ZyXEL Communications NSA320 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation ZyXEL Communications NSA320. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel ZyXEL Communications NSA320 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation ZyXEL Communications NSA320 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation ZyXEL Communications NSA320 devrait contenir:
- informations sur les caractéristiques techniques du dispositif ZyXEL Communications NSA320
- nom du fabricant et année de fabrication ZyXEL Communications NSA320
- instructions d'utilisation, de réglage et d’entretien de l'équipement ZyXEL Communications NSA320
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage ZyXEL Communications NSA320 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles ZyXEL Communications NSA320 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service ZyXEL Communications en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées ZyXEL Communications NSA320, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif ZyXEL Communications NSA320, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation ZyXEL Communications NSA320. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    www .zyxel.com www .zyxel.com NSA320 2-Bay Digit al Media Server Copyright © 2010 ZyXEL Communications Corporation Firmware V ersion 4.01 Edition 1, 06/2010 Default Login Details W eb Address nsa320 User Name admin Pa ss wo rd 12 34[...]

  • Page 2

    [...]

  • Page 3

    About This User's Guide NSA320 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who w ant to configure the NSA using the W eb Configurator . Tip s for Reading User ’ s Guides On-Screen When reading a Zy XEL User’s Guide On -Screen, k eep the following in mind: • If you don’ t alre ady h[...]

  • Page 4

    About This User's Guide NSA320 User’s Guide 4 Documentation Feedback Send your comments, questions or su g gestions to: techwriters@zyxel.com.tw Thank you! The T echnical W riting T eam, Z yXEL Communications Corp . , 6 Innovat ion R oad II, Science-Based In dustrial P ark, Hsinchu, 30099, T aiwan. Need More Help? More help is av ailable at [...]

  • Page 5

    About This User's Guide NSA320 User’s Guide 5 Customer Support Should problems arise that cannot be solved by the methods listed above, you shou ld con t act yo u r vend or . If you can not co nta c t your ve ndor , then conta ct a Z yXEL office fo r the region in wh ich you bought the de vice. See http://www .zyxel.com/web/contact_us.php fo[...]

  • Page 6

    Document Conventions NSA320 User’s Guide 6 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User’ s Guide. W arnings tell you about things that could harm you or your device. Note: Notes tell you other import ant informat ion (for e xample, other things you may need to configure or help ful tips) or re[...]

  • Page 7

    Document Conventions NSA320 User’s Guide 7 Icons Used in Figures Figures in this User’s Guide ma y use the following generic icons. The NSA icon is not an exact representation of y our device. Graphics in this book may differ slight ly from the product due to differences in operating systems, operati ng system versions , or if you installed upd[...]

  • Page 8

    Safety Warnings NSA320 User’s Guide 8 Safety Warnings • Do NO T use this product near water , for exam ple, in a wet basement or near a swim ming pool. • Do NO T expose your device to dampness, dust or corrosive liquids. • Do NO T store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a r[...]

  • Page 9

    Contents Overview NSA320 User’s Guide 9 Contents Overview User ’ s Guide ................................................... ..................................................... .......... ......... 21 Getting to Know Y our NSA .................... ............. ................ ................ ................ ............. ........ .. 23 NA[...]

  • Page 10

    Contents Overview NSA320 User’s Guide 10[...]

  • Page 11

    Table of Contents NSA320 User’s Guide 11 Table of Contents About This User's Guide ........................................... ..................................................... .......... 3 Document Conventions.................................................................. ......................................... .6 Safety Warnings .[...]

  • Page 12

    Table of Contents NSA320 User’s Guide 12 3.2 Accessing the NSA Web Configurator ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... ............. ... .... ... 49 3.2.1 Access the NSA Via NAS S t arter Utility .............. ................ ................ ................ ....... 49 3.2.2 Web Browser Access .............[...]

  • Page 13

    Table of Contents NSA320 User’s Guide 13 4.9 Download Service T utorial .. ... .... ... ............. ... ... ... .... ... ... ... .... ... ... ............. ... ... .... ... ... ... ... .... . .. 94 4.9.1 Copying/Pasting a Download Link ......... ............. ............. ................ ............. ............. 94 4.9.2 Installing the Lin[...]

  • Page 14

    Table of Contents NSA320 User’s Guide 14 7.2.1 Disk Replacement Restrictions ........... ... ............. ............. ................ ............. ........... 160 7.2.2 S torage Screen ................... ... ... ... .... ... ... ... ............. .... ... ... ... ... .... ... ............. ... ... ... .... . 16 1 7.3 Creating an Internal V [...]

  • Page 15

    Table of Contents NSA320 User’s Guide 15 9.9.1 Print S erver Rename ................ ............. ................ ................ ............. ................ ..... 215 9.10 The Copy/Sync Butt on Screen ...... ............. ................ ............. ................ ............. ........... 2 16 9.1 1 T echnic al Reference ............[...]

  • Page 16

    Table of Contents NSA320 User’s Guide 16 10.10.1 Backup: S tep 1 ..... ............. ................ ................ ................ ................. ................ . 263 10.10.2 Backup: S tep 2 ..... ............. ................ ................ ................ ................. ................ . 265 10.10.3 Backup: S tep 3 ..... .....[...]

  • Page 17

    Table of Contents NSA320 User’s Guide 17 13.1 Overview ........... ................ ............. ................ ................ ............. ................ ............ ......... 307 13.2 What Y ou Can Do .......................... ............. ................ ............. ................ ............. ......... .. 307 13.3 The Groups [...]

  • Page 18

    Table of Contents NSA320 User’s Guide 18 Chapter 16 Protecting Y our Dat a....................................... ................................................................ .... .. 347 16.1 Overview ........... ................ ............. ................ ................ ............. ................ ............ ......... 347 16.2 Pro[...]

  • Page 19

    Table of Contents NSA320 User’s Guide 19 Appendix D Importing Certificates ............................. ..................................................... ...... 41 1 Appendix E Open Source Licences ................................................ ...................................... 443 Appendix F Legal Information ........................[...]

  • Page 20

    Table of Contents NSA320 User’s Guide 20[...]

  • Page 21

    21 P ART I User ’ s Guide[...]

  • Page 22

    22[...]

  • Page 23

    NSA320 User’s Guide 23 C HAPTER 1 Getting to Know Your NSA 1.1 Overview This chapter covers the main features and applications of the NSA. Use the NSA to do the following. • Share files between compute rs on your netw ork. • Back up fi les from your computers to the NSA. •U s e t h e COPY/SYNC button to copy or synchronize files between the[...]

  • Page 24

    Chapter 1 Getting to Know Your NSA NSA320 User’s Guide 24 Figure 1 Example of the NSA in a Home Network Above is the NS A in a home network. Users back up and share data on the NSA. The DMA- 2500 plays the NSA’ s media files on the TV . A USB hard drive provides extra stor age space and files are copied directly from the USB mass stor age devic[...]

  • Page 25

    Chapter 1 Gettin g to Know Your NSA NSA320 User’s Guide 25 1.3 LEDs The NSA LEDs (lights) tell you important information. Figure 2 NSA Front Panel This table describes the NS A’ s LEDs. T able 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned on and receiving power . Off The NSA is turned off . SYSTEM Green On The NSA has full[...]

  • Page 26

    Chapter 1 Getting to Know Your NSA NSA320 User’s Guide 26 1.3.1 COPY/SYNC Button Use the COPY/SYNC button on the front panel to copy or synchronize files between a connected USB de vice and the NS A. See Section 9.10 on page 216 for more details on how to configure the c opy/sync settings. HDD1/ HDD2 Green On The hard disk drive is connected prop[...]

  • Page 27

    Chapter 1 Gettin g to Know Your NSA NSA320 User’s Guide 27 1.3.2 RESET Button Use the RESET button on the rear panel to re store the NS A’ s default settin gs. Figure 3 The RESET Button •P r e s s t h e RESET button until you hear one beep (after about two seconds), then release it. Y ou will hear one more beep after you release the button. T[...]

  • Page 28

    Chapter 1 Getting to Know Your NSA NSA320 User’s Guide 28[...]

  • Page 29

    NSA320 User’s Guide 29 C HAPTER 2 NAS Starter Utility 2.1 Overview This chapter describes the NAS Start er Utility . Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it. Make sure you have a backup of any existing data in the hard disk before inst alling it in the NSA. Using the i[...]

  • Page 30

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 30 Start the NAS Starter Ut ility (click the ic on in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility ). The first time you open the NAS Starter Utility the di scovery screen appears as foll ows. Figure 4 NAS Discovery The following table describes t he labels in this s[...]

  • Page 31

    Chapter 2 NAS Starter Utility NSA320 User’s Guide 31 2.4 Main NAS S t arter Utility Screen The main NAS Starter Utility screen disp lays after you select a NS A in the NSA Discovery screen. Figure 5 NAS Starter Utility Mai n Screen The following table describes t he labels in this screen. T able 3 NAS Starter Utilit y Main Screen LABEL DESCRIPTIO[...]

  • Page 32

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 32 2.5 Initialization Wizard Use these screens to set up the NSA for the first time Click Run the Initialization Wizard in the main utility screen to display the following screen. Y ou must log in using an admin account. The default administr ator username is ‘admin’ and the default password [...]

  • Page 33

    Chapter 2 NAS Starter Utility NSA320 User’s Guide 33 Choose Default Configuration (recommended) or manual configuration. Use the manual option if you need to name the NS A to configure specific network settings. Click Next . Figure 7 Initialization Wizard: Wizard T ype 2.5.1 Default Configuration 1 The NAS Starter Utility checks the Internet conn[...]

  • Page 34

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 34 2 T ype a new administrator password (and retype it to confir m). If you do not w ant to change the administr ator password, you can leave the fields blank and just click Next . Figure 9 Change Admin Password 3 Specify usernames and passwords for the individuals you w ant to be able to access [...]

  • Page 35

    Chapter 2 NAS Starter Utility NSA320 User’s Guide 35 4 Check your settings. If they are OK, cli ck Next . Otherwise click Back . If y ou want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual. Figure 1 1 Confirm Settings 5 W ait wh ile the NAS Starter Uti lity configures the NS A. F[...]

  • Page 36

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 36 click Finish to return to the main NAS Starter Utility screen (see S ection 2.4 on page 31 ). Figure 13 Setting th e NAS 2.5.2 Manual Configuration 1 Set up the NSA’ s basic network configur ation first. Figure 14 Setup Network[...]

  • Page 37

    Chapter 2 NAS Starter Utility NSA320 User’s Guide 37 The following table descri bes the labels in this screen. 2 If your Internet connecti on requires yo u to enter a user name and password to connect to the Internet, en ter them here and click Next . If you do not need to enter a user name and password to connect to the Internet, click Skip . Fi[...]

  • Page 38

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 38 3 The NAS Starter Utility checks the Internet connection. Figure 16 Check Network Conne ction 4 T ype a new administr ator password (and retype it to confirm) and click Next . If you do not w ant to change the administr ator password, y ou can leave the fields blank and just click Next . Figur[...]

  • Page 39

    Chapter 2 NAS Starter Utility NSA320 User’s Guide 39 5 Specify a name to uniq uely identify th e NS A on your network. Choose the time zone of your loca t i on. Th i s se ts the ti me difference between your time z one and Greenwich Mean Time (GMT). Figure 18 Create User Account s 6 Select how to configure the hard disks. Figure 19 Create User Ac[...]

  • Page 40

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 40 • RA ID 0 : Us e th is if you want max imu m s peed fo r you r dis ks, and /or you h ave other means of protecting y our data. RAID 0 has the fastest read and write performance but i f one disk fails y ou lose all your data from both disks. 7 This screen lists the shares the NAS Starter Util[...]

  • Page 41

    Chapter 2 NAS Starter Utility NSA320 User’s Guide 41 9 If the settings are OK, click Next . Otherwise click Back . If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to ma nual. Figure 22 Confirm Se ttings 10 W ait wh ile the NAS Starter Uti lity configures the NS A. Figure 23 Sett[...]

  • Page 42

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 42 click Finish to return to the main NAS Starter Utility screen (see S ection 2.4 on page 31 ). Figure 24 Setting th e NAS 2.5.3 Directory of the NAS Enter the ad ministrator user name and password and click Login . Figure 25 Login The utility opens the NSA’ s dire ctory in Wind ows Explorer .[...]

  • Page 43

    Chapter 2 NAS Starter Utility NSA320 User’s Guide 43 2.6 Import Files or Folders with zPilot In the main NAS Starter Utilit y screen click Import files or folders with zPilot to be able to drag and drop files from your computer to the NSA. Enter the ad ministrator user name and password and click Login . Figure 27 Login The zPilot icon displays. [...]

  • Page 44

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 44 Double-click the zPil ot icon to displa y the NAS Starter Utility sc reen with status details about the file tr ansfers. Click the “x” butt on next to a file entry to stop transferring the file. Click Clean Up to clear completed tr ansfers from the list. Figure 30 zPilot Showing T ransfer [...]

  • Page 45

    Chapter 2 NAS Starter Utility NSA320 User’s Guide 45 Windows Explorer (M y Computer) where y ou can access and us e it like y our computer’s other drives. Figure 32 Network Drive Mapping 2.8 Manage the Device In the main NAS Starter Utilit y screen click Manage the Device to log into t he NSA’ s administr ation screens where y ou can manage t[...]

  • Page 46

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 46 Click Configure network setting in the main utility screen to d i sp l ay th e following screen. Figure 34 NAS S tarter Utility > Configu re network setting The following table descri bes the labels in this screen. T able 5 NAS Starter Utility > Config LABEL DESCRIPTION NAS Name Specify [...]

  • Page 47

    Chapter 2 NAS Starter Utility NSA320 User’s Guide 47 If your Internet connecti on requires yo u to enter a user name and password to connect to the Internet, select Enable PPPoE Connection and enter your user name and password. Figure 35 PPPoE[...]

  • Page 48

    Chapter 2 NAS St arter Utility NSA320 User’s Guide 48[...]

  • Page 49

    NSA320 User’s Guide 49 C HAPTER 3 Web Configurator Basics 3.1 Overview This chapter describes how to ac cess the NSA web configur ator and provides an overview of its screens. The web configurator is an HTML -based management interface that allows easy NSA setup and management using an Internet brows er . Use Internet Explorer 6.0 or Mozilla Fi r[...]

  • Page 50

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 50 Guide for how to install and run the NAS Starter Util ity . See Chap ter 2 on page 29 for more information on the NAS Start e r Uti lity . Figure 36 NAS S tarter Utility Main Screen 3.2.2 W eb Browser Access Configure the serv er name of your NSA using the Network Configuration screen ( Se[...]

  • Page 51

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 51 Then click Login . See Chapter 12 on page 301 for how to create other user accounts. Figure 38 NSA Login Screen If you h a ve n o t do n e so yet, you sh oul d s ee a sc ree n ask ing yo u to c h a nge you r password (highly recommended) as sh own next. T ype a new password (and retype it [...]

  • Page 52

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 52 3.4 Home Screens All users (including the ad ministr ator) first see t he Home screen af t e r lo gging in . Figure 40 Home Note: If you did not select the option to st ay logged in for two weeks when you logged in, the web configurator management se ssion au tomatically times out if it is[...]

  • Page 53

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 53 Note: Y our browser may need Windows Media Player and VLC p lugins installed to play music and video files. T o get th e VLC plugins, you have to download and install VL C (use the .exe file). T o install a VLC plugin for FireFox, whe n you install VLC, you have to select the Mozilla plugi[...]

  • Page 54

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 54 Here are some Home screen descriptions. A music screen is s hown here as an example. Other screens work in a similar way . Figure 41 Musi c Screen This table describes common labels in the Home media screens. Not every item displays in ev ery screen. A B D C T able 8 Home Media Screens LAB[...]

  • Page 55

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 55 3.4.1 Now Playing (Music) A Now P laying l ink displays when a song is playing. Click it to display a panel lik e the following. This screen displa ys the name of the current song and it’ s play progress and lets you control the playback. Figure 42 Now Playing D Select the sorting criter[...]

  • Page 56

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 56 3.4.2 Exif and Google Map s (Photos) Click a photo’ s EXIF button to d isplay or hide the photo’ s Ex changeable image file format (Exif ) d ata. Figure 43 Exif Informat ion If a photo’ s Exif data includes GPS location data, clic k the latitude or longitude link to display the locat[...]

  • Page 57

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 57 3.4.3 Slideshow and CoolIris (Photos) In a Photo menu click the SlideShow but ton to display the menu’ s files as a slideshow . Mov e your cursor over the slideshow’ s screen to displa y full screen, previous, pause, and next buttons fo r cont rolling the slideshow . Figure 45 Slidesho[...]

  • Page 58

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 58 3.4.4.2 My Favorite Use Fa vorite > My Favorite to create, edit, and pla y playlists. These pl aylists are specific to the NSA and cannot be used in external music play ers. Figure 46 Favorite > My Favorit e This tabl e d escrib e s labels in this me n u. 3.4.5 File Browser Click Fil[...]

  • Page 59

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 59 can map a share to a network drive for easy and familiar file transfer for Windows users. • A folder icon wi th a hand indicates a share. • The adminis trator owns and manages the public sh ares. • Double-cli ck a media file to open it. Doub le-click other types of files to be able t[...]

  • Page 60

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 60 Last Modified This column displays the la st time the file or folder was changed (in year-month-da y hour:minute:second format). Create New Folder Click this to open the following screen where you can create a new folder within the share. Specify a name to identify the folder . See Section[...]

  • Page 61

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 61 3.4.5.1 Configure Share Screen In the File Browser screen, select a share and click Configure Sh are to open the following screen where you can see and configure share management de tails. Figure 48 File Browser > Configure Sh are The following table describes t h e labels in the this s[...]

  • Page 62

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 62 3.4.6 Share and Folder Names The name can only contain the following characters: • Alphanumeric (A - z, 0-9) and Unicode. The NSA allows FTP access to shares, fold ers or f iles with na mes encoded in the UTF-8 (8-bit UCS/Unicode T ransformation F ormat) format. So your FTP client must s[...]

  • Page 63

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 63 • Unicode is support ed for share names, although your FTP client must support UTF-8. Full support should be available in all Windows versions after Windows 2000. 3.4.7 Application Zone Administr ators can click Application Zone to go to a screen where you can enable or disable v arious [...]

  • Page 64

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 64 3.4.8 System Settings Click System > Settings to open the following screen. Use this screen to change general settings and an account password. Figure 50 System > Settings P ause Select the Flickr or Y outube Uploadr entry and click this to pause current uploading. Resume will resume[...]

  • Page 65

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 65 The following table describes t he labels in this screen. T able 13 System > Settings LABEL DESCRIPTION Double Click Behavior Setting Select Replace current playlist and start to play to have double clicking a song cause the NSA to immediately stop an y currently playing song and start [...]

  • Page 66

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 66 3.5 Administration Screens The System > Administration link displays when you log in as the administr ator . Click System > Administration in the Home screen to open the advanced administration scre ens . The Status screen is the first adv anced administr ation screen that dis plays.[...]

  • Page 67

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 67 3.5.2 Navigation Panel The navigation panel on the le ft of the Web Configurator screen ( ) contains screen links. Click a link to displa y su b-links. There are no sub-links for the Status screen. Certain s creens also contain hyper links t hat allow y ou to jump to another screen. The fo[...]

  • Page 68

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 68 Applications FTP Ser ver Enable FTP file transfer to/from the NSA, set the number of FTP conne ctions allowed, an F TP idle timeout, and the character set. Media Server Enable or disable the sharing of media files and se lect which shares to share. Download Service Have the NSA handle larg[...]

  • Page 69

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 69 3.5.3 Main Window The main window () shows the screen you select in the navigation panel. It is discussed in the rest of this document. The Status screen is the first administr ation screen to displa y . See Chapter 5 on page 149 for more information about the Status screen. 3.5.4 S t atus[...]

  • Page 70

    Chapter 3 Web Configur ator Basics NSA320 User’s Guide 70 3.5.6 Session Example (Windows) Open Windows Explorer and type two back slashes followed by the NSA name or IP address. Initiall y you can only read and wri te to the Public , Video , Music , and Photo folders until you create other shares on the NSA. This session is then display ed as sho[...]

  • Page 71

    NSA320 User’s Guide 71 C HAPTER 4 Tutorials 4.1 Overview This chapter provides tutorials that show how to use the NSA. • Windows 7 Network , see pag e 71 • Windows 7 Net work Map , see page 75 • Playing Media Files i n Windows 7 , see page 78 • Windows 7 Devices and Printers , see page 78 • Creating a V olume , see page 81 • Deleting [...]

  • Page 72

    Chapter 4 Tutorials NSA320 User’s Guide 72 1 Click Start > Control Panel. Set View by to Category and click Network and Internet . 2 Click View network computers and devices .[...]

  • Page 73

    Chapter 4 Tutorials NSA320 User’s Guide 73 3 The NSA icon displa ys twice because the NSA is both a media server and a stor age device. Double-click either NSA icon to open the W eb Co nfigurat or login screen. 4.2.1 If the NSA Icon Does Not Display The network containing the NSA mu st be set as a home or work network in order for the NSA icons t[...]

  • Page 74

    Chapter 4 Tutorials NSA320 User’s Guide 74 2 Use the Set Network Location screen to set the network’ s location to home or work. 4.2.2 NSA Icon Right-click Options Right- click the NSA’ s icon to see these options: • Install/Uninstall : Click Install to add the NSA as a device in y our computer . After you ins tall the NSA you can see it i [...]

  • Page 75

    Chapter 4 Tutorials NSA320 User’s Guide 75 • Properties opens a window of NSA details and troubleshooting information. • Manufacturer identifi es the company that produc ed the NSA. • Model identifies the NS A model. • Model number identifies the NS A model number . • Device webpage shows the IP address for accessi ng the W eb Config ur[...]

  • Page 76

    Chapter 4 Tutorials NSA320 User’s Guide 76 1 Click Start > Control Panel > View network status an d tasks (or Network and Sharing Center if you view the Control Panel by icons). 2 Click See full map (1 in the figure). The network containing the NSA mu st be set as a home or work network in order to use the full map feature. If the networ k [...]

  • Page 77

    Chapter 4 Tutorials NSA320 User’s Guide 77 3 Double-click the NSA’ s icon to open the W eb Configurator login screen. See Section 4.2.2 on page 74 for the NSA icon’ s right-click options.[...]

  • Page 78

    Chapter 4 Tutorials NSA320 User’s Guide 78 4.4 Playing Media Files in Windows 7 In Windows 7, th e NSA autom atically di splays as a library in Windows Media Player . Figure 52 NSA in Windo ws Media Player 4.5 Windows 7 Devices and Printers After you use the NS A’s network icon’ s install option you can manage the NSA from the Windows 7 Devic[...]

  • Page 79

    Chapter 4 Tutorials NSA320 User’s Guide 79 icon to open a properties window (see page 75 ). Rig ht-click the ic on to display these options: • Download NAS Starter Utility downloads the NSA’ s Starter Utility . It lets you find, set up, and manage the NS A as well as copy files to it and access the files on it. See Chapter 2 on page 29 for de[...]

