Manuel d'utilisation / d'entretien du produit NSA-220 du fabricant ZyXEL Communications
Aller à la page of 234
www .zyxel.com NSA-220 Network S torage Appliance User ’ s Guide V ersion 2.10 11 / 2 0 0 7 Edition 1 DEFAULT LOGIN Web Ad dress nsa220 Password 1234.
.
About This User's Guide NSA-220 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the web configurator . A basic knowledge of TCP/IP netw orking concepts and topology will be helpful.
Document Conventions NSA-220 User’s Guide 4 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User ’ s Guide.
Document Conventions NSA-220 User’s Guide 5 Icons Used in Figures Figures in this User ’ s Guide may use the follo wing generic icons. The NSA icon is not an exact representation of your device.
Safety Warnings NSA-220 User’s Guide 6 Safety Warnings 1 For your safety , be sure to read and follow all warni ng notices and instructions. • Do NOT use this product near water , for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids.
Safety Warnings NSA-220 User’s Guide 7.
Safety Warnings NSA-220 User’s Guide 8.
Contents Overview NSA-220 User’s Guide 9 Contents Overview Introduction .......................................... ........................................................................ .......... 23 Getting to Know Y our NS A .............. .....
Contents Overview NSA-220 User’s Guide 10.
Table of Contents NSA-220 User’s Guide 11 Table of Contents About This User's Guide ........................................... ............................................................. .. 3 Document Conventions.............................
Table of Contents NSA-220 User’s Guide 12 2.6.1 Global Administration Ic ons ............. ................ ................ ................ ................ .......... 41 2.6.2 Navigation Panel ................. ... ... ... .... ... ............. .
Table of Contents NSA-220 User’s Guide 13 6.5.1 Choosing A S torage Met hod For a V olume ......... ... ............. ... .... ... ... ... .... ... ... ... ... ....... 77 6.5.2 V olume S tatus . .... ... ... ............. ... ... .... ... ... ... ..
Table of Contents NSA-220 User’s Guide 14 8.14 Adding or Editing a Broadcatching Channel ......... ................ ................ ................... ........ 108 8.15 Printer Sharing .. ................ ................ ............. ...........
Table of Contents NSA-220 User’s Guide 15 12.1 Protection Method s . ....................... ....................... ...................... ....................... ........... ... 135 12.1.1 Configuration F ile Backup and Restoration .......... ....
Table of Contents NSA-220 User’s Guide 16 Part VI: Appendices and Inde x ........................................................... 163 Appendix A Setting up Y our Computer ’s IP Address ........................................... ...............
List of Figures NSA-220 User’s Guide 17 List of Figures Figure 1 Example of the NSA in a Home Network ... ................. ................ ............. ................ ................ 25 Figure 2 NSA Front Panel . ................ .............
List of Figure s NSA-220 User’s Guide 18 Figure 39 Download Service Tutorial: Paste Link .............. ................ ................ ............. ................ ... .... 55 Figure 40 Download Service T utori al: Apply Pasted Link .. ........
List of Figures NSA-220 User’s Guide 19 Figure 82 Applications > Print Server ................ ................ ................ ................ ................. ....... ......... ..1 10 Figure 83 Applications > Print Se rver > Rename ...
List of Figure s NSA-220 User’s Guide 20 Figure 125 Internet Options: Security ........... ...... ............. ................ ................ ............. .............. ......... . 182 Figure 126 Security Settings - Java S cripting .. ... ....
List of Tables NSA-220 User’s Guide 21 List of Tables T able 1 LEDs . ................ ............. ................. ................ ................ ................ ................ .. ..................... ... 27 T able 2 Us er-level Global Labels and Icons .
List of Tables NSA-220 User’s Guide 22 T able 39 Shares ....... ................ ................ ................ ............. ................. ................ ......... ................ ..... 120 T able 40 Shares > Add Share (or Ch ange Share Properties) .
23 P ART I Introduction Getting to Know Y our NSA (25) W eb Configurator Basics (29) T utorials (45) St atus Screen (63).
24.
NSA-220 User’s Guide 25 C HAPTER 1 Getting to Know Your NSA This chapter covers the main featur es and applications of the NSA. 1.1 NSA Overview Use the NSA (Network Storage A ppliance) to do the following. • Share files between computers on your network.
Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 26 Place the NSA behind a firewall and/or IDP (Intrusion Detection and Prevention) device to protect it from attacks from the Internet. " See Chapter 16 on page 155 for a more detailed list of NSA features and list s of compatible hard drives and USB devices.
Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 27 Figure 3 NSA Rear Panel This table describes the NSA’ s LEDs. T able 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned o n and receiving power. Off The NSA is turned off.
Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 28 1.1.2 COPY Button Use the COPY button on the front panel to copy f iles from a connected USB device to the NSA.
NSA-220 User’s Guide 29 C HAPTER 2 Web Configurator Basics This chapter describes how to access the NSA web configurator and provides an overview of its screens. 2.1 W eb Configurator Overview The web configur ator is an HTML-based manage ment interface that allows easy NSA setup and management usin g an Internet browser .
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 30 Figure 4 NDU Main Screen From the NDU main page click an icon under Admin to see the web configurator screen login screen. 2.2.2 Web Browser Access Open your browser and type in the server name of the NSA (“nsa220” is the default).
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 31 Figure 6 NSA Login Screen Y ou should see a screen asking you to change your pas sword (highly recommended) as shown next. T ype a new password (and retype it to confirm) and click Apply or click Ignor e .
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 32 Figure 8 My NSA " The web configurator managem ent session automatically ti mes out if it is left idle for 15 minutes. Simp ly log back into the NSA if this happens to you. The icons and language label at th e top-right of the screen ( ) are visible from most screens.
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 33 2.5 My NSA Screen Use the My NSA screens to mana ge your shares and access the files in folders to which you have acce ss. A share is a set of user access permissions for a specific folder on a volume (gives someone access to a folder).
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 34 The following table describes the labels in this screen. 2.5.1 My NSA Share Browsing Screen Click My NSA and then click a share to open the followi ng screen. Use the My NSA share browsing screens to see and access share contents.
