screen. Click the Edit User button in the screen shown previously to edit an existing account. Figure 176 Sharing > Users > Add or Edit a User The following table describes the labels in this screen. Table 98 Users > Add or Edit a User LABEL DESCRIPTION Username Type a name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. See Section 14.3.
Chapter 14 Users 14.3.3 Usernames Enter a username from one to 32 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characters are not allowed as the first character. The username can only contain the following characters: • Alphanumeric A-z 0-9. Unicode usernames are supported with CIFS logins, but not FTP or web configurator logins. • Spaces • _ [underscores] • .
Chapter 14 Users In the Users screen, select an account and click User Info to open the following screen. Figure 177 Sharing > Users > User Info The following table describes the labels in this screen. Table 99 Sharing > Users > User Info LABEL DESCRIPTION Username This field displays the selected username. Space Usage Click this to display the amount of volume space used by the selected account. Group List Click this to display the selected user’s group membership.
C HAPTER 15 Groups 15.1 Overview This chapter introduces the Groups screens. Use the Groups screens to create and manage groups. You can assign users to groups and grant individual groups access rights to specific shares. 15.2 What You Can Do • Use the main Groups screen (Section 15.3 on page 299) to display and manage a list of groups created on the NSA. • Use the Add Group screen (Section 15.3.1 on page 300) to create new groups. • Use the Edit Group screen (Section 15.3.
Chapter 15 Groups The following table describes the labels in this screen. Table 100 Sharing > Groups LABEL DESCRIPTION Add Group Click this to open a screen where you can configure a new group. Search Click this to display a search field. Type the name of a group and then click Search to look up the group you specified. Click Clear to close the search function. Edit Group Select a group and click this to open a screen where you can edit the properties of the selected group.
Chapter 15 Groups Click the Add Group button in the Groups screen to open the following screen. Click the Edit Group button in the screen shown previously to edit an existing group. Figure 179 Sharing > Groups > Add or Edit a Group The following table describes the labels in this screen. Table 101 Sharing > Groups > Add or Edit a Group LABEL DESCRIPTION Group Name Type a name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. See Section 15.3.
Chapter 15 Groups • Multiple spaces within names are converted to a single space. • Group names are case insensitive. The group name cannot be the same (no matter the letter case) as an existing group. For example, if a group exists with the name 'FAMILY', you cannot create a group named 'family'. • The group name cannot be the same as a system group name such as EVERYONE nor be the same as an existing group.
C HAPTER 16 Shares 16.1 Overview A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder. You can map a share to a network drive for easy and familiar file transfer for Windows users. 16.2 What You Can Do • Use the Shares screen (Section 16.3 on page 303) to navigate a list of shares created on the NSA. • Use the Add Shares screen (Section 16.3.1 on page 305) to create additional shares on the NSA.
Chapter 16 Shares The following table describes the labels in this screen. Table 102 Sharing > Shares LABEL DESCRIPTION Add Share Click this to create a new share. Recycle Bin Click this to configure recycle bins. Edit Share Select a share and click this to edit the share. Delete Share Select a share and click this to remove or restrict access to the share. Share Browser Select a share and click this to browse the share’s contents. Status This field displays the share icons.
Chapter 16 Shares Table 102 Sharing > Shares (continued) LABEL DESCRIPTION Share Path This field displays the share’s file path, for example, volume1/music. Share Owner This is the name of the user account to which this share belongs. Permission Type This field displays the access permission of a share. Everyone on the network can access a Public share. Only the share owner can access a Private share.
Chapter 16 Shares Table 103 Shares > Add Share (or Edit Share) (continued) LABEL DESCRIPTION Publish this share to Web This shows only when you enable the Web Publish (Section Share Access Assign access rights (full, read only or deny) to users or groups. If you publish the share to the media server or the web, all users will have at least read-only access to the share, regardless of what you configure here. 10.7 on page 202).
Chapter 16 Shares The following table describes the labels in this screen. Table 104 Sharing > Shares > Add Share (or Edit Share) > Advanced LABEL DESCRIPTION Available Users/Groups This field lists the users/groups to which you can assign access rights. Authority Use this field to assign access rights to users/groups. Full Control gives users/groups full access (read, write and execute) to all files contained within this share.
Chapter 16 Shares 16.4.2 Configuring Recycle Bins In the Sharing > Shares screen, click Recycle Bin to open the following screen. Figure 183 Sharing > Shares > Recycle Bin The following table describes the labels in this screen. Table 105 Sharing > Shares > Recycle Bin LABEL DESCRIPTION Clean Recycle Bin every N days Specify how often you want to clear the contents in all recycle bins. The specified days correspond to how long a file has been stored in a recycle bin.
Chapter 16 Shares The following table describes the labels in this screen. Table 106 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder Type a folder name and click Apply to make a new folder. The name can be 1 to 239 singlebyte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing folder in the same path. See Section 4.4.6 on page 55 for more information on folder names. Upload Click this to add files to the share.
Chapter 16 Shares Table 106 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Modified Date This field displays a file’s latest modification date. Close Click this to close the screen. 16.5.1 Moving or Copying Files Use this screen to move or copy files to another share. In the Share Browser screen, select a file or folder and click Move or Copy to open the following screen.
C HAPTER 17 Maintenance Screens 17.1 Overview This chapter discusses the Maintenance screens. The Maintenance screens allow you to manage system configurations. 17.2 What You Can Do • Use the Power screen (Section 17.3 on page 311) to configure power settings for the NSA, including power saving, UPS, power on/off after power failure, power on/off schedule, and Wake on LAN. • Use the Log screen (Section 17.4 on page 315) to check the system’s logs. • Use the Configuration screen (Section 17.
