Media Server NSA210, NSA221, NSA310, NSA320, NSA325 IMPORTANT! Default Login Details Web Address nsa210 nsa221 nsa310 nsa320 User Name admin Password 1234 READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. IMPORTANT! www.zyxel.com Firmware Version 4.40 Edition 2, 07/2012 www.zyxel.
IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. Disclaimer This is a User’s Guide for a series of products. Not all products support all firmware features. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system. Every effort has been made to ensure that the information in this manual is accurate.
Contents Overview Contents Overview User’s Guide ........................................................................................................................... 15 Getting to Know Your NSA .........................................................................................................17 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 ..............................................21 NAS Starter Utility for NSA210 ...............................................................
Contents Overview 4 Media Server User’s Guide
Table of Contents Table of Contents Contents Overview ..............................................................................................................................3 Table of Contents .................................................................................................................................5 Part I: User’s Guide ......................................................................................... 15 Chapter 1 Getting to Know Your NSA...............................
Table of Contents 3.5.3 Directory of the NAS ................................................................................................................42 3.6 Import Files or Folders with zPilot .....................................................................................................43 3.7 Add a Network Drive to My Computer ...............................................................................................44 3.8 Manage the Device ................................................
Table of Contents 5.6.3 Create an Internal Volume Button ...........................................................................................78 5.7 Creating a Volume in a 1-Bay NSA ...................................................................................................79 5.7.1 Creating a RAID 1 Volume ......................................................................................................80 5.7.2 Migrate Button ................................................................
Table of Contents 6.1 Overview .........................................................................................................................................153 6.2 The Status Screen ..........................................................................................................................153 Chapter 7 System Setting..................................................................................................................................157 7.1 Overview ...................
Table of Contents 10.1 Overview .......................................................................................................................................185 10.2 What You Can Do .........................................................................................................................185 10.3 What You Need to Know ...............................................................................................................185 10.4 FTP Server ....................................
Table of Contents 11.5 eMule Screens ...........................................................................................................................233 11.5.1 eMule Server Screen ..........................................................................................................233 11.5.2 Add Server ..........................................................................................................................234 11.5.3 Edit Server .............................................
Table of Contents 12.1 Overview .......................................................................................................................................279 12.2 What You Can Do .........................................................................................................................279 12.3 What You Need to Know ...............................................................................................................279 12.4 The Flickr/YouTube Screen .....................
Table of Contents 17.2 What You Can Do ......................................................................................................................... 311 17.3 The Shares Screen ...................................................................................................................... 311 17.3.1 Adding or Editing Share ......................................................................................................313 17.3.2 Configuring Advanced Share Access ......................
Table of Contents 20.3 NAS Starter Utility .........................................................................................................................345 20.4 NSA Login and Access .................................................................................................................346 20.4.1 Enabling Scripting of Safe ActiveX Controls ........................................................................348 20.5 I Cannot Access The NSA ............................................
Table of Contents 14 Media Server User’s Guide
P ART I User’s Guide 15
C HAPT ER 1 Getting to Know Your NSA 1.1 Overview This chapter covers the main features and applications of the NSA. Use the NSA to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA. • Use the COPY/SYNC button to copy or synchronize files between the NSA and USB devices like card readers, MP3 players, mass storage devices, and digital cameras without using a computer. • Have the NSA handle large file downloads.
Chapter 1 Getting to Know Your NSA Above is the NSA in a home network. Users back up and share data on the NSA. The DMA-2501 plays the NSA’s media files on the TV. A USB hard drive provides extra storage space and files are copied directly from the USB mass storage device to the NSA. Place the NSA behind a firewall and/or IDP (Intrusion Detection and Prevention) device to protect it from attacks from the Internet. Note: See Chapter 21 on page 361 for a more detailed list of NSA features.
Chapter 1 Getting to Know Your NSA 1.1.2.1 NSA210 Firmware Before you can start using your NSA210, you have to install the firmware on the hard disk. Use the NAS Starter Utility to do this. See Chapter 3 on page 31 for more information on the NAS Starter Utility. Figure 2 NSA210 Hard Disk Partition Hard disk FW Your NSA210’s firmware is installed in the hard disk. 1.1.3 COPY/SYNC Button Use the COPY/SYNC button on the front panel to copy or synchronize files between a connected USB device and the NSA.
Chapter 1 Getting to Know Your NSA Note: You should keep the NSA in a secure location in order to prevent unauthorized reset of the device. You may need to close and re-open the NAS Starter Utility to discover the NSA. This is because the NSA automatically re-acquires IP address information, so its IP address may change. If no IP address information is assigned, the NSA uses Auto-IP to assign itself an IP address and subnet mask. For example, you could connect the NSA directly to your computer.
C HAPT ER 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 Note: This NAS Starter Utility is for NSA221, NSA310, NSA320, and NSA325. Installing this version of the NAS Starter Utility will uninstall previous versions. 2.1 Overview This chapter describes the NAS Starter Utility for NSA310, NSA320, NSA325, and NSA221. Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it.
Chapter 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 Start the NAS Starter Utility (click the icon in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility). The first time you open the NAS Starter Utility the discovery screen appears as follows. Figure 4 NAS Seeker The following table describes the labels in this screen. Table 1 NAS Seeker 22 LABEL DESCRIPTION Connect Select a NSA and click this to connect to it. Refresh Click this to refresh the screen.
Chapter 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 2.4 Main NAS Starter Utility Screen The main NAS Starter Utility screen displays after you select an NSA in the NSA Seeker screen. Figure 5 NAS Starter Utility Main Screen The following table describes the labels in this screen. Table 2 NAS Starter Utility Main Screen LABEL DESCRIPTION ? Click this to display the utility help.
Chapter 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 Table 2 NAS Starter Utility Main Screen LABEL DESCRIPTION Capacity This shows the NSA’s total, in-use, and remaining storage capacity. Media Player Click this to go to the Home screens where you can play media files. See Section 4.4 on page 50 for details on the Home screen. zPilot Click this to launch the zPilot to drag and drop files onto the NSA.
Chapter 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 4 Check your settings. If they are OK, click Next. Otherwise click Back. If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual. 5 Wait while the NAS Starter Utility configures the NSA. After the NAS Starter Utility finishes configuring the NSA, you can select Run zPilot to launch the zPilot to drag and drop files onto the NSA (see Section 2.
Chapter 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 • JBOD: Use this if you want maximum storage capacity and/or you have other means of protecting your data. This combines the two physical disks into a single virtual one, so they appear as a single large disk. • RAID 0: Use this if you want maximum speed for your disks, and/or you have other means of protecting your data. RAID 0 has the fastest read and write performance but if one disk fails you lose all your data from both disks.
Chapter 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 The utility opens the NSA’s directory in Windows Explorer. Figure 7 Directory 2.6 Import Files or Folders with zPilot In the main NAS Starter Utility screen click zPilot to be able to drag and drop files from your computer to the NSA. Enter the administrator user name and password and click Login. Figure 8 Login The zPilot icon displays. Figure 9 zPilot Drag files onto the zPilot icon to move them to the NSA.
Chapter 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 folder. For folders of files you are prompted to choose the target destination. The zPilot icon shows the transfer rate. Figure 10 zPilot Showing Transfer Rate Double-click the zPilot icon to display status details about the file transfers. Select an entry and click Pause, Resume, or Remove to control the transfer. After the transfer finishes you can select the entry and click Open Destination Folder to see the file on the NSA.
Chapter 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 new drive in Windows Explorer (My Computer) where you can access and use it like your computer’s other drives. Figure 13 Network Drive 2.8 Manage the Device In the main NAS Starter Utility screen click Configuration > Manage the Device to log into the NSA’s administration screens where you can manage the NSA. Enter the administrator user name and password and click Login. Figure 14 Login See Section 4.
Chapter 2 NAS Starter Utility for NSA221, NSA310, NSA320, and NSA325 Click Configuration > System Setting in the main utility screen to display the following screen. Figure 15 NAS Starter Utility > Configuration > System Setting The following table describes the labels in this screen. Table 4 NAS Starter Utility > Configuration > System Setting LABEL DESCRIPTION Server Name Specify a name to uniquely identify the NSA on your network.
C HAPT ER 3 NAS Starter Utility for NSA210 3.1 Overview This chapter describes the NAS Starter Utility for NSA210. Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it. Make sure you have a backup of any existing data in the hard disk before installing it in the NSA. Using the initialization wizard formats the hard disk and deletes all data in the process.
Chapter 3 NAS Starter Utility for NSA210 3.3 NAS Discovery Screen Use this screen to view the NSAs in your network. The NSA’s Server Name. The default is ‘nsa’ followed by the number of your model (‘nsa210’ for example). See Section 3.9 on page 45 for how to change it to a more recognizable one in your network. Start the NAS Starter Utility (click the icon in your Desktop or in Start > Programs > ZyXEL > NAS Starter Utility).
Chapter 3 NAS Starter Utility for NSA210 3.4 Main NAS Starter Utility Screen The main NAS Starter Utility screen displays after you select a NSA in the NSA Discovery screen. Figure 17 NAS Starter Utility Main Screen The following table describes the labels in this screen. Table 6 NAS Starter Utility Main Screen LABEL DESCRIPTION Discovery Click this to use the NSA Discovery screen (Section 3.3 on page 32) to find and select the NSA on your network to which you want to connect.
Chapter 3 NAS Starter Utility for NSA210 Table 6 NAS Starter Utility Main Screen LABEL DESCRIPTION Show the directory of the NSA Click this to open the NSA’s file directory in Windows Explorer. See Section 3.5.3 on page 42 for details. Run the Initialization Wizard Click this to set up the NSA for the first time. See Section 3.5 on page 34 for details.
Chapter 3 NAS Starter Utility for NSA210 Choose Default Configuration (recommended) or manual configuration. Use the manual option if you need to name the NSA to configure specific network settings. Click Next. Figure 19 Initialization Wizard: Wizard Type 3.5.1 Default Configuration 1 The NAS Starter Utility checks the Internet connection. Figure 20 Check Network Connection 2 Type a new administrator password (and retype it to confirm).
Chapter 3 NAS Starter Utility for NSA210 3 Specify usernames and passwords for the individuals you want to be able to access the NSA. Figure 22 Create User Accounts 4 Check your settings. If they are OK, click Next. Otherwise click Back. If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual. Figure 23 Confirm Settings 5 Wait while the NAS Starter Utility configures the NSA.
Chapter 3 NAS Starter Utility for NSA210 After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA’s shares (see Section 3.5.3 on page 42) or click Finish to return to the main NAS Starter Utility screen (see Section 3.4 on page 33). Figure 25 Setting the NAS 3.5.2 Manual Configuration 1 Set up the NSA’s basic network configuration first. Figure 26 Setup Network The following table describes the labels in this screen.
Chapter 3 NAS Starter Utility for NSA210 Table 7 NAS Starter Utility > Config 2 LABEL DESCRIPTION Use DNS server from DHCP server Domain Name System (DNS) is for mapping a domain name to its corresponding IP address and vice versa. Select this if the NSA is automatically given DNS information from the ISP or a DHCP server in your network.
Chapter 3 NAS Starter Utility for NSA210 4 Type a new administrator password (and retype it to confirm) and click Next. If you do not want to change the administrator password, you can leave the fields blank and just click Next. Figure 29 Change Admin Password 5 Specify a name to uniquely identify the NSA on your network. Choose the time zone of your location. This sets the time difference between your time zone and Greenwich Mean Time (GMT).
Chapter 3 NAS Starter Utility for NSA210 6 Select how to configure the hard disks. Figure 31 Choose HDD Configuration With only one hard disk installed, just click Next. If you have two hard disks installed choose one of the following: • RAID 1: Use this to mirror all data on one disk to the other disk to protect against data loss. • Individual Disks: Use this if you want maximum storage capacity and/or you have other means of protecting your data.
Chapter 3 NAS Starter Utility for NSA210 8 Specify usernames and passwords for the individuals you want to be able to access the NSA and click Next. Figure 33 Create User Accounts 9 If the settings are OK, click Next. Otherwise click Back. If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual. Figure 34 Confirm Settings 10 Wait while the NAS Starter Utility configures the NSA.
Chapter 3 NAS Starter Utility for NSA210 After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA’s shares (see Section 3.5.3 on page 42) or click Finish to return to the main NAS Starter Utility screen (see Section 3.4 on page 33). Figure 36 Setting the NAS 3.5.3 Directory of the NAS Enter the administrator user name and password and click Login. Figure 37 Login The utility opens the NSA’s directory in Windows Explorer.
Chapter 3 NAS Starter Utility for NSA210 3.6 Import Files or Folders with zPilot In the main NAS Starter Utility screen click Import files or folders with zPilot to be able to drag and drop files from your computer to the NSA. Enter the administrator user name and password and click Login. Figure 39 Login The zPilot icon displays. Figure 40 zPilot Drag files onto the zPilot icon to move them to the NSA. zPilot automatically sorts music, photo, and video files into the Music, Photo, and Video folders.
Chapter 3 NAS Starter Utility for NSA210 3.7 Add a Network Drive to My Computer In the main NAS Starter Utility screen click Add a network drive to My Computer to add the NSA as a network drive in your computer’s Windows Explorer. Enter your user name and password and click Login to be able to add the NSA’s shares to which you have access as network drives. Otherwise select Guest and click Login to be able to add the NSA’s public shares as network drives.
Chapter 3 NAS Starter Utility for NSA210 Enter the administrator user name and password and click Login. Figure 45 Login See Section 4.5 on page 62 for more on the administration screens. 3.9 Configure Network Setting Use these screens to change the NSA network settings such as the NSA’s name, IP address, subnet mask, default gateway, DNS, or PPPoE. Click Configure network setting in the main utility screen to display the following screen.
Chapter 3 NAS Starter Utility for NSA210 Table 8 NAS Starter Utility > Configure network setting LABEL DESCRIPTION Use DNS server from DHCP server Domain Name System (DNS) is for mapping a domain name to its corresponding IP address and vice versa. Select this if the NSA is automatically given DNS information from the ISP or a DHCP server in your network.
C HAPT ER 4 Web Configurator Basics 4.1 Overview This chapter describes how to access the NSA web configurator and provides an overview of its screens. The web configurator is an HTML-based management interface that allows easy NSA setup and management using an Internet browser. Use Internet Explorer 7.0, Mozilla Firefox 3.6, Safari 5, Google Chrome 10, or later versions of these browsers. The recommended screen resolution is 1024 by 768 pixels or higher.
Chapter 4 Web Configurator Basics more information on the NAS Starter Utility for NSA310, NSA320, NSA325, and NSA221 and Chapter 3 on page 31 for more information on the NAS Starter Utility for NSA210. Figure 48 NAS Starter Utility Main Screen for NSA310, NSA320, NSA325, and NSA221 4.2.2 Web Browser Access Configure the server name of your NSA using the Network Configuration screen (Section 3.9 on page 45) of the NAS Starter Utility. Open your browser and type in the server name of the NSA.
Chapter 4 Web Configurator Basics 4.3 Login The default username and password are ‘admin’ and ‘1234’ respectively. Enter your username and password. See Chapter 15 on page 301 for how to create other user accounts. If you use the option to stay logged in for two weeks (assuming you do not log out), make sure you keep your computer secure from unauthorized access. Click User Login to go to the Home screens where you can play media files.
Chapter 4 Web Configurator Basics If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore. Figure 51 Change Password Screen 4.4 Home Screens The Home screen after you log in using User Login.
Chapter 4 Web Configurator Basics The main Home screen displays icons for the various features you can access. Table 9 Main Home Screen Icons ICON DESCRIPTION Use Music, Photo, and Video to play and organize your music, picture, and video files. Use Favorite to create and edit playlists. Use File Browser to see your files in a tree-folder structure. Administrators can use Application Zone to install, access, and manage the NSA’s applications.
Chapter 4 Web Configurator Basics Here are some Home screen descriptions. A music screen is shown here as an example. Other screens work in a similar way. Figure 53 Music Screen A B C D This table describes common labels in the Home media screens. Not every item displays in every screen. Table 11 Home Media Screens LABEL DESCRIPTION A Click a letter to go to the first item starting with that letter. B View files. Double-click an item to play it.
Chapter 4 Web Configurator Basics Table 11 Home Media Screens LABEL DESCRIPTION List Click this to view the files as a list. Play Click this to play the currently selected file. You can also double-click a file to play it. Delete Select an item and click Delete to remove it. Rename Select an item and click Rename to change its name. Note: When you change a file name, make sure you keep the file extension unchanged.
Chapter 4 Web Configurator Basics 4.4.2 Exif and Google Maps (Photos) Click a photo’s EXIF button to display or hide the photo’s Exchangeable image file format (Exif) data. Figure 55 Exif Information If a photo’s Exif data includes GPS location data, click the latitude or longitude link to display the location in Google Maps. Click Clear to delete the markers of other photos and only display the current photo’s marker. Figure 56 Google Maps 4.4.
Chapter 4 Web Configurator Basics Note: Your browser must have the Flash Player plug-in installed to view slideshows. Figure 57 Slideshow When the CoolIris plugin is installed in your browser, click the Launch CoolIris button to display your photos as a 3-D wall for quick browsing. 4.4.4 Favorite Use the Favorite menu to manage your playlists. 4.4.4.
Chapter 4 Web Configurator Basics 4.4.4.2 My Favorite Use Favorite > My Favorite to create, edit, and play playlists. These playlists are specific to the NSA and cannot be used in external music players. Figure 58 Favorite > My Favorite This table describes labels in this menu. Table 12 Favorite > My Favorite LABEL DESCRIPTION New Click this to create a new playlist. Edit Double-click a playlist or select it and click Edit to go to a screen where you can remove songs from the playlist.
Chapter 4 Web Configurator Basics • The administrator owns and manages the public shares. • Double-click a media file to open it. Double-click other types of files to be able to save them. • Click to the right of a file or folder name to select it. • Use the [SHIFT] key to select a range of entries. Hold down the [CTRL] key to select multiple individual entries. • Drag and drop files to open a screen that lets you choose whether to copy or move them. • You can upload files of up to 2 GB in size.