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 35 The following table describes the labels in this screen. 2.5.2 My NSA Share Browsing Move to or Copy to Screen Select a folder or file in the My NS A sh are browsing screens and click the Move to button or the Copy to button to display a screen like the following .
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 36 2.5.3 My NSA Management Overview Screen Use the My NSA management overvie w screens to see and configure share management details. Click My NSA and then the Manage It button of one of your shares to open the following screen.
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 37 Figure 13 My NSA Change Share Properties The following table describes the labels in the this screen. T able 7 My NSA Change Share Properties LABEL DESCRIPTION Share Name Configure a name to identify this sh are.
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 38 2.5.5 Share and Folder Names The name ca n only contain the followi ng characters: • Alphanumeric (A-z 0-9) and Unicode. The NSA allows FTP access to shares, folders or files with names en coded in the UTF-8 (8-bit UCS/Unicode T ransformation Format) format.
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 39 2.5.6 Share Paths A share path is the full path to a folder on a volume that will be shared, for example, /mynsa/ topsecret/ugs/. This is indepe ndent from a “share name” which is the name shown for this share when accessing the share via CIFS or FTP .
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 40 Figure 14 Password The following table describes the labels in this screen. 2.6 Administration Screens The A dministration tab displays when you log i n as the administrator . Click Administration in the My NSA screens to open the advanc ed administration screens.
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 41 Figure 15 S tatus 2.6.1 Global Administration Icons The icons and language label at the top-right of the screen ( ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels.
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 42 2.6.2 Navigation Panel The navigation panel on t he left of the scr een ( ) contains screen links. Click a link to display sub-links. There are no sub-links for the St a t u s screen. Certain screens also contain hyper links that allow you to jump to another screen.
Chapter 2 Web Configurator Basics NSA-220 User’s Guide 43 2.6.3 Main Window The main window () shows the screen you select in the na viga tion panel. It is disc ussed in the rest of this document. The St a t u s screen is the first administration screen to display .
Chapter 2 Web Configurator Basic s NSA-220 User’s Guide 44 Click the Edit icon to jump to related item ’s configuration screen. This is a user icon. See the chapter on u ser accounts for detailed info rmation on variants of this icon. This is a share i con.
NSA-220 User’s Guide 45 C HAPTER 3 Tutorials This chapter provides tutorials that show how to use the NSA. 3.1 File Sharing T utorials The following sections cover using the NSA for file sharing.
Chapter 3 Tutorials NSA-220 User’s Guide 46 Figure 18 Users 3 Configure the screen as follows and write down the username and password to give to Jimmy . If the username and password are th e same as Jimmy’ s W indows login, Jimmy will not need to enter a username and passw ord when he logs int o his share from his computer .
Chapter 3 Tutorials NSA-220 User’s Guide 47 3.1.2 Creating a Share Suppose Bob has already created separate acc ou nts for his sons Jimm y and Kevin. Now Bob wants to create a share for each son. He als o wants to make sure that each son can only acces s his own share (t o keep them from deleting each other ’ s files).
Chapter 3 Tutorials NSA-220 User’s Guide 48 Figure 23 Shares > Create > Browse > Create Folder Example 4 Select the new folder and click Apply . Figure 24 Shares > Create > Browse > New Folder Example 5 Configure the screen as follows and click Apply .
Chapter 3 Tutorials NSA-220 User’s Guide 49 Figure 25 Shares > Create Example Now that Bob has created Jimmy’ s share, he can go through the steps again to create another share for Kevin. Then he can see the rest of the tutorials for how to us e the shares.
Chapter 3 Tutorials NSA-220 User’s Guide 50 4 Enter the username and password for Jimmy’ s account and click OK . Y ou do not need to do this if the username and passwo rd are the same as Jimmy’ s W indows login.
Chapter 3 Tutorials NSA-220 User’s Guide 51 Figure 30 FTP Example: T yping the FTP T a rget 2 Enter your password and c lick Login . Figure 31 FTP Example: Enter the Password 3 Now you can access files and copy files from/to your local computer ’ s drives to or from this network folder .
Chapter 3 Tutorials NSA-220 User’s Guide 52 Figure 33 My NSA User Login 2 Click a share to see the top level of the s hare’ s contents. Here is the Jimmy share. Figure 34 My NSA User Login 3 Click a folder ’ s file name to browse the fold er . Y ou can open files or copy them to your computer .
Chapter 3 Tutorials NSA-220 User’s Guide 53 1 Open your Internet browser (thi s example uses Internet Explorer). 2 Find a download link for the file you wa nt. In this example, www .zyxel.com has a Download Now link for downloading a datasheet for ZyXEL ’ s P-2301RL-P1C (a device for making phone calls over the Internet).
Chapter 3 Tutorials NSA-220 User’s Guide 54 Figure 36 Copy Shortcut 4 Log into the NSA web configurator (see Sectio n 2.3 on page 30 ) using the administrator account and cl ic k Download Service . Figure 37 Download Service T utorial: My NSA 5 Click Add .
Chapter 3 Tutorials NSA-220 User’s Guide 55 Figure 39 Download Service T utorial: Paste Lin k 7 The URL displays in the URL field. Click Apply . Figure 40 Download Service T utorial: Apply Pasted Link 8 After a few moments, the download task appears in the Download Service screen’ s Active tab.
Chapter 3 Tutorials NSA-220 User’s Guide 56 3.3 Broadcatching T utorial Use broadcatching to ha ve the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV In ternet television channel.
Chapter 3 Tutorials NSA-220 User’s Guide 57 Figure 43 Copy Link Location 3 Log into the NSA web configurator (see Sectio n 2.3 on page 30 ) using the administrator account and cl ic k Administration > Applications > Br oad catch ing . Figure 44 Broadcatching T utorial: My NSA 4 Click Add Channel .
Chapter 3 Tutorials NSA-220 User’s Guide 58 Figure 45 Broadcatching T utorial: Broadcatching 5 Right-click the URL field and select Paste . Figure 46 Broadcatching T utorial: Paste Link 6 The URL displays in the URL fi e ld. 7 Select a policy for what items to download.