Chapter 17 Maintenance Screens Click Maintenance > Power to display the following screen. Figure 186 Maintenance > Power The following table describes the labels in this screen. Table 108 Maintenance > Power LABEL DESCRIPTION Power Management Turn off hard disk(s) Enter the number of minutes the NSA will sit idle before spinning the hard disks down to sleep. The default power-off time is 15 minutes.
Chapter 17 Maintenance Screens Table 108 Maintenance > Power (continued) LABEL DESCRIPTION Always Power Off Select this option to keep the NSA from automatically restarting when the power is restored after a power failure. This is a computer’s “traditional” behavior. Select this if you have other servers such as a domain controller or DNS server that you want to start or check after a power failure before the NSA turns on.
Chapter 17 Maintenance Screens The following table describes the labels in this screen. Table 109 Maintenance > Power Management > Edit LABEL DESCRIPTION Power Control Schedule List This table lists the power on, power off, and reboot schedules. For example, you could have one schedule to turn the NSA on every morning, at 8:00, another schedule to turn it off every evening at 18:00, and a third schedule to have it reboot every Friday at 14:00.
Chapter 17 Maintenance Screens 17.4 The Log Screen Click Maintenance > Log to open the following screen. Use this screen to display all NSA logs. There are at most 512 entries in the log. Older logs are removed by the system. You cannot download the log file via FTP or CIFS. Figure 188 Maintenance > Log The following table describes the labels in this screen. Table 110 Maintenance > Log LABEL DESCRIPTION Refresh Click this to update the log display.
Chapter 17 Maintenance Screens • Use the Email Setting screen (Section 17.4.2 on page 316) to enable and configure e-mail alerts from the NSA. • Use the Report Setting screen (Section 17.4.3 on page 317) to select the type of alerts you want to receive through e-mail and schedule when the NSA e-mails the alerts. • Use the Syslog Server Setting screen (Section 17.4.4 on page 317) to enable the syslog server and select the categories to include in the log report. 17.4.
Chapter 17 Maintenance Screens 17.4.3 Report Setting You can select the type of alerts you want to receive through e-mail and schedule when the NSA emails the alerts. In the Report Config screen, click the Report Setting tab to open the following screen. Figure 190 Maintenance > Log > Report Config: Report Setting The following table describes the labels in this screen.
Chapter 17 Maintenance Screens The following table describes the labels in this screen. Table 113 Maintenance > Log > Report Config: Syslog Server Setting LABEL DESCRIPTION Enable Syslog Server Check this to enable syslog server. Server Address Enter the syslog server address you want the NSA to use for its log alerts. In the table below, check the type of log alerts you want to receive in your e-mail. Select All Log to include all types of log alerts. Apply Click this to save your changes.
Chapter 17 Maintenance Screens Table 114 Maintenance > Configuration LABEL Restore DESCRIPTION Click this to load the previously-saved configuration file to the NSA. This replaces your current NSA configuration settings with the settings in the previously-saved configuration file. A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit. Reset MySQL Database Password Click this to reset the password for your MySQL database. 17.
Chapter 17 Maintenance Screens The following table describes the labels in this screen. Table 115 Maintenance > SSL LABEL DESCRIPTION Force HTTPs Select the Force HTTPs option to turn on the NSA’s web browser security. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it. Note: The NSA will restart the web configurator after you click Apply. The NSA displays a warning screen if applying your change may disconnect some users.
Chapter 17 Maintenance Screens The screen is also the same for the Create a certificate authorized by other CA option. Figure 194 Maintenance > SSL > Create or Edit a Certificate The following table describes the labels in this screen. Table 116 Maintenance > SSL > Create or Edit a Certificate LABEL DESCRIPTION Common Name This name describes the certificate’s origin, either in the form of an IP address or a domain name.
Chapter 17 Maintenance Screens Click Maintenance > FW Upgrade to open the following screen. Figure 195 Maintenance > FW Upgrade The following table describes the labels in this screen. Table 117 Maintenance > FW Upgrade LABEL DESCRIPTION Firmware File Type the location of the firmware file you want to upload Browse Click this to find the file on your computer Upload Click this to upload the new firmware. The NSA automatically restarts after you upgrade.
Chapter 17 Maintenance Screens Click Maintenance > Shutdown to open the following screen. Figure 196 Maintenance > Shutdown The following table describes the labels in this screen. Table 118 Maintenance > Shutdown LABEL DESCRIPTION Restart Click this to have the device perform a software restart. Shutdown Click this to shut down the system and restart it again later. When you click the Restart button a pop-up screen will appear asking you to confirm.
Chapter 17 Maintenance Screens Table 119 Log Classes (continued) LOG CATEGORY DESCRIPTION Network This log class shows information on network configuration, setting changes and so on. Storage This log class shows information on the NSA’s internal and external storage activities. Backup This log class shows information on all backup-related activities. Auto Upload This log class shows information on automatic uploads done by the NSA. 17.9.
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) CLASS SEVERITY MESSAGE Copy/Sync Button ERROR [USB Sync] Sync Failed at Folder %s. Copy/Sync Button ERROR Modify COPY/SYNC Button Configuration: %s Copy/Sync Button ERROR Please Change Your Folder Name. Invalid Path: %s Copy/Sync Button INFO [USB Sync] Copying %s from Internal Volume to Backup Folder. Copy/Sync Button INFO [USB Sync] Copying %s from Internal Volume to USB.