Chapter 4 Web Configurator Basics Table 13 File Browser (continued) LABEL DESCRIPTION Configure Share Select a share and click this link to open a screen where you can see and configure share management details. Upload Click this to open the following screen where you can add files to the share. Use the Browse button to locate your file/s and click Apply to upload the file. Click Cancel to close this screen. Note: Do not refresh the screen while an upload is going on.
Chapter 4 Web Configurator Basics The following table describes the labels in the this screen. Table 14 File Browser > Configure Share LABEL DESCRIPTION Share Name Configure a name to identify this share. Type a share name from 1 to 239 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing local share. See Section 4.4.6 on page 59 for more information on share names.
Chapter 4 Web Configurator Basics • Multiple spaces within names are converted to a single space. • Share names must be unique (they cannot be the same as other share names). • The NSA creates automatic volume names for external (USB) disk volumes. These are a type of share, so the share name you configure cannot conflict with the external (USB) disk volume names. “ExtVol1” or “ExtVol2” are examples of external (USB) disk volume names.
Chapter 4 Web Configurator Basics Table 15 Application Zone (continued) LABEL DESCRIPTION Disable Select an enabled application and click this to turn off the application. Select the Flickr or Youtube Uploadr entry and click this to cancel all uploading. Some applications are always enabled and cannot be disabled. Pause Select the Flickr or Youtube Uploadr entry and click this to pause current uploading. Resume will resume current uploading.
Chapter 4 Web Configurator Basics Table 16 System > Settings (continued) LABEL DESCRIPTION Slide Interval Select how long to display each image in a slideshow before changing to the next. Video Playback Select Play Next to play the rest of the video files in a folder. So for example, a folder has video files 1~10 and you play video 3. When video 3 finishes the device continues playing the rest of the videos in the folder (4~10). It does not loop back and play videos 1 and 2.
Chapter 4 Web Configurator Basics 4.5.1 Global Administration Icons The icons and language label at the top-right of the screen ( 1 ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels. Table 17 Global Labels and Icons LABEL/ICON DESCRIPTION Language Select the web configurator language from the drop-down list box. Help Click this to open web help specific to the screen you are in.
Chapter 4 Web Configurator Basics Table 18 Screens Summary (continued) LINK SCREEN FUNCTION Applications FTP Server Enable FTP file transfer to/from the NSA, set the number of FTP connections allowed, an FTP idle timeout, and the character set. Media Server Enable or disable the sharing of media files and select which shares to share. Download Service Have the NSA handle large file downloads.
Chapter 4 Web Configurator Basics 4.5.4 Status Messages The message text box at the bottom of the screen ( 4 the NSA. ) displays status messages as you configure 4.5.5 Common Screen Icons The following table explains some icons that appear in several configuration screens. Table 19 Common Configuration Screen Icons ICON DESCRIPTION Edit Click this to go to a screen where you can change the configuration settings of an entry. Delete Click this to delete an entry from the list.
Chapter 4 Web Configurator Basics 4.5.6 Session Example (Windows) Open Windows Explorer and type two back slashes followed by the NSA name or IP address. Initially you can only read and write to the Public, Video, Music, and Photo folders until you create other shares on the NSA. This session is then displayed as shown in the following figure.
C HAPT ER 5 Tutorials 5.1 Overview This chapter provides tutorials that show how to use the NSA.
Chapter 5 Tutorials 68 1 Click Start > Control Panel. Set View by to Category and click Network and Internet. 2 Click View network computers and devices.
Chapter 5 Tutorials 3 The NSA icon displays twice because the NSA is both a media server and a storage device. Doubleclick either NSA icon to open the Web Configurator login screen. 5.2.1 If the NSA Icon Does Not Display The network containing the NSA must be set as a home or work network in order for the NSA icons to display. If the network containing the NSA displays as “Public”: 1 Click Network and Sharing Center and then the network’s link (circled in the figure).
Chapter 5 Tutorials 2 Use the Set Network Location screen to set the network’s location to home or work. 5.2.2 NSA Icon Right-click Options Right-click the NSA’s icon to see these options: • Install/Uninstall: Click Install to add the NSA as a device in your computer. After you install the NSA you can see it in the computer’s list of devices (see Section 5.5 on page 74. Click Uninstall to remove the NSA from the list of devices installed in your computer.
Chapter 5 Tutorials • Properties opens a window of NSA details and troubleshooting information. • Manufacturer identifies the company that produced the NSA. • Model identifies the NSA model. • Model number identifies the NSA model number. • Device webpage shows the IP address for accessing the Web Configurator. • Serial number is unavailable because the NSA does not have one. • MAC address is the NSA’s unique physical hardware address (MAC). You need the MAC address to register the product at myZyXEL.
Chapter 5 Tutorials 1 Click Start > Control Panel > View network status and tasks (or Network and Sharing Center if you view the Control Panel by icons). 2 Click See full map (1 in the figure). The network containing the NSA must be set as a home or work network in order to use the full map feature.
Chapter 5 Tutorials 3 Double-click the NSA’s icon to open the Web Configurator login screen. See Section 5.2.2 on page 70 for the NSA icon’s right-click options.
Chapter 5 Tutorials 5.4 Playing Media Files in Windows 7 In Windows 7, the NSA automatically displays as a library in Windows Media Player. Figure 64 NSA in Windows Media Player 5.5 Windows 7 Devices and Printers After you use the NSA’s network icon’s install option you can manage the NSA from the Windows 7 Devices and Printers folder.
Chapter 5 Tutorials Click Start > Control Panel > Hardware and Sound > Devices and Printers. Select the NSA icon to display information about the NSA. Double-click the NSA icon to open a properties window (see page 71). Right-click the icon to display these options: • Download NAS Starter Utility downloads the NSA’s Starter Utility. It lets you find, set up, and manage the NSA as well as copy files to it and access the files on it. See Chapter 3 on page 31 for details.
Chapter 5 Tutorials 5.5.1 Windows 7 Desktop Shortcut This is the NSA’s desktop shortcut. Double-click it to open a properties window (see page 71). 1 Right-click the NSA’s desktop shortcut icon to see these options: • Open file location takes you to the Windows 7 Devices and Printers folder. • Download NAS Starter Utility downloads the NSA’s Starter Utility. It lets you find, set up, and manage the NSA as well as copy files to it and access the files on it. See Chapter 3 on page 31 for details.
Chapter 5 Tutorials • Delete sends the shortcut to the recycle bin. • Rename lets you change the name of the shortcut. • Troubleshoot opens Windows’ device troubleshooting wizard. • Remove device removes the NSA from the Windows 7 Devices and Printers folder. • Properties opens a window of details about the shortcut. 5.6 Creating a Volume in a 2-Bay NSA This section shows you how to create a volume in your 2-bay NSA. Creating a volume deletes all existing data in the hard disk.
Chapter 5 Tutorials 5.6.2 Migrate Button Do the following steps to create a RAID 1 volume. 1 Once you install a second SATA hard disk in the NSA, the Storage > Volume screen shows the Migrate button. 2 Click the Migrate button and you can see the following progress bar. Wait for the RAID 1 volume to be created. This may take quite a while depending on how much data you have in the original volume. 5.6.
Chapter 5 Tutorials This deletes all existing data in the SATA hard disk. Make sure you have a backup of any existing data in the hard disk. The NSA starts creating the volume and you can see the following progress bar. Wait for the RAID 1 volume to be created. 3 The Storage > Volume screen displays with your RAID 1 volume. 5.7 Creating a Volume in a 1-Bay NSA This section shows you how to create a volume on your 1-bay NSA. Creating a volume deletes all existing data in the SATA or eSATA hard disk.
Chapter 5 Tutorials Your NSA has a single bay for a SATA (Serial Advanced Technology Attachment) hard disk. The firmware installed during hard disk initialization (Chapter 3 on page 31) automatically creates a JBOD volume on your SATA hard disk. JBOD is the default storage method if you are using a single hard disk for your NSA. This JBOD volume shows up in the Storage > Volume screen (Section 8.2 on page 162) as follows.
Chapter 5 Tutorials 2 Click the Migrate button and you can see the following progress bar. Wait for up to 10 minutes for the RAID 1 volume to be created. 5.7.3 Create a SATA Volume Button If you do not have an existing volume in the Storage > Volume screen, do the following steps to create a RAID 1 volume. 1 In the Storage > Volume screen, click Create a SATA Volume. 2 In the Disk Configuration screen, you can select the storage method. • Type in the Volume Name for your RAID 1 volume.
Chapter 5 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the RAID 1 volume to be created. 3 82 The Storage > Volume screen displays with your RAID 1 volume.
Chapter 5 Tutorials 5.7.4 Creating a PC Compatible Volume You can use your eSATA hard disk as a separate storage volume. The following section shows you how to create a PC Compatible Volume. Use this storage method if you have an eSATA hard disk that will be connected to a Windows computer when it is not connected to the NSA. However, the computer’s platform (for example, Windows XP SP2) should support the file system you selected for the eSATA hard disk.
Chapter 5 Tutorials The NSA starts creating the volume and you can see the following progress bar. Wait for 2 minutes for the volume to be created. 3 84 The Storage > Volume screen displays with your PC Compatible Volume.
Chapter 5 Tutorials 5.7.4.1 Checking Your PC Compatible Volume The files in the eSATA hard disk that you configured as a PC Compatible Volume should be accessible when you connect the eSATA hard disk to your computer. You can configure the features of your NSA to save files to your eSATA hard disk. For example, you can refer to Section 5.11 on page 111 to use the Broadcatching feature of your NSA to download files to your eSATA disk.
Chapter 5 Tutorials 3 Disconnect the eSATA hard disk from the NSA. Connect the eSATA hard disk to your computer. On some systems, you can see the following notification. 4 The computer assigns a letter to the eSATA hard disk (drive F in this example) that is accessible from the My Computer screen. Double click the eSATA drive and check your files. They should be the same files that are in the My NSA > Share Browser screen. 5.
Chapter 5 Tutorials 1 2 In the Storage > Volume screen, select the volume you want to delete and click the delete icon. A confirmation window appears as follows. Click Yes. This deletes all existing data in the volume. Make sure you have a backup of any existing data in the hard disk. 5.9 File Sharing Tutorials The following sections cover using the NSA for file sharing.
Chapter 5 Tutorials 88 1 At the NSA web configurator login screen enter the administrator account and password and click Administrator Login to go to the advanced administration screens. 2 Click Sharing > Users to open the Users screen. Then click Add User.
Chapter 5 Tutorials 3 Configure the screen as follows and write down the username and password to give to Jimmy. If the username and password are the same as Jimmy’s Windows login, Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn’t get to configure the whole NSA. Click Apply to create the account. 4 The account now displays in the Users screen.
Chapter 5 Tutorials 90 1 In the NSA’s administration web configurator screens, click Shares > Add Share. Click Add Share to create a new share. 2 Specify a name for the share and select which volume it should be on. Configure the screen as follows. Then click Edit.
Chapter 5 Tutorials 3 Configure the screen as follows to give Jimmy full access right to the share. Then click Apply to create the share. Now that Bob has created Jimmy’s share, he can go through the steps again to create another share for Kevin. 5.9.3 Creating a Group After creating user accounts for Jimmy and Kevin, Bob wants to create a group for his sons and another one for the parents.
Chapter 5 Tutorials 2 Specify a name for the group. Select the user(s) you want to add to the group from the Available User(s) list and click Add Selected User(s). Configure the screen as follows. Then click Apply to create the group. Now that Bob has created a group for Jimmy and Kevin, he can go through the steps again to create another group for the parents. Then he can see the rest of the tutorials for how to use the groups in assigning access rights to shares. 5.9.
Chapter 5 Tutorials 3 Select the network drive that you want to map the NSA to from the Drive list box. This example uses I. Then browse to and select the share on the NSA. Click Finish. 4 Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login.
Chapter 5 Tutorials 5 After the mapping is done, you can then simply copy and paste or drag and drop files from/to your local computer’s drives to or from this network folder. Just like the NSA’s share was another folder on your computer. Now that Bob has mapped Jimmy’s share to Jimmy’s computer, he can go through the steps again to map Kevin’s share to Kevin’s computer. 5.9.5 Accessing a Share Using FTP You can also use FTP to access the NSA.
Chapter 5 Tutorials 2 Enter your password and click Login. 3 Now you can access files and copy files from/to your local computer’s drives to or from this network folder. 5.9.6 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator.
Chapter 5 Tutorials 1 Log into the NSA web configurator (see Section 4.3 on page 49) using the appropriate user name and password (this example uses Jimmy’s) and click File Browser. Click a share (the Jimmy share in this example) to see the top level of the share’s contents. 2 Click a folder’s file name to browse the folder. You can open files or copy them to your computer. You can also create new folders and upload additional files to the share. 3 Click the logout icon when your are done. 5.
Chapter 5 Tutorials 2 Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a datasheet for ZyXEL’s GS-2024 (a device for making phone calls over the Internet). Note: Make sure the link opens either the file you want or a pop-up window about how to handle the file. Note: It is also OK for the link to open a .torrent file.
Chapter 5 Tutorials 98 4 Log into the NSA web configurator (see Section 4.3 on page 49) using the administrator account and click Application Zone and the Application Zone > Download Service link. 5 Click Add.
Chapter 5 Tutorials 6 Right-click the URL field and select Paste. 7 The URL displays in the URL field. Click Apply. 8 After a few moments, the download task appears in the Download Service screen’s Active tab. The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share’s download folder. See Section 5.9.4 on page 92, Section 5.9.5 on page 94, or Section 5.9.6 on page 95 for how to access a share. 5.10.
Chapter 5 Tutorials Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7. Internet Explorer 100 1 Open the folder containing the link capture browser plugin. 2 Double-click on the plugin to display the following screen. Click I Agree to begin installation. 3 Select a location to save the plugin and click Install. Close the screen once the installation is complete.
Chapter 5 Tutorials 4 Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting. 5 Enter the NSA’s web address. The default is ‘nsa’ followed by the number of your model (‘nsa320’ for example). Then click Apply. A warning message displays asking for confirmation. Click OK to apply the setting. Firefox 1 Open Firefox.
Chapter 5 Tutorials 102 3 To install the plugin, drag and drop the plugin to Firefox. 4 The following screen displays. Click Install Now.
Chapter 5 Tutorials 5 You need to restart Firefox after the installation. 6 When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA’s web address.
Chapter 5 Tutorials 7 Enter the NSA’s web address. The default is ‘nsa’ followed by the number of your model (‘nsa320’ for example). Then click OK. 5.10.3 Using the Link Capture Browser Plugin Once you install the plugin, you may begin sending download links to the NSA from your web browser. This example shows how to send a download link to the NSA’s download service using the link capture browser plugin. 104 1 Open your Internet browser (this example uses Firefox).
Chapter 5 Tutorials 4 The login screen shows up. Enter your NSA’s login information and click Login to send the link to the download service. A confirmation message displays. 5 Log into the NSA web configurator (see Section 4.3 on page 49) using the administrator account and click Application Zone and the Application Zone > Download Service link. 6 The download task appears in the Download Service screen’s Active or Queue tab.
Chapter 5 Tutorials By default the NSA stores all downloads in the admin share’s download folder. See Section 5.9.4 on page 92, Section 5.9.5 on page 94, or Section 5.9.6 on page 95 for how to access a share. 5.10.4 Configuring the Download Service Preferences Once you added a list of download tasks to the NSA (see Section 5.10.1 on page 96 and Section 5.10.3 on page 104), you can have the NSA download files during a specific time period of the day.
Chapter 5 Tutorials 3 When it is not the download time, you see a message in the Download Service screen, indicating the active download period. Click Applications > Download Service > Preferences > P2P download to open the following screen. Enter the information below and then click Apply. Here is a list of P2P download settings you want to configure for your NSA: • Limit the maximum upload rate to 20 KB/s. Enter this value in the Max. upload rate field.
Chapter 5 Tutorials • Click Edit IP Filter. Use an online IP filter table from http://www.bluetack.co.uk/config/level1.gz for example to protect P2P downloads. Enter the URL in the Update IP Filter from the Internet Every Week field. 5.10.5 Using Download Service Notification Use an RSS feed reader on your computer to keep track of files the NSA has downloaded. The following examples show how to subscribe to the NSA’s download service notifications. See Section 10.11.
Chapter 5 Tutorials Internet Explorer 7 Example 1 After you activate download service notification, click the RSS feed icon. 2 The following screen displays. Select Subscribe to this feed. 3 The following screen displays. Click Subscribe.
Chapter 5 Tutorials 4 Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Firefox Example 110 1 After you activate download service notification, click the RSS feed icon. 2 The following screen displays. Select Live Bookmarks from the drop-down list and click Subscribe Now. 3 The following screen displays. Select Bookmarks Menu and click Add.
Chapter 5 Tutorials 4 From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list. 5.11 Broadcatching Tutorial Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV Internet television channel. See Section 10.8 on page 207 for more on the broadcatching service.
Chapter 5 Tutorials 2 Find the link for the RSS feed containing the channel you want to add. In this example, http:// reviews.cnet.com/4520-11455_7-6333605-1.html has an RSS link for subscribing to the CNET Live podcast. However this is not the link for the actual RSS feed. Click the link to go to another screen that has RSS feed links. Note: Make sure the link goes to the actual RSS feed instead of to another list of links or information about the channel. One way to test this is by clicking the link.
Chapter 5 Tutorials 3 Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer). 4 Log into the NSA web configurator (see Section 4.3 on page 49) using the administrator account and click Administration > Applications > Broadcatching. 5 Click Add Channel.
Chapter 5 Tutorials 6 Right-click the URL field and select Paste. 7 The URL displays in the URL field. 8 Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later. 9 Select a policy for what items to delete. This example keeps the most recent 10 items. 10 Click Apply. 11 After a few moments, the channel appears in the Broadcatching screen where you can select items you want to download.
Chapter 5 Tutorials 5.12 Printer Server Tutorial Do the following to have the NSA let computers on your network share a printer. See www.zyxel.com for a list of compatible printers. 1 Make sure the NSA is on and the SYS light is on steady (not blinking). 2 Use a USB cable to connect the printer’s USB port to one of the NSA’s USB ports. Make sure the printer is also connected to an appropriate power source. NSA 3 Turn on the printer. 4 The NSA detects the printer after a few moments.