Chapter 3 Tutorials NSA-220 User’s Guide 59 3.4 Printer Server T utorial Do the following to have th e NSA let computers on your network share a printer . See www .zyxel.com for a list of compatible printers. 1 Make sure the NSA is on and the SYS ligh t is on steady (not blinking).
Chapter 3 Tutorials NSA-220 User’s Guide 60 Figure 51 Printer Driver Needed 8 Use the wizard screens to install the printer driver on the computer . Y ou may need to get the file from the printer ’ s CD or the printer manufacturer ’ s website (the driver is not installed on the NSA).
Chapter 3 Tutorials NSA-220 User’s Guide 61 " Repeat steps 5 to 8 on your other comput ers so they can also use the printer ..
Chapter 3 Tutorials NSA-220 User’s Guide 62.
NSA-220 User’s Guide 63 C HAPTER 4 Status Screen This chapter introduces the NSA St a t u s screen. 4.1 St atus Screen The St a t u s screen is the first main web configurator screen you see after you enter the administrator screens. T o view the status screens, click St a t u s on the top-left of the navigation panel.
Chapter 4 Status Screen NSA-220 User’s Guide 64 The following table describes the labels in this screen. T able 12 Status LABEL DESCRIPTION S tatus Click Status to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network.
Chapter 4 Status Screen NSA-220 User’s Guide 65 4.1.1 Session Example (Windows) Open windows explorer and type two back sl ashes followed by the NSA name or IP address. Initially you can only read and write to the Public , Vi d e o , Musi c , and Photo folders until you create other shares on the NSA.
Chapter 4 Status Screen NSA-220 User’s Guide 66.
67 P ART II System Setting and Applications System Setting Screens (69) Storage Screens (73) Network Screen (85) Application Screens (89).
68.
NSA-220 User’s Guide 69 C HAPTER 5 System Setting Screens This chapter discusses the system setting screens. 5.1 System Setting Screens This section gives an overview of the various features included in th e system setting screens. Use the system setting screens to: • Specify the NSA’ s W indows/CIFS server name and workgroup name.
Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 70 Figure 56 System Setting > Server Name The following table describes the labels in these screens. 5.3 Date/T ime Use this screen to select a time zone and a time server from which your NSA can get the time and date.
Chapter 5 Syst em Setting Scre en s NSA-220 User’s Guide 71 Figure 57 System Setting > Date/T ime The following table describes the labels in this screen. T able 14 System Setting > Date/Time LABEL DESCRIPTION Current System Date T ime Sett ing Current T ime This field displays th e ti me of your NSA.
Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 72 T ime Server Address Select a time se rver from the drop-down list box or select Spec if y my own time server and enter th e ti me server you wish to use in the field below . Check with your ISP/network admi nistrator if you ar e unsure of this information.
NSA-220 User’s Guide 73 C HAPTER 6 Storage Screens This chapter covers storage system s, volumes and disks on the NSA. 6.1 St orage Introduction Use the System > S torage screens to manage volumes and disk s (both internal and external). " Several NSA features require a valid internal volume.
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 74 The following table describes the labels in this screen. Y ou see a warning sc reen before you dele te a volume.
Chapter 6 Storage Screens NSA-220 User’s Guide 75 " Creating a volume formats the hard driv e. All data on t he disk will be lost. Figure 60 System > S torage > Create an Internal V olume The following table describes the labels in this screen.
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 76 6.4 Editing a V olume Click an internal volume’ s Edit icon in the System > S torage screen as shown in Figure 58 on page 73 to open the following screen. Use this screen to chan ge the volume’ s name.
Chapter 6 Storage Screens NSA-220 User’s Guide 77 Storage ef ficiency assumes all drives are of identical size. Performance rankings are approximations. 6.5.1 Choosing A S torage Method For a V olume The following is a guide to help you choose a storage method for the various number of disks supported on the NSA.
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 78 • OK means the USB connected device is functioning properly . • Resync when you create a RAID volume. • Recovering appears when repairing a RAID 1 volume. (A RAID1 volume was once degraded, but yo u have installed a new disk and the NSA is restoring the RAID1 volume to a healthy state.
Chapter 6 Storage Screens NSA-220 User’s Guide 79 6.6.1 Resychr onizing or Re covering a RAID 1 V olume Resychronizing or recovering a RAID 1 volume that was down is done block-by-b lock, so the time it takes depends more on the size of your ha rd drive(s) than the amount of data y ou have on them.
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 80 " Creating a volume formats the drive. All data on the di sk will be lost. Figure 62 System > S torage > Create an External V olume The following table describes the labels in this screen.
Chapter 6 Storage Screens NSA-220 User’s Guide 81 6.9 RAID This section contains theoretical background on JBOD and the RAID levels used on the NSA. Skip to the next section if you already unde rstand RAID and know what stor age system you want to use on the NSA.
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 82 6.9.1 JBOD JBOD allows you to combine multip le physical disk drives into a single virtual one, so they appear as a single large disk. JBOD can be used to turn multiple differen t-sized drives into one big drive.
Chapter 6 Storage Screens NSA-220 User’s Guide 83 6.9.3 RAID 1 RAID 1 creates a n exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity . The followi ng figure shows two disks in a single RAID 1 volume with mirrore d data.
Chapter 6 Sto ra ge Scre en s NSA-220 User’s Guide 84.
NSA-220 User’s Guide 85 C HAPTER 7 Network Screen This chapter discusses the network configuration screen. 7.1 Network Settings Use the network configuration screen to assign the NSA a dynamic or static IP address and DNS information. 7.1.1 IP Address The NSA needs an IP address to communicate with the media servers on your network.
Chapter 7 Net wo rk Scree n NSA-220 User’s Guide 86 In the following example, the NSA has jumbo frames enabled and set to 8KB frames. This means the computer , notebook computer , and sw itch must also have jumbo frames enabled and be capable of supporting 8KB frames.
Chapter 7 Network Screen NSA-220 User’s Guide 87 Figure 64 System Setting > Network > TCP/IP The following table describes the labels in this screen. T able 23 System Setting > Network > TCP/IP LABEL DESCRIPTION IP Address Dynamic Select this option to have the NSA get IP address information automatically .