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) 326 CLASS SEVERITY MESSAGE Download Service INFO Download service initialized Download Service INFO Download service pause %s by user Download Service INFO Download service set %s to %s priority by user Download Service INFO Download service set default download location to %s Download Service INFO Download service set max BT download rate to %d KB/s by user Download Service INFO Download service set max BT upload rate t
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) CLASS SEVERITY MESSAGE Download Service INFO Download service added %d rules from ipfilter.dat Download Service INFO Download service detected invalid ip range %s in ipfilter.dat Download Service WARNING Download service default location does not exist. Load default Download Service WARNING Download service default torrent location does not exist. Load default Groups NOTICE Add new group %s. Groups NOTICE Delete group %s.
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) CLASS 328 SEVERITY MESSAGE Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to '%s' Services NOTICE NTP server has set to null Services NOTICE The NTP service is disabled. Services NOTICE The NTP service is enabled.
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) CLASS SEVERITY MESSAGE System INFO NTP fails to update from %s System INFO Device is rebooted by administrator! System INFO Device is shutdown by administrator! System NOTICE DNS server is changed. System NOTICE Hostname is cleared. System NOTICE Hostname is set to '%s'. System NOTICE System description is changed. System NOTICE System description is empty now.
Chapter 17 Maintenance Screens Table 121 Log Messages (continued) 330 CLASS SEVERITY MESSAGE Backup/ Restore INFO Start to restore backup job [%s] from [%s]. Backup/ Restore INFO Restore from [%s] successfully.
C HAPTER 18 Protecting Your Data 18.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 18.2 Protection Methods There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.
Chapter 18 Protecting Your Data If you forgot the NSA password, then use the RESET button (see Section 1.1.5 on page 23) to return the NSA to the factory default configuration. Note: Configuration File Backup and Restoration does not affect data (your files and folders), volumes on the NSA. 18.4 Memeo Autobackup Use the Memeo Autobackup software (included on the CD) on your computer to schedule and manage backups. You can backup from your computer to the NSA.
Chapter 18 Protecting Your Data 4 When you see the following screen, select Network Places and click the link to select your backup folder. Figure 199 Memeo Autobackup Configuration 5 Select the NSA’s mapped drive and click OK. Figure 200 Mapped Drive 6 In this screen, select the items that you want to back up.
Chapter 18 Protecting Your Data 7 This screen lists the items you selected for backup. Confirm your selections and click Next. Figure 202 Confirm Backup Items 8 Specify a name for your backup plan (or just use the default). Click Next and then Done. Figure 203 Backup Plan Name 18.4.2 Using Memeo Autobackup After the Initial Setup After you have installed and configured Memeo Autobackup, double-click the system tray to open the program’s start screen.
Chapter 18 Protecting Your Data If the icon is not displayed, you can click Start > Programs > Memeo Autobackup > Memeo Autobackup to start it.
Chapter 18 Protecting Your Data 336 Media Server User’s Guide
C HAPTER 19 Using Time Machine with the NSA 19.1 Overview Time Machine is a backup system provided by Mac OS X. It automatically backs up everything on your Mac, including pictures, music, videos, documents, applications, and settings. This chapter helps you to enable Time Machine in OS X to allow and use your NSA as a backup volume. Follow the steps below to set up Time Machine on your Mac so your NSA can be used for backup.
Chapter 19 Using Time Machine with the NSA 338 2 Enter user1 as the Username and 12345 as the New Password. Retype the password to confirm. Then click Apply to finish adding the new user account. User1 will be added to the list on the Users screen. (If you need more information about adding user account, please refer to Section 14.3.2 on page 295.) 3 Click Sharing > Shares to display the Shares screen. Click Add Share. 4 Enter share01 as the Share Name.
Chapter 19 Using Time Machine with the NSA Note: It is suggested to set a static IP address for the NSA so you do not need to update the IP each time your computer connects to the NSA. Refer to Section 9.4 on page 173 for more information on how to set your NSA to a static IP address. 19.3 Set Time Machine to Support Network Volume Follow the steps below to set Time Machine function so it can support the network volume NSA. 1 Click Finder > Go > Utilities to open the Utilities window.
Chapter 19 Using Time Machine with the NSA 3 This allows Time Machine to support a network volume. Reboot your computer. 19.4 Mounting the NSA on the Mac Now you need to mount share01 on the NSA to your computer. This is the place where you will backup your files. 340 1 Click Finder > Go > Connect to Server. The Connect to Server window opens. 2 In the Sever Address box, enter: smb://username@ip-address-of-nas/backup-folder. For this example, enter: smb://user1@172.23.26.51/share01.
Chapter 19 Using Time Machine with the NSA 19.5 Creating a Sparse Bundle File for the NSA Now you need to create a sparse bundle disk image file, which is a virtual file system image that Time Machine can backup your files. It should be created locally on the Mac and then mounted to share01 of the NSA. 19.5.1 Finding out Computer Name and MAC Address Before creating a spare bundle, you need to know the computer name and MAC address of your computer.
Chapter 19 Using Time Machine with the NSA Press [Enter] to display the MAC address. 19.5.2 Creating a Sparse Bundle File There are two ways to create a sparse bundle disk image file. You can use Disk Utility or Terminal. 19.5.2.1 Disk Utility Click Finder > Go > Utilities. Open the Disk Utility application.
Chapter 19 Using Time Machine with the NSA 4 Click File > New > Blank Disk Image. 5 In the New Blank Image screen, do the following: 5a 5b Enter the name of the sparse bundle in Save As. The format of the name is “ComputerName_MacAddress”. Use “-” for spaces in the computer name and remove all colons in the MAC address. In this example, the sparse bundle name is CoffeeBean_001f5bed6c7a. Then select the place that you want to save the file in Where. Enter a name for the volume.