  • Page 80

    Chapter 4 Tutorials NSA320 User’s Guide 80 4.5.1 Windows 7 Desktop Shortcut This is the NSA’ s desktop shortcut. Double-click it to open a properties window (see page 75 ). 1 Right- click the NSA’ s desktop shortc ut icon to see these opti on s: • Open file location takes you to the Windows 7 Devices and Printers folder . • Download NAS S[...]

  • Page 81

    Chapter 4 Tutorials NSA320 User’s Guide 81 • Cut removes this shortcut so you can paste it somewhere else. • Copy copies the shortcut so y ou can paste it somewhere el se. • Create shortcut has Windows mak e a desktop shortcut to this icon. • Delete sends the sho rtcut to the re cycle bin. • Rename lets you change the name of t he short[...]

  • Page 82

    Chapter 4 Tutorials NSA320 User’s Guide 82 4.6.1 Creating a RAID 1 V olume This stor age method allows recov ery of data if y our hard disk fails. T o create a RAID 1 volume, you must install two SA T A hard disks in your NSA. There are two ways to create a RAID 1 volume: •C l i c k t h e Migrate button - If you already have a SA T A har d disk[...]

  • Page 83

    Chapter 4 Tutorials NSA320 User’s Guide 83 1 In the Storage > Volume screen, click Create an Internal Volume . 2 In the Disk Configuration screen, y ou can select the stor age method. • T ype in the Volume Name f or your RAI D 1 volu me . Th e vo lum e na me ca n be 1 to 31 characters (a- z, 0-9, " " [spaces], "_", and &q[...]

  • Page 84

    Chapter 4 Tutorials NSA320 User’s Guide 84 3 The Storage > Volume screen displays with yo ur RAID 1 volume. 4.7 Deleting a V olume Delete an existing v olume in your NSA b y doing the following steps. 1 In the Storage > Volume screen, select the vol ume you want t o delete and click the delete icon. 2 A confirmation window appears as follow[...]

  • Page 85

    Chapter 4 Tutorials NSA320 User’s Guide 85 This deletes all existing dat a in the volume. Make sure you have a backup of any existing dat a in the hard disk. 4.8 File Sharing T utorials The following sections cover using t he NSA for file shari ng. This chapter assumes you ha ve already followed the Quick Start Guide ins t ructions to pe rform in[...]

  • Page 86

    Chapter 4 Tutorials NSA320 User’s Guide 86 2 Click Sharing > Users to open the Users screen. Then click Add User. 3 Configure the screen as follows and writ e down the username and password to give to Jimm y . If the username and pa ssword are the same as Jimmy’ s Wind ows login, Jimmy will not need to enter a username and password when he l[...]

  • Page 87

    Chapter 4 Tutorials NSA320 User’s Guide 87 Now that Bob has created Jimm y’ s account, he can go through the steps ag ain to create another account for K evin. Aft er both accounts are created, he can go to Section 4.8.2 on page 87 to create shares for Jimm y and K evin. 4.8.2 Creating a Share Suppose Bob has already created separat e accounts [...]

  • Page 88

    Chapter 4 Tutorials NSA320 User’s Guide 88 3 Configure the screen as foll ows to give Ji mmy full access right to the share. Then click Apply to create the share. Now that Bob has created Jimm y’ s share, he can go through the steps again to create another share for K evin. 4.8.3 Creating a Group After creating user accounts for Jimmy and K evi[...]

  • Page 89

    Chapter 4 Tutorials NSA320 User’s Guide 89 2 Specify a name for the group. Select th e user(s) y ou want to add to the group from the Available U ser(s) list and click Add Selected User(s) . Configure the screen as follows. Then click Apply to create the group. Now that Bob has created a group for J immy and K evin, he can go through the steps ag[...]

  • Page 90

    Chapter 4 Tutorials NSA320 User’s Guide 90 3 Select the network drive that you want to map the NSA to from the Drive list bo x. This example uses I . Then browse to and select the share on the NSA. Click Finish . 4 Enter the username and password f or Jimmy’ s account and click OK . Y ou do not need to do this if the username and password are t[...]

  • Page 91

    Chapter 4 Tutorials NSA320 User’s Guide 91 5 After the mapping is done, y ou can then si mply copy and paste or dr ag and drop files from/to your local computer ’ s drives to or from this network folder . Just like the NSA’ s share w as another folder on your computer . Now that Bob has mapped Jimmy’ s share to Jimm y’ s computer , he can[...]

  • Page 92

    Chapter 4 Tutorials NSA320 User’s Guide 92 2 Enter your pa ss wo rd and clic k Login . 3 Now you can access fi les and copy files from/to your local computer’ s driv es to or from this network fold er .[...]

  • Page 93

    Chapter 4 Tutorials NSA320 User’s Guide 93 4.8.6 Accessing a Share Through the W eb Configurator Y ou can browse and access files through the web configurator . 1 Log into the NSA web config urator (see Section 3.3 on page 50 ) using the appropriate user name and password (t his example uses Jimmy’ s) and click File Browser . Clic k a sha re (t[...]

  • Page 94

    Chapter 4 Tutorials NSA320 User’s Guide 94 4.9 Download Service T utorial This tutorial cov ers using the NSA t o down load a file from the Inter n et. Use this same procedure for BitT orrent downloads as well as regular HT TP (web) and FT P downloads. See Section 9.11.2 on p age 219 for more on the download service. 4.9.1 Copying/Pasting a Downl[...]

  • Page 95

    Chapter 4 Tutorials NSA320 User’s Guide 95 3 Right- click the download link and select Copy Shortcut i n Internet E xplorer (o r Copy Link Location in Firefox) . 4 Log into the NSA web config urator (see Section 3.3 on page 50 ) using the administrator account and click Application Zone and the Application Zone > Download Service link. 5 Click[...]

  • Page 96

    Chapter 4 Tutorials NSA320 User’s Guide 96 6 Right- click the URL field and select Paste . 7 The URL displays in the URL field. Click Apply . 8 After a few moments, the down load task appears in the Download Service screen’ s Active tab. The download appears in the Comp leted tab when it is done. By de fault the NSA stores all downloads in the [...]

  • Page 97

    Chapter 4 Tutorials NSA320 User’s Guide 97 4.9.2 Inst alling the Link Capture Browser Plugin In addition to copying and pa s ting a download link to the Download Service screen, you can also i nstall a link capture browser plugin in y our web browser . Use the plugin to easily add a download lin k to the NSA’ s download service. See Section 9.1[...]

  • Page 98

    Chapter 4 Tutorials NSA320 User’s Guide 98 3 Select a location to sa ve the plugin and click Install . Close the screen once the installation is complete. 4 Open Internet Explorer and locate a download link. In this example, www .zyxel.com has a Download Now link for downloading a user’ s guide for Z yXEL ’ s NBG410W3G (a 3G wireless router).[...]

  • Page 99

    Chapter 4 Tutorials NSA320 User’s Guide 99 5 Enter the NS A’ s web address (n sa320 by default) and click Apply . A warning message di s p lay s asking fo r co nfirmati on. Click OK to apply the setting. Firefox 1 Open Firefox. 2 Open the folder containing th e link capture browser plugi n. 3 T o install the plugin, drag and drop t he plugin to[...]

  • Page 100

    Chapter 4 Tutorials NSA320 User’s Guide 100 4 The following screen displays. Click Install Now . 5 Y ou need to restart Firefox after the inst allation.[...]

  • Page 101

    Chapter 4 Tutorials NSA320 User’s Guide 101 6 When Firefox restarts, a mess age displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’ s web address. 7 Enter the NS A’ s web address (n sa320 by default) and click OK .[...]

  • Page 102

    Chapter 4 Tutorials NSA320 User’s Guide 102 4.9.3 Using the Link Capture Browser Plugin Once you in stall the plugin, y ou may be gin sending download links to the NSA from your web browser . This example show s how to send a downl oad link to the NSA’ s download servic e using the link capture browser plugi n. 1 Open your Internet browser (thi[...]

  • Page 103

    Chapter 4 Tutorials NSA320 User’s Guide 103 4 The login screen shows up. Enter your NSA’ s login information and click Login to send the lin k to the downlo ad servic e. A confirmation message displays . 5 Log into the NSA web config urator (see Section 3.3 on page 50 ) using the administrator account and click Application Zone and the Applicat[...]

  • Page 104

    Chapter 4 Tutorials NSA320 User’s Guide 104 6 The download task appears in the Download Service screen’ s Active or Queue tab. It may appear i n the Completed tab if the NSA already finished downloadi ng the file or it may appear in the Error tab if t he NSA failed to download the file. By default the NSA st ores all downloads in the admin shar[...]

  • Page 105

    Chapter 4 Tutorials NSA320 User’s Guide 105 Note: If power failure occurs during the a ctive download period, the NSA will verify whether the downloaded files were damage d. If a file is corru pted, the NSA will download the file again. If the file is int act but not completely downloade d, the NSA will resume the download t ask af ter it restart[...]

  • Page 106

    Chapter 4 Tutorials NSA320 User’s Guide 106 •C l i c k Edit IP Filter . Use an online IP fi lter table from http:// www .bluetack.co.uk/config/lev el1.gz for example to protect BitT orrent downloads. Enter the URL in the Update IP Filter from the Internet E very Week field. 4.9.5 Using Download Service Notification Use an RSS feed reader on you[...]

  • Page 107

    Chapter 4 Tutorials NSA320 User’s Guide 107 Internet Explorer 7 Example 1 After you ac tivate download service notification, click the RSS feed icon. 2 The following screen displays. Select Subscribe to this feed . 3 The following screen displays. Click Subscribe .[...]

  • Page 108

    Chapter 4 Tutorials NSA320 User’s Guide 108 4 Click the Favorite icon on your browser and select the Feeds tab t o check the updates of your NS A’ s download list. Firefox Example 1 After you ac tivate download service notification, click the RSS feed icon. 2 The following screen displays. Select Live Boo kmarks from the drop-down list and clic[...]

  • Page 109

    Chapter 4 Tutorials NSA320 User’s Guide 109 3 The following screen displays. Select Bookmarks Menu and click Ad d . 4 From the Firefox’ s Book marks Menu , select Download Notify to check the updates of your NS A’ s download list.[...]

  • Page 110

    Chapter 4 Tutorials NSA320 User’s Guide 11 0 4.10 Broadcatching T utorial Use broadcatching to have the NS A downlo ad frequently updated digital content like TV progr ams, radio talk shows, Pod casts (audio files), and blogs. This example shows how to sub s crib e the NSA to the CN ET T V Inte rnet televi s io n channel. Se e Section 9.8 on page[...]

  • Page 111

    Chapter 4 Tutorials NSA320 User’s Guide 111 3 Right- click the download link and select Copy Link Location in Firefox (or Co py Shortcut in Internet Explorer). 4 Log into the NSA web config urator (see Section 3.3 on page 50 ) using the administrator account and click Administration > Applications > Broadcatching . 5 Click Add Cha nnel .[...]

  • Page 112

    Chapter 4 Tutorials NSA320 User’s Guide 11 2 6 Right- click the URL field and select Paste . 7 The URL displays in the URL field. 8 Select a policy for what items to downl oad. This exampl e uses Manually Choose Items for Download so you will be ab le to select individual items to download later . 9 Select a policy for what items to delete . This[...]

  • Page 113

    Chapter 4 Tutorials NSA320 User’s Guide 11 3 11 After a few moments, the channel appears in the Broadcatching screen where you can select items you w ant to download. The NS A save s the items you download in a folder named after the chan nel. By default , the channel folder s are created in the admin share’ s download folder . The NSA’ s med[...]

  • Page 114

    Chapter 4 Tutorials NSA320 User’s Guide 11 4 5 On your comput er , open your CI FS file sharing progr am (Windows Explorer for example) and browse to the NS A. Double-click the printer’ s icon. 6 If you get a warning screen, click the option that lets y ou continue ( Yes in this example). 7 If your computer does not already have the printer’s[...]

  • Page 115

    Chapter 4 Tutorials NSA320 User’s Guide 11 5 After the driver installat ion finishes, th e compu te r is ready to use the printer . Select the printer in an application to us e i t to print. Browse to the NSA us ing a CIFS program (like Windows Explorer) and double-click t he printer’s icon to open the printer’s queue of print jobs. Note: Rep[...]

  • Page 116

    Chapter 4 Tutorials NSA320 User’s Guide 11 6 3 Press and release the COPY/SYNC button on the NSA’ s front panel to start copyin g file s. 4 The copied files can be found in a new fold er in the photo share. The name of this folder is the date (yyyy -mm-dd) and time (hh-mm-ss) when the folder is created. 5 The NSA also automatically uploads the [...]

  • Page 117

    Chapter 4 Tutorials NSA320 User’s Guide 11 7 at home, so Susan has to set her NSA as an FTP server for Am y to automatically send files using FTP Uploadr . l T o set the NSA as an FTP server , click Applications > FTP to open the FTP screen. Select Enable FTP and click Ap ply . Susan also has to create a user account and share on her NSA for A[...]

  • Page 118

    Chapter 4 Tutorials NSA320 User’s Guide 11 8 This is how Amy would set up the NS A’ s FTP Uploadr . 1 Click Applications > Auto Upload > FTP Uploadr to open the FTP Uploadr screen. Select Enable FTP Uploadr and click Apply to turn on FTP Uploadr . 2 Click Add Se rver . 3 Enter the information as describe in T able 17 on page 117 . Click A[...]

  • Page 119

    Chapter 4 Tutorials NSA320 User’s Guide 11 9 4 In the FTP Uploadr screen, click Preferences to configure the auto upload settings. 5 Amy w ants to share video files with Susan. In the Preferen ces screen, click the Add button and select vid eo from the Shares drop-down li st box, enter a forward slash in the Path field and click Apply to add the [...]

  • Page 120

    Chapter 4 Tutorials NSA320 User’s Guide 120 6 Amy also set the Bandwidth Limit to 20KB/s so that the upload doesn’ t slow down her Internet connection. Now Amy has set up FTP Uploadr to send files to Susan’ s NSA. Every time Amy adds new files or renames files in the video share, these new or mod ified files will be uploade d au tom aticall y[...]

  • Page 121

    Chapter 4 Tutorials NSA320 User’s Guide 121 4.14 W eb Configurator ’ s Security Sessions These tutorials show you how to conf igure security for the NSA’ s W eb Configur ator sessions. Y ou will customize the NS A’ s self -signed SSL certific ate and distribute it to your us ers. 4.14.1 Customizing the NSA’ s Certificate 1 Click M aintena[...]

  • Page 122

    Chapter 4 Tutorials NSA320 User’s Guide 122 2 Next, let’s modif y the cert ifica t e by changi ng th e Common Name to this NSA’ s host name of “nsa” , the Organization to “ZyXEL ” and the Key Length to 2048 . 3 The NSA rest arts its n etwork serv ices and returns you to the login screen.[...]

  • Page 123

    Chapter 4 Tutorials NSA320 User’s Guide 123 4.14.2 Downloading and Inst a lling Customized Certificate 1 Log in and return to Mainte nance > SSL . Under Modify the Existing Certificate , click Download . 2 Save th e file to you r com put er .[...]

  • Page 124

    Chapter 4 Tutorials NSA320 User’s Guide 124 3 Find the certificate file on your computer and double-click it. 4 Install the certificate. The rest of the steps in this section are an example of installing a certi ficate in Windows. See Appendix D on page 411 for other examples. In the Certificate dialog box, click Install Certificate .[...]

  • Page 125

    Chapter 4 Tutorials NSA320 User’s Guide 125 5 In the Certificate Import Wizard , click Next . 6 Leave Automatically select certificat e store based on the type of certificate selected and click Next .[...]

  • Page 126

    Chapter 4 Tutorials NSA320 User’s Guide 126 7 In the Completing the Certificate Import Wizard screen, click Finish . 8 If you are presented with another Security Warning , c lick Yes . 9 Finally , click OK when presented with the successful certificate installation message.[...]

  • Page 127

    Chapter 4 Tutorials NSA320 User’s Guide 127 4.14.3 T urn on the NSA’ s Web Security Now that you have cust omiz ed the NSA’ s certificate and installed it in your computer , you can turn on security f or your W eb Configurator sessions. This example uses Firefox 3.0. See Appendix D on page 411 for more information on browsers and certificates[...]

  • Page 128

    Chapter 4 Tutorials NSA320 User’s Guide 128 2 A warning screen p ops up if applying y our change may disconnect some users. Click Apply to continue. 3 The NSA logs you out and automatically redi rect s your formerly non-secure (HT TP) connection to a secure (HT TPS) connection. Y our browser may give you a warning about the device’ s public key[...]

  • Page 129

    Chapter 4 Tutorials NSA320 User’s Guide 129 4 Click Add Exception . 5 Click Get Certificate .[...]

  • Page 130

    Chapter 4 Tutorials NSA320 User’s Guide 130 6 Before you add an ex ception, verif y that the device to which you are trying to connect is providing the correct certificate. Cli ck View .[...]

  • Page 131

    Chapter 4 Tutorials NSA320 User’s Guide 131 7 The SHA1 fingerprint must match the NSA’ s certificate you downloaded from the NSA to your computer . (Double-click the NSA’ s cert ificate file and then click Details and look at the Thumbprint ). Click Close .[...]

  • Page 132

    Chapter 4 Tutorials NSA320 User’s Guide 132 8 If the certificate fingerprints match, click Confirm Security Exception , otherwise click Cancel . 9 The login screen displays. Now , any one who connects to the NSA’ s W eb Configurator screens will automatically do so by HT TPs. Use a secu re method t o let your users know the correct fingerprint [...]

  • Page 133

    Chapter 4 Tutorials NSA320 User’s Guide 133 security exception ( as in steps 6 to 7 on pages 130 to 131 ). See the ne xt section for how to use F TPES with the NSA for sec ure F TP transfers. 4.15 Using FTPES to Connect to the NSA This section cov ers how to use FTP over Explici t TLS/SSL with the NSA for secure FTP transfers. Before you go throu[...]

  • Page 134

    Chapter 4 Tutorials NSA320 User’s Guide 134 2 A security w arning screen displays. The SHA1 fingerprint must match the NSA’ s certificate you downloaded from the NS A to your computer . (Double-click the NSA’ s certificate file and then click Details and look at the Thumbprint ). If they match, click OK . The shares and folders to which Gonzo[...]

  • Page 135

    Chapter 4 Tutorials NSA320 User’s Guide 135 4.16.1 Creating an Archive Backup T o backup the NSA every week to a remote NSA: 1 Click Prote ct > Backup > A dd Job . Figure 53 Protect > Ba ckup 2 Identify the backup job and select Archive . New files are often added to the shares that you need to back up and existing files are not frequent[...]

  • Page 136

    Chapter 4 Tutorials NSA320 User’s Guide 136 3 Select the volume1 check bo x to select all the folders and files. Select Remote and enter the other NSA’ s addr ess, username, password, and share name. If you want to mak e sure the remote NSA is reachable, click Test Connection . Figure 55 Protect > Ba ckup > Add Job: S tep 2[...]

  • Page 137

    Chapter 4 Tutorials NSA320 User’s Guide 137 4 In this example, the target NSA is on the LAN so leave the compression off . Security is already configured on the ta rget NSA so you can leave the encryption off , too. Have the NSA kee p 3 ba ck ups . Figure 56 Protect > Ba ckup > Add Job: S tep 3 5 Set the frequency to Weekly . Schedule the b[...]

  • Page 138

    Chapter 4 Tutorials NSA320 User’s Guide 138 4.16.2 Creating a Synchronization Backup T o create a synchronization backup: 1 Click Prote ct > Backup > A dd Job . Figure 57 Protect > Ba ckup Name the backup job and select Synchronization . Y ou want only your current set of files in the remote NSA’ s folder , so you select Mirror to make[...]

  • Page 139

    Chapter 4 Tutorials NSA320 User’s Guide 139 2 Select the folder that ne eds to be mirrored (your Private folder in t his example) and Remote . • Enter the other NSA’ s address and administr ator password. •C l i c k Show target content to di splay the remote NSA’ s cont ents. • Select the destination on the remote NSA ( Backups in this [...]

  • Page 140

    Chapter 4 Tutorials NSA320 User’s Guide 140 • T urn on the encryption to protect these sensitiv e files during the transfer . The final files stored on the remote NSA will be unencrypted ( usable). • Rest rict the bandwidth usage t o 256 KB/s to stop the archives from usi ng all of your network connection’ s av ailable bandwidth. • Y ou d[...]

  • Page 141

    Chapter 4 Tutorials NSA320 User’s Guide 141 4.16.3 Restoring Archived Files by Backup Job If you hav e backup jobs for which the NSA has already performed backups, y ou can restore the files based on th e backup job. Do the following: 1 Click Prote ct > Backup screen, select a back up job and click Restore Archive . Figure 63 Protect > Ba c[...]

  • Page 142

    Chapter 4 Tutorials NSA320 User’s Guide 142 3 Select the files and folders you w ant to restore and click Next . Figure 65 Protect > Ba ckup > Restore Archive: S tep 2 4 Select the original location and click Done . Figure 66 Protect > Ba ckup > Restore Archive: S tep 3[...]

  • Page 143

    Chapter 4 Tutorials NSA320 User’s Guide 143 5 The NSA restores the files into the share. When it finishes you can access the files. Figure 67 Protect > Ba ckup > Restore Archive: Progress 4.16.4 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore arc[...]

  • Page 144

    Chapter 4 Tutorials NSA320 User’s Guide 144 2 Select the backup job an d backup time and click Next . Figure 69 Protect > Re store: S tep 2 3 Select everythi ng in the share except the recycle folder . Click Next . Figure 70 Protect > Re store: S tep 3[...]

  • Page 145

    Chapter 4 Tutorials NSA320 User’s Guide 145 4 Browse to the folder where you want to put the files. Click Done . Figure 71 Protect > Re store: S tep 4 5 The NSA restores the files and you can use them again.[...]

  • Page 146

    Chapter 4 Tutorials NSA320 User’s Guide 146[...]

  • Page 147

    147 P ART II T echnical Reference[...]

  • Page 148

    148[...]

  • Page 149

    NSA320 User’s Guide 149 C HAPTER 5 Status Screen 5.1 Overview This chapter describes the Status screen, which is the first advanced administration scre en that display s. 5.2 The S t atus Screen Click Administr ation in the Home screens ( Section 3.5 on page 66 ) to open the W eb Configur ator . Y ou can also view the status screen, by clicking S[...]

  • Page 150

    Chapter 5 Status Screen NSA320 User’s Guide 150 Figure 72 S tatus The following table describes t he labels in this screen. T able 18 Status LABEL DESCRIPTION Status Click this to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the Edit icon to go to th[...]

  • Page 151

    Chapter 5 Status Screen NSA320 User’s Guide 151 Media Server Status This shows whether the media server function is enabled or disabled. It must be enabled for media clients to play content files stored on the NSA. Click the Edit icon to go to the screen where you can configure this. FTP Server Status This shows whethe r the FTP server function i[...]

  • Page 152

    Chapter 5 Status Screen NSA320 User’s Guide 152 External V olume This displays the volumes created on USB hard drives connected to the NSA. USB disks are numbered in th e order that you insert USB devices. Click the Edit icon to open the Storage screen. Y ou can create and edit the external volume. See Chapter 7 on page 159 for more details. Stat[...]