Chapter 7 Net wo rk Scree n NSA-220 User’s Guide 88 Secondary DNS Server T ype a secondary DNS server IP address. Jumbo Frames Jumbo frames impr ove network pe rforman ce. Y ou must have a 1 Gbps (Gigabit Ethernet) network that suppor ts jumbo frames.
NSA-220 User’s Guide 89 C HAPTER 8 Application Screens This chapter discusses the application screens. 8.1 Application Screens Use the application screens to: • Configure settings for FTP file transfers to/from the NSA. See Section 8.2 on page 89 .
Chapter 8 Application Screens NSA-220 User’s Guide 90 Figure 65 Applications > FTP The following table describes the labels in this screen. 8.3 Sharing Media Files on Y our Network The media server feature lets anyone on your netw ork play video, mus ic, and photo s from the NSA (without having to copy them to another computer).
Chapter 8 Application Screens NSA-220 User’s Guide 91 • The media server is a convenient way to share files you download using the broadcatching service (see Chapter 8 on page 10 5 ). • Media client software is included on the CD. • Hardware-based media clients like the DM A-1000 can also pl ay the files.
Chapter 8 Application Screens NSA-220 User’s Guide 92 8.3.2 Songs and Videos from the iT unes S tore After using iT unes on your computer to download songs and videos from Apple’ s iT unes Store, you can copy them to the NSA. Many of these songs and videos have DRM (Digital Rights Management).
Chapter 8 Application Screens NSA-220 User’s Guide 93 8.5 Download Service The NSA’ s download service downloads files from the Internet directly to the NSA. Y ou do not have to download to your co mp uter and then copy to the NSA. This can free up your computer ’ s system resources.
Chapter 8 Application Screens NSA-220 User’s Guide 94 8.5.1 BitT o rrent The NSA includes a BitT orrent c lient for fast downloading and sharing of large files (such as educational public domain vide os ). With BitT orrent, you share while you ’re do wnloading the file.
Chapter 8 Application Screens NSA-220 User’s Guide 95 Figure 68 Firewall • Stateful packet inspection to control access between the Internet and your network and protect your NSA (and comp uters) from hacking attacks.
Chapter 8 Application Screens NSA-220 User’s Guide 96 Figure 70 Firewall Configured to Allow Incoming BitT orrent Requ ests 8.6 Download Service Screen Click Applications > Download Service to open the following sc reen. Use this screen to manage the NSA’ s file downloads.
Chapter 8 Application Screens NSA-220 User’s Guide 97 Figure 71 Applications > Download Service The following table describes the labels in this screen. T able 26 Applications > Download Service LABEL DESCRIPTION Enable Download Servi ce Use this option (and the Apply button) to turn the download service o ff or on.
Chapter 8 Application Screens NSA-220 User’s Guide 98 Refresh Click this button to update the information displ ayed on the screen. Preferences Click this butto n to open a screen whe re you can set the default locati on for saving downloads and configure your BitT orrent settings.
Chapter 8 Application Screens NSA-220 User’s Guide 99 8.7 Adding a Download T ask Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 3.2 on page 52 provides a tutorial on adding a download task.
Chapter 8 Application Screens NSA-220 User’s Guide 100 8.8 Configuring Y our General Download Preferences Click Applications > Download Service > Prefer ences to open the following screen. Use this screen to set the default location for saving down loads and configure your BitT orrent settings.
Chapter 8 Application Screens NSA-220 User’s Guide 101 8.9 W eb Publishing W eb publishing lets y ou “publish” shares (containing folders and files) on the NSA so people can access the files using a web brows er without having to log into th e My NSA screens.
Chapter 8 Application Screens NSA-220 User’s Guide 102 8.9.2 Web Publishing Port Number If the web-published shares use a port number ot her than 80 (the normal port for web traffic), users must include it after the NSA’ s IP address in order to access the NSA’ s web-published shares.
Chapter 8 Application Screens NSA-220 User’s Guide 103 Figure 75 Applications > Web Publishing The following table describes the labels in this screen.
Chapter 8 Application Screens NSA-220 User’s Guide 104 8.1 1 W eb Publishing Example This example covers ho w to configure the W eb Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into th e My NSA screens and shows how to access the share through the Internet.
Chapter 8 Application Screens NSA-220 User’s Guide 105 Figure 77 Browsing to an NSA Share Example • Click a file’ s link to open the file. • Right-click a file’ s link and select Save T arget As.. (in Internet Explorer) to save a copy of the file.
Chapter 8 Application Screens NSA-220 User’s Guide 106 RSS (Really Simple Syndication) is a format for delivering frequent ly updated digital cont ent. At the time of writing, the NSA supports RSS 2.0 feeds. W ebsites with a feed usually display a feed icon (shown next).
Chapter 8 Application Screens NSA-220 User’s Guide 107 Figure 79 Applications > Broadcatching The following table describes the labels in this screen. T able 30 Application s > Broadcat ching LABEL DESCRIPTION Add Channel When you find a channel to subscribe to, copy the URL of the channel’s feed and click this button.
Chapter 8 Application Screens NSA-220 User’s Guide 108 8.14 Adding or Editing a Broadcatching Channel Click Applications > Broadcatching > Add Channel to open the followi ng screen. Use the Add screen to s ubscribe the NSA to a channel’ s feed so you can view the channel.
Chapter 8 Application Screens NSA-220 User’s Guide 109 The following table describes the labels in this screen. 8.15 Printer Sharing The NSA can act as a print server . A print serv er lets multiple computers share a printer . Connect a printer to the NSA’ s USB port to let multiple computers on your network use it.
Chapter 8 Application Screens NSA-220 User’s Guide 11 0 8.16 Print Server Screen Click Applications > Pri nt Server to open the following screen. Use this screen to v iew and manage the NSA’ s list of printers and print jobs. Figure 82 Applications > Print Server The following table describes the labels in this screen.
Chapter 8 Application Screens NSA-220 User’s Guide 111 Apply Click Apply to save your cha nge s back to the NSA. Cancel Click Cancel to clo se this screen w ithout saving your change s.