Chapter 19 Using Time Machine with the NSA 19.5.2.2 Terminal You can also create a sparse bundle file by using Terminal. Enter the following: sudo hdiutil create -size $SPECSIZE -type SPARSEBUNDLE nospotlight -volname $VOLUMENAME -fs "Case-sensitive Journaled HFS+" -verbose ./$COMPUTERNAME_MACADDRESS In $SPECSIZE, enter the volume size for the sparse bundle. Here, the size is set to 200g. In $VOLUMENAME, enter the volume name TimeMachine.
Chapter 19 Using Time Machine with the NSA 19.6 Using Time Machine Now the NSA is ready to be used as a backup volume for your computer. 1 Click Apple > System Preferences. Then go to System and select Time Machine. 2 Turn Time Machine ON. Then click Change Disk. 3 Select share01 as the backup disk. Then click Use for Backup.
Chapter 19 Using Time Machine with the NSA 346 4 When prompted, the username and password of share01, enter user1/12345. Then click Connect. 5 Time Machine starts backing up files to share01 after 120 seconds. If you want to backup immediately, click Time Machine icon and select Backup Now. 6 The screen shows the status of the backup once the process begins. 7 If you want to stop the backup process, click Time Machine icon and select Stop Backing Up. Then turn Time Machine OFF.
C HAPTER 20 Troubleshooting 20.1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories.
Chapter 20 Troubleshooting An HDD LED is off. The HDD LED is off when the NSA cannot detect a hard drive in the drive bay. Replace or install a hard drive. See Installing or replacing a hard disk. An HDD LED is red. Red means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector, but the LED stays red until the NSA restarts.
Chapter 20 Troubleshooting • Use another Ethernet cable. If you’re connecting to a Gigabit Ethernet, make sure you’re using an 8-wire Ethernet cable. • If the problem continues, contact the vendor. See Section 21.1 on page 365 for a description of NSA LEDs. The NSA turns off or reboots by itself. Check the Power Management screen. This is where you configure power settings for the NSA, including power saving, UPS, power on/off during power failure and power on/off schedule.
Chapter 20 Troubleshooting The NAS Starter Utility discovered my NSA but the status is always unreachable, even though I can access it. You may need to add the NAS Starter Utility to your software firewall’s allow list or lower your software firewall or anti-virus scanner’s security level. Alternatively you may have to configure your software firewall or other security software to allow UDP port 50127 traffic from the NSA.
Chapter 20 Troubleshooting I cannot get to the NSA login screen. • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility. • Make sure you have used the NAS Starter Utility to initialize your NSA. • If you used the RESET button, the NSA may have a new IP address. Close and reopen the NAS Starter Utility to discover the NSA. • Make sure the NSA is turned on.
Chapter 20 Troubleshooting 20.4.1 Enabling Scripting of Safe ActiveX Controls If pages of the web configurator do not display properly in Internet Explorer, check that scripting of safe ActiveX controls is enabled. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 205 Internet Options: Security 352 2 Click the Custom Level... button. 3 Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default).
Chapter 20 Troubleshooting 4 Click OK to close the window. Figure 206 Security Settings - Script Safe ActiveX Controls I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly. The default username is admin, and the default password is 1234. These fields are case-sensitive, so make sure [Caps Lock] is not on. • Turn the NSA off and on. • If this does not work, see Section 1.1.5 on page 23 to reset the device.
Chapter 20 Troubleshooting 20.5 I Cannot Access The NSA I cannot access a share. • Check that the NSA is turned on and connected to the network. Try to ping the NSA or use the NAS Starter Utility to discover it. • Make sure you have used the NAS Starter Utility to initialize your NSA. See Chapter 3 on page 35 for more information. • Check that you entered your login name and password correctly. • Check that the share exists and check its access settings.
Chapter 20 Troubleshooting • The user’s computer may already be connected to another of the NSA’s shares using a different user name and/or password. This can happen without the user realizing it if the user’s computer automatically connects to a share at logon. Right-click any other connected shares and click Disconnect. Then re-attempt to connect to the desired share. • Check if the share has an ANONYMOUS or EVERYONE access right.
Chapter 20 Troubleshooting 20.7 External USB Drives The COPY LED is red. Copying files from a USB device failed. The USB device may not be compatible with the NSA. Try to save the files onto a computer and then from the computer to the NSA (through the network connection). 20.8 Firmware I want to know the firmware version on the NSA. Go to the Status screen. The Firmware field shows you the current firmware version running. 20.
Chapter 20 Troubleshooting 1 On your Windows computer, click Start > Run or open a web browser. 2 Enter \\nsa followed by the number of your model (320 for example) or the Server Name you assigned the NSA. This shows you the folders in the NSA. 3 Use drag-and-drop or copy-and-paste to transfer files from your NSA to your local computer’s folder or your storage device. • You can download the files from your NSA. Just click on the file(s) in the Share Browsing screen (Section 4.4.5 on page 52).
Chapter 20 Troubleshooting I cannot use some applications in the Web Configurator. • The firmware installed in your NSA includes the features mentioned in Section 4.5.2 on page 60. This does not include the applications you can install using the Package Management screen. • You can use the Package Management screen (Chapter 11 on page 225) to install more applications from a web location (specified in the firmware) to your NSA.