Chapter 5 Tutorials 6 If you get a warning screen, click the option that lets you continue (Yes in this example). 7 If your computer does not already have the printer’s driver installed, you will need to install it. In this example, click OK. 8 Use the wizard screens to install the printer driver on the computer. You may need to get the file from the printer’s CD or the printer manufacturer’s website (the driver is not installed on the NSA).
Chapter 5 Tutorials 5.13 Copy and Flickr Auto Upload Tutorial Amy received some photos taken during her best friend’s wedding and saved the files on a USB disk. She wants to save a copy of the photos in the NSA and upload the photos to her Flickr account. Amy has to activate the NSA’s auto upload feature. See Section 12.4 on page 279 for more details on setting up a Flickr account for auto upload. In this example Amy select the NSA’s photo share for auto upload.
Chapter 5 Tutorials 5 The NSA also automatically uploads the copied files to Flickr. r 5.14 FTP Uploadr Tutorial FTP Uploadr can automatically upload files saved on the NSA to a remote FTP server. Amy wants to share files on her NSA with Susan. They each have an NSA at home, so Susan has to set her NSA as an FTP server for Amy to automatically send files using FTP Uploadr. l Amy’s NSA Susan’s NSA To set the NSA as an FTP server, click Applications > FTP to open the FTP screen.
Chapter 5 Tutorials Susan also has to create a user account and share on her NSA for Amy to upload files. The share is used for files uploaded from Amy’s NSA. Amy will then use the following information to configure FTP Uploadr on her NSA. Table 20 FTP Uploadr Tutorial: FTP Server Information FTP Domain Name or IP Address example2.com FTP User Name Amy FTP Password xxxxx Share (Remote Path) Amy This is how Amy would set up the NSA’s FTP Uploadr.
Chapter 5 Tutorials 4 In the FTP Uploadr screen, click Preferences to configure the auto upload settings. 5 Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List.
Chapter 5 Tutorials 6 Amy also set the Bandwidth Limit to 20KB/s so that the upload doesn’t slow down her Internet connection. Now Amy has set up FTP Uploadr to send files to Susan’s NSA. Every time Amy adds new files or renames files in the video share, these new or modified files will be uploaded automatically to the Amy share on Susan’s NSA. Similarly, Susan can go through the steps described above to configure FTP Uploadr on her NSA.
Chapter 5 Tutorials 5.15.1 Customizing the NSA’s Certificate 122 1 Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit. 2 Next, let’s modify the certificate by changing the Common Name to this NSA’s host name of “nsa”, the Organization to “ZyXEL” and the Key Length to 2048.
Chapter 5 Tutorials 3 The NSA restarts its network services and returns you to the login screen. 5.15.2 Downloading and Installing Customized Certificate 1 Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download.
Chapter 5 Tutorials 124 2 Save the file to your computer. 3 Find the certificate file on your computer and double-click it.
Chapter 5 Tutorials 4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix D on page 407 for other examples. In the Certificate dialog box, click Install Certificate. 5 In the Certificate Import Wizard, click Next.
Chapter 5 Tutorials 126 6 Leave Automatically select certificate store based on the type of certificate selected and click Next. 7 In the Completing the Certificate Import Wizard screen, click Finish.
Chapter 5 Tutorials 8 If you are presented with another Security Warning, click Yes. 9 Finally, click OK when presented with the successful certificate installation message. 5.15.3 Turn on the NSA’s Web Security Now that you have customized the NSA’s certificate and installed it in your computer, you can turn on security for your Web Configurator sessions. This example uses Firefox 3.0. See Appendix D on page 407 for more information on browsers and certificates.
Chapter 5 Tutorials 128 1 Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. 2 A warning screen pops up if applying your change may disconnect some users. Click Apply to continue.
Chapter 5 Tutorials 3 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. 4 Click Add Exception.
Chapter 5 Tutorials 5 130 Click Get Certificate.
Chapter 5 Tutorials 6 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View.
Chapter 5 Tutorials 7 132 The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close.
Chapter 5 Tutorials 8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. 9 The login screen displays. Now, anyone who connects to the NSA’s Web Configurator screens will automatically do so by HTTPs. Use a secure method to let your users know the correct fingerprint for the NSA’s certificate so they can check it before adding a security exception (as in steps 6 to 7 on pages 131 to 132).
Chapter 5 Tutorials 5.16 Using FTPES to Connect to the NSA This section covers how to use FTP over Explicit TLS/SSL with the NSA for secure FTP transfers. Before you go through this section, read Section 5.15 on page 121 to configure HTTPS. This example uses FileZilla. 1 Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA’s address. • Set the Servertype to FTPES - FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect.
Chapter 5 Tutorials 2 A security warning screen displays. The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). If they match, click OK. The shares and folders to which Gonzo has access display. Now you can use FTP to securely transfer files to or from the NSA.
Chapter 5 Tutorials 5.17.1 Finder 136 1 Open a new Finder window. 2 Select All under the SHARED sidebar. Look for the NSA from the Network list.
Chapter 5 Tutorials 3 Expand the NSA to display the shares you may access. 5.17.2 Go Menu 4 In the Finder, click Go > Connect to Server.
Chapter 5 Tutorials 5 When the Connect to Server dialog box opens, enter smb:// and the NSA’s IP address in the Server Address field. You may also click Browse to have the Mac search for the NSA. Click Connect. 6 Once you establish the connection, you can access the NSA from the Finder or directly from the desktop. 5.18 How to Use the BackupPlanner Note: The screens and links in this section appear only after you have installed and enabled BackupPlanner.
Chapter 5 Tutorials 1 Click Protect > Backup > Add Job. Figure 65 Protect > Backup 2 Identify the backup job and select Archive. New files are often added to the shares that you need to back up and existing files are not frequently changed so select Incremental. The NSA does a full backup first and later only copies source files that are new and/or modified since the last backup. This example sets the NSA to do another full backup after every four incremental backups.
Chapter 5 Tutorials 3 Select the volume1 check box to select all the folders and files. Select Remote and enter the other NSA’s address, username, password, and share name. If you want to make sure the remote NSA is reachable, click Test Connection.
Chapter 5 Tutorials 4 In this example, the target NSA is on the LAN so leave the compression off. Security is already configured on the target NSA so you can leave the encryption off, too. Have the NSA keep 3 backups. Figure 68 Protect > Backup > Add Job: Step 3 5 Set the frequency to Weekly. Schedule the backup for 5:00 every Saturday morning. Protect > Backup > Add Job: Step 4 5.18.
Chapter 5 Tutorials 1 Click Protect > Backup > Add Job. Figure 69 Protect > Backup Name the backup job and select Synchronization. You want only your current set of files in the remote NSA’s folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder. Figure 70 Protect > Backup > Add Job: Step 1 2 Select the folder that needs to be mirrored (your Private folder in this example) and Remote.
Chapter 5 Tutorials • Click Next. Figure 71 Protect > Backup > Add Job: Step 2 3 Click OK in the warning dialog box. Figure 72 Protect > Backup > Add Job: Step 3 4 For this example, assume the connection to the German branch office is a good one and not many files need to be backed up so leave the compression off. • Turn on the encryption to protect these sensitive files during the transfer. The final files stored on the remote NSA will be unencrypted (usable).
Chapter 5 Tutorials • Click Next. Figure 73 Protect > Backup > Add Job: Step 3 5 Schedule the backup to occur every morning at 3:00 and click Done. Figure 74 Protect > Backup > Add Job: Step 4 You do not need to use a special restore process to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA’s Backups share can be used directly by anyone with access to that share. 5.18.
Chapter 5 Tutorials 1 Click Protect > Backup screen, select a backup job and click Restore Archive. Figure 75 Protect > Backup 2 Select which backup to use and click Next.
Chapter 5 Tutorials 3 Select the files and folders you want to restore and click Next. Figure 77 Protect > Backup > Restore Archive: Step 2 4 Select the original location and click Done.
Chapter 5 Tutorials 5 The NSA restores the files into the share. When it finishes you can access the files. Figure 79 Protect > Backup > Restore Archive: Progress 5.18.4 Restoring by Backup Files If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore archived files by the backup job. In this example, the NSA’s RAID array failed. You’ve replaced the hard drives and re-configured the RAID. To restore by backup files: 1 Click Protect > Restore.
Chapter 5 Tutorials 2 Select the backup job and backup time and click Next. Figure 81 Protect > Restore: Step 2 3 Select everything in the share except the recycle folder. Click Next.
Chapter 5 Tutorials 4 Browse to the folder where you want to put the files. Click Done. Figure 83 Protect > Restore: Step 4 5 The NSA restores the files and you can use them again.
Chapter 5 Tutorials 150 Media Server User’s Guide
P ART II Technical Reference 151
C HAPT ER 6 Status Screen 6.1 Overview This chapter describes the Status screen, which is the first advanced administration screen that displays. 6.2 The Status Screen Click Administration in the Home screens (Section 4.5 on page 62) to open the Web Configurator. You can also view the status screen, by clicking Status on the top-left of the navigation panel.
Chapter 6 Status Screen The following table describes the labels in this screen. Table 21 Status LABEL DESCRIPTION Status Click this to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network. Click the Edit icon to go to the screen where you can configure this. Model Name This displays which model this NSA device is. Firmware Version This is the NSA firmware version.
Chapter 6 Status Screen Table 21 Status (continued) LABEL DESCRIPTION External Volume (or USB Volume) This displays the volumes created on USB hard drives connected to the NSA. USB disks are numbered in the order that you insert USB devices. Click the Edit icon to open the Storage screen. You can create and edit the external volume. See Chapter 8 on page 161 for more details. Status This icon indicates whether the volume is healthy, degraded, or down. Name This field shows the name for the volume.
Chapter 6 Status Screen 156 Media Server User’s Guide
C HAPT ER 7 System Setting 7.1 Overview This chapter gives an overview of the various features included in the system setting screens. You can identify your NSA on the network and set the time that the NSA follows for its scheduled tasks/ logs. 7.2 What You Can Do • Use the Server Name screen (Section 7.4 on page 158) to specify the NSA’s server and workgroup names. • Use the Date/Time screen (Section 7.5 on page 158) to set up date/time and choose a time zone for the NSA. 7.
Chapter 7 System Setting 7.4 The Server Name Screen Click System Setting > Server Name to open the following screen. Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup. Note: CIFS cannot be disabled on the NSA. Figure 85 System Setting > Server Name The following table describes the labels in these screens.
Chapter 7 System Setting Click the System Setting link in the navigation panel and then click the Date/Time link to access the Date/Time screen. Figure 86 System Setting > Date/Time The following table describes the labels in this screen. Table 23 System Setting > Date/Time LABEL DESCRIPTION Current System Date Time Setting Current Time This field displays the time used by your NSA for its logs and alerts. Current Date This field displays the date used by your NSA for its logs and alerts.
Chapter 7 System Setting Table 23 System Setting > Date/Time (continued) LABEL Synchronize Now DESCRIPTION Click this for the NSA to retrieve the correct time from the configured time server right away. Time Zone Time Zone Choose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT).
C HAPT ER 8 Storage 8.1 Overview Several NSA features require a valid internal volume. This chapter covers the management of volumes and disks (both internal and external). Use the Storage screen (Section 8.2 on page 162) to display information on all volumes, create internal and external volumes, and configure the volume’s properties. 8.1.1 What You Need to Know About Storage Disk The NSA210 requires an initialized SATA (Serial Advanced Technology Attachment) hard disk to function.
Chapter 8 Storage The storage method you use depends on how many disks you have and how many volumes you want to create. It’s important that you consider this carefully as all data is deleted when you recreate a volume. See Figure 8.6.2 on page 170 for details on choosing a storage method. Note: 1-bay models configure the internal hard disk (SATA) as JBOD by default. You can modify it if you attach a second internal hard disk (an eSATA hard disk). Finding Out More See Section 8.
Chapter 8 Storage volume again. After the NSA finishes the second repair, use the Expand icon to have the RAID1 volume use the rest of the hard disk capacity. 8.2.2 Storage Screen Click Storage > Volume in the navigation panel to display the following screen. Use this screen to display internal and external volumes on the NSA. Note: It is recommended to scan the volume every three months or 32 reboots. Figure 87 Storage > Volume The following table describes the labels in this screen.
Chapter 8 Storage Table 24 Storage > Volume (continued) LABEL DESCRIPTION Disk(s) Click or roll your mouse over a link in this column to display the following details about the hard drive located in the corresponding hard drive bay. Type: Whether it is an internal or external (USB) hard drive. Model Name: This is the hard disk number that identifies the disk. File System: The file system that an external volume is using Capacity: The total storage space on the disk.
Chapter 8 Storage used. For a degraded volume, you should replace the faulty disk as soon as possible to obtain previous performance. See your Quick Start Guide for more information on replacing a disk. If it’s down, then the only indication is that you can no longer transfer files to/from the shares in the down volume. If it’s degraded, then file transfer to/from the shares in the degraded volume will be slower.
Chapter 8 Storage The following table describes the labels in this screen. Table 25 Storage > Create an Internal Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters. To avoid confusion, it is highly recommended that each volume use a unique name. Acceptable characters are all alphanumeric characters, " " [spaces], "_" [underscores], and "." [periods]. The first character must be alphanumeric (A-Z 0-9). The last character cannot be a space " ".
Chapter 8 Storage Note: Once you create the first volume on the NSA, it is recommended to restart the NSA for better performance. 8.4 Editing a Volume Click an internal volume’s Edit icon in the Storage screen as shown in Figure 87 on page 163 to open the following screen. Use this screen to change the volume’s name. Figure 90 Storage > Edit The following table describes the labels in this screen.
Chapter 8 Storage 8.4.1 Scanning a Volume Select a volume in the Storage > Volume screen (Section 8.2 on page 162) and click Scan to open the following screen. Use this screen to scan the volume for errors and select whether or not to have the NSA automatically repair them. Figure 91 Storage > Volume > Scan The following table describes the labels in this screen.
Chapter 8 Storage Note: Creating a volume formats the drive. All data on the disk will be lost. Figure 92 Storage > Create an External Volume The following table describes the labels in this screen. Table 28 Storage > Create an External Volume LABEL DESCRIPTION Volume Name Type a volume name from 1 to 31 characters. The name cannot be the same as another existing external volume. Acceptable characters are all alphanumeric characters and " " [spaces], "_" [underscores], and "." [periods].
Chapter 8 Storage 8.6 Storage Technical Reference This section provides some background information about the topics covered in this chapter. 8.6.1 Volumes and RAID A volume is a storage area on a disk or disks. You can create volumes on the internal disks and external disks attached to the USB port(s). You can spread a volume across internal disks but not between internal and external disks. RAID (Redundant Array of Independent Disks) or JBOD is the storage method that the NSA uses.
Chapter 8 Storage Two Disks: You may choose JBOD, RAID 0 or RAID 1. With two disks you could create: • up to two JBOD volumes • one RAID 0 or RAID 1 volume • Choose JBOD for flexibility and maximum usage of disk space for data. • If you have a 2-bay model, you can choose RAID 0 if performance matters more than data security. RAID 0 has the fastest read and write performance but if one disk fails you lose all your data on the volume.
Chapter 8 Storage Note: In the following figures, A1, A2, A3 and so on are blocks of data from the A file. Similarly, B1, B2, B3 and C1, C2, C3 ar blocks of data from the B and C files. JBOD JBOD allows you to combine multiple physical disk drives into a single virtual one, so they appear as a single large disk. JBOD can be used to turn multiple different-sized drives into one big drive. For example, JBOD could convert 80 GB and 100 GB drives into one large logical drive of 180 GB.
Chapter 8 Storage RAID 1 RAID 1 creates an exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity. The following figure shows two disks in a single RAID 1 volume with mirrored data. Data is duplicated across two disks, so if one disk fails, there is still a copy of the data.
Chapter 8 Storage 174 Media Server User’s Guide
C HAPT ER 9 Network 9.1 Overview This chapter discusses the network configuration screens. The Network screens allow you to configure TCP/IP and PPPoE settings for the NSA. 9.2 What You Can Do • Use the TCP/IP screen (Section 9.4 on page 176) to assign the NSA a dynamic or static IP address and DNS information. • Use UPnP port mapping (Section 9.5 on page 178) to automatically configure your Internet gateway’s firewall and Network Address Translation (NAT) to allow access to the NSA from the Internet.
Chapter 9 Network Jumbo Frames Jumbo frames are Ethernet frames larger than 1500 bytes. They enable data transfer with less overhead. The bigger the frame, the better the network performance. Your network equipment such as computers, switches and routers must be capable of supporting jumbo frames. You also need to enable jumbo frames in all related network devices. To use jumbo frames, your LAN must support 1 Gbps transmissions (Gigabit Ethernet).
Chapter 9 Network Note: If you change the NSA’s IP address, you need to log in again after you apply changes. Figure 94 Network > TCP/IP The following table describes the labels in this screen. Table 33 Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NSA get IP address information automatically. If no IP address information is assigned, the NSA uses Auto-IP to assign itself an IP address and subnet mask.
Chapter 9 Network Table 33 Network > TCP/IP (continued) LABEL DESCRIPTION DNS DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. If you have the IP address(es) of the DNS server(s), enter them. Dynamic Select the option to have the NSA get a DNS server address automatically. Static Select this option to choose a static DNS server address. Type the DNS server IP address(es) into the fields below.
Chapter 9 Network network connectivity between devices. UPnP can automatically configure the Internet gateway’s firewall and Network Address Translation (NAT) to allow access to the NSA from the Internet. Figure 95 UPnP for FTP Access 192.168.1.20 a.b.c.d TCP: 21 TCP: 21 In the above example, UPnP creates a firewall rule and NAT port forwarding mapping to send FTP traffic (using TCP port number 21) from the public IP address a.b.c.d to the NSA’s private IP address of 192.168.1.20.
Chapter 9 Network the NSA from the LAN and re-apply your UPnP Port Mapping screen settings to update the Internet gateway’s UPnP port mappings. Figure 97 UPnP Using the Wrong IP Address 192.168.1.34 a.b.c.d 192.168.1.33 9.5.2 UPnP and Security UPnP’s automated nature makes it easier to use than manually configuring firewall and NAT rules, but it is also less secure. Using UPnP may make your network more susceptible to snooping and hacking attacks. 9.5.