Chapter 8 Application Screens NSA-220 User’s Guide 11 2.
11 3 P ART III User Account s and Shares Users (1 15) Shares (1 19).
11 4.
NSA-220 User’s Guide 11 5 C HAPTER 9 Users This chapter introduces the Users screens of the NSA. 9.1 User Account s Introduction Use the Users screens to crea te and manage administrator and user accounts. Administrators can: • Configure and manage the NSA.
Chapter 9 Use rs NSA-220 User’s Guide 11 6 The following table describes the labels in this screen. 9.2.1 User Icons The following table describes the user icons. 9.3 Adding or Editing an Account Click the Add Account button in the Users screen to open the following screen.
Chapter 9 Users NSA-220 User’s Guide 11 7 The following table describes the labels in this screen. 9.3.1 Usernames Enter a username from one to 32 characters. Th e first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characte rs are not allow ed as the first character .
Chapter 9 Use rs NSA-220 User’s Guide 11 8 • pc-guest •a d m i n • password 9.4 Delete Account Screen In the Users screen, select an acc ount and click Delete Account to open the fo llowing screen. Use this screen to remov e a us er account. Figure 86 Users > Delete Account The following table describes the labels in this screen.
NSA-220 User’s Guide 11 9 C HAPTER 10 Shares This chapter introduces the Shares screens of the NSA. 10.1 Shares Introduction Use the Shares screens to create and manage shares. A share is a set of user access permissions mapped to a spec ific folder on a vo lume.
Chapter 10 Shares NSA-220 User’s Guide 120 Figure 87 Shares The following table describes the labels in this screen. See T able 38 on page 1 19 for icon details. 10.2 Adding or Editing Share Click the Add Shar e or Change Share Pr operties in the Shar es screen to open the following screen.
Chapter 10 Shares NSA-220 User’s Guide 121 Figure 88 Shares > Add Share The following table describes the labels in this screen. T able 40 Shares > Add Share (or Change Share Properties) LABEL DESCRIPTION Share Name T ype a share name from 1 to 255 si ngle-byte (n o Chin ese characters allowed for example) ASCII characters.
Chapter 10 Shares NSA-220 User’s Guide 122 10.2.1 Public and ANON YMOUS Share Access Right s If you make a share public, u sers do not need to log in. W ith ANONYMOUS FTP , you must enter either 'anonymo us' or 'ftp' as the username.
Chapter 10 Shares NSA-220 User’s Guide 123 The following table describes the labels in this screen. T able 41 Shares > Share Path Browse LABEL DESCRIPTION Create Folder T ype a folder name and click Create Folder to make a new folder . The name can be 1 to 255 single -byte (no Chinese characters allowed for example) ASCII characters.
Chapter 10 Shares NSA-220 User’s Guide 124.
125 P ART IV Maintenance, Protecting Dat a, and Media Client Maintenance Screens (127) Protecting Y our Data (135) Media Client Software (137).
126.
NSA-220 User’s Guide 127 C HAPTER 11 Maintenance Screens This chapter discusses the Maintenance screens. 1 1.1 Maintenance Overview Use the maintenance screens to: • V iew logs • Manage the NSA configuration file • Upload new firmware • Restart or shut down yo ur NSA 1 1.
Chapter 11 Maintenance Screens NSA-220 User’s Guide 128 The following table describes the labels in this screen. 1 1.3 Log Classes The following table shows information on log classes. 1 1.4 Log Severity Levels The following table shows informa tion on log severity levels.
Chapter 11 Maintenance Screens NSA-220 User’s Guide 129 1 1.5 Log Messages Here are some example log messages. 4 W arning 5N o t i c e 6I n f o T able 44 Log Severity Levels (continue d) LEVEL DESCRIPTION T able 45 Log Messages CLASS SEVERITY MESSAGE Network NOTICE %s is active beca use of changing Port Group.
Chapter 11 Maintenance Screens NSA-220 User’s Guide 130 Services W ARNING Reaching Maximum Allowed Rules Services W ARNING Rule is empty Services W ARNING The Rule Does Not Exist Services NOTICE FTP.
Chapter 11 Maintenance Screens NSA-220 User’s Guide 131 1 1.6 Configuration Click Maintenance > Configuration to open the following screen. Use the Configuration screen to back up or restore the NSA configuratio n settings and enable or disable the hardw are reset button.
Chapter 11 Maintenance Screens NSA-220 User’s Guide 132 Figure 92 Maintenance > FW Up gr ade The following table describes the labels in this screen. 1 1.8 Shut down Click the Maintenance link in the Navigation pa nel and t hen click the Shutdown link or the Shutdown tab to access the Maintenance > Shutdown screen.
Chapter 11 Maintenance Screens NSA-220 User’s Guide 133 When you cli ck the Restart button a pop-up screen will appear asking yo u to confirm. Click OK to continue or Cancel to quit the restart. Figure 94 Maintenance > Shut down > Confirm Restart When you cli ck the Shutdown button a pop-up screen will ap pear asking you to confirm.
Chapter 11 Maintenance Screens NSA-220 User’s Guide 134.
NSA-220 User’s Guide 135 C HAPTER 12 Protecting Your Data This chapter compares the different ways of pr otecting data on the NSA and explains how to use backup man age ment software inc l uded on the CD. 12.1 Protection Methods There are a variety of wa ys to protect your data on the NSA.
Chapter 12 Prot ecting Your Data NSA-220 User’s Guide 136 " Configuration File Backup and Restorati on does not affect da t a (your files and folders), volumes on the NSA. 12.1.2 Memeo Autobackup Use the Memeo Au tobackup software (included on the C D) on your com puter to sche dule and manage backups.
NSA-220 User’s Guide 137 C HAPTER 13 Media Client Software This chapter introduces the media cl ient software incl uded on the CD. 13.1 Media Client Introduction The NSA can function as a server to allo w DLNA (Digital Living Network Alliance) compliant media clients to play files.
Chapter 13 Media Client Software NSA-220 User’s Guide 138.