Chapter 20 Troubleshooting 3 If an iTunes client is connected, the NSA’s iTunes server function scans the published media server folders for files every three minutes. Leave iTunes connected to the NSA for three minutes. Then use the NSA’s eject button (as shown next) to disconnect. Figure 207 iTunes Eject Button 4 Then click the NSA’s link to reconnect.
Chapter 20 Troubleshooting 2 If you have files from the iTunes Store that use DRM, you need to use your Apple account ID and password to authorize other computers to play the files. Apple permits you to authorize up to five computers at a time. To authorize a computer, open iTunes and click Store > Authorize Computer.
Chapter 20 Troubleshooting 20.14 Web Publishing A web-published share cannot be accessed by web browser from the Internet. • Make sure the person trying to access the share is using the correct web address (and port number if the NSA’s web publishing feature is not using port 80). See page 219 for details. • Make sure the publishing feature is turned on and the share is in the list of published shares. • Make sure the person trying to access the share is using Internet Explorer 6.
Chapter 20 Troubleshooting • Make sure your ISP allows you to run a server and is not blocking the port number of the NSA’s web publishing feature. 20.15 Auto Upload The NSA does not automatically upload files to Flickr or YouTube. 1 Make sure the NSA is connected to the Internet. See Section 9.4 on page 173 for details about testing network connections. 2 Click Maintenance > Log to check the NSA’s log for a message about the file.
Chapter 20 Troubleshooting • The web location of the package may be undergoing maintenance. Try again at a later time. Upgrade the firmware of the NSA. • If a new firmware is available, do an upgrade and try installing the package(s) again. The eMule Search screen does not work. You need to be connected to an eMule server before you can use the Search screen. Wait for the NSA to connect to a server before configuring the Search screen. I want to know how my hard disk is performing. Use S.M.A.R.T.
Chapter 20 Troubleshooting 364 Media Server User’s Guide
C HAPTER 21 Product Specifications See also Chapter 1 on page 21 for a general overview of the key features. 21.1 LEDs This table describes the NSA’s LEDs. Table 124 LEDs LED NAME COLOR STATUS DESCRIPTION POWER Blue SYSTEM Green On The NSA is turned on and receiving power. Off The NSA is turned off. On The NSA has fully started and is operating normally. Blinking The NSA is starting up. Note: Do not turn off the NSA while it is upgrading the firmware or you may render it unusable.
Chapter 21 Product Specifications Table 124 LEDs (continued) LED NAME COLOR STATUS DESCRIPTION COPY/ SYNC Green Red On A USB device is connected to the NSA. Blinking The NSA is copying or synchronizing files to or from the USB device. On Copying or synchronizing files to or from the USB device failed. Off No USB device is connected. 21.2 Supported Media Server Content Formats The following describes the details about the files that the NSA media server can publish.
Chapter 21 Product Specifications Table 125 Supported Media Server Content Formats (continued) CATEGORY FILE TYPE EXTENSION Music MP3 mp3, mpa Ogg Vorbis ogg RealMedia ra, ram WAVE wav Photo Windows Media Audio wma Matroska mka Monkeys Audio ape MP1 mp1 MP4 mp4, m4a, m4p PCM pcm LPCM lpcm DTS dts AC3 ac3 Free Lossless Audio Codec flac Au au AAC aac 3GPP 3gp, 3g2 AIFF aif, aiff RIFF-based MIDI rmi Playlist wpl, pls, asx, wax, m3u Bitmap bmp JPEG jpe, jpeg, jpg
Chapter 21 Product Specifications 368 Media Server User’s Guide
A PPENDIX A Setting Up Your Computer’s IP Address Note: Your specific NSA may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix A Setting Up Your Computer’s IP Address 370 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon. 3 Right-click Local Area Connection and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix A Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel. 2 In the Control Panel, click View network status and tasks under the Network and Internet category. 3 Click Change adapter settings.
Appendix A Setting Up Your Computer’s IP Address 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address 3 The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences.
Appendix A Setting Up Your Computer’s IP Address 382 2 In the System Preferences window, click the Network icon. 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix A Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. 6 Click Apply Now and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 209 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 384 Click Apple > System Preferences.
Appendix A Setting Up Your Computer’s IP Address 2 In System Preferences, click the Network icon. 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. 4 From the Configure list, select Using DHCP for dynamically assigned settings.
Appendix A Setting Up Your Computer’s IP Address • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NSA. 6 386 Click Apply and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 210 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix A Setting Up Your Computer’s IP Address 388 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix A Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. 5 The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
Appendix A Setting Up Your Computer’s IP Address 390 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. 8 Click the Close button to apply the changes.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 211 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address 392 1 Click K Menu > Computer > Administrator Settings (YaST). 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
Appendix A Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix A Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 212 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 394 Click Next to save the changes and close the Network Card Setup window.
Appendix A Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 213 openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
A PPENDIX B Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 216 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 398 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 217 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 218 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 219 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 220 Security Settings - Java Scripting Java Permissions 402 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 221 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window. Figure 222 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 406 Media Server User’s Guide
A PPENDIX C Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix C Common Services Table 126 Commonly Used Services (continued) 408 NAME PROTOCOL PORT(S) DESCRIPTION ICMP User-Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes. ICQ UDP 4000 This is a popular Internet chat program. IGMP (MULTICAST) User-Defined 2 Internet Group Management Protocol is used when sending packets to a specific group of hosts. IKE UDP 500 The Internet Key Exchange algorithm is used for key distribution and management.
Appendix C Common Services Table 126 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION STRM WORKS UDP 1558 Stream Works Protocol. SYSLOG UDP 514 Syslog allows you to send system logs to a UNIX server. TACACS UDP 49 Login Host Protocol used for (Terminal Access Controller Access Control System). TELNET TCP 23 Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks.