  • Page 153

    NSA320 User’s Guide 153 C HAPTER 6 System Setting 6.1 Overview This chapter gives an overview of the v arious features includ ed in the system setting screens. Y ou can identify your NS A on the network and set the time that the NSA follows for its scheduled tasks/logs. 6.2 What Y ou Can Do •U s e t h e Server Name screen ( Section 6.4 on page [...]

  • Page 154

    Chapter 6 System Setting NSA320 User’s Guide 154 • power surges occur . The NSA gives no w arning if time lag o ccurs. Y ou should resynchronize the time after a power surge or after you have shut down the NSA sever al times. 6.4 The Server Name Screen Click System Setting > Server Name to open the following screen. Use this screen to config[...]

  • Page 155

    Chapter 6 System Setting NSA320 User’s Guide 155 6.5 The Date/T ime Screen Use this screen to select a time zone an d a time server from which y our NSA can get the time and date. This time is then used in NS A logs and alerts. Click the System Setting link in the navigation panel and t hen click the Date/ Time link to access the Date/ Time scree[...]

  • Page 156

    Chapter 6 System Setting NSA320 User’s Guide 156 Manual Select this radio button to en ter the time and date manually . When you enter the time settings manually , the NSA uses the new setting once you click Apply . Note: If you enter time settings manua lly , they revert to their defaults whe n power is lost. New Date (yyyy - mm-dd) This field d[...]

  • Page 157

    Chapter 6 System Setting NSA320 User’s Guide 157 Start Date Con figure the day and time when Da ylight Saving Time starts if you selected Enable Daylight Saving . The hour fiel d uses the 24 hour format. Here are a couple of examples: Daylight Saving Time starts in most parts of the United States on the second Sunday of March. Each time zone in t[...]

  • Page 158

    Chapter 6 System Setting NSA320 User’s Guide 158[...]

  • Page 159

    NSA320 User’s Guide 159 C HAPTER 7 Storage 7.1 Overview Several NSA featu r es require a valid in te rnal volum e . Th is chap te r covers the management of volumes and disks (both internal and external). Use the Storage screen ( Section 7.2 on pag e 160 ) to display information on all volumes, create internal and external volumes, and configure [...]

  • Page 160

    Chapter 7 Storage NSA320 User’s Guide 160 7.2 The S torage Screen The Storage screen allows you to create and edit volumes in the NSA. 7.2.1 Disk Replacement Restrictions See the Quick Start Guide for information on replacing di sks in the NSA. When replacing a disk in a degraded or down RAID volume, the new disk must be at least the same s ize o[...]

  • Page 161

    Chapter 7 Storage NSA320 User’s Guide 161 7.2.2 S torage Screen Click Storage > Volume in the na vigation panel to displa y the following screen. Use this screen to disp lay internal and external v olumes on the NSA. Note: It is recommended to scan the vo lume every three months or 32 reboot s. Figure 75 S torage > V olume The following tab[...]

  • Page 162

    Chapter 7 Storage NSA320 User’s Guide 162 Y ou see a warning screen before you delete a v olume. Figure 76 Delete a V olume W arning Screen Capacity This field shows total disk size, the percentage of the volume being used and the percentage that is available. Actions This field displays icons allowing you to edit, scan, repair , expand, migrate,[...]

  • Page 163

    Chapter 7 Storage NSA320 User’s Guide 163 7.3 Creating an Internal V olume Click the Create an Internal Volume button in the Storage screen as shown in Figure 75 on page 161 to open the following screen. Use this screen to create a new NSA internal di sk drive volume. Note: Creating a volume format s the hard drive . All data on the disk will be [...]

  • Page 164

    Chapter 7 Storage NSA320 User’s Guide 164 The following table describes t he labels in this screen. Note: Once you create the first volume on th e NSA, it is recommended to restart the NSA for better performance. 7.3.1 V olume S t atus Y ou (the administrator) can see the status of a volume i n the Statu s or Storage screens. The NSA has the foll[...]

  • Page 165

    Chapter 7 Storage NSA320 User’s Guide 165 • Recovering appears when repairing a RAID 1 volume. (A RAID1 volume was once degraded, but you hav e installed a new disk and t he NSA is restoring the RAID1 volume to a healthy state.) • Degraded when a volume is currently down, but can be fixed. Dat a access may be slower from a degr aded volume, s[...]

  • Page 166

    Chapter 7 Storage NSA320 User’s Guide 166 The following table describes t he labels in this screen. 7.5 Creating an External V olume Click the Create a New External Volume button in the Storage screen as shown in Figure 75 on pa ge 161 to open the following screen. Use this screen to create a new NSA external disk dri ve volume. Note: Creating a [...]

  • Page 167

    Chapter 7 Storage NSA320 User’s Guide 167 The following table describes t he labels in this screen. 7.5.1 External Disks Y ou may connect USB storage d evices that support the following fi le systems to the NSA. • Windows File Systems: F A T32 and F A T16. • Linux File Systems: ReiserFS, EXT2, EXT3, and XFS. T able 24 S torage > Create an [...]

  • Page 168

    Chapter 7 Storage NSA320 User’s Guide 168 7.6 S torage T echnical Reference This section provi des some background information about the topics co vered in this chapter . 7.6.1 V olumes and RAID A volume is a stor age area on a disk or disks. Y ou can create volumes on the internal disks and external disks attached to the USB port(s) . Y ou can s[...]

  • Page 169

    Chapter 7 Storage NSA320 User’s Guide 169 7.6.2 Choosing a S torage Method for a V olume The followi ng is a guide to hel p you choose a storage method for the v arious number of disks suppor ted on the NSA. See Section 7.6.3 on page 169 for theoretical background on JBOD and the RAID leve ls used on the NSA. T ypical applications for each meth o[...]

  • Page 170

    Chapter 7 Storage NSA320 User’s Guide 170 • Mirroring In a RAID system using mirroring, all d ata in the system is written simultaneously to two hard disks instead of one. This provides 100% data redundancy as if one disk fails the ot her has the duplicated data. Mirroring setups always require an ev en number of drives. •D u p l e x i n g Li[...]

  • Page 171

    Chapter 7 Storage NSA320 User’s Guide 171 shows disks in a single JBOD v olume. Data is not written across disks but written sequentially to each disk until it’s full. RAID 0 RAID 0 spreads data evenly across two or more disks (data striping) with no mirroring nor parity for data r edundancy , so if one disk fails the entire volume will be lost[...]

  • Page 172

    Chapter 7 Storage NSA320 User’s Guide 172 figure shows two disks in a single RAID 1 vol ume with mirrored data. Data is duplicated across two disks, so if one disk fails, there is sti ll a copy of the data. As RAID 1 uses mirroring and duplexing, a RAID 1 v olume needs an ev en number of disks (two or four for the N SA). RAID 1 capacity is limite[...]

  • Page 173

    NSA320 User’s Guide 173 C HAPTER 8 Network 8.1 Overview This chapter discusses the network configur ation screens. The Network screens allow y ou to configure T CP/IP an d PPPo E settings for the NSA. 8.2 What Y ou Can Do •U s e t h e TCP/IP screen ( Section 8.4 on page 175 ) to assign the NS A a dynamic or static IP address and DNS information[...]

  • Page 174

    Chapter 8 Net wo rk NSA320 User’s Guide 174 PPPoE P oint -to-P oint Protocol over Ethernet (PPP oE) allows the NS A to establish a direct Internet connection if you do not hav e a router . PPPoE is a dial-up connec tion. Y ou need a username an d password from your Internet Service Provider (ISP) to set up the connection. Jumbo Frames Jumbo frame[...]

  • Page 175

    Chapter 8 N etwork NSA320 User’s Guide 175 In the following example, the NSA has jumbo fr ames enabled and set to 8KB frames. This means the computer , notebook computer , and switch must also hav e jumbo fr ames enabled and be capable of supporting 8KB frames. Figure 80 Jumbo Frames 8.4 The TCP/IP Screen Use the TCP/IP screen to have the NSA use[...]

  • Page 176

    Chapter 8 Net wo rk NSA320 User’s Guide 176 Note: If you change the NSA’ s IP address, you need to log in again after you apply changes. Figure 81 Network > TCP/IP The following table describes t he labels in this screen. T able 29 Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NS A get IP address inf[...]

  • Page 177

    Chapter 8 N etwork NSA320 User’s Guide 177 Default Gateway T ype a default gateway address in this field. DNS DNS (Domain Name S ystem) is for mapping a domain name to its corresponding IP address and vice versa. If you ha ve the IP address(es) of the DNS server(s), enter them. Dynamic Select the option to have the NS A get a DNS server address a[...]

  • Page 178

    Chapter 8 Net wo rk NSA320 User’s Guide 178 8.5 UPnP Port Mapping Screen Use UPnP (Universal Plug and Play) port mapping to allow access from the W AN to services you select on the NSA. It is rec ommended that you place the NSA behind an Internet ga teway f ir e wall dev i c e to p rot ec t th e NSA from attacks from th e Internet (see RAID and D[...]

  • Page 179

    Chapter 8 N etwork NSA320 User’s Guide 179 8.5.1 UPnP and the NSA’ s IP Address It is recommended that the NSA use a st atic IP address (or a static DHCP IP address) if you will allow access to the NSA from the Internet. The UPnP-created NA T mappings keep the IP address the NS A had when you applied your settings in the UP nP Port Mapping scre[...]

  • Page 180

    Chapter 8 Net wo rk NSA320 User’s Guide 180 CIFS (Windows File Sharing) Common Internet File S ystem (CIFS) is a standard protocol supported by most operating systems in order to share file s across the network. Using UPnP p ort mapping for CIFS allows users to connect f rom the Internet and use p rograms li ke Windows Explorer to access th e NS [...]

  • Page 181

    Chapter 8 N etwork NSA320 User’s Guide 181 access services on the NSA. Y ou can set wh ich port Internet users ne ed to use to access a specific servi ce on the NSA. Note: Some Internet gateways will de lete all UPnP mappings after reboo t. So if the Internet gateway reboot s, you may need to use this screen again to re-apply the UPnP port mappin[...]

  • Page 182

    Chapter 8 Net wo rk NSA320 User’s Guide 182 8.6 The PPPoE Screen Use this screen to configure PPPoE sett ings for a direct Internet connection. Enable WAN Access Select this check box to ha ve UPnP configure your Internet gateway to allow access from the Internet to the NSA’ s service. If you clear this check box, people will not be able to acc[...]

  • Page 183

    Chapter 8 N etwork NSA320 User’s Guide 183 Click Network > PPPoE in the na vigation panel to open the following screen. Figure 86 Network > PPPoE The following table describes t he labels in this screen. T able 31 Network > PPPoE LABEL DESCRIPTION Status Status This field displays the status of PPP oE connection. IP Address This field di[...]

  • Page 184

    Chapter 8 Net wo rk NSA320 User’s Guide 184[...]

  • Page 185

    NSA320 User’s Guide 185 C HAPTER 9 Applications 9.1 Overview This chapter discuss es the features i n the Application screens. The NSA contains various applications for file sharing and downloading. 9.2 What Y ou Can Do •U s e t h e FTP Server screen ( Section 9.4 on page 188 ) to configure settings for FTP file transfers to/from the NS A. •U[...]

  • Page 186

    Chapter 9 Applications NSA320 User’s Guide 186 9.3 What Y ou Need to Know FTP File T ransfer Protocol (FTP) is a file tran sfer service that oper ates on the Internet. A system running the FTP server accept s commands from a system running an FTP client. FTP is not a secure prot ocol. Y our file trans fers could be subject to snooping. FTPES (Fil[...]

  • Page 187

    Chapter 9 Applica tions NSA320 User’s Guide 187 iT unes Server The NSA iT unes server feature lets you us e Apple’ s iT unes software on a computer to play music and video files stored on the NSA. Y ou can download iT unes from www .apple.com. Download Service The NSA’ s download servi ce downloads files from the Internet directly to the NSA.[...]

  • Page 188

    Chapter 9 Applications NSA320 User’s Guide 188 RSS RSS (R eally Simple S yndication) is a format for deliv ering frequently updated digital content. A channel uses a feed to deliver its cont ents (items). Subscribe the NSA to a feed to be able to download the contents. 9.4 FTP Server Us e FT P or FTP E S ( FTP o v e r E x p l ic it T T L/SSL) to [...]

  • Page 189

    Chapter 9 Applica tions NSA320 User’s Guide 189 Connection Limit Enter the m a ximum num ber of co nc urrent F TP co nnection s allowed on the NSA in this field. The connection limit is 20. Idle Timeout Enter the length of time that an FTP connection can be idle before timing out. The timeout limit is 300 minutes. P ort Number This is the port nu[...]

  • Page 190

    Chapter 9 Applications NSA320 User’s Guide 190 9.5 The Media Server Screen The Media Server screen allows you to share f iles with media clients. Click Applications > Media Server to open the following screen. Use this screen to select shares to publish (share wi th media clients like the DMA-2500 and iT unes) and turn the iT un es server on o[...]

  • Page 191

    Chapter 9 Applica tions NSA320 User’s Guide 191 9.6 The Download Service Screen The Download Service screen allows you to download files from the Int ernet. Click Applications > Download Service to open the follow ing screen. Use this screen to manage the NSA’ s file downloads. Note: By default, the NSA saves downloa ds in the admin share’[...]

  • Page 192

    Chapter 9 Applications NSA320 User’s Guide 192 The following table describes t he labels in this screen. T able 34 Applications > Download Service LABEL DESCRIPTION Enable Download Service Use this option (and click the Apply button) to turn the down load service off or on. If you tur n off the service, all downloads are paused. Files currentl[...]

  • Page 193

    Chapter 9 Applica tions NSA320 User’s Guide 193 Active Click this to see the list of files the NSA is currently downloading or sharing with other BitT orrent users. The NS A handles a maximum of 10 active tasks at a time (or fewer depen ding on how much of the NSA’ s system memory is av ailable). If you add more, they appear in the Inactive tab[...]

  • Page 194

    Chapter 9 Applications NSA320 User’s Guide 194 Seeds Seeds apply to BitT orrent downloads. This is the number of computers that are sharing the complete file that y ou are downloading. This value is in the format “Leeches(Seeds)” where Leeches refer to peers that do not have a complete copy of the file y et and are still downloading; Seeds re[...]

  • Page 195

    Chapter 9 Applica tions NSA320 User’s Guide 195 9.6.1 Adding a Download T ask Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 4.9 on page 94 provides a tutorial on adding a download task. Figure 91 Applications > Download Service > Add The fol[...]

  • Page 196

    Chapter 9 Applications NSA320 User’s Guide 196 Location of Downloaded Files This shows where the NS A stores new downloads ( Put incomplete downloads in ) and where the NSA mo ves complete d do wnlo ad s ( Move completed downloads to ). The Share column shows the name of the share where the file is downloaded. The Path column points to the locati[...]

  • Page 197

    Chapter 9 Applica tions NSA320 User’s Guide 197 9.6.2 Configuring General Settings Click Applications > Download Service > Preference s to open the followi ng screen. Use this s creen to set the default location for savi ng downloads and configure the download period. Figure 92 Applications > Download Service > Preferences > Genera[...]

  • Page 198

    Chapter 9 Applications NSA320 User’s Guide 198 The following table describes t he labels in this screen. T able 36 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads ( Put incomplete downloads in ) and where the NSA moves completed [...]

  • Page 199

    Chapter 9 Applica tions NSA320 User’s Guide 199 • Current L ocation - This is the location of the selected folder . • Folder Name - Enter a new folder name and click to create it. • Type - This identifies the item as a file or folder . • Name - This is the name of the folder/file. Select a folder . If y ou don’ t select a folder , a for[...]

  • Page 200

    Chapter 9 Applications NSA320 User’s Guide 200 9.6.3 Configuring the BitT orrent Settings Click Applications > Download Service > Preferences > BitTorr ent to open the following screen. Use this screen to configure BitT orrent settings. Figure 93 Applications > Download Service > Prefe rences > BitT orrent The following table de[...]

  • Page 201

    Chapter 9 Applica tions NSA320 User’s Guide 201 9.6.4 Edit IP Filter Use this screen to enable or disable IP filtering for BitT orrent downloa ds. IP filtering blocks IP addresses known t o share fake files. Y o u can either get an IP filter table from a website or use your own table. Maximum Number of Active Connections Specify how many activ e [...]

  • Page 202

    Chapter 9 Applications NSA320 User’s Guide 202 Click Edit IP Filter in the Applications > Download Service > Preferences > BitTorrent screen. Figure 94 Applicatio ns > Download Service > Preferences > BitT orrent > Edit IP Filter The following table describes t he labels in this screen. T able 38 Applications > Download Se[...]

  • Page 203

    Chapter 9 Applica tions NSA320 User’s Guide 203 9.6.5 Displaying the T ask Information Select an item on the list and click Task Inf o . Use this screen to check det ailed information about the task. Figure 95 Applications > Download Service > T ask Info The following table describes t he labels in this screen. T able 39 Applications > D[...]

  • Page 204

    Chapter 9 Applications NSA320 User’s Guide 204 9.7 The W eb Publishing Screen Use this screen to turn web pu blishing on or off and select shares t o publish. Cl ick Applications > Web Publishing to open the following screen. Figure 96 Applicatio ns > Web Publishing Time Left This is the time remaining to complete the task. Priority Use thi[...]

  • Page 205

    Chapter 9 Applica tions NSA320 User’s Guide 205 The following table describes t he labels in this screen. Note: If you installed php-MySQL-phpMyAdmin through the Package Mana gement screen ( Section 10.4 on page 232 ) and enable it, you can use PHP and MySQL in your published web page. T able 40 Applications > W eb Publishing LABEL DESCRIPTION[...]

  • Page 206

    Chapter 9 Applications NSA320 User’s Guide 206 9.8 The Broadcatching Screen This screen displays t he NSA’ s subscribed channels and t he associated contents. • The NSA sa ves a channel’ s downl oaded items in a folder named after t he channel. • The NSA creates the channel folders in the same destinati on as the download service. See Sec[...]

  • Page 207

    Chapter 9 Applica tions NSA320 User’s Guide 207 The following table describes t he labels in this screen. T able 41 Applications > Broadcatchin g LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’ s feed and click this button. A screen opens for you to subscribe to the feed. W hen you are done[...]

  • Page 208

    Chapter 9 Applications NSA320 User’s Guide 208 9.8.1 Adding a Broadcatching Channel At the time of writing, the NSA supports RSS 2.0 feeds. W ebsites with a feed usually displa y a feed icon (shown next ). Copy and past e the feed’ s URL into t he Applications > Broadc atching > Add Channel screen and you can download new files as they ar[...]

  • Page 209

    Chapter 9 Applica tions NSA320 User’s Guide 209 Click Applications > Broadcatching > Add Channel to open the following screen. Use the Add Chann el screen to subscribe the NSA to a channel’ s feed so you can view the channel. Y ou also sele ct p olicies for downloading and deleting the channel’ s items. Section 4. 10 on page 110 provide[...]

  • Page 210

    Chapter 9 Applications NSA320 User’s Guide 210 Delete Policy Set how the NSA handles de leting the items downloaded from the channel. Manual : Only delete individual files you select later in the Broadcatching screen. Keep last N of items : Select this to set the NSA to only keep a number of the channel’ s most recent files. When this number ha[...]

  • Page 211

    Chapter 9 Applica tions NSA320 User’s Guide 21 1 Edit Click this to open the following screen where y ou can set the default folder location where you “ Put incomplete downloads in ” and “ Move complete downloads to ”:. • Share - Select the share from the list. • Path - T ype the folder location in the share dire ctly or click Browse [...]

  • Page 212

    Chapter 9 Applications NSA320 User’s Guide 212 9.8.2 Editing a Broadcatching Channel Click Applications > Broadcatching , then select a channel and click Edit Channel to open a si milar Edit screen. Use th e Edit Channel screen to change the download or de lete polici es . Figure 100 Applications > Broadcatching > Edit Channel The follow[...]

  • Page 213

    Chapter 9 Applica tions NSA320 User’s Guide 213 Location of Downloaded Files This shows where the NSA stores new downloads ( Put incomplete downloads in ) and where the NSA moves completed downloads ( Move completed downloads to ). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in[...]

  • Page 214

    Chapter 9 Applications NSA320 User’s Guide 214 9.9 The Print Server Screen Use the Print S erver screen to view and manage th e NSA’ s list of p rinters and print jobs. Click Applications > Print Server to open the following screen. Figure 101 Applications > Print Server The following table describes t he labels in this screen. Apply Clic[...]

  • Page 215

    Chapter 9 Applica tions NSA320 User’s Guide 215 9.9.1 Print Server Rename Click Applications > Print Server and a printer’ s Rename icon to open the following screen. Use this screen to change the name the NS A uses for the printer . Figure 102 Applications > Print Server > Rename The following table describes t he labels in this scree[...]

  • Page 216

    Chapter 9 Applications NSA320 User’s Guide 216 9.10 The Copy/Sync Button Screen The Copy/S ync button on the front panel allows you to copy or synchronize files between a connected US B device and the NS A. Click Applications > Copy/Sync Button to open the following screen. Figure 103 Applications > Copy/Sync Button The following table desc[...]

  • Page 217

    Chapter 9 Applica tions NSA320 User’s Guide 217 9.1 1 T echnical Reference This section provi des technical background information on the topics discussed in this chapter . 9.1 1.1 Sharing Media Files on Y our Network The media server feature lets anyone on y our network play video , music, and photos from the NSA (without ha ving to copy them to[...]

  • Page 218

    Chapter 9 Applications NSA320 User’s Guide 218 electronics companies that works to mak e products compatible in a home network. • Publish shares to let others play the contained media files. • The media server i s a convenient w ay to share fi les you download using t he broadcatching service (see Section 9.8 on page 206 ). • Hardware-based[...]

  • Page 219

    Chapter 9 Applica tions NSA320 User’s Guide 219 9.1 1.2 Download Service The NSA’ s download servi ce downloads files from the Internet directly to the NSA. Y ou do not ha ve to download to your comp u t e r a n d t h e n c o p y t o t h e N S A . T h i s c a n free up your computer’s system resources. The download service also handles your b[...]

  • Page 220

    Chapter 9 Applications NSA320 User’s Guide 220 The following screen displays how the pl ugin works. Figure 105 Link Capture Bro wser Plugin Instead of copying and pasting a file’ s UR L to the NS A’ s download service, you can right-cl ick on the URL in the web browser and select Send to NSA . The URL is then added to the NS A’ s download s[...]

  • Page 221

    Chapter 9 Applica tions NSA320 User’s Guide 221 Note: The download service notification only keep s track of files downloaded via BitT orrent. Figure 106 Download Service Notification 9.1 1.5 BitT orrent Security When you download using BitT orrent, you re veal your IP address. This increases the risk of hacking attacks, which c an be protected a[...]

  • Page 222

    Chapter 9 Applications NSA320 User’s Guide 222 Ideally your firew all should hav e the following: • Stateful p a cke t inspecti on to contro l access between the Internet and your network and protect y our NSA (and comput ers) from hacking attacks. • IDP (Intrusion Detectio n and Prev ention ) to detect malicious packets wi thin normal networ[...]

  • Page 223

    Chapter 9 Applica tions NSA320 User’s Guide 223 set this up (see the firewall’ s manual for details). Y ou may also have to configure a corresponding firewall rule. Figure 109 Firewall Configured to Allo w Incoming BitT orrent Request s 9.1 1.6 Web Publishing Example This example covers how to configure the We b Publishing screen to let peopl e[...]

  • Page 224

    Chapter 9 Applications NSA320 User’s Guide 224 1 Click Applications > Web Publishing and configure the screen as shown (enable the web publishing and mov e FamilyPhotos over to Published Shares ) and click Apply. Figure 1 10 Applications > Web Pu blishing (Example) 2 Now open your we b browser and type in the address of the NSA’s F amilyP[...]

  • Page 225

    Chapter 9 Applica tions NSA320 User’s Guide 225 • Click a fi le’s link to open the file. • Right -click a file’ s link and select Save Target As.. (in Internet Explorer) to save a copy of the file. • Click a label in the heading row to sort the files by that criteria. • T o customize how the page looks and work s, cre ate an in dex .h[...]

  • Page 226

    Chapter 9 Applications NSA320 User’s Guide 226 your Internet gatew ay specifically for al lowing access to the web-published shares and another sepa rate set of rules fo r acc e ssing the NSA’s web configurator . 9.1 1.8 Channel Guides for Broadcatching Here are some popular broadcat ching channel guide web sites. Note: ZyXEL does not endorse t[...]

  • Page 227

    Chapter 9 Applica tions NSA320 User’s Guide 227 9.1 1.9 Printer Sharing The NSA can act as a print server . A print server lets multiple computers share a printer . Connect a printer to the NSA’ s USB port to let mult iple computers on your network use it. See www .zyxel .com for a list of compatible printers. Figure 1 13 Printer Sharing[...]

  • Page 228

    Chapter 9 Applications NSA320 User’s Guide 228 9.1 1.10 Copying Files Y ou can copy files from a USB device to the NS A or from the NS A to a USB devic e. Simply press and release the COPY/SYNC button to start cop ying files. See Section 9.10 on page 216 for details about configuring the copy settings. The following figure illustr ates how copyin[...]

  • Page 229

    Chapter 9 Applica tions NSA320 User’s Guide 229 9.1 1.1 1 Synchronizing Files Synchronization makes th e c o nt en ts on th e target dev ice i de nt ica l to t he on es on the source device. Y ou can synchronize files from a USB device to the NSA or from the NSA to a USB devic e. In addition, you may also synchronize files in both directions simu[...]

  • Page 230

    Chapter 9 Applications NSA320 User’s Guide 230 USB <-> NSA When you synchronize files in both direct ions simultaneously , both stor age devices transfer unique files to one another . Files with the same file name are synchronized ac cording to their modifi cation date/time. The difference in modification time between the t wo files has to [...]

  • Page 231

    NSA320 User’s Guide 231 C HAPTER 10 Package Management 10.1 Overview P ackage M anagement can be used to set up more useful applications in your NSA. The NSA can download multiple packages /files at once and automatical l y goes through all th e in stallati on s te ps. 10.2 What Y ou Can Do •U s e t h e Package Manage ment screen ( Secti on 10.[...]

  • Page 232

    Chapter 10 Package M anagement NSA320 User’s Guide 232 • Gallery - This web-based application allows y our NS A to host pictures. Y o u can upload images in your local computer or shares to this application. Use the administr ator account of your NSA to log in to the Gallery console. The administr ator can then create accounts for other users. [...]

  • Page 233

    Chapter 10 Package Management NSA320 User’s Guide 233 Click Applications > Package Management to open the following screen. Figure 1 17 Applications > Package Managemen t The following table describes t he labels in this screen. T able 47 Applications > Package Ma nagement LABEL DESCRIPTION Pa c k a ge M a na g em en t Ret r i e v e L i [...]

  • Page 234

    Chapter 10 Package M anagement NSA320 User’s Guide 234 Note: Once you inst all an application and enable it, additiona l links show up in the navigation pan el. This applies to eMule , DyDNS , NF S , SMART and BackupPlanner . For Gallery , PHP-MySQL-phpMyAdmin , SqueezeCenter and WordPress , you can acce ss the applications’ web configu rators [...]

  • Page 235

    Chapter 10 Package Management NSA320 User’s Guide 235 10.4.1 Displaying the Package Information Select an item on the list and click Pac kage Info . Use this screen to check detailed information about the task. Figure 1 18 Applications > Package Managemen t > Package Info The following table describes t he labels in this screen. T able 48 A[...]

  • Page 236

    Chapter 10 Package M anagement NSA320 User’s Guide 236 10.5 eMule Screens Use these screens to manage the eMule appl ication in your NSA . eM ule is a pee r- to-peer (P2P) file-sharing console that lets you download files from the Internet. It works with eDonkey and K ad networks. 10.5.1 eMule Server Screen Use this screen to conf igure the eMule[...]

  • Page 237

    Chapter 10 Package Management NSA320 User’s Guide 237 Y ou see a warning screen before you delete a serv er . Figure 120 Delete a Server 10.5.2 Add Server Use this screen to add a server for the eMule application. My Info Select a server from the list and click this to view the details and connection status of the server . Ref e r t o Section 10 [...]

  • Page 238

    Chapter 10 Package M anagement NSA320 User’s Guide 238 Click Add in the Applications > eMule > Server screen to add a server . Figure 121 Applications > eMule > Server: Add The following table describes t he labels in this screen. 10.5.3 Edit Server Use this screen to edit a server for the eMule application. Click Edit in the Applicat[...]

  • Page 239

    Chapter 10 Package Management NSA320 User’s Guide 239 The following table describes t he labels in this screen. 10.5.4 My Info Use this screen to view the server deta ils, including the status, IP address and download/upload speeds. Click MyInfo in the Applications > eMule > Server screen to view the server details. Figure 123 Applications [...]

  • Page 240

    Chapter 10 Package M anagement NSA320 User’s Guide 240 10.5.5 eMule T ask Screen Use this screen to view tasks, includin g completed, downloading, uploading and shared tasks, that are be ing handled by the NS A. Click Applications > eMule > Task screen to view the task details. Figure 124 Applications > eMule > T ask The following tab[...]

  • Page 241

    Chapter 10 Package Management NSA320 User’s Guide 241 Add Click this to add a download task (ED2K link) to the list. Ref e r t o Section 10 .5.6 on page 242 for the Add Task screen. Preferences Click this to open a screen where you can set the default location for saving downloaded files. Y ou can al so configure your eMule download settings. Ref[...]

  • Page 242

    Chapter 10 Package M anagement NSA320 User’s Guide 242 Note: Download t asks initially appear in the Downloading t ab of the eMule T ask screen. Depending on it s status, it ca n eventually show up in the other t abs ( Newly Completed , Uploading or Shared Files t abs). Y ou see a warning screen before you delete a task. Figure 125 Delete a T ask[...]

  • Page 243

    Chapter 10 Package Management NSA320 User’s Guide 243 Click Add in the Applications > eMule > Task screen to add a task. Figure 126 Applications > eMule > T ask: Add The following table describes t he labels in this screen. T able 54 Applications > eMule > T ask: Add LABEL DESCRIPTION Source ED2K Link Paste the ED2K link of the [...]

  • Page 244

    Chapter 10 Package M anagement NSA320 User’s Guide 244 10.5.7 Preferences Use this screen to configure your eMule sett ings, such as port numbers t o use, i ts download/upload r ates and the maximum num ber of peers allowed t o con ne ct to the NSA. Edit Click this to open the following screen where y ou can set the default folder location where [...]

  • Page 245

    Chapter 10 Package Management NSA320 User’s Guide 245 Click Applications > eMule > Task > Preferences to open the following screen. Figure 127 Applications > eMule > T ask > Preferences The following table describes t he labels in this screen. T able 55 Applications > eMule > T ask > Preferences LABEL DESCRIPTION Userna[...]

  • Page 246

    Chapter 10 Package M anagement NSA320 User’s Guide 246 Edit Click this to open the following screen where y ou can set the default folder location where you “ Put incomplete downloads in ” and “ Move complete downloads to ”:. • Share - Select the destination share from the drop-down list. • Path - This field displays the share folder?[...]

  • Page 247

    Chapter 10 Package Management NSA320 User’s Guide 247 10.5.8 Edit IP Filter Use this screen to enable IP f iltering which prevents yo ur NSA from accessing certain networks and IP addr esses that may be hosting malicious programs. Figure 128 Applications > eMule > T ask > Preferences: Edit IP Filter The following table describes t he lab[...]

  • Page 248

    Chapter 10 Package M anagement NSA320 User’s Guide 248 10.5.9 Share Browsing Use this scre en to view a lis t of files that a r e st i ll be ing down loa ded by the NSA . The files are located i n the eMuleT emp folder in the Admin share by default. Click Applications > eMule > Task > Browse Incomplete Downloads to open the following sc[...]

  • Page 249

    Chapter 10 Package Management NSA320 User’s Guide 249 10.5.10 T ask Info Use this screen to view eMule task details, such as stat us, file name, file size and its downloa d prog re ss. R ename Select a folder or file and click th is to open a screen. Enter the name you want and click OK to make the changes. Note: When you change a f ile name, mak[...]

  • Page 250

    Chapter 10 Package M anagement NSA320 User’s Guide 250 Click Task Info in Applications > eMule > Task screen to open the following. Figure 130 Applications > eMule > T ask: T ask Info The following table describes t he labels in this screen. T able 58 Applications > eMule > T ask: T ask Info LABEL DESCRIPTION Status This shows t[...]

  • Page 251

    Chapter 10 Package Management NSA320 User’s Guide 251 10.5.1 1 eMule Search Screen Use this screen to search for files av ailabl e in an eMule server using keywords and other paramet ers, such as file type, fi le size and extension names. Click Applications > eMule > Search to open the following screen. Figure 131 Applications > eMule &g[...]

  • Page 252

    Chapter 10 Package M anagement NSA320 User’s Guide 252 10.6 DyDNS Screen Use this to enable and configure D yDNS. Dynamic DNS allows you to update your current dynami c IP address with a dynamic DNS service so that anyone can contact you (such as through NetMee ting or CUSeeMe). Y ou can also access y our FTP server or W eb site on y our own comp[...]

  • Page 253

    Chapter 10 Package Management NSA320 User’s Guide 253 The following table describes t he labels in this screen. 10.7 NFS Screen Use this screen to enable and c onfigure Network File S ystem (NFS) setti ngs on your NSA . NFS is a client/serv er distri buted file serv ice that provides tr ansparent file sharing for network environments. This allows[...]

  • Page 254

    Chapter 10 Package M anagement NSA320 User’s Guide 254 Click Networ k > NFS to open the following screen. Figure 133 Netwo rk > NFS The following table describes t he labels in this screen. T able 61 Network > NFS LABEL DESCRIPTION NFS Service Enable NFS Server Click this to employ NFS in your NSA. Disable NFS Server Click this to stop u[...]

  • Page 255

    Chapter 10 Package Management NSA320 User’s Guide 255 Y ou see a warning screen before you delete a v olume. Figure 134 Delete an NFS Share 10.7.1 Add/Edit NFS Share Use this screen to add or edit an NFS share. Note: Some attributes o f the NFS share cannot be edited. Click Add or Edit in the Network > NFS screen to open the following: Figure [...]

  • Page 256

    Chapter 10 Package M anagement NSA320 User’s Guide 256 10.7.2 NFS Session Use this screen to view a list of active NFS sessions. Y ou can see which us ers are connected the NFS shares. Click NFS Session in the Network > NFS screen to open the following. Figure 136 Network > NFS: NFS Session The following table describes t he labels in this [...]

  • Page 257

    Chapter 10 Package Management NSA320 User’s Guide 257 10.8 SMART Screen Use this screen to view i ndicators of your NS A’ s hard disk(s) health. Self Monitoring, Analys is , and Reporting T echnology (S.M.A. R .T ) detects and reports the reliability of hard disks using standard indicators (called “attributes”), to help you anticipate possi[...]

  • Page 258

    Chapter 10 Package M anagement NSA320 User’s Guide 258 10.8.1 SMART Brief Summary Use this screen to display information about the volume, such as the hard disk vendor , specific model, hard disk capacity and so on. Click Brief Summary in the Storage > S.M. A.R.T screen to d isplay the following. Figure 138 S torage > S.M.A.R.T : Brief Summ[...]

  • Page 259

    Chapter 10 Package Management NSA320 User’s Guide 259 10.8.2 SMART Full Summary Use this screen to display more details information about the volume. Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 139 S torage > S.M.A.R.T : Full Summary Health This describes the over all health of the v olume based on [...]

  • Page 260

    Chapter 10 Package M anagement NSA320 User’s Guide 260 The following table describes t he labels in this screen. T able 66 S torage > S.M.A.R.T : Full Summary LABEL DESCRIPTION ID This is the identification number used to tag a hard disk attribute. This is standard across all S.M.A.R.T -enabled storage devices. However it depends on the stor a[...]

  • Page 261

    Chapter 10 Package Management NSA320 User’s Guide 261 10.9 Protect Screens The Protect screens include: • Backup screens - These include steps to create and customize backup jobs. • Restore screens - These include steps to re store previous backups made with the NSA. 10.10 Backup Screens Use this screen to create and customiz e scheduled back[...]

  • Page 262

    Chapter 10 Package M anagement NSA320 User’s Guide 262 Click Prote ct > Backup to open the following screen. Figure 140 Protect > Backup The following table describes t he labels in this screen. T able 67 Protect > Backup LABEL DESCRIPTION Backup Add Job Click this to create and customize a backup job. Edit Job Select a backup job in the[...]

  • Page 263

    Chapter 10 Package Management NSA320 User’s Guide 263 10.10.1 Backup: S tep 1 Use this screen to specif y the job information and back up type. Click Add Jo b in the Protect > Backup screen to open the following: Figure 141 Protect > Backup: S tep 1 The following table describes t he labels in this screen. T able 68 Protect > Backup: S t[...]

  • Page 264

    Chapter 10 Package M anagement NSA320 User’s Guide 264 Backup T ype Choose the backup type that you want the NSA to implement for the backup job. Archive - This is a backup of the source folder in an archive format. Once you backup your files in the target folder , you cannot access the files individually unless you have the extracting tool used [...]

  • Page 265

    Chapter 10 Package Management NSA320 User’s Guide 265 10.10.2 Backup: S tep 2 Use this screen to specify where the file s you want to backup are located and set where you want the backup to be stored. Figure 142 Protect > Backup: S tep 2[...]

  • Page 266

    Chapter 10 Package M anagement NSA320 User’s Guide 266 The following table describes t he labels in this screen. T able 69 Protect > Backup: S tep 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files. Click to close a[...]

  • Page 267

    Chapter 10 Package Management NSA320 User’s Guide 267 R emote Select this to back up to another device. For A r c h i v e s: The remote device can be another NSA in the network. Fill in the following fields in order to be able to access it. • R emote NSA Address •U s e r n a m e • P assword •S h a r e N a m e Click Test Connection to see [...]

  • Page 268

    Chapter 10 Package M anagement NSA320 User’s Guide 268 10.10.3 Backup: S tep 3 Use this screen to specify compression, encryption and purge policies f or the backup job. T his step is only a vailable if you are doing an archive backup or a synchronization backup to a remote target. Figure 143 Protect > Backup: S tep 3 The following table descr[...]

  • Page 269

    Chapter 10 Package Management NSA320 User’s Guide 269 10.10.4 Backup: S tep 4 Click this to specify the schedule for the backup job. The backup job automatically runs according to the schedule that you set in this screen. Figure 144 Protect > Backup: S tep 4 The following table describes t he labels in this screen. Purge Policy The NSA maintai[...]

  • Page 270

    Chapter 10 Package M anagement NSA320 User’s Guide 270 10.10.5 Edit Job Screen Use this screen to ed it an existing backup job. Some attributes of the backup job cannot be changed, such as the name, backup t ype, source folder and so on. Every how many hours? This i s only available if you selected Hourly as your backup frequency . Select every h[...]

  • Page 271

    Chapter 10 Package Management NSA320 User’s Guide 271 10.10.6 Edit Job: St ep 1 Click Prote ct > Backup . Select a backup job from the list and click Edit Job to open the following. Figure 145 Protect > Backup > Edit: S tep 1 The following table describes t he labels in this screen. T able 72 Protect > Backup > Edit: S tep 1 LABEL [...]

  • Page 272

    Chapter 10 Package M anagement NSA320 User’s Guide 272 10.10.7 Edit Job: St ep 2 Use this screen to edit th e sched ule for the backup job. Figure 146 Protect > Backup > Edit: S tep 2 Compression This field is read-only and shows whether the backup employs compression. Compression reduces the size of the file that y ou want to back up. Back[...]

  • Page 273

    Chapter 10 Package Management NSA320 User’s Guide 273 The following table describes t he labels in this screen. 10.10.8 Restore Archive Screen Use this screen to restore prev ious backup s made with the NSA. T able 73 Protect > Backup > Edit: S tep 2 LABEL DESCRIPTION Scheduler Settings Backup Frequency Edit this by selecting from Hourly , [...]

  • Page 274

    Chapter 10 Package M anagement NSA320 User’s Guide 274 10.10.9 Restore Archive: S tep 1 Click Prote ct > Backup screen ( Section 10.10 on page 26 1 ). Y ou can restore a previous backup job by selecting a ba ckup job from the lis t and clicking Restore Archive. Figure 147 Protect > Backup > Restore Archive: S tep 1 The following table de[...]

  • Page 275

    Chapter 10 Package Management NSA320 User’s Guide 275 10.10.10 Restore Archive: S tep 2 Use this screen to select the folder wh e re the archive you want to restore is located. Figure 148 Protect > Backup > Restore Archive: S tep 2 The following table describes t he labels in this screen. T able 75 Protect > Backup > Resto re Archive:[...]

  • Page 276

    Chapter 10 Package M anagement NSA320 User’s Guide 276 10.10.1 1 Restore Archive: Step 3 Use this screen to select the location in the NS A where y ou wan t to restore y our backup. Figure 149 Protect > Backup > Restore Archive: S tep 3 The following table describes t he labels in this screen. T able 76 Protect > Backup > Resto re Arc[...]

  • Page 277

    Chapter 10 Package Management NSA320 User’s Guide 277 10.1 1 Restore Screen Use this screen to restore previous backup s made with the NSA, including arc hives and folders from internal, external or remote NSAs to the NSA. 10.1 1.1 Restore: S tep 1 Y ou can access this screen by clicking Prote ct > Restore . Figure 150 Protect > Restore: S [...]

  • Page 278

    Chapter 10 Package M anagement NSA320 User’s Guide 278 10.1 1.2 Restore: S tep 2 Select a previous archive backup that you want to restore to the NSA. Figure 151 Protect > Restore: S tep 2 Browse Click this to select where the previous backup that you want to restore is located. • Volume - Select a volume from the list. • Current Location [...]

  • Page 279

    Chapter 10 Package Management NSA320 User’s Guide 279 The following table describes t he labels in this screen. 10.1 1.3 Restore: S tep 3 Use this screen to select the folder wh e re the archive you want to restore is located. Figure 152 Protect > Restore: S tep 3 T able 78 Protect > Restore: S tep 2 LABEL DESCRIPTION Step 2. Select Res t o[...]

  • Page 280

    Chapter 10 Package M anagement NSA320 User’s Guide 280 The following table describes t he labels in this screen. 10.1 1.4 Restore: S tep 4 Use this screen to select the location in the NS A where y ou wan t to restore y our backup. Figure 153 Protect > Restore: S tep 4 T able 79 Protect > Restore: S tep 3 LABEL DESCRIPTION Step 3. Please se[...]

  • Page 281

    Chapter 10 Package Management NSA320 User’s Guide 281 The following table describes t he labels in this screen. 10.12 T echnical Reference This section provi des technical background information on the topics discussed in this chapter . 10.12.1 S.M.A.R.T Attributes The following table describes some c ommon S.M.A.R.T . attributes. If a higher or [...]

  • Page 282

    Chapter 10 Package M anagement NSA320 User’s Guide 282 S.M.A.R.T . attributes and their definiti ons v ary by manufactur er , refer to the hard drive manufacturer for details about the attributes your hard drive supports. T able 81 S.M.A.R.T . Attributes ID ATTRIBUTE NAME BETTE R DESCRIPTION 01 Read Error Rat e Low Shows the r ate of hardware rea[...]

  • Page 283

    Chapter 10 Package Management NSA320 User’s Guide 283 19 0 Airflow Te m p e r a t u r e Low This indicates the temperatu re of the airflow measured by a W estern Digital hard drive. 19 0 Te m p e r a t u r e Difference from 100 High This indicates the v alue of 100 - the temperature in degrees Celsius. Manufacturers can set a minimum threshold th[...]

  • Page 284

    Chapter 10 Package M anagement NSA320 User’s Guide 284 20 5 Thermal Asperity R ate (T AR) Low This is the number of thermal asperity errors. Thermal asperity is a read signal spik e caused by sensor temperature rise due to touching the disk surface or contaminant particles. 20 6 Flying Height This is the height of the hard drive’ s read/write h[...]

  • Page 285

    NSA320 User’s Guide 285 C HAPTER 11 Auto Upload 1 1.1 Overview This chapter discusses the feat ures in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or Y ouT ube sharing websites. Besides web publishing and media server , auto upload is another con venient w ay to share med ia files with [...]

  • Page 286

    Chapter 11 Au to Upload NSA320 User’s Guide 286 FTPES (File T ransfer Protoc ol over Expl icit TLS/SSL) File T ransfer Protocol over Explici t TLS/SSL (FTPES) is a file transfer service that uses TLS (T ransport Lay er Security) or Secure S ocket Layer ( SSL) for secure transfers across the Internet. 1 1.4 The Flickr/Y ouT ube Screen Use this scr[...]

  • Page 287

    Chapter 11 Auto Upload NSA320 User’s Guide 287 1 1.4.1 Configuring the Flickr Settings In the Applications > Auto Upl oad > Flickr/Y ouT ube screen, select Flickr from the list and then clic k the Config button. The following screen displays if you have not authorized the NSA to use a Flickr account. Click OK to continue the authorization p[...]

  • Page 288

    Chapter 11 Au to Upload NSA320 User’s Guide 288 The following page displays asking f or your authorization. Click OK, I’LL ALLOW IT to establish a link between the NSA and y our Flickr account. Figure 157 Flickr Authorization A confirmation page displays indicating suc cessful authorization. R eturn to the NSA web configurator . Click Get Ready[...]

  • Page 289

    Chapter 11 Auto Upload NSA320 User’s Guide 289 Once the NSA i s associated with y our Flickr accoun t, you can c onfigure auto upload settings in the following screen. Figure 159 Applications > Auto Upload > Fl ickr/Y ouT ube > Config (Flickr)[...]

  • Page 290

    Chapter 11 Au to Upload NSA320 User’s Guide 290 The following table describes t he labels in this screen. T able 83 Applications > Auto Up load > Flickr/YouTube > Config (Flickr) LABEL DESCRIPTION Flickr Account Configuration Username This field displays the Flickr account authorized for the auto upload feature. Photo Space Usage This sh[...]

  • Page 291

    Chapter 11 Auto Upload NSA320 User’s Guide 291 Add Click this to open the following screen where you can set a folder that contains files you w ant the NSA to automatically upload. • Share - Select the share from the list. • Path - T ype the folder location in the share directly or click Browse to open the following screen and navigate to the[...]

  • Page 292

    Chapter 11 Au to Upload NSA320 User’s Guide 292 1 1.4.2 Configuring the Y ouT ube Settings In the Applications > Auto Upload > Flickr/YouTube screen, se le ct Y ouT ube from the list and then click the Config button. Note: Y our Y ouT ube account must be associated with a Goo gle account. Get a Google account and use it to log into Y ouT ub[...]

  • Page 293

    Chapter 11 Auto Upload NSA320 User’s Guide 293 Once the NSA i s associated with y our Y ouT ube account, you can configure aut o upload settings in the following screen. Figure 161 Applications > Auto Upload > Flickr/Y ouT ube > Config (Y ouT ube)[...]

  • Page 294

    Chapter 11 Au to Upload NSA320 User’s Guide 294 The following table describes t he labels in this screen. T able 84 Applications > Auto Up load > Config (YouTube) LABEL DESCRIPTION Y outube Account Configuration Username This field displays the Y outube account authorized for the auto upload feature. Switch User Click this to use a differen[...]

  • Page 295

    Chapter 11 Auto Upload NSA320 User’s Guide 295 Add Click this to open the following screen where you can set a folder that contains files you w ant the NSA to automatically upload. • Share - Select the share from the list. • Path - T ype the folder location in the share directly or click Browse to open the following screen and navigate to the[...]

  • Page 296

    Chapter 11 Au to Upload NSA320 User’s Guide 296 1 1.5 The FTP Uploadr Screen The FTP Uploadr feature uploads files stored in the NSA to FTP servers. Besides web publishing and media server , auto uplo ad is another con v eni ent wa y to share media files with your friends and family . Y ou can link the NSA to the FTP server or the FTP server on a[...]

  • Page 297

    Chapter 11 Auto Upload NSA320 User’s Guide 297 The following table describes t he labels in this screen. T able 85 Applications > Auto Up load > FTP Uploadr LABEL DESCRIPTION Enable F TP Uploadr Use the check box to enable or disable the F TP Uploadr . Click Apply to save y our changes. When you disable the FTP Uploadr , a screen opens requ[...]

  • Page 298

    Chapter 11 Au to Upload NSA320 User’s Guide 298 1 1.5.1 Adding or Editing an FTP Server Entry Use this screen to add or edi t an FTP server entry for auto upload. In the FTP Uploadr screen, click the Add Serv er or Edit Server button to open the following screen. Figure 163 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server [...]

  • Page 299

    Chapter 11 Auto Upload NSA320 User’s Guide 299 1 1.5.2 The FTP Uploadr Preferences Screen Use this screen to conf igure the gener al settings for the FTP Uploadr . In the FTP Uploadr screen, click the Preferences icon to open the following screen. Figure 164 Applications > Auto Upload > FTP Uploadr > Preferences The following table descr[...]

  • Page 300

    Chapter 11 Au to Upload NSA320 User’s Guide 300 Add Click this to open the following screen where you can set a folder that contains files you w ant the NSA to automatically upload. • Share - Select the share from the list. • Path - T ype the folder location in the share directly or click Browse to open the following screen and navigate to th[...]

  • Page 301

    NSA320 User’s Guide 301 C HAPTER 12 Users 12.1 Overview This chapter introduces the User s screens of the NSA. Use the Users screens to create and manage administr ator and user accounts. Administr ators can: • Configure and manage the NSA. • Create vo lumes, shares, and user accounts. • Assign individual users specific access rights f or s[...]

  • Page 302

    Chapter 12 Us er s NSA320 User’s Guide 302 12.3 The Users Screen Click Sharing > Users to display the screen shown next. Use this screen to create and manage ac counts for users who can store f iles on the NSA. Figure 165 Sharing > Users The following table describes t he labels in this screen. T able 88 Sharing > Users LABEL DESCRIPTION[...]

  • Page 303

    Chapter 12 Users NSA320 User’s Guide 303 12.3.1 User Icons The following table describes t he user icons. Delete Selected Users Select an account and click this to open a screen where you can delete the user account. User Info Select an account and click this to open a screen displaying the amount of storage space u sed by the account. Y ou can a[...]

  • Page 304

    Chapter 12 Us er s NSA320 User’s Guide 304 12.3.2 Adding or Editing an Account Use this screen to creat e or edit a NSA user account wi th NSA access password. Click the Add User button in the Users screen to op en the follow ing screen. Cli ck the Edit User button in the screen shown previous ly to edit an existing account. Figure 166 Sharing &g[...]

  • Page 305

    Chapter 12 Users NSA320 User’s Guide 305 12.3.3 Usernames Enter a username from one to 32 char acters. The first char acter must be alphabetical (case insensitive, [A -Z a- z]); numeric characters are not allowed as the first char acter . The username can only contain the followi ng characters : • Alphanumeric A- z 0-9. Unicode username s are s[...]

  • Page 306

    Chapter 12 Us er s NSA320 User’s Guide 306 •a n o n y m o u s • nobody • root •p c - g u e s t •a d m i n •p a s s w o r d 12.4 Displaying User Info Use this screen to disp lay a user’s info rmation. In the Users screen, select an account and click Us er Info to open the following screen. Figure 167 Sharing > Users > User I nf[...]

  • Page 307

    NSA320 User’s Guide 307 C HAPTER 13 Groups 13.1 Overview This chapter introduces the Gr oups screens. Use the Groups screens to create and manage groups. Y ou can assign users to groups and grant individual groups access rights to specific shares. 13.2 What Y ou Can Do •U s e t h e m a i n Groups screen ( Section 13.3 on page 307 ) to display a[...]

  • Page 308

    Chapter 13 G ro u ps NSA320 User’s Guide 308 Click Sharing > Groups to display the screen shown next. Figure 168 Sharing > Groups The following table describes t he labels in this screen. T able 92 Sharing > Group s LABEL DESCRIPTION Add Group Click this to open a screen where you can configure a new group. Search Click this to display a[...]

  • Page 309

    Chapter 13 Groups NSA320 User’s Guide 309 13.3.1 Adding or Editing a Group Use this screen to create or edit a NSA group. Click the Add Group button in the Groups screen to open the following screen. Click the Edit Group button in the screen shown prev iously to edi t an existing group. Figure 169 Sharing > Groups > Add or Edit a Group The [...]

  • Page 310

    Chapter 13 G ro u ps NSA320 User’s Guide 310 13.3.2 Group Names Enter a group name from 1 to 32 char acters. The first char acter must be alphabetical (case insensitive, [A -Z a- z]); numeric characters are not allowed as the first char acter . The group name can only contain the following characters: • Alphanumeric A- z 0-9. Unicode username s[...]

  • Page 311

    NSA320 User’s Guide 31 1 C HAPTER 14 Shares 14.1 Overview A share is a set of access pe rmissions mapped to a specific fol der on a v olume. It is equivalent to the Windows concept of a shared folder . Y ou can map a share to a network drive for easy and familiar file transfer for Windows users. 14.2 What Y ou Can Do •U s e t h e Shares screen [...]

  • Page 312

    Chapter 14 Shares NSA320 User’s Guide 312 14.3 The Shares Screen Click Sharing > Shares in the navigation panel to open the following screen. This screen lists all shares created on the NS A. Figure 170 Sharing > Shares The following table describes t he labels in this screen. T able 94 Sharing > Shares LABEL DESCRIPTION Add Share Click [...]

  • Page 313

    Chapter 14 Shares NSA320 User’s Guide 313 Status This field displays the share icons. represents a Built-in share on a volume on the internal hard drives. represents a Predefined or User-Created share on a volume on the internal hard drives. represents an Auto or User-Created share on a v olume on the external (USB) devices. represents a disabled[...]

  • Page 314

    Chapter 14 Shares NSA320 User’s Guide 314 14.3.1 Adding or Editing Share Click Add Share to create a new share. In the Shares screen, select a share and click Edit Share to open the following screen. Use this screen to creat e or edit a share. Figure 171 Shares > Add Share (or Edit Share) The following table describes t he labels in this scree[...]

  • Page 315

    Chapter 14 Shares NSA320 User’s Guide 315 14.3.2 Configuring Advanced Share Access In the Sharing > Shares > Add S hare or Edit Share screen, select Advanced from the Share Access drop-down list. Click Edit to open the following screen. Use this screen to configure share access rights for individual users and groups. Figure 172 Sharing >[...]

  • Page 316

    Chapter 14 Shares NSA320 User’s Guide 316 The following table describes t he labels in this screen. 14.3.3 Public and ANONYMOUS Share Access Right s If you mak e a share public, users do not need to log in. With ANONYMOUS FTP , you must enter either 'a non ymous' or 'ftp' as the username. Any other name is cons idered a userna[...]

  • Page 317

    Chapter 14 Shares NSA320 User’s Guide 317 This feature may be useful i f you connect to the NSA occasi onally from a remote location. Note: Disable oplocks to improve the NSA’ s performance unless you need to use the Windows of fline file feature. If you do use the Windo ws offline file featu re with the NSA, use it with a share cont aining onl[...]

  • Page 318

    Chapter 14 Shares NSA320 User’s Guide 318 14.5 The Recycle Bin Configuration Screen Use this screen to peri odically clean up items in all recycle bins. 14.5.1 Recycle Bins Re cy cle bins in the NSA help users recov er accidentally deleted fil es or folders in the shares. When you delete an item, a recy cle folder is created within the share to h[...]

  • Page 319

    Chapter 14 Shares NSA320 User’s Guide 319 14.6 The Share Browser Screen Use this screen to create folders, upload files, and edi t files within the share. Figure 175 Sharing > Shares > Share Bro wser The following table describes t he labels in this screen. T able 99 Sharing > Shares > Sh are Browser LABEL DESCRIPTION Create Folder T [...]

  • Page 320

    Chapter 14 Shares NSA320 User’s Guide 320 R ename Select a folder or file and click th is to open a screen. Enter the name you want and click OK to make the changes. Note: When you change a f ile name, make sure you keep the file extention. Delete Select a file/folder from the list and click this to open a w arning screen. Click Yes to delete the[...]

  • Page 321

    Chapter 14 Shares NSA320 User’s Guide 321 14.6.1 Moving or Copying Files Use this screen to move or copy files to another share. In the Share Browser screen, select a file or folder and clic k Move or Copy to open the following screen. Figure 176 Sharing > Shares > Share Bro wser > Move (or Copy) The following table describes t he labels[...]

  • Page 322

    Chapter 14 Shares NSA320 User’s Guide 322[...]

  • Page 323

    NSA320 User’s Guide 323 C HAPTER 15 Maintenance Screens 15.1 Overview This chapter discusses the Maintenance screens. The Maintena nce screens allow you to manage system conf igurations. 15.2 What Y ou Can Do •U s e t h e Power screen ( Section 15.3 on page 324 ) to configure power set tings for the NSA, including power saving, UPS , power on/o[...]

  • Page 324

    Chapter 15 Maintenance Screens NSA320 User’s Guide 324 15.3 The Power Screen Use this screen to manage power settings for the NS A. Click Maintenance > Power to display the following screen. Figure 177 Maintenance > Po wer The following table describes t he labels in this screen. T able 101 Maintenance > Power LABEL DESCRIPTION P ower Ma[...]

  • Page 325

    Chapter 15 Maintenance Screens NSA320 User’s Guide 325 Minimum UPS Capacity When you use an APC Uninterruptible Power Supply (UPS) with a USB connection to the NSA, the NSA shuts itself down if the APC UPS’s battery charge gets down to the percen tage you specify in this field. This allows the NSA to shut down properly and avoid data loss cause[...]

  • Page 326

    Chapter 15 Maintenance Screens NSA320 User’s Guide 326 15.3.1 Editing the Power Control Schedule Screen Click Maintenance > Power Management > Edit to open this screen. Use this screen to configure power control schedules to have the NSA turn on, turn off , or reboot at specified times. Figure 178 Maintenance > Power Management > Edit[...]

  • Page 327

    Chapter 15 Maintenance Screens NSA320 User’s Guide 327 T ype Select whether this power contro l schedule has the NSA turn on, turn off , or reboot. Frequency Select whether the NSA is to apply this power control schedule entry on a monthly , weekly , or daily basis. Execute Time (hh:mm) Enter the time, day , and/or day of the month as appropriate[...]

  • Page 328

    Chapter 15 Maintenance Screens NSA320 User’s Guide 328 15.4 The Log Screen Click Maintenance > Log to open the following screen. Use this screen to disp lay all NSA logs. There are at most 512 entries in the log. Older logs are removed by the sys tem. Y ou cannot download the log file via FTP or CIFS. Figure 179 Maintenance > L og The follo[...]

  • Page 329

    Chapter 15 Maintenance Screens NSA320 User’s Guide 329 15.4.1 Report Config Screen In the Log screen, click Report Config to do the following: •U s e t h e Email Setting screen ( Section 15.4.2 on page 329 ) to enable and configure e-mail alerts from the NSA. •U s e t h e Report Setting screen ( Section 15.4.3 on page 330 ) to select the type[...]

  • Page 330

    Chapter 15 Maintenance Screens NSA320 User’s Guide 330 15.4.3 Report Setting Y ou can select the type of alerts you want to receive through e- mail and schedule when the NSA e-mails the alerts. In the Report Config sc reen, click the Report Setting tab to open the following screen. Figure 181 Maintenance > Log > Repo rt Config: Report Setti[...]

  • Page 331

    Chapter 15 Maintenance Screens NSA320 User’s Guide 331 15.4.4 Syslog Server Setting Y ou can enable the syslog server and sele ct the categories to include in the log report. In the Report Config screen, click the Syslog Server Setting tab to open the following screen. Figure 182 Maintenance > Log > Repo rt Config: Syslog Server Setting The[...]

  • Page 332

    Chapter 15 Maintenance Screens NSA320 User’s Guide 332 15.5 The Configuration Screen Click Maintenance > Configuration to open the following screen. Use this screen to backup or restore t he NSA configurati on settings. Figure 183 Maintenance > Con figuration The following table describes t he labels in this screen. T able 107 Maintenance &[...]

  • Page 333

    Chapter 15 Maintenance Screens NSA320 User’s Guide 333 15.6 SSL Certification Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that w as issued by a known certificate authority . Figure 184 Maintenance > SSL[...]

  • Page 334

    Chapter 15 Maintenance Screens NSA320 User’s Guide 334 The following table describes t he labels in this screen. T able 108 Maintenance > SSL LABEL DESCRIPTION Force HT TPs Select the Force HTTPs option to turn on the NSA’ s web browser security . Anyone who connects via HT TPS to the NSA must install the public key certificate a ssociated w[...]

  • Page 335

    Chapter 15 Maintenance Screens NSA320 User’s Guide 335 15.6.1 Modifying or Creating a Certificate When you select the Edit a self-signed CA certificate option, then click the Edit button, a screen opens to allow you to mak e adjustments to the NS A’ s public k ey certificate. The screen is also the same for the Create a certificate authorized b[...]

  • Page 336

    Chapter 15 Maintenance Screens NSA320 User’s Guide 336 15.7 The Firmware Upgrade Screen Use this screen to upg rade the NSA firmw are. Y ou should first have downloaded the latest firmware f iles fro m the ZyXEL website. Do not turn off the NSA while it is upgrading the firmware or you may render it unusable. Click Maintenance > FW U pgrade to[...]

  • Page 337

    Chapter 15 Maintenance Screens NSA320 User’s Guide 337 15.8 The Shut down Screen Use this screen to turn of f the NSA or perform a softw are restart. A softw are restart is faster than turning the NSA o ff and then turning it on again. Before shutting down or restarting, check the System Status > Active Sessions screen t o m a k e s u r e t h [...]

  • Page 338

    Chapter 15 Maintenance Screens NSA320 User’s Guide 338 When you click the Shutdown button a pop-up screen will appear as king you to confirm. Click OK to continue or Cancel to quit the shutdown. Figure 189 Maintenance > Shut down > Confirm Shut down 15.9 T echnical Reference This section provi des technical background information on the top[...]

  • Page 339

    Chapter 15 Maintenance Screens NSA320 User’s Guide 339 15.9.3 Log Messages Here are some example log messages. 2C r i t i c a l 3 Error 4W a r n i n g 5N o t i c e 6I n f o T able 1 13 Log Severity Levels (continued) LEVEL DESCRIPTION T able 1 14 Log Messages CLASS SEVERITY MESSAGE Auto upload INFO %s is queued. Auto upload INFO %s uploaded (Flic[...]

  • Page 340

    Chapter 15 Maintenance Screens NSA320 User’s Guide 340 Copy/Sync Button INFO [USB Sync] Deleting %s from Internal V olume. Copy/Sync Button INFO [USB Sync] Deleting %s from USB. Copy/Sync Button INFO [USB Sync] Deleting %s from USB Recursively . Copy/Sync Button INFO [USB Sync] Finished. Elapsed Time %s Seconds. Copy/Sync Button INFO [USB Sync] M[...]

  • Page 341

    Chapter 15 Maintenance Screens NSA320 User’s Guide 341 Download Service INFO Download service set max B T upload rate to %d KB/s by user Download Service INFO Download service set max download slot to %d Download Service INFO Download service set seeding time to %d minutues Download Service INFO Download service set TCP port to %d and UDP port to[...]

  • Page 342

    Chapter 15 Maintenance Screens NSA320 User’s Guide 342 Download Service WARNING Download service default torrent location does not exist. Load default Groups NOTICE Add new g roup %s. Groups NOTICE Delete group %s. Network NOTICE %s is active because of changing P ort Group. Enable DHCP client. Network N OTICE %s is inactive because of changing P[...]

  • Page 343

    Chapter 15 Maintenance Screens NSA320 User’s Guide 343 Services NOTICE FTP server stops Services NOTICE FTP server starts Services NOTICE MyClock has chan ged daylight saving interv al Services NOTICE MyClock has disabled daylight sa ving interval Services NOTICE NTP server has set to '%s' Services NOTICE NTP server has set to null Serv[...]

  • Page 344

    Chapter 15 Maintenance Screens NSA320 User’s Guide 344 Storage I NFO Create External Normal V olume [%s] (%s): SUCCESS Storage I NFO Create Internal V olume [%s] (%s): SUCCESS Storage INFO Rename External V olume to [%s]: SUCCESS Storage INFO Scan External V olume: SUCCES S Storage I NFO Scan Internal V olume (%s operation): SUCCES S System INFO [...]

  • Page 345

    Chapter 15 Maintenance Screens NSA320 User’s Guide 345 Backup/ Res t o r e ERROR When query remote target [%s]: %s Backup/ Res t o r e INFO Backup job [%s] succe ssfully Backup/ Res t o r e ERROR When backup [%s]: %s Backup/ Res t o r e ERROR When backup [%s], error happens: %s Backup/ Res t o r e INFO Start to restore backup job [%s]. Backup/ Re[...]

  • Page 346

    Chapter 15 Maintenance Screens NSA320 User’s Guide 346[...]

  • Page 347

    NSA320 User’s Guide 347 C HAPTER 16 Protecting Your Data 16.1 Overview This chapter compares the different w ays of protecting data on the NSA and explains how to use backup management software included on the CD . 16.2 Protection Methods There are a variety of wa ys to protect y o ur data on the NSA. Below is a summary table of what can be done [...]

  • Page 348

    Chapter 16 Prot ecting Your Dat a NSA320 User’s Guide 348 16.3 Configuration File Backup and Restoration Use the Maintena nce > Configuration menus to create a file of yo ur NSA configur ati ons such as passwords, shar es and volumes created, network settings and so on. If you’re going t o do some major confi guration changes, then it is adv[...]

  • Page 349

    Chapter 16 Protecting Your Data NSA320 User’s Guide 349 1 Since a computer restart is required, clos e your other files and programs before installing the Memeo Autobackup softw are. 2 Insert the included CD in to your CD-ROM drive. Click the Tools icon in the screen that displays. Then click Memeo Instant Backup Software . Note: If this screen d[...]

  • Page 350

    Chapter 16 Prot ecting Your Dat a NSA320 User’s Guide 350 6 In this screen, select the item s that you want to back up. Figure 192 Backu p Items 7 This screen lists the items you selected for backup . Confirm your selections and click Next . Figure 193 Confirm Backup Items[...]

  • Page 351

    Chapter 16 Protecting Your Data NSA320 User’s Guide 351 8 Specify a name f or your backup plan (or just use the default). Click Next and then Done . Figure 194 Backu p Plan Name 16.4.2 Using Memeo Autobackup Af ter the Initial Setup After you hav e installed and configured Memeo Autobackup, double-click the icon in the system tr a y to open the p[...]

  • Page 352

    Chapter 16 Prot ecting Your Dat a NSA320 User’s Guide 352[...]

  • Page 353

    NSA320 User’s Guide 353 C HAPTER 17 Troubleshooting 17.1 T roubleshooting Overview This chapter offers some suggesti ons to solv e problems y ou might encounter . The potential problems are divided into the following categories. • P ower , Hardware, Connections, and LEDs • NAS Starter Utility • NSA Login and Access • I Cannot Access The N[...]

  • Page 354

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 354 • Make sure y ou are using the power adap tor or cord included with the NSA. • Make sure the power adaptor or cord is connected to the NS A and plugged i n to an appropriate power source. Make su re the power source is turned on. • T urn the NSA off and on. • If the problem co ntinue[...]

  • Page 355

    Chapter 17 Trou bleshooting NSA320 User’s Guide 355 • If you are using a single-disk JBOD volume, y ou need to create a new volume on the new drive. • If you are using a two-disk JBOD volu me, you need to create a whole new volume on both drives. The LAN LED (by the LAN port) is of f. • Make sure the Eth ernet cabl e is conne cted properly [...]

  • Page 356

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 356 17.3 NAS S t arter Utility The NAS S tarter Utility cannot discover my NSA. • Close the NAS Starter Utilit y and reopen it. • Check y our hardware connec tions and make sure they are set up correctly . • Only one instance of the NAS Starter Utility can run on your computer . Make sure [...]

  • Page 357

    Chapter 17 Trou bleshooting NSA320 User’s Guide 357 I have at least two NSAs in my network, how do I i dentify which one I want to configure in the NAS S t arter Utility screens. If you have s e veral NSA s co n n ect ed t o your c omp ute r /ne two rk, g ive ea ch a unique name. Y ou may hav e to disconnect all but one and use the NAS Starter Ut[...]

  • Page 358

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 358 • The default server name is nsa320 , if you have c han ge d the s erve r n a me, use the new one. • If the server name has been changed and you do not know the new server name, see the troubleshooting suggestions for I for got the server name of the NSA. • If it still doesn’t work, [...]

  • Page 359

    Chapter 17 Trou bleshooting NSA320 User’s Guide 359 17.4.1 Enabling Scripting of Safe ActiveX Controls If pages of the web configur ator do not display properly in Internet Explorer , check that scripting of safe Acti veX controls is enabl ed. 1 In Internet Explorer , click Tools , Internet Options and then the Security tab. Figure 196 Internet O[...]

  • Page 360

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 360 4 Click OK to close the window . Figure 197 Security Settings - Script Safe ActiveX Controls I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly . The default username is admin , and the default password is 1234 . The[...]

  • Page 361

    Chapter 17 Trou bleshooting NSA320 User’s Guide 361 17.5 I Cannot Access The NSA I cannot access a share. • Check that the NS A is turn ed on and connected to the network. T ry to ping the NSA or use the NAS Starter Utilit y to discover it . • Make sure you hav e used the NAS Starte r Utility to initialize y our NSA. See Chapter 2 on page 29 [...]

  • Page 362

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 362 • Check the Acce ss Con trol List (A CL ) of read/write permissions associated with specific files and/or fold ers. Account na mes added to the li st are linked to the files and folders that they are allowed to access, al ong with what kinds of actions they are allowed to perform with thos[...]

  • Page 363

    Chapter 17 Trou bleshooting NSA320 User’s Guide 363 In addition to the checks list ed previous ly f or local users, check that the domain controller is turned on and connected to the network. A user can access a share but cannot access individual fo lders or files within the share. • Check the Access Control List (ACL) of read/write permissions[...]

  • Page 364

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 364 17.9 File T ransfer I want to transfer my file(s ) from my local computer or storage device to the NSA. • After you initialize y our hard disk, yo u can directly access the fo lders in your NSA and transfer f iles i n the same wa y you tr ansfer files in y our local computer: 1 On your Win[...]

  • Page 365

    Chapter 17 Trou bleshooting NSA320 User’s Guide 365 17.10 Networking I want to control who can ac cess my folder(s)/file(s). • If you are an administr ator , you can configure a user’s access rights. Use the Shares screen ( Section 14.3 on page 312 ) to do this. •I f y o u e n a b l e d Web Publishing for a fol der , anyone on your network [...]

  • Page 366

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 366 • The firmware installed in y our NSA inc ludes the features mentioned in Section 3.5.2 on page 67 . This does not include the applications you can install using the Package Management screen. • Y ou can use the Packa ge Manageme nt screen ( Chapter 10 on page 231 ) to install more appli[...]

  • Page 367

    Chapter 17 Trou bleshooting NSA320 User’s Guide 367 2 Go to Applications > Media Server . Make sure the share containing the music files is published and the iT unes server option is enabled. 3 If an iT unes client is connected, the NSA’ s iT unes server function scans the published media server folders for files every three minutes. Leave i[...]

  • Page 368

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 368 I cannot use iT unes to play files located on my NSA. 1 Make sure the files are a format supported by iT unes. See Section 18.5 on page 381 . 2 If you hav e files from the iT unes Store th at use DRM, you need to use your Apple account ID and password to authori ze other computers to play th[...]

  • Page 369

    Chapter 17 Trou bleshooting NSA320 User’s Guide 369 I cannot find the download files. By default, the Download Service and Broadcatching features store downloaded files as follows: • BitT orrent jobs are stored in /*/incoming (whe re ‘*’ is a folder that you have set.) • HT TP/FTP jobs are stored in /* (where ‘*’ i s a folder that you[...]

  • Page 370

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 370 • If Firefo x access to the share does not work, check that you did not set the W eb publishing feature to use one of the foll owing ports. (Firefox bl ocks thes e ports by default . ) • Make sure your ISP allows you to run a server and is not blocking the port number of the NSA’ s web[...]

  • Page 371

    Chapter 17 Trou bleshooting NSA320 User’s Guide 371 2a If the log message displays “no such file or directory” , the file may hav e been removed from the NSA. Make sure the fi l e still exist s in the watch folder . 2b If the log message dis plays “filename is queued” , the file may s till be waiting for auto upload. Check the gr ace peri[...]

  • Page 372

    Chapter 17 Tro u blesh oo tin g NSA320 User’s Guide 372 Y ou need to be connected to an eMule serv er before you can use t he Search screen. W ait for the NSA to connect to a server before configuring the Search screen. I want to know how my hard disk is performing. Use S.M.A.R.T . (Self Monitoring, Analysi s, and Reporting T echnology) to monito[...]

  • Page 373

    NSA320 User’s Guide 373 C HAPTER 18 Product Specifications See also Chapter 1 on page 23 for a general ov erview of the key features. 18.1 Physical Features These are the main external physical features. T able 1 17 Physical Features USB Ports 3 USB (v ersion 2) ports. Copy or sync files directly from the NS A to compatible USB devices like card [...]

  • Page 374

    Chapter 18 Product Specifications NSA320 User’s Guide 374 P ower Button Press the Power button for one second to turn it on. T urn off the NSA before unplugging it. Press the Power button for 3 seconds until you hear one beep, then release it. The NSA goes starts to shutdown its softw are and turns off . Press the Power button for 5 seconds until[...]

  • Page 375

    Chapter 18 Product Specifications NSA320 User’s Guide 375 18.2 Firmware Features These are some of the main firmware features of the NSA. T able 1 18 Firmware Features DLNA Server The NSA is a DLNA-complia nt media server that lets DLNA - compliant media clients play video, audio, and photo content files stored on the NSA. RAID File Storage Use R[...]

  • Page 376

    Chapter 18 Product Specifications NSA320 User’s Guide 376 18.3 S pecification T ables The NSA hardware s pecifications are shown in the following table. Auto Upload The auto upload feature uploads media files stored in the NSA to the Flickr and/or Y ouT ube sharing websites. It is a convenient w ay to share media files with you r friends and fami[...]

  • Page 377

    Chapter 18 Product Specifications NSA320 User’s Guide 377 The NSA firmware specifications are shown in the following table Default P assword 1234 Dimensions 108 (W) x 205 (D) x147 (H) mm (4.3 (W) x 5.8 (D) x 8.1 (H) inch) We i g h t 1.02 kg (2.25 lb.) without hard drives Drive Bays Tw o Compatible Hard Disks SA T A I and SA T A II 3.0 Gbit/s (Ser[...]

  • Page 378

    Chapter 18 Product Specifications NSA320 User’s Guide 378 The following list, which is not exha ustive, ill ustrat es the standards and recommendations supported in the NSA. Network File Sharing Protocol CIFS/SMB for Windows HT TP for web browser FTP , FTPES (TLS explicit mode) Network Security Authentication Share level Supported Operating Syst [...]

  • Page 379

    Chapter 18 Product Specifications NSA320 User’s Guide 379 ECMA-262 Edition 2 The ECMAScript standard’ s second revision; also ISO standard 16262. ECMA-262 Edition 3 The ECMAScript standard’ s third revision; corresponds to JavaScript 1.5. ECMA -357 ECMAScript for XML (E4X ). See also the E4X errata. HTML 3.2 Reference Specification The HyperT[...]

  • Page 380

    Chapter 18 Product Specifications NSA320 User’s Guide 380 18.4 Supported Media Server Content Format s The following describes the d etails about the files that the NS A media server can publish. RFC 4248 The telnet URI Scheme RFC 793 (STD-7) - T ransmission Control Protocol RFC 959 (STD-9) - File T ransfer Protocol SA T A SA T A I and SA T A II [...]

  • Page 381

    Chapter 18 Product Specifications NSA320 User’s Guide 381 Note: Not all published file types can be viewed b y all client applications. 18.5 Supported iT unes Server Content Format s At the time of writing, the NSA supports iT unes publishing audio files of the following formats: mp3, m4a, m4p , wa v , and mp4. 18.6 Power Consumption The NSA’ s[...]

  • Page 382

    Chapter 18 Product Specifications NSA320 User’s Guide 382 Note: These are results from a lab oratory test and are for your reference only . T able 123 Power Consumption in Watts (W) POWER MODE POWER CONSUMPTION Access Mode 32.2 W atts Hard Disk Hibernation Mode 10 W atts[...]

  • Page 383

    NSA320 User’s Guide 383 A PPENDIX A Setting Up Y our Computer ’ s IP Address Note: Y our specific NSA may not support all of the operating systems described in this appendix. See the product specifications for mor e information about which operating systems are supported. This appendix shows you how to conf igure the IP setti ngs on your c ompu[...]

  • Page 384

    Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 384 Windows XP/NT/2000 The following example us es the default Windows XP displa y theme but can al so apply to Wind ows 2000 and Windows NT . 1 Click Start > Control Panel . 2 In the Control Panel , click the Network Connections icon.[...]

  • Page 385

    Appendix A Setting Up Your Compu te r’s IP Address NSA320 User’s Guide 385 3 Right- click Local Area Connection and then select Properties . 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties .[...]

  • Page 386

    Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 386 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network admi nistrator or ISP assigns your IP addres s dynamically . Select Use the following IP Address and fill in the IP address , Subnet mask , and Default gat[...]

  • Page 387

    Appendix A Setting Up Your Compu te r’s IP Address NSA320 User’s Guide 387 Windows V ist a This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel . 2 In the Control Panel , click the Network and Internet icon. 3 Click the Network and Sharing Center icon.[...]

  • Page 388

    Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 388 4 Click Manage network conne ctions . 5 Right- click Local Area Connection and then select Properties . Note: During this procedure, click Continue whenever Windo ws displays a screen saying that it needs your pe rmission to continue.[...]

  • Page 389

    Appendix A Setting Up Your Compu te r’s IP Address NSA320 User’s Guide 389 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties .[...]

  • Page 390

    Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 390 7 The Internet Protocol Versio n 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network admi nistrator or ISP assigns your IP addres s dynamically . Select Use the following IP Address and fill in the IP address , Subnet mask , [...]

  • Page 391

    Appendix A Setting Up Your Compu te r’s IP Address NSA320 User’s Guide 391 V erifying Settings 1 Click Start > Al l Programs > Accessories > Command Prompt . 2 In the Command Prompt window , type "ipconfi g" and then press [ENTER]. Y ou can also go to Start > Control Panel > Network Connections , right-click a network c[...]

  • Page 392

    Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 392 3 Click Change adapter settings . 4 Double c lick Local Area Connection and then select Properties . Note: During this procedure, click Continue whenever Windo ws displays a screen saying that it needs your pe rmission to continue.[...]

  • Page 393

    Appendix A Setting Up Your Compu te r’s IP Address NSA320 User’s Guide 393 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties .[...]

  • Page 394

    Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 394 6 The Internet Protocol Versio n 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network admi nistrator or ISP assigns your IP addres s dynamically . Select Use the following IP Address and fill in the IP address , Subnet mask , [...]

  • Page 395

    Appendix A Setting Up Your Compu te r’s IP Address NSA320 User’s Guide 395 V erifying Settings 1 Click Start > Al l Programs > Accessories > Command Prompt . 2 In the Command Prompt window , type "ipconfi g" and then press [ENTER]. 3 The IP settings are display ed as follows.[...]

  • Page 396

    Appendix A Se tting Up Your Computer’s IP Addres s NSA320 User’s Guide 396[...]

  • Page 397

    NSA320 User’s Guide 397 A PPENDIX B Pop-up Windows, JavaScript s and Java Permissions In order to use the web configurator yo u need to allow: • W eb browser pop-up wind ows from your device. • Jav aScripts (enabled by defa ul t). • Jav a permissions (enabled by default). Note: Internet Explorer 6 screens are used here . Screens for other I[...]

  • Page 398

    Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 398 1 In Internet Explorer , select Tools , Internet Options , Privacy . 2 Clear the Block pop-ups check box in the Pop-up Blocker sect ion of the screen. This disables an y web pop-up block ers you may have enabled. Figure 201 Internet Options: Privacy 3 Click App[...]

  • Page 399

    Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA320 User’s Guide 399 2 Select Settings… to open the Pop-up Blocker Settings screen. Figure 202 Internet Options: Privacy 3 T ype the IP address of y our device (the web page that you do not want to have blocked) wi th the prefix “http://” . F or example, http://192.168. 167.1.[...]

  • Page 400

    Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 400 4 Click Add to mo ve the IP address to the list of Allowed sites . Figure 203 Pop-up Blo cker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript s If pages of the web configur ator do not display properly in I[...]

  • Page 401

    Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA320 User’s Guide 401 1 In Internet Explorer , click Tools , Internet Options and then the Security tab. Figure 204 Internet Options: Secu rity 2 Click the Custom Level... button . 3 Scroll down to Scriptin g . 4 Under Active scripting make sure that Enable is selected (the default). 5[...]

  • Page 402

    Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 402 6 Click OK to close the window . Figure 205 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer , click Tools , Internet Options and then the Security tab. 2 Click the Custom Level... button . 3 Scroll down to Microsoft VM . 4 Under Jav[...]

  • Page 403

    Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA320 User’s Guide 403 5 Click OK to close the window . Figure 206 Security Settings - Java JA V A (Sun) 1 From Internet Explorer , click Tools , Internet Options and then the Advanc ed tab. 2 Make sure that Use Java 2 for <applet> under Java (S un) is selected.[...]

  • Page 404

    Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 404 3 Click OK to close the window . Figure 207 Java (Sun) Mozilla Firefox Mozilla Firefo x 2.0 screens are used here . Screens for other versions ma y vary . Y ou can enable Java, Javascript s and pop-ups in one screen. Click Tools, then click Options in the scree[...]

  • Page 405

    Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA320 User’s Guide 405 Click Content .to show the screen below. Select the chec k boxes as shown in the following screen. Figure 209 Mozilla Firefox Content Security[...]

  • Page 406

    Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NSA320 User’s Guide 406[...]

  • Page 407

    NSA320 User’s Guide 407 A PPENDIX C Common Services The following table lists some commonl y-used services and their associated protocols and port numbers. F or a comprehe nsiv e list of p ort numbers, ICMP type/ code numbers and services , visit the IANA (Internet Assigned Number Authority) web site. • Name : This is a short, descrip tive name[...]

  • Page 408

    Appendix C Common Ser vices NSA320 User’s Guide 408 ESP (IPSEC_TUNNEL) User -Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP TCP 20 21 File T ransfer Program, a progr am to enable[...]

  • Page 409

    Appendix C Common Services NSA320 User’s Guide 409 PPTP TCP 1723 Point -to-P oint T unneling Protocol enables secure transfer of data ov er public networks. This is the control channel. PPTP_TUNNEL (GRE) User -Defined 47 PPTP (P oint -to-Point T unneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCM[...]

  • Page 410

    Appendix C Common Ser vices NSA320 User’s Guide 410 TFTP UDP 69 T rivial File T ransfer Protocol is an Internet file transfer protocol similar to FTP , but uses th e UDP (User Datagram Protocol) r ather than TCP (T ransmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution. T able 124 Commonly Used Services (continued) NAM[...]

  • Page 411

    NSA320 User’s Guide 41 1 A PPENDIX D Importing Certificates This appendix shows you how to import public k ey certificates into your web browser . Public key certificates are used by web br owsers to ensure that a secure web site is legitimate. When a certificate authorit y such as V eriSign, Comodo , or Network Solutions, to name a few , receive[...]

  • Page 412

    Appendix D Importing Certificates NSA320 User’s Guide 412 Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however , they can also appl y to Internet Explorer on Wi ndows Vista. 1 If your device’ s W eb Configurator is set to use SSL certificati on, then the first time you browse to i t you [...]

  • Page 413

    Appendix D Importi ng Certificates NSA320 User’s Guide 413 3 In the Address Bar , click Certificate Error > View certificates . Figure 212 Internet Explorer 7: Cert ificate Error 4 In the Certificate dialog bo x, click Install Certificate . Figure 213 Internet Explorer 7: Cert ificate[...]

  • Page 414

    Appendix D Importing Certificates NSA320 User’s Guide 414 5 In the Certificate Import Wizard , click Next . Figure 214 Internet Explorer 7: Cert ificate Import Wizard 6 If you w ant Internet E xplorer to Automatically select certificate store based on the type of certificate , click Next again and then go to step 9. Figure 215 Internet Explorer 7[...]

  • Page 415

    Appendix D Importi ng Certificates NSA320 User’s Guide 415 7 Otherwise, se lect Place all certificates in the following store and then click Browse . Figure 216 Internet Explorer 7: Cert ificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to sa ve the certificate and then clic k OK . Figure 217 Internet [...]

  • Page 416

    Appendix D Importing Certificates NSA320 User’s Guide 416 9 In the Completing the Certificate Import Wizard screen, click Finish . Figure 218 Internet Explorer 7: Cert ificate Import Wizard 10 If you are presented with another Security Warning , c lick Yes . Figure 219 Internet Explorer 7: Security W arning[...]

  • Page 417

    Appendix D Importi ng Certificates NSA320 User’s Guide 417 11 Finally , click OK when presented with the successful certificate installation message. Figure 220 Internet Explorer 7: Cert ificate Import Wizard 12 The next time you start Internet Explor er and go to a Z yXEL W eb Configurator page, a sealed padlock icon appears in the address bar .[...]

  • Page 418

    Appendix D Importing Certificates NSA320 User’s Guide 418 Inst alling a St and-Alone Certific ate File in Internet Explorer Rather t han browsing to a Z yXEL W eb Co nfigurator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you. 1 Double-click the public key cert [...]

  • Page 419

    Appendix D Importi ng Certificates NSA320 User’s Guide 419 Removing a Certificate in Internet Explorer This section shows you how to remove a publi c key certificate in Internet Explorer 7. 1 Open Internet Explorer and click Tools > Internet Options . Figure 224 Internet Explorer 7: T ools Menu 2 In the Internet Options dialog box, cl ick Cont[...]

  • Page 420

    Appendix D Importing Certificates NSA320 User’s Guide 420 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificat e that yo u w ant to delete, and then click Remove . Figure 226 Internet Explorer 7: Cert ificates 4 In the Certificates confirmation, click Yes . Figure 227 Internet Explorer 7: Ce[...]

  • Page 421

    Appendix D Importi ng Certificates NSA320 User’s Guide 421 6 The next time you go to the web site that issued the public k ey certificate you just removed, a certification error appears.[...]

  • Page 422

    Appendix D Importing Certificates NSA320 User’s Guide 422 Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however , the screens can also apply to Firefox 2 on all platforms. 1 If your device’ s W eb Configurator is set to use SSL certificati on, then the first time you browse to i t you are presented with a cert[...]

  • Page 423

    Appendix D Importi ng Certificates NSA320 User’s Guide 423 3 The certificate is stored and you ca n now connect securely to the W eb Configurator . A sealed padlock appears in the address bar , which y ou can cli ck to open the Page Info > Security windo w to view the web page’ s security informat ion. Figure 230 Firefox 2: Page Info[...]

  • Page 424

    Appendix D Importing Certificates NSA320 User’s Guide 424 Inst alling a St and-Alone Ce rtificate File in Firefox Rather t han browsing to a Z yXEL W eb Co nfigurator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you. 1 Open Firefox and click Tools > Options .[...]

  • Page 425

    Appendix D Importi ng Certificates NSA320 User’s Guide 425 3 In the Certificate Manager dialog box, cl ick Web S ites > Import . Figure 233 Firefox 2: Cert ificate Manager 4 Use the Select File dialog bo x to locate the certificate and then click Op en . Figure 234 Firefox 2: Select File 5 The next time you visit the web site, click the padloc[...]

  • Page 426

    Appendix D Importing Certificates NSA320 User’s Guide 426 Removing a Certificate in Firefox This section shows y ou how to remove a public key certificate in Fi refox 2. 1 Open Firefox and click Tools > Options . Figure 235 Firefox 2: T ools Menu 2 In the Options dialog bo x, cli ck Advanced > Encryption > View Certifica t es . Figure 23[...]

  • Page 427

    Appendix D Importi ng Certificates NSA320 User’s Guide 427 3 In the Certificate Manager dialog box, select the Web Sites tab , select the certificate that you w ant to remove, and then click Delete . Figure 237 Firefox 2: Cert ificate Manager 4 In the Delete Web Site Certificates dialog bo x, cli ck OK . Figure 238 Firefox 2: Delete W eb Site Cer[...]

  • Page 428

    Appendix D Importing Certificates NSA320 User’s Guide 428 Opera The following example uses Opera 9 on Wi ndows XP Professional; however , the screens can apply to Opera 9 on all pl atforms. 1 If your device’ s W eb Configurator is set to use SSL certificati on, then the first time you browse to i t you are presented with a certificati on error [...]

  • Page 429

    Appendix D Importi ng Certificates NSA320 User’s Guide 429 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’ s securit y details. Figure 240 Opera 9: Security information[...]

  • Page 430

    Appendix D Importing Certificates NSA320 User’s Guide 430 Inst alling a St and-Alone Ce rtificate File in Opera Rather t han browsing to a Z yXEL W eb Co nfigurator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you. 1 Open Opera and click Tools > Preferences .[...]

  • Page 431

    Appendix D Importi ng Certificates NSA320 User’s Guide 431 2 In Preferences , click Advanced > Security > Manage certificates . Figure 242 Opera 9: Prefer ences[...]

  • Page 432

    Appendix D Importing Certificates NSA320 User’s Guide 432 3 In the Certificates Manager , click Authorities > Import . Figure 243 Opera 9: Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open. Figure 244 Opera 9: Import certif icate[...]

  • Page 433

    Appendix D Importi ng Certificates NSA320 User’s Guide 433 5 In the Install authority certificate dialog box, c lick Ins tall . Figure 245 Opera 9: Inst all authority certificate 6 Next, click OK . Figure 246 Opera 9: Inst all authority certificate 7 The next time you visit the web site, click the padlock in the address bar to open the Security i[...]

  • Page 434

    Appendix D Importing Certificates NSA320 User’s Guide 434 Removing a Certificate in Opera This section shows y ou how to remove a public k ey certificate in Oper a 9. 1 Open Opera and click Tools > Preferences . Figure 247 Opera 9: T ools Menu 2 In Preferences , Advanced > Security > Manage certificates . Figure 248 Opera 9: Prefer ences[...]

  • Page 435

    Appendix D Importi ng Certificates NSA320 User’s Guide 435 3 In the Certificates manager , sele ct the Authorities tab, sele ct the cert if icate that you wan t to rem ove , an d the n c lic k Delete . Figure 249 Opera 9: Certificate manager 4 The next time you go to the web site that issued the public k ey certificate you just removed, a certifi[...]

  • Page 436

    Appendix D Importing Certificates NSA320 User’s Guide 436 Konqueror The following example uses K onqueror 3.5 on openSUSE 10.3, however the screens apply to K onqueror 3.5 on all Linux KDE distributions. 1 If your device’ s W eb Configurator is set to use SSL certificati on, then the first time you browse to i t you are presented with a certifi[...]

  • Page 437

    Appendix D Importi ng Certificates NSA320 User’s Guide 437 4 Click the padlock in the addr ess bar to open the KDE SSL Information window and view the web page’ s security details. Figure 252 Konqueror 3.5: KDE SSL Information[...]

  • Page 438

    Appendix D Importing Certificates NSA320 User’s Guide 438 Inst alling a St and-Alone Ce rtificate File in Konqueror Rather t han browsing to a Z yXEL W eb Co nfigurator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you. 1 Double-click the public key cert ificate [...]

  • Page 439

    Appendix D Importi ng Certificates NSA320 User’s Guide 439 3 The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Inf ormation window to view the web page’ s security details.[...]

  • Page 440

    Appendix D Importing Certificates NSA320 User’s Guide 440 Removing a Certificate in Konqueror This section shows y ou how to remove a public k ey certificate in K onqueror 3.5. 1 Open Konqueror and click Settings > Configure Konque ror . Figure 256 Konquero r 3.5: Settings Menu 2 In the Configure dial og box, select Crypto . 3 On the Peer SSL [...]

  • Page 441

    Appendix D Importi ng Certificates NSA320 User’s Guide 441 Note: There is no confirmation wh en you remove a certificate authority , so be absolutely certain you want to go through with it before clicking the button.[...]

  • Page 442

    Appendix D Importing Certificates NSA320 User’s Guide 442[...]

  • Page 443

    NSA320 User’s Guide 443 A PPENDIX E Open Source Licences End-User License Agreement for “NSA320” W ARNING: ZyXEL Communicatio ns Corp. IS WILLING TO LICENSE THE SOFTW ARE TO YOU ONL Y UPON THE CONDITION THA T YOU ACCEPT ALL OF TH E T ERMS CONT AINE D IN THIS LICENSE AGREEMENT . PLEASE READ THE TERMS CAREFULL Y BEFORE COMPLETING THE IN ST ALLA[...]

  • Page 444

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 444 Y ou have no owne rsh i p rights in th e Software. Rather , you ha ve a license to use the Software as long as this License Agreement remai ns in full force and effect. Ownership of the Software, Documentatio n and all intellect ual property rights therein shall remain at all t imes with[...]

  • Page 445

    Appendix E Open Source Licences NSA320 User’s Guide 445 5.Confidentiality Y ou acknowledge that the Software contai ns propriet ary trade secr ets of Z yXEL and you hereby agree to maintain the confidenti ality of the Software using at least as great a degree of care as you use to maintai n the confidentiality of your own most confidential inform[...]

  • Page 446

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 446 THIS LICENSE AGRE EM ENT IS EXPRES SL Y MADE SUBJECT TO ANY APPLICABLE LAWS, REGULA TIONS, ORDERS, OR O THE R RESTRICTIONS ON THE EXPOR T OF THE SOFTWARE OR INFORMA TION ABOU T SUCH SOF T WARE WHICH MA Y BE IMPOSED FROM TIME T O TIME. YO U SHALL NOT EXPOR T THE SOFTWARE, DOCUMENT A TION [...]

  • Page 447

    Appendix E Open Source Licences NSA320 User’s Guide 447 NOTE: Some components of this product incorpor ate source code cov ered under the open source code licenses. Further , fo r at least three (3) y ears from the date of distribution of the appl icable product or softw are, we will give to an yone who contacts us at the Zy XEL T echnical Supp o[...]

  • Page 448

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 448 Public License is the better strategy to use in any particular case, based on the explanations below . When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure tha t you have t he f ree dom to distribute copies o[...]

  • Page 449

    Appendix E Open Source Licences NSA320 User’s Guide 449 derivati ve of the original li brary . The ordinary Gener al Public License therefore permits such linking only if the entire co mbination fits its criteria of freedom. The Lesser Gener al Public License permits more lax cri teria for linking other code with the library . W e call this licen[...]

  • Page 450

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 450 software library or work which has been distri buted under these terms. A "work based on the Library" means either the Libr ary or any deriv ative work under copyright law: that is to say , a work containing the Library or a porti on of it, either verbatim or with modi fication[...]

  • Page 451

    Appendix E Open Source Licences NSA320 User’s Guide 451 part of a whole which is a work based on the Li br ary , the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every p art regardless of who wrote it. Thu s, it is not the intent of this se c[...]

  • Page 452

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 452 significant if the work can be link ed without the Library , or if the work is itself a library . The threshold for this to be true is not preci sely defined b y la w . If such an object file uses only numerical para meters, data structure lay outs and accessors, and small macros and sma[...]

  • Page 453

    Appendix E Open Source Licences NSA320 User’s Guide 453 include anything that is normally distribute d (in either source or binary form) with the major components (compiler , ke rnel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this re quirement contr[...]

  • Page 454

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 454 License. If you cannot distribute so as to satisfy si multaneously yo ur obligations under this License and any other pertinent obligations, then as a consequence y ou may not distribut e the Library at all. F or example, if a patent license would not permit roy alty -free redistribution[...]

  • Page 455

    Appendix E Open Source Licences NSA320 User’s Guide 455 NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBR ARY , TO THE EXTENT P ERMITTED BY APPLICABLE LAW . EXCEPT WHEN OTHERWISE ST A T ED IN WRITING THE COP YRIGHT HOLDERS AND/ OR O THER P AR TIES PROVIDE THE LIBRARY "AS IS" WITHOUT W ARRA[...]

  • Page 456

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 456 Preamble The licenses for most sof tware are design ed to take away your freedom to share and change it. By contrast, the GNU Ge neral Publi c Licens e is intended to guarantee y our freedom to share and chan ge free software--to mak e sure the software is free for all its users. This Ge[...]

  • Page 457

    Appendix E Open Source Licences NSA320 User’s Guide 457 work, and a "work based on the Progr a m" means either the Progr am or any derivati ve work under copyright law: that is to say , a work containing the Program or a portion of it, either verbatim or wi th modifications and/or translated into another language. (Hereinafter , transl [...]

  • Page 458

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 458 each and eve ry part regardle ss of who wrote it. Thus, it is not th e intent of th is section to claim rights or contest yo ur ri ghts to work written entirely by you; rather , the intent is to exerci se the right t o control the di stribution of derivativ e or collective works based on[...]

  • Page 459

    Appendix E Open Source Licences NSA320 User’s Guide 459 5. Y ou are not required to accept this License, since you hav e not signed it. However , nothing else gr ants you permission to modify or distri bute the Program or its deriva t ive works. These actions are p rohibited by law if y ou do not accept this License. Therefore, by modifying or di[...]

  • Page 460

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 460 spirit to the present version, but may diffe r i n detail to address new problems or concerns. Each version is giv en a distin guishing version number . If the Program specifies a v ersion number of this License which appli es to it and "an y later versi o n", yo u have th e op[...]

  • Page 461

    Appendix E Open Source Licences NSA320 User’s Guide 461 This Product includes mediainf o software under below license MediaInfo(Lib) License V ersion 1.1, 3 January 2010 Copyright 2002-2010 MediaArea.net SARL. All rights reserved. Re di stribution and use in source and binary forms, without modification, are permitted provided that the following [...]

  • Page 462

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 462 This version of the GNU Lesser General Pu blic License incorpor ates the terms and conditions of version 3 of the GNU Gene r al Public License, supplemented by the additional permi ssions listed below . 0. Additional Defi nitions. As used herein, “this License” refers t o v ersion 3 [...]

  • Page 463

    Appendix E Open Source Licences NSA320 User’s Guide 463 •b) under the GNU GPL, with none of the additional permissions of this License applicable to that cop y . 3. Object Code Incorpor ating Material from Libr ary Header Files. The object code form of an Ap plication ma y incorporate material from a header file that is part of the Libr ary . Y[...]

  • Page 464

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 464 •e) Provide Installati on Information, but only if you would otherwise be required to provide such information under section 6 of the GNU GPL, and only to the extent that such informatio n is necessary to install and execute a modified version of the Combined W ork produced by recombin[...]

  • Page 465

    Appendix E Open Source Licences NSA320 User’s Guide 465 GNU GENERAL PUBLIC LICENSE V ersion 3, 29 June 2007 Copyright (C) 2007 Free Software F o undation, Inc. <http://fsf .org/> Everyone is permi tted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU Genera l Public License is[...]

  • Page 466

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 466 Some devices are designed to deny users a ccess to instal l or run modified versions of the software inside them, althoug h the manufacturer can do so. This is fundamentally incompatible with the ai m of protecting users' freedom to change the software. The systematic pattern of suc[...]

  • Page 467

    Appendix E Open Source Licences NSA320 User’s Guide 467 An inter active user interface dis plays “ A ppropriate Legal Noti ces” to the extent that it includes a convenient and prominen tly visible feature that (1) displ ays an appropriate copyright notice, and (2) tells the user that there is no w arranty for the work (except to the extent th[...]

  • Page 468

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 468 All rights gr anted under this License are gr anted for the term of cop yright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimit ed permi ssion to run the unmodified Program. The output from running a cov ered work is[...]

  • Page 469

    Appendix E Open Source Licences NSA320 User’s Guide 469 Y ou may convey a work based on the Progra m, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: •a) The work must carry prominent notices stating that you modified it, and gi vi[...]

  • Page 470

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 470 software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. •c) Conv ey individual copies of the object code with a copy of t he written offer t[...]

  • Page 471

    Appendix E Open Source Licences NSA320 User’s Guide 471 If you conv ey an object code work und er this section in, or with, or spec ifically for use in, a User Product, and the conv eying occurs as part of a transacti on in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a f ixed term[...]

  • Page 472

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 472 •b) R equiring preserv ation of specifi e d reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices display ed by works containing it; or •c) Prohibit in g m i s r ep res en tat ion of the origin of that material, or requiring that m o d i[...]

  • Page 473

    Appendix E Open Source Licences NSA320 User’s Guide 473 Moreover , your license from a particul ar copyright holder is reinstat ed permanently i f th e c o py ri gh t holder no ti f ie s you of th e violation by so m e reasonable means, this is the first time you have receiv ed notice of violat ion of this License (for an y work) from that copyri[...]

  • Page 474

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 474 A “contributor” is a copyrigh t holder who authoriz es use under th is License of th e P r o g r a m o r a w o r k o n w h i c h t h e P r o g r a m i s b a s e d . T h e w o r k t h u s l i c e n s e d i s c a l l e d the contribu to r's “contrib ut or vers i o n” . A contr[...]

  • Page 475

    Appendix E Open Source Licences NSA320 User’s Guide 475 third party based on the extent of y our activit y of conveyi ng the work, and under which the third party gr ants, to an y of the parties who would receive the co vered work from you, a discriminatory patent l icense (a) in connection with copies of the covered work c onveyed by you (or cop[...]

  • Page 476

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 476 If the Program specif ies that a proxy can deci de which future versi ons of the GNU General P ublic License can be used, that proxy's public statement of acceptance of a version permanently authorizes y ou to choose that version for t he Program. Later license versions may give you[...]

  • Page 477

    Appendix E Open Source Licences NSA320 User’s Guide 477 Copyright © 2007 Free Software Fo un dati on, Inc. <http://fsf .org/> Everyone is permi tted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU Genera l Public License is a free, copyleft license for soft ware and other ki[...]

  • Page 478

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 478 for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this v ersion of the GPL to prohibit the pr actice for those products. If such problems arise substanti ally in other domains, we stand ready to extend this provision to those domains in[...]

  • Page 479

    Appendix E Open Source Licences NSA320 User’s Guide 479 the work (except to the extent that warr anties are provided), that licensees may convey the work under this License, and how to view a copy of this Li cense. If the interface presents a list of user co mmands or options, such as a menu, a prominent item in the list meets this criterion. 1. [...]

  • Page 480

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 480 given its cont ent, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent , as provided by copyright l aw . Y ou may make, run and propagate cov ered works that you do not conv ey , without conditions so long as y our license othe rwise remains[...]

  • Page 481

    Appendix E Open Source Licences NSA320 User’s Guide 481 •a) The work must carry prominent notices stating that you modified it, and gi ving a relevant date. •b) The work must carry prominent noti ces stating that it is releas ed under this License and any conditions added under se ction 7. This requirement modifies the requirement in section [...]

  • Page 482

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 482 •c) Conv ey individual copies of the object code with a copy of t he written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially , and only if you received the object code with such an offer , in accord with s ubsection 6b. •d)[...]

  • Page 483

    Appendix E Open Source Licences NSA320 User’s Guide 483 characteriz ed), the Corresponding Source convey ed under this section mus t be accompanied by the Installation Informatio n. But this requirement does not apply if neither you nor an y third p art y retains th e ability to install modifi ed object code on the User Product (for example, th e[...]

  • Page 484

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 484 •c) Prohibit in g m i s r ep res en tat ion of the origin of that material, or requiring that m o d i f i e d v e r s i o n s o f s u c h m a t e r i a l b e m a r k e d i n r e a s o n a b l e w a y s a s d i f f e r e n t f r o m the original vers ion; or •d) Limiting the use for p[...]

  • Page 485

    Appendix E Open Source Licences NSA320 User’s Guide 485 this License (for an y work) from that copyright holder , and you cure the violation prior to 30 days after your receipt of the notice. T ermination of your right s under this section does not terminate the licenses of parties who hav e received copies or ri ghts from yo u under this License[...]

  • Page 486

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 486 A contributor's “essential patent claims” ar e all patent c laims owned or controlled by the contributor , whether already acquir ed or hereafter acqu ired, t hat would be infringed by some manner , permitted by this License, of mak ing, using, or sel ling its contributor versio[...]

  • Page 487

    Appendix E Open Source Licences NSA320 User’s Guide 487 primarily for and in connection with specif ic products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was gr anted, prior to 28 March 2007. Nothing in this License s hall be construed as excluding or limit ing any implied lice[...]

  • Page 488

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 488 Later license versions may give you additional or different permissi ons. However , no additional obligations are i mposed on an y author or copyright holder as a result of your choosing to follow a later v ersion. 15. Disclaimer of W arranty . THERE IS NO W ARRANTY FOR THE PROGRAM, TO T[...]

  • Page 489

    Appendix E Open Source Licences NSA320 User’s Guide 489 and each file should hav e at least the “copyright” line and a pointer to where the full notice is found. <one line to giv e the progr am's name and a brief idea of what it does.> Copyright (C) <year> <name of author> This program is free softw a re: you can redist[...]

  • Page 490

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 490 The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, your progr am's commands might be different; for a GUI interface, y ou would use an “about box” . Y ou should also get your employer (if yo u wor[...]

  • Page 491

    Appendix E Open Source Licences NSA320 User’s Guide 491 THEORY OF LIABILITY , WHE THER IN CO NTRACT , STRICT LIABILITY , OR TOR T (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY W A Y OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS SIBILITY OF SUCH DAMAGE. This Product incl udes flac software under FDL license GNU Free Documentatio[...]

  • Page 492

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 492 below , refers to any such manual or work. Any member of the pub lic is a licensee, and is addressed as "you". Y ou accept the license if you copy , modify or distribute the work in a way requiring pe rmission under copyright law . A "Modified V ersion" of the Documen[...]

  • Page 493

    Appendix E Open Source Licences NSA320 User’s Guide 493 and JPG. Opaque formats include proprietar y ormats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/ or processing tools are not gener ally a vailable, and the machi ne-generated HTML, P ostScript or PDF produced by some word processors for [...]

  • Page 494

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 494 long as they preserve the title of the Document and satisfy t hese conditions, can be treated as verb at im c o py i ng in othe r respects. If the required texts for either cov er are t oo voluminous to fit le gibly , you should put the first ones li sted (as many as fi t reaso na bly) o[...]

  • Page 495

    Appendix E Open Source Licences NSA320 User’s Guide 495 C. State on the Title page the name of the publisher of the Modified V ersion, as the publisher . D. Preserve all the copyrigh t notices of the Document. E. Add an appropriate copyright notice for your modi fications adjacent to the other copyright notices. F . Include, immediately after the[...]

  • Page 496

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 496 If the Modified V ersion includes new fron t- matter sections or appendices that qualify as Secondary Sections and contain no material copied from the Document, you may at y our option designate some or all of these sections as in v ariant. T o do this , add their titles to the list of I[...]

  • Page 497

    Appendix E Open Source Licences NSA320 User’s Guide 497 6. COLLECTIONS OF DOCUMENTS Y ou may make a collection consisting of the Document and oth er documen ts released under this License, and replace the individual copies of this License in the various documents with a si ng le co py that is inclu ded in the c ollectio n, provid ed that you foll[...]

  • Page 498

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 498 its Title (sec tion 1) will typically req uire changing the actual title. 9. TERMINA TION Y ou may not copy , modify , sublicense, or distribute the Doc ument except as expressly provided for under this License. Any other attempt to copy , modify , sublicense or dis tribute the Document [...]

  • Page 499

    Appendix E Open Source Licences NSA320 User’s Guide 499 with the Inv ariant Sections being LIST THEIR TITLES, with the Front -Cover T exts being LIST , and with the Back -Cover T exts being LIST . If you have In v ariant Sectio ns without Cover T exts, or so me other combination of the three, merge those two alternativ es to suit the situation. I[...]

  • Page 500

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 500 Code. 1.6. "Init ial Developer" means t he individual or entity identified as the Initial Dev eloper in the Source Code noti ce required by Exhibit A. 1.7. "Larger W ork" means a work which combines Covered Code or portions thereof with code not governed by the terms [...]

  • Page 501

    Appendix E Open Source Licences NSA320 User’s Guide 501 and appar atus claims, in any pat ent Licensable by gr antor . 1.11. "Source Code" means the preferred form of the Cove red Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation an[...]

  • Page 502

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 502 (a) under intellectual propert y rights (other than patent or tr ademark) Licensable by Initial Developer to us e, reproduce, modif y , display , perfor m, sublicense and distribute the Original Cod e (or portions thereo f ) with or without Modifications, and/or as part of a Larger W ork[...]

  • Page 503

    Appendix E Open Source Licences NSA320 User’s Guide 503 and/ or as part of a Larger W ork; and (b) under Patent Clai ms infringed by the making, using, or selli ng of Modifications made by that Contributor either alone and/ or in combination with its Contributor V ersion (or portions of s uch combination), to mak e, use, sell, offer for sale, ha [...]

  • Page 504

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 504 Section 2 .2. The Source Co de v ersion of Covered Code may be distributed only under the terms of this License or a f uture version of this License released under Section 6.1, and Y ou must include a copy of this License with every copy of t he Source Code Y ou distribute. Y ou may not [...]

  • Page 505

    Appendix E Open Source Licences NSA320 User’s Guide 505 the Modificati on is derived, directly or indirectly , from Original Code provided b y the Initial Developer and including the name of the Initial Develop er in (a) the So urce Code, and (b) in an y notice in an Executable v ersion or related documentation in which Y ou describe the origin o[...]

  • Page 506

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 506 (c) R epresentations. Contri butor represents that , except as disc losed pursuant to Secti on 3.4(a) above, Contributor bel ieves that Contributor's Modi fications are Contributor's original c reation(s) and/or Contri butor has sufficient rig hts to grant the rights convey ed [...]

  • Page 507

    Appendix E Open Source Licences NSA320 User’s Guide 507 3.6. Distribution of Executable V ersions. Y ou may dist ribute Cov ered Code in Executable form only if the requirements of Section 3.1-3.5 hav e been met for that Cov ered Code, and if Y ou include a notice st ating that the Source Code v ersion of the Cov ered Code is av ailable under the[...]

  • Page 508

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 508 W ork as a single product. In such a case, Y ou must make sure the requirements of this License are fulfilled for the Covered Code. 4. Inability to Com p l y Du e to Statute or Regulation. If it is impossible for Y ou to comply with any of the terms of this License with respect to some o[...]

  • Page 509

    Appendix E Open Source Licences NSA320 User’s Guide 509 vers ion. Y ou may also choose to use such Covered Code under the terms of an y subsequent version of th e License published by Netscape. No one other than Netscape has the ri ght to modify the terms appli cable to Cov ered Code created under this License. 6.3. Deriv ative W orks. If Y ou cr[...]

  • Page 510

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 510 LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 8. TERMINA TION. 8.1. This License and the ri ghts gr anted hereunder will terminate automatically if Y ou fail to co mply with terms herein and fai l to cure such breach within 30 d ays of becoming[...]

  • Page 511

    Appendix E Open Source Licences NSA320 User’s Guide 51 1 Sections 2.1 and/or 2.2 automaticall y terminate at the expir ation of the 60 day notice period specified abo ve. (b) an y software, hardware, or device, ot her than such Particip ant's Contributor V ersion, direc t ly or indirect ly infrin ge s any patent, th en any rights granted to [...]

  • Page 512

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 512 ANY PERSON FOR ANY IN DIRECT , SPECIAL, INCIDENT AL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUD ING, WITHOUT LIMIT A TION, DAMAGES FOR LOSS OF GOOD WILL, WORK ST OPP AGE, COMPUTER F AILURE OR MALFUNCTION, OR ANY AND ALL O THER COMMERCIAL DAMAGES OR LOSSES , EVEN IF SUCH P ARTY SHAL[...]

  • Page 513

    Appendix E Open Source Licences NSA320 User’s Guide 513 District of Cali fornia, with venue lying in Santa Clar a County , California, with t he losing party responsible for costs, including without limitati on, court cost s and reasonable at torneys' fees and expenses. The applic ation of the United Nations Convention on Contr acts for the [...]

  • Page 514

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 514 compliance with the License. Y ou may obtain a cop y of the License at http://www .mozilla.org/MPL/ Softw are distributed under the License is distri buted on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, eit her express or implied. See the License for the specific language g[...]

  • Page 515

    Appendix E Open Source Licences NSA320 User’s Guide 515 This Product includes DBD-mysql softw are under below license Copyright (c) 2003 R udolf Lippan Copyright (c) 1997-2003 Jochen Wiedmann Y ou may distribute under the te rms of either the GNU General Public License or the Artis tic License, as speci fied in the P erl README file. This Product[...]

  • Page 516

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 516 common command code (sg_cmds_basic.[hc] and sg_cmds_extr a.[hc]) and later utili ties. They are Copyright: Douglas Gil bert. The author's intention is that th e BSD licensed code can be used freely by others. On Debian syst ems, the complete text of the BSD License can be found in `[...]

  • Page 517

    Appendix E Open Source Licences NSA320 User’s Guide 517 o T ransition o Acknowledgements INTRODUCTION The Boost Software License specifies the terms and conditions of use for those Boost librari es that it co vers. Currently , some Boost libraries have their own licenses. The hope is that ev e nt u a l ly a l l B o o s t l i b ra r ie s w il l b [...]

  • Page 518

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 518 obtaining a c opy of the software and acco mpa nying documentation covered by this license (the "Sof tware") to use, reproduce, display , distribut e, execute, and tr ansmit the Software, and to prepare derivativ e works of the Software, and to permit third- parties to whom the[...]

  • Page 519

    Appendix E Open Source Licences NSA320 User’s Guide 519 will w ant to c arefull y revie w each li cense, e ven i f they' ve been tol d that they 're all standard. I would expect that, unl ess we'r e remarkably brilliant (or lucky) in drafting the standa rd Boo st license, th e standard lice ns e won 't satisfy the le gal depar[...]

  • Page 520

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 520 How should Boost programmers apply the license to source and header fi les? Add a comment based on the foll owing template , substituting appropriat e text for the italicized portion: // Copyright Joe Coder 2004 - 2006. // Distributed under the Boost Software License, V ersion 1.0. // (S[...]

  • Page 521

    Appendix E Open Source Licences NSA320 User’s Guide 521 detailed wording was rejected as not being legally necessary , and reduc ing readability . Why is t he "disclaimer" paragr aph of the license entirely in uppercase? Capitalization of these particul ar provisio ns is a US legal mandate for consumer protection. (Diane Cabell) Does th[...]

  • Page 522

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 522 TRANSITION T o ease the tr ansition of the code base towards the new common license, sev eral people decided to give a blanket permi ssi on for all their contributions to use the new license. This hopefully he lps maintainers to swi t ch to the new license once the list contains enough n[...]

  • Page 523

    Appendix E Open Source Licences NSA320 User’s Guide 523 with or without fee is hereby grante d, provided that the abov e copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS ", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED , INCLUDING BUT NOT LIMITED TO THE W ARRANTIES OF MERCHANT ABILITY [...]

  • Page 524

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 524 Ye s ! libcurl does not put any restri ctions on the progr am that uses the library . 6.4 I have a progr am that uses L G PL libr aries, can I us e lib curl? Ye s ! The LGPL li cense doesn't clash with other licen ses. 6.5 Can I modify curl/libcurl for my progr am and keep the chang[...]

  • Page 525

    Appendix E Open Source Licences NSA320 User’s Guide 525 code. Y ou do not have to reveal or mak e pu blic that you are using libcurl within your ap p. As can be seen here: http://curl.haxx.se/docs/companies.html and elsewhere, more and more companies are discovering the power of libcurl and take adv antage of it even in commercial environments. T[...]

  • Page 526

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 526 V ersion 2.0, January 2004 ht tp://www .apache.org/licenses/ TERMS AND CONDITIONS FOR US E, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the term s and conditions f or use, reproduction, and distri bution as defined by Sections 1 through 9 of this documen[...]

  • Page 527

    Appendix E Open Source Licences NSA320 User’s Guide 527 and con versions to other media types. "W ork" shall mean the work of authorship, whether in Source or Object form, made avai lable under the License, as i ndicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). &qu[...]

  • Page 528

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 528 "Contri butor" shall mean Lice nsor and any individual or Legal Entit y on behalf of whom a Contribu tion has been received by Licensor and subsequent ly incorporated withi n the W ork. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Co [...]

  • Page 529

    Appendix E Open Source Licences NSA320 User’s Guide 529 W ork or Derivative W orks thereof in any medium, wi th or without modifica tions, and in Source or Object f orm, provided that Y ou meet the following co nditions: (a) Y ou must give an y other recipients of t he W ork or Deriv ativ e W orks a copy of this License; and (b) Y ou must cause a[...]

  • Page 530

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 530 or as an addendum to t he NOTICE text from the W ork, pro vided th at such additional attri bution notices cannot b e construed as modi fying the License. Y ou may add Y our own copyright statement to Y our modifications and may pro vide additional or different license terms and conditio[...]

  • Page 531

    Appendix E Open Source Licences NSA320 User’s Guide 531 of TITLE, NON- INFRINGEMENT , MERCHANT ABILITY , or FITNESS FOR A P AR TICULAR PURPOSE. Y ou are solely responsible for determining the approp riateness of using or redistributing the W ork and assume any risks associat ed with Y our exercise of permissions under this L icense. 8. Limitation[...]

  • Page 532

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 532 END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. T o apply t he Apache Licens e to your work, attach the following boilerplat e notice, with the fi elds enclosed by br ackets "[]" replaced with your own ident ifying information. (Don't in[...]

  • Page 533

    Appendix E Open Source Licences NSA320 User’s Guide 533 For t he mod_mime_magic component: /* * mod_mime_magic: MIME type lookup via fi le magic numbers * Copyright (c) 1996-1997 Cisco Sys tems, Inc. * * This softwa re was submitted by Cisco S ystems to the Apache Group i n July * 1997. Future revisions and deri va tives of this source code must [...]

  • Page 534

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 534 * * 2. The origin of this software must not be misrep resented, either by * explicit claim or b y omission. Since few users ever read sources, cred its * must appear in the documentation. * * 3. Altered versions must be plai nly mark ed as such, and must not be * misrepresent ed as being[...]

  • Page 535

    Appendix E Open Source Licences NSA320 User’s Guide 535 * httpd@ncsa.uiuc.edu * * Copyright (C) 1995, Board of T rustees of the University of Illinois * ***************************************************************** ******* * * md5.c: NCSA HT TPd code which uses the md5c.c RSA Code * * Original Code Copyright ( C) 1994, Jeff Hostetler , Spygla[...]

  • Page 536

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 536 * and that both that copyri ght notice and this permi ssion notice * appear in supporting doc umentat ion, and that the name of Carnegie * Mellon Univer sity not be used in advertis ing or p ublicity * pertaining to distri bu tion of the soft ware with out specific, * written prior permi[...]

  • Page 537

    Appendix E Open Source Licences NSA320 User’s Guide 537 * P ermission to use, copy , modify , and distribute this mat erial * for any purpose and wit hout fee is hereby gr anted, provided * that the abov e copyright noti ce and this permission notice * appear in all copies, and that the name of Bellcore not be * used in adv ertising or publicit y[...]

  • Page 538

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 538 Algorithm" in all material mentioning or referencing this soft ware or this function. License is also granted t o make and use deriv ative works provided that such work s are identified as "deri ved from the RS A Data Security , Inc. MD5 Message-D igest Algorithm" in all m[...]

  • Page 539

    Appendix E Open Source Licences NSA320 User’s Guide 539 */ /* Copyright (C) 1991- 2, RSA Data Securit y , Inc. Created 1991. All rights reserved. License to copy and use this s o ftware is gr anted provided that it is identified as the "RSA Data Security , Inc. MD5 Messag e-Digest Algorithm" in all material mentioning or referencing thi[...]

  • Page 540

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 540 * can do whatever y ou want with this stuff . If we meet some da y , and you think * this stuff is worth it, you can buy me a beer in return. Poul-Henning K amp * --------------- -------------- --- ------------- --- ------------- --- ------------ */ For t he srclibapr-utilcryptoap r_m[...]

  • Page 541

    Appendix E Open Source Licences NSA320 User’s Guide 541 * software for an y particular purpose. It is provided "as is" * without express or implied w arranty of any kind. * * These notices must be retained in any copies of an y part of this * documentation and/or software. */ For t he srclibapr-utilincl udeapr_md4.h component: * * Th[...]

  • Page 542

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 542 * * RSA Data Security , Inc. make s no representations concerning either * the merchantability of this so ftware or the suitabilit y of this * software for an y particular purpose. It is provided "as is" * without express or implied w arranty of any kind. * * These notices must[...]

  • Page 543

    Appendix E Open Source Licences NSA320 User’s Guide 543 * These notices must be retained in any copies of an y part of this * documentation and/or software. */ For t he srclibapr-utilxml expatconftoolsinstall-sh component: # # install - install a program, scrip t, or datafile # This comes from X11R5 (mit/util/ scripts/install.sh). # # Copyri[...]

  • Page 544

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 544 # # Copyright 1991 by the Massachusetts Institute of T echnology # # P ermission to use, cop y , modify , dist ribute, and sell this softw are and its # documentation for an y purpose is hereby gr anted without fee, pro vided that # the above c opyright notice appear in all copies and th[...]

  • Page 545

    Appendix E Open Source Licences NSA320 User’s Guide 545 W ritten by: Philip Hazel <ph10@cam.ac.uk> University of Cambri dge Computing Service, Cambridge, England. Phone: +44 1 223 334714. Copyright (c) 1997-2004 Univ ersity of Cambridge All rights reserved. Re di stribution and use in source an d binary forms, with or without modification, [...]

  • Page 546

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 546 IMPLIED WARR ANTIES OF MERCHANT ABILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED . IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUT ORS BE LIABLE FOR ANY DIRECT , IND IRECT , IN CIDENT AL, SPECIAL, EXEMPLARY , OR CONSEQUENTIAL DAMAGES (INCLUDIN G, BUT NO T LIMITED T O, PRO[...]

  • Page 547

    Appendix E Open Source Licences NSA320 User’s Guide 547 is not removed. This software is pro vided "as is" and any express or implied war anties, including but not limi ted to, the implied warr anties of merchantabilit y and fitness for a particul ar purpose ar e disclaimed. In no ev ent shall Z eus T echnology Ltd. be liab le for an y [...]

  • Page 548

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 548 P ermission is hereby granted, free of charge, to any person obtai ning a copy of this software and associated documentation fil es (the "Software"), to deal in the Softwa re wit hout restriction, including without limitation the rights to use, copy , modify , merge, publish, d[...]

  • Page 549

    Appendix E Open Source Licences NSA320 User’s Guide 549 Copyright (c) 2000, 2001, 2002, 2003, 2004 by Martin C. Shepherd. All rights reserved. P ermission is hereby granted, free of charge, to any person obtai ning a copy of this soft ware and associated documentation files (the "Software"), to deal in the Softwa re wit hout restriction[...]

  • Page 550

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 550 WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Except as contained i n this notice, the name of a copyright holder shall not be used in adv ertising or otherwise to promote t he sale, use or other dealings in this Softw are without prior wri tten authorization of the copyright holder . Th[...]

  • Page 551

    Appendix E Open Source Licences NSA320 User’s Guide 551 THIS SOF TWARE IS PROVIDED BY THE COPYRIGH T HOLDERS AND CONTRIBUT ORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIE S, INCLUDING, BUT NO T LIMITED TO , THE IMPLIED WARR ANTIES OF MERCHANT ABILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED . IN NO EVENT SHALL THE COPYRIGH[...]

  • Page 552

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 552 * Re dist ributions in binary form must reproduce the above copyright noti ce, this list of conditions and the fo llowing disclaimer in the documentati on and/or other materials pro vided with the distribution. * Neither name of Intel Corporation nor the names of its contributors may be [...]

  • Page 553

    Appendix E Open Source Licences NSA320 User’s Guide 553 with different Copyright notices) all the files are: Copyright (C) 1998-2003 Daniel V eill ard. All Rights Reserv ed. P ermission is hereby granted, free of charge, to any person obtai ning a copy of this software and associated docume ntation files (the "Software"), to deal in the[...]

  • Page 554

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 554 The following individuals contrib uted in part to the Network Time Protoc ol Distribution V ersion 4 and are acknow ledged as authors of this work. 1.Mark Andrews <mark_andrews@isc.org> Leitch atomic clock controller 2.Bernd Altm e ier <altmei er@ atlsoft.de> h opf Elektron i[...]

  • Page 555

    Appendix E Open Source Licences NSA320 User’s Guide 555 20.Glenn Holl inger <glenn @heral d.usask.ca> GOES cloc k driver 21.Mike Iglesias <iglesias@uci.edu> DEC Alpha port 22.Jim Jagielski <jim@jagubox.gsfc.nas a.gov> A/UX port 23.Jeff Johnson <jb j@chatham.usdesign.com> massiv e prototyping overhaul 24.Hans Lambermont <[...]

  • Page 556

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 556 40.R ob Neal <neal@ntp.org> Bancomm refclock and config/parse code maintenance 41.Rainer Pruy <Rainer .Pruy@informatik.uni-erlangen.de> m onitoring/trap scripts, s tatistics file handling 42.Dirce Ric hards <dirce@zk3.dec .com> Digital UNIX V4.0 port 43.Wilfredo Sánche[...]

  • Page 557

    Appendix E Open Source Licences NSA320 User’s Guide 557 2. R edistributions in binary form must reproduce all prior and current copyright notices, this list of c onditions, and the following dis claimer in the documentation and/or other materials provided wit h the distribution. 3. The name of any author may not be used to endorse or promote prod[...]

  • Page 558

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 558 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WAR R A N TI E S * WITH REGARD T O THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANT ABILITY AND FITNESS . IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL , DIRECT , INDIRECT , OR CONSEQU ENTIAL[...]

  • Page 559

    Appendix E Open Source Licences NSA320 User’s Guide 559 might fa ll un der other li c e n ses. The de ta ils here are unclear . W e do not worry about the licensing of the documentation an d build code so much because none of these things are part of the core deliver able SQLite libr ary . All of the deliver able code in SQLite ha s been written [...]

  • Page 560

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 560 insufficient. Y ou must also send by surf ace mail a copyright release si gned by a company officer . A signed original of the copyright release should be mailed to: Hwaci 6200 Maple Cov e Lane Charlotte, NC 28269 USA A template copyright release is a v ailable in PDF or HTML. Y ou can u[...]

  • Page 561

    Appendix E Open Source Licences NSA320 User’s Guide 561 1.I dedicate to t he public domain any an d all copyright interest in the SQLite software that was publicly a vailable on the SQLite website (http ://www .sqlite.org/ ) prior to the date of the si gnature belo w and any changes or enhancements to the SQLite software t hat I may cause to b e [...]

  • Page 562

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 562 === asctime.c========== === date.c ========== /* * Copyright (c) 1985, 1987, 1988 The R ege nts of the Universit y of California. * All rights reserved. * * Redis tributi on and use in sour ce and binary forms are permitted * provided that the abo ve copyright notice and this par agr aph[...]

  • Page 563

    Appendix E Open Source Licences NSA320 User’s Guide 563 /* ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur Da vid Olson. */ ================== ====== logwtmp.c ===== /* * Copyright (c) 1988 The Regents of the Univ ersity of California. * All rights reserved. * * Redis tributi on and use in sour ce and binary forms[...]

  • Page 564

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 564 ** 1996-06-05 by Arthur Da vid Olson. ====== private.h ===== ======tzfile.h ===== ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur Da vid Olson. ====== tzfile.h ===== This Product includes crypto++ software under below license License The License of Crypto[...]

  • Page 565

    Appendix E Open Source Licences NSA320 User’s Guide 565 and their use is subject to addition al licenses incl uded in these files. mars.cpp - Copyright 1998 Brian Gladman. All other files in this compilation are placed in the public domain b y W ei Dai and other contributors. I would like to thank the following authors for placing their works int[...]

  • Page 566

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 566 they provide to W ei Dai will be considered public domain and not copyrighted unless it includes an explicit copyri ght notice. 3. W ei Dai makes no warr anty or representation that the operat ion of the software in this compilation will be error-free, and W ei Dai is under no obligation[...]

  • Page 567

    Appendix E Open Source Licences NSA320 User’s Guide 567 This Product includes wxWidgets softwa re under below license Licence Background wxWidgets is currently licensed under the "wxWindows Licence" pending approv al of the "wxWidgets Licenc e" which will be identical apart from the name. The wxWindows Licence is essentially t[...]

  • Page 568

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 568 your option) an y later v e rsion. This libr ary is distribute d in the hope that it will be useful, but WITHOUT ANY W ARRANTY ; without even the implied warr anty of MERCHANT ABILITY or FITNESS FOR A P AR TICULAR PURPOSE. See the GNU Libr ary General Public Licence for more details. Y o[...]

  • Page 569

    Appendix E Open Source Licences NSA320 User’s Guide 569 accordingly . 4. If you write modifications of your own for this libr ary , it is your choice whether to permit this ex cept ion to apply to your modifications. If you do not wish that, you must d elete the excep tion notice from such code and/or adjust the licensin g conditi ons notice acco[...]

  • Page 570

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 570 are (c) of their respective authors, and are included in Squeezebox Server per their respective licenses. - Certain ancillary progr ams included in the Squeezebox Serv er distribution on our web site are licensed to us only for direct distribution to end-users. These include the Wi ndows[...]

  • Page 571

    Appendix E Open Source Licences NSA320 User’s Guide 571 modified source files can be found at http://www .slimdevices.co m/opensource/fixed_ math.tar .gz. - The following applies t o Squeezebox2 di stribution: This product is protected by certain i ntellectual property rights of Microsoft Corporation. Use or distri bution of such te chnology outs[...]

  • Page 572

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 572 When we speak of f ree software, we are refe rring to freedom , not price. Our Gener al Public Licenses are designed to make sure that you have the freedom to dist ribute copies of free softw are (and charge for this service if you wi sh), that you recei ve source code or can get it if y[...]

  • Page 573

    Appendix E Open Source Licences NSA320 User’s Guide 573 patents. W e wish to avoid the da nger that redis tributors of a free program wil l individually obtai n pate nt licenses, in effect making the program propri etary . T o prevent this, we have made it clear that any patent must be licensed for everyon e 's fr ee use or not licensed at a[...]

  • Page 574

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 574 source code as you receiv e it, in any medium, pro vided that you conspicuously and appropriately pub lish on each copy an appropriate copyright n otice and di s c laim e r of warranty; keep intact all th e notices that refer to this License and to the absence of any warranty; and give a[...]

  • Page 575

    Appendix E Open Source Licences NSA320 User’s Guide 575 License. (Ex ception: if the Progr am itself is inter active but does not normal ly print such an announcement, y our work based on the Progr am is not requir ed to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not[...]

  • Page 576

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 576 source code, whi ch must be distributed under the terms of Sections 1 and 2 abo ve on a medi um customarily used for softw are interchange; or , b) Accompan y it with a written offer , vali d for at least three years, to giv e any third party , for a charge no more than y our cost of ph [...]

  • Page 577

    Appendix E Open Source Licences NSA320 User’s Guide 577 If distribution of executable or object code is made by offering access to copy from a designated place, then offering equiv alent access to copy the source code from the same place counts as distribution of t he source code, even though third p arties are not compelled to copy the source al[...]

  • Page 578

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 578 original licensor to cop y , distribu te or modify the Progr am subject to these terms and conditions. Y ou may not impose any further restrictions on the recipients' exer cise of the rights gr anted herein. Y ou are not responsible for enforcin g compliance by third parties to this[...]

  • Page 579

    Appendix E Open Source Licences NSA320 User’s Guide 579 patents or other property ri ght claims or to contest v alidity of an y such claims; this section has the sol e purpose of protecting the integrity of t he free software distribution system, which is implemented by public l icense prac tices. Man y people hav e made generous contributions to[...]

  • Page 580

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 580 Each version is giv en a distinguishing v ersion number . If the Program specifies a v ersion number of this License which appli es to it and "any later version", y ou have the option of following the terms and conditi ons either of that version or of an y later version publish[...]

  • Page 581

    Appendix E Open Source Licences NSA320 User’s Guide 581 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR AN Y OT HER P ARTY WHO MA Y MODIFY AND/ OR REDISTRIB UTE THE PROGRAM AS PERMIT TED ABOVE, BE LIABLE TO Y OU FOR DAMAGES, INCLUDIN G ANY GENERAL, SPECIAL, INCIDENT AL OR CONSEQUENTIAL DAMAG[...]

  • Page 582

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 582 #------------- ------------- ---------------- -------------- ---------- The Code2000 font is copyright James K ass, di stributed by permission of the author . Details about Code2000 may be found in Gr aphics/CODE2000.HTM This Product includes php software under below license • PHP 4 an[...]

  • Page 583

    Appendix E Open Source Licences NSA320 User’s Guide 583 the documentation and/ or other materials provi ded with the distributi on. 3. The name "PHP" mus t not be used to endorse or promote products derived from this software without prior written permission. F or written permission, p lease contact group@php.net. 4. Products deri ved f[...]

  • Page 584

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 584 ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NO T LIMITED T O, THE IMPLIED W ARRANTIES OF MERCHANT ABILITY AND FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR IT S CONTRIBU T ORS BE LIABLE FOR ANY DIRECT , INDIRECT , INCIDENT AL, SP[...]

  • Page 585

    Appendix E Open Source Licences NSA320 User’s Guide 585 a) the GNU General Public License as pub lished by the Free Software Foundation; either version 1, or (at y our option) any later version, or b) the "Artistic License". Fo r those of you that c hoose to use the GNU Gener al Public L icense, m y interpretation of t he GNU General Pu[...]

  • Page 586

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 586 R oelofs. P ortions relating to gdttf .c copyright 1999, 2000, 2001, 2002 John Ellson (ellson@lucent.c om). P ortions relating to g dft.c copyright 2001, 2002 John Ellson (ellson@lucent.com). Portions copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Pierre-Alain Jo y e (pierre@li[...]

  • Page 587

    Appendix E Open Source Licences NSA320 User’s Guide 587 limited to i mplied warr anties of merchantabilit y and fitness for a particular purpose, wit h respect to this code and accompanying documentation. Although their code does not a ppear in gd, the authors wish to thank David K oblas, David R owley , and Hutchison A venue Software Corp oratio[...]

  • Page 588

    Appendix E Ope n So ur ce Licence s NSA320 User’s Guide 588[...]

  • Page 589

    NSA320 User’s Guide 589 A PPENDIX F Legal Information Copyright Copyright © 2010 by Z yXEL Communications Corpor ation. The contents of this publication ma y not be reproduced in any part or as a whole, transcrib ed, stored in a retriev al syst em, tr anslated into an y language , or transmitted in an y form or by any me ans, electronic, mechani[...]

  • Page 590

    Appendix F Legal Information NSA320 User’s Guide 590 • This device ma y not cause harmful interference. • This device m u st accept any in terference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Clas s B digital device pursuant to P art 15 of th e F[...]

  • Page 591

    Appendix F Legal Information NSA320 User’s Guide 591 including any implied w arr anty of merchantability or fitness for a particul ar use or purpose. Z yXEL shall in no event be hel d liable for indirect or consequential damages of any ki nd to the purchaser . T o obtain the services of this w arr anty , contac t your vend or . Y ou may a lso r e[...]

  • Page 592

    Appendix F Legal Information NSA320 User’s Guide 592[...]

  • Page 593

    Index NSA320 User’s Guide 593 Index Numerics 3-D photo wall 57 A access rights 62 Flickr 291 shares 315 , 316 Y ouT ube 295 activation download service 192 Flickr/Y ouT ube 286 FTP 188 FTP U plo adr 297 recycle bins 61 , 31 4 web publishing 205 ANONYMOUS FTP 362 anonymous FTP access 189 application zone 63 applications 185 , 285 auto upload Flick[...]

  • Page 594

    Index NSA320 User’s Guide 594 backup settings 332 bandwidth limit 300 BitT orrent 187 IP filtering 201 , 202 protection 221 , 222 re-seeding 192 settings 200 torrent files 195 , 21 9 health 203 info-hash 204 track ers 204 broadcatching 187 , 206 adding channels 192 , 207 , 208 channel guides 226 RSS 188 browser plugin, capturing link 219 browsing[...]

  • Page 595

    Index NSA320 User’s Guide 595 E Exchangeable image file format, see Exif Exif 56 explicit TLS/SSL 133 external volumes 166 F fan speed 151 file troubleshooting access 363 file browser configure share 61 share browser 58 File T ransfer Protocol over Explicit TLS, see FTPE S File T ransfer Protocol over TLS, see FTPS files downloading 60 uploading [...]

  • Page 596

    Index NSA320 User’s Guide 596 K Ke n B u r n s 65 L lag, time 153 language 65 latitude 56 LEDs 25 link capture browser plugin 219 login 50 logs 328 longitude 56 M maintenance 323 backup settings 332 logs 328 power management 324 , 376 failure 325 resume 325 schedule 326 UPS 325 reset 332 restoring settings 332 shutdown 337 upgrading firmware 336 [...]

  • Page 597

    Index NSA320 User’s Guide 597 public key certificate 334 editing 335 R RAID 164 , 168 degraded 165 RAID 0 169 , 171 RAID 1 169 , 171 , 172 recovering 160 replacing disks 160 resynchronization 160 recycle bins 318 activation 61 , 314 configuration 312 , 318 related documentation 3 replacing disks 160 reset 27 , 332 restoring by backup files tutori[...]

  • Page 598

    Index NSA320 User’s Guide 598 striping 170 synchronization 216 , 229 configuration 216 directions 217 single direction 229 tutorial 138 two directions 230 system date/time 155 login 50 master browser 154 password 51 reset 27 server name 154 settings 153 status 150 time lag 153 workgroup name 154 system settings 64 T TCP / I P 175 temperature CPU [...]

  • Page 599

    Index NSA320 User’s Guide 599 duplexing 170 mirroring 170 parity 170 striping 170 W web config urator 49 icons 53 login 50 navigation panel 67 password 51 , 64 status 66 web publishing 187 , 204 , 225 activation 205 example 223 port number 225 troubleshooting 369 web security 127 wizard 32 workgroup name 154 Y Y ouT ube 285 access rights 295 acti[...]