NSA-220 User’s Guide 139 C HAPTER 14 Memeo Autobackup Software This chapter introduces the Memeo Autobackup software included on the CD. 14.1 Memeo Autobackup Introduction Use the Memeo Autobackup softwa re included on the CD to au tomatically back up selected files from your computer to the NSA whenever you modify the files.
Chapter 14 Memeo Autobackup So ftware NSA-220 User’s Guide 140.
141 P ART V T roubleshooting and S pecifications T roubleshooting (143) Product Specification s (155).
142.
NSA-220 User’s Guide 143 C HAPTER 15 Troubleshooting 15.1 T roubleshooting Overview This chapter offers some sugg estions to solve problems you might encounter .
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 144 V An HDD LED is orange. Orange means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector , but the LED stays orange until the NSA restarts.
Chapter 15 Troubleshooting NSA-220 User’s Guide 145 V The LAN LED (by the LAN port) is of f. • Make sure the Ethernet cable is connected pr operly to the NSA and connected to another (Ethernet) device.
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 146 • By default, the NSA gets an IP address au tomatically . The NSA assigns itself an IP address if no device assigns one. If your co mputer is also set to get an IP address automatically , the compute r and the NSA can both assign themselves IP addresses and communicate.
Chapter 15 Troubleshooting NSA-220 User’s Guide 147 • Confirm that the computer running the NDU has a network connection. See the section on the NSA’ s LAN connection for related information. • The computer running the NDU can only discover NSAs in the same subnet.
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 148 Figure 97 Security Settings - Script S afe ActiveX Controls V I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the user name and password correctly . The default username is admin , and the default password is 1234 .
Chapter 15 Troubleshooting NSA-220 User’s Guide 149 • Check that the NSA is turned on and connected to the network. T ry to ping th e NSA or use the NDU to discover it. • Check that you entered your login name and password correctly . • Check that the share exists and check its access settings.
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 150 15.6 Some Features’ Screens Do Not Display V Many NSA features require a valid internal volume. Features like the print server , download se rvice, broadcatching, FTP and W indows/CIFS access will not work without a valid internal vo lume.
Chapter 15 Troubleshooting NSA-220 User’s Guide 151 2 Go to Applications > Media Server . Make sure the share containing the music and video files is published and the iT unes server option is enabled.
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 152 1 Make sure the files are a format s upported by iT unes. See Section 16.5 on page 160 . 2 If you have files from the iTunes S tore tha t use DRM, you need to use your App le account ID and password to authorize other computers to play the files.
Chapter 15 Troubleshooting NSA-220 User’s Guide 153 • W eb publishing uses TCP prot ocol and the port number you specify . Make sure there i s not another service using TCP protocol with the same port number . See Appendix C on page 187 for a list of common services and their associated protocols and port numbers.
Chapter 15 Tro u blesh oo tin g NSA-220 User’s Guide 154.
NSA-220 User’s Guide 155 C HAPTER 16 Product Specifications See also Chapter 1 on pa ge 25 for a general overview of the key features. 16.1 Physical Features These are the main external physical features. 16.2 Firmware Features These are some of the main firmware features of the NSA.
Chapter 16 Product Specifications NSA-220 User’s Guide 156 16.3 S pecification T ables The NSA hardwa re sp e cif i cations are shown in the following table. RAID File S torage Use RAID 0 if you want pure write speed and /or maximum capacity for your drives, and/or you have ot her means of protecting your data.
Chapter 16 Product Specifications NSA-220 User’s Guide 157 The NSA firmware specif ications are shown in the following table Compatible Hard Disks A SA T A I an d SA T A 3.0 Gbit/s (Serial Advanced T echnology Attachment) compatible hard drives. Maximum S torage Capacity 1.
Chapter 16 Product Specifications NSA-220 User’s Guide 158 The following list, which is not exhaustive, illustrates the standards and recommendations supported in the NSA.
Chapter 16 Product Specifications NSA-220 User’s Guide 159 ISO 15740 Picture T ransfer Protocol (PTP) from the International imaging Industry Association allows you to transfe r pi cture s from digital cameras or other devices without needing add itional device drivers.
Chapter 16 Product Specifications NSA-220 User’s Guide 160 16.4 Supported Media Server Content Format s The following describes the deta ils about the files that the NSA media server can publish. * Files may be converted to JPEG to allow play b ack on client applicatio ns that do not support the original file formats.
Chapter 16 Product Specifications NSA-220 User’s Guide 161 " This table is a laboratory test of NSA power consum ption for your reference only . 16.7 Comp atible Hard Disks The following hard disks have been tested an d are known to be compatible with the NSA.
Chapter 16 Product Specifications NSA-220 User’s Guide 162.
163 P ART VI Appendices and Index Setting up Y our Computer ’ s IP Address (165) Open Source Licences (191) Legal Information (221) Customer Support (223) Index (229).
164.
NSA-220 User’s Guide 165 A PPENDIX A Setting up Y our Computer ’ s IP Address All computers must have a 10M or 100M Et hernet adapter card and TCP/IP installed.
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 166 Figure 100 WIndows 95/98 /Me: Networ k: Configuratio n Inst alling Components The Network window Configuration tab displays a list of installed components. Y ou need a network adapter , the TCP/IP protocol and Client for Microsoft Netwo rks.
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 167 Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically .
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 168 Figure 102 Windows 95/98/Me : TCP/IP Pr operties: DNS Configuration 4 Click the Gateway tab. • If you do not know you r ga teway’ s IP addr ess, remove previously installed gateways.
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 169 Figure 103 Windows XP: S tart Menu 2 In the Control Panel , double-click Network Connections ( Network and Dial-up Connections in W indow s 20 00/NT). Figure 104 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Pr operties .
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 170 Figure 105 Windows XP: Control Panel: Network Connections: Pro per ties 4 Select Internet Protocol (TCP/IP) (under the Genera l tab in W in XP) and then click Properties .
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 171 Figure 107 Windows XP: Internet Protocol (TCP/IP) Propert ies 6 If you do not know your gateway's IP ad dress, remove any previously installed gateways in the IP Settings tab and click OK .
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 172 Figure 108 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Pr operties window (the General tab in W indow s XP): • Click Obtain DNS server address automatically if yo u d o not know your DNS server IP address(es).