Appendix C Common Services 410 Media Server User’s Guide
A PPENDIX D Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix D Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 225 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix D Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 228 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next.
Appendix D Importing Certificates 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 230 Internet Explorer 7: Certificate Import Wizard 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 231 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix D Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 233 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 234 Internet Explorer 7: Security Warning 11 Finally, click OK when presented with the successful certificate installation message.
Appendix D Importing Certificates 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 237 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix D Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click Tools > Internet Options. Figure 239 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix D Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 241 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 242 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix D Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click Tools > Options. Figure 246 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix D Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 248 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 249 5 422 Firefox 2: Certificate Manager Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information.
Appendix D Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click Tools > Options. Figure 250 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix D Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 252 4 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 253 Firefox 2: Delete Web Site Certificates 5 424 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix D Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix D Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click Tools > Preferences. Figure 256 Opera 9: Tools Menu 2 In Preferences, click Advanced > Security > Manage certificates.
Appendix D Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 258 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix D Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 260 6 Next, click OK. Figure 261 7 Opera 9: Install authority certificate Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix D Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click Tools > Preferences. Figure 262 Opera 9: Tools Menu 2 In Preferences, Advanced > Security > Manage certificates.
Appendix D Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 264 4 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix D Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 265 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 266 Konqueror 3.
Appendix D Importing Certificates 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 267 Konqueror 3.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 268 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 269 Konqueror 3.
Appendix D Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 271 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 272 Konqueror 3.
Appendix D Importing Certificates 436 Media Server User’s Guide
A PPENDIX E Legal Information Copyright Copyright © 2011 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix E Legal Information Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page.
Index Index preferences 195 protection 215, 216 status 192 URL 193, 262 FTP 181, 184, 275 activation 184 anonymous access 184 passive mode transfer 185 media server 182, 185 configuration 186 iTunes server 182, 212, 213 print server 220 configuration 210 name 210 web publishing 183, 202, 218 activation 202 example 217 port number 219 Numbers 1-bay 22 2-bay 22 3-D photo wall 51 A access rights 55 Flickr 281 shares 306, 307 YouTube 284 activation download service 190 Flickr/YouTube 276 FTP 184 FTP Uploadr
Index backup job restoring files by 140 backup settings 318 bandwidth limit 288 BitTorrent 183 IP filtering 198, 199 protection 215, 216 re-seeding 191 settings 197 torrent files 193, 213 health 201 info-hash 202 trackers 202 broadcatching 183, 203 adding channels 190, 204, 205 channel guides 219 RSS 183 usage 150 creating groups 300, 301 shares 304, 305 users 294, 295 volumes 161, 164 D data protection 169 date 154 diagnostic tool 175 diagnostic tools 175 discovery 35 browser plugin, capturing link 214
Index E FTPS 130, 275 Exchangeable image file format, see Exif Exif 50 G explicit TLS/SSL 130 external volumes 164 global icons 47, 59 GMT 42, 156 Google Maps 50 F GPS 50 fan speed 150 groups 299 adding 300, 301 editing 301 membership 296, 301 names 301 searching 300 file troubleshooting access 355 file browser configure share 54 share browser 52 grace period 281, 283, 288 File Transfer Protocol over Explicit TLS, see FTPES File Transfer Protocol over TLS, see FTPS files downloading 54 uploadin
Index K N Ken Burns 57 naming server 154 shares 55 volumes 163 workgroup 154 L lag, time 153 language 58 latitude 50 link capture browser plugin 214 login 45 Logitech SqueezeCenter 189 logs 315 longitude 50 NAS Starter Utility 35, 44 navigation panel 60 network 171 diagnostic tools 175 DNS 171, 174 HTTP port 174 IP address 171 jumbo frames 172, 175 PPPoE 172, 179 activation 180 TCP/IP 173 network connection test 175 M maintenance 311 backup settings 318 logs 315 power management 311 failure 312 resum
Index protect 134 backup 134 backup tutorial 137 protection, download service 215, 216 public key certificate 320 editing 320 publishing shares 187 R RAID 162, 166 degraded 160 RAID 0 167, 168 RAID 1 167, 169 recovering 158 replacing disks 158 resynchronization 158 rebuild media server database 185 recycle bins 307 activation 55, 305 configuration 304, 308 related documentation 3 replacing disks 158 reset 23, 318 restoring by backup files tutorial 143 by backup job tutorial 140 files 140 restoring setting
Index duplexing 167 mirroring 167 parity 167 striping 167 naming volumes 163 RAID 157, 162, 166 degraded 160 RAID 0 167, 168 RAID 1 167, 169 recovering 158 resynchronization 158 status 159, 160 USB devices 164, 165 volumes 157, 166 striping 167 synchronization 211, 221 configuration 211 directions 212 single direction 221 tutorial 137 two directions 222 Syslog server 253 Time Machine 337 TLS 130, 182, 275 torrent files 193, 213 health 201 info-hash 202 trackers 202 Transport Layer Security, see TLS troubl
Index grace period 283 video category 283 V video category, YouTube 283 video playback 58 volumes 157, 166 creation 161, 164 JBOD 157, 162, 166, 168 names 163 RAID 157, 162, 166 degraded 160 RAID 0 167, 168 RAID 1 167, 169 recovering 158 resynchronization 158 scanning 164 status 159, 160 storage methods 166 duplexing 167 mirroring 167 parity 167 striping 167 Z zPilot 39 W web configurator 43 icons 47 login 45 navigation panel 60 password 46, 57 status 59 web publishing 183, 202, 218 activation 202 examp
Index 446 Media Server User’s Guide
P ART III Open Source Licences 447
End-User License Agreement for “NSA325” WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure their compliance with such terms and conditions, including, without limitation, not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software. 6. No Warranty THE SOFTWARE IS PROVIDED "AS IS.