Chapter 9 Network (instead of the default of port 80) to make it more secure. Remember to use the custom port number when accessing the NSA’s web configurator from the Internet. HTTP (Web Published Shares) This is the NSA’s web publishing feature that lets people access files using a web browser without having to log into the Home screens. Use UPnP port mapping to allow access to these files from the Internet without having to enter a user name or password. See Section 10.
Chapter 9 Network The following table describes the labels in this screen. Table 34 Network > UPnP > Port Mapping LABEL DESCRIPTION LAN Use these fields to specify what port the Internet gateway uses to connect from its LAN port to the service on the NSA. Service Name This read-only field identifies a service on the NSA. LAN Port Specify the port number (1~65,536) the Internet gateway needs to use to connect from its LAN port to the service on the NSA.
Chapter 9 Network Click Network > PPPoE in the navigation panel to open the following screen. Figure 99 Network > PPPoE The following table describes the labels in this screen. Table 35 Network > PPPoE LABEL DESCRIPTION Status Status This field displays the status of PPPoE connection. IP Address This field displays the IP address of your PPPoE connection. IP Subnet Mask This field displays the IP subnet mask of your PPPoE connection.
Chapter 9 Network 184 Media Server User’s Guide
C HAPTER 10 Applications 10.1 Overview This chapter discusses the features in the Application screens. The NSA contains various applications for file sharing and downloading. 10.2 What You Can Do • Use the FTP Server screen (Section 10.4 on page 188) to configure settings for FTP file transfers to/from the NSA. • Use the Media Server screen (Section 10.5 on page 189) to share files with media clients. • Use the Download Service screen (Section 10.6 on page 194) to download files from the Internet.
Chapter 10 Applications FTPES (File Transfer Protocol over Explicit TLS/SSL) File Transfer Protocol over Explicit TLS/SSL (FTPES) is a file transfer service that uses either TLS (Transport Layer Security) or SSL (Secure Sockets Layer) for secure transfers across the Internet. It requests for a mutual method of encryption from the FTP server for its file transfer sessions. Your FTP client must be set to use FTPES as in the following example.
Chapter 10 Applications Web Publishing Web publishing lets you “publish” shares (containing folders and files) on the NSA so people can access the files using a web browser without having to log into the Home screens. This way you can share files with others without them having to know and enter a username and password.
Chapter 10 Applications 10.4 FTP Server Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA and download files from the NSA. Click Applications > FTP to open the following screen. Figure 101 Applications > FTP The following table describes the labels in this screen. Table 36 Applications > FTP LABEL DESCRIPTION FTP Enable FTP Connection Limit Enter the maximum number of concurrent FTP connections allowed on the NSA in this field. See your screen for your model’s connection limit.
Chapter 10 Applications Table 36 Applications > FTP LABEL DESCRIPTION Customize the port range for data transfer Select this check box to assign a port range for FTP clients to use when downloading files from the NSA using passive mode. The connection limit is restricted to half of the port numbers within the range if this value is smaller than the one configured in the Connection Limit field. For example, you specified a port range from 1024 to 1029 and configured 10 in the Connection Limit field.
Chapter 10 Applications Click Applications > Media Server to open the following screen. Use this screen to view the media server’s status and rebuild the media server database. Figure 102 Applications > Media Server > Media Server The following table describes the labels in this screen. Table 37 Applications > Media Server > Media Server LABEL DESCRIPTION Status This shows the media server’s current state of activity. Synchronizing displays while the NSA is building the media database.
Chapter 10 Applications Table 37 Applications > Media Server > Media Server LABEL DESCRIPTION Auto Scan Published Shares The NSA has to scan the published shares and find the media files before the media server can share them. Select this to automatically scan the published shares for media files. The auto-scan after adding a large number of files to your published shares could take up enough of the NSA’s resources to slow other functions like file downloads or sharing.
Chapter 10 Applications Table 38 Applications > Media Server > Share Publish LABEL DESCRIPTION Apply Click this to save your changes. Reset Click this to restore your previously saved settings. 10.5.2 The Media Server ID3 Tag Decoding Screen Click Applications > Media Server > ID3 Tag Decoding to open the following screen. ID3 tags store information about a media file such as the title, artist, album, and genre in the file itself.
Chapter 10 Applications Table 39 Applications > Media Server > ID3 Tag Decoding LABEL DESCRIPTION Selected Character Sets This list box displays the character sets the NSA can use to decode ID3 tags in your media files. The NSA attempts to use them in the order listed so select character sets and use the up or down arrow to change their order to match the types of files you have. So if most of your files are German, move the French, German and Italian (ISO-8859-15) selection to the top of the list.
Chapter 10 Applications The following table describes the labels in this screen. Table 41 Applications > Media Server > SqueezeCenter LABEL DESCRIPTION Enable SqueezeCenter Check this to enable SqueezeCenter. Apply Click this to save your changes. Reset Click this to restore your previously saved settings. 10.6 The Download Service Screen The Download Service screen allows you to download files from the Internet. Click Applications > Download Service to open the following screen.
Chapter 10 Applications Table 42 Applications > Download Service (continued) LABEL DESCRIPTION Preferences Click this to open a screen where you can set the default location for saving downloads and configure your P2P download settings. Refresh Click this to update the information displayed on the screen. Select Files A single P2P download torrent file is often for multiple files. If you do not need all of the files the torrent file specifies, click this to select which files to download.
Chapter 10 Applications Table 42 Applications > Download Service (continued) LABEL Status DESCRIPTION The following icons show the download’s status. Completed: The NSA has downloaded the whole file. Seeding: The download is finished and the NSA is allowing other P2P users to download it. Downloading: The NSA is getting the file. Queued: The download is waiting in line for the NSA to download it. Pause: The download has been manually stopped. Select it and click Resume to continue it.
Chapter 10 Applications 10.6.1 Adding a Download Task Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 5.10 on page 96 provides a tutorial on adding a download task. Figure 108 Applications > Download Service > Add The following table describes the labels in this screen. Table 43 Applications > Download Service > Add LABEL DESCRIPTION Source URL Paste the URL of the file you want to download into this field.
Chapter 10 Applications Table 43 Applications > Download Service > Add LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 10 Applications 10.6.2 Configuring General Settings Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period.
Chapter 10 Applications The following table describes the labels in this screen. Table 44 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded.
Chapter 10 Applications Table 44 Applications > Download Service > Preferences > General Settings LABEL DESCRIPTION Download Service is active in the time period (hh:mm hh:mm) Specify the time period for the NSA to download files. Apply Click this to save your changes. Reset Click this to restore your previously saved settings. Cancel Click this to return to the previous screen without saving.
Chapter 10 Applications The following table describes the labels in this screen. Table 45 Applications > Download Service > Preferences > P2P download LABEL DESCRIPTION Port Number Assign a port number for P2P downloads. You can select a number from 2 to 65536. It is recommended to use a port number greater than 1025. DHT Select Enable or Disable to use Distributed Hash Table (DHT) or not.
Chapter 10 Applications Table 45 Applications > Download Service > Preferences > P2P download LABEL DESCRIPTION Reset Click this to restore your previously saved settings. Cancel Click this to return to the previous screen without saving. 10.6.4 Edit IP Filter Use this screen to enable or disable IP filtering for P2P downloads. IP filtering blocks IP addresses known to share fake files. You can either get an IP filter table from a website or use your own table.
Chapter 10 Applications 10.6.5 Selecting Files to Download Select an item in the Applications > Download Service screen’s list and click Select Files to open the following screen. Use this screen to select which of the torrent’s files to download. Section 5.10 on page 96 provides a tutorial on adding a download task. Figure 112 Applications > Download Service > Select Files The following table describes the labels in this screen.
Chapter 10 Applications 10.6.6 Displaying the Task Information Select an item on the list and click Task Info. Use this screen to check detailed information about the task. Figure 113 Applications > Download Service > Task Info The following table describes the labels in this screen. Table 48 Applications > Download Service > Task Info LABEL DESCRIPTION Status This is the current status of the task. Name This is the name of the task. Size This is the size of the file to be downloaded.
Chapter 10 Applications Table 48 Applications > Download Service > Task Info LABEL DESCRIPTION Priority Use this field to set the priority for downloading the task. Select Auto to have the NSA automatically determine the task’s priority. Select High to have the NSA download this file before the other files. Comment Enter a description for this task. Click Apply to save the description. Start Time This field displays when the NSA started to download files.
Chapter 10 Applications Table 49 Applications > Web Publishing LABEL DESCRIPTION Port Number Specify a port number for accessing the published share websites hosted on the NSA. If you enter a number other than 80, make sure you include it when telling others how to access the web-published share. For example, say you specified port 8080, the NSA’s IP address is 192.168.1.23, and the name of the web-published share is FamilyPhotos. You would have to enter “http://192.168.1.
Chapter 10 Applications Click Applications > Broadcatching to open the following screen. Figure 115 Applications > Broadcatching The following table describes the labels in this screen. Table 50 Applications > Broadcatching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button. A screen opens for you to subscribe to the feed. When you are done, the feed’s channel and contents display in the Applications > Broadcatching screen.
Chapter 10 Applications Table 50 Applications > Broadcatching LABEL Item Name DESCRIPTION These are the downloadable files. The following icons show the file’s status in the NSA. Completed: The NSA has downloaded the whole file. Double-click the item to go to the Download Service screen where you can see the file’s name and location. Seeding: The NSA downloaded the complete file and NSA is sharing it with other P2P download users. Double-click the item to go to the Download Service screen.
Chapter 10 Applications select policies for downloading and deleting the channel’s items. Section 5.11 on page 111 provides a tutorial on adding a broadcatching channel. Figure 117 Applications > Broadcatching > Add Channel The following table describes the labels in this screen. Table 51 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Subscribe to Channel Feed Paste (or type) the URL of the feed for the channel to which you want to subscribe into this field.
Chapter 10 Applications Table 51 Applications > Broadcatching > Add Channel LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 10 Applications 10.8.2 Editing a Broadcatching Channel Click Applications > Broadcatching, then select a channel and click Edit Channel to open a similar Edit screen. Use the Edit Channel screen to change the download or delete policies. Figure 118 Applications > Broadcatching > Edit Channel The following table describes the labels in this screen.
Chapter 10 Applications Table 52 Applications > Broadcatching > Edit Channel LABEL DESCRIPTION Location of Downloaded Files This shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files.
Chapter 10 Applications Click Applications > Print Server to open the following screen. Figure 119 Applications > Print Server The following table describes the labels in this screen. Table 53 Applications > Print Server LABEL DESCRIPTION Refresh Click this to update the list of printers and print jobs. The table lists printers and their queued print jobs. Click a column’s heading to sort the entries by that criteria.
Chapter 10 Applications 10.10 The Copy/Sync Button Screen The Copy/Sync button on the front panel allows you to copy or synchronize files between a connected USB device and the NSA. Click Applications > Copy/Sync Button to open the following screen. Figure 121 Applications > Copy/Sync Button The following table describes the labels in this screen. Table 55 Applications > Copy/Sync Button LABEL DESCRIPTION Copy Settings NSA Copy Target Select the NSA share to use with the copy function.
Chapter 10 Applications Table 55 Applications > Copy/Sync Button LABEL DESCRIPTION USB Volume If your USB device has multiple partitions, select which partition to use with the synchronization function. Sync Direction Select USB -> NSA to synchronize files from your USB device to the NSA. Select NSA -> USB to synchronize files from the NSA to your USB device. Select NSA <-> USB to synchronize files in both directions simultaneously.
Chapter 10 Applications A link for the NSA in iTunes under SHARED. Click it to display the NSA’s published media files as shown next. Figure 122 NSA link in iTunes 10.11.2 Download Service The NSA’s download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA. This can free up your computer’s system resources. The download service also handles your broadcatching downloads. See Section 10.
Chapter 10 Applications If you already have the torrent file saved on your computer, you can just specify its location when adding a download task through the web configurator. Another method is to use FTP or a CIFS program (Windows Explorer for example) to copy the torrent file into the torrent folder. The NSA automatically uses the torrent file. After your P2P download and sharing are finished, you can go to the incoming folder within the destination share or folder and delete the .
Chapter 10 Applications Note: The download service notification only keeps track of files downloaded via P2P download. Figure 124 Download Service Notification 10.11.5 P2P Download Security When you download using P2P, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall.
Chapter 10 Applications • Anti-virus to check files you download for computer viruses. P2P Download and Your Firewall The anti-virus feature on a firewall probably cannot check P2P downloads for viruses, so use antivirus software on your computer to scan the NSA for viruses. When you download using P2P download, many other P2P download users are also trying to download the file from you.
Chapter 10 Applications HTML (web-based) configuration interface to set this up (see the firewall’s manual for details). You may also have to configure a corresponding firewall rule. Figure 127 Firewall Configured to Allow Incoming P2P Download Requests 10.11.6 Web Publishing Example This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet.
Chapter 10 Applications 2 Now open your web browser and type in the address of the NSA’s FamilyPhotos web page. In this example, the NSA’s IP address is 192.168.1.33, and the name of the web-published share is FamilyPhotos. So you would enter “http://192.168.1.33/MyWeb/FamilyPhotos/” in your browser’s address bar. Then press [ENTER] or click Go. A screen displays listing the share’s files. Figure 129 Browsing to an NSA Share Example • Click a file’s link to open the file.
Chapter 10 Applications Web Publishing Port Number If the web-published shares use a port number other than 80 (the normal port for web traffic), users must include it after the NSA’s IP address in order to access the NSA’s web-published shares. For example, say you specified port 8080, the NSA’s IP address is 192.168.1.23, and the name of the web-published share is FamilyPhotos. You would have to enter “http://192.168.1.
Chapter 10 Applications 10.11.9 Printer Sharing The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA’s USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers. Figure 131 Printer Sharing 10.11.10 Copying Files You can copy files from a USB device to the NSA or from the NSA to a USB device. Simply press and release the COPY/SYNC button to start copying files. See Section 10.
Chapter 10 Applications The following figure illustrates how copying files works when you copy files from a USB device to the NSA. The same concept applies when you copy files from the NSA to a USB device. Figure 132 Copying Files Example Before Copy NSA USB B A C A After Copy NSA USB A B A B C Both storage devices contain file A. • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA. 10.11.
Chapter 10 Applications The following figure illustrates how synchronization works when you synchronize files from a USB device to the NSA. The same concept applies when you synchronize files from the NSA to a USB device. Figure 133 Synchronizing Files Example 1 Before Sync NSA USB B A A C After Sync NSA USB A B A B Both storage devices contain A. • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA.
Chapter 10 Applications The following figure illustrates how synchronization works when you synchronize files in both directions simultaneously. Figure 134 Synchronizing Files Example 2 Before Sync NSA USB C B A (new) A B (new) D After Sync NSA USB A B (new) (new) C D A B (new) (new) C D A on the USB device and B on the NSA are modified more recently. • File A from the USB device replaces file A on the NSA. • File B from the NSA replaces file B on the USB device.
Chapter 10 Applications 228 Media Server User’s Guide
C HAPTER 11 Package Management 11.1 Overview Package Management can be used to set up more useful applications in your NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps. 11.2 What You Can Do • Use the Package Management screen (Section 11.4 on page 230) to download and install applications from the web. • Use the eMule screens (Section 11.5 on page 233) to configure the server, task and search settings for the eMule application.
Chapter 11 Package Management • SMART - Use S.M.A.R.T. (Self Monitoring, Analysis, and Reporting Technology) to monitor hard disks. It detects and reports the reliability of hard disks using standard indicators, enabling administrators to anticipate possible disk failures. • SqueezeCenter - This enables you to manage a Logitech's Squeezebox device connected to the NSA. • Wordpress - This allows you to create and manage a blog. Use the NSA administrator credentials to log in.
Chapter 11 Package Management Table 56 Applications > Package Management LABEL DESCRIPTION Enable This option is only for non built-in packages. Choose the item(s) on the list and click this to enable the application(s) on your system. This is only available if you have previously installed the package. Disable This option is only for non built-in packages. Choose the item(s) on the list and click this to disable the application on your system.
Chapter 11 Package Management 11.4.1 Displaying the Package Information Select an item on the list and click Package Info. Use this screen to check detailed information about the task. Figure 136 Applications > Package Management > Package Info The following table describes the labels in this screen. Table 57 Applications > Package Management > Package Info LABEL DESCRIPTION Status This is the current status of the application.
Chapter 11 Package Management 11.5 eMule Screens Use these screens to manage the eMule application in your NSA. eMule is a peer-to-peer (P2P) filesharing console that lets you download files from the Internet. It works with eDonkey and Kad networks. 11.5.1 eMule Server Screen Use this screen to configure the eMule server. Click Applications > eMule > Server to open the following screen. Figure 137 Applications > eMule > Server The following table describes the labels in this screen.
Chapter 11 Package Management Table 58 Applications > eMule > Server LABEL DESCRIPTION Status This shows the status of the NSA’s connection to the server: Connected, Connecting or Not Connected. IP Address This shows the IP address of the server. Port Number This shows the port number used by the server for file-sharing. Name This shows the name of the server. Response This shows the length of time (in milliseconds) that the server took to reply to the NSA.
Chapter 11 Package Management Table 59 Applications > eMule > Server: Add LABEL DESCRIPTION Server Name Enter the server name. IP Address Enter the IP address of the server. Port Number Enter the port number used by the server for file-sharing. ED2K Link Select this and enter the ED2K link for the eMule server you want to add. The ED2K link is used within the eMule network and contains information about the server. Insert server.
Chapter 11 Package Management Click MyInfo in the Applications > eMule > Server screen to view the server details. Figure 141 Applications > eMule > Server: MyInfo The following table describes the labels in this screen. Table 61 Applications > eMule > Server: MyInfo LABEL DESCRIPTION ED2k Status This shows the status of the NSA’s connection to the server: Connected, Connecting or Not Connected. ED2k ID This is the identification given to the NSA by the eMule server.
Chapter 11 Package Management Click Applications > eMule > Task screen to view the task details. Figure 142 Applications > eMule > Task The following table describes the labels in this screen. Table 62 Applications > eMule > Task LABEL DESCRIPTION Task Enable eMule Check this and click Apply to enable the eMule application. Add Click this to add a download task (ED2K link) to the list. Refer to Section 11.5.6 on page 238 for the Add Task screen.
Chapter 11 Package Management Table 62 Applications > eMule > Task LABEL DESCRIPTION Name/File Name This shows the name of the file(s) associated to the task. File Size/Size This shows the size of the file(s) associated in the task. Complete (%) This shows the percentage of the file that has been downloaded by the NSA. It also indicates what percent of the file still needs to be downloaded. Source This shows the total number of peers that can share the required files to the NSA eMule client.
Chapter 11 Package Management Click Add in the Applications > eMule > Task screen to add a task. Figure 144 Applications > eMule > Task: Add The following table describes the labels in this screen. Table 63 Applications > eMule > Task: Add LABEL DESCRIPTION Source ED2K Link Paste the ED2K link of the file you want to download into this field. The ED2K link identifies files in the eMule network. It starts with ed2k:// and may contain the name and size of the file you want to download.
Chapter 11 Package Management Table 63 Applications > eMule > Task: Add LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. • • Share - Select the destination share from the drop-down list. Path - This field displays the share folder’s path.
Chapter 11 Package Management Click Applications > eMule > Task > Preferences to open the following screen. Figure 145 Applications > eMule > Task > Preferences The following table describes the labels in this screen. Table 64 Applications > eMule > Task > Preferences LABEL DESCRIPTION Username Username Enter your user name that identifies the NSA in the eMule network.
Chapter 11 Package Management Table 64 Applications > eMule > Task > Preferences LABEL DESCRIPTION Edit Click this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:. • • Share - Select the destination share from the drop-down list. Path - This field displays the share folder’s path.
Chapter 11 Package Management Table 64 Applications > eMule > Task > Preferences LABEL DESCRIPTION Reset Click this to clear the fields. Cancel Click this to return to the previous screen without saving. 11.5.8 Edit IP Filter Use this screen to enable IP filtering which prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs. Figure 146 Applications > eMule > Task > Preferences: Edit IP Filter The following table describes the labels in this screen.
Chapter 11 Package Management Click Applications > eMule > Task > Browse Incomplete Downloads to open the following screen. Figure 147 Applications > eMule > Task > Browse Incomplete Downloads The following table describes the labels in this screen. Table 66 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder Type a folder name and click Apply to make a new folder. The name can be 1 to 239 singlebyte (no Chinese characters allowed for example) ASCII characters.
Chapter 11 Package Management Table 66 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Delete Select a file/folder from the list and click this to open a warning screen. Click Yes to delete the file/folder, or click No to close the screen. Move Select a file/folder from the list and click this to relocate the file/folder to another share. Copy Select a file/folder from the list and click this to make a duplicate of the file/folder to another share.
Chapter 11 Package Management The following table describes the labels in this screen. Table 67 Applications > eMule > Task: Task Info LABEL DESCRIPTION Status This shows the current status of the task - Waiting or Downloading. Name This shows the file name of the file associated with the task. part.met File This shows the temporary file name for an incomplete file. You can change this file name by entering the new name and clicking Apply.
Chapter 11 Package Management Click Applications > eMule > Search to open the following screen. Figure 149 Applications > eMule > Search The following table describes the labels in this screen. Table 68 Applications > eMule > Search LABEL DESCRIPTION Search Enable eMule Check this and click Apply to enable the eMule application. Keyword(s) Enter words that are related to the file you want to download. File Type Select the file type that you want to download.
Chapter 11 Package Management FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect. Your friends or relatives will always be able to call you even if they don't know your IP address. Click Network > DyDNS to open the following screen. Figure 150 Network > DyDNS The following table describes the labels in this screen.
Chapter 11 Package Management NFS is a client/server distributed file service that provides transparent file sharing for network environments. This allows shared folders in your NSA to be accessible like a local folder in a user’s computer. Click Network > NFS to open the following screen. Figure 151 Network > NFS The following table describes the labels in this screen. Table 70 Network > NFS LABEL DESCRIPTION NFS Service Enable NFS Server Click this to employ NFS in your NSA.
Chapter 11 Package Management You see a warning screen before you delete a volume. Figure 152 Delete an NFS Share 11.7.1 Add/Edit NFS Share Use this screen to add or edit an NFS share. Note: Some attributes of the NFS share cannot be edited. Click Add or Edit in the Network > NFS screen to open the following: Figure 153 Network > NFS: Add/Edit The following table describes the labels in this screen.
Chapter 11 Package Management Table 71 Network > NFS: Add/Edit LABEL DESCRIPTION DN/IP Filter Enter the domain name(s) or IP address(es) that can have access to the NFS share. Enter ‘*’ to make the share available to all users in the network. You can also enter a wildcard, such as ‘*.domain.com’ to indicate that all users within that network have access to the share. Select the access rights you want to grant to each domain name or IP address you enter and click Add.
Chapter 11 Package Management Self Monitoring, Analysis, and Reporting Technology (S.M.A.R.T) detects and reports the reliability of hard disks using standard indicators (called “attributes”), to help you anticipate possible disk failures. Note: The fields included the screens may vary depending on the hard disk that you use. Click Storage > S.M.A.R.T to open the following screen. Figure 155 Storage > S.M.A.R.T The following table describes the labels in this screen. Table 73 Storage > S.M.A.R.
Chapter 11 Package Management 11.8.1 SMART Brief Summary Use this screen to display information about the volume, such as the hard disk vendor, specific model, hard disk capacity and so on. Click Brief Summary in the Storage > S.M.A.R.T screen to display the following. Figure 156 Storage > S.M.A.R.T: Brief Summary The following table describes the labels in this screen. Table 74 Storage > S.M.A.R.
Chapter 11 Package Management 11.8.2 SMART Full Summary Use this screen to display more details information about the volume. Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 157 Storage > S.M.A.R.T: Full Summary The following table describes the labels in this screen. Table 75 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION ID This is the identification number used to tag a hard disk attribute. This is standard across all S.M.A.R.T-enabled storage devices.
Chapter 11 Package Management Table 75 Storage > S.M.A.R.T: Full Summary LABEL DESCRIPTION Updated This indicates when the hard drive updates the value for this attribute. • • When Failed Always means the hard drive updates this attribute during normal operation and during offline activities. Offline means the hard drive only updates this attribute when no one is accessing the hard drive. This column indicates when (if ever) the attribute failed.
Chapter 11 Package Management The following table describes the labels in this screen. Table 76 Protect > Backup LABEL DESCRIPTION Backup Add Job Click this to create and customize a backup job. Edit Job Select a backup job in the list and click this to make some changes to it. Delete Selected Job(s) Select a backup job in the list and click this to delete it. Execute Job Now Select a backup job in the list and click this to run the backup job immediately.
Chapter 11 Package Management Click Add Job in the Protect > Backup screen to open the following: Figure 159 Protect > Backup: Step 1 The following table describes the labels in this screen. Table 77 Protect > Backup: Step 1 LABEL DESCRIPTION Job Information Job Name Enter a name to identify the backup job. Job Description Enter a short description (up to 100 keyboard characters) for the backup job. Backup Type Choose the backup type that you want the NSA to implement for the backup job.
Chapter 11 Package Management 11.10.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored.
Chapter 11 Package Management The following table describes the labels in this screen. Table 78 Protect > Backup: Step 2 LABEL DESCRIPTION Backup Source Select an (internal) volume and the folders and files to back up using this tree interface. Click to browse through folders, sub-folders and files. Click to close a folder in the tree. This is useful if there are many folders or files that you wish to hide from view. Click to select a folder or file to back up.
Chapter 11 Package Management Table 78 Protect > Backup: Step 2 LABEL DESCRIPTION Previous Click this to go back to the previous screen. Next Click this to go to the next screen. 11.10.3 Backup: Step 3 Use this screen to specify compression, encryption and purge policies for the backup job. This step is only available if you are doing an archive backup or a synchronization backup to a remote target. Figure 161 Protect > Backup: Step 3 The following table describes the labels in this screen.
Chapter 11 Package Management Table 79 Protect > Backup: Step 3 LABEL DESCRIPTION Purge Policy The NSA maintains the files that have been included in your backups. However to save hard disk space, you can choose to delete files that have been included in previous backups. • • • Select Keep All Old Backup files to store all files that have been included in previous backups. If you want to store a certain number of backup files, select Keep Only the last n backup files (1-30).
Chapter 11 Package Management Table 80 Protect > Backup: Step 4 LABEL DESCRIPTION Start Time (hh:mm) This is available if you selected Daily, Weekly or Monthly as your backup frequency. Select the time in hour:minute format when you want the NSA to perform the backup job. Every how many days? This is only available if you selected Daily as your backup frequency. Every how many weeks? This is only available if you selected Weekly as your backup frequency.
Chapter 11 Package Management 11.10.6 Edit Job: Step 1 Click Protect > Backup. Select a backup job from the list and click Edit Job to open the following. Figure 163 Protect > Backup > Edit: Step 1 The following table describes the labels in this screen. Table 81 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Job Settings Job Name This field is read-only and shows the name of the backup job. Job Description Enter a short description for the backup job.
Chapter 11 Package Management Table 81 Protect > Backup > Edit: Step 1 LABEL DESCRIPTION Bandwidth For backups to a remote NSA, you can restrict the bandwidth to help prevent the backups from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet. Purge Policy The NSA maintains the files that have been included in your backups.
Chapter 11 Package Management Table 82 Protect > Backup > Edit: Step 2 LABEL DESCRIPTION Start Time (hh:mm) This is available if you selected Daily, Weekly or Monthly as your backup frequency. Select the time in hour:minute format when you want the NSA to perform the backup job. Every how many days? This is only available if you selected Daily as your backup frequency. Every how many weeks? This is only available if you selected Weekly as your backup frequency.
Chapter 11 Package Management Table 83 Protect > Backup > Restore Archive: Step 1 LABEL DESCRIPTION Job Description This is a short description (up to 100 keyboard characters) for the backup job. Backup Type This is the type of backup implemented for the backup job. Scheduler Information This field displays the backup’s frequency. Restored Time Select a previous backup in the list that you want to restore to your NSA. Next Click this to go to the next screen. 11.10.
Chapter 11 Package Management 11.10.11 Restore Archive: Step 3 Use this screen to select the location in the NSA where you want to restore your backup. Figure 167 Protect > Backup > Restore Archive: Step 3 The following table describes the labels in this screen. Table 85 Protect > Backup > Restore Archive: Step 3 LABEL DESCRIPTION Step 3. Set a restore target and start restoring Original Location Select this to restore the files to their original location in the NSA.
Chapter 11 Package Management 11.11.1 Restore: Step 1 You can access this screen by clicking Protect > Restore. Figure 168 Protect > Restore: Step 1 The following table describes the labels in this screen. Table 86 Protect > Restore: Step 1 LABEL DESCRIPTION Step 1. Select Restore Source Select a previous archive backup that you want to restore to the NSA. Select Remote NSA if the file is in another NSA in the network that you used for your backup. Fill in the fields below when you choose this option.
Chapter 11 Package Management Table 86 Protect > Restore: Step 1 LABEL DESCRIPTION Browse Click this to select where the previous backup that you want to restore is located. • • • • Volume - Select a volume from the list. Current Location - This is the location of the selected folder. Type - This identifies the item as a file or folder. Name - This is the name of the folder/file. Click Apply to save your settings and Cancel to close the screen. Next Click this to go to the next screen. 11.11.
Chapter 11 Package Management Table 87 Protect > Restore: Step 2 LABEL DESCRIPTION Restored Time Select a previous backup job in the list that you want to restore to your NSA. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. 11.11.3 Restore: Step 3 Use this screen to select the folder where the archive you want to restore is located. Figure 170 Protect > Restore: Step 3 The following table describes the labels in this screen.
Chapter 11 Package Management 11.11.4 Restore: Step 4 Use this screen to select the location in the NSA where you want to restore your backup. Figure 171 Protect > Restore: Step 4 The following table describes the labels in this screen. Table 89 Protect > Restore: Step 4 LABEL DESCRIPTION Step 3. Set a restore target and start restoring Browse Click this to select a folder where you want to place the restored files. • • • • Volume - Select a volume from the list.
Chapter 11 Package Management 1 Click Applications > Package and select Polkast. Then select the Install/Upgrade icon. Note: If Polkast does not appear, click the Retrieve List from Internet icon to update the list. Figure 172 Polkast Installation Step 1 2 The following confirmation screen appears. Click Apply. The NSA must have a connection to the Internet to download the Polkast package.
Chapter 11 Package Management 3 The installation progress appears in the Polkast row.
Chapter 11 Package Management 4 A link appears in the Management Page column after installation finishes. Click this link.
Chapter 11 Package Management 5 The Polkast login screen appears. Click the link to create a new account or enter your login information for an existing account. Figure 176 Polkast Login Note: For more information on using Polkast, visit www.polkast.com. Get free Polkast mobile apps from the Apple App Store, Amazon AppStore, and Android Market. For Polkast Pro users the NSA does not count as a second homebase for pricing purposes. 11.
Chapter 11 Package Management definitions vary by manufacturer, refer to the hard drive manufacturer for details about the attributes your hard drive supports. Table 90 S.M.A.R.T. Attributes 276 ID ATTRIBUTE NAME BETTER DESCRIPTION 01 Read Error Rate Low Shows the rate of hardware read errors. If this is not zero, there is a problem with the disk surface or the read/write heads. 02 Throughput Performance High This is the hard drive’s general (overall) throughput performance.
Chapter 11 Package Management Table 90 S.M.A.R.T. Attributes (continued) ID ATTRIBUTE NAME BETTER DESCRIPTION 194 Temperature Low This is the hard drive’s internal temperature. 195 Hardware ECC Recovered High This is the time between ECC (Error Correction Code)-corrected errors. 196 Reallocation Event Count Low This is the total number of reallocation (remap) operations. The raw value is the total attempts to move data from reallocated sectors to a spare area.
Chapter 11 Package Management Table 90 S.M.A.R.T. Attributes (continued) ID 278 ATTRIBUTE NAME BETTER DESCRIPTION 225 Load/Unload Cycle Count Low This is the total number of load cycles. 226 Load 'In'-time 227 Torque Amplification Count Low This is the number of attempts to compensate for variations in platter speed. 228 Power-Off Retract Cycle Low This is how many times the magnetic armature was automatically retracted because the power was cut.
C HAPTER 12 Auto Upload 12.1 Overview This chapter discusses the features in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family. You can link the NSA to your Flickr and/or YouTube account and select shares for the NSA to upload.
Chapter 12 Auto Upload Click Applications > Auto Upload > Flickr/YouTube to open the following screen. Figure 177 Applications > Auto Upload > Flickr/YouTube The following table describes the labels in this screen. Table 91 Applications > Auto Upload > Flickr/YouTube LABEL DESCRIPTION Flickr/YouTube Disable/Enable Select a service from the list and click this to turn the service on or off. If you disable the service and add more files to the watch folder(s), the NSA will not auto upload these files.
Chapter 12 Auto Upload The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account’s information and click Sign In.
Chapter 12 Auto Upload The following page displays asking for your authorization. Click OK, I’LL ALLOW IT to establish a link between the NSA and your Flickr account. Figure 180 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA web configurator. Click Get Ready in the following screen to complete the authorization process.
Chapter 12 Auto Upload Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen.
Chapter 12 Auto Upload The following table describes the labels in this screen. Table 92 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) LABEL DESCRIPTION Flickr Account Configuration Username This field displays the Flickr account authorized for the auto upload feature. Photo Space Usage This shows how much storage space for photos (in size and percentage) you have used and how much space is still available on your Flickr account.
Chapter 12 Auto Upload Table 92 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) (continued) LABEL DESCRIPTION Grace Period N minutes Specify how long the NSA should wait when you add a new file for auto upload. For example, if you set the grace period to 5 minutes, the NSA uploads a new file after it has been in a watched folder for 5 minutes. You can choose from a range of 1 to 10080 minutes (up to one week).
Chapter 12 Auto Upload Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen. Figure 184 Applications > Auto Upload > Flickr/YouTube > Config (YouTube) The following table describes the labels in this screen. Table 93 Applications > Auto Upload > Config (YouTube) LABEL DESCRIPTION Youtube Account Configuration Username 286 This field displays the Youtube account authorized for the auto upload feature.
Chapter 12 Auto Upload Table 93 Applications > Auto Upload > Config (YouTube) (continued) LABEL Switch User DESCRIPTION Click this to use a different YouTube account for the auto upload feature. Folder Selection Folder Watch List This table displays a list of shares and folders selected for auto upload. Files stored in these locations are uploaded to your YouTube account. Status This field indicates whether the share or folder is available. represents a valid folder.
Chapter 12 Auto Upload Table 93 Applications > Auto Upload > Config (YouTube) (continued) LABEL DESCRIPTION Who can see your media files on YouTube? Determine who has the right to see files uploaded to your YouTube account. Select Only You if you do not want anyone else to see your files. Select Anyone to allow everyone to see your files. Apply Click this to save your changes. Reset Click this to restore your previously stored settings. 12.
Chapter 12 Auto Upload The following table describes the labels in this screen. Table 94 Applications > Auto Upload > FTP Uploadr LABEL DESCRIPTION Enable FTP Uploadr Use the check box to enable or disable the FTP Uploadr. Click Apply to save your changes. When you disable the FTP Uploadr, a screen opens requesting confirmation. Select the check box to stop any current or queued uploads.
Chapter 12 Auto Upload In the FTP Uploadr screen, click the Add Server or Edit Server button to open the following screen. Figure 186 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server The following table describes the labels in this screen. Table 95 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server LABEL DESCRIPTION Domain Name/IP Address Enter the domain name or IP address of the FTP server. Account Name Enter the account name used to access the FTP server.
Chapter 12 Auto Upload In the FTP Uploadr screen, click the Preferences icon to open the following screen. Figure 187 Applications > Auto Upload > FTP Uploadr > Preferences The following table describes the labels in this screen. Table 96 Applications > Auto Upload > FTP Uploadr > Preferences LABEL DESCRIPTION Folder Watch List Status This field indicates whether the share or folder is available. represents a valid folder. The folder is available for auto upload. represents a missing folder.
Chapter 12 Auto Upload Table 96 Applications > Auto Upload > FTP Uploadr > Preferences (continued) LABEL DESCRIPTION Add Click this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload. • • Share - Select the share from the list. Path - Type the folder location in the share directly or click Browse to open the following screen and navigate to the folder’s location. • • • • Current Location - This is the location of the selected folder.
C HAPTER 13 Dropbox 13.1 Overview The Dropbox Web-based file hosting service uses cloud computing to let you use file synchronization to store and share files and folders with others across the Internet. Use your Dropbox account to easily move files to your NSA and have the NSA download *.torrent files. 13.2 Dropbox Screen Use the Dropbox screen to log the NSA into your Dropbox account. This creates Drop2NAS and zDownload folders in your Dropbox account. See Section 13.
Chapter 13 Dropbox The following table describes the labels in this screen. Table 97 Applications > Dropbox LABEL DESCRIPTION Status This shows the status of the NSA Dropbox application’s interaction with the Dropbox server. Disable: The NSA Dropbox application is turned off. Ready: The NSA Dropbox application has authenticated with the Dropbox server and is ready to use. Authenticating with Dropbox. Please wait.: The NSA Dropbox application is logging into the Dropbox server.
Chapter 13 Dropbox Table 97 Applications > Dropbox (continued) LABEL DESCRIPTION Enable Dropbox Select this to synchronize and back up your Dropbox account. The first time you do this a Dropbox screen prompts you to log into your Dropbox account. Then a NSA pop-up opens. Click Get Ready. Click Allow when the Dropbox screen notifies you of the NSA’s DropNAS application trying to connect to your Dropbox account.
Chapter 13 Dropbox admin\Dropbox\FromDropbox folder in the format of “filename(n).extension”. Here is an example of the Drop2NAS folder. Note: Do not delete the NAStoken file as it is needed for your NSA to work with the Dropbox account. Figure 189 Dropbox\Drop2NAS Using the zDownload Folder The NSA copies *.torrent files in the zDownload folder to the NSA’s admin\download\torrents folder and automatically starts downloading them.
C HAPTER 14 Using Time Machine with the NSA 14.1 Overview Time Machine is a backup system provided by Mac OS X. It automatically backs up everything on your Mac, including pictures, music, videos, documents, applications, and settings. This chapter helps you to enable Time Machine in OS X to use your NSA as a backup volume. 14.2 Time Machine Screen Use the Time Machine screen to turn Time Machine support on or off, and designate the share for Time Machine backups.
Chapter 14 Using Time Machine with the NSA 298 1 Click Apple > System Preferences. Then go to System and select Time Machine. 2 Turn Time Machine ON. Then click Change Disk. 3 Select share01 as the backup disk. Then click Use for Backup.
Chapter 14 Using Time Machine with the NSA 4 When prompted for the username and password of share01, enter the login information for an existing user account with write access permission on share01 (for information on configuring user accounts and shares see Section 5.9 on page 87). In this example user1/12345 is used. Then click Connect. 5 Time Machine starts backing up files to share01 after 120 seconds. If you want to backup immediately, click Time Machine icon and select Back Up Now.
Chapter 14 Using Time Machine with the NSA 300 Media Server User’s Guide
C HAPTER 15 Users 15.1 Overview This chapter introduces the Users screens of the NSA. Use the Users screens to create and manage administrator and user accounts. Administrators can: • Configure and manage the NSA. • Create volumes, shares, and user accounts. • Assign individual users specific access rights for specific shares. Users are people who have access rights to the NSA and can store files there for later retrieval. A user can: • Manage shares that he owns. • Change his own password.
Chapter 15 Users Use this screen to create and manage accounts for users who can store files on the NSA. Figure 192 Sharing > Users The following table describes the labels in this screen. Table 99 Sharing > Users LABEL DESCRIPTION Add User Click this to open a screen where you can configure a new user account. Refer to Section 15.3.2 on page 303 to see the screen. Search Click this to display a search field. Type in the name of an account and then click Search to look up the account you specified.
Chapter 15 Users Table 99 Sharing > Users (continued) LABEL DESCRIPTION Delete Selected Users Select an account and click this to open a screen where you can delete the user account. User Info Select an account and click this to open a screen displaying the amount of storage space used by the account. You can also check the account’s membership in any groups. Refer to Section 15.4 on page 305 to see the screen.
Chapter 15 Users Click the Add User button in the Users screen to open the following screen. Click the Edit User button in the screen shown previously to edit an existing account. Figure 193 Sharing > Users > Add or Edit a User The following table describes the labels in this screen. Table 101 Users > Add or Edit a User LABEL DESCRIPTION Username Type a name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. See Section 15.3.
Chapter 15 Users 15.3.3 Usernames Enter a username from one to 32 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characters are not allowed as the first character. The username can only contain the following characters: • Alphanumeric A-z 0-9. Unicode usernames are supported with CIFS logins, but not FTP or web configurator logins. • Spaces • _ [underscores] • .
Chapter 15 Users In the Users screen, select an account and click User Info to open the following screen. Figure 194 Sharing > Users > User Info The following table describes the labels in this screen. Table 102 Sharing > Users > User Info LABEL DESCRIPTION Username This field displays the selected username. Space Usage Click this to display the amount of volume space used by the selected account. Group List Click this to display the selected user’s group membership.
C HAPTER 16 Groups 16.1 Overview This chapter introduces the Groups screens. Use the Groups screens to create and manage groups. You can assign users to groups and grant individual groups access rights to specific shares. 16.2 What You Can Do • Use the main Groups screen (Section 16.3 on page 307) to display and manage a list of groups created on the NSA. • Use the Add Group screen (Section 16.3.1 on page 308) to create new groups. • Use the Edit Group screen (Section 16.3.
Chapter 16 Groups The following table describes the labels in this screen. Table 103 Sharing > Groups LABEL DESCRIPTION Add Group Click this to open a screen where you can configure a new group. Search Click this to display a search field. Type the name of a group and then click Search to look up the group you specified. Click Clear to close the search function. Edit Group Select a group and click this to open a screen where you can edit the properties of the selected group.
Chapter 16 Groups Click the Add Group button in the Groups screen to open the following screen. Click the Edit Group button in the screen shown previously to edit an existing group. Figure 196 Sharing > Groups > Add or Edit a Group The following table describes the labels in this screen. Table 104 Sharing > Groups > Add or Edit a Group LABEL DESCRIPTION Group Name Type a name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. See Section 16.3.
Chapter 16 Groups • Multiple spaces within names are converted to a single space. • Group names are case insensitive. The group name cannot be the same (no matter the letter case) as an existing group. For example, if a group exists with the name 'FAMILY', you cannot create a group named 'family'. • The group name cannot be the same as a system group name such as EVERYONE nor be the same as an existing group.
C HAPTER 17 Shares 17.1 Overview A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder. You can map a share to a network drive for easy and familiar file transfer for Windows users. 17.2 What You Can Do • Use the Shares screen (Section 17.3 on page 311) to navigate a list of shares created on the NSA. • Use the Add Shares screen (Section 17.3.1 on page 313) to create additional shares on the NSA.
Chapter 17 Shares The following table describes the labels in this screen. Table 105 Sharing > Shares LABEL DESCRIPTION Add Share Click this to create a new share. Recycle Bin Click this to configure recycle bins. Edit Share Select a share and click this to edit the share. Delete Share Select a share and click this to remove or restrict access to the share. Share Browser Select a share and click this to browse the share’s contents. Status This field displays the share icons.
Chapter 17 Shares Table 105 Sharing > Shares (continued) LABEL DESCRIPTION Share Path This field displays the share’s file path, for example, volume1/music. Share Owner This is the name of the user account to which this share belongs. Permission Type This field displays the access permission of a share. Everyone on the network can access a Public share. Only the share owner can access a Private share.
Chapter 17 Shares Table 106 Shares > Add Share (or Edit Share) (continued) LABEL DESCRIPTION Publish this share to Web This shows only when you enable the Web Publish (Section Share Access Assign access rights (full, read only or deny) to users or groups. If you publish the share to the media server or the web, all users will have at least read-only access to the share, regardless of what you configure here. 10.7 on page 206).
Chapter 17 Shares The following table describes the labels in this screen. Table 107 Sharing > Shares > Add Share (or Edit Share) > Advanced LABEL DESCRIPTION Available Users/Groups This field lists the users/groups to which you can assign access rights. Authority Use this field to assign access rights to users/groups. Full Control gives users/groups full access (read, write and execute) to all files contained within this share.
Chapter 17 Shares 17.4.2 Configuring Recycle Bins In the Sharing > Shares screen, click Recycle Bin to open the following screen. Figure 200 Sharing > Shares > Recycle Bin The following table describes the labels in this screen. Table 108 Sharing > Shares > Recycle Bin LABEL DESCRIPTION Clean Recycle Bin every N days Specify how often you want to clear the contents in all recycle bins. The specified days correspond to how long a file has been stored in a recycle bin.
Chapter 17 Shares The following table describes the labels in this screen. Table 109 Sharing > Shares > Share Browser LABEL DESCRIPTION Create Folder Type a folder name and click Apply to make a new folder. The name can be 1 to 239 singlebyte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing folder in the same path. See Section 4.4.6 on page 59 for more information on folder names. Upload Click this to add files to the share.
Chapter 17 Shares Table 109 Sharing > Shares > Share Browser (continued) LABEL DESCRIPTION Modified Date This field displays a file’s latest modification date. Close Click this to close the screen. 17.5.1 Moving or Copying Files Use this screen to move or copy files to another share. In the Share Browser screen, select a file or folder and click Move or Copy to open the following screen.
C HAPTER 18 Maintenance Screens 18.1 Overview This chapter discusses the Maintenance screens. The Maintenance screens allow you to manage system configurations. 18.2 What You Can Do • Use the Power screen (Section 18.3 on page 319) to configure power settings for the NSA, including power saving, UPS, power on/off after power failure, power on/off schedule, and Wake on LAN. • Use the Log screen (Section 18.4 on page 323) to check the system’s logs. • Use the Configuration screen (Section 18.
Chapter 18 Maintenance Screens Click Maintenance > Power to display the following screen. Figure 203 Maintenance > Power The following table describes the labels in this screen. Table 111 Maintenance > Power LABEL DESCRIPTION Power Management Turn off hard disk(s) Enter the number of minutes the NSA will sit idle before spinning the hard disks down to sleep. The default power-off time is 15 minutes.
Chapter 18 Maintenance Screens Table 111 Maintenance > Power (continued) LABEL DESCRIPTION Always Power On Select this option to keep the NSA operating as much of the time as possible. The NSA restarts automatically even if it was turned off when the power failed. Always Power Off Select this option to keep the NSA from automatically restarting when the power is restored after a power failure. This is a computer’s “traditional” behavior.
Chapter 18 Maintenance Screens 18.3.2 Editing the Power Control Schedule Screen Click Maintenance > Power Management > Edit to open this screen. Use this screen to configure power control schedules to have the NSA turn on, turn off, or reboot at specified times. Figure 204 Maintenance > Power Management > Edit The following table describes the labels in this screen.
Chapter 18 Maintenance Screens Table 112 Maintenance > Power Management > Edit (continued) LABEL DESCRIPTION Execute Time (hh:mm) Enter the time, day, and/or day of the month as appropriate for this power control schedule entry. Leave more than 10 minutes between the execution times of the entries. If the NSA turns off or restarts while a user is transferring files to or from the NSA, the transfer fails. The user will need to restart the transfer.
Chapter 18 Maintenance Screens Use this screen to display all NSA logs. There are at most 512 entries in the log. Older logs are removed by the system. You cannot download the log file via FTP or CIFS. Figure 205 Maintenance > Log The following table describes the labels in this screen. Table 113 Maintenance > Log LABEL DESCRIPTION Refresh Click this to update the log display. Purge all Logs Click this to erase all logs from the NSA.
Chapter 18 Maintenance Screens • Use the Syslog Server Setting screen (Section 18.4.4 on page 326) to enable the syslog server and select the categories to include in the log report. 18.4.2 Email Setting You can enable and configure e-mail alerts from the NSA. In the Report Config screen, click the Email Setting tab to open the following screen. Figure 206 Maintenance > Log > Report Config: Email Setting The following table describes the labels in this screen.
Chapter 18 Maintenance Screens 18.4.3 Report Setting You can select the type of alerts you want to receive through e-mail and schedule when the NSA emails the alerts. In the Report Config screen, click the Report Setting tab to open the following screen. Figure 207 Maintenance > Log > Report Config: Report Setting The following table describes the labels in this screen.
Chapter 18 Maintenance Screens The following table describes the labels in this screen. Table 116 Maintenance > Log > Report Config: Syslog Server Setting LABEL DESCRIPTION Enable Syslog Server Check this to enable syslog server. Server Address Enter the syslog server address you want the NSA to use for its log alerts. In the table below, check the type of log alerts you want to receive in your e-mail. Select All Log to include all types of log alerts. Apply Click this to save your changes.
Chapter 18 Maintenance Screens Table 117 Maintenance > Configuration LABEL Restore DESCRIPTION Click this to load the previously-saved configuration file to the NSA. This replaces your current NSA configuration settings with the settings in the previously-saved configuration file. A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit. Reset MySQL Database Password Click this to reset the password for your MySQL database. 18.
Chapter 18 Maintenance Screens The following table describes the labels in this screen. Table 118 Maintenance > SSL LABEL DESCRIPTION Force HTTPs Select the Force HTTPs option to turn on the NSA’s web browser security. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it. Note: The NSA will restart the web configurator after you click Apply. The NSA displays a warning screen if applying your change may disconnect some users.
Chapter 18 Maintenance Screens The screen is also the same for the Create a certificate authorized by other CA option. Figure 211 Maintenance > SSL > Create or Edit a Certificate The following table describes the labels in this screen. Table 119 Maintenance > SSL > Create or Edit a Certificate LABEL DESCRIPTION Common Name This name describes the certificate’s origin, either in the form of an IP address or a domain name.
Chapter 18 Maintenance Screens Click Maintenance > FW Upgrade to open the following screen. Figure 212 Maintenance > FW Upgrade The following table describes the labels in this screen. Table 120 Maintenance > FW Upgrade LABEL DESCRIPTION Firmware File Type the location of the firmware file you want to upload Browse Click this to find the file on your computer Upload Click this to upload the new firmware. The NSA automatically restarts after you upgrade.
Chapter 18 Maintenance Screens Click Maintenance > Shutdown to open the following screen. Figure 213 Maintenance > Shutdown The following table describes the labels in this screen. Table 121 Maintenance > Shutdown LABEL DESCRIPTION Restart Click this to have the device perform a software restart. Shutdown Click this to shut down the system and restart it again later. When you click the Restart button a pop-up screen will appear asking you to confirm.
Chapter 18 Maintenance Screens Table 122 Log Classes (continued) LOG CATEGORY DESCRIPTION Network This log class shows information on network configuration, setting changes and so on. Storage This log class shows information on the NSA’s internal and external storage activities. Backup This log class shows information on all backup-related activities. Auto Upload This log class shows information on automatic uploads done by the NSA. 18.9.
Chapter 18 Maintenance Screens Table 124 Log Messages (continued) 334 CLASS SEVERITY MESSAGE Copy/Sync Button ERROR [USB Sync] Sync Failed at Folder %s. Copy/Sync Button ERROR Modify COPY/SYNC Button Configuration: %s Copy/Sync Button ERROR Please Change Your Folder Name. Invalid Path: %s Copy/Sync Button INFO [USB Sync] Copying %s from Internal Volume to Backup Folder. Copy/Sync Button INFO [USB Sync] Copying %s from Internal Volume to USB.
Chapter 18 Maintenance Screens Table 124 Log Messages (continued) CLASS SEVERITY MESSAGE Download Service INFO Download service initialized Download Service INFO Download service pause %s by user Download Service INFO Download service set %s to %s priority by user Download Service INFO Download service set default download location to %s Download Service INFO Download service set max P2P download rate to %d KB/s by user Download Service INFO Download service set max P2P upload rate to %d
Chapter 18 Maintenance Screens Table 124 Log Messages (continued) 336 CLASS SEVERITY MESSAGE Download Service INFO Download service added %d rules from ipfilter.dat Download Service INFO Download service detected invalid ip range %s in ipfilter.dat Download Service WARNING Download service default location does not exist. Load default Download Service WARNING Download service default torrent location does not exist. Load default Groups NOTICE Add new group %s.
Chapter 18 Maintenance Screens Table 124 Log Messages (continued) CLASS SEVERITY MESSAGE Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to '%s' Services NOTICE NTP server has set to null Services NOTICE The NTP service is disabled. Services NOTICE The NTP service is enabled.
Chapter 18 Maintenance Screens Table 124 Log Messages (continued) CLASS 338 SEVERITY MESSAGE System INFO NTP fails to update from %s System INFO Device is rebooted by administrator! System INFO Device is shutdown by administrator! System NOTICE DNS server is changed. System NOTICE Hostname is cleared. System NOTICE Hostname is set to '%s'. System NOTICE System description is changed. System NOTICE System description is empty now.
Chapter 18 Maintenance Screens Table 124 Log Messages (continued) CLASS SEVERITY MESSAGE Backup/ Restore INFO Start to restore backup job [%s] from [%s]. Backup/ Restore INFO Restore from [%s] successfully.
Chapter 18 Maintenance Screens 340 Media Server User’s Guide
C HAPTER 19 Protecting Your Data 19.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 19.2 Protection Methods There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.
Chapter 19 Protecting Your Data If you forgot the NSA password, then use the RESET button (see Section 1.1.4 on page 19) to return the NSA to the factory default configuration. Note: Configuration File Backup and Restoration does not affect data (your files and folders), volumes on the NSA.
C HAPTER 20 Troubleshooting 20.1 Troubleshooting Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories.
Chapter 20 Troubleshooting An HDD LED is off. The HDD LED is off when the NSA cannot detect a hard drive in the drive bay. Replace or install a hard drive. See Installing or replacing a hard disk. An HDD LED is red. Red means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector, but the LED stays red until the NSA restarts.
Chapter 20 Troubleshooting • Use another Ethernet cable. If you’re connecting to a Gigabit Ethernet, make sure you’re using an 8-wire Ethernet cable. • If the problem continues, contact the vendor. See Section 21.1 on page 361 for a description of NSA LEDs. The NSA turns off or reboots by itself. Check the Power Management screen. This is where you configure power settings for the NSA, including power saving, UPS, power on/off during power failure and power on/off schedule.
Chapter 20 Troubleshooting The NAS Starter Utility discovered my NSA but the status is always unreachable, even though I can access it. You may need to add the NAS Starter Utility to your software firewall’s allow list or lower your software firewall or anti-virus scanner’s security level. Alternatively you may have to configure your software firewall or other security software to allow UDP port 50127 traffic from the NSA.
Chapter 20 Troubleshooting I cannot get to the NSA login screen. • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility. • Make sure you have used the NAS Starter Utility to initialize your NSA. • If you used the RESET button, the NSA may have a new IP address. Close and reopen the NAS Starter Utility to discover the NSA. • Make sure the NSA is turned on.
Chapter 20 Troubleshooting 20.4.1 Enabling Scripting of Safe ActiveX Controls If pages of the web configurator do not display properly in Internet Explorer, check that scripting of safe ActiveX controls is enabled. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 216 Internet Options: Security 348 2 Click the Custom Level... button. 3 Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default).
Chapter 20 Troubleshooting 4 Click OK to close the window. Figure 217 Security Settings - Script Safe ActiveX Controls I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the username and password correctly. The default username is admin, and the default password is 1234. These fields are case-sensitive, so make sure [Caps Lock] is not on. • Turn the NSA off and on. • If this does not work, see Section 1.1.4 on page 19 to reset the device.
Chapter 20 Troubleshooting 20.5 I Cannot Access The NSA I cannot access a share. • Check that the NSA is turned on and connected to the network. Try to ping the NSA or use the NAS Starter Utility to discover it. • Make sure you have used the NAS Starter Utility to initialize your NSA. See Chapter 3 on page 31 for more information. • Check that you entered your login name and password correctly. • Check that the share exists and check its access settings.
Chapter 20 Troubleshooting • The user’s computer may already be connected to another of the NSA’s shares using a different user name and/or password. This can happen without the user realizing it if the user’s computer automatically connects to a share at logon. Right-click any other connected shares and click Disconnect. Then re-attempt to connect to the desired share. • Check if the share has an ANONYMOUS or EVERYONE access right.
Chapter 20 Troubleshooting 20.7 External USB Drives The COPY LED is red. Copying files from a USB device failed. The USB device may not be compatible with the NSA. Try to save the files onto a computer and then from the computer to the NSA (through the network connection). 20.8 Firmware I want to know the firmware version on the NSA. Go to the Status screen. The Firmware field shows you the current firmware version running. 20.
Chapter 20 Troubleshooting 1 On your Windows computer, click Start > Run or open a web browser. 2 Enter \\nsa followed by the number of your model (320 for example) or the Server Name you assigned the NSA. This shows you the folders in the NSA. 3 Use drag-and-drop or copy-and-paste to transfer files from your NSA to your local computer’s folder or your storage device. • You can download the files from your NSA. Just click on the file(s) in the Share Browsing screen (Section 4.4.5 on page 56).
Chapter 20 Troubleshooting I cannot use some applications in the Web Configurator. • The firmware installed in your NSA includes the features mentioned in Section 4.5.2 on page 63. This does not include the applications you can install using the Package Management screen. • You can use the Package Management screen (Chapter 11 on page 229) to install more applications from a web location (specified in the firmware) to your NSA.
Chapter 20 Troubleshooting 3 If an iTunes client is connected, the NSA’s iTunes server function scans the published media server folders for files every three minutes. Leave iTunes connected to the NSA for three minutes. Then use the NSA’s eject button (as shown next) to disconnect. Figure 218 iTunes Eject Button 4 Then click the NSA’s link to reconnect.
Chapter 20 Troubleshooting 2 If you have files from the iTunes Store that use DRM, you need to use your Apple account ID and password to authorize other computers to play the files. Apple permits you to authorize up to five computers at a time. To authorize a computer, open iTunes and click Store > Authorize Computer.
Chapter 20 Troubleshooting 20.14 Web Publishing A web-published share cannot be accessed by web browser from the Internet. • Make sure the person trying to access the share is using the correct web address (and port number if the NSA’s web publishing feature is not using port 80). See page 223 for details. • Make sure the publishing feature is turned on and the share is in the list of published shares. • Make sure the person trying to access the share is using Internet Explorer 6.
Chapter 20 Troubleshooting • Make sure your ISP allows you to run a server and is not blocking the port number of the NSA’s web publishing feature. 20.15 Auto Upload The NSA does not automatically upload files to Flickr or YouTube. 1 Make sure the NSA is connected to the Internet. See Section 9.4 on page 176 for details about testing network connections. 2 Click Maintenance > Log to check the NSA’s log for a message about the file.
Chapter 20 Troubleshooting • The web location of the package may be undergoing maintenance. Try again at a later time. Upgrade the firmware of the NSA. • If a new firmware is available, do an upgrade and try installing the package(s) again. The eMule Search screen does not work. You need to be connected to an eMule server before you can use the Search screen. Wait for the NSA to connect to a server before configuring the Search screen. I want to know how my hard disk is performing. Use S.M.A.R.T.
Chapter 20 Troubleshooting 360 Media Server User’s Guide
C HAPTER 21 Product Specifications See also Chapter 1 on page 17 for a general overview of the key features. 21.1 LEDs This table describes the NSA’s LEDs. Table 127 LEDs LED NAME COLOR STATUS DESCRIPTION POWER Blue SYSTEM Green On The NSA is turned on and receiving power. Off The NSA is turned off. On The NSA has fully started and is operating normally. Blinking The NSA is starting up. For the NSA210 this LED blinks green slowly while the NSA is upgrading the firmware.
Chapter 21 Product Specifications Table 127 LEDs (continued) LED NAME COLOR STATUS DESCRIPTION COPY/ SYNC Green Red On A USB device is connected to the NSA. Blinking The NSA is copying or synchronizing files to or from the USB device. On Copying or synchronizing files to or from the USB device failed. Off No USB device is connected. 21.2 Supported Media Server Content Formats The following describes the details about the files that the NSA media server can publish.
Chapter 21 Product Specifications Table 128 Supported Media Server Content Formats (continued) CATEGORY FILE TYPE EXTENSION Music MP3 mp3, mpa Ogg Vorbis ogg RealMedia ra, ram WAVE wav Photo Windows Media Audio wma Matroska mka Monkeys Audio ape MP1 mp1 MP4 mp4, m4a, m4p PCM pcm LPCM lpcm DTS dts AC3 ac3 Free Lossless Audio Codec flac Au au AAC aac 3GPP 3gp, 3g2 AIFF aif, aiff RIFF-based MIDI rmi Playlist wpl, pls, asx, wax, m3u Bitmap bmp JPEG jpe, jpeg, jpg
Chapter 21 Product Specifications 364 Media Server User’s Guide
A PPENDIX A Setting Up Your Computer’s IP Address Note: Your specific NSA may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix A Setting Up Your Computer’s IP Address 366 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon. 3 Right-click Local Area Connection and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix A Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel. 2 In the Control Panel, click View network status and tasks under the Network and Internet category. 3 Click Change adapter settings.
Appendix A Setting Up Your Computer’s IP Address 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address 3 The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences.
Appendix A Setting Up Your Computer’s IP Address 378 2 In the System Preferences window, click the Network icon. 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix A Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. 6 Click Apply Now and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 220 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 380 Click Apple > System Preferences.
Appendix A Setting Up Your Computer’s IP Address 2 In System Preferences, click the Network icon. 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. 4 From the Configure list, select Using DHCP for dynamically assigned settings.
Appendix A Setting Up Your Computer’s IP Address • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NSA. 6 382 Click Apply and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 221 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix A Setting Up Your Computer’s IP Address 384 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix A Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. 5 The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
Appendix A Setting Up Your Computer’s IP Address 386 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. 8 Click the Close button to apply the changes.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 222 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address 388 1 Click K Menu > Computer > Administrator Settings (YaST). 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
Appendix A Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix A Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 223 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 390 Click Next to save the changes and close the Network Card Setup window.
Appendix A Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 224 openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
A PPENDIX B Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 227 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 394 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 228 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 229 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 230 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 231 Security Settings - Java Scripting Java Permissions 398 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 232 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window. Figure 233 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 402 Media Server User’s Guide
A PPENDIX C Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix C Common Services Table 129 Commonly Used Services (continued) 404 NAME PROTOCOL PORT(S) DESCRIPTION ICMP User-Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes. ICQ UDP 4000 This is a popular Internet chat program. IGMP (MULTICAST) User-Defined 2 Internet Group Management Protocol is used when sending packets to a specific group of hosts. IKE UDP 500 The Internet Key Exchange algorithm is used for key distribution and management.
Appendix C Common Services Table 129 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION STRM WORKS UDP 1558 Stream Works Protocol. SYSLOG UDP 514 Syslog allows you to send system logs to a UNIX server. TACACS UDP 49 Login Host Protocol used for (Terminal Access Controller Access Control System). TELNET TCP 23 Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks.
Appendix C Common Services 406 Media Server User’s Guide
A PPENDIX D Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix D Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 236 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix D Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 239 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next.
Appendix D Importing Certificates 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 241 Internet Explorer 7: Certificate Import Wizard 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 242 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix D Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 244 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 245 Internet Explorer 7: Security Warning 11 Finally, click OK when presented with the successful certificate installation message.
Appendix D Importing Certificates 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 248 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix D Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click Tools > Internet Options. Figure 250 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix D Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 252 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 253 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix D Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click Tools > Options. Figure 257 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix D Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 259 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 260 5 418 Firefox 2: Certificate Manager Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information.
Appendix D Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click Tools > Options. Figure 261 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix D Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 263 4 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 264 Firefox 2: Delete Web Site Certificates 5 420 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix D Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix D Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click Tools > Preferences. Figure 267 Opera 9: Tools Menu 2 In Preferences, click Advanced > Security > Manage certificates.
Appendix D Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 269 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix D Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 271 6 Next, click OK. Figure 272 7 Opera 9: Install authority certificate Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix D Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click Tools > Preferences. Figure 273 Opera 9: Tools Menu 2 In Preferences, Advanced > Security > Manage certificates.
Appendix D Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 275 4 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix D Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 276 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 277 Konqueror 3.
Appendix D Importing Certificates 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 278 Konqueror 3.
Appendix D Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 279 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 280 Konqueror 3.
Appendix D Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 282 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 283 Konqueror 3.
Appendix D Importing Certificates 432 Media Server User’s Guide
A PPENDIX E Open Source Licences End-User License Agreement for "NSA210, NSA 221, NSA310, NSA320, and NSA325" WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix E Open Source Licences The Software and Documentation contain material that is protected by international copyright law, trade secret law, international treaty provisions, and the applicable national laws of each respective country. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation. 4.
Appendix E Open Source Licences THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.
Appendix E Open Source Licences Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties.
Appendix E Open Source Licences The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it.
Appendix E Open Source Licences use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances. For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries.
Appendix E Open Source Licences Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library.
Appendix E Open Source Licences However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables.
Appendix E Open Source Licences 7.
Appendix E Open Source Licences 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
Appendix E Open Source Licences GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Appendix E Open Source Licences 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
Appendix E Open Source Licences a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machinereadable copy of the corresponding source code, to be distributed under the ter
Appendix E Open Source Licences patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices.
Appendix E Open Source Licences This Product includes mediainfo software under below license MediaInfo(Lib) License Version 1.1, 3 January 2010 Copyright 2002-2010 MediaArea.net SARL. All rights reserved. Redistribution and use in source and binary forms, without modification, are permitted provided that the following conditions are met: 1.Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
Appendix E Open Source Licences As used herein, "this License" refers to version 3 of the GNU Lesser General Public License, and the "GNU GPL" refers to version 3 of the GNU General Public License. "The Library" refers to a covered work governed by this License, other than an Application or a Combined Work as defined below. An "Application" is any work that makes use of an interface provided by the Library, but which is not otherwise based on the Library.
Appendix E Open Source Licences You may convey a Combined Work under terms of your choice that, taken together, effectively do not restrict modification of the portions of the Library contained in the Combined Work and reverse engineering for debugging such modifications, if you also do each of the following: "a) Give prominent notice with each copy of the Combined Work that the Library is used in it and that the Library and its use are covered by this License.
Appendix E Open Source Licences any later version published by the Free Software Foundation. If the Library as you received it does not specify a version number of the GNU Lesser General Public License, you may choose any version of the GNU Lesser General Public License ever published by the Free Software Foundation.
Appendix E Open Source Licences of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users.
Appendix E Open Source Licences A "Standard Interface" means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.
Appendix E Open Source Licences When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies.
Appendix E Open Source Licences "b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for softw
Appendix E Open Source Licences recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.
Appendix E Open Source Licences If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms. Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way. 8. Termination.
Appendix E Open Source Licences counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. A "contributor" is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's "contributor version".
Appendix E Open Source Licences 12. No Surrender of Others' Freedom. If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all.
Appendix E Open Source Licences INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 17. Interpretation of Sections 15 and 16.
Appendix E Open Source Licences Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it. For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software.
Appendix E Open Source Licences provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion. 1. Source Code. The "source code" for a work means the preferred form of the work for making modifications to it. "Object code" means any non-source form of a work.
Appendix E Open Source Licences Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary. 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
Appendix E Open Source Licences 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: "a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
Appendix E Open Source Licences If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information.
Appendix E Open Source Licences All other non-permissive additional terms are considered "further restrictions" within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term.
Appendix E Open Source Licences give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts. You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License.
Appendix E Open Source Licences products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007. Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law. 12. No Surrender of Others' Freedom.
Appendix E Open Source Licences 16. Limitation of Liability.
Appendix E Open Source Licences You should have received a copy of the GNU General Public License along with this program. If not, see . Also add information on how to contact you by electronic and paper mail. If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode: Copyright (C) This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
Appendix E Open Source Licences THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS E ARE DISCLAIMED.
Appendix E Open Source Licences 1. APPLICABILITY AND DEFINITIONS This License applies to any manual or other work, in any medium, that contains a notice placed by the copyright holder saying it can be distributed under the terms of this License. Such a notice grants a world-wide, royalty-free license, unlimited in duration, to use that work under the conditions stated herein. The "Document", below, refers to any such manual or work. Any member of the public is a licensee, and is addressed as "you".
Appendix E Open Source Licences that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML, PostScript or PDF produced by some word processors for output purposes only. The "Title Page" means, for a printed book, the title page itself, plus such following pages as are needed to hold, legibly, the material this License requires to appear in the title page.
Appendix E Open Source Licences If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages.
Appendix E Open Source Licences E. Add an appropriate copyright notice for your modifications adjacent to the other copyright notices. F. Include, immediately after the copyright notices, a license notice giving the public permission to use the Modified Version under the terms of this License, in the form shown in the Addendum below. G. Preserve in that license notice the full lists of Invariant Sections and required Cover Texts given in the Document's license notice. H.
Appendix E Open Source Licences You may add a section Entitled "Endorsements", provided it contains nothing but endorsements of your Modified Version by various parties--for example, statements of peer review or that the text has been approved by an organization as the authoritative definition of a standard. You may add a passage of up to five words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified Version.
Appendix E Open Source Licences You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License into the extracted document, and follow this License in all other respects regarding verbatim copying of that document. 7.
Appendix E Open Source Licences 9. TERMINATION You may not copy, modify, sublicense, or distribute the Document except as expressly provided for under this License. Any other attempt to copy, modify, sublicense or distribute the Document is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 10.
Appendix E Open Source Licences Free Documentation License". If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the "with...Texts." line with this: with the Invariant Sections being LIST THEIR TITLES, with the Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST. If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the situation.
Appendix E Open Source Licences 1.3. "Covered Code" means the Original Code or Modifications or the combination of the Original Code and Modifications, in each case including portions thereof. 1.4. "Electronic Distribution Mechanism" means a mechanism generally accepted in the software development community for the electronic transfer of data. 1.5. "Executable" means Covered Code in any form other than Source Code. 1.6.
Appendix E Open Source Licences A. Any addition to or deletion from the contents of a file containing Original Code or previous Modifications. B. Any new file that contains any part of the Original Code or previous Modifications. 1.10. "Original Code" means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License. 1.10.1.
Appendix E Open Source Licences For legal entities, "You" includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. 2. Source Code License. 2.1. The Initial Developer Grant.
Appendix E Open Source Licences (d) Notwithstanding Section 2.1(b) above, no patent license is granted: 1) for code that You delete from the Original Code; 2) separate from the Original Code; or 3) for infringements caused by: i) the modification of the Original Code or ii) the combination of the Original Code with other software or devices. 2.2. Contributor Grant.
Appendix E Open Source Licences effective on the date Contributor first makes Commercial Use of the Covered Code. (d) Notwithstanding Section 2.
Appendix E Open Source Licences 3.2. Availability of Source Code.
Appendix E Open Source Licences Contributor must include a text file with the Source Code distribution titled "LEGAL" which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact. If Contributor obtains such knowledge after the Modification is made available as described in Section 3.
Appendix E Open Source Licences location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code.
Appendix E Open Source Licences compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient's rights in the Source Code version from the rights set forth in this License. If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or any Contributor.
Appendix E Open Source Licences understand it. 5. Application of this License. This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code. 6. Versions of the License. 6.1. New Versions. Netscape Communications Corporation ("Netscape") may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions.
Appendix E Open Source Licences license (except to note that your license differs from this License) and (b) otherwise make it clear that Your version of the license contains terms which differ from the Mozilla Public License and Netscape Public License. (Filling in the name of the Initial Developer, Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License.) 7. DISCLAIMER OF WARRANTY.
Appendix E Open Source Licences nature, must remain in effect beyond the termination of this License shall survive. 8.2.
Appendix E Open Source Licences Participant. 8.3. If You assert a patent infringement claim against Participant alleging that such Participant's Contributor Version directly or indirectly infringes any patent where such claim is resolved (such as by license or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses granted by such Participant under Sections 2.1 or 2.
Appendix E Open Source Licences RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU. 10. U.S. GOVERNMENT END USERS. The Covered Code is a "commercial item," as that term is defined in 48 C.F.R. 2.101 (Oct.
Appendix E Open Source Licences California, with the losing party responsible for costs, including without limitation, court costs and reasonable attorneys' fees and expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. 12. RESPONSIBILITY FOR CLAIMS.
Appendix E Open Source Licences Version 1.1 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.mozilla.org/MPL/ Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. The Original Code is ______________________________________.
Appendix E Open Source Licences [NOTE: The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.
Appendix E Open Source Licences This software is copyright(c) 1994-2007 by the authors You are free to distribute this software under the terms of the GNU General Public License. On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL file. many parts of this package are covered by the BSD license. These include central error processing code (sg_lib.[hc]), common command code (sg_cmds_basic.[hc] and sg_cmds_extra.[hc]) and later utilities.
Appendix E Open Source Licences The documentation is released under the FDL (see COPYING.FDL). This Product includes boost software under below license BOOST SOFTWARE LICENSE oLicense text oIntroduction oHistory oRationale oFAQ oTransition oAcknowledgements INTRODUCTION The Boost Software License specifies the terms and conditions of use for those Boost libraries that it covers. Currently, some Boost libraries have their own licenses.
Appendix E Open Source Licences oMust not require that the license appear with executables or other binary uses of the library. oMust not require that the source code be available for execution or other binary uses of the library. Additionally, other common open source licenses were studied to see what additional issues were being treated, and additions representing good legal practice were also requested. The result is the Boost Software License: Boost Software License - Version 1.
Appendix E Open Source Licences RATIONALE The following rationale was provided by Devin Smith, the lawyer who wrote the Boost Software License. It has been edited slightly for brevity. Editorial additions are shown in square brackets. BENEFIT OF COMMON SOFTWARE LICENSE If one of Boost's goals is to ease use and adoption of the various libraries made available by Boost, it does make sense to try to standardize the licenses under which the libraries are made available to users.
Appendix E Open Source Licences How should Boost programmers apply the license to source and header files? Add a comment based on the following template, substituting appropriate text for the italicized portion: // Copyright Joe Coder 2004 - 2006. // Distributed under the Boost Software License, Version 1.0. // // (See accompanying file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) Please leave an empty line before and after the above comment block.
Appendix E Open Source Licences Boost's lawyers were well aware of patent provisions in licenses like the GPL and CPL, and would have included such provisions in the Boost license if they were believed to be legally useful. Why doesn't the copyright message say "All rights reserved"? Devin Smith says "I don't think it belongs in the copyright notice for anything (software, electronic documentation, etc.) that is being licensed. It belongs in books that are sold where, in fact, all rights (e.g.
Appendix E Open Source Licences This Product includes curl software under below license COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2009, Daniel Stenberg, . All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
Appendix E Open Source Licences very liberal and should not impose a problem for your project. This section is just a brief summary for the cases we get the most questions. (Parts of this section was much enhanced by Bjorn Reese.) We are not lawyers and this is not legal advice. You should probably consult one if you want true and accurate legal insights without our prejudice. 6.
Appendix E Open Source Licences left intact. 6.6 Can you please change the curl/libcurl license to XXXX? No. We have carefully picked this license after years of development and discussions and a large amount of people have contributed with source code knowing that this is the license we use. This license puts the restrictions we want on curl/libcurl and it does not spread to other programs or libraries that use it.
Appendix E Open Source Licences This Product includes httpd software under below license Apache HTTP Server Copyright 2008 The Apache Software Foundation. This product includes software developed at The Apache Software Foundation (http://www.apache.org/). Portions of this software were developed at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign. This software contains code derived from the RSA Data Security Inc.
Appendix E Open Source Licences TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
Appendix E Open Source Licences and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).
Appendix E Open Source Licences "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License.
Appendix E Open Source Licences 4. Redistribution.
Appendix E Open Source Licences do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.
Appendix E Open Source Licences Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8.
Appendix E Open Source Licences incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information.
Appendix E Open Source Licences limitations under the License. APACHE HTTP SERVER SUBCOMPONENTS: The Apache HTTP Server includes a number of subcomponents with separate copyright notices and license terms. Your use of the source code for the these subcomponents is subject to the terms and conditions of the following licenses. For the mod_mime_magic component: /* * mod_mime_magic: MIME type lookup via file magic numbers * Copyright (c) 1996-1997 Cisco Systems, Inc.
Appendix E Open Source Licences * This software is not subject to any license of the American Telephone and * Telegraph Company or of the Regents of the University of California. * * Permission is granted to anyone to use this software for any purpose on any * computer system, and to alter it and redistribute it freely, subject to * the following restrictions: * * 1. The author is not responsible for the consequences of use of this * software, no matter how awful, even if they arise from flaws in it.
Appendix E Open Source Licences For the server\util_md5.c component: /************************************************************************ * NCSA HTTPd Server * Software Development Group * National Center for Supercomputing Applications * University of Illinois at Urbana-Champaign * 605 E. Springfield, Champaign, IL 61820 * httpd@ncsa.uiuc.edu * * Copyright (C) 1995, Board of Trustees of the University of Illinois * ************************************************************************ * * md5.
Appendix E Open Source Licences /* (C) Copyright 1993,1994 by Carnegie Mellon University * All Rights Reserved.
Appendix E Open Source Licences * Permission to use, copy, modify, and distribute this material * for any purpose and without fee is hereby granted, provided * that the above copyright notice and this permission notice * appear in all copies, and that the name of Bellcore not be * used in advertising or publicity pertaining to this * material without the specific, prior written permission * of an authorized representative of Bellcore.
Appendix E Open Source Licences License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind.
Appendix E Open Source Licences /* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc.
Appendix E Open Source Licences * this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp * ---------------------------------------------------------------------------*/ For the srclib\apr-util\crypto\apr_md4.c component: * This is derived from material copyright RSA Data Security, Inc. * Their notice is reproduced below in its entirety. * * Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All * rights reserved.
Appendix E Open Source Licences * documentation and/or software. */ For the srclib\apr-util\include\apr_md4.h component: * * This is derived from material copyright RSA Data Security, Inc. * Their notice is reproduced below in its entirety. * * Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All * rights reserved. * * License to copy and use this software is granted provided that it * is identified as the "RSA Data Security, Inc.
Appendix E Open Source Licences * documentation and/or software. */ For the srclib\apr-util\test\testmd4.c component: * * This is derived from material copyright RSA Data Security, Inc. * Their notice is reproduced below in its entirety. * * Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All * rights reserved. * * RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this * software for any particular purpose.
Appendix E Open Source Licences # Copyright 1991 by the Massachusetts Institute of Technology # # Permission to use, copy, modify, distribute, and sell this software and its # documentation for any purpose is hereby granted without fee, provided that # the above copyright notice appear in all copies and that both that # copyright notice and this permission notice appear in supporting # documentation, and that the name of M.I.T.
Appendix E Open Source Licences For the pcre component: PCRE LICENCE ------------ PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language. Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" directory, is distributed under the same terms as the software itself. Written by: Philip Hazel
Appendix E Open Source Licences documentation and/or other materials provided with the distribution. * Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
Appendix E Open Source Licences This program may be used and copied freely providing this copyright notice is not removed. This software is provided "as is" and any express or implied waranties, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall Zeus Technology Ltd.
Appendix E Open Source Licences a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of th
Appendix E Open Source Licences "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies of the Software and that both the above copyright notice(s) and this permission notice appear in supporting documentation.
Appendix E Open Source Licences Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Appendix E Open Source Licences All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix E Open Source Licences Except where otherwise noted in the source code (e.g. the files hash.c, list.c and the trio files, which are covered by a similar licence but with different Copyright notices) all the files are: Copyright (C) 1998-2003 Daniel Veillard. All Rights Reserved.
Appendix E Open Source Licences Copyright (c) University of Delaware 1992-2010 Permission to use, copy, modify, and distribute this software and its documentation for any purpose with or without fee is hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without
Appendix E Open Source Licences 18.Dave Hart General maintenance, Windows port interpolation rewrite. 19.Claas Hilbrecht NeoClock4X clock driver 20.Glenn Hollinger GOES clock driver 21.Mike Iglesias DEC Alpha port 22.Jim Jagielski A/UX port 23.Jeff Johnson massive prototyping overhaul 24.Hans Lambermont or
Appendix E Open Source Licences 42.Dirce Richards Digital UNIX V4.0 port 43.Wilfredo Sánchez added support for NetInfo 44.Nick Sayer SunOS streams modules 45.Jack Sasportas Saved a Lot of space on the stuff in the html/ pic/ subdirectory 46.Ray Schnitzler Unixware1 port 47.Michael Shields USNO clock driver 48.Jeff Steinman
Appendix E Open Source Licences 3. The name of any author may not be used to endorse or promote products derived from this software without their specific prior written permission. ALTERNATIVELY, this product may be distributed under the terms of the GNU General Public License, in which case the provisions of the GNU GPL are required INSTEAD OF the above restrictions. (This clause is necessary due to a potential conflict between the GNU GPL and the restrictions contained in a BSD-style copyright.
Appendix E Open Source Licences * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ This Product includes setsystz software under below license /* setsystz: set the Linux kernel's idea of the time zone */ /* Copyright (c) 2007 David A.
Appendix E Open Source Licences "You want to hold a tangible legal document as evidence that you have the legal right to use and distribute SQLite. "Your legal department tells you that you have to purchase a license. If you feel like you really have to purchase a license for SQLite, Hwaci, the company that employs the architect and principal developers of SQLite, will sell you one.
Appendix E Open Source Licences concerns only changes and enhancements to SQLite that are intentionally and deliberately contributed back to the SQLite website. For the purposes of this document, "SQLite software" shall mean any computer source code, documentation, makefiles, test scripts, or other information that is published on the SQLite website, http://www.sqlite.org/.
Appendix E Open Source Licences ** 1996-06-05 by Arthur David Olson. === asctime.c========== === date.c ========== /* * Copyright (c) 1985, 1987, 1988 The Regents of the University of California. * All rights reserved.
Appendix E Open Source Licences ** 1996-06-05 by Arthur David Olson. */ ================== ====== logwtmp.c ===== /* * Copyright (c) 1988 The Regents of the University of California. * All rights reserved.
Appendix E Open Source Licences ** 1996-06-05 by Arthur David Olson. ====== tzfile.h ===== This Product includes crypto++ software under below license License The License of Crypto++ is somewhat unusual amongst open source projects. A distinction is made between the library as a compilation (i.e., collection), which is copyrighted by Wei Dai, and the individual files in it, which are public domain (with the exception of mars.cpp which is subject to its own license, included in that file).
Appendix E Open Source Licences I would like to thank the following authors for placing their works into the public domain: Joan Daemen - 3way.cpp Leonard Janke - cast.cpp, seal.cpp Steve Reid - cast.cpp Phil Karn - des.cpp Andrew M. Kuchling - md2.cpp, md4.cpp Colin Plumb - md5.cpp Seal Woods - rc6.cpp Chris Morgan - rijndael.cpp Paulo Baretto - rijndael.cpp, skipjack.cpp, square.cpp Richard De Moliner - safer.cpp Matthew Skala - twofish.cpp Kevin Springle - camellia.cpp, shacal2.cpp, ttmac.
Appendix E Open Source Licences 3. Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error-free, and Wei Dai is under no obligation to provide any services, by way of maintenance, update, or otherwise. THE SOFTWARE AND ANY DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Appendix E Open Source Licences This Product includes wxWidgets software under below license Licence Background wxWidgets is currently licensed under the "wxWindows Licence" pending approval of the "wxWidgets Licence" which will be identical apart from the name. The wxWindows Licence is essentially the L-GPL (Library General Public Licence), with an exception stating that derived works in binary form may be distributed on the user's own terms.
Appendix E Open Source Licences General Public Licence for more details. You should have received a copy of the GNU Library General Public Licence along with this software, usually in a file named COPYING.LIB. If not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. EXCEPTION NOTICE 1.
Appendix E Open Source Licences SLIM DEVICES LICENSE NOTICE Please be aware that not all software distributed by Slim Devices is licensed under the GPL. If you wish to redistribute any of our software, please be sure to first read the GPL, and then make sure that you are only distributing materials which we've explicity licensed for such use. Feel free to contact us if you have any questions, or would like permission to distribute our other non-GPL programs.
Appendix E Open Source Licences - Certain ancillary programs included in the Squeezebox Server distribution on our web site are licensed to us only for direct distribution to end-users. These include the Windows installer and Activestate binaries. - Squeezebox firmare may not be redistributed under any circumstances. It is (c) Slim Devices, and additonally contains code which is (c) Ubicom. Ubicom's code is licenced to us only for direct distribution in binary form.
Appendix E Open Source Licences http://www.slimdevices.com/opensource/fixed_math.tar.gz. - The following applies to Squeezebox2 distribution: This product is protected by certain intellectual property rights of Microsoft Corporation. Use or distribution of such technology outside of this product is prohibited without a license from Microsoft or authorized Microsoft subsidiary.
Appendix E Open Source Licences the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
Appendix E Open Source Licences want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary.
Appendix E Open Source Licences covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1.
Appendix E Open Source Licences parties under the terms of this License.
Appendix E Open Source Licences In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Appendix E Open Source Licences making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable.
Appendix E Open Source Licences modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions.
Appendix E Open Source Licences apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices.
Appendix E Open Source Licences address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation.
Appendix E Open Source Licences REPAIR OR CORRECTION. 12.
Appendix E Open Source Licences * Neither the author nor the names of any contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix E Open Source Licences The PHP License, version 3.01 Copyright (c) 1999 - 2009 The PHP Group. All rights reserved. -------------------------------------------------------------------- Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
Appendix E Open Source Licences distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group. No one other than the PHP Group has the right to modify the terms applicable to covered code created under this License. 6.
Appendix E Open Source Licences This software consists of voluntary contributions made by many individuals on behalf of the PHP Group. The PHP Group can be contacted via Email at group@php.net. For more information on the PHP Group and the PHP project, please see . PHP includes the Zend Engine, freely available at .
Appendix E Open Source Licences -- Larry Wall This Product includes gd software under below license Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41-RR02188 by the National Institutes of Health. Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner.
Appendix E Open Source Licences 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the file README-JPEG.TXT for more information. Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande. Permission has been granted to copy, distribute and modify gd in any context without fee, including a commercial application, provided that this notice is present in user-accessible supporting documentation.
A PPENDIX F Legal Information Copyright Copyright © 2012 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix F Legal Information Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page.
Appendix F Legal Information • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information. • ONLY qualified service personnel should service or disassemble this device. • Make sure to connect the cables to the correct ports. • Place connecting cables carefully so that no one will step on them or stumble over them.
Appendix F Legal Information 568 Media Server User’s Guide
Index Index Numbers preferences 199 protection 219, 220 status 196 URL 197, 239 FTP 185, 188, 279 activation 188 anonymous access 188 passive mode transfer 189 media server 186, 189 configuration 190 iTunes server 186, 216, 217 print server 224 configuration 214 name 214 web publishing 187, 206, 222 activation 206 example 221 port number 223 1-bay 18 2-bay 18 3-D photo wall 55 A access rights 59 Flickr 285 shares 314, 315 YouTube 288 activation download service 194 Flickr/YouTube 280 FTP 188 FTP Uploadr
Index backup job restoring files by 144 D backup settings 327 data protection 173 bandwidth limit 292 date 158 broadcatching 187, 207 adding channels 194, 208, 209 channel guides 223 RSS 187 diagnostic tool 178 browser plugin, capturing link 218 browsing shares 56 diagnostic tools 178 discovery 21, 32 disk S.M.A.R.T.
Index external volumes 168 G F GMT 30, 160 global icons 51, 63 Google Maps 54 fan speed 154 GPS 54 file troubleshooting access 351 grace period 285, 287, 292 File Transfer Protocol over TLS, see FTPS groups 307 adding 308, 309 editing 309 membership 304, 309 names 309 searching 308 files downloading 58 uploading 58 H file browser configure share 58 share browser 56 File Transfer Protocol over Explicit TLS, see FTPES FileZilla 134 fingerprint 132 firmware, upgrading 331 Flickr 279 access rights
Index L volumes 167 workgroup 158 lag, time 157 NAS Starter Utility 21, 31, 47 language 62 navigation panel 63 latitude 54 network 175 diagnostic tools 178 DNS 175, 178 HTTP port 178 IP address 175 jumbo frames 176, 178 PPPoE 175, 183 activation 183 TCP/IP 176 link capture browser plugin 218 login 49 Logitech SqueezeCenter 193 logs 323 longitude 54 M maintenance 319 backup settings 327 logs 323 power management 319 failure 320 resume 320 schedule 322 UPS 320 reset 327 restoring settings 327 shutdo
Index resume 320 schedule 322 UPS 320 PPPoE 175, 183 activation 183 preferences, download service 199 print server 224 configuration 214 name 214 protect 138 backup 138 backup tutorial 141 protection, download service 219, 220 public key certificate 329 editing 329 publishing shares 191 R RAID 166, 170 degraded 164 RAID 0 171, 172 RAID 1 171, 173 recovering 162 replacing disks 162 resynchronization 162 rebuild media server database 189 recycle bins 315 activation 59, 313 configuration 312, 316 related doc
Index volume 163, 164 storage 161 creating volumes 165 disk replacement 162 JBOD 161, 166, 170, 172 methods 170 duplexing 171 mirroring 171 parity 171 striping 171 naming volumes 167 RAID 161, 166, 170 degraded 164 RAID 0 171, 172 RAID 1 171, 173 recovering 162 resynchronization 162 status 163, 164 USB devices 168, 169 volumes 161, 170 striping 171 synchronization 215, 225 configuration 215 directions 216 single direction 225 tutorial 141 two directions 226 system date/time 158 login 49 master browser 158
Index usernames 305 V video category, YouTube 287 video playback 62 volumes 161, 170 creation 165, 168 JBOD 161, 166, 170, 172 names 167 RAID 161, 166, 170 degraded 164 RAID 0 171, 172 RAID 1 171, 173 recovering 162 resynchronization 162 scanning 168 status 163, 164 storage methods 170 duplexing 171 mirroring 171 parity 171 striping 171 Y YouTube 279 access rights 288 activation 280 authorization 285 configuration 285, 286 grace period 287 video category 287 Z zPilot 27, 43 W web configurator 47 icons
Index 576 Media Server User’s Guide