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 173 Figure 109 Windows XP: Internet Protocol (TCP/IP) Propert ies 8 Click OK to close the Internet Protocol (TCP/IP) Properties window . 9 Click Close ( OK in W i nd ows 2000/NT) to close the Local Area Connection Properties window .
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 174 Figure 1 10 Macintosh OS X: App le Menu 2 Click Network i n the icon bar . • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab.
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 175 V erifying Settings Check your TCP/IP properties in the Network window . Linux This section shows you how to configure your computer’ s TCP/IP settings in Red Hat Linux 9.
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 176 Figure 1 13 Red Hat 9.0: KDE: Ethernet Device: Gener al • If you have a dyna mic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list.
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 177 Figure 1 15 Red Hat 9.0: KDE: Network Configuration: Activate 7 After the network card restart proc ess is complete, make sure the St a t u s is Ac tive in the Network Configuration screen.
Appendix A Setting up Your Computer’s IP Address NSA-220 User’s Guide 178 Figure 1 18 Red Hat 9.0: DNS Settings in resolv .conf 3 After you edit and save the configuration files, you must restar t the network card. Enter ./network restart in the /etc/rc.
NSA-220 User’s Guide 179 A PPENDIX B Pop-up Windows, JavaScript s and Java Permissions In order to use the web configurator yo u need to allow: • W eb browser pop-u p windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default).
Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 180 2 Clear the Block pop-ups check box in the Pop-up Block e r section of the screen. This disables any web po p-up blockers you ma y have enabled. Figure 122 Internet Options: Privacy 3 Click Apply to save this setting.
Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 User’s Guide 181 Figure 123 Internet Options: Privacy 3 T ype the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.
Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 182 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript s If pages of the web configura tor do not display properly in Inte rnet Explorer , check that JavaScripts are allowed.
Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 User’s Guide 183 Figure 126 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer , click To o l s , Internet Options and then the Security tab. 2 Click the Custom Level.
Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 184 JA V A (Sun) 1 From Internet Explorer , click To o l s , Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is sele cted.
Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 User’s Guide 185 Figure 129 Mozilla Firefox: T ools > Options Click Content .to show the screen below .
Appendix B Po p-up Window s, JavaScrip ts and Java Pe rmissions NSA-220 User’s Guide 186.
NSA-220 User’s Guide 187 A PPENDIX C Common Services The following table l ists some commonly-used se rvices and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site.
Appendix C Common Services NSA-220 User’s Guide 188 FTP TCP TCP 20 21 File T ransfer Program, a program to enable fast transfe r of files, i ncluding large files that may not be possible by e-mail. H.323 TCP 1720 NetMeeting uses this protoco l. HTTP TCP 80 Hyper T ext T ransfer Protocol - a client/ server protocol for the world wide web.
Appendix C Common Services NSA-220 User’s Guide 189 RTS P TCP/UDP 554 The Real Time S tre aming (medi a control) Protocol (R TSP) is a remote control for multimedia on the Internet. SFTP TCP 11 5 Simple File Transfer Protocol. SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet.
Appendix C Common Services NSA-220 User’s Guide 190.
NSA-220 User’s Guide 191 A PPENDIX D Open Source Licences Notice Information herein is subject to change withou t notice. Companies, name s, and data used in examples herein are fictitious unless otherwise noted.
Appendix D Open Source Licences NSA-220 User’s Guide 192 “Derivative W orks” shall mean any work, whether in Source or Object form, that is based on (or derived from) the W ork and for which the edit orial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship .
Appendix D Open Source Licences NSA-220 User’s Guide 193 distributed as part of the Derivative W orks; within the Source form or do cumentation, if provided along with the Derivative W orks; or , within a display genera ted by the Derivative W orks, if and wherever such third-party no tices n ormally appear .
Appendix D Open Source Licences NSA-220 User’s Guide 194 Redistribution and use in source and binary fo rms, with or without modification, are permi tted provided that the following conditions are met: Redistributions of source co de must retain the above copyright notice, this li st of conditions and the following disclaimer .
Appendix D Open Source Licences NSA-220 User’s Guide 195 The licenses for most software ar e de signed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your free dom to share and change free software--to make su re the software is free for all its users.
Appendix D Open Source Licences NSA-220 User’s Guide 196 W e call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Pu blic License. It also provides other free software developers Less of an advant age over competing non-free programs.
Appendix D Open Source Licences NSA-220 User’s Guide 197 1. Y ou may copy and distribute verbatim copies of the Library's comple te source code as you receive it, in any medium, provided that y.
Appendix D Open Source Licences NSA-220 User’s Guide 198 compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library , but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”.
Appendix D Open Source Licences NSA-220 User’s Guide 199 required form of the “work that uses the Librar y” must include any data and utility programs needed for reproducing the executable from it.
Appendix D Open Source Licences NSA-220 User’s Guide 200 contest validity of any such claims; this sec tion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
Appendix D Open Source Licences NSA-220 User’s Guide 201 END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, auto fs, device-mapper , evms, exim. Lm_sensors, mdadm, pam_mount, raid tools, samba, sg_utils, smartmontool s, vsftpd, xfsprogs and Linux kernel software under GPL license.
Appendix D Open Source Licences NSA-220 User’s Guide 202 0. This License ap plies to any program or othe r work which contains a notice pla ced by the copyright holder saying it may be distributed under the terms of this Ge neral Public License.
Appendix D Open Source Licences NSA-220 User’s Guide 203 3. Y ou may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sec.
Appendix D Open Source Licences NSA-220 User’s Guide 204 directly or indirectly through you, then the on ly way you could satisfy both it and this License would be to refrain entirely from di stribution of the Program.
Appendix D Open Source Licences NSA-220 User’s Guide 205 INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DA T A OR DA T A BEING RENDERED INACCURA TE OR LOSSES SUST AINED BY YOU OR.
Appendix D Open Source Licences NSA-220 User’s Guide 206 Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays unde r a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit.
Appendix D Open Source Licences NSA-220 User’s Guide 207 Original SSLeay License -------------------------------- Copyright (C) 1995-1998 Eric Y oung (e ay@cryptsoft.com) A ll ri ghts reserved. This package is an SSL implementation written by Eric Y oung (eay@cryptsoft.
Appendix D Open Source Licences NSA-220 User’s Guide 208 This Product include mod _ ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California.
Appendix D Open Source Licences NSA-220 User’s Guide 209 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number .
Appendix D Open Source Licences NSA-220 User’s Guide 210 1.2. “Contributor V ersion” means the combina tion of the Original Code, prior Modifications used by a Contributor , and th e Modifications made by that pa rticular Contributor .
Appendix D Open Source Licences NSA-220 User’s Guide 21 1 The Initial Developer hereby grants Y ou a wo rld-wide, royalty-free, non-exclusive license, subject to third party intellectual property cl.
Appendix D Open Source Licences NSA-220 User’s Guide 212 Any Modification which Y ou create or to which Y ou contribute must be made available in Source Code form under the terms of this Licen se ei.
Appendix D Open Source Licences NSA-220 User’s Guide 213 Contributor . Y ou must make it absolutely clear than any such warranty , support, indemnity or liability obligation is of fered by Y ou alon.
Appendix D Open Source Licences NSA-220 User’s Guide 214 Once Covered Code has bee n published under a particul ar version of the License, Y ou may always continue to use it under the terms of that version. Y ou may also choose to use su ch Covered Code under the terms of any sub sequent version of the License published by Netscape.
Appendix D Open Source Licences NSA-220 User’s Guide 215 any software, hardware, or device , other than such Participant's Contributor V ersion, directly or indirectly infringes any patent, then any ri ghts granted to Y ou by such Participant under Sections 2.
Appendix D Open Source Licences NSA-220 User’s Guide 216 As between Initial Developer and the Contri butors, each party is responsible for claims and damages arising, directly or indirectly , out of.
Appendix D Open Source Licences NSA-220 User’s Guide 217 The above copy righ t notic e an d t his permis sio n notice shall be included in all copies or substantial portions of the Software.
Appendix D Open Source Licences NSA-220 User’s Guide 218 4.Restrictions Y ou may not publish, display , disclose, sell, re nt, lease, modify , store, loan, distribute, or create derivative works of the Software, or any part thereof.
Appendix D Open Source Licences NSA-220 User’s Guide 219 DOCUMENT A TION OR OTHER WISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME ST A TES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMIT A TION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENT AL DAMAGES, THE ABOVE LIMIT A TION MA Y NOT APPL Y TO YOU.
Appendix D Open Source Licences NSA-220 User’s Guide 220.
NSA-220 User’s Guide 221 A PPENDIX E Legal Information Copyright Copyright © 2007 by ZyXEL Communications Corporation. The contents of this publication may not be reprod uced in any part or as a wh.
Appendix E Leg al In fo rm at ion NSA-220 User’s Guide 222 This device has been tested and foun d to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. Thes e limits are designed to provide reasonable protection against harmful interference in a resi dential installation.
NSA-220 User’s Guide 223 A PPENDIX F Customer Support Please have the following information r eady when you contact customer support. Required Information • Product model and serial number . • W arranty Information. • Date that you received your de vice.
Appendix F Custo m er Supp o rt NSA-220 User’s Guide 224 • Re g u l ar M a il : ZyXEL Communications, Czech s.r .o., Modranská 621, 143 01 Praha 4 - Modrany , Ceská Republika Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.
Appendix F Customer Support NSA-220 User’s Guide 225 India • Support E-mail: support@zyxel.in • Sales E-mail: sales@zyxel.in • T elephone: +91-1 1-30888144 to +91 -11-308 88153 • Fax: +91-1 1-30888149, +91 -11-2 6810715 • W eb: http://www .
Appendix F Custo m er Supp o rt NSA-220 User’s Guide 226 • Regular Mail: ZyXEL Communications Inc., 1 130 N. Miller St., Anaheim, CA 92806- 2001, U.S.A. Norway • Support E-mail: support@zyxel.no • Sales E-mail: sales@zyxel.no • T elephone: +47-22-80-61-80 • Fax: +47-22-80-61-81 • W eb: www .
Appendix F Customer Support NSA-220 User’s Guide 227 Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • T elephone: +46-31-744-7700 • Fax: +46-31-744-7701 • W eb: www .zyxel.se • Re g ul a r M a i l: ZyXEL Communications A/S, Sjöporten 4, 41764 Götebor g, Sweden Thailand • Support E-mail: support@zyxel.
Appendix F Custo m er Supp o rt NSA-220 User’s Guide 228.
Index NSA-220 User’s Guide 229 Index A about icon 41 accessing share contents 34 accessing the web configu rator 29 administration screens 32 , 40 anonymous access rights 122 ANONYMOUS FTP 122 anony.
Index NSA-220 User’s Guide 230 entry removal 43 everyone access rights 122 exitin g th e w eb config ur ator 32 , 41 external devices 34 external disks 80 external hard drive removal hard drives ext.
Index NSA-220 User’s Guide 231 IDP (Intrusion Detectio n and Prevention) 95 inactive 78 insta l l dr ives 26 internal hard drives 34 , 64 iT unes 90 J JavaScript 29 jumbo frames 85 L LAN LEDs 28 lan.
Index NSA-220 User’s Guide 232 pop-ups 29 power consumption 160 , 161 POWER LED 27 print server 109 private shares 37 proof of purchase 222 public shares 37 publish shares 90 publishing shares to th.
Index NSA-220 User’s Guide 233 torrent file 94 troubleshooting external disks 149 forgot password 145 LED indicators 143 LAN 145 login 148 media files 150 NDU discovery 147 overview 143 user share a.
Index NSA-220 User’s Guide 234.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté ZyXEL Communications NSA-220 c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du ZyXEL Communications NSA-220 - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation ZyXEL Communications NSA-220, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le ZyXEL Communications NSA-220 va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le ZyXEL Communications NSA-220, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du ZyXEL Communications NSA-220.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le ZyXEL Communications NSA-220. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei ZyXEL Communications NSA-220 ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.