NOTE: Some components of this product incorporate free software programs covered under the open source code licenses which allows you to freely copy, modify and redistribute the software. For at least three (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical Support (support@zyxel.com.
Notice Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation.
conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2.
this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it.
License"). Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such software library or work which has been distributed under these terms.
is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.
this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library.
Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to any other libraries whose authors decide to use it. You can use it for your libraries, too.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that companies distributing free software will individually obtain patent licenses, thus in effect transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
GNU LIBRARY GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Library General Public License (also called "this License"). Each licensee is addressed as "you".
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.
that version instead if you wish.) these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4.
6. As an exception to the Sections above, you may also compile or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.
7.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
Appendix: How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License). To apply these terms, attach the following notices to the library.
***************************************************************************/ This Product includes mediainfo software under below license MediaInfo(Lib) License Version 1.1, 3 January 2010 Copyright 2002-2010 MediaArea.net SARL. All rights reserved. Redistribution and use in source and binary forms, without modification, are permitted provided that the following conditions are met: 1.
a) Give prominent notice with each copy of the object code that the Library is used in it and that the Library and its use are covered by this License. b) Accompany the object code with a copy of the GNU GPL and this license document. 4. Combined Works.
To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code.
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program.
c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge.
All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term.
If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.
GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright © 2007 Free Software Foundation, Inc. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works.
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form.
6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or c)
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement).
LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 17. Interpretation of Sections 15 and 16.
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
* openssl-core@openssl.org. * * 5. Products derived from this software may not be called "OpenSSL" * nor may "OpenSSL" appear in their names without prior written * permission of the OpenSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the OpenSSL Project * for use in the OpenSSL Toolkit (http://www.openssl.
* * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@cryptsoft.com).
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.
A "Transparent" copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, that is suitable for revising the document straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text or matters or for automatic translation to a variety of formats suitable for input to text formatters.
You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above, provided that you release the Modified Version under precisely this License, with the Modified Version filling the role of the Document, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of it. In addition, you must do these things in the Modified Version: A.
unique by adding at the end of it, in parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to the section titles in the list of Invariant Sections in the license notice of the combined work.
version or of any later version that has been published (not as a draft) by the Free Software Foundation. If the Document does not specify a version number of this License, you may choose any version ever published (not as a draft) by the Free Software Foundation.
1.8. "License" means this document. 1.8.1. "Licensable" means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein. 1.9. "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is: A.
sell, and offer for sale, and/or otherwise dispose of the Original Code (or portions thereof). (c) the licenses granted in this Section 2.1(a) and (b) are effective on the date Initial Developer first distributes Original Code under the terms of this License. (d) Notwithstanding Section 2.
Section 3.5. 3.2. Availability of Source Code.
You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor.
6. Versions of the License. 6.1. New Versions. Netscape Communications Corporation ("Netscape") may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version.
Participant to You under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively, unless if within 60 days after receipt of notice You either: (i) agree in writing to pay Participant a mutually agreeable reasonable royalty for Your past and future use of Modifications made by such Participant, or (ii) withdraw Your litigation claim with respect to the Contributor Version against such Participant.
11. MISCELLANEOUS. This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by California law provisions (except to the extent applicable law, if any, provides otherwise), excluding its conflict-of-law provisions.
of the _____ license (the "[___] License"), in which case the provisions of [______] License are applicable instead of those above. If you wish to allow use of your version of this file only under the terms of the [____] License and not to allow others to use your version of this file under the MPL, indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the [___] License.
You may distribute under the terms of either the GNU General Public License or the Artistic License, as specified in the Perl README file. This Product includes flac software under below license This is the Win32 binary release for the FLAC project. All programs and plugins are released under the GPL (see COPYING.GPL) except the Winamp 2 plugin which is LGPL (see COPYING.LGPL). The documentation is released under the FDL (see COPYING.FDL).
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
(../LICENSE_1_0.txt, ../../LICENSE_1_0.txt etc.) How is the Boost license different from the GNU General Public License (GPL)? The Boost license permits the creation of derivative works for commercial or non-commercial use with no legal requirement to release your source code.
with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
You do not have to release any of your source code. You do not have to reveal or make public any changes to the libcurl source code. You do not have to reveal or make public that you are using libcurl within your app. As can be seen here: http://curl.haxx.se/docs/companies.html and elsewhere, more and more companies are discovering the power of libcurl and take advantage of it even in commercial environments.
exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.
or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution.
agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE.
APACHE HTTP SERVER SUBCOMPONENTS: The Apache HTTP Server includes a number of subcomponents with separate copyright notices and license terms. Your use of the source code for the these subcomponents is subject to the terms and conditions of the following licenses. For the mod_mime_magic component: /* * mod_mime_magic: MIME type lookup via file magic numbers * Copyright (c) 1996-1997 Cisco Systems, Inc. * * This software was submitted by Cisco Systems to the Apache Group in July * 1997.
* 605 E. Springfield, Champaign, IL 61820 * httpd@ncsa.uiuc.edu * * Copyright (C) 1995, Board of Trustees of the University of Illinois * ************************************************************************ * * md5.c: NCSA HTTPd code which uses the md5c.c RSA Code * * Original Code Copyright (C) 1994, Jeff Hostetler, Spyglass, Inc. * Portions of Content-MD5 code Copyright (C) 1993, 1994 by Carnegie Mellon * * * University (see Copyright below).
