Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
ZyXEL Communications NSA-220 manuale d’uso - BKManuals

ZyXEL Communications NSA-220 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso ZyXEL Communications NSA-220. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica ZyXEL Communications NSA-220 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso ZyXEL Communications NSA-220 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso ZyXEL Communications NSA-220 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo ZyXEL Communications NSA-220
- nome del fabbricante e anno di fabbricazione ZyXEL Communications NSA-220
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature ZyXEL Communications NSA-220
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio ZyXEL Communications NSA-220 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti ZyXEL Communications NSA-220 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio ZyXEL Communications in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche ZyXEL Communications NSA-220, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo ZyXEL Communications NSA-220, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso ZyXEL Communications NSA-220. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    www .zyxel.com NSA -220 Network S torage Appliance User ’ s Guide V ersion 1.00 3/2007 Edition 1[...]

  • Pagina 2

    [...]

  • Pagina 3

    About This User's Guide NSA-220 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the web configurator . A basic knowledge of TCP/IP netw orking concepts and topology will be helpful. Related Document ation • Quick Start Guide The Quick S tart Guide is desig[...]

  • Pagina 4

    Document Conventions NSA-220 User’s Guide 4 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User ’ s Guide. 1 W arnings tell you about things that could harm you or your device. " Notes tell you other important informati on (for example, other things you may need to configure or helpful tip s) or[...]

  • Pagina 5

    Document Conventions NSA-220 User’s Guide 5 Icons Used in Figures Figures in this User ’ s Guide may use the follo wing generic icons. The NSA icon is not an exact representation of your device. NSA Computer Notebook computer Server Te l e v i s i o n Firewall Router Switch[...]

  • Pagina 6

    Safety Warnings NSA-220 User’s Guide 6 Safety Warnings 1 For your safety , be sure to read and follow all warni ng notices and instructions. • Do NOT use this product near water , for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store thin gs on the device. [...]

  • Pagina 7

    Safety Warnings NSA-220 User’s Guide 7[...]

  • Pagina 8

    Safety Warnings NSA-220 User’s Guide 8[...]

  • Pagina 9

    Contents Overview NSA-220 User’s Guide 9 Contents Overview Introduction .......................................... ........................................................................ .......... 23 Getting to Know Y our NSA ................. ................ ................ ............. ................ ................ ........ .. 25 Web C[...]

  • Pagina 10

    Contents Overview NSA-220 User’s Guide 10[...]

  • Pagina 11

    Table of Contents NSA-220 User’s Guide 11 Table of Contents About This User's Guide ........................................................................... ............................... 3 Document Conventions.................................................................. ......................................... .4 Safety Warnings .[...]

  • Pagina 12

    Table of Contents NSA-220 User’s Guide 12 2.6.2 Navigation Panel ....................... .......... ...... ............. ................ ............. ................ ....... 40 2.6.3 Main Window ... ............. ................ ................. ............. ................ ................ ............. .. .4 2 2.6.4 S tatus Messages ....[...]

  • Pagina 13

    Table of Contents NSA-220 User’s Guide 13 6.4.3 RAID 1 ................. ................ ............. ................ ............. ................ ............. .......... ...... 67 6.4.4 RAID and Data Protection ......... ................ ............. ................ ................. ................ ... 67 6.5 Disks ................ ...[...]

  • Pagina 14

    Table of Contents NSA-220 User’s Guide 14 10.1 Shares Introduction .................... ............. ................ ................ ................ ................ ..... ..... 89 10.1.1 Share Icons ....................... ................ ... ............. ................ ............. ................ ........ .. 89 10.1.2 Shares Screen .[...]

  • Pagina 15

    Table of Contents NSA-220 User’s Guide 15 15.3.1 Reset the NSA .. ......... .... ................ ............. ................ ............. ................ ............... 1 1 4 15.3.2 Enabling Scripting of Safe ActiveX Cont rols .. ............. ................ ................ ............ 1 15 15.4 I Cannot Access The NSA ............. ..[...]

  • Pagina 16

    Table of Contents NSA-220 User’s Guide 16[...]

  • Pagina 17

    List of Figures NSA-220 User’s Guide 17 List of Figures Figure 1 Example of the NSA in a Home Network ....................... ............. ................ ............. ................ 25 Figure 2 NSA Front Panel .................... ................ ................ ................. ............ ................. ... ................ 26 Figu[...]

  • Pagina 18

    List of Figure s NSA-220 User’s Guide 18 Figure 39 Delete a V olume W a rn ing Screen ......................... ............. ................ ................. ............ ... .... 62 Figure 40 Create a New Internal V olume .................... ................ ................ ................ ................ ... ....... 69 Figure 41 Edit an [...]

  • Pagina 19

    List of Figures NSA-220 User’s Guide 19 Figure 82 Red Hat 9.0: Checking TC P/I P Properties .................. ............. ................ ................ ........... 14 2 Figure 83 Pop-up Blocker ...... ... ............. ................ ............. ................ ................ ............. ...... ............... 143 Figure 84 Intern[...]

  • Pagina 20

    List of Figure s NSA-220 User’s Guide 20[...]

  • Pagina 21

    List of Tables NSA-220 User’s Guide 21 List of Tables T able 1 LEDs ..... ............ ................. ................ ............. ................ ................ ................ .. ..................... ... 27 T able 2 Us er-level Global Labels and Icons ...... ................ ................ ................ .................... .....[...]

  • Pagina 22

    List of Tables NSA-220 User’s Guide 22 T able 39 Maintenance > Configuration . ................ ................ ................. ................ ................ ....... ....... 101 T able 40 Maintenance > FW Upgrade ......... ................ ................ ................... ................ ................ ..... 1 02 T able 41 Mai[...]

  • Pagina 23

    23 P ART I Introduction Getting to Know Y our NSA (25) W eb Configurator Basics (29) T utorials (43) St atus Screen (45)[...]

  • Pagina 24

    24[...]

  • Pagina 25

    NSA-220 User’s Guide 25 C HAPTER 1 Getting to Know Your NSA This chapter covers the main featur es and applications of the NSA. 1.1 NSA Overview The NSA (Network Storage Appliance) provides file sh aring and data backup for your home network. • Use SA T A (Serial Advanced T echnology Attachment) I or 3.0 Gbit/s hard disks. • RAID (Redundant A[...]

  • Pagina 26

    Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 26 " See the product specific ations appendix for a more detailed list of NSA features and lists of comp atible hard drives and USB devices. Refer to the Quick S tart Guide for hardware connections and how to install and remove hard drives from the disk trays. " T urn off and disco[...]

  • Pagina 27

    Chapter 1 Gettin g to Know Your NSA NSA-220 User’s Guide 27 Figure 3 NSA Rear Panel This table describes the NSA’ s LEDs. T able 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned o n and receiving po wer . Off The NSA is turned off. HDD1/ HDD2 Green On The hard disk drive is connected properly to the NSA. Blinking The NSA is s[...]

  • Pagina 28

    Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 28 1.1.2 COPY Button Use the COPY button on the front panel to copy f iles from a connected USB device to the NSA. The files are stored in a folder created w ithin the public share. The name of the folder created for the copied files consists of the date and time of the copy in year_month_da[...]

  • Pagina 29

    NSA-220 User’s Guide 29 C HAPTER 2 Web Configurator Basics This chapter describes how to access the NSA web configurator and provides an overview of its screens. 2.1 W eb Configurator Overview The web configur ator is an HTML-based manage ment interface that allows easy NSA setup and management via Inte rnet browser . Use Internet Explor er 6.0, [...]

  • Pagina 30

    Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 30 Figure 4 NDU Main Screen From the NDU main page click an icon under Admin to see the web configurator screen login screen. 2.2.2 Web Browser Access Open your browser and type in the server name of the NSA (“nsa220” is the default). Figure 5 NSA URL 2.3 Login The default username and [...]

  • Pagina 31

    Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 31 Figure 6 NSA Login Screen Y ou should see a screen asking you to change your pas sword (highly recommended) as shown next. T ype a new password (and retype it to confirm) and click Apply or click Ignor e . Figure 7 Change Password Screen 2.4 User-level Screens Overview All users (includin[...]

  • Pagina 32

    Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 32 Figure 8 My NSA " The web configurator managem ent session automatically ti mes out if it is left idle for 15 minutes. Simp ly log back into the NSA if this happens to you. The icons and language label at th e top-right of the screen ( ) are visible from most screens. Use the tabs a[...]

  • Pagina 33

    Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 33 2.5 My NSA Screen Use the My NSA screens to mana ge your shares and access the files in folders to which you have acce ss. A share is a set of user access permissions for a specific folder on a volume (gives someone access to a folder). It is equivalent to the W indows concept of a shared[...]

  • Pagina 34

    Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 34 2.5.1 My NSA Share Browsing Screen Click My NSA and then click a share to open the followi ng screen. Use the My NSA share browsing screens to see and access share contents. Figure 10 My NSA Share Browsing The following table describes the labels in this screen. 2.5.2 My NSA Management O[...]

  • Pagina 35

    Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 35 Figure 1 1 My NSA Management Overview The following table describes the labels in the this screen. 2.5.3 My NSA Change Share Properties Screen Use the My NSA Change Share Pr operties screen to configure sh are management details. Click My NSA and a share’ s Manage It button. Then click [...]

  • Pagina 36

    Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 36 Figure 12 My NSA Change Share Properties The following table describes the labels in the this screen. T able 6 My NSA Change Share Properties LABEL DESCRIPTION Share Name Configure a name to identify this share. T ype a share name from 1 to 255 single-byte (no Chinese characte rs allowed[...]

  • Pagina 37

    Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 37 2.5.4 Share and Folder Names The name ca n only contain the followi ng characters: • Alphanumeric (A-z 0-9) and Unicode. The NSA allows FTP access to shares, folders or files with names en coded in the UTF-8 (8-bit UCS/Unicode T ransformation Format) format. So your FTP c lient must sup[...]

  • Pagina 38

    Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 38 2.5.5 Share Paths A share path is the full path to a folder on a volume that will be shared, for example, /mynsa/ topsecret/ugs/. This is indepe ndent from a “share name” which is the name shown for this share when accessing the share via CIFS or FTP . The path should start with a &a[...]

  • Pagina 39

    Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 39 Figure 13 Password The following table describes the labels in this screen. 2.6 Administration Screens Click Administration in the user -level screens to open the advance d administration screens. If you are not logged in using an administrato r account, you will need to log in again. The[...]

  • Pagina 40

    Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 40 Figure 14 S tatus 2.6.1 Global Administration Icons The icons and language label at the top-right of the screen ( ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels. 2.6.2 Navigation Panel The navigation panel on t h e l[...]

  • Pagina 41

    Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 41 Click the St a t u s icon to open the St a t u s screens. Figure 15 Navigation Panel Links The following table describes the navigation panel screens. T able 9 Screens Summary LINK TA B FU NCTION S tatus This screen shows system information, the status of the volumes, and the users wh o a[...]

  • Pagina 42

    Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 42 2.6.3 Main Window The main window () shows the screen you select in the na viga tion panel. It is disc ussed in the rest of this document. Right after you log in, the St a t u s screen is displayed. See Chapter 4 on pa ge 51 for more information about the St a t u s screen. 2.6.4 St atus[...]

  • Pagina 43

    NSA-220 User’s Guide 43 C HAPTER 3 Tutorials This chapter provides tutorials that show how to use the NSA. 3.1 T utorials Introduction The following tutorials cover how yo u use the NS A for file sharing. This chapter assumes you have already followed the Quick S tart Guid e instructions to perform initial setup and configuration (so you h ave a [...]

  • Pagina 44

    Chapter 3 Tutorials NSA-220 User’s Guide 44 Figure 17 Users 3 Configure the screen as follows and write down the username and password to give to Jimmy . If the username and password are th e same as Jimmy’ s W indows login, Jimmy will not need to enter a username and passw ord when he logs int o his share from his computer . Set the Account T [...]

  • Pagina 45

    Chapter 3 Tutorials NSA-220 User’s Guide 45 1 In the NSA’ s administration web configurator screens, click Shar es > Create a New Shar e . Figure 20 Shares 2 Specify a name for the share and select wh ich volume it should be on. Then click Browse . Figure 21 Shares > Create Example 3 T ype a name for a new folder and click Create Folder .[...]

  • Pagina 46

    Chapter 3 Tutorials NSA-220 User’s Guide 46 Figure 23 Shares > Create > Browse > New Folder Example 5 Configure the screen as follows and click Apply . Figure 24 Shares > Create Example Now that Bob has created Jimmy’ s share, he can go through the steps again to create another share for Kevin. Then he can see the rest of the tutori[...]

  • Pagina 47

    Chapter 3 Tutorials NSA-220 User’s Guide 47 2 Select the network drive that you want to map NSA to from the Dr ive list box. This example uses I . Then browse to and select the share on the NSA. Click Finish . Figure 26 Map Network Drive 3 Enter the username and password for Jimmy’ s account and click OK . Y ou do not need to do this if the use[...]

  • Pagina 48

    Chapter 3 Tutorials NSA-220 User’s Guide 48 3.5 Accessing a Share Using FTP Y ou can also use FTP to access th e NSA. Suppose Jimmy is temporarily using a different computer and wants to access his share without mapping it to the computer . This is how he would do it. 1 Open the FTP client (W indows Explorer is used here) and type “ftp://userna[...]

  • Pagina 49

    Chapter 3 Tutorials NSA-220 User’s Guide 49 Figure 31 FTP Example: Logged In 3.6 Accessing a Share Through the W eb Configurator Y ou can browse and access files through the web configurator . 1 Log into the NSA web configurator (see Section 2.3 on page 30 ) using your username and password. Figure 32 My NSA User Login 2 Click a share to see the [...]

  • Pagina 50

    Chapter 3 Tutorials NSA-220 User’s Guide 50 Figure 33 My NSA User Login 3 Click a folder ’ s file name to browse the fold er . Y ou can open files or copy them to your computer . However at the time of writing you cannot use the web conf igurator to upload files to the NSA (use CIFS or FTP to upload files, see Section 3.4 on page 46 and Section[...]

  • Pagina 51

    NSA-220 User’s Guide 51 C HAPTER 4 Status Screen This chapter introduces the NSA St a t u s screen. 4.1 St atus Scree n The St a t u s screen is the first main web configurator screen you see after you log in to the administrator screens. T o view the status screens, click St a t u s on the top-left of the navigation panel. Figure 34 S tatus[...]

  • Pagina 52

    Chapter 4 Status Screen NSA-220 User’s Guide 52 The following table describes the labels in this screen. Ta b l e 1 1 Status LABEL DESCRIPTION S tatus Click Status to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the edit icon to go to the screen wher[...]

  • Pagina 53

    Chapter 4 Status Screen NSA-220 User’s Guide 53 4.1.1 Session Example (Windows) Open windows explorer and type two back sl ashes followed by the NSA name or IP address. Initially you can only read and write to the Public , Vi d e o , Music , and Photo folders until you create other shares on the NSA. This session is then displayed as shown in Fig[...]

  • Pagina 54

    Chapter 4 Status Screen NSA-220 User’s Guide 54[...]

  • Pagina 55

    55 P ART II S t atus, System, S torage, and Network System Setting Screens (57) Storage Screens (61) Network Screen (73)[...]

  • Pagina 56

    56[...]

  • Pagina 57

    NSA-220 User’s Guide 57 C HAPTER 5 System Setting Screens This chapter discusses the system setting screens. 5.1 System Setting Screens This section gives an overview of the various features included in th e system setting screens. Use the system setting screens to: • Specify the NSA’ s W indows/CIFS server name and workgroup name. • Chose [...]

  • Pagina 58

    Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 58 Figure 36 System Setting > Server Name The following table describes the labels in these screens. 5.3 Date/T ime Use this screen to select a time zone and a time server from which your NSA can get the time and date. This time is then used in NSA logs and alerts. 5.3.1 T i me Lag T ime l[...]

  • Pagina 59

    Chapter 5 System Sett ing Screens NSA-220 User’s Guide 59 5.3.2 Date/Ti me Screen Click the System Setting link in the navigation panel and then click the Date/T ime link to access the System Setting > Date/Time screen. Figure 37 System Setting > Date/T ime The following table describes the labels in this screen. T able 13 System Setting &g[...]

  • Pagina 60

    Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 60 T ime Server Address Select a time se rver from the drop-down list box or select Spec if y m y own time server and enter th e time server you wish to use in the field below . Check with your ISP/network admi nistrator if you ar e unsure of this information. Synchronize Now Click this butto[...]

  • Pagina 61

    NSA-220 User’s Guide 61 C HAPTER 6 Storage Screens This chapter covers storage system s, volumes and disks on the NSA. 6.1 St orage Introduction Use the S torage screens to create and manage NSA volu mes (internal and external) and disks. • See Section 6.3 on pa ge 62 for more inform ation on volum es. • See Section 6.5 on pa ge 68 for more i[...]

  • Pagina 62

    Chapter 6 Stora ge Screens NSA-220 User’s Guide 62 The following table describes the labels in this screen. Y ou see a warning sc reen before you delete a volume. Figure 39 Delete a V olume W arning Screen 6.3 V olumes and RAID A volume is a storage area on a disk or disks. Y ou can create volumes on the internal disks and external disks attached[...]

  • Pagina 63

    Chapter 6 Storage Scre ens NSA-220 User’s Guide 63 " Back up your data before deleti ng or re-creating a volume! For example if you original ly have one disk co nfigured at JBOD, and you then in stall another disk and want to config ure the two disks to use RAID 1, you shou ld first back up all your data on the two disks (see the Memeo Autob[...]

  • Pagina 64

    Chapter 6 Stora ge Screens NSA-220 User’s Guide 64 • Choose RAID 0 if performance matters mo re than data se curity . RAID 0 has the fastest read and write performance but if one disk fails you lose all your data on the volume. It has fast performance as it can re ad and writ e to two disks simult aneously . Performance may matter more than dat[...]

  • Pagina 65

    Chapter 6 Storage Scre ens NSA-220 User’s Guide 65 " Y ou should not restart the NSA while the NSA is resych ronizing a volume as this will cause the synch ronization to begin again after the NSA fully reboots. " Y ou can access data on a RAID volume whil e it is resychronizi ng, but it is not recommended. 6.4 RAID This section contains[...]

  • Pagina 66

    Chapter 6 Stora ge Screens NSA-220 User’s Guide 66 lost. Parity protection is used with striping, and the “n” pieces of data are typically the blocks or bytes distributed across the drives in the array . The parity information can either be stored on a separate, dedicated drive, or be mixed with the data across all the drives in the array . &[...]

  • Pagina 67

    Chapter 6 Storage Scre ens NSA-220 User’s Guide 67 RAID 0 capacity is the size of the smallest disk multiplied by the num ber of disks you have configured at RAID 0 on the NSA. For example, if you have two disks of sizes 100 GB and 200 GB respectively in a RAID 0 volume, then the maximum capacity is 200 GB (2 * 100 GB, the smallest disk size) and[...]

  • Pagina 68

    Chapter 6 Stora ge Screens NSA-220 User’s Guide 68 • Keep another copy of important fil es (preferably in another location). 6.5 Disks Here is information on the NSA internal disks and external disks attached to the USB port(s). 6.5.1 External Disks Y ou may connect USB storage devices that supp ort the following file systems to the NSA. • W [...]

  • Pagina 69

    Chapter 6 Storage Scre ens NSA-220 User’s Guide 69 If you do not want to keep the data on a disk that you will remove, it is recommended that you delete the volume be fore you remove the disk. If you remove a disk(s) without delet ing its volume and you later put t h e disk(s) back in a dif ferent volume, you may have more than one volume with th[...]

  • Pagina 70

    Chapter 6 Stora ge Screens NSA-220 User’s Guide 70 6.7 Editing an Internal V olume Click an internal volume’ s Edit icon in the Vo l u m e sc reen as shown in Figure 38 on page 61 to change the internal disk drive volume’ s name. Figure 41 Edit an Internal V olume The following table describes the labels in this screen. 6.8 Creating a New Ext[...]

  • Pagina 71

    Chapter 6 Storage Scre ens NSA-220 User’s Guide 71 " Creating a volume formats the drive. All data on the di sk will be lost. Figure 42 Create a New External V olume The following table describes the labels in this screen. 6.9 Editing an External V olume Click an external (USB) volume’ s Edit icon in the Vo l u m e scree n as shown in Figu[...]

  • Pagina 72

    Chapter 6 Stora ge Screens NSA-220 User’s Guide 72 Figure 43 Edit an External V olume The following table describes the labels in this screen. T able 22 Edit an External Volume LABEL DESCRIPTION V olume Name T yp e a volume name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characte rs. The name cannot be the same as [...]

  • Pagina 73

    NSA-220 User’s Guide 73 C HAPTER 7 Network Screen This chapter discusses the network configuration screen. 7.1 Network Settings Use the network configuration screen to assign the NSA a dynamic or static IP address and DNS information. 7.1.1 IP Address The NSA needs an IP address to communicate with the media servers on your network. The NSA can g[...]

  • Pagina 74

    Chapter 7 Network Scr een NSA-220 User’s Guide 74 Figure 44 Network > Netw ork Config The following table describes the labels in this screen. T able 23 Network Config > Network Config LABEL DESCRIPTION IP Address Obtain an IP address automatically Select this option to have the NSA get IP address information automatica lly . If no IP addre[...]

  • Pagina 75

    Chapter 7 Network Scree n NSA-220 User’s Guide 75 Apply Click Apply to save your TCP/IP configurations. After you click Apply , the NSA restarts. W ait until you see the Login screen or until the NSA fully boo ts and then use the NDU to rediscover it. Cancel Click Cancel to begin configuring this scre en afresh. T able 23 Network Config > Netw[...]

  • Pagina 76

    Chapter 7 Network Scr een NSA-220 User’s Guide 76[...]

  • Pagina 77

    NSA-220 User’s Guide 77 C HAPTER 8 Application Screens This chapter discusses the application screens. 8.1 Application Screens Use the application screens to: • Enable FTP file transfer to/from the NSA, set the number of FTP co nnections allowed and an FTP idle timeout. • Enable or disable the media server and select which shares to publish ([...]

  • Pagina 78

    Chapter 8 Application Screens NSA-220 User’s Guide 78 Figure 45 Applications > FTP The following table describes the labels in this screen. 8.4 Media Server The NSA can functio n as a media server where y ou store multimedia files (videos, music, and photos). By default, co mputers on your netw ork can use media client software (included on th[...]

  • Pagina 79

    Chapter 8 Applica tion Screens NSA-220 User’s Guide 79 8.5 Media Server Screen Click Applications > Media S e rver to open the followi ng screen. Use this screen to turn the media server of f an d on and see which shar es the NSA will publish (share with media clients). Figure 46 Applications > Media Server The following table describes the[...]

  • Pagina 80

    Chapter 8 Application Screens NSA-220 User’s Guide 80[...]

  • Pagina 81

    81 P ART III User Account s and Shares Users (83) Shares (89)[...]

  • Pagina 82

    82[...]

  • Pagina 83

    NSA-220 User’s Guide 83 C HAPTER 9 Users This chapter introduces the Users screens of the NSA. 9.1 User Account s Introduction Use the Users screens to crea te and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. • Assign individual users specific access[...]

  • Pagina 84

    Chapter 9 Users NSA-220 User’s Guide 84 Figure 47 Users The following table describes the labels in this screen. 9.2.1 User Icons The following table describes the user icons. T able 26 Users LABEL DESCRIPTION Accounts List Create a New Account Click this button to open a screen where you can configure a new user account. This screen lists the us[...]

  • Pagina 85

    Chapter 9 Users NSA-220 User’s Guide 85 9.3 Adding or Editing a User Account Click the Cr eate a New Account button in t h e Users screen to crea te a new NSA user account with NSA access password. Click the Change Account Properties button in the screen shown previously to edit an existing account. 9.3.1 Add or Edit a User Account Screen Use thi[...]

  • Pagina 86

    Chapter 9 Users NSA-220 User’s Guide 86 • Spaces • _ [underscores] •. [ p e r i o d s ] • - [dashes] Other limitations on usernames are: • All leading and trailing spa ces are removed automatically . • Multiple spaces within names are converted to a single space. • Usernames are case insensitive. The username cannot be the same (no [...]

  • Pagina 87

    Chapter 9 Users NSA-220 User’s Guide 87 The following table describes the labels in this screen. 9.5 Delete Account Screen In the Users screen, select an account and click Delete Account to open this screen. Use this screen to remove a user accou nt. Figure 50 Users > Delete Account The following table describes the labels in this screen. T ab[...]

  • Pagina 88

    Chapter 9 Users NSA-220 User’s Guide 88[...]

  • Pagina 89

    NSA-220 User’s Guide 89 C HAPTER 10 Shares This chapter introduces the Shares screens of the NSA. 10.1 Shares Introduction Use the Shares screens to create and manage shares. A share is a set of user access permissions mapped to a spec ific folder on a vo lume. It is equivalent to the W indows concept of a shared folder , but is inde pendent of t[...]

  • Pagina 90

    Chapter 10 Shares NSA-220 User’s Guide 90 Figure 51 Shares The following table describes the labels in this screen. See T able 31 on page 89 for icon details. 10.2 Adding a New Share Click the Create a New Shar e button in the Shares screen to open the following screen. Use this screen to create a new shared folder with optional access pass word.[...]

  • Pagina 91

    Chapter 10 Shares NSA-220 User’s Guide 91 Figure 52 Shares > Add Share The following table describes the labels in this screen. T able 33 Shares > Add Share LABEL DESCRIPTION Share Name T ype a share name from 1 to 255 single-byte (no Chinese characters allowed for example) ASCII characte rs. The name cannot be the same as another existing [...]

  • Pagina 92

    Chapter 10 Shares NSA-220 User’s Guide 92 10.2.1 Public and ANON YMOUS Share Access Right s If you make a share public, u sers do not need to log in. W ith ANONYMOUS FTP , you must enter either 'anonymo us' or 'ftp' as the username. Any other name is considered a username, so must be valid and have a corresp onding correct pas[...]

  • Pagina 93

    Chapter 10 Shares NSA-220 User’s Guide 93 The following table describes the labels in this screen. T able 34 Share Path Browse LABEL DESCRIPTION Folder Name This section lists the volume’ s existing folders. Select the one for which you want to create a share. Y ou can also click the fold er ’s name to navigate to a sub-folder within the fold[...]

  • Pagina 94

    Chapter 10 Shares NSA-220 User’s Guide 94[...]

  • Pagina 95

    95 P ART IV Protection, Media Client, Maintenance, & T roubleshooting Maintenance Screens (97) Protecting Y our Data (105) Media Client Software (107) T roubleshooting (1 1 1)[...]

  • Pagina 96

    96[...]

  • Pagina 97

    NSA-220 User’s Guide 97 C HAPTER 11 Maintenance Screens This chapter discusses the Maintenance screens. 1 1.1 Maintenance Overview Use the maintenance screens to: • V iew logs • Manage the NSA configuration file • Upload new firmware • Restart or shut down yo ur NSA 1 1.2 Log Click Maintenance > Log to display the following screen. The[...]

  • Pagina 98

    Chapter 11 Maintena nce Screens NSA-220 User’s Guide 98 1 1.3 Log Classes The following table shows information on log classes. 1 1.4 Log Severity Levels The following table shows informa tion on log severity levels. Levels range from 0 to 6 with 0 being the most severe level log and 6 being an informational log only . Log levels are not displaye[...]

  • Pagina 99

    Chapter 11 Maintena nce Screens NSA-220 User’s Guide 99 1 1.5 Log Messages Here are some example log messages. T able 38 Log Messages CLASS SEVERITY MESSAGE Network NOTICE %s is active because of changing Port Group. Enable DHCP client. Network NOTICE %s is in active because of changing Port Grou p. Disable DHCP client. Network NOTICE %s MTU >[...]

  • Pagina 100

    Chapter 11 Maintena nce Screens NSA-220 User’s Guide 100 1 1.6 Configuration Click Maintenance > Configuration to open the following screen. Use the Configuration screen to back up or restore the NSA configuration settings and enable or disable the hardware reset button. Services INFO Clock timezone is set to default Services INFO Clock daylig[...]

  • Pagina 101

    Chapter 11 Maintena nce Screens NSA-220 User’s Guide 101 Figure 55 Maintenance > Config uration The following table describes the labels in this screen. 1 1.7 Firmware Upgrade Click the Maintenance link in the Navigation pa nel and t h en click the FW Upgrade link or the FW Upgrade tab to access the Mainten ance > FW Upgrade screen . Use th[...]

  • Pagina 102

    Chapter 11 Maintena nce Screens NSA-220 User’s Guide 102 The following table describes the labels in this screen. 1 1.8 Shut down Click the Maintenance link in the Navigation pa nel and t h en click the Shutdown link or the Shutdown tab to access the Maintenance > Shutdown screen. Use this screen to turn of f the NSA or perform a software rest[...]

  • Pagina 103

    Chapter 11 Maintena nce Screens NSA-220 User’s Guide 103 When you cli ck the Shutdown button a pop-up screen will ap pear asking you to confirm. Click OK to continue or Cancel to quit the shutdown. Figure 59 Maintenance > Shut down > Confirm Shutdown[...]

  • Pagina 104

    Chapter 11 Maintena nce Screens NSA-220 User’s Guide 104[...]

  • Pagina 105

    NSA-220 User’s Guide 105 C HAPTER 12 Protecting Your Data This chapter compares the different ways of pr otecting data on the NSA and explains how to use backup man agement software inc luded on the CD. 12.1 Protection Methods There are a variety of wa ys to protect your data on the NSA. Below is a su mmary table of what can be done in each situa[...]

  • Pagina 106

    Chapter 12 Protec ting Your Data NSA-220 User’s Guide 106 " Configuration File Backup and Restorati on does not affect da t a (your files and folders), volumes on the NSA. 12.1.2 Memeo Autobackup Use the Memeo Au tobackup software (included on th e CD) on your com puter to sche dule and manage backups. Y ou can backup from your comp uter to [...]

  • Pagina 107

    NSA-220 User’s Guide 107 C HAPTER 13 Media Client Software This chapter introduces the media cl ient software incl uded on the CD. 13.1 Media Client Introduction The NSA can function as a server to allo w DLNA (Digital Living Network Alliance) compliant media clients to play files. The DLNA is a group of leading pers onal computer and electronics[...]

  • Pagina 108

    Chapter 13 Media Client Software NSA-220 User’s Guide 108[...]

  • Pagina 109

    NSA-220 User’s Guide 109 C HAPTER 14 Memeo Autobackup Software This chapter introduces the Memeo Autobackup software included on the CD. 14.1 Memeo Autobackup Introduction Use the Memeo Autobackup softwa re included on the CD to au tomatically back up selected files from your computer to the NSA whenever you modify the files. Y ou can have Meme o[...]

  • Pagina 110

    Chapter 14 M emeo Auto backup Softw are NSA-220 User’s Guide 11 0[...]

  • Pagina 111

    NSA-220 User’s Guide 111 C HAPTER 15 Troubleshooting 15.1 T roubleshooting Overview This chapter offers some sugg estions to solve problems you might encounter . The potential problems are divided into the following categories. • Power , Hardware, Connections, and LEDs • NSA Login and Access • Reset the NSA • I Cannot Access The NSA • E[...]

  • Pagina 112

    Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 2 Orange means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector , but the LED stays orange until the NSA restarts. Even if the hard drive still functions, it is recommended that you replace it since errors are a[...]

  • Pagina 113

    Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 3 • Make sure the Ethernet cable is connected pr operly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it’ s connected directly to a computer , make sure that the computer network card is working (p ing 127.0.0.1 on the computer). • Use a[...]

  • Pagina 114

    Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 4 • Make sure your computer ’ s IP address is in the s ame subnet as the NSA’ s IP address. Y ou can use the NDU to find the NSA’ s IP address. See Appendix B on page 1 29 for how to change your computer ’ s IP address. Skip this if you know that there are routers between your comp ute[...]

  • Pagina 115

    Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 5 • The computer running the NDU can only discover NSAs in the same subnet. NSAs connected to the same switch or router as your NDU computer are usually in the same subnet unless the router is doing subne tting or the switch is implementing VLAN. • The Memeo Autobackup program uses the same [...]

  • Pagina 116

    Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 6 Figure 61 Security Settings - Script S afe ActiveX Controls V I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the use rname and password correctly . The default username is admin , and the default password is 1234 . These fields are case-sensitive, so[...]

  • Pagina 117

    Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 7 • Check that the NSA is turned on and connected to the network. T ry to ping the NSA or use the NDU to discover it. • Check that you entered your login name and password correctly . • Check that the share exists and check its access settings. • Check if the shared folder is a subfolder[...]

  • Pagina 118

    Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 8 15.6 Media Server Functions V I set the media server function to publish a folder , but some of the files in the folder do not display in t he list on the media client. Files with formats that are not supported on th e media server may not display in the list. See Appendix A on pa ge 126 for t[...]

  • Pagina 119

    11 9 P ART V Appendices and Index Product Specification s (121) Setting up Y our Computer ’ s IP Address (129) Open Source Licences (151) Legal Information (181) Customer Support (183) Index (187)[...]

  • Pagina 120

    120[...]

  • Pagina 121

    NSA-220 User’s Guide 121 A PPENDIX A Product S pecifications See also Chapter 1 on pa ge 25 for a general overview of the key features. Feature T ables Physical Features These are the main external physical features. Firmware Features These are some of the main firmware features of the NSA. T able 43 Physical Features USB Ports 2 USB (version 2) [...]

  • Pagina 122

    Appendix A Product Specifications NSA-220 User’s Guide 122 S pecification T ables The NSA hardwa re specif ications are shown in the following table. RAID File S torage Use RAID 0 if you want pure write speed and/or maximum capacity for your drives, and/or you have ot her means of protecting your data. Use RAID 1 if you have two drives and want t[...]

  • Pagina 123

    Appendix A Product Specifications NSA-220 User’s Guide 123 The NSA firmware specif ications are shown in the following table Maximum S t orage Capacity 1.5 TB (with two 750 GB hard drives installed) is the largest storage capacity that has been tested as of this writing. The NSA theoretically supports up to 17.6 TB per volume for a maximum possib[...]

  • Pagina 124

    Appendix A Product Specifications NSA-220 User’s Guide 124 The following list, which is not exhaustive, illustrates the standards and recommendations supported in the NSA. Supported Cl ients Windows 2000 Profession al/Server Windows XP Home/Professional Windows 2003 Windows Vista Linux Maximum Number of Users Allowed 100 A Maximum Number of Concu[...]

  • Pagina 125

    Appendix A Product Specifications NSA-220 User’s Guide 125 RFC 1001 (STD-19) - Protocol standard fo r NetBIOS service on a TCP/UD P transport: Concepts and methods RFC 1002 (STD-19) - Protocol standard fo r NetBIOS service on a TCP/UD P transport: Detailed specifications RFC 1034 (STD-13) - Domain names - concepts and facilities RFC 1035 (STD-13)[...]

  • Pagina 126

    Appendix A Product Specifications NSA-220 User’s Guide 126 Supported Media Server Content Format s The following describes the deta ils about the files that the NSA media server can publish. * Files may be converted to JPEG to allow play b ack on client applicatio ns that do not support the original file formats. " Not all published file typ[...]

  • Pagina 127

    Appendix A Product Specifications NSA-220 User’s Guide 127 Comp atible Hard Disks The following hard disks have been tested an d are known to be compatible with the NSA. T able 49 Power Consumption in Watts (W) POWER SOURCE SYSTEM BOOT UP SYSTEM READ/WRITE SYSTEM IDLE 240V/50Hz 58.14W 31.2W 23.9W 120V/60Hz 57.76W 29.3W 25.1W 100V/60Hz 58.14W 30.0[...]

  • Pagina 128

    Appendix A Product Specifications NSA-220 User’s Guide 128[...]

  • Pagina 129

    NSA-220 User’s Guide 129 A PPENDIX B Setting up Y our Computer ’ s IP Address All computers must have a 10M or 100M Et hernet adapter card and TCP/IP installed. W indows 95/98/Me/NT/2000/XP , Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your comp[...]

  • Pagina 130

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 130 Figure 62 WIndows 95/98/Me: Network: Co nfiguration Inst alling Components The Network window Configuration tab displays a list of installed components. Y ou need a network adapter , the TCP/IP protocol and Client for Microsof t Networks. If you need the adapter: 1 In the[...]

  • Pagina 131

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 131 Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically . • If you have a static IP address, sele[...]

  • Pagina 132

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 132 Figure 64 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know you r gateway’ s IP addr ess, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add . 5 [...]

  • Pagina 133

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 133 Figure 65 Windows XP : S tart Menu 2 In the Control Panel , double-click Network Connections ( Network and Dial-up Connections in W indow s 2000/NT). Figure 66 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Pr operties .[...]

  • Pagina 134

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 134 Figure 67 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the Genera l tab in W in XP) and then click Properties . Figure 68 Windows XP: Loca l Area Connection Properties 5 The Internet Protocol TCP/IP Pr operties wind[...]

  • Pagina 135

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 135 Figure 69 Windows XP: Internet Protocol (TCP/IP) Prope rties 6 If you do not know your gateway's IP ad dress, remove any previously installed gateways in the IP Settings tab and click OK . Do one or more of the fo llowing if you want to configure additional I P addre[...]

  • Pagina 136

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 136 Figure 70 Windows XP : Advanced TCP/ IP Properties 7 In the Internet Protocol TCP/IP Pr operties window (the General tab in W indow s XP): • Click Obtain DNS server address automatically if yo u do not know your DNS server IP address(es). • If you know your DNS server[...]

  • Pagina 137

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 137 Figure 71 Windows XP: Internet Protocol (TCP/IP) Prope rties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window . 9 Click Close ( OK in W ind ows 2000/NT) to close the Local Area Connecti o n Properties window . 10 Close the Network Connections w indow ([...]

  • Pagina 138

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 138 Figure 72 Macintosh OS X: Apple Menu 2 Click Network i n the icon bar . • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure list. [...]

  • Pagina 139

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 139 V erifying Settings Check your TCP/IP properties in the Network window . Linux This section shows you how to configure your computer’ s TCP/IP settings in Red Hat Linux 9.0. Procedure, screens an d file location may vary depe nding on your Linux distribu tion and releas[...]

  • Pagina 140

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 140 Figure 75 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dyna mic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address, click S tatically set IP Addresses and fill in the[...]

  • Pagina 141

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 141 Figure 77 Red Hat 9.0: KDE: Networ k Configuration: Activate 7 After the network card restart proc ess is complete, make sure the St a t u s is Active in the Network Configuration screen. Using Configuration Files Follow the steps below to edit the network co nfiguration [...]

  • Pagina 142

    Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 142 Figure 80 Red Hat 9.0: DNS Settings in resolv .conf 3 After you edit and save the configuration files, you must restar t the network card. Enter ./network restart in the /etc/rc.d/init.d directory . The following figure shows an example. Figure 81 Red Hat 9.0: Rest art Et[...]

  • Pagina 143

    NSA-220 User’s Guide 143 A PPENDIX C Pop-up Windows In order to use the web configurato r you may need to allow: • W eb browser pop-u p windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Internet Explorer Pop-up s Y ou may have to disable pop-up blocking (allow pop- ups) in order to use yo[...]

  • Pagina 144

    Appendix C Pop-up Windows NSA-220 User’s Guide 144 Figure 84 Internet Options: Privacy 3 Click Apply to save this setting. Enable pop-up Blockers with Exceptions Alternatively , if you only want to allow pop-up windo ws from your device, see the following steps. 1 In Internet Explorer , select To o l s , Internet Options and then the Privacy tab.[...]

  • Pagina 145

    Appendix C Pop -up Windows NSA-220 User’s Guide 145 Figure 85 Internet Options: Privacy 3 T ype the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites . Figure 86 Pop-up Blocker Settings[...]

  • Pagina 146

    Appendix C Pop-up Windows NSA-220 User’s Guide 146 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript s If pages of the web configura tor do not display properly in Internet Explorer , ch eck that JavaScripts are allowed. 1 In Internet Explorer , click T ools , Internet Options and then the Security tab.[...]

  • Pagina 147

    Appendix C Pop -up Windows NSA-220 User’s Guide 147 Figure 88 Security Setting s - Java Scrip ting Java Permissions 1 From Internet Explorer , click To o l s , In ternet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM . 4 Under Java permissions make sure that a safety leve l is selected. 5 Clic[...]

  • Pagina 148

    Appendix C Pop-up Windows NSA-220 User’s Guide 148 JA V A (Sun) 1 From Internet Explorer , click To o l s , In ternet Options and then the Adva nced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is sele cted. 3 Click OK to clos e the window . Figure 90 Java (S un) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. S[...]

  • Pagina 149

    Appendix C Pop -up Windows NSA-220 User’s Guide 149 Select the check boxes as shown in the following screen. Figure 92 Mozilla Firefox Content Security[...]

  • Pagina 150

    Appendix C Pop-up Windows NSA-220 User’s Guide 150[...]

  • Pagina 151

    NSA-220 User’s Guide 151 A PPENDIX D Open Source Licences Notice Information herein is subject to change withou t notice. Companies, name s, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical , for any purpos e, except the express w[...]

  • Pagina 152

    Appendix D Open Source Licences NSA-220 User’s Guide 152 “Derivative W orks” shall mean any work, whether in Source or Object form, that is based on (or derived from) the W ork and for which the edit orial revisions, annotatio ns, elaborations, or other modifications represent, as a whole, an original work of authorship . For the purposes of [...]

  • Pagina 153

    Appendix D Open So urce Licences NSA-220 User’s Guide 153 distributed as part of the Derivative W orks; within the Source form or documentation, if provided along with the Derivative W orks; or , within a display genera ted by the Derivative W orks, if and wherever such third-party no tices n ormally appear . The contents of the NOTICE file are f[...]

  • Pagina 154

    Appendix D Open Source Licences NSA-220 User’s Guide 154 Redistribution and use in source and binary fo rms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source co de must retain the above copyright notice, this li st of conditions and the following disclaimer . Redistributions in [...]

  • Pagina 155

    Appendix D Open So urce Licences NSA-220 User’s Guide 155 The licenses for most software ar e de signed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your free dom to share and change free software--to make su re the software is free for all its users. This license, the Le[...]

  • Pagina 156

    Appendix D Open Source Licences NSA-220 User’s Guide 156 W e call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Pu blic License. It also provides other free software developers Less of an advant age over competing non-free programs. Thes e disadvan tages are [...]

  • Pagina 157

    Appendix D Open So urce Licences NSA-220 User’s Guide 157 1. Y ou may copy and distribute verbatim copies of the Library's comple te source code as you receive it, in any medium, provided that you conspicuou sly and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that[...]

  • Pagina 158

    Appendix D Open Source Licences NSA-220 User’s Guide 158 compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library , but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a d[...]

  • Pagina 159

    Appendix D Open So urce Licences NSA-220 User’s Guide 159 required form of the “work that uses the Librar y” must include any data and utility programs needed for reproducing the executable from it. Howeve r , as a special exception, the materia ls to be distributed need not include an ything that is normally distributed (in either source or [...]

  • Pagina 160

    Appendix D Open Source Licences NSA-220 User’s Guide 160 contest validity of any such claims; this sec tion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have mad e generous contribution s to the wide range of software distribu ted through th[...]

  • Pagina 161

    Appendix D Open So urce Licences NSA-220 User’s Guide 161 END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, auto fs, device-mapper , evms, exim. Lm_sensors, mdadm, pam_mount, raid tools, samba, sg_utils, smartmontool s, vsftpd, xfsprogs and Linux kernel software under GPL license. GNU GENERAL PUBLIC LICENSE V ersion 2, June 1991 [...]

  • Pagina 162

    Appendix D Open Source Licences NSA-220 User’s Guide 162 0. This License ap plies to any program or othe r work which c ontains a notice placed by the copyright holder saying it may be distributed under the terms of this Ge neral Public License. The “Program”, belo w , refers to any such prog ram or work, and a “work based on the Program”[...]

  • Pagina 163

    Appendix D Open So urce Licences NSA-220 User’s Guide 163 3. Y ou may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sec tions 1 and 2 above provided that you also do one of the following: a) Accompany it with the comple te corresponding machine-readab le source code, [...]

  • Pagina 164

    Appendix D Open Source Licences NSA-220 User’s Guide 164 directly or indirectly through you, then the on ly way you could satisfy both it and this License would be to refrain entirely from di stribution of the Program. If any portion of this section is held invalid or unenforce able under any particul ar circ umstance, the balance of the section [...]

  • Pagina 165

    Appendix D Open So urce Licences NSA-220 User’s Guide 165 INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DA T A OR DA T A BEING RENDERED INACCURA TE OR LOSSES SUST AINED BY YOU OR THIRD P AR TIES OR A F AILURE OF THE PROGRAM TO OPERA TE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER P AR TY HAS BEEN ADVISED OF THE POSS[...]

  • Pagina 166

    Appendix D Open Source Licences NSA-220 User’s Guide 166 Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays unde r a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-s tyle Open Source li[...]

  • Pagina 167

    Appendix D Open So urce Licences NSA-220 User’s Guide 167 Original SSLeay License -------------------------------- Copyright (C) 1995-1998 Eric Y oung (e ay@cryptsoft.com) A ll ri ghts reserved. This package is an SSL implementation written by Eric Y oung (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’ s SSL.[...]

  • Pagina 168

    Appendix D Open Source Licences NSA-220 User’s Guide 168 This Product include mod _ ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights rese rved. Redistribution and us e in source and binary forms, with or without modification, are permitte d provided that the[...]

  • Pagina 169

    Appendix D Open So urce Licences NSA-220 User’s Guide 169 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number . Once covered code has been published unde r a particular version of th e license, you may alwa ys continue to use it unde r the terms of t[...]

  • Pagina 170

    Appendix D Open Source Licences NSA-220 User’s Guide 170 1.2. “Contributor V ersion” means the combina tion of the Original Code, prior Modifications used by a Contributor , and th e Modifications made by that particular Contributor . 1.3. “Covered Code” means the Original Code or Modifications or th e combination of the Original Code and[...]

  • Pagina 171

    Appendix D Open So urce Licences NSA-220 User’s Guide 171 The Initial Developer hereby grants Y ou a wo rld-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify , display , perform[...]

  • Pagina 172

    Appendix D Open Source Licences NSA-220 User’s Guide 172 Any Modification which Y ou create or to which Y ou contribute must be made available in Source Code form under the terms of this Licen se either on the same media as an Executable version or via an accepted Electronic Distribu tion Mechanism to anyone to whom you made an Executable version[...]

  • Pagina 173

    Appendix D Open So urce Licences NSA-220 User’s Guide 173 Contributor . Y ou must make it absolutely clear than any such warranty , support, indemnity or liability obligation is of fered by Y ou alone, and Y ou hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contrib[...]

  • Pagina 174

    Appendix D Open Source Licences NSA-220 User’s Guide 174 Once Covered Code has been published under a particu lar version of the License, Y ou may always continue to use it under the terms of that version. Y ou may also choose to use such Covered Code under the terms of any sub sequent version of the License published by Netscape. No one other th[...]

  • Pagina 175

    Appendix D Open So urce Licences NSA-220 User’s Guide 175 any software, hardware, or device , other than such Participant's Contributor V ersion, directly or indirectly infringes any patent, then any ri ghts granted to Y ou by such Participant under Sections 2.1(b) and 2.2 (b) are revoked effective as of the date Y ou first made, used, sold,[...]

  • Pagina 176

    Appendix D Open Source Licences NSA-220 User’s Guide 176 As between Initial Developer and the Contri butors, each party is responsible for claims and damages arising, directly or indirectly , out of its utilization of rights under this License and Y ou agree to work with Initial De veloper and Contributors to dist ribute such responsibility on an[...]

  • Pagina 177

    Appendix D Open So urce Licences NSA-220 User’s Guide 177 The above copy right notice and this permission not ice shall be included in all copies or substantial portions of the Software. THE SOFTW ARE IS PROVIDED “AS IS”, WITHOUT W ARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED T O THE W ARRANTIES OF MERCHANT ABILITY , FIT[...]

  • Pagina 178

    Appendix D Open Source Licences NSA-220 User’s Guide 178 4.Restrictions Y ou may not publish, display , disclose, sell, re nt, lease, modify , store, loan, distribute, or create derivative works of the Software, or any part thereof. Y ou may not a ssign, sublicense, convey or otherwise transfer , pledge as secur ity or otherwise encumber the righ[...]

  • Pagina 179

    Appendix D Open So urce Licences NSA-220 User’s Guide 179 DOCUMENT A TION OR OTHER WISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME ST A TES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMIT A TION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENT AL DAMAGES, THE ABOVE LIMIT A TION MA Y NOT APPL Y TO YOU. 8.Export[...]

  • Pagina 180

    Appendix D Open Source Licences NSA-220 User’s Guide 180[...]

  • Pagina 181

    NSA-220 User’s Guide 181 A PPENDIX E Legal Information Copyright Copyright © 2007 by ZyXEL Communications Corporation. The contents of this publication may not be reprod uced in any part or as a whole, transcribed, stored in a retrieval system, tran slated into any language, or transmitted in any form or by any means, el ectronic, mechanical , m[...]

  • Pagina 182

    Appendix E Legal In formation NSA-220 User’s Guide 182 Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Vie w ing Certifications 1 Go to http://www .zyxel.com . 2 Select your product on the ZyXEL home pag e to go to that pro duct's page. 3 Select the certification you wish to view from this page. ZyXEL warra[...]

  • Pagina 183

    NSA-220 User’s Guide 183 A PPENDIX F Customer Support Please have the following information r eady when you contact customer support. Required Information • Product model and serial number . • W arranty Information. • Date that you received your de vice. • Brief description of the problem and the steps you took to solve i t. Corporate Hea[...]

  • Pagina 184

    Appendix F Custom er Support NSA-220 User’s Guide 184 Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk • T elephone: +45-39-55-07-00 • Fax: +45-39-55-07-07 • W eb Site: www .zyxel.dk • Re g u l ar M ai l : ZyXEL Communications A/ S, Columbusvej, 2860 Soebo rg, Denmark Finland • Support E-mail: support@zyxel.[...]

  • Pagina 185

    Appendix F Customer Support NSA-220 User’s Guide 185 • T elephone: +7-3272-590-698 • Fax: +7-327 2-590-689 • W eb Site: www .zyxel.kz • Re g u l a r M a i l: ZyXEL Kazakhstan, 43, Dostyk ave.,Office 414, Dost yk Business Centre, 050010, Almaty , Republic of Kazakhstan North America • Support E-mail: support@zyxel.com • Sales E-mail: s[...]

  • Pagina 186

    Appendix F Custom er Support NSA-220 User’s Guide 186 • W eb Site: www .zyxel.es • Re g ul a r Ma i l: ZyXEL Communications, Art e , 21 5ª planta, 28033 Madrid, Spain Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • T elephone: +46-31-744-7700 • Fax: +46-31-744-7701 • W eb Site: www .zyxel.se • Re g ul a[...]

  • Pagina 187

    Index NSA-220 User’s Guide 187 Index A about icon 40 accessing share contents 34 accessing the web configu rator 29 administration screens 32 , 39 anonymous access rights 92 ANONYMOUS FTP 92 apac he license 151 C certifications 123 , 18 1 notices 181 viewing 182 change password 31 changing configuratio n settings 42 checking disks 42 common scree[...]

  • Pagina 188

    Index NSA-220 User’s Guide 188 FCC interf erence statemen t 181 file path 35 , 36 file storage system 123 file system errors 42 finding external storag e devices 42 finding the NSA 52 firmware specifications 123 firmware upgrade 101 firmware version 52 folder 33 name restrictions 37 folder format of copied files 28 format of copied files folder 2[...]

  • Pagina 189

    Index NSA-220 User’s Guide 189 to screens 40 locate icon icons locate 42 log 97 classes 98 screen 97 severity 98 logging/ monitoring 124 login username 30 logout icon 32 , 40 M MAC address 52 Manage It 33 management session timeout 32 managing shares 35 MDI/MDI-X 121 media serv er 107 , 124 configuration 107 software 10 7 , 124 status 52 Memeo Au[...]

  • Pagina 190

    Index NSA-220 User’s Guide 190 return material authorization (RMA) 182 rights 181 RMA 182 S safety warnings 6 SA T A 25 SA T A 3.0 Gbit/s 25 SA T A I 25 scan disk icon 42 screen hyperlinks 40 screen links 40 screen summary 40 screens summary 41 Serial Advanced T echnology Attachment (see also SA T A) 25 serial A T A (SA T A) 121 serial links 25 s[...]

  • Pagina 191

    Index NSA-220 User’s Guide 191 down 42 , 64 healthy 42 , 64 inactive 64 name restrictions 37 OK 64 resync 64 status 64 volume icon 42 volume name 52 volume status 52 W warranty 182 period 182 web browsers supported 124 web configurator 29 browsers 29 logout 32 , 40 web help 40 web help icon 32 Z ZyXEL Communications Corporation 181 ZyXEL Limited [...]

  • Pagina 192

    Index NSA-220 User’s Guide 192[...]