For the srclib\apr\include\apr_md5.h component: /* * This is work is derived from material Copyright RSA Data Security, Inc. * * The RSA copyright statement and Licence for that original material is * included below. This is followed by the Apache copyright statement and * licence for the modifications made to that material. */ /* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. */ /* * The apr_md5_encode() routine uses much code obtained from the FreeBSD 3.0 * MD5 crypt() function, which is licenced as follows: * ---------------------------------------------------------------------------* "THE BEER-WARE LICENSE" (Revision 42): * wrote this file.
* Security, Inc. MD4 Message-Digest Algorithm" in all material * mentioning or referencing the derived work. * * RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this * software for any particular purpose. It is provided "as is" * without express or implied warranty of any kind. * * These notices must be retained in any copies of any part of this * documentation and/or software. */ For the srclib\apr-util\test\testmd4.
# publicity pertaining to distribution of the software without specific, # written prior permission. M.I.T. makes no representations about the # suitability of this software for any purpose. It is provided "as is" # without express or implied warranty. For the pcre component: PCRE LICENCE -----------PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language.
This program may be used and copied freely providing this copyright notice is not removed. This software is provided "as is" and any express or implied waranties, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall Zeus Technology Ltd.
to whom the Software is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies of the Software and that both the above copyright notice(s) and this permission notice appear in supporting documentation. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
For those not familiar with the GNU GPL, the license basically allows you to: Use the CUPS software at no charge. Distribute verbatim copies of the software in source or binary form. Sell verbatim copies of the software for a media fee, or sell support for the software. Distribute or sell printer drivers and filters that use CUPS so long as source code is made available under the GPL.
b. An Apple Operating System means any operating system software developed and/or marketed by Apple Computer, Inc., including but not limited to all existing releases and versions of Apple's Darwin, Mac OS X, and Mac OS X Server products and all follow-on releases and future versions thereof. c. This exception is only available for Apple OS-Developed Software and does not apply to software that is distributed for use on other operating systems. d.
Email: derekn@foolabs.com WWW: http://www.foolabs.com/xpdf/ Support Easy Software Products sells software support for CUPS as well as a commercial printing product based on CUPS called ESP Print Pro. You can find out more at our web site: http://www.easysw.com/ This Product includes libxml2 software under below license Except where otherwise noted in the source code (e.g. the files hash.c, list.
4. Michael Barone GPSVME fixes 5. Jean-Francois Boudreault IPv6 support 6. Karl Berry syslog to file option 7. Greg Brackley Major rework of WINNT port. Clean up recvbuf and iosignal code into 8. Marc Brett Magnavox GPS clock driver 9. Piete Brooks MSF clock driver, Trimble PARSE support separate modules. 10.
Linux-PAM release may be distributed: Redistribution and use in source and binary forms of Linux-PAM, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain any existing copyright notice, and this entire permission notice in its entirety, including the disclaimer of warranties. 2.
This Product includes setsystz software under below license /* setsystz: set the Linux kernel's idea of the time zone */ /* Copyright (c) 2007 David A. Madore, Public Domain */ This Product includes sqlite software under below license SQLite Copyright All of the deliverable code in SQLite has been dedicated to the public domain by the authors.
For the purposes of this document, "SQLite software" shall mean any computer source code, documentation, makefiles, test scripts, or other information that is published on the SQLite website, http://www.sqlite.org/. Precompiled binaries are excluded from the definition of "SQLite software" in this document because the process of compiling the software may introduce information from outside sources which is not properly a part of SQLite.
** 1996-06-05 by Arthur David Olson. */ ================== ====== logwtmp.c ===== /* * Copyright (c) 1988 The Regents of the University of California. * All rights reserved.
the public domain: Joan Daemen - 3way.cpp Leonard Janke - cast.cpp, seal.cpp Steve Reid - cast.cpp Phil Karn - des.cpp Andrew M. Kuchling - md2.cpp, md4.cpp Colin Plumb - md5.cpp Seal Woods - rc6.cpp Chris Morgan - rijndael.cpp Paulo Baretto - rijndael.cpp, skipjack.cpp, square.cpp Richard De Moliner - safer.cpp Matthew Skala - twofish.cpp Kevin Springle - camellia.cpp, shacal2.cpp, ttmac.cpp, whrlpool.cpp, ripemd.
The wxWindows Licence is essentially the L-GPL (Library General Public Licence), with an exception stating that derived works in binary form may be distributed on the user's own terms. This is a solution that satisfies those who wish to produce GPL'ed software using wxWidgets, and also those producing proprietary software.
questions, or would like permission to distribute our other non-GPL programs. Also, be aware that standard copyright rules apply in any case where no particular license is given. Each of the software products we ship are licensed as follows: - All of Squeezebox Server's perl code is licensed for redistribution or inclusion in other software per version 2 of the GPL license, included below for your convenience. - SoftSqueeze is (c) Richard Titmuss and is licensed under GPL.
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language.
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it.
those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the author nor the names of any contributors may be used to endorse or promote products derived from this software without specific prior written permission.
5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group.
language itself. You may sell such an object file as proprietary provided that you provide or offer to provide the Perl source, as specified by the GNU General Public License. (This is merely an alternate way of specifying input to the program.) You may also sell a binary produced by the dumping of a running Perl script that belongs to you, provided that you provide or offer to provide the Perl source as specified by the GPL.
David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions.